<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1656 to 1670.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-december-5-2014-moulishree-srivastava-india-sees-biggest-improvement-in-internet-freedom"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/digital-security-training"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/november-2014-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/businessworld-november-25-2014-leave-the-net-alone"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/mumbai-mirror-november-19-2014-jaison-lewis-game-release-cancelled-over-gay-character"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/iocose-talk-at-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-times-november-18-2014-pranesh-prakash-the-socratic-debate-whos-internet-is-it-anyway"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ground-zero-summit-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-december-5-2014-moulishree-srivastava-india-sees-biggest-improvement-in-internet-freedom">
    <title>India sees biggest improvement in Internet freedom, says report</title>
    <link>https://cis-india.org/internet-governance/news/livemint-december-5-2014-moulishree-srivastava-india-sees-biggest-improvement-in-internet-freedom</link>
    <description>
        &lt;b&gt;Big stride ascribed to removal of restrictions imposed in 2013; globally, Internet freedom sees decline.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Moulishree Srivastava was &lt;a class="external-link" href="http://www.livemint.com/Industry/rOJyH002TuD8zfjy78YkdJ/India-sees-biggest-improvement-in-Internet-freedom-says-rep.html"&gt;published in Livemint&lt;/a&gt; on December 5, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;India fared better this year when it came to freedom of the Net, while globally Internet freedom declined for the fourth consecutive year in 2014 with a growing number of countries introducing more aggressive online censorship and monitoring practices, said a report by Freedom House, an independent watchdog.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The global Freedom on the Net report 2014, which covered the period between 1 May 2013 and 31 May 2014 and was released on Thursday, said India scored 42 points this year, an improvement of five points over the previous reporting period.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It’s the largest increase in Internet freedom over the past year and was ascribed to the removal of temporary restrictions on access and content that had been imposed in 2013 to stem an exodus of people from north-eastern states from wherever else they were in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of the 65 countries assessed, 36 saw a decline in Internet freedom. The most significant declines were in Russia, Turkey and Ukraine. Iran, Syria and China are the world’s worst abusers of Internet freedom, said Freedom House.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A low score indicates higher Internet freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The US remained relatively free compared with the rest of the world with a total score of 19, the report said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Any report on Internet freedom that ranks US as free cannot be taken seriously,” said Sunil Abraham, executive director of the Bengaluru-based research organization Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is massive intellectual property rights (IPR)-related censorship in the US, which Freedom House does not consider censorship, and the total surveillance regime of the National Security Agency that resulted in self-censorship was also ignored by Freedom House, he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, curbs on content and arrests related to online publishing under Section 66A of the information technology (IT) Act declined in the past year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have been nine criminal complaints filed against social media posts in the period, but the Supreme Court did its bit by curtailing arrests for online expression under the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Independently, the Supreme Court is assessing the constitutionality of provisions in the IT Act and secondary legislation that restrict content and criminalize speech online. Section 66A of the IT Act criminalizes a wide range of speech and led to several arrests for social media posts in 2012 and early 2013. On 2 December, the Supreme Court asked the government to clarify its stand on the constitutionality of these provisions by 9 December.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several petitioners have also challenged parts of the IT Act, including rules introducing potential criminal liability for intermediary companies for content posted by third parties, as unconstitutional in the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Legislation and procedures to effectively protect privacy, meanwhile, remain lacking, and the scope of a privacy law currently being drafted is unclear,” said the Freedom House report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India was expected to get a privacy law before the launch of the Unique ID, or Aadhar, programme, but this has not happened.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Allegations of procedural abuses by state officials in surveillance cases have emerged in the states of Himachal Pradesh and Gujarat, in the latter while the present Prime Minister was chief minister,” the report said. “Partly in response to these scandals, the government tightened procedures in January 2014, saying officials must issue interception orders to telecommunications providers in written form, though they still require no warrant or judicial oversight.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, the government can retrieve data from intermediaries such as Internet service providers, which are required to install infrastructure for surveillance and keyword scanning of all traffic passing through each gateway.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What can curb Net freedom substantially in India, according to the report, is the Indian government’s ambitious nationwide surveillance programme, the Central Monitoring System, which allows authorities to monitor individuals’ digital communications directly without issuing orders to service providers, written or otherwise—that is, “without judicial oversight”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The move allows government agencies to intercept any online activities, phone calls, text messages and even social media conversations in real time by directly accessing interception equipment on intermediary premises.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government also requested user information from international Web-based platforms including Google Inc., which received 2,794 data requests from Indian government agencies from January to June 2014. Facebook Inc. got 3,598 such requests and Twitter Inc. 19.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;Apoorva contributed to this story.&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-december-5-2014-moulishree-srivastava-india-sees-biggest-improvement-in-internet-freedom'&gt;https://cis-india.org/internet-governance/news/livemint-december-5-2014-moulishree-srivastava-india-sees-biggest-improvement-in-internet-freedom&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2014-12-07T11:08:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation">
    <title>Cyber bullying is a crime, but open to interpretation: Expert</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation</link>
    <description>
        &lt;b&gt;The social media attack on a Doordarshan anchor who made a series of gaffes at the recent Goa film festival would qualify as cyber bullying, experts say, but hasten to add there is not much that can be done to prevent such behaviour online, given the humungous size of the virtual universe.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Neha Alawadhi was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2014-12-02/news/56649315_1_information-online-cyber-bullying-offline"&gt;published in the Times of India&lt;/a&gt; on December 2, 2014. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The anchor reportedly shut down all her online accounts following  the slew of unflattering and personal comments that she was bombarded  with after the video of the event went viral and was shared across &lt;a href="http://economictimes.indiatimes.com/topic/Facebook"&gt;Facebook&lt;/a&gt;, &lt;a href="http://economictimes.indiatimes.com/topic/Twitter"&gt;Twitter&lt;/a&gt; and &lt;a href="http://economictimes.indiatimes.com/topic/YouTube"&gt;YouTube&lt;/a&gt;, among other such platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Section 66 (A) of the IT Act, 2000, &lt;a href="http://economictimes.indiatimes.com/topic/cyber%20bullying"&gt;cyber bullying&lt;/a&gt; is a bailable offence, punishable with three years of imprisonment and  fine. However, the complainant and police can interpret what constitutes  offensive behaviour, said cyber law expert Pavan Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Just  as we don't regulate jeering and taunting of adults when it happens in  person, as opposed to a threat of violence, unless there is a special  case made out for the harm of online taunting, I don't think there is a  case for a legislative response," said Pranesh Prakash, policy director  at Bengaluru-based Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a recent report by &lt;a href="http://economictimes.indiatimes.com/topic/McAfee"&gt;McAfee&lt;/a&gt;, part of &lt;a href="http://economictimes.indiatimes.com/topic/Intel"&gt;Intel&lt;/a&gt; Security, half of Indian youths have had some experience with cyber  bullying and of these over a third (36%) have been bullied themselves  online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IT and cybersecurity expert Rakshit Tandon recalled the  trauma a young professor at one of the top colleges underwent when an  old picture of her, from one of her social media accounts, went viral  and became the butt of unflattering comments by students. "Once it goes  viral, you can't track who is sharing or sending it," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"We don't have one personality anymore," said Adhvith Dhuddu, founder  and CEO of digital marketing agency Alive-Now, which handles social and  digital for brands online. "We have an offline personality and we have  an online personality, and this is true for anyone —whether you are a  brand, person, book or a movie," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several schools, NGOs  and individuals are working towards educating children and young people  about the dangers of sharing information online, but often find  themselves at a loss when confronted with real situations every day.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The approach AliveNow's Dhuddu takes is to "engage first and ban  later". He said, "We try to reason with people. We always take any  grievance offline, we don't try to solve a grievance online."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For  individuals, however, the offline route may be impractical or  infeasible. Tandon believes the only way is to "sensitise people", while  CIS's Prakash says a person can "block abusive users, set one's account  in private mode and just get off such social networks for a while till  the situation cools off".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation'&gt;https://cis-india.org/internet-governance/news/economic-times-december-2-2014-neha-alawadhi-cyber-bullying-is-a-crime-but-open-to-interpretation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-07T10:54:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/digital-security-training">
    <title>Digital Security Training</title>
    <link>https://cis-india.org/internet-governance/news/digital-security-training</link>
    <description>
        &lt;b&gt;Rohini Lakshane participated as a trainer in a digital security training conducted by Front Line Defenders for the Afghan Women's Network in New Delhi in November 2014.&lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Rohinitraininggroupondigitalsecurity.JPG" alt="Rohini training" class="image-inline" title="Rohini training" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/digital-security-training'&gt;https://cis-india.org/internet-governance/news/digital-security-training&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-27T15:16:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/november-2014-bulletin">
    <title>November 2014 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/november-2014-bulletin</link>
    <description>
        &lt;b&gt;We at the Centre for Internet &amp; Society (CIS) welcome you to the eleventh issue of the newsletter (November 2014). &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/about/newsletters"&gt;&lt;/a&gt; &lt;/small&gt; &lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;small&gt; Highlights &lt;/small&gt;&lt;small&gt;&lt;/small&gt;&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;small&gt;On 13 November, 2014, the Department of Industrial Policy and Promotion had released a Call for Suggestions for India's proposed National IPR 			Policy. &lt;a href="https://cis-india.org/a2k/blogs/comments-on-proposed-ip-rights-policy-to-dipp"&gt;CIS sent its comments&lt;/a&gt;.&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;As part of the Pervasive Technologies we published four methodology documents: Rohini Lakshané wrote on 			&lt;a href="https://cis-india.org/a2k/blogs/patent-landscaping-in-the-indian-mobile-device-market"&gt; Patent Landscaping for the Indian Mobile Device market &lt;/a&gt; ; Anubha Sinha wrote on 			&lt;a href="https://cis-india.org/a2k/blogs/methodology-intellectual-property-in-mobile-application-development-in-india"&gt; Intellectual Property in Mobile Application Development in India &lt;/a&gt; ; Maggie Huang wrote on			&lt;a href="https://cis-india.org/a2k/blogs/methodology-access-to-music-through-mobile"&gt;Access to Music through the Mobile&lt;/a&gt;; and Nehaa 			Chaudhari wrote on 			&lt;a href="https://cis-india.org/a2k/blogs/methodology-sub-hundred-dollar-mobile-devices-and-competition-law"&gt; Sub Hundred Dollar Mobile Devices and Competition Law &lt;/a&gt; .&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;Odisha's			&lt;a href="https://cis-india.org/openness/blog/nineteen-books-by-ama-odisha-relicensed"&gt;most circulated newspaper Sambad has collaborated&lt;/a&gt; with CIS-A2K to relicense 19 books published by its sister concern "Ama Odisha".&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;Vipul Kharbanda in a blog entry 			&lt;a href="https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2"&gt; examines the relationship between privacy and transparency in the context of the right to information in India &lt;/a&gt; .&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;Geetha Hariharan in a 			&lt;a href="https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance"&gt; blog entry &lt;/a&gt; explores what India's ITU proposal means for Internet Governance.&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;Pranesh Prakash wrote an 			&lt;a href="https://cis-india.org/internet-governance/blog/economic-times-november-18-2014-pranesh-prakash-the-socratic-debate-whos-internet-is-it-anyway"&gt; article in the Economic Times &lt;/a&gt; exploring net neutrality.&lt;/small&gt;&lt;/li&gt;
&lt;li&gt;&lt;small&gt;In her			&lt;a href="https://cis-india.org/raw/mapping-digital-humanities-in-india-concluding-thoughts"&gt;final blog post on the mapping exercise&lt;/a&gt; undertaken by CIS-RAW, P.P.Sneha summarises some of the key concepts and terms that emerged as significant in the discourse around Digital 			Humanities in India. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Job &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/jobs/programme-officer-institutional-partnership"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge - Institutional Partnerships): CIS is seeking applications for the post of Programme Officer for its Access to Knowledge (A2K) 			Programme. The position will be based in its Bangalore office. Programme Officer will collaboratively work with the A2K Team and would report to 			the Programme Director, Access to Knowledge at CIS. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt; &lt;/small&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies 		and programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 		National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The publication has been finalised and is currently in the process of being printed. The draft chapters and the quarterly reports can be accessed on the		&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed		&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►NVDA and eSpeak &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Monthly Update &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/blog/november-e-speak-nvda-2014-report.pdf"&gt;November 2014 Report&lt;/a&gt; (Suman Dogra; November 30, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Upcoming Event &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/events/training-in-e-speak-malayalam"&gt;Training in Use of eSpeak with Malayalam&lt;/a&gt; (co-organized by CIS, DAISY Forum of India and Chakshumathi Assistive Technology Centre; Trivandrum; January 24 - 25, 2015, Trivandrum). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Other &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Blog Entry &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/blog/central-guidelines-and-schemes"&gt;Central Guidelines and Schemes&lt;/a&gt; (Anandhi Viswanathan; November 6, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt; &lt;br /&gt; &lt;/small&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 		Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 		intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 		grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 		that recruit and cultivate new editors and explore innovative approaches to building projects. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;small&gt; Submission &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/comments-on-proposed-ip-rights-policy-to-dipp"&gt; Comments on the Proposed Intellectual Property Rights Policy to the Department of Industrial Policy and Promotion &lt;/a&gt; (Pranesh Prakash, Nehaa Chaudhari, Anubha Sinha and Amulya P.; November 30, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Blog Entries &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/mhrd-ipr-chairs-underutilization-of-funds-and-lack-of-information-regarding-expenditures"&gt; MHRD IPR Chairs - Underutilization of Funds and Lack of Information Regarding Expenditures &lt;/a&gt; (Amulya Purushothama, November 19, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;small&gt; Participation in Events &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/a2k/news/center-for-global-communication-studies-november-6-2014-ubiquity-mobility-globality-charting-directions-in-mobile-phone-studies"&gt; Ubiquity, Mobility, Globality: Charting Directions in Mobile Phone Studies &lt;/a&gt; (Organized by Center for Global Communication Studies at the Annenberg School for Communication, University of Pennsylvania, Philadelphia; November 			6 - 7, 2014). Nehaa Chaudhari made a presentation on Pervasive Technologies: Access to Knowledge in the Marketplace. