<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1651 to 1665.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-december-10-2014-athira-a-nair-frndineed-an-app-for-passenger-safety"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ibn-live-december-8-2014-are-cab-apps-safe"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-december-5-2014-moulishree-srivastava-india-sees-biggest-improvement-in-internet-freedom"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/digital-security-training"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/november-2014-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/businessworld-november-25-2014-leave-the-net-alone"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/mumbai-mirror-november-19-2014-jaison-lewis-game-release-cancelled-over-gay-character"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/iocose-talk-at-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors">
    <title>Thank You To Our 2014 Sponsors</title>
    <link>https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors</link>
    <description>
        &lt;b&gt;Today’s the last day of work in 2014 for the editorial team at MediaNama, though we’ll run a Holiday Wire update intermittently this week, we’ll have a brief year end review for each major segment. Thank you for reading us in 2014, and have a great Christmas and New Year.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog entry was &lt;a class="external-link" href="http://www.medianama.com/2014/12/223-thank-you-to-our-2014-sponsors-spice-digital-antfarm-astro-vision-bruceclay-buongiorno-ccavenue-cis-e2e-fortumo-getit-google-india-com-info-edge-onmobile-qualcomm-times-internet/"&gt;published in Medianama&lt;/a&gt; on December 22, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;From the business side, it’s been a great 2015 for us, and we really  appreciate the support we received in 2014 from all our sponsors,  especially Spice Digital, our annual sponsor, and Antfarm,  which supported us for almost the entire year. We’re still working, for  an idea of our 2015 plans and editorial calendar, please see the  presentation &lt;a href="http://www.medianama.com/advertise/" target="_blank" title="advertise on medianama"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Annual Sponsor:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.medianama.com/2011/08/223-thank-you-sponsors-one97-spice-digital/spice-logo-3/" rel="attachment wp-att-34993"&gt;&lt;/a&gt;-&lt;a href="http://www.spicedigital.in/" title="Spice Digital "&gt; Spice Digital Ltd&lt;/a&gt;:  a part of Spice Global Group – US$2 Billion conglomerate promoted by  Dr. BK Modi, is one of India’s leading Mobile Value Added Services  company and offers innovative solutions for Telecom Operators,  Enterprises and Government using mobile connectivity media – Voice, SMS,  USSD, WAP &amp;amp; 3G. We are preferred partner of all major telecom  service providers in India and providing services to international  telecom players in over 20 countries across the globe. We are pioneers  in innovation and technology and committed to deliver excellent Award  winning products and services to the customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have exclusive tie-ups with Hungama and PPL for music streaming services.&lt;br /&gt; We have acquired two leading international VAS players, MMS (Indonesia) and Beoworld (Malaysia).&lt;br /&gt; Recently, we had a major financial investment from MediaTek (Taiwan).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Our sponsors during 2014:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://antfarm.in/" title="Antfarm"&gt;Antfarm&lt;/a&gt; is  an innovation sandbox based out of Mumbai. It is led by a team of blue  sky thinkers, entrepreneurs and professionals. The company takes great  ideas with disruptive potential, puts together all the key ingredients  of people, technology, strategy, marketing and capital to build these  into scalable companies. The ultimate aim is to create global businesses  that are ideated and built out of India. The first set of companies  launched are &lt;a href="http://stylista.com/"&gt;Stylista.com&lt;/a&gt;, &lt;a href="http://arrive.com/signin"&gt;Arrive.com&lt;/a&gt;, Fork Media, and the farm is currently scaling up ideas in education, travel &amp;amp; leisure, retail, ad-tech and healthcare.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.clickastro.com/"&gt;Astro-Vision&lt;/a&gt; is a name easily recognized and held in great esteem in the world of  astrology services. Its products range from software that run on the  latest operating systems to web based solutions for major portals and  the latest range of mobile phones. Astro-Vision’s focus has always been  on providing innovative astrology solutions using the latest  technologies in the field of IT and communications. From Desktop PCs to  internet portals and mobiles phones, Astro- Vision’s range of solutions  includes stand alone applications, online apps and astro content  services. The company has strategic tie-ups with major IT enabled  service networks like Suvidhaa, Reliance world, One stop shop and many  networks under the Government of India’s CSC scheme, including Spanco  and GNG. Many popular Indian websites today are powered by  Astro-Vision’s web based astrology solutions and astrology content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.bruceclay.com/in/" title="Bruceclay"&gt;Bruce Clay&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.buongiorno.com/" title="Buongiorno"&gt;Buongiorno&lt;/a&gt;, founded  in 1999, is known in the worldwide mobile commerce ecosystem for  developing and managing paid apps and content that help consumers get  greater enjoyment from mobile devices. On July 2012, after the  settlement of a successful public tender offer, Buongiorno became a  wholly-owned subsidiary of NTT DOCOMO – a global leader in mobile  telecommunications technologies and services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With direct connections to more than 130 telecom operators in 25  countries, over 10 years’ experience and a team of 600 professionals,  Buongiorno makes the mobile internet experience happen for consumers  globally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.medianama.com/wp-content/uploads/ccavenue_highres.jpg"&gt;&lt;/a&gt;- &lt;a href="http://www.ccavenue.com/" title="CCAvenue"&gt;CCAvenue&lt;/a&gt; is India’s largest payment gateway solution powering 85% of the  eMerchants in India across all verticals &amp;amp; has played the role of a  catalyst to the growth of ecommerce with real time, multi-currency,  multiple payment options online payment processing services. The  solution is powered by proprietary technology that integrates  transaction-processing, advance shopping cart, Invoicing, mobile page,  risk assessment and fraud control, smart analytical dashboards, live  monitoring of bank gateways, financial reporting etc. CCAvenue is the  only complete PG solution in the country that has the unique ability to  offer the full spectrum of 100+ Internet payment options.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;5 Credit Cards&lt;/li&gt;
&lt;li&gt;50 Debit Cards&lt;/li&gt;
&lt;li&gt;6 ATM cum Debit Cards&lt;/li&gt;
&lt;li&gt;50+ Netbankings&lt;/li&gt;
&lt;li&gt;Mobile Payments&lt;/li&gt;
&lt;li&gt;4 Cash Cards&lt;/li&gt;
&lt;li&gt;CCAvenue PhonePay IVRS Based Payment Systems.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://cis-india.org/"&gt;The Centre for Internet and Society&lt;/a&gt; (CIS)  is a non-profit research organization that works on policy issues  relating to freedom of expression, privacy, accessibility for persons  with disabilities, access to knowledge and IPR reform, and openness  (including open government data, free/open source software, open  standards, open access to scholarly literature, open educational  resources, and open video), and engages in academic research on digital  natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS critically engages with concerns of &lt;a href="http://cis-india.org/about/substantive-areas/digital-pluralism" title="Digital Pluralism"&gt;digital pluralism&lt;/a&gt;, &lt;a href="http://cis-india.org/about/substantive-areas/public-accountability"&gt;public accountability&lt;/a&gt; and &lt;a href="http://cis-india.org/publications/curricula-and-teaching"&gt;pedagogic practices&lt;/a&gt;, in the field of Internet and Society, with particular emphasis on South-South dialogues and exchange.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hosting and Support&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.e2enetworks.com" rel="nofollow" title="E2E Networks"&gt;E2E Networks&lt;/a&gt;:  India’s most clued in dedicated hosting company founded by geeks. E2E  Networks Private Limited has been into the business of providing Low  latency Dedicated Servers and VPS Servers in India since 2009. E2E  Networks goes way beyond merely provisioning servers/cloud  infrastructure. Our expertise includes strategies and managed services  help for implementing the most suitable cloud architecture based on  public, private or hybrid cloud platforms for your web facing or  enterprise applications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://fortumo.com/" title="Fortumo"&gt;Fortumo&lt;/a&gt; allows any developer to set up payment processing for web and mobile  services, games or apps using carrier billing. Payments work for PC  applications, web services and HTML5, Android, Windows Phone &amp;amp;  Windows 8 apps. Fortumo supports payments in 81 countries through 300  mobile operators. Get started with our self-service setup (no monthly  fees or minimum volume commitments) at &lt;a href="http://fortumo.com/"&gt;http://fortumo.com&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.freeads.in/" title="FreeAds"&gt;Getit Infomedia&lt;/a&gt; is India’s digital supermarket for SMEs  to get relevant business leads. We seamlessly deliver excellent value  across all media platforms be it Voice, Mobile Applications, Online,  WAP, Web chat, Print etc. The services provide presence, enquiries and  leads to its advertisers while ensuring end users (consumers) have  access to the best information, benefits and offers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Sponsor&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.google.com" title="Google"&gt;Google&lt;/a&gt; is a global technology leader focused on improving the ways people  connect with information. Google’s innovations in web search and  advertising have made its website a top internet property and its brand  one of the most recognized in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.india.com/" title="India.com"&gt;India.com&lt;/a&gt; is a joint venture between two media giants – Zee Entertainment Enterprise Ltd (ZEEL) and www.&lt;a href="http://pmc.india.com/"&gt;PMC.com&lt;/a&gt; is  all about the new India that is funny, witty, shocking. It shows the  new age Indian in their language. India.com provides a perspective that  is reflective of the changing dynamic of the role media plays in India.  Find out what the new India is saying only at &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt;. Discover India and Indians at &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt; for  no one covers the new India as &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt;! Get the latest updates follow @indiacom on Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.infoedge.in/"&gt;Info Edge (India) Limited&lt;/a&gt; is among the leading internet companies in India. Info Edge runs leading  internet businesses – Naukri.com -India’s no. 1 job site,  Jeevansathi.com – one of the leading matrimonial portal,99acres.com –  India’s No.1 real estate portal and Shiksha.com – India’s leading  education portal. The company also owns Quadrangle – an offline  executive search business, and Naukri Gulf (a leading jobsite in the  Middle East market). Info Edge also owns Brijj.com, a professional  networking site and Allcheckdeals.com, an online real estate brokerage  firm which is run as a subsidiary company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.onmobile.com/"&gt;OnMobile Global Ltd&lt;/a&gt;.  is a pioneer in white-labelled, Value Added Products and Services [VAS]  for mobile, landline and media service providers. The #1 VAS specialist  in emerging and high-growth markets, OnMobile touches the lives of over  1500 million mobile users across 55 countries each month. With our  diverse product portfolio of Mobile Music, multi-screen Video Gateway  and delivery solutions, Phone Backup and Personal Cloud Management  solutions, Voice and Video portals, M-Commerce products and services, we  generate 2 – 5% contribution for top customers and top line revenues of  over US $800 million for over 92 customers globally. We deliver our  products by the best combination of a hosted Cloud with on-site  operations at the customer premises or through products deployed in  customer networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Founded in 2000, OnMobile has business spread across India, U.S.,  LATAM, Africa, Australia, Middle East and Europe. The company was  publicly listed in India in 2008. Recent acquisitions include Voxmobili  (2007), Telisma (2008), Dilithium Networks (2010) and LiveWire (2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;OnMobile is the first Indian telecom VAS Company to go public. The  company’s shares are listed on the Bombay Stock Exchange (BSE) and the  National Stock Exchange (NSE) as on March 31, 2010&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://qualcommventures.com/" title="Qualcomm Ventures"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.qualcommventures.com/" title="Qualcomm Ventures"&gt;Qualcomm Ventures&lt;/a&gt; is the investment arm of Qualcomm Inc. (NASDAQ: QCOM), a Fortune 500  company with operations across the globe.As the Venture Capital  investment arm of Qualcomm, the world leader in next-generation mobile  technologies, Qualcomm Ventures has been making strategic investments in  early-stage technology companies since 2000. With a $500 million fund  commitment, Qualcomm Ventures seeks to make strategic investments in  early stage high-technology companies that have the potential to  dramatically transform our world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;QPRIZE (&lt;a href="http://www.qprize.com/"&gt;www.qprize.com&lt;/a&gt;)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;QPrize™ is Qualcomm Venture’s Seed investment competition. It’s  designed to provide entrepreneurs their first level of funding so they  can launch their idea into a successful start-up business. The QPRIZE  competition was first launched in 2009 to promote innovation in the  technology industry and is designed to identify the industry’s most  promising early-stage technology companies. We are looking for bright,  energetic and resourceful entrepreneurs who have a passion for bringing  new technologies and services to market. Our goal is to have QPrize act  as a catalyst for our winners, providing the initial capital to launch  their great ideas and support the company to its first institutional  funding round.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.timesinternet.in/"&gt;Times Internet (TIL)&lt;/a&gt; is a premier digital product company and the digital arm of The Times  of India Group. It reaches over 100m visitors and serves 2 billion  pageviews every month across web and mobile, with businesses across  news, entertainment, sports, local, ecommerce, classifieds, startup  investments, local partnerships, and more.TIL’s key properties in the  news category include&lt;a href="http://t.signauxtrois.com/link?url=http://timesofindia.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=9862a753-3036-4fb0-d995-d0f039be5863"&gt;timesofindia.com&lt;/a&gt;, &lt;a href="http://t.signauxtrois.com/link?url=http://economictimes.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=ad63a5e6-eeea-4036-a025-091733356fe5"&gt;economictimes.com&lt;/a&gt; and &lt;a href="http://t.signauxtrois.com/link?url=http://navbharattimes.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=deefd481-21fd-4574-f85e-bd03ecd42c23"&gt;navbharattimes.com&lt;/a&gt;.  Under its fold are topmost internet entertainment portals in India —  Gaana.com – the music broadcasting service and BoxTV.com – the video  streaming site. Indiatimes Shopping emerges as one of the top five  e-commerce companies in India &amp;amp; TimesCity, a lifestyle destination  covering recommendations across Restaurants, Movies, Events, Nightlife  in your city. Times Internet has also entered into partnerships with  global companies offering them its tremendous reach through online media  platforms under its initiative called &lt;a href="http://timesofindia.indiatimes.com/topic/TLP"&gt;Times Global Partners(TGP)&lt;/a&gt;.  The TGP portfolio ranges from licensing partnerships to investments and  acquisition. In the last year, TGP has made four acquisitions, twelve  global partnerships, four minority investments and over 20 investments  into start-ups through TLabs in the Indian ecosystem.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors'&gt;https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-27T14:27:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights">
    <title>Security and Surveillance: A public discussion on Optimizing Security while Safeguarding Human Rights</title>
    <link>https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to a public discussion on optimizing security and safeguarding human rights at its Bangalore office on Friday, December 19th, 2014, 16:00 to 18:00.&lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society, in collaboration with Privacy International UK, has undertaken exploratory research into surveillance, security, and the security market in India.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Through this research, we hope to understand and document policy and law associated with security, surveillance, and the security market in India and learn about the regulation of security and related technologies such as encryption, filtering, monitoring software, and interception equipment. We also hope to understand the import and export policy regime for dual use technologies.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Such findings will be critical in creating evidence based research to inform security policy and regulation in India and work towards enabling regulatory frameworks that optimize the nation’s security while protecting the rights of citizens.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights'&gt;https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-19T08:46:34Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law">
    <title>Identifying Aspects of Privacy in Islamic Law</title>
    <link>https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law</link>
    <description>
