<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1996 to 2010.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/september-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-round-table-delhi-october-19-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/eleventh-india-knowledge-summit-2013"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/computerworld-september-25-2013-john-ribeiro-indian-biometric-id-plan-faces-court-hurdle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-president-september-23-2013-jessica-mckenzie"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/bangalore-social-good"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/about/newsletters/september-2013-bulletin">
    <title>September 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/september-2013-bulletin</link>
    <description>
        &lt;b&gt;Our newsletter for the month of September 2013 can be accessed below. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) welcomes you to the ninth issue of its newsletter for the year 2013. During this month we signed an MoU with the Goa University to enhance digital literacy in Konkani language, submitted a report on Inclusive Disaster and Emergency Management for persons with disabilities to the National Disaster Management Authority, published an updated version of the Privacy Protection Bill, 2013 based on feedback collected from the Privacy Round Table held on August 24, and published an analysis of the Crucifixion Protests in Paraguay. Further, updates on our upcoming events and media coverage are brought in this newsletter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our policies on Ethical Research Guidelines, Non-Discrimination and Equal Opportunities, Privacy, Terms of Website Use, and Travel can be &lt;a class="external-link" href="http://bit.ly/19dQSOV"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Accessibility&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of our project on creating a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India with the Hans Foundation, we bring you a new draft chapter on the union territory of Andaman and Nicobar. With this we have completed compilation of draft chapters for 21 states and 4 union territories. Feedback and comments are invited from readers for this chapter:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Resource Kit Chapter&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The &lt;a class="external-link" href="http://bit.ly/18knnIq"&gt;Andaman and Nicobar Chapter&lt;/a&gt; (by CLPR, September 30, 2013)&lt;a href="http://bit.ly/18knnIq"&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Reports&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1ccMz7R"&gt;Inclusive Disaster and Emergency Management for Persons with Disabilities&lt;/a&gt; (by Deepti Samant Raja and Nirmita Narasimhan, September 17, 2013). It was submitted to the National Disaster Management Authority of India (NDMA) on September 17 for their action. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18E7Tjc"&gt;The ICT Opportunity for a Disability-Inclusive Development Framework&lt;/a&gt; (by leading international organisations such as G3ict, ITU, Microsoft, UNESCO, et.al.) was released on September 24. CIS gave its inputs to this report.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Access to Knowledge and Openness&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge team at CIS is working on &lt;a class="external-link" href="http://bit.ly/SPqFOl"&gt;expanding the Indic language Wikipedia in partnership with the Wikimedia Foundation&lt;/a&gt;&lt;a href="http://bit.ly/SPqFOl"&gt;&lt;/a&gt;. As &lt;a class="external-link" href="http://bit.ly/X80ELd"&gt;part this project&lt;/a&gt;, we held seven Wikipedia workshops. Our project on Pervasive Technologies examines the relationship between production of pervasive technologies and intellectual property and we have produced a column in EuroScientist as part of our efforts of promoting openness including open government data, open standards, open access, and free/libre/open source software:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Open Access &lt;/span&gt;&lt;/b&gt;&lt;br /&gt;&lt;b&gt;Column&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1bdPdup"&gt;Open Access: An Opportunity for Scientists around the Globe&lt;/a&gt; (by Subbiah Arunachalam, Euro Scientist, September 25, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1f5xdBG"&gt;e - DIRAP Google+ Hangout: Open Government&lt;/a&gt; (by Christine Apikul, September 18, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1fWE6Wr"&gt;The Indian Council of Agricultural Research Adopts an Open Access Policy&lt;/a&gt; (by Nehaa Chaudhari, September 30, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Wikipedia&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Wikipedians from various communities can request for outreach programmes, technical bugs, logistics-merchandize and media, public relations and communications &lt;a class="external-link" href="http://bit.ly/TOcXId"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Announcements&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;CIS Signs MoU with Goa University: The A2K team at CIS has signed an MoU with the Goa University to digitize the “Konkani Vishwakosh” under the Creative Commons license and build a digital knowledge partnership to enhance digital literacy in Konkani language. See &lt;a class="external-link" href="http://bit.ly/1fBZXlR"&gt;here for more details&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/15Idlh7"&gt;Konkani Vishwakosh Digitization Project&lt;/a&gt;: The Centre for Internet and Society in collaboration with the University of Goa invites you to a two-month project on digitization of Konkani Vishwakosh. Please send in your applications by October 5, 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Video&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Wikipedians Speak: Piotr Konieczny: This episode brings you a &lt;a class="external-link" href="http://bit.ly/16jYsBF"&gt;conversation with Piotr Konieczny&lt;/a&gt;, a veteran Wikipedian from Poland. He has contributed to over 514 DYK articles on Wikipedia.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Columns and Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19KtIwo"&gt;Recap on Konkani Wikipedia Workshop&lt;/a&gt; (by Subhashish Panigrahi, Startup Goa Blog, September 9, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/14QQkIo"&gt;ଅବସର ପରର ଦ୍ବିତୀୟ ଜୀବନ, ଅବସର ପରେ ସକ୍ରିୟ ଭାବେ ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆରେ ଲେଖାଲେଖି ଜାରୀ ରଖିଥିବା ଜଣେ ଡାକ୍ତରଙ୍କ ସ‌ହ ଭାବାଲୋଚନା&lt;/a&gt; (by Subhashish Panigrahi, Odiapua, September 10, 2013)&lt;a href="http://bit.ly/14QQkIo"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1fU7Ikl"&gt;Selection of Programme Officer — Pilot Projects, CIS-A2K&lt;/a&gt; (by Nitika Tandon, September 10, 2013)&lt;a href="http://bit.ly/1fU7Ikl"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18f9n1o"&gt;Wikipedia reaches Classrooms in Hyderabad&lt;/a&gt; (by Syed Muzammiluddin, September 20, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/15LPoKZ"&gt;A Kannada Wikipedia Workshop in Mysore&lt;/a&gt; (University of Mysore, August 6, 2013): This is a report of the workshop conducted last month. Dr. Pavanaja conducted the workshop&lt;a href="http://bit.ly/15LPoKZ"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia Introductory Workshop (Department of Computer Science and Technology, University of Goa, September 28, 2013). Nitika Tandon conducted this workshop. &lt;i&gt;The details will be posted soon&lt;/i&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1f1KOvm"&gt;Train the Trainer — Four-day long Residential Training Workshop in Bangalore&lt;/a&gt; (organised by CIS-A2K, Bangalore, October 3 – 6, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Co-organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/174pugy"&gt;Digital Resources in Telugu: A Workshop for Research Scholars&lt;/a&gt; (co-organised by CIS-A2K and the English and Foreign Languages University, Hyderabad, September 13, 2013).  T. Vishnu Vardhan participated in this event. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18SsChu"&gt;Re-releasing Konkani Vishwakosh &amp;amp; Building Konkani Wikipedia&lt;/a&gt; (organised by CIS-A2K and the University of Goa, Conference Hall, Goa University, Taleigao, September 26, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Wikipedia Introductory Workshop (co-organised by CIS-A2K and wikipedians John Noronha and Supriya Kankumbikar, September 27, 2013). Nitika Tandon participated in this workshop.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/15NsTjM"&gt;Odisha: Wikipedia workshop at IIMC, Dhenkanal&lt;/a&gt; (co-organised by CIS-A2K and Odia Wikimedia community, September 30, 2013). Subhashish Panigrahi coordinated the entire event along with members of Odia Wikipedia, Dr Subas Chandra Rout, Mrutyunjaya Kar and Sasanka Sekhar Das. This was covered by Odisha Diary (&lt;a href="http://bit.ly/1bna9zd"&gt;http://bit.ly/1bna9zd&lt;/a&gt;), and eOdisha Samachar (&lt;a href="http://bit.ly/1aNJvv4"&gt;http://bit.ly/1aNJvv4&lt;/a&gt;).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16HNZpy"&gt;Workshop on e-Content Development&lt;/a&gt; (organised by Centre for Staff Training and Development, Dr. B.R. Ambedkar Open University, Hyderabad, September 4 – 6, 2013). Vishnu Vardhan gave a guest lecture on Open Source to Open Knowledge, Building Knowledge Bases and Platforms via Mass Collaboration on the Internet, e-Content in Indian languages – History, Challenges and Opportunities, Wikipedia Users to Wikipedia Authors – Exploring Wikipedia as an OER Tool, and e-Content, e-Student, e-Faculty – Reimagining classroom in the digital Age. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/183Atq0"&gt;Kannada Wikipedia Workshop&lt;/a&gt; (organised by Department of Journalism and Mass Communication, SDM College, Ujire, September 15, 2013). Dr. U.B.Pavanaja participated in this workshop&lt;a href="http://bit.ly/183Atq0"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1eGviTY"&gt;Konkani Wikipedia Workshop&lt;/a&gt; (organised by St. Aloysius College, AIMIT, St Aloysius College (Autonomous), Beeri, Mangalore, September 13, 2013). Dr. U.B. Pavanaja participated in this&lt;a href="http://bit.ly/1eGviTY"&gt;&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;'&lt;a class="external-link" href="http://bit.ly/152vA0g"&gt;Help Konkani Wikipedia come out of incubation&lt;/a&gt;' (Deccan Herald, September 13, 2013): The article talks about the relative lack of content in Konkani Wikipedia. “To get it out of incubation, many should write Konkani articles for Wikipedia,” Dr. Pavanaja was quoted as having said. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18VgnEN"&gt;Konkani Vishwakosh relaunch tomorrow&lt;/a&gt; (The Hindu, September 26, 2013). A coverage of the re-release of the Konkani encyclopaedia under Creative Commons license. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18VgnV8"&gt;Goa university re-releasing Konkani encyclopaedia on Sept 26&lt;/a&gt; (The Times of India, September 24, 2013): Goa University and CIS-A2K re-released the four volume 3632 page Konkani Vishwakosh (encyclopaedia) in Goa. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/174rmpA"&gt;Goa University announces plan to upload Konkani encyclopedia on Wikipedia&lt;/a&gt; (Navhind Times, September 27, 2013)&lt;a href="http://bit.ly/174rmpA"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19EYl5T"&gt;Konkani Wikipedia from Goa University in 6 months&lt;/a&gt; (The Times of India, September 27, 2013): Goa University becomes the first varsity in India to allow data produced and copyrighted by an Indian university to be used by internet users. Professors, students and anyone with expertise or love for Konkani can come forward to help with the project for which training will be provided, says Vishnu Vardhan. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18jiG1B"&gt;Konkani Wikipedia in the making&lt;/a&gt; (by Prakash Kamat, The Hindu, September 29, 2013): Goa University re-launched a four-volume Konkani encyclopaedia and will upload it on Wikipedia. The process will be completed in six months times, says Vishnu Vardhan&lt;a href="http://bit.ly/18jiG1B"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1bV5XWH"&gt;For the love of Konkani: Preserving Goa's official language&lt;/a&gt; (by Joanna Lobo, DNA, September 29, 2013): Konkani has 24 lakh speakers as per the Census Department of India 2001 but online documentation is limited. CIS-A2K wants to strengthen the Konkani Wikipedia, says Nitika Tandon&lt;a href="http://bit.ly/1bV5XWH"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18ROmfb"&gt;Goa University to make available online Konkani Wikipedia, within 6 months&lt;/a&gt; (by Jagran Josh, September 30, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1bsZW4u"&gt;Goa University Partners CIS India to Build Konkani Wikipedia&lt;/a&gt; (by Apurva Chaudhary, Medianama, September 30, 2013)&lt;a href="http://bit.ly/1bsZW4u"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Access to Knowledge (Copyright and Pervasive Technologies)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Access to Knowledge programme addresses the harms caused to consumers, developing countries, human rights, and creativity/innovation from excessive regimes of copyright, patents, and other such monopolistic rights over knowledge:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/17J3g55"&gt;The Law and Economics of Copyright Users Rights&lt;/a&gt; (organised by the American University Washington College of Law, Massachusetts Ave., NW, Washington DC, September 26, 2013). Sunil Abraham presented the Pervasive Technologies project. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Internet Governance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are doing a project on conducting research on surveillance and freedom of expression (SAFEGUARDS) with Privacy International and IDRC. So far we have organised six privacy round tables and drafted the Privacy (Protection) Bill. This month we bring you the latest version of the Privacy (Protection) Bill and an analysis of the six privacy round tables. We are also doing a project on mapping cyber security actors in South Asia and South East Asia with the Citizen Lab, Munk School of Global Affairs, University of Toronto and IDRC. We did an interview with Lawrence Liang on privacy and free speech:&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;b&gt;SAFEGUARDS Project&lt;br /&gt;&lt;/b&gt;&lt;/span&gt;&lt;b&gt;Bill&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/14WAgI7"&gt;Privacy (Protection) Bill, 2013&lt;/a&gt;: Updated Third Draft (by Bhairav Acharya, September 30, 2013): CIS has been researching privacy in India since 2010 with the objective of raising public awareness around privacy, completing in depth research, and driving a privacy legislation in India. As part of this work, we drafted the Privacy (Protection) Bill, 2013.  This is the latest version with changes based on feedback from the Privacy Round Table held on August 24. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Reports&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/15Fj6vY"&gt;A Privacy Meeting with the Federal Trade Commission&lt;/a&gt; (co-organised by CIS and the Federal Trade Commission, Imperial Hotel, Janpath, New Delhi, September 20, 2013). Elonnai Hickok participated in this meeting. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/158ayNW"&gt;The National Privacy Roundtable Meetings&lt;/a&gt; (by Bhairav Acharya, September 19, 2013). Bhairav provides an analysis of the six round table meetings held in the cities of New Delhi, Bangalore, Chennai, Mumbai, and Kolkata.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Interview&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/15AutoE"&gt;An Interview with Suresh Ramasubramanian&lt;/a&gt; (by Elonnai Hickok, September 6, 2013): Suresh Ramasubramanian from IBM speaks about cyber security and issues in the cloud. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Articles and Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1g5QbZj"&gt;India: Privacy in Peril&lt;/a&gt; (by Bhairav Acharya, Frontline, July 12, 2013). &lt;i&gt;The article was published in Frontline in July but was mirrored only recently on our website&lt;/i&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19DNYjs"&gt;Privacy Law Must Fit the Bill&lt;/a&gt; (by Sunil Abraham, Deccan Chronicle, September 9, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19NYTal"&gt;Transparency Reports — A Glance on What Google and Facebook Tell about Government Data Requests&lt;/a&gt; (by Prachi Arya, September 12, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16yLYFq"&gt;The National Cyber Security Policy: Not a Real Policy&lt;/a&gt; (by Bhairav Acharya, Observer Research Foundation's Cyber Security Monitor Vol. I, Issue.1, August 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1fln2vu"&gt;The Central Monitoring System: Some Questions to be Raised in Parliament&lt;/a&gt; (by Bhairav Acharya, September 19, 2013). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18oOTDk"&gt;CIS and International Coalition Calls upon Governments to Protect Privacy&lt;/a&gt; (by Elonnai Hickok, September 25, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16dKyoo"&gt;An Analysis of the Cases Filed under Section 46 of the Information Technology Act, 2000 for Adjudication in the State of Maharashtra&lt;/a&gt; (by Bhairav Acharya, September 30, 2013): This is a brief review of some of the cases related to privacy filed under section 46 of the Information Technology Act, 2000 seeking adjudication for alleged contraventions of the Act in the State of Maharashtra.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1bys2I1"&gt;Gmail ban looms for Indian gov't workers&lt;/a&gt; (by Beatrice Thomas, Arabian Business.com, September 1, 2013): The article says that government would ban Gmail for official communication in light of cyber spying by the US. Sunil Abraham agrees with the ban. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1dJiSvF"&gt;Indien: Regierung will Nutzung von US-Mailprovidern in Verwaltungen verbieten&lt;/a&gt; (Netzpolitik, September 3, 2013). Sunil Abraham was quoted in this German newspaper. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19KvQV7"&gt;A dangerous trend: social media adds fire to Muzaffarnagar clashes&lt;/a&gt; (by Zia Haq, The Hindustan Times, September 9, 2013). The article speaks about censorship in wake of publication of malicious content. In such cases the government has a legitimate reason to censor speech, says Sunil Abraham&lt;a href="http://bit.ly/19KvQV7"&gt;&lt;/a&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/18VgnVe"&gt;Three Years Later, IPaidABribe.com Pays Off&lt;/a&gt; (by Jessica McKenzie, TechPresident, September 23, 2013): The article talks about IPaidABribe.com, an online portal focusing on civic engagement and improving governance. But the real problem in India is “high ticket bribes...at the top of the pyramid,” Sunil Abraham was quoted as having said. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/174yjHr"&gt;Indian biometric ID plan faces court hurdle&lt;/a&gt; (by John Ribeiro, Computer World, September 25, 2013): The article talks about Aadhar (India’s biometric system). The Aadhaar number now allows different agencies including private organizations to collect and exchange data between them, says Pranesh Prakash. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/GAsStr"&gt;Privacy Round Table, New Delhi&lt;/a&gt; (co-organised by FICCI, DSCI and CIS, FICCI Federation House, Tansen Marg, New Delhi, October 19, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/GAGLXL"&gt;Public Law and Jurisprudential Issues of Privacy&lt;/a&gt; (CIS, Bangalore, September 27, 2013): Abhayraj Naik, a graduate from the National Law School of India University, Bangalore, and the Yale Law School gave a talk on public law and jurisprudential issues related to privacy.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1byqRZg"&gt;Young Scholar Tutorials&lt;/a&gt; (organised by Communication Policy Research South, September 3-4, 2013). Nehaa Chaudhari participated in this event. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1eqxUb1"&gt;Privacy and Surveillance in India&lt;/a&gt; (organised by the Centre for Culture, Media and Governance, Jamia Millia Islamia, New Delhi, September 18, 2013). Sunil Abraham gave a talk. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1dJT43q"&gt;Syllabus: “Policy and regulation conducive to rapid ICT sector growth in Myanmar: An introductory course”&lt;/a&gt; (organised by LIRNEasia in collaboration with Myanmar ICT Development Organization, and with support from the Open Society Foundation and the International Development Research Centre of Canada, September 28 – October 5, 2013). Sunil Abraham is supporting Prof. Samarajiva on the last optional day of this course in Yangon.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Congress on Privacy and Surveillance (organised by Swiss Federal Institute of Technology, Lausanne, September 30, 2013). Maria Xynou participated in this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;&lt;b&gt;Cyber Security Project&lt;/b&gt;&lt;/span&gt;&lt;b&gt;&lt;br /&gt;Video Interview&lt;/b&gt;&lt;span&gt;&lt;b&gt; &lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Part 10: &lt;a class="external-link" href="http://bit.ly/17TMNsT"&gt;Interview with Lawrence Liang&lt;/a&gt; (September 10, 2013): In the ecology of online communication it is crucial for us to look at right to privacy and right to free speech as inseparable.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Forthcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16KOTvA"&gt;11th India Knowledge Summit 2013&lt;/a&gt; (organised by ASSOCHAM India, Hotel Shangri-La, New Delhi, October 14-15, 2013). CIS is one of the organisations supporting this event. