<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2761 to 2775.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/when-data-is-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/scam-baiting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rti-and-third-party-info"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/aadhaar-truth"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/june-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/socio-financial-online-networks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/internet-surveillance-policy-lecture"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-and-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/state-just-did-to-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/india-e-tolerance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/snooping-to-data-abuse"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/new-right-to-privacy-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/want-to-be-watched"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/digital-is-political"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/when-data-is-privacy">
    <title>When Data Means Privacy, What Traces Are You Leaving Behind?</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/when-data-is-privacy</link>
    <description>
        &lt;b&gt;How do you know yourself to be different from others? What defines the daily life that you live and the knowledge you produce in the span of this life? Is all that information yours or are you a mere stakeholder on behalf of the State whose subject you are? What does privacy really mean? In a society that is increasingly relying on information to identify people, collecting and archiving ‘personal’ details of your lives, your name, age, passport details, ration card number, call records etc, how private is your tweet, status update, text message or simply, your restaurant bill? &lt;/b&gt;
        
&lt;p&gt;The CIC (central information commission) that arbitrates decisions on RTI appeals in case of conflict of interest provides interesting notions of what the State thinks is privacy. Ironically, the cornerstones of RTI that is privacy and its invasion are yet to be defined in the context of the judiciary. Then, how does the CIC decide what is private enough and what can be revealed to anyone? Of course, it relies on the discretion of its judges who attempt to draw from a range of sources that include the principles of natural justice drawn from western jurisprudence to quotes by Gandhi and Aristotle to the UK Data Protection Act, 1998 and US Torts that define invasion of privacy. To begin with, let us examine who constitutes the private sphere. As ruled in case of&lt;em&gt;&amp;nbsp;Mr. Ajeet Kumar Khanna vs Punjab &amp;amp; Sind Bank&amp;nbsp;&lt;/em&gt;on 29 July, 2008 and&amp;nbsp;&lt;em&gt;Mr. G. Atchaiah vs State Bank of India&lt;/em&gt;&amp;nbsp;on 22 August, 2008, the appellant can seek information only for himself/herself. Anyone outside the self, commonly believed as the personal connection, sons, daughters, parents or even spouse is not allowed information of a relative. One needs a distinct power of attorney for right to information. The contradiction is that one does not need to state the purpose for asking information, thereby making unnecessary any connection with the person you want information about.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;CIC has been increasingly relying on the UK Data Protection Act, 1998 to make a correlation between data and privacy. Hence, to map privacy and its invasion, the RTI act depends on the UK Data Protection Act that classifies the following as sensitive personal data:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We have no equivalent of UK's Data Protection Act, 1998, Sec 2 of which, titled Sensitive Personal Data, reads as follows: In this Act "sensitive personal data" means personal data consisting of information as to:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;The racial or ethnic origin of the data subject&lt;/li&gt;&lt;li&gt;His political opinions&lt;/li&gt;&lt;li&gt;His religious beliefs or other beliefs of a similar nature&amp;nbsp;&lt;/li&gt;&lt;li&gt;Whether he is a member of a Trade Union&lt;/li&gt;&lt;li&gt;His physical or mental health or condition&lt;/li&gt;&lt;li&gt;His sexual life&lt;/li&gt;&lt;li&gt;The commission or alleged commission by him of any offence&lt;/li&gt;&lt;li&gt;Any proceedings for any offence committed or alleged to have been committed by him, the disposal of such proceedings or the sentence of any court in such proceedings.