        &lt;b&gt;This white paper seeks to identify aspects of privacy in Islamic Law and demonstrate that the notion of privacy was recognized and protected in traditional Islamic law.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I. Introduction&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nuances of privacy have been deliberated by numerous scholars till date, without arriving at a definite answer.	&lt;a name="_ftnref1"&gt;&lt;/a&gt; It has been perceived as a right to be left alone,&lt;a name="_ftnref2"&gt;&lt;/a&gt; as mere secrecy,&lt;a name="_ftnref3"&gt;&lt;/a&gt; as the right to a legitimate area of seclusion and solitude.&lt;a name="_ftnref4"&gt;&lt;/a&gt; Privacy is a particularly nebulous concept, with a tendency of resting on intuitionist arguments.	&lt;a name="_ftnref5"&gt;&lt;/a&gt; However, finding refuge in intuitionist arguments has not lent to a clear understanding of the term itself. This presents a peculiar predicament; while privacy is demanded, nobody seems to have a clear understanding of what it truly means.	&lt;a name="_ftnref6"&gt;&lt;/a&gt; Daniel Solove opines that privacy is a concept in disarray, it is about everything and hence it seems to 	be about nothing.&lt;a name="_ftnref7"&gt;&lt;/a&gt; Solove finds agreement in a variety of literature, where privacy has been described as a "chameleon-like word",&lt;a name="_ftnref8"&gt;&lt;/a&gt; a term suffering from an "embarrassment of meanings",	&lt;a name="_ftnref9"&gt;&lt;/a&gt; a "powerful rhetorical battle cry".&lt;a name="_ftnref10"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditional notions such as bodily privacy, privacy within one's home, or privacy resulting out of private property are received with far less scepticism 	than more recent aspects of privacy. With the burgeoning increase in information exchange, the ambit of privacy concerns is widened but not always 	understood. While earlier notions of privacy confined themselves to physical intrusions, it is now possible to invade a person's privacy without physically 	intruding on their space. &lt;a name="_ftnref11"&gt;&lt;/a&gt; As capabilities to intrude on privacy increase, the demand for respecting 	privacy grows stronger. In their historic article, Warren and Brandeis referred to privacy as an incorporeal notion, referring to cases of defamation, proprietary harms, contractual harms, breach of confidence to conclude that all such cases belonged to an umbrella principle of the right to privacy.	&lt;a name="_ftnref12"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.II Aspects of Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;William Prosser, a torts scholar, in 1860 attempted to classify privacy comprehensively. He contemplated four kinds of activities as impinging on a 	person's privacy. They were 	&lt;br /&gt; 1. Intrusion upon the plaintiff's seclusion or solitude, or into his private affairs. 	&lt;br /&gt; 2. Public disclosure of embarrassing private facts about the plaintiff. 	&lt;br /&gt; 3. Publicity which places the plaintiff in a false light in the public eye. 	&lt;br /&gt; 4. Appropriation, for the defendant's advantage, of the plaintiff's name or likeness.&lt;a name="_ftnref13"&gt;&lt;/a&gt; &lt;br /&gt; While this classification lent some structure to the understanding of privacy, it restricted itself to only tort law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A wider taxonomy was offered by Daniel Solove, imbibing concerns of digital privacy and information technology. Focussing on activities that invade 	privacy, Solove argued that information collection, aggregation of information, dissemination of such aggregated information and invasion into people's 	private affairs are the aspects integral to understanding the privacy concerns of a data subject.&lt;a name="_ftnref14"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its policy paper on privacy in India, the Data Security Council of India (DSCI) recognised privacy issues in the context of e-commerce, transactional 	privacy, cyber crime, national security, and cross border data flows.&lt;a name="_ftnref15"&gt;&lt;/a&gt; Similarly the Department of Personnel and Training (DoPT) in 2011 focussed on understanding privacy in the context of data protection and surveillance.	&lt;a name="_ftnref16"&gt;&lt;/a&gt; Subsequently, in 2012, the Planning Commission of India set up the A.P. Shah Committee to look into 	issues of data protection. This Committee classified the dimensions of privacy into four main categories; interception and access, audio and video 	recording, access and use of personal identifiers, and bodily and genetic material.&lt;a name="_ftnref17"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The classification of privacy for the purpose of this paper is under the heads of bodily privacy, informational and communications privacy, and territorial 	and locational privacy.&lt;a name="_ftnref18"&gt;&lt;/a&gt; Bodily privacy stems from the notion of personal autonomy and inviolate 	personality. Battery, rape, voyeurism are all examples of the recognition of the need to protect the privacy of one's body. Communications and 	informational privacy refers to the protection of sensitive personal information, specific communications and private conversations. Interception of messages, spying, hacking or tapping phone lines are all activities that impinge on privacy under this head. India's ambitious biometric project,	&lt;i&gt;Aadhar, &lt;/i&gt;has brought to the fore concerns surrounding personal information. Territorial privacy is developed from the notion of private property, 	the tort of trespass being ample recognition of the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.III Is India a Private Nation?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In October, 2010, the government published an approach paper for legislation on privacy. In explaining the need for privacy legislation in India, the paper 	states, 	&lt;br /&gt; &lt;br /&gt; &lt;i&gt; "India is not a particularly private nation. Personal information is often shared freely and without thinking twice. Public life is organized without 		much thought to safeguarding personal data. In fact, the public dissemination of personal information has over time, become a way of demonstrating the 		transparent functioning of the government."&lt;a name="_ftnref19"&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The notion of privacy being a foreign construct carves the argument that legislation on privacy would mean subjecting India to an alien cultural value. 	However, this ignores the possibility of privacy being culturally subjective.&lt;a name="_ftnref20"&gt;&lt;/a&gt; Cultures have exhibited 	different measurements by which they measure public and private realms.&lt;a name="_ftnref21"&gt;&lt;/a&gt; This paper aims to demonstrate 	that while the word "privacy" does not find explicit reference in traditional Indian law, the essence of privacy as we understand it today has existed in 	traditional Indian culture, specifically Indian Islamic culture, pre-dating colonialism in India and modernity in India's legal system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.IV Displacement of traditional Indian Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Contemporary Indian law functions within a rubric that was constructed after the "expropriation" of traditional law.	&lt;a name="_ftnref22"&gt;&lt;/a&gt; India's colonial legacy rendered the displacement of traditional Indian law with a unified modern legal system abounding in European ideas of modernity and legal systems, leaving it is a state of "fractured modernity".	&lt;a name="_ftnref23"&gt;&lt;/a&gt; Before the British rule, Indians were governed by their personal laws and these laws did not aim to 	unify the nation in ways that Western legal systems did.&lt;a name="_ftnref24"&gt;&lt;/a&gt;. The decision to establish a modern legal 	system stemmed from the desire to administer the law as a function of the state, which would have been impractical at best in the absence of a unified 	legal system.&lt;a name="_ftnref25"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Edward Said eloquently states that the colonial experience does not end when the last European flag comes down or when the last white policeman leaves.	&lt;a name="_ftnref26"&gt;&lt;/a&gt; One cannot help but agree with Said, as the understanding of law in contemporary India is constructed 	on the principles of the English common law and on ideas of a modern legal system. While the word "privacy" does not arise in traditional law, this paper 	argues that the notions of privacy as we perceive it today did exist hitherto the modernization of India's legal system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.V Structure of the paper&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Part I has laid down the foundation of this paper and the arguments it endeavours to make, Part II explains the sources of Islamic law and attempts 	at locating privacy in them. It also explains certain pervasive concepts that will enhance an understanding of privacy in Islamic law. This paper restricts itself to &lt;i&gt;Sunni &lt;/i&gt;Islamic law. Part III gives an indication of privacy rights in India's neighbouring Islamic countries (both predominantly	&lt;i&gt;Sunni),&lt;/i&gt; Pakistan and Bangladesh; and highlights the legal framework for privacy in these countries.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II. Privacy in Islamic Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.I Sources of Islamic Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before locating aspects of privacy in Islamic Law, an understanding of its structure and sources will be helpful. Islamic Law is composed of	&lt;i&gt;Shariah, &lt;/i&gt;and &lt;i&gt;fiqh. Shariah&lt;/i&gt; indicates the path a faithful Muslim must undertake to attain guidance in the present world and deliverance to 	the next&lt;i&gt;.&lt;/i&gt; &lt;i&gt;Fiqh, &lt;/i&gt;the jurisprudence of Islam, refers to the rational understanding of &lt;i&gt;Shariah&lt;/i&gt; and human reasoning to appreciate 	the practical implications of Islam. While &lt;i&gt;Shariah&lt;/i&gt; is divine revelation, &lt;i&gt;fiqh&lt;/i&gt; is the human inference of &lt;i&gt;Shariah&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principle tenet of Islam is unwavering obedience to the teachings of God. According to Muslim belief, the &lt;i&gt;Quran&lt;/i&gt; is the divine communication 	from Allah to the Prophet of Islam. It is the foremost record of the word of God, and for this reason is considered the apex source of Islamic law. It is 	in the &lt;i&gt;Quran&lt;/i&gt; that basic norms of &lt;i&gt;Shariah&lt;/i&gt; are found, and it embodies the exact words of God as was revealed to the Prophet over a period of 23 years. &lt;i&gt;Fiqh&lt;/i&gt;, or the understanding of &lt;i&gt;Shariah&lt;/i&gt;, also finds its origins in the holy &lt;i&gt;Quran&lt;/i&gt;.	&lt;a name="_ftnref27"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Sunnah&lt;/i&gt; or Prophetic traditions are the ingredients for the model behaviour of a Muslim as demonstrated by the Prophet. It is a "way, course, 	rule, mode, or manner, of acting or conduct of life."&lt;a name="_ftnref28"&gt;&lt;/a&gt; The &lt;i&gt;Sunnah&lt;/i&gt; were compiled through the 	communications of Prophet Muhammad in the form of &lt;i&gt;Hadiths&lt;/i&gt; which are communications, stories or conversations; and may be religious or secular; 	historical or recent.&lt;a name="_ftnref29"&gt;&lt;/a&gt; The narrators of the &lt;i&gt;Hadith&lt;/i&gt; are known as "&lt;i&gt;isnad&lt;/i&gt;" who convey the 	"&lt;i&gt;matn&lt;/i&gt;" or the substance of the Prophet's actions or words as narrated through oral communications through the years. Due to its very nature, the accuracy of the &lt;i&gt;Sunnah&lt;/i&gt; came under considerable scrutiny, with concerns as to its possible fabrication and dilution.	&lt;a name="_ftnref30"&gt;&lt;/a&gt; However, with a well devised system of recording and verifying sources, the &lt;i&gt;Sunnah &lt;/i&gt; accompanies the imperative source of Islamic law, the &lt;i&gt;Quran.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other sources of Islam are found in human reasoning, or &lt;i&gt;ijtihad&lt;/i&gt;. &lt;i&gt;Ijtihad &lt;/i&gt;assumes a variety of secondary sources such as analogical reasoning &lt;i&gt;(Qiyas),&lt;/i&gt; unanimous consensus &lt;i&gt;(Ijma),&lt;/i&gt; decisions in favour of public interest (&lt;i&gt;isthihsan), &lt;/i&gt;and presumption of continuity	&lt;i&gt; (istishab)&lt;/i&gt;.&lt;a name="_ftnref31"&gt;&lt;/a&gt; &lt;br /&gt; &lt;i&gt;Ijtihad&lt;/i&gt; entails a resilient effort; an exertion in interpreting the primary sources in order to understand &lt;i&gt;Shariah, &lt;/i&gt;to infer the law which is not explicit 	or evident. The legitimacy of &lt;i&gt;Ijma&lt;/i&gt; is found in the Prophetic tradition, which states that the followers of Islam would never agree on an error, 	and will never unite on misguidance.&lt;a name="_ftnref32"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Quran and Sunnah &lt;/i&gt;lie at the pinnacle of Islamic jurisprudence and their authoritativeness lends a ready inference of legal principles derived from them. In exploring the concept of Privacy in Islamic Law, this paper will focus mainly on the material available in the &lt;i&gt;Quran &lt;/i&gt;and	&lt;i&gt;Sunnah.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.II The Public and Private in Islam&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the doctrine of &lt;i&gt;Shariah&lt;/i&gt;, every aspect of life is deemed to be private unless shown otherwise.	&lt;a name="_ftnref33"&gt;&lt;/a&gt; The public sphere is that in which governmental authority operates, making it both transparent and 	open to scrutiny and observation. Since its inception, Islam has considered the idea of governance with reasonable scepticism, ascribing to the view that 	there is no concept of a human ruler beyond reproach.&lt;a name="_ftnref34"&gt;&lt;/a&gt; This perhaps gave impetus to the idea of a 	private sphere as one that is inhabited exclusively by an individual and the divine, excluding any interference of the State; except with permission from 	religious law. In Islamic belief, a pious individual had submitted himself to God, and not the worldly State. Hence, all aspects of his life will align 	with the tenets of Islamic law and in pursuance with the will of God.&lt;a name="_ftnref35"&gt;&lt;/a&gt; Any failure to perform religious duties on the part of a Muslim is beyond the scope of another; it is only a consideration between him and the divine.	&lt;a name="_ftnref36"&gt;&lt;/a&gt; It is believed that the Prophet said, 	&lt;i&gt; "Those, who acknowledge God in words, and not at heart, do not find fault with their fellow Muslims. The wrongdoing of those who do so become the 		subject of God's scrutiny, and when God looks into someone's wrongdoing then all shall be truly exposed" &lt;/i&gt; &lt;a name="_ftnref37"&gt;&lt;/a&gt; The individual is bestowed with complete freedom of action in the private sphere, subject only to the will of the divine. To govern another is wholly 	beyond the capacity of any individual, and this forms a pervasive theme in Islamic jurisprudence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic Law recognizes that it is inevitable for every society to impose certain requirements on individuals both by the law and by societal norms. In 	respect of a public domain, Islam prescribes an amalgam of requirements of a Muslim community and the teachings of Islam. While committing sins in private is beyond the scope of public or governmental scrutiny, committing a sin in public amounts to a crime, meriting worldly punishment.	&lt;a name="_ftnref38"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic law provides for an individual's obligations to the divine at all times, and to the state in matters within the public domain.	&lt;a name="_ftnref39"&gt;&lt;/a&gt; This is the most striking difference between Islamic law and modern law, as the function of enforcement of the law and punishment are forfeited to the state in a modern legal system, by virtue of the social contract.	&lt;a name="_ftnref40"&gt;&lt;/a&gt; However, in Islamic societies, the concept of social contract does not exist. Instead, an individual's 	obligations lie to the state only if acts meriting worldly punishment occur in the public sphere.&lt;a name="_ftnref41"&gt;&lt;/a&gt; It is 	this distinction in the obligations of individuals that leads to conflicts between the application of Islamic law and modern law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Quran&lt;/i&gt; is replete with rules for all believers to ordain good and forbid evil (al-amrbi al-Ma'rufwa al-nahy 'an al-munkar').	&lt;a name="_ftnref42"&gt;&lt;/a&gt; This divine injunction is a restriction of freedom in the private sphere. The notion of privacy in the 	public sphere was tested through the office of the &lt;i&gt;muhtasib,&lt;/i&gt; or compliance officer. These officers were appointed to ensure that the quality of life is preserved in Islamic societies. Personal or private matters which were visible in the public realm were liable to scrutiny from the	&lt;i&gt;muhtasib&lt;/i&gt; as well. However, this does not extend to matters such as surveillance and spying even on the authority of the state. The Prophet, 	according to the &lt;i&gt;hadith &lt;/i&gt;of Amir Mu'awiyah remarked, &lt;b&gt;&lt;i&gt;"&lt;/i&gt;&lt;/b&gt; &lt;i&gt; If&lt;b&gt; &lt;/b&gt;you try to find out the secrets of the people, then you will definitely spoil them or at least you will bring them to the verge of 		ruin." &lt;/i&gt; &lt;a name="_ftnref43"&gt;&lt;/a&gt; In fact, modern jurists admonish the idea of surveillance as &lt;i&gt;"exactly what Islam has called as the root cause of mischief in politics.&lt;/i&gt;"	&lt;a name="_ftnref44"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.III. Privacy in Islamic Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bodily Privacy &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sanctity of one's bodily privacy is well recognised in Islamic Law. The &lt;i&gt;Quran&lt;/i&gt; (24:58)&lt;a name="_ftnref45"&gt;&lt;/a&gt; demarcates certain periods in a day which are times of privacy for an individual, and indicates the need for prior permission before one may enter the 	private sphere of another. These periods are before the prayer at dawn, during the afternoon where one rests, and after the night prayer. This verse also calls upon children who have not yet reached the age of puberty to get accustomed to asking for permission before entering rooms apart from their own.	&lt;a name="_ftnref46"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As far as bodily seizure of individuals accused of crimes goes, the Traditions indicate a general disinclination towards pre-adjudication restraint of individuals. The very occurrence of it appears to be a cause of discomfort as recorded in the Traditions.	&lt;a name="_ftnref47"&gt;&lt;/a&gt; One of the Prophet's closest companions, Umar, is believed to have encourages officials to speed up adjudication processes so that the accused could not be deprived of the comfort of their homes and families.	&lt;a name="_ftnref48"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;bodily privacy and modesty&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the Quran stipulates gender equality, the norms of bodily privacy and modesty applicable to men are far less rigorous than the rules of modesty 	that apply to women.&lt;a name="_ftnref49"&gt;&lt;/a&gt; While staring is not contemplated as a crime in modern jurisdictions, the Quran 	directs "believing men to lower their gaze and be modest." &lt;a name="_ftnref50"&gt;&lt;/a&gt; At the same time, it directs women to adhere to strict rules of clothing and conduct, with directions on how to conduct oneself both in private as well as public.	&lt;a name="_ftnref51"&gt;&lt;/a&gt; Interestingly, with the use of full-body scanners at airports around the world, the bodily privacy of Muslims came to the forefront with several Muslim scholars opining that such use of scanners was in direct violation of the tenets of Islam.&lt;a name="_ftnref52"&gt;&lt;/a&gt; According to the Quran, the modesty of a Muslim woman is an indication of her faith.	&lt;a name="_ftnref53"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communication and Informational Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is, in many ways, inextricably linked to the notions of personal autonomy, and inviolate personality. Privacy in matters apart from those concerned with proprietary interests was only developed as a legal idea around the ninth century, although the &lt;i&gt;Quran &lt;/i&gt;made ample references to it.	&lt;a name="_ftnref54"&gt;&lt;/a&gt; Whilst the term "privacy" is not directly alluded to in the &lt;i&gt;Quran&lt;/i&gt;, it contains verses 	emphasizing the importance of respecting personal autonomy. The &lt;i&gt;Quran&lt;/i&gt; (49:12) rebukes those who wish to pry into matters which do not concern them, or harbour suspicions in respect of others, conceding that some suspicions can even be considered crimes.	&lt;a name="_ftnref55"&gt;&lt;/a&gt; This implies an injunction against investigation; which complements the prohibition of circulation of 	information pertaining to an individual's private sphere (24:19).&lt;a name="_ftnref56"&gt;&lt;/a&gt; According to this verse, publication 	of immorality is desirous of punishment. A reasonable conclusion from the reading of these verses is that the &lt;i&gt;Quran&lt;/i&gt; mandates respect for the 	private sphere, guaranteeing that a faithful believer will not violate it.