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/news/countering-us-pressure-on-indias-ip-regime"&gt;Countering US pressures on India's IP regime&lt;/a&gt; (Organized by Lawyer's Collective; November 16, 2014). Anubha Sinha attended the event. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/technology-gender-based-violence"&gt;Technology and Gender Based Violence&lt;/a&gt; (Organized by the Bachchao Project; November 24, 2014). Rohini Lakshané was a speaker at the event. She spoke about various strategies that 			women use to respond to online harassment, such as reporting the abuser, and enlisting support from online followers, or friends or family in order 			to deal with the abuser. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Pervasive Technology &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Blog Entries &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/patent-landscaping-in-the-indian-mobile-device-market"&gt;Methodology: Patent Landscaping&lt;/a&gt; (Rohini Lakshané; November 10, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/methodology-intellectual-property-in-mobile-application-development-in-india"&gt; Methodology: Intellectual Property in Mobile Application Development in India &lt;/a&gt; (Anubha Sinha; November 17, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/methodology-access-to-music-through-mobile"&gt;Methodology: Access to Music through the Mobile&lt;/a&gt; (Maggie Huang; November 18, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/a2k/blogs/methodology-sub-hundred-dollar-mobile-devices-and-competition-law"&gt; Methodology: Sub Hundred Dollar Mobile Devices and Competition Law &lt;/a&gt; (Nehaa Chaudhari; November 25, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Wikipedia &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out 		to more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under 		the Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes 		in Kannada, and 1 book on Odia language history in English). &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt;Op-Ed &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/blog/the-samaja-november-17-2014-subhashish-panigrahi-odia-wikisource-its-potential"&gt; Odia Wikisource, its Potential &lt;/a&gt; (Subhashish Panigrahi, The Samaja, November 17, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;&lt;b&gt;Blog Entries &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/blog/55-works-of-iconic-indian-writer-released-under-free-licence-to-benefit-wikisource"&gt; 55 Works of Iconic Indian writer released under Free Licence to benefit Wikisource &lt;/a&gt; (T. Vishnu Vardhan, November 13, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/blog/odia-author-nirmala-kumari-mohapatra-21-books-under-cc"&gt; Odia author Nirmala Kumari Mohapatra's 21 books relicensed under CC-by-SA 4.0 &lt;/a&gt; (Subhashish Panigrahi, November 17, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/blog/nineteen-books-by-ama-odisha-relicensed"&gt; Nineteen Books Published by Ama Odisha Relicensed under CC-by-SA 4.0 &lt;/a&gt; (Subhashish Panigrahi, November 25, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt;News and Media Coverage &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; CIS-A2K team gave its inputs to the following media coverage: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/just-kannada-november-23-2014-kannada-wikipedia-presentation-coverage"&gt; ಭಾಷಣದಿಂದ ಭಾಷೆ ಉಳಿಯಲ್ಲ, 				ಕನ್ನಡದಲ್ಲೇ ಮಾಹಿತಿ 				ಸಿಗುವುದು ಅಗತ್ಯ: ಪವನಜ &lt;/a&gt; (Just Kannada; November 23, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/prajavani-november-24-2014-kannada-wikipedia-presentation-in-mysuru"&gt; Kannada Wikipedia Presentation in Mysuru &lt;/a&gt; (Prajavani; November 24, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/the-hindu-november-24-2014-govind-d-belgaumkar-now-tulu-set-to-be-promoted-through-wikipedia-articles"&gt; Now, Tulu set to be promoted through Wikipedia articles &lt;/a&gt; (Hindu; November 24, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/the-hindu-november-26-2014-ravi-prasad-kamila-tulu-wikipedia-in-incubation-stage"&gt; 'Tulu Wikipedia' in incubation stage, 600 articles uploaded, says U.B. Pavanaja &lt;/a&gt; (Ravi Prasad Kamila; Hindu; November 26, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/odisha-sun-times-november-28-2014-odia-wikisource-launched-in-odisha-capital"&gt; Odia Wikisource launched in Odisha capital &lt;/a&gt; (Odisha Sun Times; November 28, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/news/orissa-diary-november-28-2014-odia-wikisource-aims-to-bring-valuable-and-rare-books-on-the-internet"&gt; Odia Wikisource aims to bring valuable and rare books on the Internet &lt;/a&gt; (Odisha Diary; November 28, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Event Co-organized &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/openness/events/odia-wikisource-sabha-2014"&gt;Odia Wikisource Sabha 2014&lt;/a&gt; (Co-organized by CIS-A2K and Odia Wikimedia Community; November 28, 2014). Subhashish Panigrahi participated in the event. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Participation in Event &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/seminar-e-publishing-odia-books"&gt;A Seminar on E-publishing of Odia Books&lt;/a&gt; (Organized by Molybtech Technology Solutions; November 30, 2014). Subhashish Panigrahi was a speaker. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►&lt;b&gt;Openness &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;small&gt; Blog Entry &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/blog/privacy-v-transparency"&gt;Privacy vs. Transparency: An Attempt at Resolving the Dichotomy&lt;/a&gt; (Sunil Abraham &lt;i&gt;with feedback and inputs from Sumandro Chattapadhyay, Elonnai Hickok, Bhairav Acharya and Geetha Hariharan&lt;/i&gt;; November 14, 			2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;News and Media Coverage &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy"&gt; Getting Strategic about Openness and Privacy &lt;/a&gt; (Tim Davies; Open Data Research Lead at Web Foundation; November 3, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;small&gt; Participation in Event &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/openness/news/crypto-currencies"&gt;Content co-ordination for the Panel Discussion on Crypto-Currencies&lt;/a&gt; (organized by the Law and Technology Society; November 15, 2014). Sharath Chandra Ram was a panelist and made a presentation Scalability and 			Security Issues in Distributed Trust based Cryto-Currency Systems like BITCOIN &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt; &lt;/small&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Privacy &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; As part of our Surveillance and Freedom: Global Understandings and Rights Development (SAFEGUARD) project with Privacy International we are engaged in 		enhancing respect for the right to privacy in developing countries. During the month we published the following blog entries: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt;Blog Entries &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2"&gt;White Paper on RTI and Privacy V1.2&lt;/a&gt; (Vipul Kharbanda; November 9, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables"&gt; Introduction: About the Privacy and Surveillance Roundtables &lt;/a&gt; (Manoj Kurbet; November 27, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Event Organized &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/events/iocose-talk-at-cis"&gt;IOCOSE's talk at CIS&lt;/a&gt; (CIS, Bangalore; November 27, 2014). There was a presentation of the work of the artists group IOCOSE, current artists in residence at T.A.J./SKE 			Residency. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Upcoming Event &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/news/cpdp-2015"&gt;CPDP 2015&lt;/a&gt; : The eighth international conference on computers, privacy and data protection will be held in Brussels from January 21 to 23, 2015. CIS is a 			moral supporter of CPDP. &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Participation in Events &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-hague-institute-for-global-justice-november-4-2014-e-consultation-on-cyber-security-justice-and-governance-begins"&gt;&lt;b&gt; &lt;/b&gt;E-Consultation on Cyber Security, Justice, and Governance Begins! &lt;/a&gt; (Organized by the Hague Institute for Global Justice; November 4, 2014). Sunil Abraham facilitated the e-consultation on "Internet access, the 			freedom of expression online, and development in the Global South". &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/learning-forum-transparency-and-human-rights-in-the-digital-age"&gt; Learning Forum: Transparency and Human Rights in the Digital Age &lt;/a&gt; (Organized by Global Network Initiative; November 6, 2014). Pranesh Prakash gave a talk on transparency reports and their use and abuse in India; 			the Intermediary Liability Rules in India (and its non-provision of any transparency mechanism); and the need for transparency in private speech 			regulation, not just governmental speech regulation. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill"&gt; Fourth Discussion Meeting of the Expert Committee to Discuss the Draft Human DNA Profiling Bill &lt;/a&gt; (Organized by the Department of Biotechnology; New Delhi; November 10, 2014). Sunil Abraham was unable to participate because of technical 			problems. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/ground-zero-summit-2014"&gt;Ground Zero Summit 2014&lt;/a&gt; (Organized by India Infosec Consortium; November 13-14, 2014). Geetha Hariharan participated in this event. &lt;/small&gt; &lt;/li&gt;
&lt;li&gt;&lt;small&gt;&lt;a href="https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance"&gt;Privacy,               security and surveillance: tackling international dilemmas               and dangers in the digital realm&lt;/a&gt; &lt;/small&gt;&lt;small&gt;(Organized by Wilton Park; November 17-19, 2014). Pranesh Prakash was a panelist in the session "Beyond the familiar: how do other countries deal 			with security and surveillance oversight?" &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ►Free Speech &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; Under a grant from the MacArthur Foundation, CIS is doing research on the restrictions placed on freedom of expression online by the Indian government 		and contribute studies, reports and policy briefs to feed into the ongoing debates at the national as well as international level. As part of the 		project we bring you the following outputs: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;&lt;b&gt;Blog Entries &lt;/b&gt;&lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="https://cis-india.org/internet-governance/blog/good-intentions-recalcitrant-text-2013-ii-what-india2019s-itu-proposal-may-mean-for-internet-governance"&gt; Good Intentions, Recalcitrant Text - II: What India's ITU Proposal May Mean for Internet Governance &lt;/a&gt; (Geetha Hariharan; November 1, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/blog/indias-statement-at-itu-plenipotentiary-conference-2014"&gt; India's Statement at ITU Plenipotentiary Conference, 2014 &lt;/a&gt; (Geetha Hariharan; November 4, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;b&gt;Newspaper Article &lt;/b&gt;&lt;/small&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/economic-times-november-18-2014-pranesh-prakash-the-socratic-debate-whos-internet-is-it-anyway"&gt;&lt;b&gt; &lt;/b&gt;The Socratic debate: Whose internet is it anyway? &lt;/a&gt; (Pranesh Prakash; Economic Times; November 18, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt; &lt;br /&gt;CIS gave its inputs to the following media coverage: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/the-economic-times-vasudha-venugopal-november-2-2014-twitter-users-find-several-accounts-suspended-for-unknown-reasons"&gt; Twitter users find several accounts suspended for unknown reasons &lt;/a&gt; (Vasudha Venugopal; Economic Times; November 2, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/digit-november-3-2014-silky-malhotra-several-indian-twitter-users-accounts-suspended-due-to-tech-glitch"&gt; Several Indian Twitter users' accounts suspended due to tech glitch &lt;/a&gt; (Silky Malhotra; digit; November 3, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/mumbai-mirror-november-19-2014-jaison-lewis-game-release-cancelled-over-gay-character"&gt; Game release cancelled over gay character &lt;/a&gt; (Jaison Lewis; Mumbai Mirror; November 19, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; &lt;a href="http://cis-india.org/internet-governance/news/businessworld-november-25-2014-leave-the-net-alone"&gt;Leave the Net Alone&lt;/a&gt; (Businessworld; November 25, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt; &lt;br /&gt; &lt;/small&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and 		social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and 		document new conversations and debates that shape the contours of Digital Humanities in Asia: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt;Blog Entry &lt;/small&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;small&gt; &lt;/small&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;small&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/raw/mapping-digital-humanities-in-india-concluding-thoughts"&gt;&lt;b&gt; &lt;/b&gt;Mapping Digital Humanities in India - Concluding Thoughts &lt;/a&gt; (P.P.Sneha; November 30, 2014). &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;small&gt; &lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt; &lt;/small&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, 		accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), 		and engages in academic research on digital natives and digital humanities. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ► Follow us elsewhere &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;small&gt; Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/small&gt; &lt;/li&gt;
&lt;li&gt; &lt;small&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/small&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ► Support Us &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at 		No. 194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; ► Request for Collaboration: &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at&lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director - Research, at		&lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, 		Programme Director, A2K, at &lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;. &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;/small&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;small&gt; &lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core 			funding and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy 			International, UK, Hans Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt; &lt;/small&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/november-2014-bulletin'&gt;https://cis-india.org/about/newsletters/november-2014-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Humanities</dc:subject>
    

   <dc:date>2014-12-15T13:27:04Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie">
    <title>Know thy selfie</title>
    <link>https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie</link>
    <description>
        &lt;b&gt;The trend of clicking selfies is not a mere self-indulgent fad. It's a modern form of peer validation that helps in building a social bond, say Prasun Chaudhuri and Sharmistha Ghosal&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.telegraphindia.com/1141127/jsp/you/19090394.jsp"&gt;published in the Telegraph&lt;/a&gt; on November 27, 2014. Nishant Shah and Rohini Lakshane were quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Ever since her father  gifted her an expensive smartphone, Anwesha   Ray, a third year student at a Calcutta college, can't stop clicking  selfies. First, she started uploading selfies on her Facebook page once a  week. But the growing number of 'likes' inspired her to capture more  images. Now she clicks at least five pictures a day and changes her  profile picture at least twice a week. She deletes a picture within  hours if it fails to garner at least 200 'likes' from over 4,000  friends.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohit Chattopadhyay, a third year student at an engineering college  in south Calcutta, mastered the art of taking selfies and editing them  courtesy Instagram. He uploads at least a couple of self-portraits a  day. Sometimes he works well past midnight chasing that "perfect" shot.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aliah Shamim, a second year student at a top Calcutta college, loves  to click selfies with friends and family. However, she shares them only  with her close contacts on Facebook and WhatsApp.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Welcome to the world of selfie-engrossed teenagers ready to do  anything to get that perfect self-portrait. In every college you'll find  students who are mad about selfies. Anwesha knows her obsession leads  to her "wasting a lot of time", but she can't kick her habit of clicking  selfies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"I simply love those 'likes' on Facebook. It gives me a feeling of  deja vu. I feel as if I'm a celebrity," she says a tad sheepishly. "Just  imagine how many admirers I have," says Rohit proudly showing a  particular top shot of his face which has garnered 602 'likes'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Are these students really being too self indulgent? Or is it just  their way of getting endorsement of their self worth? Dr Shefali Batra,  founder, Mind Frames, a psychiatric clinic in Mumbai, feels the act of  taking selfies is a way of feeling "empowered" as students attempt to  compensate for their lack of self worth in the real world. According to  her, the selfie obsession borders on narcissism — an excessive interest  in or admiration of oneself and one's physical appearance — and clouds  their judgement; they fail to see the real world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She is worried because she's been getting quite a few teen patients  who are obsessed with selfies. Although not as extreme as a 15-year-old  girl from Philippines who died after falling down the stairs while  taking a selfie or a Russian teen who plunged to his death after trying  to take a selfie atop a railway bridge, she is scared the trend might  catch on in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Calcutta-based psychiatrist J.R. Ram too is concerned about the  increasing number of selfie-obsessed teens in his clinic. He says, "Last  week, I met a 13-year-old girl who stole money to get a haircut like  pop singer Rihanna. Her parents were worried but she was nonchalant as  her portrait got 167 'likes' on a social networking site."