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/19HyyIZ"&gt;CYFY 2013: India Conference on Cyber Security and Cyber Governance&lt;/a&gt; (organised by Observer Research Foundation and the Federation of Indian Chambers of Commerce and Industry, Oberoi Hotel, New Delhi, October 14-15, 2013). Sunil Abraham will participate in this event as a speaker. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Knowledge Repository on Internet Access&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;CIS in partnership with the Ford Foundation is executing a project to create a knowledge repository on Internet and society. This repository will comprise content targeted primarily at civil society with a view to enabling their informed participation in the Indian Internet and ICT policy space. The repository is available at &lt;a href="http://www.internet-institute.in"&gt;www.internet-institute.in&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Modules&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/193RPYr"&gt;International Telecommunication Union&lt;/a&gt; (by Snehashish Ghosh and Anirudh Sridhar, September 30, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16MiB9u"&gt;Internet Corporation for Assigned Names and Numbers&lt;/a&gt; (ICANN) (by Snehashish Ghosh and Anirudh Sridhar, September 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Telecom&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa, a Distinguished Fellow at CIS is a regular columnist with the Business Standard. The articles published on his blog Organizing India Blogspot is mirrored on our website:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Newspaper Column&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/18RcDCm"&gt;Regrouping for Growth - Interest Rates – III&lt;/a&gt; (originally published in the Business Standard on September 4, 2013 and mirrored in Organizing India Blogspot on September 6, 2013). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Digital Natives&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? examines the changing landscape of social change and political participation in light of the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;br /&gt;&lt;b&gt;Event Report&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://bit.ly/188MWfr"&gt;Bangalore + Sustainability Summit&lt;/a&gt; (organized by Ashoka India, Green Lungi and IDEX, September 21, 2013, CIS, Bangalore): Denisse Albornoz has summarised the happenings in this report.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1dIA9Cv"&gt;Youths brainstorm at social summit&lt;/a&gt; (The Times of India, September 21, 2013): A coverage of the Bangalore + Sustainability Summit hosted at CIS.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entry + Video&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/16tulHY"&gt;Revealing Protesters on the Fringe: Crucifixion Protest in Paraguay&lt;/a&gt; (by Denisse Albornoz, September 20, 2013): Denisse provides an analysis of the crucifix protest in Paraguay in the light of Nishant Shah’s piece: Whose Change is it Anyway?.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Digital Humanities&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interview&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1e5hDai"&gt;Thinking Digital Beyond Tools: Interview with Dr. Nishant Shah&lt;/a&gt; (by Noopur Raval, HASTAC, September 10, 2013): Nishant speaks about his interest in digital studies, the future of humanities, and his HASTAC experience. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://bit.ly/1dIA6GV"&gt;Reclaim Open Learning Symposium&lt;/a&gt; (organized by the Digital Media and Learning Research Hub, University of California Humanities Research Institute, UC Irvine, September 26-27, 2013): Nishant Shah participated in this event as a panelist. &lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;About CIS&lt;/b&gt;&lt;br /&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Follow us elsewhere&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Support Us&lt;/b&gt;&lt;br /&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Request for Collaboration&lt;/b&gt;:&lt;br /&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at sunil@cis-india.org or Nishant Shah, Director – Research, at nishant@cis-india.org. To discuss collaborations on Indic language wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at vishnu@cis-india.org&lt;/p&gt;
&lt;p&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects&lt;/i&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p class="normal"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/september-2013-bulletin'&gt;https://cis-india.org/about/newsletters/september-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-10-24T06:48:33Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi">
    <title>A Privacy Meeting with the Federal Trade Commission in New Delhi</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi</link>
    <description>
        &lt;b&gt;On September 20, the Centre for Internet and Society held a roundtable meeting with Betsy Broder, Counsel for International Consumer Protection, and Sarah Schroeder, Attorney, Bureau of Consumer Protection, Federal Trade Commission (FTC), United States. The meeting took place at the Imperial, Janpath, New Delhi and discussed both the U.S framework to privacy and potential frameworks and challenges to privacy in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;As a note, thoughts shared during the meeting represented personal perspectives, and did not constitute the official position of the Federal Trade Commission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When explaining the U.S regulatory framework for privacy the FTC attorneys highlighted that the United States does not have comprehensive privacy legislation, like in Europe,  but instead has  sectoral laws that address different aspects of privacy. For example, the Fair Credit Reporting Act maintains confidentiality of consumer credit report information, the Gramm Leach Bliley Act imposes privacy and security requirements for financial institutions, HIPAA applies to patient health information,  and the Children’s Online Privacy Protection Act prevents the collection and posting of personal information from minors.  It was discussed that the sectoral model followed by the United States allows for a nuanced balance to be struck between privacy protection and the market.  It was noted, however, that some have critiqued the U.S. regulatory framework for lacking clear principles that apply to the commercial world and lay out strong privacy protections for the individual. In light of this, the White House is developing a Privacy Bill of Rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Federal Trade Commission is an independent agency in the United States Government with responsibility for enforcing both consumer protection and competition laws. It is composed of five commissioners, and a staff of roughly 1,000, which includes attorneys and economists. The FTC is primarily a law enforcement agency, but also undertakes policy development through workshops and reports, Consumer education is another key function of the agency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the consumer protection side, Congress has directed the FTC to enforce the Federal Trade Commission Act, as well as some more specific statutes, such as those that protect consumers from unwanted telemarketing laws, and the protection of children on line.  Its main objectives are to protect consumer interests, and prevent fraud and unfair and deceptive business practices. The FTC carries out its privacy work through its consumer protection mission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When understanding the FTC’s role in relation to privacy, it is important to understand that the FTC’s jurisdiction applies only to certain industries as defined by Congress. Thus, for example, the FTC does not have jurisdiction over banks or telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most critical part of the FTC’s activities is its law enforcement function.  The FTC can investigate an organization if the staff believes that the entity may be involved in conduct that contravenes the FTC Act’s prohibition on unfair or deceptive practices, or another specific privacy law. The FTC has brought a number of privacy-related cases against major companies including Facebook, Google, ChoicePoint, and Twitter.  Many of these cases address new challenges brought about by rapidly changing technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The vast majority of the FTC’s actions have been settled with consent judgments.  When the statute that the FTC enforces allows for the imposition of a civil penalty, the FTC sets the penalty at a level that ensures that it is fair and provides a deterrent, but will not impose a hardship on the company.  As a civil enforcement agency, the FTC cannot seek criminal sanctions. While enforcement is the cornerstone of the FTC’s approach to privacy, the agency also supports self-regulation, where appropriate.  In this system the FTC does not pre-approve an organization’s practices or define principles that all companies should abide by as it is felt that every organization is unique and has different needs and abilities, and assigning specific technical standards may stifle innovation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the meeting it was also discussed how US privacy laws may apply to overseas companies where they are providing services for US consumers or working on behalf of US companies.  For example, under the Gramm Leach Bliley Act the FTC has created the Safeguards Rule, which speaks to how financial data by financial institutions must be handled and protected.  This Rule applies to companies overseas if the company is performing work for US companies or US consumers.  In other words, a US company cannot avoid compliance by outsourcing its work to an off shore organization.    Discussions during the meeting also focused on consent and the key role that context, accessibility, and timing play in ensuring individuals have the ability to provide informed consent.  Some of the attendees suggested that this  practice  could be greatly improved in India. For example, currently in India there are companies that only provide consumers access to the company privacy policy after an individual has consented and signed up to the service.  When asked about the challenges to privacy that exist in India, many shared that, culturally, there is a different understanding of privacy in India than in many western countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other thoughts included that the Indian government is currently imagining privacy regulation as being either fluid and purely self regulatory or being enforced through strict legal provisions.  Instead, the government needs to begin to expand the possibilities for a regulatory framework for privacy in India in such a way that allows for strong legal enforcement, and flexible standards.  The right to be forgotten was also discussed and it was mentioned that California has proposed a law that will allow individuals to request deletion of information.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi'&gt;https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-03T10:25:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft">
    <title>Privacy (Protection) Bill, 2013: Updated Third Draft</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has been researching privacy in India since 2010 with the objective of raising public awareness around privacy, completing in depth research, and driving a privacy legislation in India. As part of this work, we drafted the Privacy (Protection) Bill, 2013. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;This research is being undertaken as part of the 'SAFEGUARDS' project that CIS is doing with Privacy International and IDRC. &lt;/i&gt;The following is the latest version with changes based on the Round Table held on August 24:&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="center"&gt;&lt;b&gt;[Preamble]&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER I&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Preliminary&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Short title, extent and commencement. –&lt;/b&gt; (1)&lt;b&gt; &lt;/b&gt;This Act may be called the Privacy (Protection) Act, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) It extends to the whole of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) It shall come into force on such date as the Central Government may, by notification in the Official Gazette, appoint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. Definitions. –&lt;/b&gt; In this Act and in any rules made thereunder, unless the context otherwise requires, –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) “anonymise” means, in relation to personal data, the removal of all data that may, whether directly or indirectly in conjunction with any other data, be used to identify the data subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) “appropriate government” means, in relation the Central Government or a Union Territory Administration, the Central Government; in relation a State Government, that State Government; and, in relation to a public authority which is established, constituted, owned, controlled or substantially financed by funds provided directly or indirectly –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) by the Central Government or a Union Territory Administration, the Central Government;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) by a State Government, that State Government;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) “authorised officer” means an officer, not below the rank of a Gazetted Officer, of an All India Service or a Central Civil Service, as the case may be, who is empowered by the Central Government, by notification in the Official Gazette, to intercept a communication of another person or carry out surveillance of another person under this Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) “biometric data” means any data relating to the physical, physiological or behavioural characteristics of a person which allow their unique identification including, but not restricted to, facial images, finger prints, hand prints, foot prints, iris recognition, hand writing, typing dynamics, gait analysis and speech recognition;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) “Chairperson” and “Member” mean the Chairperson and Member appointed under sub-section (1) of section 17;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) “collect”, with its grammatical variations and cognate expressions, means, in relation to personal data, any action or activity that results in a data controller obtaining, or coming into the possession or control of, any personal data of a data subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) “communication” means a word or words, spoken, written or indicated, in any form, manner or language, encrypted or unencrypted, meaningful or otherwise, and includes visual representations of words, ideas, symbols and images, whether transmitted or not transmitted and, if transmitted, irrespective of the medium of transmission;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(h) “competent organisation” means an organisation or public authority listed in the Schedule;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) “data controller” means a person who, either alone or jointly or in concert with other persons, determines the purposes for which and the manner in which any personal data is processed;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(j) “data processor” means any person who processes any personal data on behalf of a data controller;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(k) “Data Protection Authority” means the Data Protection Authority constituted under sub-section (1) of section 17;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;(l) “data subject” means a person who is the subject of personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(m) “deoxyribonucleic acid data” means all data, of whatever type, concerning the characteristics of a person that are inherited or acquired during early prenatal development;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(n) “destroy”, with its grammatical variations and cognate expressions, means, in relation to personal data, to cease the existence of, by deletion, erasure or otherwise, any personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(o) “disclose”, with its grammatical variations and cognate expressions, means, in relation to personal data, any action or activity that results in a person who is not the data subject coming into the possession or control of that personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(p) “intelligence organisation” means an intelligence organisation under the Intelligence Organisations (Restriction of Rights) Act, 1985 (58 of 1985);&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(q) “interception” or “intercept” means any activity intended to capture, read, listen to or understand the communication of a person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(r) “personal data” means any data which relates to a natural person if that person can, whether directly or indirectly in conjunction with any other data, be identified from it and includes sensitive personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(s) “prescribed” means prescribed by rules made under this Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(t) “process”, with its grammatical variations and cognate expressions, means, in relation to personal data, any action or operation which is performed upon personal data, whether or not by automated means including, but not restricted to, organisation, structuring, adaptation, modification, retrieval, consultation, use, alignment or destruction;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(u) “receive”, with its grammatical variations and cognate expressions, means, in relation to personal data, to come into the possession or control of any personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) “sensitive personal data” means personal data as to the data subject’s –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) biometric data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) deoxyribonucleic acid data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) sexual preferences and practices;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) medical history and health;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) political affiliation;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) commission, or alleged commission, of any offence;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vii) ethnicity, religion, race or caste; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(viii) financial and credit information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(w) “store”, with its grammatical variations and cognate expressions, means, in relation to personal data, to retain, in any form or manner and for any purpose or reason, any personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(x) “surveillance” means any activity intended to watch, monitor, record or collect, or to enhance the ability to watch, record or collect, any images, signals, data, movement, behaviour or actions, of a person, a group of persons, a place or an object, for the purpose of obtaining information of a person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;and all other expressions used herein shall have the meanings ascribed to them under the General Clauses Act, 1897 (10 of 1897) or the Code of Criminal Procedure, 1973 (2 of 1974), as the case may be.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER II&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Regulation of Personal Data&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Regulation of personal data. – &lt;/b&gt;Notwithstanding anything contained in any other law for time being in force, no person shall collect, store, process, disclose or otherwise handle any personal data of another person except in accordance with the provisions of this Act and any rules made thereunder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. Exemption. –&lt;/b&gt; Nothing in this Act shall apply to the collection, storage, processing or disclosure of personal data for personal or domestic use.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER III&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Protection of Personal Data&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Regulation of collection of personal data. –&lt;/b&gt; (1) No personal data of a data subject shall be collected except in conformity with section 6 and section 7.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No personal data of a data subject may be collected under this Act unless it is necessary for the achievement of a purpose of the person seeking its collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Subject to section 6 and section 7, no personal data may be collected under this Act prior to the data subject being given notice, in such and form and manner as may be prescribed, of the collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. Collection of personal data with prior informed consent. –&lt;/b&gt; (1) Subject to sub-section (2), a person seeking to collect personal data under this section shall, prior to its collection, obtain the consent of the data subject.