&lt;a name="_ftnref57"&gt;&lt;/a&gt; The Prophet is reported to have said that non interference of individuals in matters that do not concern them is a sign of their good faith.	&lt;a name="_ftnref58"&gt;&lt;/a&gt; Interestingly, the injunction against unwarranted search is for all members of a Muslim community, not 	just followers of Islam. An extension of the concept of informational privacy is the privacy of one's opinion, which is believed to be beyond reproach regardless of its contents. Deeds in the public sphere can be subject to worldly punishment, but thoughts and opinions everywhere, are not subject to it.	&lt;a name="_ftnref59"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Sunnah&lt;/i&gt; have also emphasized on privacy in communications. The Prophet once said,	&lt;i&gt;"He, who looks into a letter belonging to his brother, looks into the Hellfire&lt;/i&gt;"&lt;a name="_ftnref60"&gt;&lt;/a&gt; , indicating that private communications shall enjoy their privacy even in the public domain. This is evident from another saying of the Prophet,&lt;i&gt;"Private encounters result in entrustment&lt;/i&gt;", which entails a restriction on communications arising out of private meetings.	&lt;a name="_ftnref61"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Territorial Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Domestic privacy is considered an important facet of Islamic life and this idea pervades different aspects of &lt;i&gt;Shariah&lt;/i&gt;. Privacy in regard to 	proprietary interests was in fact the first legal conception of privacy recognised by Muslim jurists. &lt;a name="_ftnref62"&gt;&lt;/a&gt; The &lt;i&gt;Quran&lt;/i&gt; (24:27-8) forbids entering another's house in lieu of permission to do the same. &lt;a name="_ftnref63"&gt;&lt;/a&gt; It seeks to ensure that a person visiting another's house is welcome in that house; reminding individuals of their rights during such visits. Further, the	&lt;i&gt;Quran&lt;/i&gt; (2:189) envisions visits made to other's houses only through the front door, indicating respect and transparency in visiting another's 	dwelling place.&lt;a name="_ftnref64"&gt;&lt;/a&gt; Muslim scholars are of the opinion that such rules were laid down in order to safeguard one's private sphere; to allow people to modify their behaviour to accommodate a visitor in a private domain.	&lt;a name="_ftnref65"&gt;&lt;/a&gt; Clarifying the reasons for such rules, a jurist offered the following explanation, 	&lt;i&gt; "The first greeting is for the residents to hear the visitor, the second is for the residents to be cautious( fa-ya khudhu hidhrahum),and the third is 		for them to either welcome the visitor or send him away."&lt;/i&gt;&lt;a name="_ftnref66"&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy in the domestic sphere extends to both physical privacy as well as intangible privacy. The Prophet opined that if one's gaze has entered into a 	private home before his body does, permission to enter the home would be redundant. This follows from the idea that if a person curiously peeps into 	another's home, it is equivalent to him entering it himself. The right to privacy is extended to absolve the home owner of any guilt in the event of attack 	on the intruder. &lt;a name="_ftnref67"&gt;&lt;/a&gt; Curiously, the right to privacy within one's home is extended to privacy in respect 	of sinful behaviour within his private sphere; the accountability of a Muslim to his fellow humans is only to be discerned in respect of his public 	actions.&lt;a name="_ftnref68"&gt;&lt;/a&gt; This is illustrated by an interesting story in the &lt;i&gt;Hadith &lt;/i&gt;of Umar ibn al-Khattab. 	Khattab climbed the wall of a house on the suspicion of wine being consumed within the premises. On his suspicion being confirmed, he chided them for their 	conduct. They then reminded him that while he pointed out their sins, he himself was guilty of three sins; spying on them, failing to greet them and also 	not approaching their house through the front door. He agreed with them and walked away. &lt;a name="_ftnref69"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rationale behind recognising privacy in the domestic sphere is not just illegal intrusion into one's physical space; it is also intrusion into matters 	of sensitivity which widens the scope for privacy in Islamic Law.&lt;a name="_ftnref70"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III Privacy in Shariah Based States&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Locating aspects of privacy is Shariah-based states is particularly challenging due to the duality of obligations that exists in their legal framework. 	While Islamic law focuses on obligations of individuals to the divine in all affairs and the state only in public matters, legal obligations in modern 	states are understood vis-à-vis the state only.&lt;a name="_ftnref71"&gt;&lt;/a&gt; The incorporation of Islam into these modern legal 	systems represents the attempt at reconciling two distinct sources of law. This Part will consider the legal frameworks for privacy in Pakistan and 	Bangladesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III.I Pakistan&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic law has had a profound impact on the legal system of Pakistan.&lt;a name="_ftnref72"&gt;&lt;/a&gt; This Islamic Republic integrates	&lt;i&gt;Shariah&lt;/i&gt; law into its common law system, as is evident from Article 227(1) of the 1973 Constitution of Pakistan ("the 1973 Constitution"). It 	reads, " 	&lt;i&gt; All existing laws shall be brought in conformity with the Injunctions of Islam as laid down in the Holy Quran and Sunnah, in this Part referred to as 		the Injunctions of Islam, and no law shall be enacted which is repugnant to such injunction". &lt;/i&gt; &lt;a name="_ftnref73"&gt;&lt;/a&gt; In addition to the Constitutional safeguards, General Zia-ul-Haq, between 1977 and 1988 provided great impetus to Pakistan's process of incorporating Islam 	into its common law system through the establishment of appellate religious courts and also enactment of the &lt;i&gt;Hudood&lt;/i&gt; criminal law, which was 	consequently criticized for being discriminatory and arbitrary.&lt;a name="_ftnref74"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Constitutional Provisions&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Enshrined in the 1973 Constitution is the fundamental right of persons not to be subject to any action detrimental to the life, liberty, body, reputation 	or property. While referring to the rights of individuals, Article 4(1) lays down, 	&lt;i&gt; "To enjoy the protection of law and to be treated in accordance with law in the inalienable right of every citizen. Wherever he may be, and of every 		other person for the time being within Pakistan." &lt;/i&gt; &lt;a name="_ftnref75"&gt;&lt;/a&gt; While aspects of privacy can be read into this Article quite emphatically, the 1973 Constitution explicitly recognises the right to privacy, dignity and the inviolability of persons in Article 14(1),&lt;i&gt;"The dignity of man, subject to law, the privacy of home, shall be inviolable".&lt;/i&gt; &lt;a name="_ftnref76"&gt;&lt;/a&gt; The sanctity of these rights is vigorously upheld as laws inconsistent with fundamental rights are 	declared to be void to the extent of their inconsistency.&lt;a name="_ftnref77"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bodily Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 1973 Constitution recognises the fundamental right of persons not to be subject to any action detrimental to the life, liberty, body, reputation or 	property.&lt;a name="_ftnref78"&gt;&lt;/a&gt; The Pakistan Penal Code (Act XLV of 1860) refers to the protection of privacy of women in 	Section 509, upholding the modesty of women.&lt;a name="_ftnref79"&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communications and Informational Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Pakistan Telecommunication (Re-organisation) Act 1996 enables investigating authorities under the Act to take cognizance of illegalities in 	communications.&lt;a name="_ftnref80"&gt;&lt;/a&gt; These authorities submit their reports to the courts, ensuring the accountability of 	such events, as well as legitimising search and seizure in pursuance of intercepted communications. The Act also makes arrangements for authorised interception of communications in cases of national security, although the wide and sweeping powers bestowed under this Section are a cause for concern.	&lt;a name="_ftnref81"&gt;&lt;/a&gt; Moreover, any person causing annoyance to another through a telephone is liable to criminal punishment 	under the Telegraph Act, 1885.&lt;a name="_ftnref82"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Medical&lt;a name="_ftnref83"&gt;&lt;/a&gt;and Financial&lt;a name="_ftnref84"&gt;&lt;/a&gt; information is recognised as a 	unit of privacy in the legal system of Pakistan. The delicate balance between transparency of government action and extent of privacy of information is 	struck in the Freedom of Information Ordinance, which exempts divulging information regarding personal privacy of individuals, private documents and 	financial privacy.&lt;a name="_ftnref85"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As far as digital privacy is concerned, the law in Pakistan is still at a nascent stage. In 2000, Pakistan implemented the National Information Technology 	Policy and Action Plan, which provided for confidentiality of transactional information.&lt;a name="_ftnref86"&gt;&lt;/a&gt; In 2002, an 	Electronic Transactions Ordinance was passed with a view to recognise and protect electronic transactions, setting up a framework within which privacy of 	information can be guaranteed and authenticity can be verified.&lt;a name="_ftnref87"&gt;&lt;/a&gt; There is no devoted law on data protection yet, although a Draft Electronic Data Protection Bill was published by the Ministry of Information in 2005.	&lt;a name="_ftnref88"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Territorial and Locational Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Akin to notions of privacy of the home in Islamic law, criminal trespass is a punishable offence under the Pakistan Penal Code.	&lt;a name="_ftnref89"&gt;&lt;/a&gt; Pakistan has an unfortunately intimate relationship with terrorism. The Anti Terrorism Act of 1997 	incorporates some provisions which raise concerns as to the sanctity of individual privacy. The Act allows an officer of police, armed forces or civil armed forces to enter and search any premise, &lt;a name="_ftnref90"&gt;&lt;/a&gt; and to seize any property	&lt;a name="_ftnref91"&gt;&lt;/a&gt; they suspect to be connected to a terrorist act, without a warrant. Perhaps what is more worrying is that the entry of an officer is not subject to review, unlike in other Islamic countries like the United Arab Emirates.	&lt;a name="_ftnref92"&gt;&lt;/a&gt; The trade off between personal liberties and national security is acutely felt in Pakistan, with 	intelligence agencies carrying on mass surveillance, without any legal framework providing for the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III.II Privacy in Bangladesh&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bangladesh identifies itself as a secular nation, although Islam is the state religion. &lt;a name="_ftnref93"&gt;&lt;/a&gt; The Constitution of Bangladesh uses the word privacy in the context of both territorial and communications privacy.	&lt;a name="_ftnref94"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bodily Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bangladesh Penal Code, similar to Pakistan's, contains a section guaranteeing the bodily privacy of a woman and prohibiting any form of outraging her 	modesty.&lt;a name="_ftnref95"&gt;&lt;/a&gt; It criminalises assault,&lt;a name="_ftnref96"&gt;&lt;/a&gt; and also provides 	for private defence in case of assault.&lt;a name="_ftnref97"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communications Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy of communications is subject to interception for the purpose of public safety, as envisaged in the Telegraph Act, 1885.&lt;a name="_ftnref98"&gt;&lt;/a&gt; It also contains provisions regarding unlawful interception of messages,&lt;a name="_ftnref99"&gt;&lt;/a&gt; as well as tampering or damaging communications.	&lt;a name="_ftnref100"&gt;&lt;/a&gt;The Telecommunications (Amendment) Act 2006 gives the police sweeping powers to intercept mobile 	communications as well. However, a notice was issued to the government after this amendment to demonstrate its legality. Bangladesh also has the Right to 	Information Act, 2009 to promote transparency in governance, although it has a considerable number of agencies exempt from the Act as well. Provisions for 	cyber crime are enshrined in the Information and Communication Technology Act, 2006.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Territorial Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the context of territorial privacy, the Bangladesh Penal Code recognises criminal trespass,&lt;a name="_ftnref101"&gt;&lt;/a&gt; house 	trespass,&lt;a name="_ftnref102"&gt;&lt;/a&gt; lurking house trespass&lt;a name="_ftnref103"&gt;&lt;/a&gt; and house 	breaking&lt;a name="_ftnref104"&gt;&lt;/a&gt; as offences under Bangladeshi law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IV. Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is a comprehensive term that entails a plethora of claims, making an exact definition of the term difficult to come by. In the absence of an 	explicit reference to privacy in the Indian Constitution, the Supreme Court has brought the right to privacy within the penumbra of Article 21 through 	various case laws.&lt;a name="_ftnref105"&gt;&lt;/a&gt; In 2010, the Government in its approach paper on privacy claimed that India is 	not a particularly private nation.&lt;a name="_ftnref106"&gt;&lt;/a&gt; In order to comprehensively understand India's modern legal 	framework, it is imperative to analyze the concepts of traditional law as they existed hitherto the colonial era. Although the term "privacy" is a modern 	construct, this paper has sought to demonstrate that the notion of privacy was well recognized and protected in traditional Islamic law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the discussion above, it is evident that the concept of privacy in &lt;i&gt;Shariah&lt;/i&gt; law rests convincingly within the taxonomy adopted in this paper. 	The &lt;i&gt;Quran&lt;/i&gt; and &lt;i&gt;Hadith&lt;/i&gt; accommodate concerns surrounding private property, personal autonomy, protection of private communications, domestic 	life, modesty and the modern idea of surveillance. In addition to this, Islamic jurisprudence ascribes to the idea of a public and private sphere. The 	public sphere is occupied by society and governmental action, being liable to scrutiny and observation. On the other hand, the private sphere is occupied 	by the individual and the divine alone, free from any interference except in accordance with &lt;i&gt;Shariah&lt;/i&gt; law. Inspite of the term "privacy" not 	finding explicit mention in the &lt;i&gt;Quran&lt;/i&gt; or &lt;i&gt;Hadith&lt;/i&gt;, a closer analysis of &lt;i&gt;Shariah&lt;/i&gt; reveals privacy as a pervasive theme in Islamic 	jurisprudence.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; Daniel Solove, &lt;i&gt;A Taxonomy of Privacy, &lt;/i&gt;Vol. 154, No.3&lt;i&gt; &lt;/i&gt;University of Pennsylvania Law Journal, 477 (2006).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; Samuel D. Warren &amp;amp; Louis D. Brandeis, &lt;i&gt;The Right to Privacy&lt;/i&gt;, 4 Harvard Law Review 193, 193 (1890).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; Richard A. Posner, &lt;i&gt;Privacy, Surveillance and the Law, Vol. 75 No. 1&lt;/i&gt;&lt;i&gt; &lt;/i&gt;The University of Chicago Law Review&lt;i&gt; &lt;/i&gt;245, 245			&lt;i&gt; &lt;/i&gt;(2008).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; Blanca Rodríguez Ruiz, Privacy in Telecommunications: A European and an American Approach 39 (1st ed. 1997).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; James Q. Whitman, &lt;i&gt;The Two Western Cultures of Privacy : Dignity versus Liberty, &lt;/i&gt;113 Yale Law Journal 1152, 1153 (2004).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; Whitman, &lt;i&gt;supra &lt;/i&gt;note 5, at 1153.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; Solove, &lt;i&gt;supra &lt;/i&gt;note 1, at 479.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Referencing Lillian r. BeVier,			&lt;i&gt;Information About Individuals in the Hands of Government: Some Reflections on Mechanisms for Privacy Protection&lt;/i&gt;, 4 WM. &amp;amp; MARY BILL 			RTS. J. 455, 458 (1995) .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Referencing KIM LANE SCHEPPELE, LEGAL SECRETS 184-85 (1988).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Referencing 1 J. THOMAS MCCARTHY, THE RIGHTS OF PUBLICITY AND PRIVACY § 5.59 (2d ed. 2005).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; Solove, &lt;i&gt;supra &lt;/i&gt;note 1, at 560.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; Samuel D. Warren &amp;amp; Louis D. Brandeis, &lt;i&gt;supra &lt;/i&gt;note 2, at 193.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; William L Prosser, &lt;i&gt;Privacy, &lt;/i&gt;48 California Law Review 383,389 (1960).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; Solove, &lt;i&gt;supra &lt;/i&gt;note 1, at 488.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Data Security Council of India, Policy Paper: Privacy in India. Available at 			https://www.dsci.in/sites/default/files/Policy%20Paper%20-%20Privacy%20in%20India.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt; Department of Personnel and Training, (DoPT) Approach Paper for a Legislation on Privacy. Report available at 			http://ccis.nic.in/WriteReadData/CircularPortal/D2/D02rti/aproach_paper.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;&lt;/a&gt; Justice Ajit.P.Shah Committee, Report of the Group of Experts on Privacy, 60. Available at - 			http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;&lt;/a&gt; Bhairav Acharya, at http://freespeechhub.thehoot.org/freetracker/storynew.php?storyid=565&amp;amp;sectionId=10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;&lt;/a&gt; DoPT, Approach Paper. &lt;i&gt;supra&lt;/i&gt; note 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20"&gt;&lt;/a&gt; Whitman, &lt;i&gt;supra&lt;/i&gt; note 5, at 1154.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;&lt;/a&gt; Chandran Kukathas, &lt;i&gt;Cultural Privacy&lt;/i&gt;, Vol. 91, No. 1 The Monist 68, 69 (2008).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;&lt;/a&gt; Marc Galanter, &lt;i&gt;Displacement of Traditional Law in Modern India, &lt;/i&gt;Vol XXIV, No. 4 Journal of Social Issues 65, 67 (1968).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;&lt;/a&gt; Stuart Corbridge &amp;amp; John Harriss, Reinventing India: Liberalization, Hindu Nationalism and Popular Democracy 238 (Reprint, 2006).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;&lt;/a&gt; Galanter, &lt;i&gt;supra&lt;/i&gt; note 22, at 66.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 67.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;&lt;/a&gt; Edward Said, &lt;i&gt;Representing the Colonized: Anthropology's Interlocutors&lt;/i&gt;, Vol. 15 No.2 Critical Inquiry 205, 207 (1989).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a name="_ftn27"&gt;&lt;/a&gt; Mohammad Hashim Kamali, Shari'ah Law, An Introduction 19 (2009)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a name="_ftn28"&gt;&lt;/a&gt; M Mustafa Al Azami, Studies in Hadith Methodology and Literature 7 (2002).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a name="_ftn29"&gt;&lt;/a&gt; &lt;i&gt;Id. &lt;/i&gt; at 3.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a name="_ftn30"&gt;&lt;/a&gt; NJ Coulson, A History of Islamic Law 22 (1964)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a name="_ftn31"&gt;&lt;/a&gt; Kamali, &lt;i&gt;s&lt;/i&gt;&lt;i&gt;upra &lt;/i&gt;note 27, at 19.