&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;While this blanket reference to sensitive personal data does not account for nuances in the Indian context, it also does not capture the essence of public-private interaction. It is mostly at the intersection of the public domain and the individual that the demarcation occurs. While personal family photographs lying in my attic may constitute a beautiful memory that can be proudly displayed on my walls, it is when one acknowledges the dual nature of any information source, the potential of these photographs to contribute to larger politicized information narratives, that their access and usage comes to define the real crux of the privacy debate.&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;The US Restatement of the Law, Second, Torts, defines the Intrusion to Privacy more generally in the following manner: “One, who intentionally intrudes, physically or otherwise, upon the solitude or seclusion of another or his private affairs or concerns, is subject to liability to the other for invasion of his privacy, if the intrusion would be highly offensive to a reasonable person.” Of course, we don’t know whether a father paying for bills and wanting access to his daughter’s cell phone records can be seen as highly offensive to a reasonable person in the Indian context. In the context of the recent&amp;nbsp;&lt;strong&gt;Padmanabhswamy Temple&lt;/strong&gt;treasure trove found in Kerala, since under the Ancient Monuments and Archaeological Sites and Remains Act 1958, such sites qualify as sites of ‘national importance’ and imply a certain larger public interest, would one be able to access such 'nationally personal data' pertaining to a temple (public space) owned by a family trust registered with the government (publicly private), containing a national treasure lying locked on geographical territory (public) that is rightly shared by all citizens?&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Here’s how the CIC defined the personal and the extent of personal in the context of state as illustrated in&amp;nbsp;&lt;em&gt;Mr. Kanhiya Lal vs MCD, GNCT, Delhi&lt;/em&gt;&amp;nbsp;on 13 June, 2011.To qualify for this exemption the information must satisfy the following criteria:&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;It must be personal information&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Words in a law should normally be given the meanings given in common language. In common language we would ascribe the adjective 'personal' to an attribute which applies to an individual and not to an institution or a corporate. From this it flows that 'personal' cannot be related to Institutions, organizations or corporate. (Hence, we could state that section 8 (1) (j) cannot be applied when the information concerns institutions, organizations or corporate). The phrase 'disclosure of which has no relationship to any public activity or interest' means that the information must have some relationship to a public activity. Various public authorities in performing their functions routinely ask for 'personal' information from Citizens, and this is clearly a public activity. When a person applies for a job, or gives information about himself to a public authority as an employee, or asks for a permission, licence or authorisation, all these are public activities. The information sought in this case by the appellant has certainly been obtained in the pursuit of a public activity. We can also look at this from another aspect. The State has no right to invade the privacy of an individual. There are some extraordinary situations where the State may be allowed to invade on the privacy of a Citizen. In those circumstances special provisos of the law apply, always with certain safeguards. Therefore it can be argued that where the State routinely obtains information from Citizens, this information is in relationship to a public activity and will not be an intrusion on privacy.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;In that case, does data at several layers demand for us to relook privacy from the subject positions we acquire at different levels and hence, the larger private collectives that we partake of?&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/when-data-is-privacy'&gt;https://cis-india.org/internet-governance/blog/privacy/when-data-is-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Noopur Raval</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-11-24T09:24:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/scam-baiting">