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Prior to a collection of personal data under this section, the person seeking its collection shall inform the data subject of the following details in respect of his personal data, namely: –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) when it will be collected;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) its content and nature;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) the purpose of its collection;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) the manner in which it may be accessed, checked and modified;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) the security practices, privacy policies and other policies, if any, to which it will be subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) the conditions and manner of its disclosure; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) the procedure for recourse in case of any grievance in relation to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Consent to the collection of personal data under this section may be obtained from the data subject in any manner or medium but shall not be obtained as a result of a threat, duress or coercion:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that the data subject may, at any time after his consent to the collection of personal data has been obtained, withdraw the consent for any reason whatsoever and all personal data collected following the original grant of consent shall be destroyed forthwith:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that the person who collected the personal data in respect of which consent is subsequently withdrawn may, if the personal data is necessary for the delivery of any good or the provision of any service, not deliver that good or deny that service to the data subject who withdrew his grant of consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. Collection of personal data without prior consent. – &lt;/b&gt;Personal data may be collected without the prior consent of the data subject if it is –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) necessary for the provision of an emergency medical service to the data subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) required for the establishment of the identity of the data subject and the collection is authorised by a law in this regard;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) necessary to prevent a reasonable threat to national security, defence or public order; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) necessary to prevent, investigate or prosecute a cognisable offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. Regulation of storage of personal data. –&lt;/b&gt; (1) No person shall store any personal data for a period longer than is necessary to achieve the purpose for which it was collected or received, or, if that purpose is achieved or ceases to exist for any reason, for any period following such achievement or cessation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Save as provided in sub-section (3), any personal data collected or received in relation to the achievement of a purpose shall, if that purpose is achieved or ceases to exist for any reason, be destroyed forthwith.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Notwithstanding anything contained in this section, any personal data may be stored for a period longer than is necessary to achieve the purpose for which it was collected or received, or, if that purpose has been achieved or ceases to exist for any reason, for any period following such achievement or cessation, if –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the data subject grants his consent to such storage prior to the purpose for which it was collected or received being achieved or ceasing to exist;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) it is adduced for an evidentiary purpose in a legal proceeding; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) it is required to be stored under the provisions of an Act of Parliament:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that only that amount of personal data that is necessary to achieve the purpose of storage under this sub-section shall be stored and any personal data that is not required to be stored for such purpose shall be destroyed forthwith:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided further that any personal data stored under this sub-section shall, to the extent possible, be anonymised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9. Regulation of processing of personal data. –&lt;/b&gt; (1) No person shall process any personal data that is not necessary for the achievement of the purpose for which it was collected or received.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Save as provided in sub-section (3), no personal data shall be processed for any purpose other than the purpose for which it was collected or received.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Notwithstanding anything contained in this section, any personal data may be processed for a purpose other than the purpose for which it was collected or received if –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the data subject grants his consent to the processing and only that amount of personal data that is necessary to achieve the other purpose is processed;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) it is necessary to perform a contractual duty to the data subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) it is necessary to prevent a reasonable threat to national security, defence or public order; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) it necessary to prevent, investigate or prosecute a cognisable offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10. Transfer of personal data for processing. –&lt;/b&gt; (1) Subject to the provisions of this section, personal data that has been collected in conformity with this Act may be transferred by a data controller to a data processor, whether located in India or otherwise, if the transfer is pursuant to an agreement that explicitly binds the data processor to same or stronger measures in respect of the storage, processing, destruction, disclosure and other handling of the personal data as are contained in this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No data processor shall process any personal data transferred under this section except to achieve the purpose for which it was collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) A data controller that transfers personal data under this section shall remain liable to the data subject for the actions of the data processor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11. Security of personal data and duty of confidentiality. –&lt;/b&gt; (1) No person shall collect, receive, store, process or otherwise handle any personal data without implementing measures, including, but not restricted to, technological, physical and administrative measures, adequate to secure its confidentiality, secrecy, integrity and safety, including from theft, loss, damage or destruction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Data controllers and data processors shall be subject to a duty of confidentiality and secrecy in respect of personal data in their possession or control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Without prejudice to the provisions of this section, a data controller or data processor shall, if the confidentiality, secrecy, integrity or safety of personal data in its possession or control is violated by theft, loss, damage or destruction, or as a result of any disclosure contrary to the provisions of this Act, or for any other reason whatsoever, notify the data subject, in such form and manner as may be prescribed, forthwith.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12. Regulation of disclosure of personal data. –&lt;/b&gt; Subject to section 10, section 13 and section 14, no person shall disclose, or otherwise cause any other person to receive, the content or nature of any personal data that has been collected in conformity with this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13. Disclosure of personal data with prior informed consent. – &lt;/b&gt;(1) Subject to sub-section (2), a data controller or data processor seeking to disclose personal data under this section shall, prior to its disclosure, obtain the consent of the data subject.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Prior to a disclosure of personal data under this section, the data controller or data processor, as the case may be, seeking to disclose the personal data, shall inform the data subject of the following details in respect of his personal data, namely: –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) when it will be disclosed;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the purpose of its disclosure;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) the security practices, privacy policies and other policies, if any, that will protect it; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) the procedure for recourse in case of any grievance in relation to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14. Disclosure of personal data without prior consent. –&lt;/b&gt; (1) Subject to sub-section (2), personal data may be disclosed without the prior consent of the data subject if it is necessary –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) to prevent a reasonable threat to national security, defence or public order; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) to prevent, investigate or prosecute a cognisable offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No data controller or data processor shall disclose any personal data unless it has received an order in writing from a police officer not below the rank of [___] in such form and manner as may be prescribed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that an order for the disclosure of personal data made under this sub-section shall not require the disclosure of any personal data that is not necessary to achieve the purpose for which the disclosure is sought:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided further that the data subject shall be notified, in such form and manner as may be prescribed, of the disclosure of his personal data, including details of its content and nature, and the identity of the police officer who ordered its disclosure, forthwith.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;15. Quality and accuracy of personal data. –&lt;/b&gt; (1) Each data controller and data processor shall, to the extent possible, ensure that the personal data in its possession or control, is accurate and, where necessary, is kept up to date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No data controller or data processor shall deny a data subject whose personal data is in its possession or control the opportunity to review his personal data and, where necessary, rectify anything that is inaccurate or not up to date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) A data subject may, if he finds personal data in the possession or control of a data controller or data processor that is not necessary to achieve the purpose for which it was collected, received or stored, demand its destruction, and the data controller shall destroy, or cause the destruction of, the personal data forthwith.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;16. Special provisions for sensitive personal data. –&lt;/b&gt; Notwithstanding anything contained in this Act and the provisions of any other law for the time being in force –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) no person shall store sensitive personal data for a period longer than is necessary to achieve the purpose for which it was collected or received, or, if that purpose has been achieved or ceases to exist for any reason, for any period following such achievement or cessation;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) no person shall process sensitive personal data for a purpose other than the purpose for which it was collected or received;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) no person shall disclose sensitive personal data to another person, or otherwise cause any other person to come into the possession or control of, the content or nature of any sensitive personal data, including any other details in respect thereof.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER IV&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;The Data Protection Authority&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;17.&lt;/b&gt; &lt;b&gt;Constitution of the Data Protection Authority. –&lt;/b&gt; (1) The Central Government shall, by notification, constitute, with effect from such date as may be specified therein, a body to be called the Data Protection Authority consisting of a Chairperson and not more than four other Members, to exercise the jurisdiction and powers and discharge the functions and duties conferred or imposed upon it by or under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Chairperson shall be a person who has been a Judge of the Supreme Court:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that the appointment of the Chairperson shall be made only after consultation with the Chief Justice of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Each Member shall be a person of ability, integrity and standing who has a special knowledge of, and professional experience of not less than ten years in privacy law and policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;18. Term of office, conditions of service, etc. of Chairperson and Members. – &lt;/b&gt;(1) Before appointing any person as the Chairperson or Member, the Central Government shall satisfy itself that the person does not, and will not, have any such financial or other interest as is likely to affect prejudicially his functions as such Chairperson or Member.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Chairperson and every Member shall hold office for such period, not exceeding five years, as may be specified in the order of his appointment, but shall be eligible for reappointment:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that no person shall hold office as the Chairperson or Member after he has attained the age of sixty-seven years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Notwithstanding anything contained in sub-section (2), the Chairperson or any Member may –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) by writing under his hand resign his office at any time;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) be removed from office in accordance with the provisions of section 19 of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) A vacancy caused by the resignation or removal of the Chairperson or Member under sub-section (3) shall be filled by fresh appointment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(5) In the event of the occurrence of a vacancy in the office of the Chairperson, such one of the Members as the Central Government may, by notification, authorise in this behalf, shall act as the Chairperson till the date on which a new Chairperson, appointed in accordance with the provisions of this Act, to fill such vacancy, enters upon his office.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(6) When the Chairperson is unable to discharge his functions owing to absence, illness or any other cause, such one of the Members as the Chairperson may authorise in writing in this behalf shall discharge the functions of the Chairperson, till the date on which the Chairperson resumes his duties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(7) The salaries and allowances payable to and the other terms and conditions of service of the Chairperson and Members shall be such as may be prescribed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that neither the salary and allowances nor the other terms and conditions of service of the Chairperson and any member shall be varied to his disadvantage after his appointment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;19. Removal of Chairperson and Members from office in certain circumstances. – &lt;/b&gt;The Central Government may remove from office the Chairperson or any Member, who –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) is adjudged an insolvent; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) engages during his term of office in any paid employment outside the duties of his office; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) is unfit to continue in office by reason of infirmity of mind or body; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) is of unsound mind and stands so declared by a competent court; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) is convicted for an offence which in the opinion of the President involves moral turpitude; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) has acquired such financial or other interest as is likely to affect prejudicially his functions as a Chairperson or Member, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) has so abused his position as to render his continuance in offence prejudicial to the public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;20. Functions of the Data Protection Authority. –&lt;/b&gt; (1) The Chairperson may inquire, &lt;i&gt;suo moto&lt;/i&gt; or on a petition presented to it by any person or by someone acting on his behalf, in respect of any matter connected with the collection, storage, processing, disclosure or other handling of any personal data and give such directions or pass such orders as are necessary for reasons to be recorded in writing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Without prejudice to the generality of the foregoing provision, the Data Protection Authority shall perform all or any of the following functions, namely –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) review the safeguards provided by or under this Act and other law for the time being       in force for the protection of personal data and recommend measures for their effective  implementation;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) review any measures taken by any entity for the protection of personal data and take such further action is it deems fit;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) review any action, policy or procedure of any entity to ensure compliance with this Act and any rules made hereunder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) formulate, in consultation with experts, norms for the effective protection of personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) promote awareness and knowledge of personal data protection through any means necessary;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) undertake and promote research in the field of protection of personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) encourage the efforts of non-governmental organisations and institutions working in the field of personal data protection;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(h) publish periodic reports concerning the incidence of collection, processing, storage, disclosure and other handling of personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) such other functions as it may consider necessary for the protection of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Subject to the provisions of any rules prescribed in this behalf by the Central Government, the Data Protection Authority shall have the power to review any decision, judgement, decree or order made by it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) In the exercise of its functions under this Act, the Data Protection Authority shall give such directions or pass such orders as are necessary for reasons to be recorded in writing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(5) The Data Protection Authority may, in its own name, sue or be sued.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 21. Secretary, officers and other employees of the Data Protection Authority. – &lt;/b&gt;(1) The Central Government shall appoint a Secretary to the Data Protection Authority to exercise and perform, under the control of the Chairperson such powers and duties as may be prescribed or as may be specified by the Chairperson.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Central Government may provide the Data Protection Authority with such other officers and employees as may be necessary for the efficient performance of the functions of the Data Protection Authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The salaries and allowances payable to and the conditions of service of the Secretary and other officers and employees of the Data Protection Authority shall be such as may be prescribed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 22. Salaries, etc. be defrayed out of the Consolidated Fund of India. –&lt;/b&gt; The salaries and allowances payable to the Chairperson and Members and the administrative expenses, including salaries, allowances and pension, payable to or in respect of the officers and other employees of the of the Data Protection Authority shall be defrayed out of the Consolidated Fund of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 23. Vacancies, etc. not to invalidate proceedings of the Data Protection Authority. –&lt;/b&gt; No act or proceeding of the Data Protection Authority shall be questioned on the ground merely of the existence of any vacancy or defect in the constitution of the Data Protection Authority or any defect in the appointment of a person acting as the Chairperson or Member.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 24. Chairperson, Members and employees of the Data Protection Authority to be public servants. –&lt;/b&gt; The Chairperson and Members and other employees of the Data Protection Authority shall be deemed to be public servants within the meaning of section 21 of the Indian Penal Code, 1860 (45 of 1860).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 25. Location of the office of the Data Protection Authority.