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a name="_ftn32"&gt;&lt;/a&gt; &lt;i&gt;Sunan Ibn Majah&lt;/i&gt; , Book of Tribulations (Kitab al-Fitan) , #3950, available at http://sunnah.com/ibnmajah/36.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a name="_ftn33"&gt;&lt;/a&gt; Mohsen Kadivar, &lt;i&gt;An Introduction to the Private and Public Debate in Islam, &lt;/i&gt;Vol.70 , No. 3 Social Research 659, 663 (2003).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a name="_ftn34"&gt;&lt;/a&gt; Lara Aryani, &lt;i&gt;Privacy Rights in Shariah and Shariah-based States, &lt;/i&gt;Vol. 3, Iss.2, Journal of Islamic State Practices in International Law, 3 			(2007)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a name="_ftn35"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a name="_ftn36"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 665.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a name="_ftn37"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; at 667. Referencing Koleini, Mohammad. Al-Kaafi. Qom, Vol. 2: 353 1388.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a name="_ftn38"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 671.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a name="_ftn39"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a name="_ftn40"&gt;&lt;/a&gt; &lt;i&gt;Social Contract Theory of John Locke(1932-1704) in the Contemporary World&lt;/i&gt; , SelectedWorks of Daudi Mwita, Nyamaka (2011) Available at http://works.bepress.com/cgi/viewcontent.cgi?article=1009&amp;amp;context=dmnyamaka.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a name="_ftn41"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a name="_ftn42"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 673.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a name="_ftn43"&gt;&lt;/a&gt; Abul a'la Mawdudi, Human Rights in Islam 24 (1995). Also available online, at 			http://books.google.co.in/books?id=RUJWdCOmmxoC&amp;amp;printsec=frontcover#v=onepage&amp;amp;q&amp;amp;f=false.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a name="_ftn44"&gt;&lt;/a&gt; Aryani, &lt;i&gt;supra &lt;/i&gt;note 34, at 13.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a name="_ftn45"&gt;&lt;/a&gt; This indicates Sura 24 : verse 58.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a name="_ftn46"&gt;&lt;/a&gt; Holy Quran, 24:58 - O you who have believed, let those whom your right hands possess and those who have not [yet] reached puberty among you ask 			permission of you [before entering] at three times: before the dawn prayer and when you put aside your clothing [for rest] at noon and after the 			night prayer. [These are] three times of privacy for you. There is no blame upon you nor upon them beyond these [periods], for they continually 			circulate among you - some of you, among others. Thus does Allah make clear to you the verses; and Allah is Knowing and Wise. (Translation from 			Sahih International available at http://quran.com/24/58)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a name="_ftn47"&gt;&lt;/a&gt; Reza Sadiq, &lt;i&gt;Islam's Fourth Amendment : Search and Seizure in Islamic Doctrine and Muslim Practice, &lt;/i&gt;Vol. 40 Georgetown Journal of 			International Law 703, 730 (2008 - 2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a name="_ftn48"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 733. Referencing IBRAHIM ABDULLA&lt;b&gt; &lt;/b&gt;AL-MARZOUQI, Human Rights in Islamic Law 392 (2000).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a name="_ftn49"&gt;&lt;/a&gt; Rohen Peterson, &lt;i&gt;The Emperor's New Scanner :Muslim Women at the Intersection of the First Amendment and Full Body Scanners, &lt;/i&gt;22 Hastings 			Women's Law Journal 339, 343 (2011).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a name="_ftn50"&gt;&lt;/a&gt; Holy Quran, 24:30 - Tell the believing men to reduce [some] of their vision and guard their private parts. That is purer for them. Indeed, Allah is 			Acquainted with what they do. (Translation from Sahih International available at http://quran.com/24/30-31).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a name="_ftn51"&gt;&lt;/a&gt; Holy Quran, 24:31- And tell the believing women to reduce [some] of their vision and guard their private parts and not expose their adornment 			except that which [necessarily] appears thereof and to wrap [a portion of] their headcovers over their chests and not expose their adornment except 			to their husbands, their fathers, their husbands' fathers, their sons, their husbands' sons, their brothers, their brothers' sons, their sisters' 			sons, their women, that which their right hands possess, or those male attendants having no physical desire, or children who are not yet aware of 			the private aspects of women. And let them not stamp their feet to make known what they conceal of their adornment. And turn to Allah in 			repentance, all of you, O believers, that you might succeed. (Translation from Sahih Internation, available at http://quran.com/24/30-31).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a name="_ftn52"&gt;&lt;/a&gt; David Garner&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Muslims warned not to go through airport body scanners because they violate Islamic rules on nudity&lt;/i&gt;, The daily 			mail, (Feb 12, 2010). 			&lt;a href="http://www.dailymail.co.uk/news/article-1250616/Muslims-warned-airport-body-scanners-violate-Islamic-rules-nudity.html#ixzz3KF8hS6q3"&gt; http://www.dailymail.co.uk/news/article-1250616/Muslims-warned-airport-body-scanners-violate-Islamic-rules-nudity.html#ixzz3KF8hS6q3 &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a name="_ftn53"&gt;&lt;/a&gt; Holy Quran, 33:59 - O Prophet, tell your wives and your daughters and the women of the believers to bring down over themselves [part] of their 			outer garments. That is more suitable that they will be known and not be abused. And ever is Allah Forgiving and Merciful. (Translation from Sahih 			International, available at http://quran.com/33/59.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a name="_ftn54"&gt;&lt;/a&gt; Eli Alshech,			&lt;i&gt;"Do Not Enter Houses Other than Your Own": The Evolution of the Notion of a Private Domestic Sphere in Early Sunnī Islamic Thought&lt;/i&gt; Vol. 11, No. 3, Islamic Law and Society 291, 304 (2004).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a name="_ftn55"&gt;&lt;/a&gt; Holy Quran, 49:12 - O you who have believed, avoid much [negative] assumption. Indeed, some assumption is sin. And do not spy or backbite each 			other. Would one of you like to eat the flesh of his brother when dead? You would detest it. And fear Allah ; indeed, Allah is Accepting of 			repentance and Merciful. ( Translation from Sahih International, available at http://quran.com/49/12)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a name="_ftn56"&gt;&lt;/a&gt; Holy Quran, 24:19 - Indeed, those who like that immorality should be spread [or publicized] among those who have believed will have a painful 			punishment in this world and the Hereafter. And Allah knows and you do not know. ( Translation from Sahih International, available at 			http://quran.com/24/19)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a name="_ftn57"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 666.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a name="_ftn58"&gt;&lt;/a&gt; Ahmad Atif Ahmad, Islam Modernity violence and everyday life 176 (1&lt;sup&gt;st&lt;/sup&gt; ed. 2009)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a name="_ftn59"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 667.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a name="_ftn60"&gt;&lt;/a&gt; &lt;i&gt; &lt;/i&gt; &lt;i&gt;Ibid&lt;/i&gt; , at 178.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a name="_ftn61"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a name="_ftn62"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra &lt;/i&gt;note 54, at 291.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a name="_ftn63"&gt;&lt;/a&gt; Holy Quran, 24:27-8 - O you who have believed, do not enter houses other than your own houses until you ascertain welcome and greet their 			inhabitants. That is best for you; perhaps you will be reminded. And if you do not find anyone therein, do not enter them until permission has been 			given you. And if it is said to you, "Go back," then go back; it is purer for you. And Allah is Knowing of what you do. ( Translation from Sahih 			International, available at http://quran.com/24)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a name="_ftn64"&gt;&lt;/a&gt; Holy Quran, 2:189 - They ask you, [O Muhammad], about the new moons. Say, "They are measurements of time for the people and for Hajj." And it is 			not righteousness to enter houses from the back, but righteousness is [in] one who fears Allah. And enter houses from their doors. And fear Allah 			that you may succeed. (Translation from Sahih International, available at http://quran.com/2)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a name="_ftn65"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra &lt;/i&gt;note 54, at 308.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a name="_ftn66"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 306. Referencing Ibn Abi Hatim, 8&lt;b&gt; &lt;/b&gt;TAF5IRAL-QUR'ANAL-'ADHIM &lt;i&gt;2566 &lt;/i&gt;(Makiabat Nlilr Mustaffi 1999).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a name="_ftn67"&gt;&lt;/a&gt; Ahmad, &lt;i&gt;supra &lt;/i&gt;note 58, at 177.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a name="_ftn68"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra note &lt;/i&gt;54&lt;i&gt;, at 324.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a name="_ftn69"&gt;&lt;/a&gt; Aryani, supra note 34, at 4. Also see Ahmad, &lt;i&gt;supra &lt;/i&gt;note 24, at 178.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a name="_ftn70"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra note &lt;/i&gt;54&lt;i&gt;, &lt;/i&gt;at 310.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a name="_ftn71"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra&lt;/i&gt; note 33, at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a name="_ftn72"&gt;&lt;/a&gt; Moeen Cheema, &lt;i&gt;Beyond Beliefs: Deconstructing the Dominant Narratives of the Islamization of Pakistan's Law, &lt;/i&gt;60 American Journal of 			Comparative Law 875 (2012).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a name="_ftn73"&gt;&lt;/a&gt; The Constitution of the Islamic Republic of Pakistan, 1973. Available at http://www.na.gov.pk/publications/constitution.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a name="_ftn74"&gt;&lt;/a&gt; Cheema, &lt;i&gt;supra &lt;/i&gt;note 72, at 879.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a name="_ftn75"&gt;&lt;/a&gt; The Constitution of the Islamic Republic of Pakistan, 1973, &lt;i&gt;supra &lt;/i&gt;note 73&lt;i&gt;.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a name="_ftn76"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a name="_ftn77"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Article 8 - "(1) Any law, or any custom or usage having the force of law, in so far as it is inconsistent with the rights conferred by this 			Chapter, shall, to the extent of such inconsistency, be void. (2) The State shall not make any law which takes away or abridges the right so 			conferred and any law made in contravention of this clause shall, to the extent of such contravention, be void&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a name="_ftn78"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Article 4(2)(a) - "no action detrimental to the life, liberty, body, reputation or property of any person shall be taken except in accordance with 			law."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a name="_ftn79"&gt;&lt;/a&gt; Section 509, Pakistan Penal Code (Act XLV of 1860), Available at http://www.oecd.org/site/adboecdanti-corruptioninitiative/46816797.pdf.&lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a name="_ftn80"&gt;&lt;/a&gt; Section 32, Pakistan Telecommunication (Re-Organisation) Act, 1996. Available at http://www.pta.gov.pk/media/pta_act_140508.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a name="_ftn81"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Section 54.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a name="_ftn82"&gt;&lt;/a&gt; Section 25-D, Pakistan Telegraph Act, 1885. Available at http://www.fia.gov.pk/law/Offences/26.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p&gt;&lt;a name="_ftn83"&gt;&lt;/a&gt; Section 12, Pakistan Medical and Dental Council Code of Ethics. Available at 			http://www.pmdc.org.pk/LinkClick.aspx?fileticket=v5WmQYMvhz4%3D&amp;amp;tabid=292&amp;amp;mid=845.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a name="_ftn84"&gt;&lt;/a&gt; http://www.sbp.org.pk/publications/prudential/ordinance_62.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p&gt;&lt;a name="_ftn85"&gt;&lt;/a&gt; Section 8, Freedom of Information Ordinance, 2002. Available at 			http://infopak.gov.pk/Downloads/Ordenances/Freedom_of_%20Information_Ordinance2002.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a name="_ftn86"&gt;&lt;/a&gt; Pakistan IT Policy and Action Plan, available at http://www.unapcict.org/ecohub/resources/pakistan-information-technology-policy.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a name="_ftn87"&gt;&lt;/a&gt; Electronic Transactions Ordinance, available at http://www.pakistanlaw.com/eto.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a name="_ftn88"&gt;&lt;/a&gt; For a more detailed account, see			&lt;a href="http://www.supremecourt.gov.pk/ijc/articles/10/1.pdf"&gt;http://www.supremecourt.gov.pk/ijc/articles/10/1.pdf&lt;/a&gt;. Second draft available at 			http://media.mofo.com/docs/mofoprivacy/PAKISTAN%20Draft%20Law%202nd%20Revision%20.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a name="_ftn89"&gt;&lt;/a&gt; Sections 441 - 462, Pakistan Penal Code (XLV of 1860) Chapter XVII, "Offences against Property".&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a name="_ftn90"&gt;&lt;/a&gt; Section 5, Anti Terrorism Act, 1997. Available at http://www.fia.gov.pk/law/ata1997.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a name="_ftn91"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Section 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a name="_ftn92"&gt;&lt;/a&gt; Lara Aryani, &lt;i&gt;supra&lt;/i&gt; note 34, at 21.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a name="_ftn93"&gt;&lt;/a&gt; Julhas Alam, &lt;i&gt;Bangladesh moves to retain Islam as state religion, &lt;/i&gt;Cns News, 			http://cnsnews.com/news/article/bangladesh-moves-retain-islam-state-religion.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a name="_ftn94"&gt;&lt;/a&gt; Article 43, Constitution of Bangladesh. Available at http://www1.umn.edu/humanrts/research/bangladesh-constitution.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn95"&gt;
&lt;p&gt;&lt;a name="_ftn95"&gt;&lt;/a&gt; Section 509, Bangladesh Penal Code,1860. Available at http://bdlaws.minlaw.gov.bd/print_sections_all.php?id=11.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn96"&gt;
&lt;p&gt;&lt;a name="_ftn96"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Sections 351- 358.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn97"&gt;
&lt;p&gt;&lt;a name="_ftn97"&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; . Section 100.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn98"&gt;
&lt;p&gt;&lt;a name="_ftn98"&gt;&lt;/a&gt; Section 5, Bangladesh Telegraph Act, 1885. Available at http://bdlaws.minlaw.gov.bd/print_sections_all.php?id=55.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn99"&gt;
&lt;p&gt;&lt;a name="_ftn99"&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; . Section 24.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn100"&gt;
&lt;p&gt;&lt;a name="_ftn100"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Section 25.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn101"&gt;
&lt;p&gt;&lt;a name="_ftn101"&gt;&lt;/a&gt; &lt;i&gt; &lt;/i&gt; Bangladesh Penal Code, 1860. &lt;i&gt;supra &lt;/i&gt;note 95&lt;i&gt;. &lt;/i&gt;Section 441.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn102"&gt;
&lt;p&gt;&lt;a name="_ftn102"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Section 442.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn103"&gt;
&lt;p&gt;&lt;a name="_ftn103"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Section 443.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn104"&gt;
&lt;p&gt;&lt;a name="_ftn104"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Section 445.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn105"&gt;
&lt;p&gt;&lt;a name="_ftn105"&gt;&lt;/a&gt; See, Kharak Singh v. State of Uttar Pradesh, AIR 1963 SC 1295 : (1964) 1 SCR 332; Govind v. State of Madhya Pradesh, AIR 1975 SC 1378; Rajagopal v. 			State of Tamil Nadu, AIR 1995 SC 264; People's Union for Civil Liberties (PUCL) v. Union of India, AIR 1997 SC 568; X v. Hospital Z, AIR 1999 SC 			495.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn106"&gt;
&lt;p&gt;&lt;a name="_ftn106"&gt;&lt;/a&gt; DoPT, Approach Paper. &lt;i&gt;supra&lt;/i&gt; note 16.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law'&gt;https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vidushi Marda and Bhairav Acharya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-01-01T14:04:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-december-10-2014-athira-a-nair-frndineed-an-app-for-passenger-safety">
    <title>FrndiNeed; an app for passengers' safety</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-december-10-2014-athira-a-nair-frndineed-an-app-for-passenger-safety</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Athira A. Nair was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2014-12-10/news/56917144_1_new-app-police-control-room-uber"&gt;published in the Economic Times&lt;/a&gt; on December 10, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Even as the nation recovers from the shock of an &lt;a href="http://economictimes.indiatimes.com/topic/Uber"&gt;Uber&lt;/a&gt; passenger being raped by her cabbie, there is a new app that has  repackaged itself to "get back the lost trust and security for the daily  commuter". &lt;a href="http://economictimes.indiatimes.com/topic/FrndiNeed"&gt;FrndiNeed&lt;/a&gt;,  a socially-enabled app, which utilizes the user's geo-location,  connects the user with friends in the vicinity and requests them for a  lift. The app, a variant of those that poke friends for instant  meet-ups, has an SOS tab for emergency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kunal Kishore, the Delhi-based co-founder of FrndiNeed, said the app  was originally meant to catch up with friends who were within a 2-5 km  radius."However, when we developed the app in August, we thought of such  (women's security) situations also," he told ET.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Newer app developers are looking at preventing a crisis and creating safer situations for &lt;a href="http://economictimes.indiatimes.com/topic/women"&gt;women&lt;/a&gt; rather than just providing panic buttons. Delhi-based group &lt;a href="http://economictimes.indiatimes.com/topic/Socialcops"&gt;Socialcops&lt;/a&gt; collects data from civilians and authorities to find the safest and  fastest routes for users. This app tells the police about the routes  which need attention. Prukalpa Shankar, co-founder, said: "We are  launching the SocialCops application in Kar nataka through the new  Mobile One governance platform."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jasmeen Patheja, founder of the  Blank Noise Project, said apps should be part of a larger system  connecting the woman with the neighbourhood, the police and family, and  not something that creates panic. "The Circleof6 app created primarily  in the US scenario where daterapes are rampant, puts the user in touch  with six friends the minute she begins to feel uncomfortable on a date,"  she said.Jasmeen has not come across a case in which an app has helped a  woman in an emergency .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The police is tweaking its app to  connect women in trouble to the police. Their six-month-old `DCP SahAya'  app will incorporate a facility which will alert the police control  room or the local police station, revealed Rohini Katoch Sepat, DCP &lt;a href="http://economictimes.indiatimes.com/topic/Bengaluru"&gt;Bengaluru&lt;/a&gt; South-East.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://economictimes.indiatimes.com/topic/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;, the executive director of the &lt;a href="http://economictimes.indiatimes.com/topic/Centre%20for%20Internet"&gt;Centre for Internet&lt;/a&gt; and Society, believes that while certain mobile apps could provide a  degree of safety, it would be naive to think that technology will be the  solution."How many people do you trust to help you at any time of  night? For women, whose emergency contacts are their parents, it would  be difficult to alert them on a date night. Also, in the most  pessimistic scenario, the mobile signal could be dead, and you may not  be able to give an alert at all."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jessie Paul, CEO of Paul Writer  Strategic Advisory, felt that although IT is an enabler and apps are a  step in the right direction, they were not preventive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"To some  extent, I believe these are superficial. We should have a centralized  database for crime which will make it difficult for criminals to escape  and rehabilitate in other parts of the country ," he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-december-10-2014-athira-a-nair-frndineed-an-app-for-passenger-safety'&gt;https://cis-india.org/internet-governance/news/economic-times-december-10-2014-athira-a-nair-frndineed-an-app-for-passenger-safety&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-27T17:05:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ibn-live-december-8-2014-are-cab-apps-safe">