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Ram, selfies are the modern day equivalent of a  reflection in a pool which led mythological Greek hunter Narcissus to  drown in a stream as he was enamoured of his own image.  "The virtual  image is more important to these teenagers than the real one," he avers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Agrees Rima Mukherjee, a psychiatrist based in Calcutta. "Virtual  appreciation means a lot to these kids and it doesn't matter if most of  the 'likes' they get on social networking sites are fake," she says.  According to her, the trend is pushing some youths to compete with their  friends to garner more 'likes'. "If a friend's picture gets more  'likes' students feel compelled to go on an overdrive to shoot and  upload more selfies," she notes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Take the case of Ashmita Dasgupta. "I make it a point to score  quality 'likes,' unlike Anwesha [her classmate]. I don't go on adding  random friends to maximise the 'likes'," she says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As an associate dean at Praxis B-school, Calcutta, Charanpreet Singh  has a ringside view of student behaviour and activities. He says, "These  kids do have a large network of friends but the relationships are very  superficial. The so-called 'likes' don't come from the heart and mean  nothing." He's also observes that those students who don't have many  real world friends are more active on social networking sites. "They vie  for appreciation out of emotional insecurity."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some argue that this trend of clicking and uploading selfies has been  fuelled by the celebrity culture. Says Aroona Broota, a former  professor of psychology in Delhi University, "Some teenagers are  inspired by celebs who frequently click selfies to promote themselves.  The kids fail to understand that for the celebrities it's a shrewd way  of marketing themselves or advertising a product." Also, for some,  clicking selfies has become an escape route from the daily drudgery and  frustrations that one face in real life such as scoring low marks in  exams, having no job or other personal problems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But not all psychiatrists or psychologists feel that the trend is  scary. Zena Deb, a Calcutta-based clinical psychologist, finds nothing  wrong with students clicking selfies unless their obsession leads them  to taking risks such as shooting from the top of a building or a cliff.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Deb, a mother of an 18-year-old girl says, "Most do this to seek  attention and get some validation from peers. It doesn't matter if one  is ugly or pretty — you can seek a certificate for your self-worth and  you get it so easily on a social network." For a teenager such 'peer  review' is of utmost importance and it must not be confused with  narcissism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ali Khwaja, founder of counselling centre Banjara Academy, Bangalore,  too feels narcissism is too strong a word to describe the trend. "With a  strong medium at their disposal they want to spread the message that  they want to be different, creative and adventurous. They hope to expand  their contacts and create an identity," he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah, co-founder of the Centre for Internet and Society,  Bangalore, feels the act of taking selfies is a networking phenomena. He  says, "These are meant for creating interesting routes of connectivity  with a photographic object that goes beyond individualistic  relationships. It forms social and cultural capital for youths."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rohini Lakshané, a researcher at the CIS, believes we are living in  times where users of social media, especially "digital natives" find it  rewarding to constantly promote themselves in their chosen ways and  forms through these channels. She says, "The selfie often circumvents  the artistic pursuit of making a self portrait. Instead it tries to make  a spectacle or testimony that the selfie-taker was indeed present at a  certain place, at a certain time, in a certain attire or mood, and  (perhaps) in the company of certain people." According to her,  selfie-takers enjoy control over how the photos turn out to be, how they  look in the photo, and the time and social network in which such a  photo is published —  all of which are 'advantages' over having someone  else take their photos or being shot candidly. She adds, "While I would  consider the act of taking several selfies self-indulgent, I am not sure  if it qualifies as narcissistic."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They have the tools of self-expression which their parents didn't  have, says Kaustuv Sengupta, a youth trend analyst and an associate  professor at NIFT, Bangalore. "This is a more expressive generation  which wants to become more visible," he says. As a panel member of a  youth survey — called Millennial Paradox — conducted by Titan Industries  last year, he found that despite the unprecedented levels of  self-obsession and independence, India's millennnials (21-35 year old)  do not operate in isolation — they have a strong desire to share and  belong to a community. "Sharing has become the principle form of  validation....everything requires endorsement — whether that takes the  form of a 'friend' a 'like' or even a 'retweet", concludes the survey,  describing the new trend as "collective individualism".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the current generation of digital natives, endorsements in the  virtual world matter more than the feedback they get from the real  world, says Dr Subhrangshu Aditya, a student counsellor at Jadavpur  University. "The real world — parents, guardians and other authorities —  doesn't approve of the 'Kiss of Protest' movement against moral  policing, but it is appreciated by their virtual friends," he observes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah of CIS points out that social media are a potent tool  for today's youngsters. These can be used as a political weapon when  they identify crises in their immediate environment. And all the recent  movements across the world — anti-corruption or the post-gangrape  protests in India, occupy Wall Street in the US or Shahbag protests —  have originated in the digital world. More power to the social media, we  say.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie'&gt;https://cis-india.org/internet-governance/news/the-telegraph-november-27-2014-know-thy-selfie&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-08-05T01:23:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables">
    <title>Introduction: About the Privacy and Surveillance Roundtables </title>
    <link>https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables</link>
    <description>
        &lt;b&gt;The Privacy and Surveillance Roundtables is a Centre for Internet and Society (CIS) initiative, in partnership with the Cellular Operators Association of India (COAI), as well as local partners. The Roundtable will be closed-door deliberation involving multiple stakeholders. Through the course of these discussions we aim to deliberate upon the current legal framework for surveillance in India, and discuss possible frameworks for surveillance in India.&lt;/b&gt;
        &lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The provisions of the draft CIS 	Privacy Bill 2013, the International Principles on the Application of Human Rights to Communication Surveillance, and the Report of the Group of Experts on 	Privacy will be used as background material and entry points into the discussion. The recommendations and dialogue from each roundtable will be compiled 	and submitted to the Department of Personnel and training.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy and Surveillance Roundtable was held in New Delhi at the India International Centre by the Centre for Internet and Society in 	collaboration with the Cellular Operators Association of India and Vahura, legal Partner on the 1&lt;sup&gt;st&lt;/sup&gt; of September, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aim of the discussion was to gain inputs on what would constitute an ideal surveillance regime in India working with the&lt;a href="http://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf"&gt;CIS Draft Privacy Protection Bill&lt;/a&gt;, the	&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt; prepared by the Justice Shah committee, and the	&lt;a href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Background and Context: Privacy and Surveillance in India&lt;/h3&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The discussion began with the chair giving an overview of the legal framework that governs communications interception under Indian Law in the interest of 	the participants since many were there for the first time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legal system to govern the manner in which communications are intercepted in India are defined under three main acts&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Interception of Telephonic Calls : The Telegraph Act 1885&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Interception of Posts : The Indian Post Office Act,1898&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Interception of Electronic communication like e-mails etc :The IT Act, 2000&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the interception of postal mail is governed by Section 26 of the Post Office Act, 1898, the interception of modern forms of communication that use 	electronic information and traffic data are governed under Sections 69 and 69B of the Information Technology Act, 2000, while interception of telephonic 	conversations are governed by section 5(2) of the Indian Telegraph Act 1885 and subsequent rules under section 419A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main discussion of the meeting revolved around the Telegraph Act since it is the main Act which covers the interception of telecommunications. In 1968 	the 30th Law Commission Report studying Section 5(2) of this Act came to the conclusion that the standards in the Act may be unconstitutional given factors 	such as 'public emergency' &amp;amp; 'public safety' were too wide in nature and called for a relook at the provision.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Objective of Round Table Meetings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The objective of the round table meetings is to, be prepared with the proposals on the Privacy Bill which the new government intends to split into separate 	Bill for Surveillance and Data privacy. Thus these submissions once out in the public domain would further deliberate more discussion and shape the course 	of the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Discussion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Authorisation &lt;/b&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The chair initiated the&lt;b&gt; &lt;/b&gt;discussion continuing from the last meeting about the two models of authorisation for Interception 1. The 	Judiciary &amp;amp; 2. The Executive&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The chair explained why the earlier proposed Judiciary based model, based on the efficient experience of separation of power, would not fit into the Indian 	context. The main reason for this being that the lower judiciary in India is not competent enough to take decisions of this nature. Providing examples, the 	chair explained how in many cases the lower Judiciary overlooks essential human rights in their decisions, and such rights are only addressed when the case 	is appealed in Higher courts. While participants felt that High Court judges would be favourable, it was expressed that the immense backlog at the High 	Court level and the lack of judges is a challenge and risks being inefficient. Thus an additional responsibility for the High Court would not be a feasible 	model. Furthermore, adopting a judicial based model would mean that the existing model of executive would need to be entirely replaced. Owing to these 	practical implementation issues consensus was built over adoption of the existing executive model, but with more safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Safeguards proposed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. &lt;i&gt;A redressal tribunal:&lt;/i&gt; Establishing a tribunal for the redressal of interception complaints. The tribunal could be a non-active body. Such a 	model would be different from other models adopted around the world - for example e in UK a designated tribunal suo-motu reviews cases on a regular basis. 	The tribunal could also have judicial review authority, to which one of the participants raised an issue that the tribunals usually will not have the power 	of Judicial review, however the chair assured him that the delegation of Judicial review to a tribunal does exist in Indian law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;i&gt;A review commission:&lt;/i&gt; Establishing a commission to review the interceptions carried out on the orders of home secretary. For such an overseeing 	body, the commissioner should be appointed independently. The commissioner must be a Judge or a senior Lawyer and should report to the Parliament.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Content data and Metadata&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In the next session the chair explained the difference between content data and metadata while initiating discussion on provisions addressing them in the 	proposed Bill. Content data, also called as payload data, is the actual content of the communication which takes place between X and Y.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Example 1:&lt;/i&gt; In the VOIP call the voice is packetized and sent in different packets to the destination, the content of that packet is the content data whereas the 	information of this content i.e the header, footer and checksum of the packet is the metadata.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Example 2:&lt;/i&gt; In the serial communication of the normal phone call the content data will be what the communication happened between two or more people over the call and 	the metadata will be who were involved in the call, on what date and time the call was made from which place, and under which tower.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was noted that generally it is easier to intercept metadata than content data. In the proposed bill, section 2 (C) refers to the definition of content 	data and section 2(E) to metadata.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participants also pointed out that often it is with metadata that concerned governmental authorities are able to carry out tracking. Thus, when determining 	procedural safeguards for surveillance - and specifically for interception - the question of whether or not content data and meta data should be treated 	the same under law must be addressed. Participants suggested looking into German laws, which have procedure to deal with this question. Despite differences 	over the exact level of protection meta data should legally be afforded, participants agreed that a higher authority should be responsible for the 	interception, collection, and access to metadata and content data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, because the existing legal framework in India has different standards for different modes of communication, it is proposed that a uniform legal 	framework be created by harmonizing the three Acts through amendments or overriding existing legislation regulating surveillance in India, and establishing 	a new framework under a Privacy legislation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Big Data, Cloud &amp;amp; OTT&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In this session a participant raised the issue of Big data and Cloud services, and asked whether the CIS Privacy Protection Bill or the draft Privacy Bill 	from the government addresses this issue. This question was of particular relevance because a number of the cloud data centres are located in locations 	outside India. Thus a question of jurisdiction arises. The participant opined that in the coming years and with the new government's vision to have space 	for every citizen in cloud and data localisation being priority, he stressed that the Bill should clearly address issues related to the cloud, big data, 	outsourcing, and questions of jurisdiction. Responding to this the chair was of the view that the crimes committed outside the territory of India come 	under Extra-territorial law, section 4 of IPC and Section 188 Cr. P.C. But it was noted that due to the fact that the crime is committed outside the 	territory of India, despite the provision, it is practically not implementable unless there is a contract between countries or a treaty signed. The 	solution could be data localisation, hosting the cloud servers in India, but that again has its own pros &amp;amp; cons. In response participants indicated 	that if a choice had to be made about data localization - the best option would be one that would be economical for Indian business and the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;OTT (Over the Top) Services &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another participant brought to the notice of the meeting that most of the networks of service provider's are adopting IP (Internet Protocol). In the 	context of surveillance, this means that for an interception to take place, Deep Packet Inspection (DPI) must be adopted by service providers. This is 	currently placing a burden on service providers, as it is costly and the connection time of the calls for the number under surveillance increases - though 	not enough to be noticed by customers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Telephone Tapping Process&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In India the process of intercepting telephones can be broken down into the following three steps:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Authorization&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. The Home Secretary issues an authorization for an interception request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. The Authorization is handed over to Police Officer in charge of the investigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. The Police Officer serves the order to the nodal officer in the relevant service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. The service provider conducts the interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. The intercepted data is handed over to the Police officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Rule 419A, a committee to review the authorization exists, comprising of officials such as the Cabinet Secretary, Secretary of the Department of 	Telecommunications, Secretary of the Department of Law and Justice and the Secretary of Information Technology and Communication ministry at the Centre and 	the Chief Secretary, the Law Secretary and an officer not below the rank of a Principal secretary at the State level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the current infrastructure of telecom and broadband is with private service providers, the government is dependent on service providers to carry out 	surveillance. As national security is a concern of the government and because in the past intercepted material has been leaked by various sources, the 	government has proposed to replace the existing system. In this regard the government has proposed to set up a Central Monitoring System (CMS) for the 	interception of voice and data communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is proposed that the CMS infrastructure will be positioned at the service provider's facilities, and will allow governmental agencies to directly 	intercept traffic on the network of service providers - thus there would no longer be a need for the government to reply on service providers to carry out 	interception requests. During the meeting it was discussed how this system has pros &amp;amp; cons&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pros&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. For private companies it eliminates an entire level of compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. It will reduce the possibility of unlawful, extra legal, &amp;amp; fraudulent authorizations of interception requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. The interception carried out would be maintained in a log, which would clearly recorded, making the interception process becomes accountable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cons&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Even though the existing system gives room for leaks, ironically it is the only way through which a person who is tapped will come to know, hence 	accounting for some transparency eg: &lt;i&gt;Nira Radia&lt;/i&gt; &amp;amp; &lt;i&gt;Amar Singh&lt;/i&gt; phone Tap case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. CMS will be built upon an existing interception framework, which is not procedurally fair - because of issues such as Internal Authorization, Adhoc 	procedure, that it is not under the ambit of RTI etc. This will result in a system with no transparency and accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To this last point the Chair noted that in 2011 there were 7.5 Lakh phone taps by a single agency which was reportedly illegal. In an attempt to minimize 	such brazen violations a Privacy Bill is mooted and the round table conference is a step towards making it possible.