&lt;/b&gt; &lt;b&gt;–&lt;/b&gt; The offices of the Data Protection Authority shall be in [___] or any other location as directed by the Chairperson in consultation with the Central Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 26. Procedure to be followed by the Data Protection Authority. – &lt;/b&gt;(1) Subject to the provisions of this Act, the Data Protection Authority shall have powers to regulate –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the procedure and conduct of its business;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the delegation to one or more Members of such powers or functions as the Chairperson may specify.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) In particular and without prejudice to the generality of the foregoing provisions, the powers of the Data Protection Authority&lt;b&gt; &lt;/b&gt;shall include the power to determine the extent to which persons interested or claiming to be interested in the subject-matter of any proceeding before it may be allowed to be present or to be heard, either by themselves or by their representatives or to cross-examine witnesses or otherwise take part in the proceedings:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that any such procedure as may be prescribed or followed shall be guided by the principles of natural justice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27. Power relating to inquiries. –&lt;/b&gt; (1) The Data Protection Authority shall, for the purposes of any inquiry or for any other purpose under this Act, have the same powers as vested in a civil court under the Code of Civil Procedure, 1908 (5 of 1908), while trying suits in respect of the following matters, namely –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the summoning and enforcing the attendance of any person from any part of India and examining him on oath;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the discovery and production of any document or other material object producible as evidence;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) the reception of evidence on affidavit;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) the requisitioning of any public record from any court or office;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) the issuing of any commission for the examination of witnesses; and,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) any other matter which may be prescribed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Data Protection Authority shall have power to require any person, subject to any privilege which may be claimed by that person under any law for the time being in force, to furnish information on such points or matters as, in the opinion of the Data Protection Authority, may be useful for, or relevant to, the subject matter of an inquiry and any person so required shall be deemed to be legally bound to furnish such information within the meaning of section 176 and section 177 of the Indian Penal Code, 1860 (45 of 1860).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The Data Protection Authority or any other officer, not below the rank of a Gazetted Officer, specially authorised in this behalf by the Data Protection Authority may enter any building or place where the Data Protection Authority has reason to believe that any document relating to the subject matter of the inquiry may be found, and may seize any such document or take extracts or copies therefrom subject to the provisions of section 100 of the Code of Criminal Procedure, 1973 (2 of 1974), in so far as it may be applicable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The Data Protection Authority shall be deemed to be a civil court and when any offence as is described in section 175, section 178, section 179, section 180 or section 228 of the Indian Penal Code, 1860 (45 of 1860) is committed in the view or presence of the Data Protection Authority, the Data Protection Authority may, after recording the facts constituting the offence and the statement of the accused as provided for in the Code of Criminal Procedure, 1973 (2 of 1974), forward the case to a Magistrate having jurisdiction to try the same and the Magistrate to whom any such case is forwarded shall proceed to hear the complaint against the accused as if the case had been forwarded to him under section 346 of the Code of Criminal Procedure, 1973 (2 of 1974).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;28. Decisions of the &lt;/b&gt;&lt;b&gt;Data Protection Authority. –&lt;/b&gt; (1) The decisions of the Data Protection Authority shall be binding.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) In its decisions, the Data Protection Authority has the power to –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) require an entity to take such steps as may be necessary to secure compliance with the provisions of this Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) require an entity to compensate any person for any loss or detriment suffered;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) impose any of the penalties provided under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 29. Proceedings before the Data Protection Authority to be judicial proceedings. –&lt;/b&gt; The Data Protection Authority shall be deemed to be a civil court for the purposes of section 195 and Chapter XXVI of the Code of Criminal Procedure, 1973 (2 of 1974), and every proceeding before the Data Protection Authority shall be deemed to be a judicial proceeding within the meaning of section 193 and section 228 and for the purposes of section 196 of the Indian Penal Code, 1860 (45 of 1860).&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER V&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Regulation by Data Controllers and Data Processors&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;30. Co-regulation by Data Controllers and the Data Protection Authority. –&lt;/b&gt; (1) The Data Protection Authority may, in consultation with data controllers, formulate codes of conduct for the collection, storage, processing, disclosure or other handling of any personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No code of conduct formulated under sub-section (1) shall be binding on a data controller unless –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) it has received the written approval of the Data Protection Authority; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) it has received the approval, by signature of a director or authorised signatory, of the data controller.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;31. Co-regulation without prejudice to other remedies. – &lt;/b&gt;Any code of conduct formulated under this chapter shall be without prejudice to the jurisdiction, powers and functions of the Data Protection Authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;32. Self-regulation&lt;/b&gt; &lt;b&gt;by data controllers. – &lt;/b&gt;(1) The Data Protection Authority may encourage data controllers and data processors to formulate professional codes of conduct to establish rules for the collection, storage, processing, disclosure or other handling of any personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No code of conduct formulated under sub-section (1) shall be effective unless it is registered, in such form and manner as may be prescribed, by the Data Protection Authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The Data Protection Authority shall, for reasons to be recorded in writing, not register any code of conduct formulated under sub-section (1) that is not adequate to protect personal data.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER IV&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Surveillance and Interception of Communications&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;33. Surveillance and interception of communication to be warranted. – &lt;/b&gt;Notwithstanding anything contained in any other law for the time being in force, no –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) surveillance shall be carried out, and no person shall order any surveillance of another person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) communication shall be intercepted, and no person shall order the interception of any communication of another person; save in execution of a warrant issued under section 36, or an order made under section 38, of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;34.&lt;/b&gt; &lt;b&gt;Application for issuance of warrant. – &lt;/b&gt;(1) Any authorised officer seeking to carry out any surveillance or intercept any communication of another person shall prefer an application for issuance of a warrant to the Magistrate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The application for issuance of the warrant shall be in the form and manner prescribed in the Schedule and shall state the purpose for which the warrant is sought.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The application for issuance of the warrant shall be accompanied by –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) a report by the authorised officer of the suspicious conduct of the person in respect of whom the warrant is sought, and all supporting material thereof;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) an affidavit of the authorised officer, or a declaration under his hand and seal, that the contents of the report and application are true to the best of his knowledge, information and belief, and that the warrant shall be executed only for the purpose stated in the application and shall not be misused or abused in any manner including to interfere in the privacy of any person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) details of all warrants previously issued in respect of the person in respect of whom the warrant is sought, if any.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;35. Considerations prior to the issuance of warrant. –&lt;/b&gt; (1) No warrant shall issue unless the requirements of section 34 and this section have been met.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Magistrate shall consider the application made under section 34 and shall satisfy himself that the information contained therein sets out –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) a reasonable threat to national security, defence or public order; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) a cognisable offence, the prevention, investigation or prosecution of which is necessary in the public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The Magistrate shall satisfy himself that all other lawful means to acquire the information that is sought by the execution of the warrant have been exhausted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The Magistrate shall verify the identity of the authorised officer and shall satisfy himself that the application for issuance of the warrant is authentic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;36. Issue of warrant. –&lt;/b&gt; (1) Subject to section 34 and section 35, the Magistrate may issue a warrant for surveillance or interception of communication, or both of them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Magistrate may issue the warrant in Chambers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;37. Magistrate may reject application for issuance of warrant. – &lt;/b&gt;If the Magistrate is not satisfied that the requirements of section 34 and section 35 have been met, he may, for reasons to be recorded in writing, –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) refuse to issue the warrant and dispose of the application;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) return the application to the authorised officer without disposing of it;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) pass any order that he thinks fit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38. Order by Home Secretary in emergent circumstances. –&lt;/b&gt; (1) Notwithstanding anything contained in section 35, if the Home Secretary of the appropriate government is satisfied that a grave threat to national security, defence or public order exists, he may, for reasons to be recorded in writing, order any surveillance or interception of communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) An authorised officer seeking an order for surveillance or interception of communication under this section shall prefer an application to the Home Secretary in the form and manner prescribed in the Schedule and accompanied by the documents required under sub-section (3) of section 34.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) No order for surveillance or interception of communication made by the Home Secretary under this section shall be valid upon the expiry of a period of seven days from the date of the order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) Before the expiry of a period of seven days from the date of an order for surveillance or interception of communication made under this section, the authorised officer who applied for the order shall place the application before the Magistrate for confirmation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;39.&lt;/b&gt; &lt;b&gt;Duration of warrant or order. – &lt;/b&gt;(1) The warrant or order for surveillance or interception of communication shall specify the period of its validity and, upon its expiry, all surveillance and interception of communication, as the case may be, carried out in relation to that warrant or order shall cease forthwith:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that no warrant or order shall be valid upon the expiry of a period of sixty days from the date of its issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) A warrant issued under section 36, or an order issued under section 38, for surveillance or interception of communication, or both of them, may be renewed by a Magistrate if he is satisfied that the requirements of sub-section (2) of section 35 continue to exist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;40. Duty to inform the person concerned. – &lt;/b&gt;Subject to sub-section (2), before the expiry of a period of sixty days from the conclusion of any surveillance or interception of communication carried out under this Act, the authorised officer who carried out the surveillance or interception of communication shall, in writing in such form and manner as may be prescribed, notify, with reference to the warrant of the Magistrate, and, if applicable, the order of the Home Secretary, each person in respect of whom the warrant or order was issued, of the fact of such surveillance or interception and duration thereof.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Magistrate may, on an application made by an authorised officer in such form and manner as may be prescribed, if he is satisfied that the notification under sub-section (1) would –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) present a reasonable threat to national security, defence or public order, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) adversely affect the prevention, investigation or prosecution of a cognisable offence,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;for reasons to be recorded in writing addressed to the authorised officer, order that the person in respect of whom the warrant or order of surveillance or interception of communication was issued, not be notified of the fact of such interception or the duration thereof:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;41. Security and duty of confidentiality and secrecy. – &lt;/b&gt;(1) No person shall carry out any surveillance or intercept any communication of another person without implementing measures, including, but not restricted to, technological, physical and administrative measures, to secure the confidentiality and secrecy of all information obtained as a result of the surveillance or interception of communication, as the case may be, including from theft, loss or unauthorised disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Any person who carries out any surveillance or interception of any communication, or who obtains any information, including personal data, as a result of surveillance or interception of communication, shall be subject to a duty of confidentiality and secrecy in respect of it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Every competent organisation shall, before the expiry of a period of one hundred days from the enactment of this Act, designate as many officers as it deems fit as Privacy Officers who shall be administratively responsible for all interceptions of communications carried out by that competent organisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;42. Disclosure of information. – &lt;/b&gt;(1) Save as provided in this section, no person shall disclose to any other person, or otherwise cause any other person to come into the knowledge or possession of, the content or nature of any information, including personal data, obtained as a result of any surveillance or interception carried out under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Notwithstanding anything contained in this section, if the disclosure of any information, including personal data, obtained as a result of any surveillance or interception of any communication is necessary to –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) prevent a reasonable threat to national security, defence or public order, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) prevent, investigate or prosecute a cognisable offence,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;an authorised officer may disclose the information, including personal data, to any authorised officer of any other competent organisation.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER VI&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Offences and penalties&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;43. Punishment for offences related to personal data. –&lt;/b&gt; (1) Whoever, except in conformity with the provisions of this Act, collects, receives, stores, processes or otherwise handles any personal data shall be punishable with imprisonment for a term which may extend to [___] years and may also be liable to fine which may extend to [___] rupees.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Whoever attempts to commit any offence under sub section (1) shall be punishable with the punishment provided for such offence under that sub-section.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Whoever, except in conformity with the provisions of this Act, collects, receives, stores, processes or otherwise handles any sensitive personal data shall be punishable with imprisonment for a term which may extend to [&lt;i&gt;increased for sensitive personal data&lt;/i&gt;] years and and may also be liable to fine which may extend to [___] rupees.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) Whoever attempts to commit any offence under sub section (3) shall be punishable with the punishment provided for such offence under that sub-section.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;44. Abetment and repeat offenders. –&lt;/b&gt; (1) Whoever abets any offence punishable under this Act shall, if the act abetted is committed in consequence of the abetment, be punishable with the punishment provided for that offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Whoever, having been convicted of an offence under any provision of this Act is again convicted of an offence under the same provision, shall be punishable, for the second and for each subsequent offence, with double the penalty provided for that offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;45. Offences by companies. –&lt;/b&gt; (1) Where an offence under this Act has been committed by a company, every person who, at the time of the offence was committed, was in charge of, and was responsible to, the company for the conduct of the business of the company, as well as the company shall be deemed to be guilty of the offence and shall be liable to be proceeded against and punished accordingly:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that nothing contained in this sub-section shall render any such person liable to any punishment, if he proves that the offence was committed without his knowledge or that he had exercised all due diligence to prevent the commission of such offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Notwithstanding anything contained in sub-section (1), where any offence under this Act has been committed by a company and it is proved that the offence has been committed with the consent or connivance of, or is attributable to any neglect on the part of any director, manager, secretary or other officer of the company, such director, manager, secretary or other officer shall be deemed to be guilty of that offence, and shall be liable to be proceeded against and punished accordingly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;46. Cognisance. –&lt;/b&gt; Notwithstanding anything contained in the Code of Criminal Procedure, 1973 (2 of 1974), the offences under section 43, section 44 and section 45 shall be cognisable and non-bailable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;47&lt;/b&gt;&lt;b&gt;. General penalty. –&lt;/b&gt; Whoever, in any case in which a penalty is not expressly provided by this Act, fails to comply with any notice or order issued under any provisions thereof, or otherwise contravenes any of the provisions of this Act, shall be punishable with fine which may extend to [___] rupees, and, in the case of a continuing failure or contravention, with an additional fine which may extend to [___] rupees for every day after the first during which he has persisted in such failure or contravention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;48&lt;/b&gt;&lt;b&gt;. Punishment to be without prejudice to any other action. –&lt;/b&gt; The award of punishment for an offence under this Act shall be without prejudice to any other action which has been or which may be taken under this Act with respect to such contravention.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER VII&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Miscellaneous&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 49. Power to make rules. –&lt;/b&gt; (1) The Central Government may, by notification in the Official Gazette, make rules to carry out the provisions of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) In particular, and without prejudice to the generality of the foregoing power, such rules may provide for –&lt;/p&gt;