    <title>Are Cab Apps safe?</title>
    <link>https://cis-india.org/internet-governance/news/ibn-live-december-8-2014-are-cab-apps-safe</link>
    <description>
        &lt;b&gt;Cab services are increasingly relying on mobile apps to book, track and charge you for journeys. While tech watchers say there is a digital trail.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Originally &lt;a class="external-link" href="http://ibnlive.in.com/news/are-cab-apps-safe/517145-62-129.html"&gt;published by IBNLive&lt;/a&gt; on December 8, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"You can always share your location, the app has a feature for you to  share your location through the way to whoever is waiting at the other  end," said Aprameya Radhakrishna, CEO Taxi For Sure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There's also a major safety loopholes. "We have more complicated  technological safegaurd. All the cab driver has to do is use a very  primitive technique. He just has to pull off his battery and can ensure  that he throws away the phone of the traveller, and no one would know,"  said Sunil Abraham, Head, Centre For Internet And Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So can you trust technology to safeguard you? Rest assured that someone  will be monitoring your journey back in some control room?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;People feel that there should be some kind of an automatically generated alert system. Had the tracker been switched off, that could have been a point of loophole.&lt;br /&gt;&lt;br /&gt;Great degree of automation is possible here but finally it is the human oversight which is critical eventually, in any technology.&lt;br /&gt;&lt;br /&gt;Technology, ultimately, doesn't have all the answers, can't provide all solutions against crime prevention. We have seen instances when criminals have attacked women in ATMs knowing full well they are caught on camera, we have seen attacks by unruly drivers at road toll booths, regardless of the surveillance cameras.&lt;br /&gt;&lt;br /&gt;While technology helps in tracking digital footprints that a criminal has taken, it hasn't deterred the criminal from doing what he wants to. For that, we have to be on guard.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ibn-live-december-8-2014-are-cab-apps-safe'&gt;https://cis-india.org/internet-governance/news/ibn-live-december-8-2014-are-cab-apps-safe&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-27T17:01:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-december-5-2014-moulishree-srivastava-india-sees-biggest-improvement-in-internet-freedom">
    <title>India sees biggest improvement in Internet freedom, says report</title>
    <link>https://cis-india.org/internet-governance/news/livemint-december-5-2014-moulishree-srivastava-india-sees-biggest-improvement-in-internet-freedom</link>
    <description>
        &lt;b&gt;Big stride ascribed to removal of restrictions imposed in 2013; globally, Internet freedom sees decline.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Moulishree Srivastava was &lt;a class="external-link" href="http://www.livemint.com/Industry/rOJyH002TuD8zfjy78YkdJ/India-sees-biggest-improvement-in-Internet-freedom-says-rep.html"&gt;published in Livemint&lt;/a&gt; on December 5, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;India fared better this year when it came to freedom of the Net, while globally Internet freedom declined for the fourth consecutive year in 2014 with a growing number of countries introducing more aggressive online censorship and monitoring practices, said a report by Freedom House, an independent watchdog.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The global Freedom on the Net report 2014, which covered the period between 1 May 2013 and 31 May 2014 and was released on Thursday, said India scored 42 points this year, an improvement of five points over the previous reporting period.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s the largest increase in Internet freedom over the past year and was ascribed to the removal of temporary restrictions on access and content that had been imposed in 2013 to stem an exodus of people from north-eastern states from wherever else they were in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the 65 countries assessed, 36 saw a decline in Internet freedom. The most significant declines were in Russia, Turkey and Ukraine. Iran, Syria and China are the world’s worst abusers of Internet freedom, said Freedom House.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A low score indicates higher Internet freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US remained relatively free compared with the rest of the world with a total score of 19, the report said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Any report on Internet freedom that ranks US as free cannot be taken seriously,” said Sunil Abraham, executive director of the Bengaluru-based research organization Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is massive intellectual property rights (IPR)-related censorship in the US, which Freedom House does not consider censorship, and the total surveillance regime of the National Security Agency that resulted in self-censorship was also ignored by Freedom House, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, curbs on content and arrests related to online publishing under Section 66A of the information technology (IT) Act declined in the past year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have been nine criminal complaints filed against social media posts in the period, but the Supreme Court did its bit by curtailing arrests for online expression under the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Independently, the Supreme Court is assessing the constitutionality of provisions in the IT Act and secondary legislation that restrict content and criminalize speech online. Section 66A of the IT Act criminalizes a wide range of speech and led to several arrests for social media posts in 2012 and early 2013. On 2 December, the Supreme Court asked the government to clarify its stand on the constitutionality of these provisions by 9 December.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several petitioners have also challenged parts of the IT Act, including rules introducing potential criminal liability for intermediary companies for content posted by third parties, as unconstitutional in the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Legislation and procedures to effectively protect privacy, meanwhile, remain lacking, and the scope of a privacy law currently being drafted is unclear,” said the Freedom House report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India was expected to get a privacy law before the launch of the Unique ID, or Aadhar, programme, but this has not happened.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Allegations of procedural abuses by state officials in surveillance cases have emerged in the states of Himachal Pradesh and Gujarat, in the latter while the present Prime Minister was chief minister,” the report said. “Partly in response to these scandals, the government tightened procedures in January 2014, saying officials must issue interception orders to telecommunications providers in written form, though they still require no warrant or judicial oversight.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, the government can retrieve data from intermediaries such as Internet service providers, which are required to install infrastructure for surveillance and keyword scanning of all traffic passing through each gateway.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What can curb Net freedom substantially in India, according to the report, is the Indian government’s ambitious nationwide surveillance programme, the Central Monitoring System, which allows authorities to monitor individuals’ digital communications directly without issuing orders to service providers, written or otherwise—that is, “without judicial oversight”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move allows government agencies to intercept any online activities, phone calls, text messages and even social media conversations in real time by directly accessing interception equipment on intermediary premises.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government also requested user information from international Web-based platforms including Google Inc., which received 2,794 data requests from Indian government agencies from January to June 2014. Facebook Inc. got 3,598 such requests and Twitter Inc. 19.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Apoorva contributed to this story.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-december-5-2014-moulishree-srivastava-india-sees-biggest-improvement-in-internet-freedom'&gt;https://cis-india.org/internet-governance/news/livemint-december-5-2014-moulishree-srivastava-india-sees-biggest-improvement-in-internet-freedom&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2014-12-07T11:08:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation">
    <title>Cyber bullying is a crime, but open to interpretation: Expert</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation</link>
    <description>
        &lt;b&gt;The social media attack on a Doordarshan anchor who made a series of gaffes at the recent Goa film festival would qualify as cyber bullying, experts say, but hasten to add there is not much that can be done to prevent such behaviour online, given the humungous size of the virtual universe.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Neha Alawadhi was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2014-12-02/news/56649315_1_information-online-cyber-bullying-offline"&gt;published in the Times of India&lt;/a&gt; on December 2, 2014. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The anchor reportedly shut down all her online accounts following  the slew of unflattering and personal comments that she was bombarded  with after the video of the event went viral and was shared across &lt;a href="http://economictimes.indiatimes.com/topic/Facebook"&gt;Facebook&lt;/a&gt;, &lt;a href="http://economictimes.indiatimes.com/topic/Twitter"&gt;Twitter&lt;/a&gt; and &lt;a href="http://economictimes.indiatimes.com/topic/YouTube"&gt;YouTube&lt;/a&gt;, among other such platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Section 66 (A) of the IT Act, 2000, &lt;a href="http://economictimes.indiatimes.com/topic/cyber%20bullying"&gt;cyber bullying&lt;/a&gt; is a bailable offence, punishable with three years of imprisonment and  fine. However, the complainant and police can interpret what constitutes  offensive behaviour, said cyber law expert Pavan Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Just  as we don't regulate jeering and taunting of adults when it happens in  person, as opposed to a threat of violence, unless there is a special  case made out for the harm of online taunting, I don't think there is a  case for a legislative response," said Pranesh Prakash, policy director  at Bengaluru-based Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a recent report by &lt;a href="http://economictimes.indiatimes.com/topic/McAfee"&gt;McAfee&lt;/a&gt;, part of &lt;a href="http://economictimes.indiatimes.com/topic/Intel"&gt;Intel&lt;/a&gt; Security, half of Indian youths have had some experience with cyber  bullying and of these over a third (36%) have been bullied themselves  online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IT and cybersecurity expert Rakshit Tandon recalled the  trauma a young professor at one of the top colleges underwent when an  old picture of her, from one of her social media accounts, went viral  and became the butt of unflattering comments by students. "Once it goes  viral, you can't track who is sharing or sending it," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We don't have one personality anymore," said Adhvith Dhuddu, founder  and CEO of digital marketing agency Alive-Now, which handles social and  digital for brands online. "We have an offline personality and we have  an online personality, and this is true for anyone —whether you are a  brand, person, book or a movie," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several schools, NGOs  and individuals are working towards educating children and young people  about the dangers of sharing information online, but often find  themselves at a loss when confronted with real situations every day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The approach AliveNow's Dhuddu takes is to "engage first and ban  later". He said, "We try to reason with people. We always take any  grievance offline, we don't try to solve a grievance online."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For  individuals, however, the offline route may be impractical or  infeasible. Tandon believes the only way is to "sensitise people", while  CIS's Prakash says a person can "block abusive users, set one's account  in private mode and just get off such social networks for a while till  the situation cools off".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation'&gt;https://cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-07T10:54:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/digital-security-training">
    <title>Digital Security Training</title>
    <link>https://cis-india.org/internet-governance/news/digital-security-training</link>
    <description>
        &lt;b&gt;Rohini Lakshane participated as a trainer in a digital security training conducted by Front Line Defenders for the Afghan Women's Network in New Delhi in November 2014.&lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Rohinitraininggroupondigitalsecurity.JPG" alt="Rohini training" class="image-inline" title="Rohini training" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/digital-security-training'&gt;https://cis-india.org/internet-governance/news/digital-security-training&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-27T15:16:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/november-2014-bulletin">
    <title>November 2014 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/november-2014-bulletin</link>
    <description>
        &lt;b&gt;We at the Centre for Internet &amp; Society (CIS) welcome you to the eleventh issue of the newsletter (November 2014). &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/about/newsletters"&gt;&lt;/a&gt; &lt;/small&gt; &lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;small&gt; Highlights &lt;/small&gt;&lt;small&gt;&lt;/small&gt;&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;small&gt;On 13 November, 2014, the Department of Industrial Policy and Promotion had released a Call for Suggestions for India's proposed National IPR 			Policy. &lt;a href="https://cis-india.org/a2k/blogs/comments-on-proposed-ip-rights-policy-to-dipp"&gt;CIS sent its comments&lt;/a&gt;.&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;As part of the Pervasive Technologies we published four methodology documents: Rohini Lakshané wrote on 			&lt;a href="https://cis-india.org/a2k/blogs/patent-landscaping-in-the-indian-mobile-device-market"&gt; Patent Landscaping for the Indian Mobile Device market &lt;/a&gt; ; Anubha Sinha wrote on 			&lt;a href="https://cis-india.org/a2k/blogs/methodology-intellectual-property-in-mobile-application-development-in-india"&gt; Intellectual Property in Mobile Application Development in India &lt;/a&gt; ; Maggie Huang wrote on			&lt;a href="https://cis-india.org/a2k/blogs/methodology-access-to-music-through-mobile"&gt;Access to Music through the Mobile&lt;/a&gt;; and Nehaa 			Chaudhari wrote on 			&lt;a href="https://cis-india.org/a2k/blogs/methodology-sub-hundred-dollar-mobile-devices-and-competition-law"&gt; Sub Hundred Dollar Mobile Devices and Competition Law &lt;/a&gt; .&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;Odisha's			&lt;a href="https://cis-india.org/openness/blog/nineteen-books-by-ama-odisha-relicensed"&gt;most circulated newspaper Sambad has collaborated&lt;/a&gt; with CIS-A2K to relicense 19 books published by its sister concern "Ama Odisha".&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;Vipul Kharbanda in a blog entry 			&lt;a href="https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2"&gt; examines the relationship between privacy and transparency in the context of the right to information in India &lt;/a&gt; .&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;Geetha Hariharan in a 			&lt;a href="https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance"&gt; blog entry &lt;/a&gt; explores what India's ITU proposal means for Internet Governance.&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;Pranesh Prakash wrote an 			&lt;a href="https://cis-india.org/internet-governance/blog/economic-times-november-18-2014-pranesh-prakash-the-socratic-debate-whos-internet-is-it-anyway"&gt; article in the Economic Times &lt;/a&gt; exploring net neutrality.&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;In her			&lt;a href="https://cis-india.org/raw/mapping-digital-humanities-in-india-concluding-thoughts"&gt;final blog post on the mapping exercise&lt;/a&gt; undertaken by CIS-RAW, P.P.Sneha summarises some of the key concepts and terms that emerged as significant in the discourse around Digital 			Humanities in India. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Job &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/jobs/programme-officer-institutional-partnership"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge - Institutional Partnerships): CIS is seeking applications for the post of Programme Officer for its Access to Knowledge (A2K) 			Programme. The position will be based in its Bangalore office. Programme Officer will collaboratively work with the A2K Team and would report to 			the Programme Director, Access to Knowledge at CIS. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt; &lt;/small&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies 		and programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 		National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The publication has been finalised and is currently in the process of being printed. The draft chapters and the quarterly reports can be accessed on the		&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed		&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►NVDA and eSpeak &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Monthly Update &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/blog/november-e-speak-nvda-2014-report.pdf"&gt;November 2014 Report&lt;/a&gt; (Suman Dogra; November 30, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Upcoming Event &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/events/training-in-e-speak-malayalam"&gt;Training in Use of eSpeak with Malayalam&lt;/a&gt; (co-organized by CIS, DAISY Forum of India and Chakshumathi Assistive Technology Centre; Trivandrum; January 24 - 25, 2015, Trivandrum). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Other &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Blog Entry &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/blog/central-guidelines-and-schemes"&gt;Central Guidelines and Schemes&lt;/a&gt; (Anandhi Viswanathan; November 6, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt; &lt;/small&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 		Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 		intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 		grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 		that recruit and cultivate new editors and explore innovative approaches to building projects. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;small&gt; Submission &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/comments-on-proposed-ip-rights-policy-to-dipp"&gt; Comments on the Proposed Intellectual Property Rights Policy to the Department of Industrial Policy and Promotion &lt;/a&gt; (Pranesh Prakash, Nehaa Chaudhari, Anubha Sinha and Amulya P.; November 30, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Blog Entries &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/mhrd-ipr-chairs-underutilization-of-funds-and-lack-of-information-regarding-expenditures"&gt; MHRD IPR Chairs - Underutilization of Funds and Lack of Information Regarding Expenditures &lt;/a&gt; (Amulya Purushothama, November 19, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;small&gt; Participation in Events &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/a2k/news/center-for-global-communication-studies-november-6-2014-ubiquity-mobility-globality-charting-directions-in-mobile-phone-studies"&gt; Ubiquity, Mobility, Globality: Charting Directions in Mobile Phone Studies &lt;/a&gt; (Organized by Center for Global Communication Studies at the Annenberg School for Communication, University of Pennsylvania, Philadelphia; November 			6 - 7, 2014). Nehaa Chaudhari made a presentation on Pervasive Technologies: Access to Knowledge in the Marketplace. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/news/countering-us-pressure-on-indias-ip-regime"&gt;Countering US pressures on India's IP regime&lt;/a&gt; (Organized by Lawyer's Collective; November 16, 2014). Anubha Sinha attended the event. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/technology-gender-based-violence"&gt;Technology and Gender Based Violence&lt;/a&gt; (Organized by the Bachchao Project; November 24, 2014). Rohini Lakshané was a speaker at the event. She spoke about various strategies that 			women use to respond to online harassment, such as reporting the abuser, and enlisting support from online followers, or friends or family in order 			to deal with the abuser. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Pervasive Technology &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Blog Entries &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/patent-landscaping-in-the-indian-mobile-device-market"&gt;Methodology: Patent Landscaping&lt;/a&gt; (Rohini Lakshané; November 10, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/methodology-intellectual-property-in-mobile-application-development-in-india"&gt; Methodology: Intellectual Property in Mobile Application Development in India &lt;/a&gt; (Anubha Sinha; November 17, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/methodology-access-to-music-through-mobile"&gt;Methodology: Access to Music through the Mobile&lt;/a&gt; (Maggie Huang; November 18, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/methodology-sub-hundred-dollar-mobile-devices-and-competition-law"&gt; Methodology: Sub Hundred Dollar Mobile Devices and Competition Law &lt;/a&gt; (Nehaa Chaudhari; November 25, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Wikipedia &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out 		to more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under 		the Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes 		in Kannada, and 1 book on Odia language history in English). &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt;Op-Ed &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/blog/the-samaja-november-17-2014-subhashish-panigrahi-odia-wikisource-its-potential"&gt; Odia Wikisource, its Potential &lt;/a&gt; (Subhashish Panigrahi, The Samaja, November 17, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;&lt;b&gt;Blog Entries &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/blog/55-works-of-iconic-indian-writer-released-under-free-licence-to-benefit-wikisource"&gt; 55 Works of Iconic Indian writer released under Free Licence to benefit Wikisource &lt;/a&gt; (T. Vishnu Vardhan, November 13, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/blog/odia-author-nirmala-kumari-mohapatra-21-books-under-cc"&gt; Odia author Nirmala Kumari Mohapatra's 21 books relicensed under CC-by-SA 4.0 &lt;/a&gt; (Subhashish Panigrahi, November 17, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/blog/nineteen-books-by-ama-odisha-relicensed"&gt; Nineteen Books Published by Ama Odisha Relicensed under CC-by-SA 4.0 &lt;/a&gt; (Subhashish Panigrahi, November 25, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt;News and Media Coverage &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; CIS-A2K team gave its inputs to the following media coverage: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/just-kannada-november-23-2014-kannada-wikipedia-presentation-coverage"&gt; ಭಾಷಣದಿಂದ ಭಾಷೆ ಉಳಿಯಲ್ಲ, 				ಕನ್ನಡದಲ್ಲೇ ಮಾಹಿತಿ 				ಸಿಗುವುದು ಅಗತ್ಯ: ಪವನಜ &lt;/a&gt; (Just Kannada; November 23, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/prajavani-november-24-2014-kannada-wikipedia-presentation-in-mysuru"&gt; Kannada Wikipedia Presentation in Mysuru &lt;/a&gt; (Prajavani; November 24, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/the-hindu-november-24-2014-govind-d-belgaumkar-now-tulu-set-to-be-promoted-through-wikipedia-articles"&gt; Now, Tulu set to be promoted through Wikipedia articles &lt;/a&gt; (Hindu; November 24, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/the-hindu-november-26-2014-ravi-prasad-kamila-tulu-wikipedia-in-incubation-stage"&gt; 'Tulu Wikipedia' in incubation stage, 600 articles uploaded, says U.B. Pavanaja &lt;/a&gt; (Ravi Prasad Kamila; Hindu; November 26, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/odisha-sun-times-november-28-2014-odia-wikisource-launched-in-odisha-capital"&gt; Odia Wikisource launched in Odisha capital &lt;/a&gt; (Odisha Sun Times; November 28, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/news/orissa-diary-november-28-2014-odia-wikisource-aims-to-bring-valuable-and-rare-books-on-the-internet"&gt; Odia Wikisource aims to bring valuable and rare books on the Internet &lt;/a&gt; (Odisha Diary; November 28, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Event Co-organized &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/events/odia-wikisource-sabha-2014"&gt;Odia Wikisource Sabha 2014&lt;/a&gt; (Co-organized by CIS-A2K and Odia Wikimedia Community; November 28, 2014). Subhashish Panigrahi participated in the event. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Participation in Event &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/seminar-e-publishing-odia-books"&gt;A Seminar on E-publishing of Odia Books&lt;/a&gt; (Organized by Molybtech Technology Solutions; November 30, 2014). Subhashish Panigrahi was a speaker. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►&lt;b&gt;Openness &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;small&gt; Blog Entry &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/blog/privacy-v-transparency"&gt;Privacy vs. Transparency: An Attempt at Resolving the Dichotomy&lt;/a&gt; (Sunil Abraham &lt;i&gt;with feedback and inputs from Sumandro Chattapadhyay, Elonnai Hickok, Bhairav Acharya and Geetha Hariharan&lt;/i&gt;; November 14, 			2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;News and Media Coverage &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy"&gt; Getting Strategic about Openness and Privacy &lt;/a&gt; (Tim Davies; Open Data Research Lead at Web Foundation; November 3, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;small&gt; Participation in Event &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/crypto-currencies"&gt;Content co-ordination for the Panel Discussion on Crypto-Currencies&lt;/a&gt; (organized by the Law and Technology Society; November 15, 2014). Sharath Chandra Ram was a panelist and made a presentation Scalability and 			Security Issues in Distributed Trust based Cryto-Currency Systems like BITCOIN &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;/small&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Privacy &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; As part of our Surveillance and Freedom: Global Understandings and Rights Development (SAFEGUARD) project with Privacy International we are engaged in 		enhancing respect for the right to privacy in developing countries. During the month we published the following blog entries: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt;Blog Entries &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2"&gt;White Paper on RTI and Privacy V1.2&lt;/a&gt; (Vipul Kharbanda; November 9, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables"&gt; Introduction: About the Privacy and Surveillance Roundtables &lt;/a&gt; (Manoj Kurbet; November 27, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Event Organized &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/events/iocose-talk-at-cis"&gt;IOCOSE's talk at CIS&lt;/a&gt; (CIS, Bangalore; November 27, 2014). There was a presentation of the work of the artists group IOCOSE, current artists in residence at T.A.J./SKE 			Residency. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Upcoming Event &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/news/cpdp-2015"&gt;CPDP 2015&lt;/a&gt; : The eighth international conference on computers, privacy and data protection will be held in Brussels from January 21 to 23, 2015. CIS is a 			moral supporter of CPDP. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Participation in Events &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-hague-institute-for-global-justice-november-4-2014-e-consultation-on-cyber-security-justice-and-governance-begins"&gt;&lt;b&gt; &lt;/b&gt;E-Consultation on Cyber Security, Justice, and Governance Begins! &lt;/a&gt; (Organized by the Hague Institute for Global Justice; November 4, 2014). Sunil Abraham facilitated the e-consultation on "Internet access, the 			freedom of expression online, and development in the Global South". &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/learning-forum-transparency-and-human-rights-in-the-digital-age"&gt; Learning Forum: Transparency and Human Rights in the Digital Age &lt;/a&gt; (Organized by Global Network Initiative; November 6, 2014). Pranesh Prakash gave a talk on transparency reports and their use and abuse in India; 			the Intermediary Liability Rules in India (and its non-provision of any transparency mechanism); and the need for transparency in private speech 			regulation, not just governmental speech regulation. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill"&gt; Fourth Discussion Meeting of the Expert Committee to Discuss the Draft Human DNA Profiling Bill &lt;/a&gt; (Organized by the Department of Biotechnology; New Delhi; November 10, 2014). Sunil Abraham was unable to participate because of technical 			problems. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/ground-zero-summit-2014"&gt;Ground Zero Summit 2014&lt;/a&gt; (Organized by India Infosec Consortium; November 13-14, 2014). Geetha Hariharan participated in this event. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt;&lt;small&gt;&lt;a href="https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance"&gt;Privacy,               security and surveillance: tackling international dilemmas               and dangers in the digital realm&lt;/a&gt; &lt;/small&gt;&lt;small&gt;(Organized by Wilton Park; November 17-19, 2014). Pranesh Prakash was a panelist in the session "Beyond the familiar: how do other countries deal 			with security and surveillance oversight?" &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Free Speech &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; Under a grant from the MacArthur Foundation, CIS is doing research on the restrictions placed on freedom of expression online by the Indian government 		and contribute studies, reports and policy briefs to feed into the ongoing debates at the national as well as international level. As part of the 		project we bring you the following outputs: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;&lt;b&gt;Blog Entries &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance"&gt; Good Intentions, Recalcitrant Text - II: What India's ITU Proposal May Mean for Internet Governance &lt;/a&gt; (Geetha Hariharan; November 1, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/blog/indias-statement-at-itu-plenipotentiary-conference-2014"&gt; India's Statement at ITU Plenipotentiary Conference, 2014 &lt;/a&gt; (Geetha Hariharan; November 4, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Newspaper Article &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/economic-times-november-18-2014-pranesh-prakash-the-socratic-debate-whos-internet-is-it-anyway"&gt;&lt;b&gt; &lt;/b&gt;The Socratic debate: Whose internet is it anyway? &lt;/a&gt; (Pranesh Prakash; Economic Times; November 18, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt; &lt;br /&gt;CIS gave its inputs to the following media coverage: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-economic-times-vasudha-venugopal-november-2-2014-twitter-users-find-several-accounts-suspended-for-unknown-reasons"&gt; Twitter users find several accounts suspended for unknown reasons &lt;/a&gt; (Vasudha Venugopal; Economic Times; November 2, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/digit-november-3-2014-silky-malhotra-several-indian-twitter-users-accounts-suspended-due-to-tech-glitch"&gt; Several Indian Twitter users' accounts suspended due to tech glitch &lt;/a&gt; (Silky Malhotra; digit; November 3, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/mumbai-mirror-november-19-2014-jaison-lewis-game-release-cancelled-over-gay-character"&gt; Game release cancelled over gay character &lt;/a&gt; (Jaison Lewis; Mumbai Mirror; November 19, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/businessworld-november-25-2014-leave-the-net-alone"&gt;Leave the Net Alone&lt;/a&gt; (Businessworld; November 25, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt; &lt;br /&gt; &lt;/small&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and 		social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and 		document new conversations and debates that shape the contours of Digital Humanities in Asia: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt;Blog Entry &lt;/small&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/raw/mapping-digital-humanities-in-india-concluding-thoughts"&gt;&lt;b&gt; &lt;/b&gt;Mapping Digital Humanities in India - Concluding Thoughts &lt;/a&gt; (P.P.Sneha; November 30, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;/small&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, 		accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), 		and engages in academic research on digital natives and digital humanities. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ► Follow us elsewhere &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ► Support Us &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at 		No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ► Request for Collaboration: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director - Research, at		&lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, 		Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core 			funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy 			International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt; &lt;/small&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/november-2014-bulletin'&gt;https://cis-india.org/about/newsletters/november-2014-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2014-12-15T13:27:04Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie">
    <title>Know thy selfie</title>
    <link>https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie</link>
    <description>
        &lt;b&gt;The trend of clicking selfies is not a mere self-indulgent fad. It's a modern form of peer validation that helps in building a social bond, say Prasun Chaudhuri and Sharmistha Ghosal&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.telegraphindia.com/1141127/jsp/you/19090394.jsp"&gt;published in the Telegraph&lt;/a&gt; on November 27, 2014. Nishant Shah and Rohini Lakshane were quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Ever since her father  gifted her an expensive smartphone, Anwesha   Ray, a third year student at a Calcutta college, can't stop clicking  selfies. First, she started uploading selfies on her Facebook page once a  week. But the growing number of 'likes' inspired her to capture more  images. Now she clicks at least five pictures a day and changes her  profile picture at least twice a week. She deletes a picture within  hours if it fails to garner at least 200 'likes' from over 4,000  friends.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohit Chattopadhyay, a third year student at an engineering college  in south Calcutta, mastered the art of taking selfies and editing them  courtesy Instagram. He uploads at least a couple of self-portraits a  day. Sometimes he works well past midnight chasing that "perfect" shot.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aliah Shamim, a second year student at a top Calcutta college, loves  to click selfies with friends and family. However, she shares them only  with her close contacts on Facebook and WhatsApp.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Welcome to the world of selfie-engrossed teenagers ready to do  anything to get that perfect self-portrait. In every college you'll find  students who are mad about selfies. Anwesha knows her obsession leads  to her "wasting a lot of time", but she can't kick her habit of clicking  selfies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I simply love those 'likes' on Facebook. It gives me a feeling of  deja vu. I feel as if I'm a celebrity," she says a tad sheepishly. "Just  imagine how many admirers I have," says Rohit proudly showing a  particular top shot of his face which has garnered 602 'likes'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Are these students really being too self indulgent? Or is it just  their way of getting endorsement of their self worth? Dr Shefali Batra,  founder, Mind Frames, a psychiatric clinic in Mumbai, feels the act of  taking selfies is a way of feeling "empowered" as students attempt to  compensate for their lack of self worth in the real world. According to  her, the selfie obsession borders on narcissism — an excessive interest  in or admiration of oneself and one's physical appearance — and clouds  their judgement; they fail to see the real world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She is worried because she's been getting quite a few teen patients  who are obsessed with selfies. Although not as extreme as a 15-year-old  girl from Philippines who died after falling down the stairs while  taking a selfie or a Russian teen who plunged to his death after trying  to take a selfie atop a railway bridge, she is scared the trend might  catch on in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Calcutta-based psychiatrist J.R. Ram too is concerned about the  increasing number of selfie-obsessed teens in his clinic. He says, "Last  week, I met a 13-year-old girl who stole money to get a haircut like  pop singer Rihanna. Her parents were worried but she was nonchalant as  her portrait got 167 'likes' on a social networking site."