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Immunity to TSP's &amp;amp; ISP's&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Participants also raised the issue of difficulties that TSPs face while engaged in the process of interception, as they are caught between the customers 	and government authorities and subjected to harassment sometimes. This places service providers in a position where they must often make a number of 	compromises as they are expected to store traffic data for a specified period of time, but sometimes a judge might ask for access to data that is dated 	past the specific retention period. In such a scenario, service providers must provide it by accessing backup data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question of who should be the custodian of intercepted data was raised by participants as well as who should be held accountable if intercepted data is 	leaked into the public domain. The chair responded that the officers investigating the case should be held accountable for the intercepted data. This would 	be analogous to the system under the Right to Information Act whereby the Information officer is named and held accountable for the data or information he 	provides. Similarly, for the case of intercepted material, an officer should be named and held accountable for the data and ensuring that it reaches those 	that it is legally intended to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was also expressed that a market regulator, responsible for the safeguarding the interest of communication service providers, could be appointed for 	handling the personal data. Such a role could be merged with the traditional role of a Data Protection Authority and could be the first step towards an 	information security and assurance regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legal immunity given to service providers was also discussed, as there was a general concern about the position service providers find themselves in - 	being held legally liable for not complying with orders from the government and being taken to court by citizens.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Format of Interception Orders and Interception as a service&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A question was also posed to participants about what information ideally - apart from the intended duration of the order - should be incorporated into 	interception orders. Participants suggested that the order should be as specific and precise as possible, which the existing format to a large extent 	confirms. On the topic, a participant noted that in some cases, despite DoPT guidelines, interception orders are issued in regional languages. This can 	pose as a problem as the nodal officer might not know the language, thus leading to possible ambiguity &amp;amp; misinterpretation of the order. Participants 	suggested that orders should be in English.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participants also pointed out that in most European countries - like France and Italy - a fee for the compliance cost arising out of implementing an 	interception order is paid to service providers by the government. In India, huge costs are involved in carrying out interceptions which service providers 	presently have to bare. As law enforcement and security agencies ask for more and more accuracy in surveillance, the charges of carrying out surveillance. 	To address this, participants suggested that interception as a service should be accommodated in the proposed Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The discussions in the Surveillance and Privacy Roundtable in New Delhi mainly revolved around the authorization model and the process of interception. 	Overall, participants agreed on an organised executive model with an established accountability and review system. Also discussed was how to ensure that 	service providers are legally protected from disproportionate and unwarranted penalties. Towards this, the interception process should be viewed as a 	service rather than an obligation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables'&gt;https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>manoj</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-27T13:34:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/businessworld-november-25-2014-leave-the-net-alone">
    <title>Leave the Net Alone</title>
    <link>https://cis-india.org/internet-governance/news/businessworld-november-25-2014-leave-the-net-alone</link>
    <description>
        &lt;b&gt;The Internet, like the air we breathe, has traditionally been neutral ground. Nobody is allowed to buy preferential treatment on the Internet. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This story was published in BW | &lt;a class="external-link" href="http://www.businessworld.in/news/business/internet/leave-the-net-alone/1635693/page-1.html"&gt;Businessworld&lt;/a&gt; Issue Dated 15-12-2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“The Internet is currently not broke, and the FCC is out to fix it,”  began John Oliver, American talk-show host and comedian, introducing his  show’s discussion on Net neutrality. America’s telecom regulator Federal  Communications Council (FCC) had just proposed allowing Internet  carriers to give preference on their network to websites in exchange for  a fee. &lt;br /&gt; &lt;br /&gt;For example, in an Indian context, if BW| Businessworld was to,  hypothetically, pay Airtel a fee, and Airtel were to, in turn, give  priority access to the website, it might be natural to argue that  eventually, Airtel subscribers would prefer BW|Businessworld’s website  over its rivals’. &lt;br /&gt; &lt;br /&gt;The Internet, like the air we breathe, has traditionally been neutral  ground. Nobody (read, no corporate) is allowed to buy preferential  treatment on the Internet. “The point of Net neutrality is that on the  Internet you cannot have discrimination on where the information is  originating from or who is the consumer,” says Mihir Parikh, partner at  law firm Nishith Desai Associates. He compares it to telephone networks  where calls get connected on a first-come basis. Nobody has a  predominant right over call connections. &lt;br /&gt; &lt;br /&gt;And that is exactly what the FCC’s proposals threatens to change, by  allowing American carriers such as Verizon or Comcast to charge a fee to  give priority on their network to fee payers, like, for example, Daily  Motion, which would then get an advantage over rival YouTube. On 10  September, several websites including Mozilla and Netflix deliberately  slowed down their sites to show how a slow Internet would look like.  Last week, US president Barack Obama put his weight behind a free  Internet, where nobody can pay ‘their way up’. The FCC will make its  final recommendations next year. &lt;br /&gt; &lt;br /&gt;While an Indian browsing the Net is not likely to be affected by the FCC  recommendations, it is possible that the transmission of less favoured  US-based websites do not get priority, thereby slowing access to them,  says Parikh. &lt;br /&gt; &lt;br /&gt;But the episode calls attention to the picture in India. “There are no  specific laws that speak to the Net neutrality situation in India,” says  Sunil Abraham of Centre for Internet Security. So it could be possible  that carriers are already censoring speeds to certain services that take  up heavy bandwidth. Slow speeds for torrent downloads are an example.  Abraham calls for crowd sourced, technically sound research to explore  whether carriers are engaging in such practices, as a prelude to  petitioning the government for enlightened regulation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/businessworld-november-25-2014-leave-the-net-alone'&gt;https://cis-india.org/internet-governance/news/businessworld-november-25-2014-leave-the-net-alone&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-07T04:12:40Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/mumbai-mirror-november-19-2014-jaison-lewis-game-release-cancelled-over-gay-character">
    <title>Game release cancelled over gay character</title>
    <link>https://cis-india.org/internet-governance/news/mumbai-mirror-november-19-2014-jaison-lewis-game-release-cancelled-over-gay-character</link>
    <description>
        &lt;b&gt;Electronic Arts stops accepting preorders for Dragon Age: Inquisition.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Jaison Lewis was &lt;a class="external-link" href="http://www.mumbaimirror.com/mumbai/cover-story/Game-release-cancelled-over-gay-character/articleshow/45197190.cms"&gt;published in Mumbai Mirror&lt;/a&gt; on November 19, 2014. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span id="advenueINTEXT"&gt;In a city where just about  any kid above the age of five who can afford to do so has played Grand  Theft Auto, with its profusion of violence and profanity, it appears  unlikely that a game would ever be withdrawn from release owing to  explicit content. But when Electronic Arts (EA), creators of several  such titles, decide to cancel the release of a game in India because it  features a gay character and sequences of gay sex, there are bound to be  fiery debates about censorship, moral policing, and the prevalence of  gratuitous violence in games. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;EA have withdrawn  pre-orders for Dragon Age: Inquisition, a role playing franchise in  which you play a character that you create - one such role is that of  Dorian, who is gay and who is featured in sequences involving gay sex.  EA is now in the process of refunding the money (Rs 3,499 for the  standard edition (PC) and Rs 4,000 for the collectors' edition (PC))  that gamers in India paid to have access to Dragon Age when it is  released on November 21. &lt;br /&gt;&lt;br /&gt; Milestone Interactive, the company  that distributes EA titles in India, has cancelled several pre-orders  for the game that were booked through their website. However, a bulk of  the PC pre-orders were made on EA's Origin software, a Windows  application that lets gamers buy and play games directly from the  company. Electronic Arts issued the following official statement to its  Origin users in India, Bangladesh and Pakistan. "In order to avoid a  breach of local content laws, EA has withdrawn Dragon Age: Inquisition  from sale in India and the game is no longer available for pre-order.  Customers who pre-ordered the game will be contacted directly and will  be fully refunded." &lt;br /&gt;&lt;br /&gt; Though the local laws that applied were not  mentioned, several online websites managed to obtain reactions from EA  that implied the game's homosexual content was to blame, with mention of  Section 377, which criminalises gay sex. &lt;br /&gt;&lt;br /&gt; The Entertainment  Software Rating Board (ESRB), a self-regulatory organisation based in  New York, has classified Dragon Age as Mature, and, according to their  online rating information, it "includes some sexual material: a female  character briefly depicted in front of a man's torso (fellatio is  implied); characters depicted topless or with exposed buttocks while  lying in bed or after sex; some dialogue referencing sex/sexuality. The  words "f**k," "sh*t," and "a*shole" appear in dialogue." &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;LGBT rights activist Aditya Bandopadhyay, said he believes EA could have withdrawn the game under pressure from the government. &lt;br /&gt;&lt;br /&gt; "Self-censorship by corporations is even more insidious than censorship  by the government, since the latter can be challenged in courts and has  to abide within the limits set out within Article 19 of the  Constitution, the former cannot be challenged at all except morally,  "said Pranesh Prakash, member, The centre for internet and society. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span id="advenueINTEXT"&gt;"There can be no defence offered to the offensive instance of  self-censorship by Electronic Arts, and is a slap against the fight by  the LGBTQ community in India against oppressive colonial laws and mores.  As Vikram Seth put it, it is homophobia that came into India, not  homosexuality. It is homophobia that is unnatural and which militates  against Indian morality. Under Article 19(1)(a), the government can be  read to have a positive obligation to ensure an environment where  freedom of speech and expression is guaranteed, so I call upon the  government to speak out against the decision taken by Electronic Arts, "  added Prakash. &lt;br /&gt;&lt;br /&gt; "By way of legal background: Homosexuality as a  gender identity is not illegal in India, while there is a case pending  in the Supreme Court as to the criminality of engaging in 'unnatural'  sexual intercourse. This law cannot possibly be read to hold that the  public display of homosexuality in art is unlawful," he said &lt;br /&gt;&lt;br /&gt; EA  representatives were unwilling to discuss the game or the reasons for  it being withdrawn from the market in India. "We are going to decline  any further info beyond our statement," a spokesperson said.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/mumbai-mirror-november-19-2014-jaison-lewis-game-release-cancelled-over-gay-character'&gt;https://cis-india.org/internet-governance/news/mumbai-mirror-november-19-2014-jaison-lewis-game-release-cancelled-over-gay-character&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2014-11-22T00:24:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/iocose-talk-at-cis">
    <title>IOCOSE's talk at CIS</title>
    <link>https://cis-india.org/internet-governance/events/iocose-talk-at-cis</link>
    <description>
        &lt;b&gt;Please join us at the Centre for Internet and Society in Bangalore on Thursday, November 27, 2014 at 7 p.m. for a presentation of the work of the artists group IOCOSE, current artists in residence at T.A.J./SKE Residency. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;What is the life of a drone 'in times of peace'? What are the creative potential of a drone? Drones do not have such a thing as a ‘life’. But what if?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The title of our project, 'In Times of Peace' refers to Paul Virilio's theory of logistics (Pure War, 1983).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Quoting an article published by the Pentagon in late '40s, the theorist highlighted the fact that the text presented logistics as the procedure for which the potential of a nation lies in its armed forces, 'in times of peace' as in times of war.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what does it mean to live 'in times of peace'? And what does this mean for a drone?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The talk will open with the announcement of the winner of the NoTube Contest 2014 which will be held at the Sree Venkateshwara Cyber Cafe in Bangalore on the very same day.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;IOCOSE&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;IOCOSE is a collective of four artists who has been working in Italy and Europe since 2006. It organises actions in order to subvert ideologies, practices and processes of identification and production of meanings. It uses pranks and hoaxes as tactical means, as joyful and sound tools. IOCOSE thinks about the streets, internet and word of mouth as a battlefield. Tactics such as mimesis and trickery are used to lead and delude the audience into a semantic pitfall. IOCOSE’s work has been shown internationally, such as at Jeu de Paume (Paris, France; 2011); Tate Modern (London, UK; 2011), Festival Nrmal, (Monterrey, Mexico; 2011); Furtherfield Gallery (London, UK; 2012); Venice Biennal (Italy; 2011), Macro (Rome, Italy; 2012); CLICK Festival (Helsingor, Denmark; 2013); Science gallery (Dublin, Ireland, 2012), &lt;a class="external-link" href="http://www.iocose.org"&gt;http://www.iocose.org &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;T.A.J. RESIDENCY &amp;amp; SKE PROJECTS&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;T.A.J. RESIDENCY &amp;amp; SKE PROJECTS is a residency program established in 2013 as a collaborative project between a visual artist and a gallerist. Intended as an interdisciplinary residency, it has already hosted visual artists, curators, academics, scientists, fiction writers and journalists. There is always one visual artist in residence. The residency program is also open to applicants from the fields of architecture, design, music, film, performing arts and education, &lt;a class="external-link" href="http://t-a-j.in"&gt;http://t-a-j.in &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Marialaura Ghidini&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Marialaura is a curator, researcher and writer. She is the founder director of &lt;a href="http://www.or-bits.com" target="_blank"&gt; &lt;span style="text-decoration: underline;"&gt;or-bits.com&lt;/span&gt;&lt;/a&gt; since 2009. Currently she is AHRC-doctoral researcher with &lt;a href="http://www.crumbweb.org" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;CRUMB (Curatorial Upstart Media Bliss)&lt;/span&gt;&lt;/a&gt; at the University of Sunderland.  Based in London, UK, from Brescia, Italy. She can be contacted at &lt;a class="mail-link" href="mailto:mlghidini@gmail.com"&gt;mlghidini@gmail.com&lt;/a&gt;&lt;/p&gt;