    <title>My Experiment with Scam Baiting</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/scam-baiting</link>
    <description>
        &lt;b&gt;Today, as I am sure many of you have experienced, Internet scams are widespread and very deceptive.  As part of my research into privacy and the Internet, I decided to follow a scam and attempt to fully understand how Internet scams work, and what privacy implications they have for Internet users. Though there are many different types of scams that take place over the Internet —identity scams, housing scams, banking scams— just to name a few.   I decided to look in depth at the lottery scam. &lt;/b&gt;
        
&lt;h3&gt;Day 1: July 4, 2011&lt;/h3&gt;
&lt;p&gt;On July 4, I received a spam mail from Shell BP Manchester England (&lt;a class="external-link" href="mailto:lamarc65@cs.com"&gt;lamarc65@cs.com&lt;/a&gt;).&amp;nbsp;The e-mail informed me that my e-mail address had won a sum of $550,000 which was held on July 3, 2011 in England. In order to claim my prize the e-mail instructed me to confirm the receipt of the mail by submitting a few of my personal details to one Dr. Mohammed Al Maliki.&amp;nbsp;This is an extract from the letter asking for my information:&lt;/p&gt;
&lt;p&gt;Information Requested:&amp;nbsp;&lt;/p&gt;
&lt;ul style="list-style-type: square;"&gt;&lt;li&gt;Your full Name:&amp;nbsp;&lt;/li&gt;&lt;li&gt;Contact address:&amp;nbsp;&lt;/li&gt;&lt;li&gt;Your Telephone:&amp;nbsp;&lt;/li&gt;&lt;li&gt;Your Age:&amp;nbsp;&lt;/li&gt;&lt;li&gt;Your occupation:&amp;nbsp;&lt;/li&gt;&lt;li&gt;Your country of origin:&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Congratulations.&lt;br /&gt;Yours Sincerely,&amp;nbsp;&lt;br /&gt;Mrs Roseline Lott&lt;br /&gt;Shell Prize announcer, England.&lt;/p&gt;
&lt;p&gt;Deciding to reply to the email and see what happened, I responded to Dr. Mohammed Al Maliki (&lt;a class="external-link" href="mailto:dr.mohamedmalik@gmail.com"&gt;dr.mohamedmalik@gmail.com&lt;/a&gt;) with the information that the e-mail had asked, only I substituted my real information with the following fake information:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Shaiza Sarkar&lt;/li&gt;&lt;li&gt;B-196, CR Park, New Delhi - 110019&lt;/li&gt;&lt;li&gt;09916000603&lt;/li&gt;&lt;li&gt;23 yrs old&lt;/li&gt;&lt;li&gt;India&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;To my surprise he replied to my mail the same day at 4:59pm. &amp;nbsp;In this mail he informed me that he had sent my details to Lloyds Bank who would be responsible for the payment of my prize. He asked&amp;nbsp;me to inform him after I receive a mail from the bank. The e-mail contained a phone number for me to call. &amp;nbsp;I tried to call the number mentioned in the mail but there was no reply.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Again to my surprise, I received a mail from Lloyds Bank at 6:58 p.m. the same day with a list of documents and details that I was supposed to send them to claim the prize money. Lloyds Bank had also attached a deposit certificate to ‘prove’ that Shell Petroleum Development Company had deposited the prize money in the bank. Below is an extraction of the e-mail I received from Lloyds Bank.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;"FROM THE DESK OF DR. MOHAMED MALIK&lt;br /&gt;REGIONAL CLAIMS AGENT,&amp;nbsp;&lt;br /&gt;SHELL PETROLEUM INTERNATIONAL LOTTERY PROGRAM.&lt;br /&gt;Regional Office:&lt;br /&gt;St James Court, Great Park Road,&lt;br /&gt;Almondsbury Park, Bradley Stoke,&lt;br /&gt;Bristol BS32 4QJ, England&lt;br /&gt;Contact: +447035974608&lt;br /&gt;&amp;nbsp;“LLOYDS BANK PLC&amp;nbsp;&lt;br /&gt;ADMINISTRATIVE HEADQUARTERS.&lt;br /&gt;LONDON, ENGLAND, UNITED KINGDOM.&lt;br /&gt;REF...FILENOS2345/LTB&lt;br /&gt;&amp;nbsp;ATTENTION: SARKAR SHAIZA&lt;br /&gt;&amp;nbsp; *REGARDING YOUR PRIZE FROM SHELL PETROLEUM DEVELOPMENT COMPANY*&lt;br /&gt;PLEASE SEND US THE DOCUMENTS BELOW;&lt;br /&gt;1. A CERTIFICATE OF AWARD FROM SHELL PETROLEUM CONTACT DR MOHAMED MALIK&lt;br /&gt;2. A SCANNED COPY OF EITHER YOUR DRIVERS LICENSE OR YOUR INTERNATIONAL PASSPORT OR WORK I.D CARD.&lt;br /&gt;3. A SWORN AFFIDAVIT OF CLAIM FROM THE CROWN COURT HERE IN LONDON,YOU ARE REQUIRED TO CONTACT [DR MOHAMED MALIK]YOUR AGENT FOR ALL THIS.&lt;br /&gt;SIR PAUL WISCONFIELD.&lt;br /&gt;HEAD OF OPERATIONS.&lt;br /&gt;LLOYDS TSB BANK PLC&lt;br /&gt;&amp;nbsp;&lt;/p&gt;