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Ram, selfies are the modern day equivalent of a  reflection in a pool which led mythological Greek hunter Narcissus to  drown in a stream as he was enamoured of his own image.  "The virtual  image is more important to these teenagers than the real one," he avers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Agrees Rima Mukherjee, a psychiatrist based in Calcutta. "Virtual  appreciation means a lot to these kids and it doesn't matter if most of  the 'likes' they get on social networking sites are fake," she says.  According to her, the trend is pushing some youths to compete with their  friends to garner more 'likes'. "If a friend's picture gets more  'likes' students feel compelled to go on an overdrive to shoot and  upload more selfies," she notes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Take the case of Ashmita Dasgupta. "I make it a point to score  quality 'likes,' unlike Anwesha [her classmate]. I don't go on adding  random friends to maximise the 'likes'," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As an associate dean at Praxis B-school, Calcutta, Charanpreet Singh  has a ringside view of student behaviour and activities. He says, "These  kids do have a large network of friends but the relationships are very  superficial. The so-called 'likes' don't come from the heart and mean  nothing." He's also observes that those students who don't have many  real world friends are more active on social networking sites. "They vie  for appreciation out of emotional insecurity."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some argue that this trend of clicking and uploading selfies has been  fuelled by the celebrity culture. Says Aroona Broota, a former  professor of psychology in Delhi University, "Some teenagers are  inspired by celebs who frequently click selfies to promote themselves.  The kids fail to understand that for the celebrities it's a shrewd way  of marketing themselves or advertising a product." Also, for some,  clicking selfies has become an escape route from the daily drudgery and  frustrations that one face in real life such as scoring low marks in  exams, having no job or other personal problems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But not all psychiatrists or psychologists feel that the trend is  scary. Zena Deb, a Calcutta-based clinical psychologist, finds nothing  wrong with students clicking selfies unless their obsession leads them  to taking risks such as shooting from the top of a building or a cliff.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deb, a mother of an 18-year-old girl says, "Most do this to seek  attention and get some validation from peers. It doesn't matter if one  is ugly or pretty — you can seek a certificate for your self-worth and  you get it so easily on a social network." For a teenager such 'peer  review' is of utmost importance and it must not be confused with  narcissism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ali Khwaja, founder of counselling centre Banjara Academy, Bangalore,  too feels narcissism is too strong a word to describe the trend. "With a  strong medium at their disposal they want to spread the message that  they want to be different, creative and adventurous. They hope to expand  their contacts and create an identity," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah, co-founder of the Centre for Internet and Society,  Bangalore, feels the act of taking selfies is a networking phenomena. He  says, "These are meant for creating interesting routes of connectivity  with a photographic object that goes beyond individualistic  relationships. It forms social and cultural capital for youths."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohini Lakshané, a researcher at the CIS, believes we are living in  times where users of social media, especially "digital natives" find it  rewarding to constantly promote themselves in their chosen ways and  forms through these channels. She says, "The selfie often circumvents  the artistic pursuit of making a self portrait. Instead it tries to make  a spectacle or testimony that the selfie-taker was indeed present at a  certain place, at a certain time, in a certain attire or mood, and  (perhaps) in the company of certain people." According to her,  selfie-takers enjoy control over how the photos turn out to be, how they  look in the photo, and the time and social network in which such a  photo is published —  all of which are 'advantages' over having someone  else take their photos or being shot candidly. She adds, "While I would  consider the act of taking several selfies self-indulgent, I am not sure  if it qualifies as narcissistic."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They have the tools of self-expression which their parents didn't  have, says Kaustuv Sengupta, a youth trend analyst and an associate  professor at NIFT, Bangalore. "This is a more expressive generation  which wants to become more visible," he says. As a panel member of a  youth survey — called Millennial Paradox — conducted by Titan Industries  last year, he found that despite the unprecedented levels of  self-obsession and independence, India's millennnials (21-35 year old)  do not operate in isolation — they have a strong desire to share and  belong to a community. "Sharing has become the principle form of  validation....everything requires endorsement — whether that takes the  form of a 'friend' a 'like' or even a 'retweet", concludes the survey,  describing the new trend as "collective individualism".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the current generation of digital natives, endorsements in the  virtual world matter more than the feedback they get from the real  world, says Dr Subhrangshu Aditya, a student counsellor at Jadavpur  University. "The real world — parents, guardians and other authorities —  doesn't approve of the 'Kiss of Protest' movement against moral  policing, but it is appreciated by their virtual friends," he observes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah of CIS points out that social media are a potent tool  for today's youngsters. These can be used as a political weapon when  they identify crises in their immediate environment. And all the recent  movements across the world — anti-corruption or the post-gangrape  protests in India, occupy Wall Street in the US or Shahbag protests —  have originated in the digital world. More power to the social media, we  say.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie'&gt;https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-08-05T01:23:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables">
    <title>Introduction: About the Privacy and Surveillance Roundtables </title>
    <link>https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables</link>
    <description>
        &lt;b&gt;The Privacy and Surveillance Roundtables is a Centre for Internet and Society (CIS) initiative, in partnership with the Cellular Operators Association of India (COAI), as well as local partners. The Roundtable will be closed-door deliberation involving multiple stakeholders. Through the course of these discussions we aim to deliberate upon the current legal framework for surveillance in India, and discuss possible frameworks for surveillance in India.&lt;/b&gt;
        &lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The provisions of the draft CIS 	Privacy Bill 2013, the International Principles on the Application of Human Rights to Communication Surveillance, and the Report of the Group of Experts on 	Privacy will be used as background material and entry points into the discussion. The recommendations and dialogue from each roundtable will be compiled 	and submitted to the Department of Personnel and training.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy and Surveillance Roundtable was held in New Delhi at the India International Centre by the Centre for Internet and Society in 	collaboration with the Cellular Operators Association of India and Vahura, legal Partner on the 1&lt;sup&gt;st&lt;/sup&gt; of September, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aim of the discussion was to gain inputs on what would constitute an ideal surveillance regime in India working with the&lt;a href="http://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf"&gt;CIS Draft Privacy Protection Bill&lt;/a&gt;, the	&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt; prepared by the Justice Shah committee, and the	&lt;a href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Background and Context: Privacy and Surveillance in India&lt;/h3&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The discussion began with the chair giving an overview of the legal framework that governs communications interception under Indian Law in the interest of 	the participants since many were there for the first time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legal system to govern the manner in which communications are intercepted in India are defined under three main acts&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Interception of Telephonic Calls : The Telegraph Act 1885&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Interception of Posts : The Indian Post Office Act,1898&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Interception of Electronic communication like e-mails etc :The IT Act, 2000&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the interception of postal mail is governed by Section 26 of the Post Office Act, 1898, the interception of modern forms of communication that use 	electronic information and traffic data are governed under Sections 69 and 69B of the Information Technology Act, 2000, while interception of telephonic 	conversations are governed by section 5(2) of the Indian Telegraph Act 1885 and subsequent rules under section 419A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main discussion of the meeting revolved around the Telegraph Act since it is the main Act which covers the interception of telecommunications. In 1968 	the 30th Law Commission Report studying Section 5(2) of this Act came to the conclusion that the standards in the Act may be unconstitutional given factors 	such as 'public emergency' &amp;amp; 'public safety' were too wide in nature and called for a relook at the provision.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Objective of Round Table Meetings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The objective of the round table meetings is to, be prepared with the proposals on the Privacy Bill which the new government intends to split into separate 	Bill for Surveillance and Data privacy. Thus these submissions once out in the public domain would further deliberate more discussion and shape the course 	of the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Discussion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Authorisation &lt;/b&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The chair initiated the&lt;b&gt; &lt;/b&gt;discussion continuing from the last meeting about the two models of authorisation for Interception 1. The 	Judiciary &amp;amp; 2. The Executive&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The chair explained why the earlier proposed Judiciary based model, based on the efficient experience of separation of power, would not fit into the Indian 	context. The main reason for this being that the lower judiciary in India is not competent enough to take decisions of this nature. Providing examples, the 	chair explained how in many cases the lower Judiciary overlooks essential human rights in their decisions, and such rights are only addressed when the case 	is appealed in Higher courts. While participants felt that High Court judges would be favourable, it was expressed that the immense backlog at the High 	Court level and the lack of judges is a challenge and risks being inefficient. Thus an additional responsibility for the High Court would not be a feasible 	model. Furthermore, adopting a judicial based model would mean that the existing model of executive would need to be entirely replaced. Owing to these 	practical implementation issues consensus was built over adoption of the existing executive model, but with more safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Safeguards proposed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. &lt;i&gt;A redressal tribunal:&lt;/i&gt; Establishing a tribunal for the redressal of interception complaints. The tribunal could be a non-active body. Such a 	model would be different from other models adopted around the world - for example e in UK a designated tribunal suo-motu reviews cases on a regular basis. 	The tribunal could also have judicial review authority, to which one of the participants raised an issue that the tribunals usually will not have the power 	of Judicial review, however the chair assured him that the delegation of Judicial review to a tribunal does exist in Indian law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;i&gt;A review commission:&lt;/i&gt; Establishing a commission to review the interceptions carried out on the orders of home secretary. For such an overseeing 	body, the commissioner should be appointed independently. The commissioner must be a Judge or a senior Lawyer and should report to the Parliament.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Content data and Metadata&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In the next session the chair explained the difference between content data and metadata while initiating discussion on provisions addressing them in the 	proposed Bill. Content data, also called as payload data, is the actual content of the communication which takes place between X and Y.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Example 1:&lt;/i&gt; In the VOIP call the voice is packetized and sent in different packets to the destination, the content of that packet is the content data whereas the 	information of this content i.e the header, footer and checksum of the packet is the metadata.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Example 2:&lt;/i&gt; In the serial communication of the normal phone call the content data will be what the communication happened between two or more people over the call and 	the metadata will be who were involved in the call, on what date and time the call was made from which place, and under which tower.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was noted that generally it is easier to intercept metadata than content data. In the proposed bill, section 2 (C) refers to the definition of content 	data and section 2(E) to metadata.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participants also pointed out that often it is with metadata that concerned governmental authorities are able to carry out tracking. Thus, when determining 	procedural safeguards for surveillance - and specifically for interception - the question of whether or not content data and meta data should be treated 	the same under law must be addressed. Participants suggested looking into German laws, which have procedure to deal with this question. Despite differences 	over the exact level of protection meta data should legally be afforded, participants agreed that a higher authority should be responsible for the 	interception, collection, and access to metadata and content data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, because the existing legal framework in India has different standards for different modes of communication, it is proposed that a uniform legal 	framework be created by harmonizing the three Acts through amendments or overriding existing legislation regulating surveillance in India, and establishing 	a new framework under a Privacy legislation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Big Data, Cloud &amp;amp; OTT&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In this session a participant raised the issue of Big data and Cloud services, and asked whether the CIS Privacy Protection Bill or the draft Privacy Bill 	from the government addresses this issue. This question was of particular relevance because a number of the cloud data centres are located in locations 	outside India. Thus a question of jurisdiction arises. The participant opined that in the coming years and with the new government's vision to have space 	for every citizen in cloud and data localisation being priority, he stressed that the Bill should clearly address issues related to the cloud, big data, 	outsourcing, and questions of jurisdiction. Responding to this the chair was of the view that the crimes committed outside the territory of India come 	under Extra-territorial law, section 4 of IPC and Section 188 Cr. P.C. But it was noted that due to the fact that the crime is committed outside the 	territory of India, despite the provision, it is practically not implementable unless there is a contract between countries or a treaty signed. The 	solution could be data localisation, hosting the cloud servers in India, but that again has its own pros &amp;amp; cons. In response participants indicated 	that if a choice had to be made about data localization - the best option would be one that would be economical for Indian business and the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;OTT (Over the Top) Services &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another participant brought to the notice of the meeting that most of the networks of service provider's are adopting IP (Internet Protocol). In the 	context of surveillance, this means that for an interception to take place, Deep Packet Inspection (DPI) must be adopted by service providers. This is 	currently placing a burden on service providers, as it is costly and the connection time of the calls for the number under surveillance increases - though 	not enough to be noticed by customers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Telephone Tapping Process&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In India the process of intercepting telephones can be broken down into the following three steps:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Authorization&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. The Home Secretary issues an authorization for an interception request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. The Authorization is handed over to Police Officer in charge of the investigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. The Police Officer serves the order to the nodal officer in the relevant service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. The service provider conducts the interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. The intercepted data is handed over to the Police officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Rule 419A, a committee to review the authorization exists, comprising of officials such as the Cabinet Secretary, Secretary of the Department of 	Telecommunications, Secretary of the Department of Law and Justice and the Secretary of Information Technology and Communication ministry at the Centre and 	the Chief Secretary, the Law Secretary and an officer not below the rank of a Principal secretary at the State level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the current infrastructure of telecom and broadband is with private service providers, the government is dependent on service providers to carry out 	surveillance. As national security is a concern of the government and because in the past intercepted material has been leaked by various sources, the 	government has proposed to replace the existing system. In this regard the government has proposed to set up a Central Monitoring System (CMS) for the 	interception of voice and data communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is proposed that the CMS infrastructure will be positioned at the service provider's facilities, and will allow governmental agencies to directly 	intercept traffic on the network of service providers - thus there would no longer be a need for the government to reply on service providers to carry out 	interception requests. During the meeting it was discussed how this system has pros &amp;amp; cons&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pros&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. For private companies it eliminates an entire level of compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. It will reduce the possibility of unlawful, extra legal, &amp;amp; fraudulent authorizations of interception requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. The interception carried out would be maintained in a log, which would clearly recorded, making the interception process becomes accountable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cons&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Even though the existing system gives room for leaks, ironically it is the only way through which a person who is tapped will come to know, hence 	accounting for some transparency eg: &lt;i&gt;Nira Radia&lt;/i&gt; &amp;amp; &lt;i&gt;Amar Singh&lt;/i&gt; phone Tap case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. CMS will be built upon an existing interception framework, which is not procedurally fair - because of issues such as Internal Authorization, Adhoc 	procedure, that it is not under the ambit of RTI etc. This will result in a system with no transparency and accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To this last point the Chair noted that in 2011 there were 7.5 Lakh phone taps by a single agency which was reportedly illegal. In an attempt to minimize 	such brazen violations a Privacy Bill is mooted and the round table conference is a step towards making it possible.