&lt;p&gt;[__]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Every rule made under this section shall be laid, as soon as may be after it is made, before each House of Parliament while it is in session for a period of thirty days which may be comprised in one session or in two successive sessions and if before the expiry of the session in which it is so laid or the session immediately following, both Houses agree in making any modification in the rule, or both Houses agree that the rule should not be made, the rule shall thereafter have effect only in such modified form or be of no effect, as the case may be, so however, that any such modification or annulment shall be without prejudice to the validity of anything previously done under that rule.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 50. Bar of jurisdiction. –&lt;/b&gt; (1) On and from the appointed day, no court or authority shall have, or be entitled to exercise, any jurisdiction, powers or authority (except the Supreme Court and a High Court exercising powers under Article 32, Article 226 and Article 227 of the Constitution) in relation to matters specified in this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No order passed under this Act shall be appealable except as provided therein and no civil court shall have jurisdiction in respect of any matter which the Data Protection Authority is empowered by, or under, this Act to determine and no injunction shall be granted by any court or other authority in respect of any action taken or to be taken in pursuance of any power conferred by or under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 51. Protection of action taken in good faith. – &lt;/b&gt;No suit or other legal proceeding shall lie against the Central Government, State Government, Data Protection Authority, Chairperson, Member or any person acting under the direction either of the Central Government, State Government, Data Protection Authority, Chairperson or Member in respect of anything which is in good faith done or intended to be done in pursuance of this Act or of any rules or any order made thereunder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;52. Power to remove difficulties. –&lt;/b&gt; (1) If any difficulty arises in giving effect to the provisions of this Act, the Central Government may, by order, published in the Official Gazette, make such provisions, not inconsistent with the provisions of this Act, as appears to it to be necessary or expedient for removing the difficulty:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that no such order shall be made under this section after the expiry of a period of three years from the commencement of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;(2) Every order made under this section shall be laid, as soon as may be after it is made, before each House of Parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 53. Act to have overriding effect. – &lt;/b&gt;The provisions of this Act shall have effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft'&gt;https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-01T12:25:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-round-table-delhi-october-19-2013">
    <title>Privacy Round Table, New Delhi (October 2013)</title>
    <link>https://cis-india.org/internet-governance/events/privacy-round-table-delhi-october-19-2013</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS), Federation of Indian Chambers of Commerce and Industry (FICCI), and DSCI cordially invite you to a "Privacy Round Table" at the FICCI Federation House in Tansen Marg on October 19, 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click the below links to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-delhi-october-13.pdf" class="internal-link"&gt;Download the event brochure&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Download the &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-september-2013.pdf" class="internal-link"&gt;latest version of the Draft Privacy Bill&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jacob Kohnstamm, Data Protection Authority, Netherlands and Chairman of the Article 29 Working Party, Chantel Bernier, Assistant Privacy Commissioner, Canada, and Christopher Graham, Information Commissioner, UK will make presentations:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;Agenda&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00  &lt;br /&gt;10:30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Introduction and summary of previous Roundtables&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30  &lt;br /&gt;11:00&lt;/td&gt;
&lt;td&gt;“Data Protection in the European Union” &lt;br /&gt;Mr. Jacob Kohnstamm, &lt;i&gt;Data Protection Authority, Netherlands and Chairman of the Article 29 Working Party&lt;/i&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00  &lt;br /&gt;11:15&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15  &lt;br /&gt;12:15&lt;/td&gt;
&lt;td&gt;Regulatory Frameworks and Jurisdiction&lt;br /&gt; a. Co-Regulation vs. Self Regulation vs. Statutory Regulation&lt;br /&gt;b. Applicability of regulatory framework to domestic processing vs. multiple/international jurisdictions&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:15  &lt;br /&gt;12:45&lt;/td&gt;
&lt;td&gt;“An Overview of the Canadian Privacy Regime”&lt;br /&gt;Ms. Chantal Bernier, &lt;i&gt;Assistant Privacy Commissioner, Canada&lt;/i&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:15  &lt;br /&gt;13:30&lt;/td&gt;
&lt;td&gt;The Privacy Commissioner&lt;br /&gt;a. Composition of the Office of the Privacy Commissioner (officers, funding, organizational structure)&lt;br /&gt;b. Powers of the Privacy Commissioner (investigation, audit, privacy impact assessment etc)&lt;br /&gt; c. Functions of the Office of the Privacy Commissioner&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30  &lt;br /&gt;14:30&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30  &lt;br /&gt;15:30&lt;/td&gt;
&lt;td&gt;Rights of the individual and exceptions to the right to privacy&lt;br /&gt; a. Rights of the individual including: notice, access, deletion etc.&lt;br /&gt;b. Exceptions to the right to privacy: national security, public&lt;br /&gt; order, public interest, prevention and detection of crime etc.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30  &lt;br /&gt;16:00&lt;/td&gt;
&lt;td&gt;“An overview of the Privacy Regime in the UK” &lt;br /&gt; Mr.  Christopher Graham, Information Commissioner, UK &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:00  &lt;br /&gt;16:15&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:15  &lt;br /&gt;17:00&lt;/td&gt;
&lt;td&gt;Defining and protecting personal data and personal sensitive data&lt;br /&gt;a.    Definitions and distinctions between personal data vs personal sensitive data&lt;br /&gt;b.    Levels of protection for personal data vs. personal sensitive data&lt;br /&gt; c.    Penalty and remedy for breach of personal data vs. personal sensitive data&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:00  &lt;br /&gt;18:00&lt;/td&gt;
&lt;td&gt;Penalty and Redress&lt;br /&gt; a. Forms and extent of penalty: fine, public notice, shut down of services etc.&lt;br /&gt; b. Forms of redress for the individual&lt;br /&gt; c. Enforcement of penalty and redress&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;The Speakers&lt;/h2&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Jacob.png/@@images/a153adde-fdab-489b-84f0-340787121b1b.png" alt="Jacob" class="image-inline" title="Jacob" /&gt;&lt;/h3&gt;
&lt;h3 style="text-align: center; "&gt;&lt;b&gt;Jacob Kohnstamm&lt;/b&gt;&lt;/h3&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Before his appointment as Chairman of the &lt;a class="external-link" href="http://www.dutchdpa.nl/Pages/home.aspx"&gt;Dutch Data Protection Authority&lt;/a&gt; in 2004, Jacob Kohnstamm was active in Dutch politics as member of the  Lower House of the Dutch Parliament, as State Secretary for Internal  Affairs and as member of the Senate of the Dutch Parliament (between  1981 and 2004). Before that, he worked as a lawyer in Amsterdam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since February 2010, Jacob Kohnstamm is Chairman of the &lt;a class="external-link" href="http://ec.europa.eu/justice/data-protection/article-29/"&gt;Art. 29 Working Party of European Data Protection Authorities&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since  November 2011, Jacob Kohnstamm is also Chairman of the Executive  Committee of the International Conference of Data Protection and Privacy  Commissioners.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Chantel.png/@@images/14ec1d2b-18ac-4327-ad26-1e4f38cdbc4c.png" title="Chantal" height="271" width="221" alt="Chantal" class="image-inline" /&gt;&lt;/p&gt;
&lt;h3 style="text-align: center; "&gt;&lt;b&gt;Chantal Bernier&lt;/b&gt;&lt;/h3&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Chantal Bernier was appointed Assistant Privacy Commissioner of Canada in December 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ms. Bernier started her career in the federal government as a lawyer in the &lt;a class="external-link" href="http://www.justice.gc.ca/eng/"&gt;Department of Justice, Canada&lt;/a&gt;.  She went on to hold a directorship at the Privy Council Office before  being appointed Assistant Deputy Minister at Indian and Northern Affairs  Canada, and later on at Public Safety Canada.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She holds a Bachelor of Civil Law from the &lt;a class="external-link" href="http://www.usherbrooke.ca/"&gt;University of Sherbrooke&lt;/a&gt; and a Masters in Public International Law from the &lt;a class="external-link" href="http://www.lse.ac.uk/home.aspx"&gt;London School of Economics and Political Science&lt;/a&gt;.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Christopher.png/@@images/a67e609e-590e-4c77-b957-ba785a06b691.png" title="Christopher" height="138" width="228" alt="Christopher" class="image-inline" /&gt;&lt;/p&gt;
&lt;h3 style="text-align: center; "&gt;&lt;b&gt;Christopher Graham&lt;/b&gt;&lt;/h3&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Christopher  Graham became UK Information Commissioner in June 2009, with  responsibility for overseeing the Freedom of Information Act and Data  Protection Act regimes — upholding information rights in the public  interest, promoting openness by public bodies and data privacy for  individuals. He is the Vice Chair of the Article 29 Working Party of the  European Data Protection Authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Christopher was the director general of the &lt;a class="external-link" href="http://www.asa.org.uk/"&gt;Advertising Standards Authority &lt;/a&gt;(ASA) from April 2000 to June 2009. From 2003-5, he was chairman of the &lt;a class="external-link" href="http://www.easa-alliance.org/"&gt;European Advertising Standards Alliance&lt;/a&gt; (EASA), the federation of advertising self-regulatory bodies across the EU Single Market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prior to joining the ASA, Christopher was for three years Secretary of the &lt;a class="external-link" href="http://www.bbc.com/?/"&gt;BBC&lt;/a&gt;.  Christopher first joined the broadcaster as a news trainee in 1973. He  was a Current Affairs Producer for BBC Radio and TV before becoming  Managing Editor of News Programmes for TV and Radio.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Confirmations and RSVP&lt;/h2&gt;
&lt;p&gt;Please send your email confirmations for attending the Delhi Privacy Round Table on October 19, 2013, to Elonnai Hickok (&lt;a class="mail-link" href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-round-table-delhi-october-19-2013'&gt;https://cis-india.org/internet-governance/events/privacy-round-table-delhi-october-19-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-28T02:52:26Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/eleventh-india-knowledge-summit-2013">
    <title>11th India Knowledge Summit 2013</title>
    <link>https://cis-india.org/news/eleventh-india-knowledge-summit-2013</link>
    <description>
        &lt;b&gt;The Associated Chambers of Commerce and Industry in India (ASSOCHAM) is organizing the 11th Knowledge Summit 2013 in Hotel Shangri-La, New Delhi on October 14 and 15, 2013. The Centre for Internet and Society is supporting this event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to read the original &lt;a class="external-link" href="http://www.assocham.org/events/showevent.php?id=888"&gt;published by ASSOCHAM here&lt;/a&gt; , &lt;a class="external-link" href="http://www.assocham.org/downloads/?filename=11th-India-Knowledege-Summit-Tentative-Agenda.docx"&gt;read the tentative agenda here&lt;/a&gt; and the &lt;a class="external-link" href="http://www.assocham.org/docs/11th-Konwledge-Summit-CyberSecurityBrochure_13.pdf"&gt;event brochure here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The lack of a national-level doctrine has created an environment  where we are entirely reactive in our cyber posture. Indeed, battlefield  transcends physical borders and boundaries. The power of a nation-state  is not required to inflict widespread damage to critical infrastructure  systems; a single malicious actor can wreak havoc. The starkest  difference, however, is that today both the private sector and  individual citizens have unprecedented access to a myriad of  infrastructure systems that can provide entry into sensitive systems –  yet they are largely unaware of, and unaccountable for, their  responsibilities in defending them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As cyber networks rapidly transition from a mere utility to the  undercurrent of our entire societal infrastructure, this reliance  becomes a vulnerability. The modern Cyber Era demands a national-level  doctrine that can be adopted by government agencies, armed forces,  private sector organizations and individual citizens alike to establish a  collective sense of purpose for our Cyber Security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chamber is providing a forum to  bring executive leaders,  policymakers and academia together with the scientists and practitioners  that intimately understand cyber technology to collaborate and begin a  debate about the complex issues.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The time has come when we should consider not only the military  impact of the new cyber world, but also what role cyber defense will  hold in shaping the future of our country’s economy, education, foreign  affairs policies and critical infrastructure initiatives. Only then can  our government, industry, and private citizens align under common goals  to shape a safe and prosperous future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ASSOCHAM India's Apex Chamber for Commerce &amp;amp; Industry was set  up in 1920. Today the Chamber is proud to have more than 450,000  Companies as it's esteemed Member which includes many of the big global  technology companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ASSOCHAM is privileged to be a Member of the &lt;b&gt;“Cyber Regulation Advisory Committee” &lt;/b&gt;set up by &lt;b&gt;Ministry of Communications and IT, &lt;/b&gt;and the &lt;b&gt;Joint Working Group (JWG) on Cyber Security &lt;/b&gt;set up by the &lt;b&gt;National Security Council Secretariat, &lt;/b&gt;Government of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ASSOCHAM’s flagship program the Annual &lt;b&gt;INDIA KNOWLEDGE SUMMIT, &lt;/b&gt;organized  since 1999 has been Addressed in the past by Noble Laureates, as the  Distinguished ‘Key Note Speaker’ including – Dr. Craig Venter, Sir Harry  Kroto, Prof. Aaron Ciechanover, Dr. Raj Reddy, Dr. A P J Abdul Kalam,  Dr. Kirsty Duncan, Prof. John A Pickett to name a few.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This year the &lt;b&gt;11th INDIA KNOWLEDGE SUMMIT &lt;/b&gt;is being organized from &lt;b&gt;14-15 October, 2013 in Hotel &lt;/b&gt;&lt;b&gt;Shangri-La, New Delhi.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Theme for this year’s Summit is &lt;b&gt;“Cyber Era - Securing the Future”&lt;/b&gt;.&lt;/p&gt;
&lt;p align="left"&gt;&lt;b&gt;Registration Fees: &lt;/b&gt;&lt;/p&gt;
&lt;blockquote&gt;&lt;b&gt;International Delegates&lt;/b&gt;:  $ 200/- for both days&lt;b&gt;&lt;br /&gt;Indian Delegates&lt;/b&gt;:  Rs. 5,000/- per day&lt;b&gt;&lt;br /&gt;Students&lt;/b&gt;:  Rs. 2,000/- per day
&lt;p&gt;The Delegate Registration Fee include:&lt;br /&gt; Tea &amp;amp; Coffee&lt;br /&gt; Copy of Background Paper / &lt;br /&gt; Copy of Workshop Study Material&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p align="left"&gt;&lt;b&gt;For more details       please contact: &lt;/b&gt;&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Ajay Sharma, Senior Director, M: 9899188488 , eMail: &lt;a href="mailto:ajay.sharma@assocham.com"&gt;ajay.sharma@assocham.com&lt;/a&gt;&lt;br /&gt; Varun Aggarwal, Joint Director, M: 9910613815 , eMail: &lt;a href="mailto:varun.aggarwal@assocham.com"&gt;varun.aggarwal@assocham.com&lt;/a&gt;&lt;br /&gt; Himanshu Rewaria, Executive, M: 9654251077 , eMail: &lt;a href="mailto:himanshu.rewaria@assocham.com"&gt;himanshu.rewaria@assocham.com&lt;/a&gt;&lt;br /&gt; Sahil Goswami Executive, M: 9871962311 , eMail: &lt;a href="mailto:sahil.goswami@assocham.com"&gt;sahil.goswami@assocham.com&lt;/a&gt;&lt;br /&gt;&lt;br /&gt; &lt;b&gt;Corporate Office&lt;/b&gt;&lt;br /&gt; The Associated Chambers of Commerce and Industry of India&lt;br /&gt; ASSOCHAM Corporate Office, 5, Sardar Patel Marg&lt;br /&gt;Chanakyapuri, New Delhi – 110021&lt;br /&gt; Phone: 46550555 (Hunting Line)&lt;br /&gt; Fax: 01123017008/9&lt;br /&gt; &lt;br /&gt; Email: &lt;a class="newslink" href="mailto:assocham@nic.in"&gt;assocham@nic.in&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/eleventh-india-knowledge-summit-2013'&gt;https://cis-india.org/news/eleventh-india-knowledge-summit-2013&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-26T07:15:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance">
    <title>CYFY 2013: India Conference on Cyber Security and Cyber Governance</title>
    <link>https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance</link>
    <description>
        &lt;b&gt;The Observer Research Foundation in collaboration with the Federation of Indian Chambers of Commerce and Industry is holding the India Conference on Cyber Security and Cyber Governance at the Oberoi Hotel in New Delhi on October 14 and 15, 2013. Sunil Abraham will participate in this event as a speaker.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to download the full details in the &lt;a href="https://cis-india.org/internet-governance/blog/cyfy-brochure.pdf" class="internal-link"&gt;event brochure&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Shri Kapil Sibal, Minister of Communications &amp;amp; Technology will give the inaugural address. Shri Shivshankar Menon, National Security Advisor, Government of India will give the keynote address. Shri Shashi Tharoor, Minister of State, Human Resource Development, Government of India will give the dinner table address on October 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the second day, October 15, Minister Jaak Aaviksoo will give the keynote address and Shri Nehchal Sandhu, Deputy National Advisor, Government of India will give the valedictory address.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;List of Speakers&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Kapil Sibal, Minister for Communications and Information Technology, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shivshankar Menon, National Security Advisor, Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shashi Tharoor, Minister of State for Human Resource Development, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Nehchal Sandhu, Deputy National Security Advisor, Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A.P. Shah, Former Chief Justice, Delhi High Court&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Arvind Gupta, Director General, Institute for Defence Studies and Analyses, India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ashish Chauhan, CEO, Bombay Stock Exchange&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;C. Raja Mohan, Distinguished Fellow, ORF&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Christopher Painter, Office of the Coordinator for Cyber Issues, Department Of State, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Dirk Brengelmann, Commissioner for International Cyber Policy, Federal Foreign Office, Germany&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Eric H. Loeb, Vice President, International External Affairs, AT&amp;amp;T&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Gabriel Siboni, Director, Cyber Warfare Program, Institute for National Security Studies, Tel Aviv University, Israel&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Jaak Aaviksoo, Minister of Education and Research of the Republic of Estonia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Jamie Shea, Deputy Assistant Secretary General, Emerging Security Challenges, NATO&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Joe Sullivan, CSO, Facebook&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;John Mallery, Research Scientist, MIT Computer Science &amp;amp; Artificial Intelligence Laboratory, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Maurizio Martellini, Secretary General, Landau Network-Centro Volta and IWG Executive Secretary, Italy&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Michael Cheatham, Head U.S. Representative Office, Indo-US Science and. Technology Forum, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;M.M.Oberoi, Indian Police Service, Joint commissioner of Police, Delhi Police, Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Oleg Demidov, The Russian Center for Policy Studies, Russia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Peter Grabosky, Researcher, Australian National University, Australia&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Prakash Nagpal, Senior Vice President, Product Marketing and Marketing, Narus&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Rajan Mathews, Director General, Cellular Operators Association of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Ram Narain, Deputy Director General (Security), Department of Telecommunication (DoT), Government of India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sandro Gaycken, Freie Universität Berlin, Institute of Computer Science, Germany&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sean Kanuck, National Intelligence Officer for Cyber Issues, Office of the Director of National Intelligence, USA&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Sunil Abraham, Executive Director, Centre for Internet and Society, Bangalore&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Vijay Madan, Chief Mentor, Tata Teleservices (former Director, C-DOT), India&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Vivke Lall, President &amp;amp; CEO, Reliance Industries Limited&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance'&gt;https://cis-india.org/news/india-conference-on-cyber-security-and-cyber-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-26T06:50:15Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/computerworld-september-25-2013-john-ribeiro-indian-biometric-id-plan-faces-court-hurdle">