&lt;div class="locked object resizable text" id="index.head.134052969195" style="text-align: center; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/iocose-talk-at-cis'&gt;https://cis-india.org/internet-governance/events/iocose-talk-at-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-25T01:02:24Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance">
    <title>Privacy, security and surveillance: tackling international dilemmas and dangers in the digital realm</title>
    <link>https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance</link>
    <description>
        &lt;b&gt;Pranesh Prakash was a panelist in the session "Beyond the familiar: how do other countries deal with security and surveillance oversight?" The event was organized by Wilton Park between November 17 and 19, 2014.&lt;/b&gt;
        &lt;p&gt;Complete details of the programme can be &lt;a class="external-link" href="https://www.wiltonpark.org.uk/wp-content/uploads/WP1361-programme.pdf"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance'&gt;https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-15T12:56:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-times-november-18-2014-pranesh-prakash-the-socratic-debate-whos-internet-is-it-anyway">
    <title>The Socratic debate: Whose internet is it anyway?</title>
    <link>https://cis-india.org/internet-governance/blog/economic-times-november-18-2014-pranesh-prakash-the-socratic-debate-whos-internet-is-it-anyway</link>
    <description>
        &lt;b&gt;In the US, President Obama recently spoke out on the seemingly arcane topic of net neutrality. What is more astounding is that the popular satire news show host John Oliver spent a 13-minute segment talking about it in June, telling Internet trolls to “focus your indiscriminate rage in a useful direction” by visiting the US Federal Communications Commission’s (FCC) website and submitting comments on its weak draft proposal on net neutrality.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The &lt;a class="external-link" href="http://blogs.economictimes.indiatimes.com/et-citings/the-socratic-debate-whose-internet-is-it-anyway/"&gt;article was published in the Economic Times&lt;/a&gt; on November 18, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Due to the work of activists, popular media coverage, pro-net neutrality  technology companies, and John Oliver, eventually the FCC received 1.1  million responses. Text analysis by the Sunlight Foundation using  natural language processing found that only 1% of the responses were  clearly opposed to net neutrality. So millions of people in the US are  both aware and care about this issue. But the general response in India  would be: what is net neutrality and why should I be concerned?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Net neutrality is commonly described as the principle of ensuring that  there is no discrimination between the different ‘packets’ that an  Internet service provider (ISP) carries. That means that the traffic  from NDTV should be treated equally by Reliance Infocomm as the traffic  from Network 18’s CNNIBN; that even if Facebook wants to pay Airtel to  deliver Whatsapp’s packets faster than Viber’s, Airtel may not do so;  that peer-to-peer traffic is not throttled; that Facebook will not be  able to pay Airtel to keep its subscribers bound within its walled  gardens; and also that Airtel can’t claim to be providing Internet  access while restricting that to only Facebook or Whatsapp.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The counter to this by telecom companies the world over, which has  little evidence backing it, is primarily two-fold: first, one of equity —  that it is ‘unfair’ for the likes of YouTube to get a ‘free ride’ on  Airtel networks, hogging up bandwidth but not paying them; and second,  that of economic incentives — networks are bleeding money due to  services like WhatsApp and Skype replacing SMS and voice, and not being  able to charge them will lead to a decrease in profitability and network  expansion. The first claim is based on a myth of the ‘free ride’, while  the reality is that subscribers who download more also pay the ISP  more, while contentemitting companies also have to pay their network  providers as per the traffic they generate, and those network providers,  in turn, have to enter into ‘transit’ or ‘peering’ agreements with the  ISPs that eventually provide access to consumers. The second claim has  little evidence to back it up. Efficient competition is the best driver  of both profit as well as network expansion. VSNL complained about  services like Net2Phone in the 1990s and even filtered all voice-over-IP  (VoIP) traffic — and illegally blocked a number of VoIP websites — to  preserve its monopoly over international telephony. Instead, removing  VSNL’s monopoly only benefited our nation. As for network expansion, it  is inability of networks to profit from sparsely populated rural areas  that poses a major roadblock. Fixing those problems require smart  pricing by telecom companies and intelligent regulation, including  exploring policy options like shared spectrum, but they do not  necessarily require the abandoning of net neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the fact that the reasons telecom companies often provide  against net neutrality are bogus doesn’t mean that it’s easy to ensure  net neutrality. The Trai has been exploring this issue by holding a  seminar on OTT services. However, the main focus of the discussions were  not whether and how India should ensure net neutrality: it was on  whether the government should regulate services like WhatsApp and bring  them under the licence Raj. Yes, the debate going around in the  regulatory circles is whether India should implement rules to ensure net  non-neutrality so as favour telecom companies! Net neutrality is a  difficult issue in regulatory terms since there is no common  understanding among academics and activists of what all should fall  under its ambit: only the ‘last mile’ or interconnection as well?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy dialogue in India is far removed from this and from  considering the nuanced positions of anti-net neutrality scholars, such  as Christopher Yoo, who raise concerns about the harms to innovation and  the free market that would be caused by mandating net neutrality. The  situation in India is much more dire, since blatant violations of net  neutrality — howsoever defined — are already happening with Airtel  launching its ‘One Touch Internet’, a limited walled garden approach  that lies about offering access to the ‘Internet’ while only offering  access to a few services based on secretive agreements with other  companies. Mark Zuckerberg, the founder of Facebook, recently toured  India talking about his grand vision of providing connectivity to the  bottom half of the pyramid yet did not talk about how that connectivity  would not be to the Internet, but will be limited to only a few services  — including Facebook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if we had good laws in favour of net neutrality, without effective  monitoring and forceful action by the government, they will amount to  little. s. Undoubtedly the contours of the conversation that needs to  happen in India over net neutrality will be different from that  happening in more developed countries with higher levels of Internet  penetration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However it is a cause of grave concern that while net neutrality is  being brutally battered by telecom companies in the absence of any  regulation, they are also seeking to legitimize their battery through  regulation. It is time the direction of the conversation changed.  Perhaps we should invite John Oliver over.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-times-november-18-2014-pranesh-prakash-the-socratic-debate-whos-internet-is-it-anyway'&gt;https://cis-india.org/internet-governance/blog/economic-times-november-18-2014-pranesh-prakash-the-socratic-debate-whos-internet-is-it-anyway&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-09T13:35:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ground-zero-summit-2014">
    <title>Ground Zero Summit 2014</title>
    <link>https://cis-india.org/internet-governance/news/ground-zero-summit-2014</link>
    <description>
        &lt;b&gt;Geeta Hariharan participated in this event organized by India Infosec Consortium on November 13 and 14, 2014 in New Delhi.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Living from the successes of last year and our recent conference in Colombo, Ground Zero Summit 2014, in its second year promises to be Asia's largest information security gathering and proposes to be the ultimate platform for showcasing researches and sharing knowledge in the field of cyber security. The event will feature a panel discussion on cyber diplomacy.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/ground-zero.pdf" class="external-link"&gt;Click to read more about the event&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ground-zero-summit-2014'&gt;https://cis-india.org/internet-governance/news/ground-zero-summit-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-05T00:42:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill">
    <title>Fourth Discussion Meeting of the Expert Committee to Discuss the Draft Human DNA Profiling Bill</title>
    <link>https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill</link>
    <description>
        &lt;b&gt;The fourth expert committee meeting was held on November 10, 2014 at the Department of Biotechnology to discuss the potential privacy concerns of the draft Human DNA Profiling Bill. Sunil Abraham however was unable to participate because of technical problems.&lt;/b&gt;
        &lt;h2&gt;Agenda&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Welcome and opening remarks by the Secretary, DBT &lt;/li&gt;
&lt;li&gt;Remarks by the Chairman - Dr. T.S. Rao, Senior Adviser, DBT &lt;/li&gt;
&lt;li&gt;A brief overview on deliberations and decisions of Hon’ble Supreme Court - Dr. Alka Sharma, Director, DBT &lt;/li&gt;
&lt;li&gt;Discussion and finalization of the Bill by the members&lt;/li&gt;
&lt;li&gt;Recommendations  of the Expert Committee&lt;/li&gt;
&lt;li&gt;Any other item with the permission of the Chairman.&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/dna-profiling-bill-meeting-documents.zip/view" class="external-link"&gt;Click here&lt;/a&gt; (Zip file, 2698 Kb) to download the following resources from earlier meetings:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Record note of discussions of the Expert Committee Meeting held on January 31, 2013 at DBT, New Delhi, to discuss the potential privacy concerns on draft Human DNA Profiling Bill.&lt;/li&gt;
&lt;li&gt;Annexure 1 to Record note: Draft Human DNA Profiling Bill 2012: The Privacy Issues and Concerns&lt;/li&gt;
&lt;li&gt;Annexure 2 to Record note: Short background note on the draft Human DNA Profiling Bill&lt;/li&gt;
&lt;li&gt;Record note of the 2nd discussion meeting of the Expert Committee held on May 13, 2013 in DBT to discuss the draft Human DNA Profiling Bill&lt;/li&gt;
&lt;li&gt;Minutes of the 3rd meeting of the Expert Committee held on November 25, 2013 in DBT to discuss the draft Human DNA Profiling Bill&lt;/li&gt;
&lt;li&gt;Record note of the discussions of the Experts Sub-committee Meeting on Human DNA Profiling Bill held on September 3, 2013 at CPFD, Hyderabad&lt;/li&gt;
&lt;li&gt;Affidavit on behalf of DBT&lt;/li&gt;
&lt;li&gt;Human Draft DNA Profiling Bill 2012 (Working Draft Version, April 29, 2012)&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill'&gt;https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-08T16:07:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy">
    <title>Getting Strategic about Openness and Privacy</title>
    <link>https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy</link>
    <description>
        &lt;b&gt;This blog post by Tim Davies, Open Data Research Lead at Web Foundation was published in Open Up? on November 3, 2014.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Click to read the original post &lt;a class="external-link" href="http://www.openup2014.org/getting-strategic-openness-privacy/"&gt;here&lt;/a&gt;. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Information is powerful.&lt;/b&gt; And in a world where the  amount of information generated, captured and stored has grown  exponentially in recent decades, getting hold of the information you  need, when you need it, relies upon having access to the data that  describes it. That makes the control of data especially powerful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modern transparency initiatives, promoting the idea of open data,  have been seeking to break the data-monopoly of privileged actors within  the state — unlocking key datasets and making them available for public  scrutiny and reducing the information inequalities that undermine open  public discourse. Opening up government data is *one* way in which  citizens can reclaim some power and reestablish the principle that “they  work for us”. Open government data gives us power to know how the  government is spending money, what companies are getting public sector  contracts and licenses, who owns these companies, what profits they make  and what royalties and taxes they pay. Yet, progress has been slow, and  we have faced substantial challenges in securing reliable and  standardised flows of public data that can be joined-up to give a true  picture of how public resources are being used, and key decisions made.  Although millions of public datasets have been placed online, the most  politically salient are often lacking. The &lt;a href="http://www.opendatabarometer.org" target="_blank"&gt;2013 Open Data Barometer &lt;/a&gt;found fewer than 1 in 10 accountability datasets were truly open.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, advocates of building a more open government need  to grapple with three other trends that are shaping discussions of data,  power and the state:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Firstly, and most important, the revelations brought to our  attention by whistleblower Edward Snowden have confirmed the extent of  the secret state and the profound imbalance of power between citizens  and their state created through mass surveillance. Whilst projects to  disclose even basic data on the state like public spending are  underfunded and ad hoc, billions of dollars are poured into tools and  technologies that violate basic human rights and that threaten trust and  security on the Web. Fundamentally the problem with secret mass  surveillance is that it destroys the checks and balances that are meant  to limit the power of the state over citizens.&lt;/li&gt;
&lt;li&gt;Secondly, and in part due to the discussion spared by Snowden,  public awareness of the data, and consequently power, held by  corporations has grown. The Web has become increasingly centralised, and  large companies now harvest large amounts of data on any individual  technology user. In parallel, in some countries such as the UK,  governments have sought to use open data agendas as cover for increased  proprietary sharing of public data with private firms, seeking to go  around established principles of consent to share publicly held health,  tax or student records with profit-making firms. Such data-sharing is  not inherently wrong if there are public benefits, but building citizen  trust in the state’s stewardship of personal data, and ensuring  safeguards are in place to warrant that trust, is a major challenge.&lt;/li&gt;
&lt;li&gt;Thirdly, concerns have been raised that some of the data  released through open data initiatives may also affect the privacy of  citizens. Some aggregated and anonymised datasets can be combined with  other data to reverse engineer identifiable information. Although early  calls for “raw data now” were clear that they were not calling for open  personal information, in practice the divide between personal and public  can be a narrow one.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;So, do these trends mean we should be more cautious about opening up?  Should the balance swing back towards a focus on protecting privacy?  Ultimately, a simple opposition of privacy and openness is a false  dichotomy. The question is not should we focus on openness, or should we  protect privacy: but is &lt;i&gt;Who should be open? And how?&lt;/i&gt; &lt;i&gt;And whose privacy should be protected, and how?&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, of the Centre for Internet and Society in Bangalore, has offered a key solution in the idea that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Transparency should be proportional to power, privacy inversely so.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is on this basis that organisations working for a fairer future,  with more vibrant public discourse, greater freedom, and better  governments, can campaign for both privacy and openness together. Those  who occupy public office, own companies, or tender for public contracts  must accept that there is a legitimate public interest in information  about their activities in these roles, whilst independent citizens must  be afforded space to form views and live lives without constant state  surveillance. Companies should not be considered to have a right to  privacy: their interests are already protected by other laws and  provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To deliver effective openness through open data, the Web Foundation is working to &lt;a href="http://www.opendataresearch.org/reports/" target="_blank"&gt;understand how data gets used on the ground in different settings across the world&lt;/a&gt;,  and, with Omidyar support, is working on the creation of inclusive open  data standards for public contracting data. Standards like the &lt;a href="http://standard.open-contracting.org/" target="_blank"&gt;Open Contracting Data Standard&lt;/a&gt; are part of building a new infrastructure of open governance, making it  possible to join-up data from different places, helping tilt the  balance of power towards citizens when it comes to scrutinising  governments and corporations. Through the &lt;a href="http://www.opendatabarometer.org" target="_blank"&gt;Open Data Barometer&lt;/a&gt; we keep track of the availability of key datasets that can be used for accountability, and we’re co-chairing the &lt;a href="http://www.opengovpartnership.org/groups/opendata/" target="_blank"&gt;Open Government Partnership Open Data Working Group&lt;/a&gt;, seeking to set high standards for relevant and usable data disclosures by governments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By focussing on the civic use of data, we can better identify those  datasets that must be in the public domain. And by thinking about  relative power when considering privacy we can address genuine privacy  concerns, whilst not allowing corporations claiming privacy rights, or  public figures trying to hide their financial interests, from  diminishing the power of data to enable accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, the Web Foundation leads the &lt;a href="http://www.google.com/url?q=http://webwewant.org/&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNFavRxYWPtWx7osZ9Psx24eNHkmWw" target="_blank"&gt;Web We Want campaign&lt;/a&gt;,  challenging mass surveillance and seeking to secure a Web where  individuals have the right to privacy, and the tools to secure it. And  increasingly transparency of what the state and companies do with  personal data can help increase the capacity of citizens to respond to  threats to their autonomy, and can increase oversight and safeguards on  state or corporate capacity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ultimately, our ongoing efforts to open up, and to protect individual  freedoms, have to be strategic. And keeping an analysis of power, and  Sunil’s maxim, in mind, provides a good starting point to guide the  strategy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy'&gt;https://cis-india.org/internet-governance/news/open-up-tim-davies-november-3-2014-getting-strategic-about-openness-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-11-09T09:19:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2">