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Immunity to TSP's &amp;amp; ISP's&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Participants also raised the issue of difficulties that TSPs face while engaged in the process of interception, as they are caught between the customers 	and government authorities and subjected to harassment sometimes. This places service providers in a position where they must often make a number of 	compromises as they are expected to store traffic data for a specified period of time, but sometimes a judge might ask for access to data that is dated 	past the specific retention period. In such a scenario, service providers must provide it by accessing backup data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question of who should be the custodian of intercepted data was raised by participants as well as who should be held accountable if intercepted data is 	leaked into the public domain. The chair responded that the officers investigating the case should be held accountable for the intercepted data. This would 	be analogous to the system under the Right to Information Act whereby the Information officer is named and held accountable for the data or information he 	provides. Similarly, for the case of intercepted material, an officer should be named and held accountable for the data and ensuring that it reaches those 	that it is legally intended to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was also expressed that a market regulator, responsible for the safeguarding the interest of communication service providers, could be appointed for 	handling the personal data. Such a role could be merged with the traditional role of a Data Protection Authority and could be the first step towards an 	information security and assurance regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legal immunity given to service providers was also discussed, as there was a general concern about the position service providers find themselves in - 	being held legally liable for not complying with orders from the government and being taken to court by citizens.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Format of Interception Orders and Interception as a service&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A question was also posed to participants about what information ideally - apart from the intended duration of the order - should be incorporated into 	interception orders. Participants suggested that the order should be as specific and precise as possible, which the existing format to a large extent 	confirms. On the topic, a participant noted that in some cases, despite DoPT guidelines, interception orders are issued in regional languages. This can 	pose as a problem as the nodal officer might not know the language, thus leading to possible ambiguity &amp;amp; misinterpretation of the order. Participants 	suggested that orders should be in English.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participants also pointed out that in most European countries - like France and Italy - a fee for the compliance cost arising out of implementing an 	interception order is paid to service providers by the government. In India, huge costs are involved in carrying out interceptions which service providers 	presently have to bare. As law enforcement and security agencies ask for more and more accuracy in surveillance, the charges of carrying out surveillance. 	To address this, participants suggested that interception as a service should be accommodated in the proposed Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The discussions in the Surveillance and Privacy Roundtable in New Delhi mainly revolved around the authorization model and the process of interception. 	Overall, participants agreed on an organised executive model with an established accountability and review system. Also discussed was how to ensure that 	service providers are legally protected from disproportionate and unwarranted penalties. Towards this, the interception process should be viewed as a 	service rather than an obligation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables'&gt;https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>manoj</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-27T13:34:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/businessworld-november-25-2014-leave-the-net-alone">
    <title>Leave the Net Alone</title>
    <link>https://cis-india.org/internet-governance/news/businessworld-november-25-2014-leave-the-net-alone</link>
    <description>
        &lt;b&gt;The Internet, like the air we breathe, has traditionally been neutral ground. Nobody is allowed to buy preferential treatment on the Internet. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This story was published in BW | &lt;a class="external-link" href="http://www.businessworld.in/news/business/internet/leave-the-net-alone/1635693/page-1.html"&gt;Businessworld&lt;/a&gt; Issue Dated 15-12-2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“The Internet is currently not broke, and the FCC is out to fix it,”  began John Oliver, American talk-show host and comedian, introducing his  show’s discussion on Net neutrality. America’s telecom regulator Federal  Communications Council (FCC) had just proposed allowing Internet  carriers to give preference on their network to websites in exchange for  a fee. &lt;br /&gt; &lt;br /&gt;For example, in an Indian context, if BW| Businessworld was to,  hypothetically, pay Airtel a fee, and Airtel were to, in turn, give  priority access to the website, it might be natural to argue that  eventually, Airtel subscribers would prefer BW|Businessworld’s website  over its rivals’. &lt;br /&gt; &lt;br /&gt;The Internet, like the air we breathe, has traditionally been neutral  ground. Nobody (read, no corporate) is allowed to buy preferential  treatment on the Internet. “The point of Net neutrality is that on the  Internet you cannot have discrimination on where the information is  originating from or who is the consumer,” says Mihir Parikh, partner at  law firm Nishith Desai Associates. He compares it to telephone networks  where calls get connected on a first-come basis. Nobody has a  predominant right over call connections. &lt;br /&gt; &lt;br /&gt;And that is exactly what the FCC’s proposals threatens to change, by  allowing American carriers such as Verizon or Comcast to charge a fee to  give priority on their network to fee payers, like, for example, Daily  Motion, which would then get an advantage over rival YouTube. On 10  September, several websites including Mozilla and Netflix deliberately  slowed down their sites to show how a slow Internet would look like.  Last week, US president Barack Obama put his weight behind a free  Internet, where nobody can pay ‘their way up’. The FCC will make its  final recommendations next year. &lt;br /&gt; &lt;br /&gt;While an Indian browsing the Net is not likely to be affected by the FCC  recommendations, it is possible that the transmission of less favoured  US-based websites do not get priority, thereby slowing access to them,  says Parikh. &lt;br /&gt; &lt;br /&gt;But the episode calls attention to the picture in India. “There are no  specific laws that speak to the Net neutrality situation in India,” says  Sunil Abraham of Centre for Internet Security. So it could be possible  that carriers are already censoring speeds to certain services that take  up heavy bandwidth. Slow speeds for torrent downloads are an example.  Abraham calls for crowd sourced, technically sound research to explore  whether carriers are engaging in such practices, as a prelude to  petitioning the government for enlightened regulation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/businessworld-november-25-2014-leave-the-net-alone'&gt;https://cis-india.org/internet-governance/news/businessworld-november-25-2014-leave-the-net-alone&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-07T04:12:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/mumbai-mirror-november-19-2014-jaison-lewis-game-release-cancelled-over-gay-character">
    <title>Game release cancelled over gay character</title>
    <link>https://cis-india.org/internet-governance/news/mumbai-mirror-november-19-2014-jaison-lewis-game-release-cancelled-over-gay-character</link>
    <description>
        &lt;b&gt;Electronic Arts stops accepting preorders for Dragon Age: Inquisition.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Jaison Lewis was &lt;a class="external-link" href="http://www.mumbaimirror.com/mumbai/cover-story/Game-release-cancelled-over-gay-character/articleshow/45197190.cms"&gt;published in Mumbai Mirror&lt;/a&gt; on November 19, 2014. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;In a city where just about  any kid above the age of five who can afford to do so has played Grand  Theft Auto, with its profusion of violence and profanity, it appears  unlikely that a game would ever be withdrawn from release owing to  explicit content. But when Electronic Arts (EA), creators of several  such titles, decide to cancel the release of a game in India because it  features a gay character and sequences of gay sex, there are bound to be  fiery debates about censorship, moral policing, and the prevalence of  gratuitous violence in games. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;EA have withdrawn  pre-orders for Dragon Age: Inquisition, a role playing franchise in  which you play a character that you create - one such role is that of  Dorian, who is gay and who is featured in sequences involving gay sex.  EA is now in the process of refunding the money (Rs 3,499 for the  standard edition (PC) and Rs 4,000 for the collectors' edition (PC))  that gamers in India paid to have access to Dragon Age when it is  released on November 21. &lt;br /&gt;&lt;br /&gt; Milestone Interactive, the company  that distributes EA titles in India, has cancelled several pre-orders  for the game that were booked through their website. However, a bulk of  the PC pre-orders were made on EA's Origin software, a Windows  application that lets gamers buy and play games directly from the  company. Electronic Arts issued the following official statement to its  Origin users in India, Bangladesh and Pakistan. "In order to avoid a  breach of local content laws, EA has withdrawn Dragon Age: Inquisition  from sale in India and the game is no longer available for pre-order.  Customers who pre-ordered the game will be contacted directly and will  be fully refunded." &lt;br /&gt;&lt;br /&gt; Though the local laws that applied were not  mentioned, several online websites managed to obtain reactions from EA  that implied the game's homosexual content was to blame, with mention of  Section 377, which criminalises gay sex. &lt;br /&gt;&lt;br /&gt; The Entertainment  Software Rating Board (ESRB), a self-regulatory organisation based in  New York, has classified Dragon Age as Mature, and, according to their  online rating information, it "includes some sexual material: a female  character briefly depicted in front of a man's torso (fellatio is  implied); characters depicted topless or with exposed buttocks while  lying in bed or after sex; some dialogue referencing sex/sexuality. The  words "f**k," "sh*t," and "a*shole" appear in dialogue." &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;LGBT rights activist Aditya Bandopadhyay, said he believes EA could have withdrawn the game under pressure from the government. &lt;br /&gt;&lt;br /&gt; "Self-censorship by corporations is even more insidious than censorship  by the government, since the latter can be challenged in courts and has  to abide within the limits set out within Article 19 of the  Constitution, the former cannot be challenged at all except morally,  "said Pranesh Prakash, member, The centre for internet and society. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;"There can be no defence offered to the offensive instance of  self-censorship by Electronic Arts, and is a slap against the fight by  the LGBTQ community in India against oppressive colonial laws and mores.  As Vikram Seth put it, it is homophobia that came into India, not  homosexuality. It is homophobia that is unnatural and which militates  against Indian morality. Under Article 19(1)(a), the government can be  read to have a positive obligation to ensure an environment where  freedom of speech and expression is guaranteed, so I call upon the  government to speak out against the decision taken by Electronic Arts, "  added Prakash. &lt;br /&gt;&lt;br /&gt; "By way of legal background: Homosexuality as a  gender identity is not illegal in India, while there is a case pending  in the Supreme Court as to the criminality of engaging in 'unnatural'  sexual intercourse. This law cannot possibly be read to hold that the  public display of homosexuality in art is unlawful," he said &lt;br /&gt;&lt;br /&gt; EA  representatives were unwilling to discuss the game or the reasons for  it being withdrawn from the market in India. "We are going to decline  any further info beyond our statement," a spokesperson said.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/mumbai-mirror-november-19-2014-jaison-lewis-game-release-cancelled-over-gay-character'&gt;https://cis-india.org/internet-governance/news/mumbai-mirror-november-19-2014-jaison-lewis-game-release-cancelled-over-gay-character&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2014-11-22T00:24:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/iocose-talk-at-cis">
    <title>IOCOSE's talk at CIS</title>
    <link>https://cis-india.org/internet-governance/events/iocose-talk-at-cis</link>
    <description>
        &lt;b&gt;Please join us at the Centre for Internet and Society in Bangalore on Thursday, November 27, 2014 at 7 p.m. for a presentation of the work of the artists group IOCOSE, current artists in residence at T.A.J./SKE Residency. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;What is the life of a drone 'in times of peace'? What are the creative potential of a drone? Drones do not have such a thing as a ‘life’. But what if?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The title of our project, 'In Times of Peace' refers to Paul Virilio's theory of logistics (Pure War, 1983).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Quoting an article published by the Pentagon in late '40s, the theorist highlighted the fact that the text presented logistics as the procedure for which the potential of a nation lies in its armed forces, 'in times of peace' as in times of war.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what does it mean to live 'in times of peace'? And what does this mean for a drone?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The talk will open with the announcement of the winner of the NoTube Contest 2014 which will be held at the Sree Venkateshwara Cyber Cafe in Bangalore on the very same day.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;IOCOSE&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;IOCOSE is a collective of four artists who has been working in Italy and Europe since 2006. It organises actions in order to subvert ideologies, practices and processes of identification and production of meanings. It uses pranks and hoaxes as tactical means, as joyful and sound tools. IOCOSE thinks about the streets, internet and word of mouth as a battlefield. Tactics such as mimesis and trickery are used to lead and delude the audience into a semantic pitfall. IOCOSE’s work has been shown internationally, such as at Jeu de Paume (Paris, France; 2011); Tate Modern (London, UK; 2011), Festival Nrmal, (Monterrey, Mexico; 2011); Furtherfield Gallery (London, UK; 2012); Venice Biennal (Italy; 2011), Macro (Rome, Italy; 2012); CLICK Festival (Helsingor, Denmark; 2013); Science gallery (Dublin, Ireland, 2012), &lt;a class="external-link" href="http://www.iocose.org"&gt;http://www.iocose.org &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;T.A.J. RESIDENCY &amp;amp; SKE PROJECTS&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;T.A.J. RESIDENCY &amp;amp; SKE PROJECTS is a residency program established in 2013 as a collaborative project between a visual artist and a gallerist. Intended as an interdisciplinary residency, it has already hosted visual artists, curators, academics, scientists, fiction writers and journalists. There is always one visual artist in residence. The residency program is also open to applicants from the fields of architecture, design, music, film, performing arts and education, &lt;a class="external-link" href="http://t-a-j.in"&gt;http://t-a-j.in &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Marialaura Ghidini&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Marialaura is a curator, researcher and writer. She is the founder director of &lt;a href="http://www.or-bits.com" target="_blank"&gt; &lt;span style="text-decoration: underline;"&gt;or-bits.com&lt;/span&gt;&lt;/a&gt; since 2009. Currently she is AHRC-doctoral researcher with &lt;a href="http://www.crumbweb.org" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;CRUMB (Curatorial Upstart Media Bliss)&lt;/span&gt;&lt;/a&gt; at the University of Sunderland.  Based in London, UK, from Brescia, Italy. She can be contacted at &lt;a class="mail-link" href="mailto:mlghidini@gmail.com"&gt;mlghidini@gmail.com&lt;/a&gt;&lt;/p&gt;
&lt;div class="locked object resizable text" id="index.head.134052969195" style="text-align: center; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/iocose-talk-at-cis'&gt;https://cis-india.org/internet-governance/events/iocose-talk-at-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-25T01:02:24Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance">
    <title>Privacy, security and surveillance: tackling international dilemmas and dangers in the digital realm</title>
    <link>https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance</link>
    <description>
        &lt;b&gt;Pranesh Prakash was a panelist in the session "Beyond the familiar: how do other countries deal with security and surveillance oversight?" The event was organized by Wilton Park between November 17 and 19, 2014.&lt;/b&gt;
        &lt;p&gt;Complete details of the programme can be &lt;a class="external-link" href="https://www.wiltonpark.org.uk/wp-content/uploads/WP1361-programme.pdf"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance'&gt;https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-15T12:56:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