&lt;div&gt;&lt;img src="https://cis-india.org/home-images/scam1.jpg/image_preview" alt="Nigerian Scam 1" class="image-inline image-inline" title="Nigerian Scam 1" /&gt;&lt;/div&gt;
&lt;h3&gt;Day 2: July 5, 2011&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;The next day I informed Dr. Mohammed Al Maliki of the above letter from the bank, as instructed to at 8:58 p.m. &amp;nbsp;At 9:45 p.m., Dr. Mohammed Al Maliki emailed me back with the certificate of award from Shell Petroleum Development Company with my fake name printed on it.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Though the first two documents that Lloyds Bank required me to obtain were standard enough, the turning point in this entire scam was the third document that Lloyds Bank asked me to acquire. The third document asked me to present a sworn affidavit of claim from the Crown Court in London. Following the instructions given by the bank, I again emailed Dr. Mohammed Al Maliki. He replied with instructions for me to contact Barrister Wilson Burrows (ESQ) of Wilson and Co. Law Chambers for this document. I tried to search for Wilson and Co. Chambers on the Internet and found that no company with such a name exists.&lt;br /&gt;&lt;br /&gt;This is the certificate of award provided to me by Dr. Mohammed Al Maliki:&lt;/p&gt;
&lt;div&gt;&lt;img src="https://cis-india.org/home-images/nigerianscam2.jpg/image_preview" alt="Nigerian scam 2" class="image-inline image-inline" title="Nigerian scam 2" /&gt;&lt;/div&gt;
&lt;h3&gt;Day 3: July 6, 2011&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;At 1:47 p.m. I mailed Wilson and Co. Law Chambers&amp;nbsp;informing them about the sworn affidavit that I required in order to claim the lottery prize. The same day at 8:25 p.m. the Law Chambers sent me the following mail with an application form, and asked me to transfer 520 pounds through a Western Union Money Transfer to the Chamber’s Accountant Mr. Preston Doyle. I checked the address provided in the mail to see if it existed. The Google map showed that the given pin code “L14JJ”- London &amp;nbsp;- was a pin code for &amp;nbsp;Liverpool, Merseyside UK, &amp;nbsp;which is not London , and not where Wilson and Co. Law Chambers claimed to be based. Additionally, the Law Chambers attached a form for the affidavit in this mail.&lt;/p&gt;
&lt;p&gt;Below is an extract from the email I received from Wilson and Co. Law Chambers:&lt;br /&gt;“The Principal Attorney&lt;br /&gt;Wilson and co Chambers&lt;br /&gt;#18 Harms Road Manchester&lt;br /&gt;L14JJ - London.&lt;br /&gt;Supreme Solicitors, Principal Attorneys and Property Managers&lt;br /&gt;Kind Attention: Client,&lt;br /&gt;As stated in the attached form, the completed form should be returned with the Court Oath Fee. For further processing, see below fees;&lt;br /&gt;Court Oath Fee: &amp;nbsp; &amp;nbsp;250 Pounds&lt;br /&gt;Attorney Fee: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp;270 Pounds&lt;br /&gt;------------------------------------------&lt;br /&gt;Total Fee: &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; &amp;nbsp; 520 Pounds&lt;br /&gt;-----------------------------------------&lt;br /&gt;To send this money, go to any WESTERN UNION MONEY TRANSFER OFFICE nearest to you and make the payment to the Chamber's Accountant - Mr. Preston Doyle with the following details -&lt;br /&gt;Receiver's Name: Mr. Preston Doyle&lt;br /&gt;Receiver's Location: London, United Kingdom.&lt;br /&gt;Receiver's Address: #18 Harms Road Manchester, L14JJ – London&lt;br /&gt;Amount: £ 520.00 (Five Hundred and Twenty Pounds)&lt;br /&gt;Regards,&lt;br /&gt;Mrs.Wilson Burrows(ESQ)&lt;br /&gt;(Registrar)&lt;br /&gt;Mrs. Ivon &amp;nbsp;Samuel (KBE) (Secretary)”&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;img src="https://cis-india.org/home-images/ukscam1.jpg/image_preview" alt="Nigerian Scam 3" class="image-inline image-inline" title="Nigerian Scam 3" /&gt;&lt;/div&gt;