    <title>White Paper on RTI and Privacy V1.2</title>
    <link>https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2</link>
    <description>
        &lt;b&gt;This white paper explores the relationship between privacy and transparency in the context of the right to information in India. Analysing pertinent case law and legislation - the paper highlights how the courts and the law in India address questions of transparency vs. privacy. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Although the right to information is not specifically spelt out in the Constitution of India, 1950, it has been read into Articles 14 (right to equality), 19(1)(a) (freedom of speech and expression) and 21 (right to life) through cases such as &lt;i&gt;Bennet Coleman&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; &lt;i&gt;Tata Press Ltd. &lt;/i&gt;v.&lt;i&gt; Maharashtra Telephone Nigam Ltd.&lt;/i&gt;,&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; etc. The same Articles of the Constitution were also interpreted in &lt;i&gt;Kharak Singh&lt;/i&gt; v.&lt;i&gt;State of U.P.&lt;/i&gt;,&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; &lt;i&gt;Govind&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;,	&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; and a number of other cases, to include within their scope a right to privacy. At the very outset it 	appears that a right to receive information -though achieving greater transparency in public life - could impinge on the right to privacy of certain 	people. The presumed tension between the right to privacy and the right to information has been widely recognized and a framework towards balancing the two 	rights, has been widely discussed across jurisdictions. In India, nowhere is this conflict and the attempt to balance it more evident than under the Right 	to Information Act, 2005 (the "&lt;b&gt;RTI Act&lt;/b&gt;").&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supporting the constitutional right to information enjoyed by the citizens, is the statutorily recognized right to information granted under the RTI Act. 	Any potential infringement of the right to privacy by the provisions of the RTI Act are sought to be balanced by section 8 which provides that no 	information should be disclosed if it creates an unwarranted invasion of the privacy of any individual. This exception states that there is no obligation 	to disclose information which relates to personal information, the disclosure of which has no relationship to any public activity or interest, or which would cause unwarranted invasion of the privacy of the individual unless the larger public interest justifies the disclosure of such information.	&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; The Act further goes on to say that where any information relating to or supplied by a third party and 	treated by that party as confidential, is to be disclosed, the Central Public Information Officer or State Public Information Officer has to give written 	notice to that party within five days of receiving such a request inviting such third party (within ten days) to make its case as to whether such 	information should or should not be disclosed.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A plain reading of section 11 suggests that for the section to apply the following three conditions have to be satisfied, i.e. (i) if the PIO is 	considering disclosing the information (ii) the information relates to the third party or was given to a Public Authority by the third party in confidence; 	and (iii) the third party treated the information to be a confidential. It has been held that in order to satisfy the third part of the test stated above, 	the third party has to be consulted and therefore a notice has to be sent to the third party. Even if the third party claims confidentiality, the proviso 	to the section provides that the information cannot be withheld if the public interest in the disclosure outweighs the possible harm or injury that may be 	caused to the third party, except in cases of trade or commercial secrets.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; The Courts have also held that section 11 should be read keeping in mind the exceptions contained in section 8 (discussed in detail later) and the exceptions contained therein.	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This principle of non disclosure of private information can be found across a number of common law jurisdictions. The United Kingdom's Freedom of 	Information Act, 2000 exempts the disclosure of information where it would violate the data protection principles contained in the Data Protection Act, 	1998 or constitute an actionable breach of confidence.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; The Australian Freedom of Information Act, 1982 	categorizes documents involving unreasonable disclosure of personal information as conditionally exempt i.e. allows for their disclosure unless such 	disclosure would be contrary to public interest.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; The Canadian Access to Information Act also has a provision which allows the authorities to refuse to disclose personal information except in accordance with the provisions of the Canadian Privacy Act.	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An overview of the RTI Act, especially sections 6 to 8 seems to give the impression that the legislature has tried to balance and harmonize conflicting public and private rights and interests by building sufficient safeguards and exceptions to the general principles of disclosure under the Act.	&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; This is why it is generally suggested that section 8, when applied, should be given a strict interpretation as it is a fetter on not only a statutory right granted under the RTI Act but also a pre-existing constitutional right.	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; Logical as this argument may seem and appropriate in some circumstances, it does present a problem 	when dealing with the privacy exception contained in section 8(1)(j). That is because the right to privacy envisaged in this section is also a pre-existing 	constitutional right which has been traced to the same provisions of the Constitution from which the constitutional right of freedom of information 	emanates.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; Therefore there is an ambiguity regarding the treatment and priority given to the privacy 	exception vs. the disclosure mandate in the RTI Act, as it requires the balancing of not only two competing statutory rights but also two constitutional 	rights.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;The Privacy Exception &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As discussed earlier, the purpose of the RTI Act is to increase transparency and ensure that people have access to as much public information as possible. 	Such a right is critical in a democratic country as it allows for accountability of the State and allows individuals to seek out information and make 	informed decisions. However, it seems from the language of the RTI Act that at the time of its drafting the legislature did realize that there would be a 	conflict between the endeavor to provide information and the right to privacy of individuals over the information kept with public authorities, which is 	why a privacy exception was carved into section 8(1)(j) of the Right to Information Act. The Act does not only protect the privacy of the third party who's 	information is at risk of being disclosed, but also the privacy of the applicant. In fact it has now been held that a private respondent need not give 	his/her ID or address as long as the information provided by him/her is sufficient to contact him/her.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is interesting to note that although the RTI Act gives every citizen a right to information, it does not limit this right with a stipulation as to how the information shall be used by the applicant or the reason for which the applicant wants such information.	&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; This lack of a purpose limitation in the Act may have privacy implications as non sensitive personal 	information could be sought from different sources and processed by any person so as to convert such non-sensitive or anonymous information into 	identifiable information which could directly impact the privacy of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The exception in S. 8(1)(j) prohibits the disclosure of personal information for two reasons (i) its disclosure does not relate to any public activity or 	interest or (ii) it would be an unwarranted invasion into privacy. The above two conditions however get trumped if a larger public interest is satisfied by 	the disclosure of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One interesting thing about the exception contained in section 8(1)(j) is that this exception itself has an exception to it in the form of a proviso. The 	proviso says that any information which cannot be denied to the central or state legislature shall not be denied to any person. Since the proviso has been 	placed at the end of sub-section 8(1) which is also the end of clause 8(1)(j), one might be tempted to ask whether this proviso applies only to the privacy 	exception i.e. clause 8(1)(j) or to the entire sub-section 8(1) (which includes other exceptions such as national interest, etc.). This issue was put to 	rest by the Bombay High Court when it held that since the proviso has been put only after clause 8(1)(j) and not before each and every clause, it would not 	apply to the entire sub-section 8(1) but only to clause 8(1)(j), thus ensuring that the exceptions to disclosure other than the right to privacy are not 	restricted by this proviso.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Scope of Proviso to section 8(1)(j)&lt;/b&gt;&lt;br /&gt;Though the courts have agreed that the proviso is applicable only to section 8(1)(j), the import of the proviso to section 8(1)(j) is a little more 	ambiguous and there are conflicting decisions by different High Courts on this point. Whereas the Bombay High Court has laid emphasis on the letter of the proviso and derived strength from the objects and overall scheme of the Act to water down the provisions of section 8(1)(j),	&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; the Delhi High Court has disagreed with such an approach which gives "undue, even overwhelming 	deference" to Parliamentary privilege in seeking information. Such an approach would render the protection under section 8(1)j) meaningless, and the basic 	safeguard bereft of content.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; In the words of the Delhi High Court:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;" 	&lt;i&gt; The proviso has to be only as confined to what it enacts, to the class of information that Parliament can ordinarily seek; if it were held that all 		information relating to all public servants, even private information, can be accessed by Parliament, Section 8(1)(j) would be devoid of any substance, 		because the provision makes no distinction between public and private information. Moreover there is no law which enables Parliament to demand all such 		information; it has to be necessarily in the context of some matter, or investigation. If the reasoning of the Bombay High Court were to be accepted, 		there would be nothing left of the right to privacy, elevated to the status of a fundamental right, by several judgments of the Supreme Court. &lt;/i&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The interpretation given by the Delhi High Court thus ensures that section 8(1)(j) still has some effect, as otherwise the privacy exception would have 	gotten steamrolled by parliamentary privilege and all sorts of information such as Income Tax Returns, etc. of both private and public individuals would 	have been liable to disclosure under the RTI Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, the RTI Act does not describe the terms "personal information" or "larger public interest" used in section 8(1)(j), which leaves some amount 	of ambiguity in interpreting the privacy exception to the RTI Act. Therefore the only option for anyone to understand these terms in greater depth is to 	discuss and analyse the case laws developed by the Hon'ble Supreme Court and the High Courts which have tried to throw some light on this issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We shall discuss some of these landmark judgments to understand the interpretations given to these terms and then move on to specific instances where 	(applying these principles) information has been disclosed or denied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Personal Information&lt;/b&gt;&lt;br /&gt;The RTI Act defines the term information but does not define the term "personal information". Therefore one has to rely on judicial pronouncements to 	understand the term a more clearly. Looking at the common understanding and dictionary meaning of "personal" as well as the definition of "information" 	contained in the RTI Act it could be said that personal information would be information, information that pertains to a person and as such it takes into 	its fold possibly every kind of information relating to the person. Now, such personal information of the person may, or may not, have relation to any public activity, or to public interest. At the same time, such personal information may, or may not, be private to the person.	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Delhi High Court has tried to draw a distinction between the term "private information" which encompasses the personal intimacies of the home, the 	family, marriage, motherhood, procreation, child rearing and of the like nature and "personal information" which would be any information that pertains to an individual. This would logically imply that all private information would be part of personal information but not the other way round.	&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; The term 'personal information' has in other cases, been variously described as "identity particulars 	of public servants, i.e. details such as their dates of birth, personal identification numbers",&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt; and as 	including tax returns, medical records etc.&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; It is worth noting that just because the term used is 	"personal information" does not mean that the information always has to relate to an actual person, but may even be a juristic entity such as a trust or 	corporation, etc.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Larger Public Interest&lt;/b&gt;&lt;br /&gt;The term larger public interest has not been discussed or defined in the RTI Act, however the Courts have developed some tests to determine if in a given 	situation, personal information should be disclosed in the larger public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whenever a Public Information Officer is asked for personal information about any person, it has to balance the competing claims of the privacy of the 	third party on the one hand and claim of public interest on the other and determine whether the public interest in such a disclosure satisfies violating a 	person's privacy. The expression "public interest" is not capable of a precise definition and does not have a rigid meaning. It is therefore an elastic 	term and takes its colors from the statute in which it occurs, the concept varying with the time and the state of the society and its needs. This seems to 	be the reason why the legislature and even the Courts have shied away from a precise definition of "public interest". However, the term public interest 	does not mean something that is merely interesting or satisfies the curiosity or love of information or amusement; but something in which a class of the 	community have some interest by which their rights or liabilities are affected.&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have been suggestions that the use of the word "larger" before the term "public interest" denotes that the public interest involved should serve a 	large section of the society and not just a small section of it, i.e. if the information has a bearing on the economy, the moral values in the society; the 	environment; national safety, or the like, the same would qualify as "larger public interest".