    <title>Indian biometric ID plan faces court hurdle</title>
    <link>https://cis-india.org/news/computerworld-september-25-2013-john-ribeiro-indian-biometric-id-plan-faces-court-hurdle</link>
    <description>
        &lt;b&gt;Supreme Court in India rules -- for now -- against plan to make biometric ID mandatory for receiving services.&lt;/b&gt;
        &lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;This article by John Ribeiro was&lt;a class="external-link" href="http://www.computerworld.com/s/article/9242654/Indian_biometric_ID_plan_faces_court_hurdle?taxonomyId=17"&gt; published in Computer World on September 25, 2013&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A controversial biometric project in India, which could require people to produce their biometric IDs to collect government subsidies, has received a significant setback from the country's Supreme Court.&lt;br /&gt;&lt;br /&gt;The court ruled this week in an interim order that people cannot be required to have the controversial Aadhaar identification to collect state subsidies, even as the Unique Identification Authority of India (UIDAI), the government agency that manages the project, has been trying to promote the Aadhaar number as proof of identity for a variety of services including banking.&lt;br /&gt;&lt;br /&gt;The UIDAI has said that the scheme is voluntary, but some states and agencies have attempted to link the identification to the implementation of programs such as cash subsidies for cooking gas that benefit even the middle and richer classes.&lt;br /&gt;&lt;br /&gt;"I signed up for Aadhaar only to ensure that I continue to get a gas cylinder at reasonable rates," said an executive in Bangalore who had queued up a few months ago for an Aadhaar number. The state of Maharashtra, for example, aims to be the first state in the country to roll out Aadhaar-linked subsidy transfers to LPG (liquified petroleum gas) consumers across all the districts in the state.&lt;br /&gt;&lt;br /&gt;Pending a final order, the court ruled that "....no person should suffer for not getting the Adhaar card inspite of the fact that some authority had issued a circular making it mandatory...."&lt;br /&gt;&lt;br /&gt;UIDAI Chairman Nandan Nilekani did not immediately agree to discuss the court order.&lt;br /&gt;&lt;br /&gt;The Aadhaar project is the result of an executive order, and is not backed by a law passed by India's Parliament, so its legality can be in question, said Pavan Duggal, a cyberlaw expert who practices before India's Supreme Court. The project could be in violation of the country's Information Technology Act and rules which cover collection, handling and processing of sensitive personal data, he added.&lt;br /&gt;&lt;br /&gt;Aadhaar, though said to be voluntary, could also be in violation of fundamental rights of the Indian constitution relating to right to life and privacy, as a perception is being created that the ID will be required for subsidies and benefits, Duggal added.&lt;br /&gt;&lt;br /&gt;The government should have considered getting an enabling law passed by Parliament for the data collection as also a strong privacy law to prevent misuse of Aadhaar related data and collation of multiple databases using Aadhaar, because of the privacy issues involved and its implications on fundamental rights, said Pranesh Prakash, Policy Director at the Centre for Internet and Society in Bangalore.&lt;br /&gt;&lt;br /&gt;The biometric project, which collects 10 fingerprints, iris scan and other information such as name, date of birth and address, has been criticized by a number of privacy groups who worry that the data could at some point be misused by the government. There is also a risk that such large databases could be hacked, putting at risk information of people. It is not clear what are the measures taken by UIDAI to protect the authenticity and correctness of the biometric information, and prevent access by foreign powers, Duggal said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar number now allows different agencies including private organizations to collect and exchange data between them, which may be useful to marketers, for example, Prakash said. Previously, it wasn't practical as the agencies would have difficulty ensuring that the information was about the same person, he added.&lt;br /&gt;&lt;br /&gt;The Supreme Court has also ruled that illegal immigrants should not be enrolled under the Aadhaar program, which is meant to facilitate subsidized services to Indian citizens. The Aadhaar, which does not collect citizenship information, is likely to be misused by illegal migrants, activists have said.&lt;br /&gt;&lt;br /&gt;One of the many challenges facing the Aadhaar program is that village-level politicians and influence peddlers cook up data to enroll under subsidy schemes people who are not eligible for benefits, or people who are nonexistent. The traditional paper ration card scheme and voter rolls are usually stuffed with nonexistent people or people who do not typically qualify for benefits.&lt;br /&gt;&lt;br /&gt;Aadhaar was expected to remove these discrepancies by more accurate collection of data on people who enrolled under the scheme. But a number of users have complained that the Aadhaar cards they have received have errors in their names, addresses and other details. One newspaper reported that an Aadhaar applicant received a card that had the face of a dog in place of his photograph.&lt;br /&gt;&lt;br /&gt;UIDAI aims to provide 600 million Aadhaar numbers to residents by 2014.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/computerworld-september-25-2013-john-ribeiro-indian-biometric-id-plan-faces-court-hurdle'&gt;https://cis-india.org/news/computerworld-september-25-2013-john-ribeiro-indian-biometric-id-plan-faces-court-hurdle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-03T10:58:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit">
    <title>Youths brainstorm at social summit</title>
    <link>https://cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit</link>
    <description>
        &lt;b&gt;This group of youngsters is in the process of developing a smartphone app that will help traffic police and civic agencies strengthen emergency services like ambulances and fire engines.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The event was hosted in CIS on September 21. The Times of India covered this and &lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/bangalore/Youths-brainstorm-at-social-summit/articleshow/22877055.cms"&gt;published the story&lt;/a&gt; on September 22, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"Digital signboards and phone alerts can sensitize road users and traffic cops about emergency vehicles ," says the team, which is working on creating prototypes to build emergency response systems for citizens in case of road accidents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Trupti Chengalath, head of communications for Mahiti.org, Dipankar Nayak, a young architect and Gauri Prasad, a Class 12 student of Canadian International School are part of the team which came together at the Bangalore Social Good Jam on Saturday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The event, organized at the Centre for Internet and Society, Domlur, saw the participation of schoolchildren, college goers, young professionals and social entrepreneurs , who focused on devising technological solutions to some of the most pressing problems faced by Indian cities . Members of &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/ASHOKA"&gt;Ashoka&lt;/a&gt; India , a global association of leading social entrepreneurs , IDEX, a six-month fellowship programme on social enterprise, and the Green Lungi Movement, were part of the session.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meera Vijayan, consultant , Framework Change, Ashoka, told STOI, "NGOs run by fellows of Ashoka and IDEX will implement these tech-based solutions in different cities and will involve government stakeholders too. These summits have become a global conversation on how to &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/Leverage"&gt;leverage&lt;/a&gt; technology for social change. Bangalore was chosen for the first-of-its-kind event in India because IT runs in the blood of the city."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit'&gt;https://cis-india.org/news/the-times-of-india-september-22-2013-youths-brainstorm-at-social-summit&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-25T11:08:03Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy">
    <title>The National Cyber Security Policy: Not a Real Policy</title>
    <link>https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy</link>
    <description>
        &lt;b&gt;Cyber security in India is still a nascent field without an organised law and policy framework. Several actors participate in and are affected by India's still inchoate cyber security regime. The National Cyber Security Policy (NCSP) presented the government and other stakeholders with an opportune moment to understand existing legal limitations before devising a future framework. Unfortunately, the NCSP's poor drafting and meaningless provisions do not advance the field.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article was &lt;a class="external-link" href="http://orfonline.org/cms/sites/orfonline/html/cyber/cybsec1.html"&gt;published in the Observer Research Foundation's Cyber Security Monitor Vol. I, Issue.1, August 2013&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;For some time now, law and policy observers in India have been noticing a  definite decline in the quality of national policies emanating from the  Central Government. Unlike legislation, which is notionally subject to  debate in the Parliament of India, policies face no public evaluation  before they are brought in to force. Since, unlike legislation, policies  are neither binding nor enforceable, there has been no principled  ground for demanding public deliberation of significant national  policies. While Parliament’s falling standard of competence has been  almost unanimously condemned, there has been nearly no criticism of the  corresponding failure of the Centre to invigilate the quality of the  official policies of its ministries. Luckily for the drafters of the  National Cyber Security Policy (NCSP), the rest of the country has also  mostly failed to notice its poor content.&lt;br /&gt; &lt;br /&gt;The NCSP was notified into effect on 2 July 2013 by the Department  of Electronics and Information Technology – which calls itself DeitY –  of the Ministry of Communications and Information Technology. As far as  legislation and legal drafting go, DeitY has a dubious record. In March  2013, in a parliamentary appraisal of subordinate law framed by DeitY, a  Lok Sabha committee found ambiguity, invasions of privacy and  potentially illegal clauses. Apprehensions about statutory law  administered by DeitY have also found their way to the Supreme Court of  India, where a constitutional challenge to certain provisions of the  Information Technology Act, 2000 (IT Act) continues. On more than one  occasion, owing to poor drafting, DeitY has been forced to issue  advisories and press releases to clarify the meaning of its laws.  Ironically, the legal validity of these clarifications is also  questionable.&lt;br /&gt; &lt;br /&gt;A national policy must set out, in real and quantifiable terms, the  objectives of the government in a particular field within a specified  time frame. To do that, the policy must provide the social, economic,  political and legal context prevalent at the time of its issue as well  as a normative statement of factual conditions it seeks to achieve at  the time of its expiry. Between these two points in time, the policy  must identify and explain all the particular social, economic, political  and legal measures it intends to implement to secure its success.  Albeit concerned solely with economic growth, the Five-Year Plans – the  Second and Tenth Plans in particular, without prejudice to their success  or failure, are samples of policies that are well-drafted. In this  background, the NCSP should be judged on the basis of how it addresses,  in no particular order, national security, democratic freedoms, economic  growth and knowledge development. Let us restrict ourselves to the  first two issues.&lt;br /&gt; &lt;br /&gt;There are broadly two intersections between national security and  information technology; these are: (i) the security of networked  communications used by the armed forces and intelligence services, and  (ii) the storage of civil information of national importance. While the  NCSP makes no mention of it, the adoption of the doctrine of  network-centric warfare by the three armed forces is underway.  Understanding the doctrine is simple – an intensive use of information  technology to create networks of information aids situational awareness  and enables collaboration to bestow an advantage in combat. However, the  doctrine is vulnerable to asymmetric attack using both primitive and  highly sophisticated means. Pre-empting such attacks should be a primary  policy concern; not so, apparently, for the NCSP which is completely  silent on this issue. The NCSP is slightly more forthcoming on the  protection of critical information infrastructure of a civil nature.  Critical information infrastructure, such as the national power grid or  the Aadhar database, is narrowly defined in section 70 of the IT Act  where it used to describe a protected system. Other provisions of the IT  Act also deal with the protection of critical information  infrastructure. The NCSP does not explain how these statutory provisions  have worked or failed, as the case may be, to necessitate further  mention in a policy document. For instance, section 70A of the IT Act,  inserted in 2008, enables the creation of a national nodal agency to  undertake research and development and other activities in respect of  critical information infrastructure. Despite this, five years later, the  NCSP makes a similar recommendation to operate a National Critical  Information Infrastructure Protection Centre to undertake the same  activities. In the absence of any meaningful explanation of intended  policy measures, there is no reason to expect that the NCSP will succeed  where an Act of Parliament has failed.&lt;br /&gt; &lt;br /&gt;But, putting aside the shortcomings of its piece-meal provisions,  the NCSP also fails to address high-level conceptual policy concerns. As  information repositories and governance services through information  technology become increasingly integrated and centralised, the security  of the information that is stored or distributed decreases. Whether by  intent or error, if these consolidated repositories of information are  compromised, the quantity of information susceptible to damage is  greater leading to higher insecurity. Simply put, if power transmission  is centrally controlled instead of zonally, a single attack could black  out the entire country instead of only a part of it. Or if personal data  of citizens is centrally stored, a single leak could compromise the  privacy of millions of people instead of only hundreds. Therefore, a  credible policy must, before it advocates greater centralisation of  information, examine the merits of diffused information storage to  protect national security. The NCSP utterly fails in this regard.&lt;br /&gt; &lt;br /&gt;Concerns short of national security, such as the maintenance of law  and order, are also in issue because crime is often planned and  perpetrated using information technology. The prevention of crime before  it is committed and its prosecution afterwards is a key policy concern.  While the specific context may vary depending on the nature of the  crime – the facts of terrorism are different from those of insurance  fraud – the principles of constitutional and criminal law continue to  apply. However, the NCSP neither examines the present framework of  cybersecurity-related offences nor suggests any changes in existing law.  It merely calls for a “dynamic legal framework and its periodic review  to address the cyber security challenges” (sic). This is self-evident,  there was no need for a new national policy to make this discovery; and,  ironically, it fails to conduct the very periodic review that it  envisages. This is worrying because the NCSP presented DeitY with an  opportunity to review existing laws and learn from past mistakes. There  are concerns that cybersecurity laws, especially relevant provisions of  the IT Act and its rules, betray a lack of understanding of India’s  constitutional scheme. This is exemplified by the insertion, in 2008, of  section 66A into the IT Act that criminalises the sending of annoying,  offensive and inconvenient electronic messages without regard for the  fact that free speech that is annoying is constitutionally protected.&lt;br /&gt; &lt;br /&gt;In India, cybersecurity law and policy attempts to compensate for  the state’s inability to regulate the internet by overreaching into and  encroaching upon democratic freedoms. The Central Monitoring System  (CMS) that is being assembled by the Centre is a case in point. Alarmed  at its inability to be privy to private communications, the Centre  proposes to build systems to intercept, in real time, all voice and data  traffic in India. Whereas liberal democracies around the world require  such interceptions to be judicially sanctioned, warranted and supported  by probable cause, India does not even have statutory law to regulate  such an enterprise. Given that, once completed, the CMS will represent  the largest domestic interception effort in the world, the failure of  the NCSP to examine the effect of such an exercise on daily  cybersecurity is bewildering. This is made worse by the fact that the  state does not possess the technological competence to build such a  system by itself and is currently tendering private companies for  equipment. The state’s incompetence is best portrayed by the activities  of the Indian Computer Emergency Response Team (CERT-In) that was  constituted under section 70B of the IT Act to respond to “cyber  incidents”. CERT-In has repeatedly engaged in extra-judicial censorship  and has ham-handedly responded to allegedly objectionable blogs or  websites by blocking access to entire domains. Unfortunately, the NCSP,  while reiterating the operations of CERT-In, attempts no evaluation of  its activities precluding the scope for any meaningful policy measures.&lt;br /&gt; &lt;br /&gt;The NCSP’s poor drafting, meaningless provisions, deficiency of  analysis and lack of stated measures renders it hollow. Its notification  into force adds little to the public or intellectual debate about  cybersecurity and does nothing to further the trajectory of either  national security or democratic freedoms in India. In fairness, this  problem afflicts many other national policies. There is a need to  revisit the high intellectual and practical standards set by most  national policies that were issued in the years following Independence.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy'&gt;https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-25T09:49:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy">