&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; However 	this is not a very well supported theory and the usage of the term "larger public interest" cannot be given such a narrow meaning, for example what if the 	disclosure of the information could save the lives of only 10 people or even just 5 children? Would the information not be released just because it 	violates one person's right to privacy and there is not a significant number of lives at stake? This does not seem to be what all the cases on the right to privacy, right from &lt;i&gt;Kharak Singh&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;b&gt;[27]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; all the way to &lt;i&gt;Naz Foundation&lt;/i&gt;,	&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt; seem to suggest. Infact, in the very same judgment where the above interpretation has been suggested, 	the Court undermines this argument by giving the example of a person with a previous crime of sexual assault being employed in an orphanage and says that 	the interest of the small group of children in the orphanage would outweigh the privacy concerns of the individual thus requiring disclosure of all 	information regarding the employee's past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In light of the above understanding of section 8(1)(j), there seem to be two different tests that have been proposed by the Courts, which seem to connote 	the same principle although in different words:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. The test laid down by &lt;i&gt;Union Public Service Commission&lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) The information sought must relate to „Personal information‟ as understood above of a third party. Therefore, if the information sought 	does not qualify as personal information, the exemption would not apply;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Such personal information should relate to a third person, i.e., a person other than the information seeker or the public authority; AND&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) (a) The information sought should not have a relation to any public activity qua such third person, or to public interest. If the information sought 	relates to public activity of the third party, i.e. to his activities falling within the public domain, the exemption would not apply. Similarly, if the 	disclosure of the personal information is found justified in public interest, the exemption would be lifted, otherwise not; OR (b) The disclosure of the information would cause unwarranted invasion of the privacy of the individual, and that there is no larger public interest involved in such disclosure.	&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. The other test was laid down in &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, but in the specific circumstances of disclosure of personal 	information relating to a public official:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) whether the information is deemed to comprise the individual's private details, unrelated to his position in the organization;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) whether the disclosure of the personal information is with the aim of providing knowledge of the proper performance of the duties and tasks assigned 	to the public servant in any specific case; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) whether the disclosure will furnish any information required to establish accountability or transparency in the use of public resources.	&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Constitutional Restrictions&lt;/b&gt;&lt;br /&gt;Since there is not extensive academic discussion on the meaning of the term "larger public interest" or "public interest" as provided in section 8(1)(j), 	one is forced to turn to other sources to get a better idea of these terms. One such source is constitutional law, since the right to privacy, as contained in section 8(1)(j) has its origins in Articles 14,&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; 19(1)(a)	&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt; and 21&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; of the Constitution of India. The 	constitutional right to privacy in India is also not an absolute right and various cases have carved out a number of exceptions to privacy, a perusal of 	which may give some indication as to what may be considered as 'larger public interest', these restrictions are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) Reasonable restrictions can be imposed on the right to privacy in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence;	&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) Reasonable restrictions can be imposed upon the right to privacy either in the interests of the general public or for the protection of the interests of 	any Scheduled Tribe;&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c) The right to privacy can be restricted by procedure established by law which procedure would have to satisfy the test laid down in the	&lt;i&gt;Maneka Gandhi case&lt;/i&gt;.&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d) The right can be restricted if there is an important countervailing interest which is superior;	&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e) It can be restricted if there is a compelling state interest to be served by doing so;	&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;f) It can be restricted in case there is a compelling public interest to be served by doing so;	&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;g) The &lt;i&gt;Rajagopal tests - &lt;/i&gt;This case lays down three exceptions to the rule that a person's private information cannot be published, &lt;i&gt;viz. &lt;/i&gt; i) person voluntarily thrusts himself into controversy or voluntarily raises or invites a controversy, ii) if publication is based on public records other 	than for sexual assault, kidnap and abduction, iii) there is no right to privacy for public officials with respect to their acts and conduct relevant to 	the discharge of their official duties. It must be noted that although the Court talks about public records, it does not use the term 'public domain' and 	thus it is possible that even if a document has been leaked in the public domain and is freely available, if it is not a matter of public record, the right 	to privacy can still be claimed in regard to it.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Section 8(1)(j) in Practice &lt;br /&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussion in the previous chapter regarding the interpretation of section 8(1)(j), though (hopefully) helpful still seems a little abstract without 	specific instances and illustrations to drive home the point. In this chapter we shall endeavor to briefly discuss some specific cases regarding 	information disclosure where the issue of violation of privacy of a third party was raised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Private Information of Public Officials&lt;/b&gt;&lt;br /&gt;Some of the most common problems regarding section 8(1)(j) come up when discussing information (personal or otherwise) regarding public officers. The issue 	comes up because an argument can be made that certain information such as income tax details, financial details, medical records, etc. of public officials 	should be disclosed since it has a bearing on their public activities and disclosure of such information in case of crooked officers would serve the 	interests of transparency and cleaner government (hence serving a larger public interest). Although section 8(1)(j) does not make any distinction between a 	private person and a public servant, a distinction in the way their personal information is treated does appear in reality due to the inherent nature of a public servant. Infact it has sometimes been argued that public servants must waive the right to privacy in favour of transparency.&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt; However this argument has been repeatedly rejected by the Courts,	&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt; just because a person assumes public office does not mean that he/she would automatically lose their 	right to privacy in favour of transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If personal information regarding a public servant is asked for, then a distinction must be made between the information that is inherently personal to the 	person and that which has a connection with his/her public functions. The information exempted under section 8(1)(j) is personal information which is so 	intimately private in nature that the disclosure of the same would not benefit any other person, but would result in the invasion of the privacy of the 	third party.&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt; In short, the Courts have concluded that there can be no blanket rule regarding what 	information can and cannot be disclosed when it comes to a public servant, and the disclosure (or lack of it) would depend upon the circumstances of each 	case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the earlier thinking of the CIC as well as various High Courts of the country was that information regarding disciplinary proceedings and service 	records of public officials is to be treated as public information in order to boost transparency,&lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt; however this line of thinking took almost a U-turn in 2012 after the decision of the Supreme Court in &lt;i&gt;Girish Ramchandra Deshpande &lt;/i&gt;v.	&lt;i&gt;Central Information Commissioner,&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;b&gt;[45]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; and now the prevailing principle is that 	such information is personal information and should not be disclosed unless a larger public interest is would be served by the disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would also be helpful to look at a list of the type of information regarding public servants which has been disclosed in the past, gleaned from various 	cases, to get a better understanding of the prevailing trends in such cases:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Details of postings of public servants at various points of time, since this was not considered as personal information;	&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Copies of posting/ transfer orders of public servants, since it was not considered personal information;	&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Information regarding transfers of colleagues cannot be exempted from disclosure, since disclosure would not cause any unwarranted invasion of 	privacy and non disclosure would defeat the object of the RTI Act;&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Information regarding the criteria adopted and the marks allotted to various academic qualifications, experience and interview in selection process 	for government posts by the state Public Service Commission;&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Information regarding marks obtained in written test, interview, annual confidential reports of the applicant as well as the marks in the written test and interview of the last candidate selected, since this information was not considered as personal information;	&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Information relating to the appointment and educational certificates of teachers in an educational institution (which satisfies the requirements of being a public authority) was disclosed since this was considered as relevant to them performing their functions.	&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The performance of an employee/officer in an organization is primarily a matter between the employee and the employer and normally those aspects are 	governed by the service rules which fall under the expression "personal information", the disclosure of which has no relationship to any public activity or 	public interest. To understand this better below is a brief list of the type of information that has been considered by the Courts as personal information 	which is liable to be exempt from disclosure under section 8(1)(j):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) (a) Salary details, (b) show cause notice, memo and censure, (c) return of assets and liabilities, (d) details of investment and other related details, 	(e) details of gifts accepted, (f) complete enquiry proceedings, (g) details of income tax returns;&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) All memos issued, show cause notices and orders of censure/punishment etc. are personal information. Cannot be revealed unless a larger public 	interest justifies such disclosure;&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Disciplinary information of an employee is personal information and is exempt under section 8(1)(j);	&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Medical records cannot be disclosed due to section 8(1)(j) as they come under "personal information", unless a larger public interest can be shown 	meriting such disclosure;&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Copy of personnel records and service book (containing Annual Confidential Reports, etc.) of a public servant is personal information and cannot be 	disclosed due to section 8(1)(j);&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Information regarding sexual disorder, DNA test between an officer and his surrogate mother, name of his biological father and step father, name of 	his mother and surrogate step mother and such other aspects were denied by the Courts as such information was considered beyond the perception of decency 	and was an invasion into another man's privacy.&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is not just the issue of disclosure of personal details of public officials that raises complicated questions regarding the right to information, but 	the opposite is equally true, i.e. what about seemingly "public" details of private individuals. A very complicated question arose with regard to 	information relating to the passport details of private individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Passport Information of Private Individuals&lt;/b&gt;&lt;br /&gt;The disclosure of passport details of private individuals is complicated because for a long time there was some confusion because of the treatment to be 	given to passport details, i.e. would its disclosure cause an invasion of privacy since it contains personally identifying information, specially because 	photocopies of the passport are regularly given for various purposes such as travelling, getting a new phone connection, etc. The Central Information 	Commission used a somewhat convoluted logic that since a person providing information relating to his residence and identity while applying for a passport 	was engaging in a public activity therefore such information relates to a public activity and should be disclosed. This view was rejected by the Delhi High Court in the case of &lt;i&gt;Union of India&lt;/i&gt; v. &lt;i&gt;Hardev Singh&lt;/i&gt;,&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt; and the view taken in&lt;i&gt;Hardev Singh&lt;/i&gt; was later endorsed and relied upon in &lt;i&gt;Union of India &lt;/i&gt;v. &lt;i&gt;Rajesh Bhatia&lt;/i&gt;,	&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt; while hearing a number of petitions to decide what details of a third party's passport should be 	disclosed and what should be exempt from disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A list of the Courts conclusions is given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;Information that can be revealed:&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Name of passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Whether a visa was issued to a third party or not;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Details of the passport including dates of first issue, subsequent renewals, dates of application for renewals, numbers of the new passports and date 	of expiry;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Nature of documents submitted as proof;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Name of police station from where verification for passport was done;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Whether any report was called for from the jurisdictional police;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vii) Whether passport was renewed through an agent or through a foreign embassy;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(viii) Whether it was renewed in India or any foreign country;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ix) Whether tatkal facility was availed by the passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;Information that cannot be revealed:&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Contents of the documents submitted with the passport application;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Marital status and name and address of husband;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Whether person's name figures as mother/guardian in the passport of any minor;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Copy of passport application form;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Residential address of passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Details of cases filed/pending against passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vii) Copy of old passport;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(viii) Report of the police and CID for issuing the passport;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ix) Copy of the Verification Certificate, if any such Verification Certificate was relied upon for the issue of the passport.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Instances &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the above two broad categories of information that has been the subject of intense judicial discussion, certain other situations have also 	arisen where the Courts have had to decide the issue of disclosure under section 8(1)(j), a brief summary of such situations is given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) names and details of people who received money as donations from the President out of public funds was considered as information which has a definite 	link to public activities and was therefore liable to be disclosed;&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) information regarding the religion practiced by a person, who is alleged to be a public figure, collected by the Census authorities was not disclosed since it was held that the quest to obtain the information about the religion professed or not professed by a citizen cannot be in any event;	&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) information regarding all FIRs against a person was not protected under section 8(1)(j) since it was already a matter of public record and Court 	record and could not be said to be an invasion of the person's privacy;&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) information regarding the income tax returns of a public charitable trust was held not to be exempt under section 8(1)(j), since the trust involved 	was a public charitable trust functioning under a Scheme formulated by the District Court and registered under the Bombay Public Trust Act as such due to 	its character and activities its tax returns would be in relation to public interest or activities.