    <title>CIS and International Coalition Calls upon Governments to Protect Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) along with the International Coalition has called upon governments across the globe to protect privacy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On September 20 in Geneva, CIS joined a huge international coalition in calling upon countries across the globe, including India to assess whether national surveillance laws and activities are in line with their international human rights obligations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has endorsed a set of international principles against unchecked surveillance. The 13 Principles set out for the first time an evaluative framework for assessing surveillance practices in the context of international human rights obligations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A group of civil society organizations officially presented the 13 Principles this past Friday in Geneva at a side event attended by Navi Pillay, the United Nations High Commissioner for Human Rights and the United Nations Special Rapporteur on Freedom of Expression and Opinion, Frank LaRue, during the 24th session of the Human Rights Council. The side event was hosted by the Permanent Missions of Austria, Germany, Liechtenstein, Norway, Switzerland and Hungary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok, Programme Manager at the Centre for Internet and Society has noted that "the 13 Principles are an important first step towards informing governments, corporates, and individuals across jurisdictions, including India, about needed safeguards for surveillance practices and related policies to ensure that they are necessary and proportionate."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Navi Pillay, the United Nations High Commissioner for Human Rights, speaking at the Human Rights Council stated in her opening statement on September 9:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"Laws and policies must be adopted to address the potential for dramatic intrusion on individuals’ privacy which have been made possible by modern communications technology."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Navi Pillay, the United Nations High Commissioner for Human Rights, speaking at the event, said that:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"technological advancements have been powerful tools for democracy by giving access to all to participate in society, but increasing use of data mining by intelligence agencies blurs lines between legitimate surveillance and arbitrary mass surveillance."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Frank La Rue, the United Nations Special Rapporteur on Freedom of Expression and Opinion &lt;a href="http://www.google.com/url?q=http%3A%2F%2Fwww.ohchr.org%2FDocuments%2FHRBodies%2FHRCouncil%2FRegularSession%2FSession23%2FA.HRC.23.40_EN.pdf&amp;amp;sa=D&amp;amp;sntz=1&amp;amp;usg=AFQjCNEwtpzwnl_1_j_UoSnoE048kX-LYA"&gt;made clear &lt;/a&gt;the case for a direct relationship between state surveillance, privacy and freedom of expression in this latest report to the Human Rights Council:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"The right to privacy is often understood as an essential requirement for the realization of the right to freedom of expression. Undue interference with individuals’ privacy can both directly and indirectly limit the free development and exchange of ideas. … An infringement upon one right can be both the cause and consequence of an infringement upon the other."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Speaking at the event, the UN Special Rapporteur remarked that:&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"previously surveillance was carried out on targeted basis but the Internet has changed the context by providing the possibility for carrying out mass surveillance. This is the danger."&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Representatives of the Centre for Internet and Society, &lt;a href="https://www.privacyinternational.org"&gt;Privacy International&lt;/a&gt;, the &lt;a href="https://eff.org"&gt;Electronic Frontier Foundation&lt;/a&gt;,&lt;a href="https://accessnow.org"&gt;Access&lt;/a&gt;,&lt;a href="http://www.hrw.org/"&gt;Human Rights Watch&lt;/a&gt;,&lt;a href="http://en.rsf.org/"&gt;Reporters Without Borders&lt;/a&gt;, &lt;a href="http://www.apc.org/"&gt;Association for Progressive Communications&lt;/a&gt;, and the&lt;a href="https://www.cdt.org/"&gt;Center&lt;/a&gt;&lt;a href="https://www.cdt.org/"&gt; for Democracy and Technology &lt;/a&gt;all are taking part in the event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Find out more about the Principles at &lt;a href="https://necessaryandproportionate.org"&gt;https://NecessaryandProportionate.org&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Contacts&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;NGOs currently in Geneva for the 24&lt;sup&gt;th&lt;/sup&gt; Human Rights Council:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Access&lt;/b&gt;&lt;br /&gt;Fabiola Carrion: &lt;a class="mail-link" href="mailto:fabiola@accessnow.org"&gt;fabiola@accessnow.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Association for Progressive Communication&lt;/b&gt;&lt;br /&gt;Shawna Finnegan: &lt;a href="mailto:shawna@apc.org"&gt;shawna@apc.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Center for Democracy and Technology&lt;/b&gt;&lt;br /&gt;Matthew Shears: &lt;a href="mailto:mshears@cdt.org"&gt;mshears@cdt.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Electronic Frontier Foundation&lt;/b&gt;&lt;br /&gt;Katitza Rodriguez:  &lt;a href="mailto:katitza@eff.org"&gt;katitza@eff.org&lt;/a&gt; - @txitua&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Human Rights Watch&lt;/b&gt;&lt;br /&gt;Cynthia Wong: &lt;a class="mail-link" href="mailto:wongc@hrw.org"&gt;wongc@hrw.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Privacy International&lt;/b&gt;&lt;br /&gt;Carly Nyst: &lt;a href="mailto:carly@privacy.org"&gt;carly@privacy.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Reporters Without Borders&lt;/b&gt;&lt;br /&gt;Lucie Morillon: &lt;a href="mailto:lucie.morillon@rsf.org"&gt;lucie.morillon@rsf.org&lt;/a&gt;&lt;br /&gt;Hélène Sackstein: &lt;a href="mailto:helsack@gmail.com"&gt;helsack@gmail.com&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Signatories&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Argentina&lt;/b&gt;&lt;br /&gt;Ramiro Alvarez: &lt;a href="mailto:rugarte@adc.org.ar"&gt;rugarte@adc.org.ar&lt;/a&gt;&lt;br /&gt;Asociación por los Derechos Civiles&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Argentina&lt;/b&gt;&lt;br /&gt;Beatriz Busaniche&lt;b&gt;: &lt;/b&gt;&lt;a class="mail-link" href="mailto:bea@vialibre.org.ar"&gt;bea@vialibre.org.ar&lt;/a&gt;&lt;br /&gt;Fundación Via Libre&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Colombia&lt;/b&gt;&lt;br /&gt;Carolina Botero: &lt;a class="mail-link" href="mailto:carobotero@gmail.com"&gt;carobotero@gmail.com&lt;/a&gt;&lt;br /&gt;Fundación Karisma&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Egypt&lt;/b&gt;&lt;br /&gt;Ahmed Ezzat: &lt;a href="mailto:ahmed.ezzat@afteegypt.org"&gt;ahmed.ezzat@afteegypt.org&lt;/a&gt;&lt;br /&gt;Afteegypt&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Honduras&lt;/b&gt;&lt;br /&gt;Hedme Sierra-Castro: &lt;a href="mailto:hedme.sc@gmail.com"&gt;hedme.sc@gmail.com&lt;/a&gt;&lt;br /&gt;ACI-Participa&lt;/p&gt;
&lt;p&gt;&lt;b&gt;India&lt;/b&gt;&lt;br /&gt;Elonnai Hickok: &lt;a href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;&lt;br /&gt;Center for Internet and Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Korea&lt;/b&gt;&lt;br /&gt;Prof. Park:  &lt;a href="mailto:kyungsinpark@korea.ac.kr"&gt;kyungsinpark@korea.ac.kr&lt;/a&gt;&lt;br /&gt;Open Net Korea&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Macedonia&lt;/b&gt;&lt;br /&gt;Bardhyl Jashari: &lt;a href="mailto:info@metamorphosis.org.mk"&gt;info@metamorphosis.org.mk&lt;/a&gt;&lt;br /&gt;Metamorphosis Foundation for Internet and Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Mauritania, Senegal, Tanzania&lt;/b&gt;&lt;br /&gt;Abadacar Diop: &lt;a href="mailto:jonction_jonction@yahoo.fr"&gt;jonction_jonction@yahoo.fr&lt;/a&gt;&lt;br /&gt;Jonction&lt;/p&gt;
&lt;p class="normal" style="text-align: justify; "&gt;&lt;b&gt;Portugal&lt;/b&gt;&lt;br /&gt;Andreia Martins&lt;b&gt;: &lt;/b&gt;&lt;a class="mail-link" href="mailto:andreia@coolpolitics.pt"&gt;andreia@coolpolitics.pt&lt;/a&gt;&lt;br /&gt;ASSOCIAÇÃO COOLPOLITICS&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Peru&lt;/b&gt;&lt;br /&gt;Miguel Morachimo: &lt;a href="mailto:morachimo@gmail.com"&gt;morachimo@gmail.com&lt;/a&gt;&lt;br /&gt;Hiperderecho&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Russia&lt;/b&gt;&lt;br /&gt;Andrei Soldatov: &lt;a href="mailto:soldatov@agentura.ru"&gt;soldatov@agentura.ru&lt;/a&gt;&lt;br /&gt;Agentura.ru&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Serbia&lt;/b&gt;&lt;br /&gt;Djordje Krivokapic: &lt;a href="mailto:krivokapic@gmail.com"&gt;krivokapic@gmail.com&lt;/a&gt;&lt;br /&gt;SHARE Foundation&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Western Balkans&lt;/b&gt;&lt;br /&gt;Valentina Pellizer: &lt;a href="mailto:valentina.pellizzer@oneworldsee.org"&gt;valentina.pellizzer@oneworldsee.org&lt;/a&gt;&lt;br /&gt;Oneworldsee&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Brasil&lt;/b&gt;&lt;br /&gt;Marcelo Saldanha: &lt;a href="mailto:instituto@bemestarbrasil.org.br"&gt;instituto@bemestarbrasil.org.br&lt;/a&gt;&lt;br /&gt;IBEBrasil&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy'&gt;https://cis-india.org/internet-governance/blog/cis-and-international-coalition-calls-upon-governments-to-protect-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T07:21:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tech-president-september-23-2013-jessica-mckenzie">
    <title>Three Years Later, IPaidABribe.com Pays Off</title>
    <link>https://cis-india.org/news/tech-president-september-23-2013-jessica-mckenzie</link>
    <description>
        &lt;b&gt;After reporting a bribe on IPaidABribe.com, one Bangalore student has had the satisfaction of seeing action taken against a corrupt public official.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Jessica McKenzie was &lt;a class="external-link" href="http://techpresident.com/news/wegov/24365/three-years-later-ipaidabribecom-pays"&gt;published in TechPresident&lt;/a&gt; on September 23, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The student, Shubham Kahndelwal, was asked to give a bribe before  getting a receipt for registering for an identity card called the  AADHAAR card. He at first refused, but then gave in. In response, the  official gave him a receipt for his father's registration (which he had  submitted along with his own) but not his. He &lt;a href="http://www.ipaidabribe.com/comment-pieces/government-acts-i-paid-bribe-complaint-aadhaar-operator-blacklisted"&gt;told&lt;/a&gt; I Paid A Bribe that he “never knew a simple complaint could make such a difference.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kahndelwal elaborated:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;I was in Chennai when the incident happened and after  that I was furious and was searching all over to look for a complaint  mechanism, when I stumbled upon IPaidaBribe.com. It is a great day and  event for me and for me to share with my friends.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;IPaidABribe.com was &lt;a href="http://blogs.wsj.com/indiarealtime/2010/11/15/paid-a-bribe-in-india-vent-here/"&gt;launched in August 2010&lt;/a&gt; by the Bangalore-based nonprofit Janaagraha, which focuses on civic engagement and improving governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When first launched, there were concerns over privacy issues and protecting the users who submit complaints. On the other hand, &lt;a href="http://techpresident.com/news/23934/how-technology-and-isnt-helping-fight-corruption-india"&gt;in an interview this May with techPresident's David Eaves&lt;/a&gt;,  Sunil Abraham, the founder of the Center for Internet &amp;amp; Society,  pointed out that in order to make a difference, I Paid A Bribe would  somehow have to close the loop.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham went on:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;some of the things that go on with anonymous reporting  cannot happen, and to close the loop it almost needs to become a  paralegal infrastructure. It has to talk to law enforcement and people  have to be arrested, prosecuted and put away.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;That is apparently what happened in this case. The official in  question has been blacklisted and had disciplinary action taken against  him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To put the success in perspective, however, the bribe requested was  Rs 2000 (US$31.95) and the bribe ultimately given was only Rs 350  (US$5.59).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham also pointed out to Eaves that the real problem in India is “high ticket bribes...at the top of the pyramid.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So while complaints from people like Kahndelwal are what keep the  feeds at IPaidABribe.com constantly refreshing, they're mere drops in  the bucket when compared to the millions of dollars moving in scandals  like the &lt;a href="http://indiatoday.intoday.in/story/what-is-the-2g-scam-all-about/1/188832.html"&gt;2G spectrum scam&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Personal Democracy Media is grateful to the Omidyar Network and  the UN Foundation for their generous support of techPresident's WeGov  section.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-president-september-23-2013-jessica-mckenzie'&gt;https://cis-india.org/news/tech-president-september-23-2013-jessica-mckenzie&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T06:05:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis">
    <title>Public Law and Jurisprudential Issues of Privacy: A Talk at CIS</title>
    <link>https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis</link>
    <description>
        &lt;b&gt;On Friday, September 27, 2013, Abhayraj Naik will give a talk on public law and jurisprudential issues related to privacy. CIS will host the talk at its office in Bangalore from 4.30 p.m. to 6.00 p.m.&lt;/b&gt;
        
&lt;h3&gt;Abhayraj Naik&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Abhayraj Naik is a graduate of the National Law School of  India University, Bangalore, and the Yale Law School. He  previously  taught public law at the Jindal Global Law School of the OP  Jindal Global University where he also co-directed  the Centre for Public Law &amp;amp; Jurisprudence from September 2009 to  July 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Abhay is actively associated with the Environment Support Group, Bangalore  (&lt;a href="http://www.esgindia.org"&gt;http://www.esgindia.org&lt;/a&gt;), and has also been associated with the  Meiklejohn Civil Liberties Institute, Berkeley, USA; Universities Allied  for Essential Medicines, USA; Culture Move, Bangalore and other  national and international advocacy, activism and research groups for  several years now.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Abhay's research interests include legal theory,  philosophy, criminal justice reform, urban governance, ecology, and  technology policy. His current research projects include interdisciplinary studies  of urban street vending, information privacy, fiduciary duties,  forgiveness, biopiracy, and criminal justice reform.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;He enjoys cycling, travel, poetry, music, and radical educational and ecological activism.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Abhay currently teaches at the Azim Premji University in Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/eTWSXa8g0gA" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis'&gt;https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-30T12:39:23Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/bangalore-social-good">
    <title>Bangalore + Social Good</title>
    <link>https://cis-india.org/internet-governance/events/bangalore-social-good</link>
    <description>
        &lt;b&gt;In conjunction with The Social Good Summit held in New York City on September 22 - 24, Ashoka India, IDEX + Green Lungi are partnering to host the Bangalore + Sustainability event! The Social Good Summit aims to explore creative ways that technology can be leveraged for positive social change. Green Lungi in collaboration with IDEX and Ashoka is holding the event at CIS, Bangalore on September 21.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Sharath Chandra Ram, a researcher at CIS is one of the panelists. A brief abstract of his talk is given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"Are digital networked technologies adopted or used in the same way globally across all communities? Were social networks and apps across Twitter or Facebook really that pivotal in the mass citizen uprisings of the recent past? In this session, we shall see how it is essential to consider cultural specificities while designing technological interventions. Furthermore, I shall discuss how an effective strategy for citizen activism is not that which relies solely on virtual networks, but one that bridges networks, across different mediums, to engage offline citizens as much as the online. There will be a few live demonstrations of solutions we developed at the Centre for Internet and Society which embrace openness in pervasive technologies that enable us to bridge this crucial trans-medial interface&lt;/i&gt;.&lt;i&gt;"&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Bangalore + Sustainability event will focus on devising creative applications of technologies to confront sustainability challenges. We believe that young people have the power to affect change, and its time that we provide them with more opportunities to solve the challenges they see around them. This event is a first step in the direction of developing these problem-solving skills in our young people. Through an innovative Make-a-thon format, participants will engage in developing creative tech-based solutions to everyday challenges like road safety, waste management, water management, improving green cover and safer spaces for women.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Event Format and Details&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;1:45 - 2:00 -- Registration + Welcome&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;2:00 - 2:45 -- Panel Discussion + Q&amp;amp;A&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Panelists will give a brief talk (5 - 7 minutes), posing questions for participants to consider around the intersection of technology + behavioral change + sustainability + youth engagement. A panelist from each of these sectors will set the context for the Jam to follow:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Sustainability&lt;/li&gt;
&lt;li&gt;Communications/Design&lt;/li&gt;
&lt;li&gt;Technology&lt;/li&gt;
&lt;li&gt;Young Changemakers&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/bangalore-social-good.pdf" class="internal-link"&gt;Click to download the event brochure&lt;/a&gt; for details on the panelists/speakers&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/bangalore-social-good'&gt;https://cis-india.org/internet-governance/events/bangalore-social-good&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-25T07:43:58Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament">
    <title>The Central Monitoring System: Some Questions to be Raised in Parliament</title>
    <link>https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament</link>
    <description>