&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A discussion of the provisions of section 8 and 11 of the RTI Act as well as the case laws under it reveals that the legislature was aware of the dangers 	posed to the privacy of individuals from such a powerful transparency law. However, it did not want the exceptions carved out to protect the privacy of 	individuals to nullify the objects of the RTI Act and therefore drafted the legislation to incorporate the principle that although the RTI Act should not 	be used to violate the privacy of individuals, such an exception will not be applicable if a larger public interest is to be served by the disclosure. This 	principle is in line with other common law jurisdictions such as the U.K, Austalia, Canada, etc. which have similar exceptions based on privacy or 	confidentiality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However it is disappointing to note that the legislature has only left the legislation at the stage of the principle which has left the language of the 	exception very wide and open to varied interpretations. It is understandable that the legislature would try to keep specifics out of the scope of the 	section to make it future proof. It is obvious that it would be impossible for the legislature or the courts to imagine every single circumstance that 	could arise where the right to information and the right to privacy would be at loggerheads. However, such wide and ambiguous drafting has led to cases 	where the Courts and the Central Information Commission have taken opposing views, with the views of the Court obviously prevailing in the end. This was 	illustrated by the issue of disclosure of passport details of private individuals with a large number of CIC cases taking different views till the High 	Court of Delhi gave categorical findings on the issue in the &lt;i&gt;Hardev Singh&lt;/i&gt; and &lt;i&gt;Rajesh Bhatia&lt;/i&gt; cases. Similar was the issue of service 	details of public officials since before the decision of the Supreme Court in the case of &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; in 2012 the prevailing 	thinking of the CIC was that details of disciplinary proceedings against public officials are not covered by section 8(1)(j), however this thinking has now 	taken a U-turn as the Supreme Court's understanding of the right to privacy has taken stronger roots and such information is now outside the scope of the 	RTI Act, unless a larger public interest in the disclosure can be shown.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ambiguity that arises in application when trying to balance the right to privacy against the right to information is a drawback in incorporating only a 	principle and leaving the language ambiguous in any legislation. This paper does not advocate that the legislature try to list out all the instances of 	this problem that are possibly imaginable, this would be too time consuming and may even be counterproductive. However, it is possible for the legislature 	to adopt an accepted practice of legislative drafting and list certain instances where there is an obvious balancing required between the two rights and 	put them as "&lt;i&gt;Illustrations&lt;/i&gt;" to the section. This device has been utilised to great effect by some of the most fundamental legislations in India 	such as the Contract Act, 1872 and the Indian Penal Code, 1860. An alternative to this approach could be to utilize the approach taken in the Australian 	Freedom of Information Act, where the Act itself gives certain factors which should be considered to determine whether access to a particular document 	would be in the public interest or not.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;List of References&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Primary Sources&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Australia Freedom of Information Act, 1982.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;i&gt;Bennet Coleman&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, AIR 1973 SC 106.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;i&gt;Bhagat Singh &lt;/i&gt;v. &lt;i&gt;Chief Information Commissioner, &lt;/i&gt;2008 (64) AIC 284 (Del).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Calcutta High Court, WP (W) No. 33290 of 2013, dated 20-11-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Canadian Access to Information Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Constitution of India, 1950.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. &lt;i&gt;Govind&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. &lt;i&gt;Haryana Public Service Commission &lt;/i&gt;v. &lt;i&gt;State Information Commission, &lt;/i&gt;AIR 2009 P &amp;amp; H 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10. &lt;i&gt;Jamia Millia Islamia v. Sh. Ikramuddin&lt;/i&gt;, Delhi High Court, WP(C) 5677 of 2011 dated 22-11-2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;11. &lt;i&gt;Jitendra Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, 2008 (66) AIC 685 (All).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;12. &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, AIR 1963 SC 129.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;13. &lt;i&gt;Maneka Gandhi &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;, Supreme Court of India, WP No. 231 of 1977, dated 25-01-1978.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;14. &lt;i&gt;Naz Foundation&lt;/i&gt; Delhi High Court, WP(C) No.7455/2001 dated 02-07-2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;15. &lt;i&gt;P.C. Wadhwa&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, Punjab and Haryana High Court, LPA No. 1252 of 2009 dated 29-11-2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;16. &lt;i&gt;Paardarshita Public Welfare Foundation&lt;/i&gt; v. &lt;i&gt;Union of India and others&lt;/i&gt;, AIR 2011 Del 82.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;17. &lt;i&gt;President's Secretariat&lt;/i&gt; v. &lt;i&gt;Nitish Kumar Tripathi&lt;/i&gt;, Delhi High Court, WP (C) 3382 of 2012, dated 14-06-2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;18. &lt;i&gt;Public Information Officer&lt;/i&gt; v. &lt;i&gt;Andhra Pradesh Information Commission&lt;/i&gt;,2009 (76) AIC 854 (AP).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;19. &lt;i&gt;R. Rajagopal v. Union of India&lt;/i&gt;, Supreme Court of India, dated 7-10-1994.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20. &lt;i&gt;Rajendra Vasantlal Shah&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner, New Delhi&lt;/i&gt;, AIR 2011 Guj 70.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;21. &lt;i&gt;Rajinder Jaina&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, 2010 (86) AIC 510 (Del. H.C.).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;22. Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;23. &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;24. &lt;i&gt;Srikant Pandaya&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, AIR 2011 MP 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;25. &lt;i&gt;Surendra Singh &lt;/i&gt;v. &lt;i&gt;State of U.P&lt;/i&gt;, AIR 2009 Alld. 106.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;26. &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;27. &lt;i&gt;Tata Press Ltd. &lt;/i&gt;v.&lt;i&gt; Maharashtra Telephone Nigam Ltd.&lt;/i&gt;, (1995) 5 SCC 139.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;28. U.K. Freedom of Information Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;29. &lt;i&gt;UCO Bank&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner and another&lt;/i&gt;, 2009 (79) AIC 545 (P&amp;amp;H).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30. &lt;i&gt;Union Centre for Earth Science Studies &lt;/i&gt;v. &lt;i&gt;Anson Sebastian, &lt;/i&gt;AIR 2010 Ker. 151&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;31. &lt;i&gt;Union of India&lt;/i&gt; v. &lt;i&gt;Hardev Singh&lt;/i&gt; WP(C) 3444 of 2012 dated 23-08-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;32. &lt;i&gt;Union of India &lt;/i&gt;v. &lt;i&gt;Rajesh Bhatia&lt;/i&gt; WP(C) 2232/2012 dated 17-09-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;33. &lt;i&gt;Union Public Service Commission &lt;/i&gt;v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 	13-07-2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;34. &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Secondary Sources&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. "Country Report for U.K.", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/united-kingdom"&gt;https://www.privacyinternational.org/reports/united-kingdom&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. "Country Report for Australia", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/australia"&gt;https://www.privacyinternational.org/reports/australia&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. "Country Report for Canada", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/canada"&gt;https://www.privacyinternational.org/reports/canada&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; AIR 1973 SC 106. This case held that the freedom of the press embodies in itself the right of the people to read.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; (1995) 5 SCC 139.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; AIR 1963 SC 129.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Section 8(1) in its entirety states as follows:&lt;/p&gt;
&lt;p&gt;(1) Notwithstanding anything contained in this Act, there shall be no obligation to give any citizen,-&lt;/p&gt;
&lt;p&gt;(a) information, disclosure of which would prejudicially affect the sovereignty and integrity of India, the security, strategic, scientific or 			economic interests of the State, relation with foreign State or lead to incitement of an offence;&lt;/p&gt;
&lt;p&gt;(b) information which has been expressly forbidden to be published by any court of law or tribunal or the disclosure of which may constitute 			contempt of court;&lt;/p&gt;
&lt;p&gt;(c) information, the disclosure of which would cause a breach of privilege of Parliament or the State Legislature;&lt;/p&gt;
&lt;p&gt;(d) information including commercial confidence, trade secrets or intellectual property, the disclosure of which would harm the competitive 			position of a third party, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;/p&gt;
&lt;p&gt;(e) information available to a person in his fiduciary relationship, unless the competent authority is satisfied that the larger public interest 			warrants the disclosure of such information;&lt;/p&gt;
&lt;p&gt;(f) information received in confidence from foreign Government;&lt;/p&gt;
&lt;p&gt;(g) information, the disclosure of which would endanger the life or physical safety of any person or identify the source of information or 			assistance given in confidence for law enforcement or security purposes;&lt;/p&gt;
&lt;p&gt;(h) information which would impede the process of investigation or apprehension or prosecution of offenders;&lt;/p&gt;
&lt;p&gt;(i) cabinet papers including records of deliberations of the Council of Ministers, Secretaries and other officers:&lt;/p&gt;
&lt;p&gt;Provided that the decisions of Council of Ministers, the reasons thereof, and the material on the basis of which the decisions were taken shall be 			made public after the decision has been taken, and the matter is complete, or over:&lt;/p&gt;
&lt;p&gt;Provided further that those matters which come under the exemptions specified in this section shall not be disclosed;&lt;/p&gt;
&lt;p&gt;(j) information which relates to personal information the disclosure of which has no relationship to any public activity or interest, or which 			would cause unwarranted invasion of the privacy of the individual unless the Central Public Information Officer or the State Public Information 			Officer or the appellate authority, as the case may be, is satisfied that the larger public interest justifies the disclosure of such information:&lt;/p&gt;
&lt;p&gt;Provided that the information which cannot be denied to the Parliament or a State Legislature shall not be denied to any person.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Section 11 of the RTI Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;i&gt;The Registrar General&lt;/i&gt; v. &lt;i&gt;A. Kanagaraj&lt;/i&gt;, (Madras High Court, 14 June 2013, available at http://www.indiankanoon.org/doc/36226888/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Arvind Kejriwal v. Central Public Information Officer, (Delhi High Court, 30 September 2011, available at http://www.indiankanoon.org/doc/1923225/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Sections 40 and 41 of the U.K. Freedom of Information Act, 2000.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Section 11A read with section 47-F of the Australia Freedom of Information Act, 1982.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Section 19 of the Canadian Access to Information Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;i&gt;Public Information Officer&lt;/i&gt; v. &lt;i&gt;Andhra Pradesh Information Commission&lt;/i&gt;,2009 (76) AIC 854 (AP).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; &lt;i&gt;Bhagat Singh &lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner, &lt;/i&gt;2008 (64) AIC 284 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Articles 14, 19(1)(a) and 21 of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Calcutta High Court, WP(W) No. 33290 of 2013, dated 20-11-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;i&gt;Jitendra Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, 2008 (66) AIC 685 (All).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom), para 14. Where the Court held that since the medical records of a convict cannot be 			denied to Parliament or State legislature therefore they cannot be exempted from disclosure under the Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; &lt;i&gt;Jamia Millia Islamia v. Sh. Ikramuddin&lt;/i&gt; , Delhi High Court, WP(C) 5677 of 2011 dated 22-11-2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; AIR 1963 SC 129.&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Delhi High Court, WP(C) No.7455/2001 dated 02-07-2009.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 (for stay), dated 13-07-2012. This ruling was overturned by a 			Division Bench of the High Court relying upon a subsequent Supreme Court ruling, however, it could be argued that the Division Bench did not per se 			disagree with the discussion and the principles laid down in this case, but only the way they were applied.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; Right to equality.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Freedom of speech and expression.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Right to life.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Article 19(2) of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; Article 19(5) of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; &lt;i&gt;Maneka Gandhi &lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, Supreme Court of India, WP No. 231 of 1977, dated 25-01-1978. The test laid down in this case is universally considered 			to be that the procedure established by law which restricts the fundamental right should be just, fair and reasonable.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975. However the Court later used phrases such as 			"reasonable restriction in public interest" and "reasonable restriction upon it for compelling interest of State" interchangeably which seems to 			suggest that the terms "compelling public interest" and "compelling state interest" used by the Court are being used synonymously and the Court 			does not draw any distinction between them. It is also important to note that the wider phrase "countervailing interest is shown to be superior" 			seems to suggest that it is possible, atleast in theory, to have other interests apart from public interest or state interest also which could 			trump the right to privacy.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; &lt;i&gt;R. Rajagopal v. Union of India&lt;/i&gt; , Supreme Court of India, dated 7-10-1994. These tests have been listed as one group since they are all applicable in the specific context of 			publication of private information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010. Also see &lt;i&gt;Vijay Prakash&lt;/i&gt; v.			&lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667. This case also held that information cannot be denied on the ground that it 			would be too voluminous.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; &lt;i&gt;Union Centre for Earth Science Studies &lt;/i&gt; v. &lt;i&gt;Anson Sebastian, &lt;/i&gt;AIR 2010 Ker. 151; &lt;i&gt;Union Public Service Commission &lt;/i&gt;v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 			&amp;amp; C.M. No. 2618/2011 (for stay), dated 13-07-2012&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; &lt;i&gt;Haryana Public Service Commission &lt;/i&gt; v. &lt;i&gt;State Information Commission, &lt;/i&gt;AIR 2009 P &amp;amp; H 14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; &lt;i&gt;UCO Bank&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner and another&lt;/i&gt;, 2009 (79) AIC 545 (P&amp;amp;H).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; &lt;i&gt;Surendra Singh &lt;/i&gt; v. &lt;i&gt;State of U.P&lt;/i&gt;, AIR 2009 Alld. 106.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; &lt;i&gt;R.K. Jain&lt;/i&gt; v. &lt;i&gt;Union Public Service Commission&lt;/i&gt;, Delhi High Court, LPA No. 618 of 2012, dated 12-11-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; &lt;i&gt;Srikant Pandaya&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, AIR 2011 MP 14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; &lt;i&gt;Paardarshita Public Welfare Foundation&lt;/i&gt; v. &lt;i&gt;Union of India and others&lt;/i&gt;, AIR 2011 Del 82. It must be mentioned that this case was not exactly under the procedure prescribed under 			the RTI Act but was a public interest litigation although the courts relied upon the provisions of the RTI Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; WP(C) 3444 of 2012 dated 23-08-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; WP(C) 2232/2012 dated 17-09-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; &lt;i&gt;President's Secretariat&lt;/i&gt; v. &lt;i&gt;Nitish Kumar Tripathi&lt;/i&gt;, Delhi High Court, WP (C) 3382 of 2012, dated 14-06-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; &lt;i&gt;P.C. Wadhwa&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, Punjab and Haryana High Court, LPA No. 1252 of 2009 dated 29-11-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; &lt;i&gt;Rajinder Jaina&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, 2010 (86) AIC 510 (Del. H.C.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; &lt;i&gt;Rajendra Vasantlal Shah&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner, New Delhi&lt;/i&gt;, AIR 2011 Guj 70.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2'&gt;https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-09T02:53:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