        &lt;b&gt;The following are some model questions to be raised in the Parliament regarding the lack of transparency in the central monitoring system.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Preliminary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The Central Monitoring System (CMS) is a Central Government project to intercept communications, both voice and data, that is transmitted via telephones and the internet to, from and within India. Owing to the vast nature of this enterprise, the CMS cannot be succinctly described and the many issues surrounding this project are diverse. This Issue Brief will outline preliminary constitutional, legal and technical concerns that are presented by the CMS.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;At the outset, it must be clearly understood that no public documentation exists to explain the scope, functions and technical architecture of the CMS. This lack of transparency is the single-largest obstacle to understanding the Central Government’s motives in conceptualising and operationalizing the CMS. This lack of public documentation is also the chief reason for the brevity of this Issue Note. Without making public the policy, law and technical abilities of the CMS, there cannot be an informed national debate on the primary concerns posed by the CMS, i.e the extent of envisaged state surveillance upon Indian citizens and the safeguards, if any, to protect the individual right to privacy. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Surveillance and Privacy&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Surveillance is necessary to secure political organisation. Modern nation-states, which are theoretically organised on the basis of shared national and societal characteristics, require surveillance to detect threats to these characteristics. In democratic societies, beyond the immediate requirements of national integrity and security, surveillance must be targeted at securing the safety and rights of individual citizens. This Issue Brief does not dispute the fact that democratic countries, such as India, should conduct surveillance to secure legitimate ends. Concerns, however, arise when surveillance is conducted in a manner unrestricted and unregulated by law; these concerns are compounded when a lack of law is accompanied by a lack of transparency.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Technological advancement leads to more intrusive surveillance. The evolution of surveillance in the United States resulted, in 1967, in the first judicial recognition of the right to privacy. In &lt;i&gt;Katz&lt;/i&gt; v. &lt;i&gt;United States&lt;/i&gt; the US Supreme Court ruled that the privacy of communications had to be balanced with the need to conduct surveillance; and, therefore, wiretaps had to be warranted, judicially sanctioned and supported by probable cause. &lt;i&gt;Katz&lt;/i&gt; expanded the scope of the Fourth Amendment of the US Constitution, which protected against unreasonable searches and seizures. Most subsequent US legal developments relating to the privacy of communications from surveillance originate in the &lt;i&gt;Katz&lt;/i&gt; judgement. Other common law countries, such as the United Kingdom and Canada, have experienced similar judicial evolution to recognise that the right to privacy must be balanced with governance.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;Right to Privacy in India&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Unfortunately, India does not have a persuasive jurisprudence of privacy protection. In the &lt;i&gt;Kharak Singh&lt;/i&gt; (1964) and &lt;i&gt;Gobind&lt;/i&gt; (1975) cases, the Supreme Court of India considered the question of privacy from physical surveillance by the police in and around the homes of suspects. In the latter case, the Supreme Court found that some of the Fundamental Rights “could be described as contributing to the right to privacy” which was nevertheless subject to a compelling public interest. This insipid inference held the field until 1994 when, in the &lt;i&gt;Rajagopal&lt;/i&gt; (“Auto Shankar”, 1994) case, the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty recognised by Article 21 of the Constitution. However, &lt;i&gt;Rajagopal&lt;/i&gt; dealt specifically with the publication of an autobiography, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case. While finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards which continue to be routinely ignored. A more robust statement of the right to privacy was made recently by the Delhi High Court in the &lt;i&gt;Naz &lt;/i&gt;&lt;i&gt;Foundation&lt;/i&gt; case (2011) that de-criminalised consensual homosexual acts; however, this judgment has been appealed to the Supreme Court.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Issues Pertaining to the CMS&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;While judicial protection from physical surveillance was cursorily dealt with in the &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; cases, the Supreme Court of India directly considered the issue of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case. Wiretaps in India primarily occur on the strength of powers granted to certain authorities under section 5(2) of the Indian Telegraph Act, 1885. The Court found that the Telegraph Act, and Rules made thereunder, did not prescribe adequate procedural safeguards to create a “just and fair” mechanism to conduct wiretaps. Therefore, it laid down the following procedure to conduct wiretaps: &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;(a) the order should be issued by the relevant Home Secretary (this power is delegable to a Joint Secretary),&lt;br /&gt; (b) the interception must be carried out exactly in terms of the order and not in excess of it,&lt;br /&gt; (c) a determination of whether the information could be reasonably secured by other means,&lt;br /&gt; (d) the interception shall cease after sixty (60) days.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Therefore, prima facie, any voice interception conducted through the CMS will be in violation of this Supreme Court judgement. The CMS will enforce blanket surveillance upon the entire country without regard for reasonable cause or necessity. This movement away from targeted surveillance to blanket surveillance without cause, conducted without statutory sanction and without transparency, is worrying.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accordingly, the following questions may be raised, in Parliament, to learn more about the CMS project: &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Which statutes, Government Orders, notifications etc deal with the establishment and maintenance of the CMS?&lt;/li&gt;
&lt;li&gt;Which is the nodal agency in charge of implementing the CMS?&lt;/li&gt;
&lt;li&gt;What are the powers and functions of the nodal agency?&lt;/li&gt;
&lt;li&gt;What guarantees exist to protect ordinary Indian citizens from intrusive surveillance without cause?&lt;/li&gt;
&lt;li&gt;What are the technical parameters of the CMS?&lt;/li&gt;
&lt;li&gt;What are the consequences for misuse or abuse of powers by any person working in the CMS project?&lt;/li&gt;
&lt;li&gt;What recourse is available to Indian citizens against whom there is unnecessary surveillance or against whom there has been a misuse or abuse of power?&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament'&gt;https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T10:30:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings">
    <title>The National Privacy Roundtable Meetings</title>
    <link>https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society ("CIS"), the Federation of Indian Chambers of Commerce and Industry ("FICCI"), the Data Security Council of India ("DSCI") and Privacy International are, in partnership, conducting a series of national privacy roundtable meetings across India from April to October 2013. The roundtable meetings are designed to discuss possible frameworks to privacy in India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Background: The Roundtable Meetings and Organisers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/"&gt;CIS&lt;/a&gt; is a Bangalore-based non-profit think-tank and research organisation with interests in, amongst other fields, the law, policy and practice of free speech and privacy in India. &lt;a href="http://www.ficci.com/"&gt;FICCI&lt;/a&gt; is a non-governmental, non-profit association of approximately 250,000 Indian bodies corporate. It is the oldest and largest organisation of businesses in India and represents a national corporate consensus on policy issues. &lt;a href="http://www.dsci.in/"&gt;DSCI&lt;/a&gt; is an initiative of the National Association of Software and Service Companies, a non-profit trade association of Indian information technology ("IT") and business process outsourcing ("BPO") concerns, which promotes data protection in India. &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt; is a London-based non-profit organisation that defends and promotes the right to privacy across the world.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy in the Common Law and in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Because privacy is a multi-faceted concept, it has rarely been singly regulated. A taxonomy of privacy yields many types of individual and social activity to be differently regulated based on the degree of harm that may be caused by intrusions into these activities.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nature of the activity is significant; activities that are implicated by the state are attended by public law concerns and those conducted by private persons &lt;i&gt;inter se&lt;/i&gt; demand market-based regulation. Hence, because the principles underlying warranted police surveillance differ from those prompting consensual collections of personal data for commercial purposes, legal governance of these different fields must proceed differently. For this and other reasons, the legal conception of privacy — as opposed to its cultural construction – has historically been diverse and disparate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditionally, specific legislations have dealt separately with individual aspects of privacy in tort law, constitutional law, criminal procedure and commercial data protection, amongst other fields. The common law does not admit an enforceable right to privacy.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; In the absence of a specific tort of privacy, various equitable remedies, administrative laws and lesser torts have been relied upon to protect the privacy of claimants.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question of whether privacy is a constitutional right has been the subject of limited judicial debate in India. The early cases of &lt;i&gt;Kharak Singh&lt;/i&gt; (1964)&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; and &lt;i&gt;Gobind&lt;/i&gt; (1975)&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; considered privacy in terms of physical surveillance by the police in and around the homes of suspects and, in the latter case, the Supreme Court of India found that some of the Fundamental Rights “could be described as contributing to the right to privacy” which was nevertheless subject to a compelling public interest. This inference held the field until 1994 when, in the &lt;i&gt;Rajagopal&lt;/i&gt; case (1994),&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty guaranteed by Article 21 of the Constitution of India. However, &lt;i&gt;Rajagopal&lt;/i&gt; dealt specifically with a book, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case (1996)&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; and, while finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards.&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;A more robust statement of the right to privacy was made recently by the Delhi High Court in the &lt;i&gt;Naz &lt;/i&gt;&lt;i&gt;Foundation&lt;/i&gt; case (2011)&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;that de-criminalised consensual homosexual acts; however, this judgment is now in appeal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Attempts to Create a Statutory Regime&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The silence of the common law leaves the field of privacy in India open to occupation by statute. With the recent and rapid growth of the Indian IT and BPO industry, concerns regarding the protection of personal data to secure privacy have arisen. In May 2010, the European Union ("EU") commissioned an assessment of the adequacy of Indian data protection laws to evaluate the continued flow of personal data of European data subjects into India for processing. That assessment made adverse findings on the adequacy and preparedness of Indian data protection laws to safeguard personal data.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Conducted amidst negotiations for a free trade agreement between India and the EU, the failed assessment potentially impeded the growth of India’s outsourcing industry that is heavily reliant on European and North American business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, the Department of Electronics and Information Technology of the Ministry of Communications and Information Technology, Government of India, issued subordinate legislation under the rule-making power of the Information Technology Act, 2000 ("IT Act"), to give effect to section 43A of that statute. These rules – the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 ("Personal Data Rules")&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; — were subsequently reviewed by the Committee on Subordinate Legislation of the 15&lt;sup&gt;th&lt;/sup&gt; Lok Sabha.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; The Committee found that the Personal Data Rules contained clauses that were ambiguous, invasive of privacy and potentially illegal.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, a draft privacy legislation called the ‘Right to Privacy Bill, 2011’, which was drafted within the Department of Personnel and Training ("DoPT") of the Ministry of Personnel, Public Grievances and Pensions, Government of India,  was made available on the internet along with several file notings ("First DoPT Bill"). The First DoPT Bill contained provisions for the regulation of personal data, interception of communications, visual surveillance and direct marketing. The First DoPT Bill was referred to a Committee of Secretaries chaired by the Cabinet Secretary which, on 27 May 2011, recommended several changes including re-drafts of the chapters relating to interception of communications and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aware of the need for personal data protection laws to enable economic growth, the Planning Commission constituted a Group of Experts under the chairmanship of Justice Ajit P. Shah, a retired Chief Justice of the Delhi High Court who delivered the judgment in the &lt;i&gt;Naz Foundation&lt;/i&gt; case, to study foreign privacy laws, analyse existing Indian legal provisions and make specific proposals for incorporation into future Indian law. The Justice Shah Group of Experts submitted its Report to the Planning Commission on 16 October 2012 wherein it proposed the adoption of nine National Privacy Principles.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; These are the principles of notice, choice and consent, collection limitation, purpose limitation, disclosure of information, security, openness, and accountability. The Report recommended the application of these principles in laws relating to interception of communications, video and audio recordings, use of personal identifiers, bodily and genetic material, and personal data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Criminal Procedure and Special Laws Relating to Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While the &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; cases first brought the questions of permissibility and limits of police surveillance to the Supreme Court, the power to collect information and personal data of a person is firmly embedded in Indian criminal law and procedure. Surveillance is an essential condition of the nation-state; the inherent logic of its foundation requires the nation-state to perpetuate itself by interdicting threats to its peaceful existence. Surveillance is a method by which the nation-state’s agencies interdict those threats. The challenge for democratic countries such as India is to find the optimal balance between police powers of surveillance and the essential freedoms of its citizens, including the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regime governing the interception of communications is contained in section 5(2) of the Indian Telegraph Act, 1885 ("Telegraph Act") read with rule 419A of the Indian Telegraph Rules, 1951 ("Telegraph Rules"). The Telegraph Rules were amended in 2007&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; to give effect to, amongst other things, the procedural safeguards laid down by the Supreme Court in the &lt;i&gt;PUCL&lt;/i&gt; case. However, India’s federal scheme permits States to also legislate in this regard. Hence, in addition to the general law on interceptions contained in the Telegraph Act and Telegraph Rules, some States have also empowered their police forces with interception functions in certain cases.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; Ironically, even though some of these State laws invoke heightened public order concerns to justify their invasions of privacy, they establish procedural safeguards based on the principle of probable cause that surpasses the Telegraph Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, further subordinate legislation issued to fulfil the provisions of sections 69(2) and 69B(3) of the IT Act permit the interception and monitoring of electronic communications — including emails — to collect traffic data and to intercept, monitor, and decrypt electronic communications.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The proposed Privacy (Protection) Bill, 2013 and Roundtable Meetings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In this background, the proposed Privacy (Protection) Bill, 2013 seeks to protect privacy by regulating (i) the manner in which personal data is collected, processed, stored, transferred and destroyed — both by private persons for commercial gain and by the state for the purpose of governance; (ii) the conditions upon which, and procedure for, interceptions of communications — both voice and data communications, including both data-in-motion and data-at-rest — may be conducted and the authorities permitted to exercise those powers; and, (iii) the manner in which forms of surveillance not amounting to interceptions of communications — including the collection of intelligence from humans, signals, geospatial sources, measurements and signatures, and financial sources — may be conducted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous roundtable meetings to seek comments and opinion on the proposed Privacy (Protection) Bill, 2013 took place at:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;New Delhi: April 13, 2013 (&lt;a class="external-link" href="http://bit.ly/17REl0W"&gt;http://bit.ly/17REl0W&lt;/a&gt;) with 45 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Bangalore: April 20, 2013 (&lt;a class="external-link" href="http://bit.ly/162t8rU"&gt;http://bit.ly/162t8rU&lt;/a&gt;) with 45 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Chennai: May 18, 2013 (&lt;a class="external-link" href="http://bit.ly/12ICGYD"&gt;http://bit.ly/12ICGYD&lt;/a&gt;) with 25 participants.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mumbai, June 15, 2013 (&lt;a class="external-link" href="http://bit.ly/12fJSvZ"&gt;http://bit.ly/12fJSvZ&lt;/a&gt;) with 20 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kolkata: July 13, 2013 (&lt;a class="external-link" href="http://bit.ly/11dgINZ"&gt;http://bit.ly/11dgINZ&lt;/a&gt;) with 25 participants; and&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;New Delhi: August 24, 2013 (&lt;a class="external-link" href="http://bit.ly/195cWIf"&gt;http://bit.ly/195cWIf&lt;/a&gt;) with 40 participants.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The roundtable meetings were multi-stakeholder events with participation from industry representatives, lawyers, journalists, civil society organizations and Government representatives. On an average, 75 per cent of the participants represented industry concerns, 15 per cent represented civil society and 10 per cent represented regulatory authorities. The model followed at the roundtable meetings allowed for equal participation from all participants.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See generally, Dan Solove, “A Taxonomy of Privacy” &lt;i&gt;University of Pennsylvania Law Review&lt;/i&gt; (Vol. 154, No. 3, January 2006).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office&lt;/i&gt; [2003] UKHL 53.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See &lt;i&gt;A&lt;/i&gt; v. &lt;i&gt;B plc&lt;/i&gt; [2003] QB 195; &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office &lt;/i&gt;[2001] EWCA Civ 2081; &lt;i&gt;R (Ellis)&lt;/i&gt; v. &lt;i&gt;Chief Constable of Essex Police&lt;/i&gt; [2003] EWHC 1321 (Admin).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of Uttar Pradesh&lt;/i&gt; AIR 1963 SC 1295.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;i&gt;Gobind&lt;/i&gt; v. &lt;i&gt;State of Madhya Pradesh&lt;/i&gt; AIR 1975 SC 1378.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;R. Rajagopal&lt;/i&gt; v. &lt;i&gt;State of Tamil Nadu&lt;/i&gt; AIR 1995 SC 264.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;i&gt;People’s Union for Civil Liberties&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; (1997) 1 SCC 30.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. A Division Bench of the Supreme Court of India comprising Kuldip Singh and Saghir Ahmad, JJ, found that the procedure set out in section 5(2) of the Indian Telegraph Act, 1885 and rule 419 of the Indian Telegraph Rules, 1951 did not meet the “just, fair and reasonable” test laid down in &lt;i&gt;Maneka Gandhi&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; AIR 1978 SC 597 requisite for the deprivation of the right to personal liberty, from whence the Division Bench found a right to privacy emanated, guaranteed under Article 21 of the Constitution of India. Therefore, Kuldip Singh, J, imposed nine additional procedural safeguards that are listed in paragraph 35 of the judgment.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;i&gt;Naz Foundation&lt;/i&gt; v. &lt;i&gt;Government of NCT Delhi&lt;/i&gt; (2009) 160 DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. The 2010 data adequacy assessment of Indian data protection laws was conducted by Professor Graham Greenleaf. His account of the process and his summary of Indian law can found at Graham Greenleaf, "Promises and Illusions of Data Protection in Indian Law"&lt;i&gt; International Data Privacy Law&lt;/i&gt; (47-69, Vol. 1, No. 1, March 2011).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The Rules were brought into effect vide Notification GSR 313(E) on 11 April 2011. CIS submitted comments on the Rules that can be found here – &lt;a href="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011"&gt;http://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. The Committee on Subordinate Legislation, a parliamentary ‘watchdog’ committee, is mandated by rules 317-322 of the Rules of Procedure and Conduct of Business in the Lok Sabha (14&lt;sup&gt;th&lt;/sup&gt; edn., New Delhi: Lok Sabha Secretariat, 2010) to examine the validity of subordinate legislation.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. See the 31&lt;sup&gt;st&lt;/sup&gt; Report of the Committee on Subordinate Legislation that was presented on 21 March 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. See paragraphs 7.14-7.17 on pages 69-72 of the Report of the Group of Experts on Privacy, 16 October 2012, Planning Commission, Government of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. See, the Indian Telegraph (Amendment) Rules, 2007, which were brought into effect &lt;i&gt;vide&lt;/i&gt; Notification GSR 193(E) of the Department of Telecommunications of the Ministry of Communications and Information Technology, Government of India, dated 1 March 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. See, &lt;i&gt;inter alia&lt;/i&gt;, section 14 of the Maharashtra Control of Organised Crime Act, 1999; section 14 of the Andhra Pradesh Control of Organised Crime Act, 2001; and, section 14 of the Karnataka Control of Organised Crime Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. See, the Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data and Information) Rules, 2009 vide GSR 782 (E) dated 27 October 2009; and, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 vide GSR 780 (E) dated 27 October 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings'&gt;https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-21T10:03:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