&lt;h3&gt;Day 4: July 7, 2011&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;After receiving the e-mail asking for a money transfer, I was curious and wished to probe more. Thus, I wrote to Wilson and Co Law Chambers and explained that &amp;nbsp;a Western Union Transfer was not available in my village. The same day at 6:48 p.m. the Law Chambers sent me a mail saying that the Honourable Chamber recognizes only Western Union Transfer as the safest mode for transactions. I did not reply to this mail, as I knew I would not be able to go any further with my investigation. Though I was disappointed because this was the end to my investigation into lottery scams, and I still had questions that I wanted answered, the last e-mail the Law Chambers sent me was very interesting. In the last email sent to me by the Law Chambers requested (in a very pushy tone) that I should not tell anyone about my prize money, and that it was in fact in my best interest not to tell anyone.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Below is the extract of this mail:&lt;/p&gt;
&lt;p&gt;“So do not discuss your winning with anybody until your prize has been transferred to you. It is for your own good. And it is at that time&amp;nbsp;alone that you can be used for advert purposes by our company. So the&amp;nbsp;success of this transfer lies sorely in your hands. These are the&amp;nbsp;exact words from the Director this morning.”&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;Regards,&lt;/div&gt;
&lt;div&gt;Mrs.Wilson Burrows (ESQ)&lt;/div&gt;
&lt;div&gt;(Registrar)&lt;/div&gt;
&lt;div&gt;His Lordship, Justice Ivon &amp;nbsp;Samuel (KBE) (Secretary)&lt;/div&gt;
&lt;/div&gt;
&lt;h3&gt;Day 5: July 8, 2011&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;Originally I wrote to the Law Chambers telling them I did not have access to a Western Union for the purpose of seeing if they use other mediums to receive money. Surprisingly, at 1:47 p.m. Wilson and Co. Law Chambers emailed me. The e-mail said that they would grant me the privilege of using a direct deposit of the 250 pounds into their correspondents account in India. In the mail they asked me to confirm that I would use this method of payment, and that once confirmed, that they would furnish me with their correspondent’s account details. Interested, I confirmed. After my e-mail confirmation at 9:47 p.m. they emailed me the details of their correspondent in India.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Below are the details of the account that I was supposed to transfer the money into:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This is the account details you will deposit the money into:&lt;br /&gt;Account Name: L. MOHAN SINGH&lt;br /&gt;Bank name: HDFC BANK&lt;br /&gt;Branch: DELHI&lt;br /&gt;Account number: 0609190004391&lt;br /&gt;Ifsc Code : HDFC0000609&lt;br /&gt;Pan Card: DDMPS9075M&lt;/p&gt;
&lt;h3&gt;Day 6: July 11, 2011&lt;/h3&gt;
&lt;p&gt;I did not deposit the money (obviously) and I did not e-mail the bank or the Law Chambers, I did receive a mail from Wilson and Co. Law Chambers informing me that their reputable organization would not tolerate my laxity. Unfortunately, because I could not pay the fee to their correspondent and obtain the affidavit, I was unable to follow the scam any further. &amp;nbsp;Despite this dead end I was curious to know if they would provide me with the phone number of their Indian correspondent. Thus, I wrote them a mail to humbly apologise for the delay. I further asked them to provide me with the correspondent’s phone number claiming that the bank was rejecting his profile due to security protocols.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Day 7: July 12, 2011&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;The Law Chambers responded, informing me that they did not wish to give the correspondents number. &amp;nbsp;In their e-mail they made it quite clear that for online banking all that is needed is the IFSC code. Therefore, I had to stop here.&lt;/p&gt;
&lt;p&gt;This is the extract of the mail they sent me when I asked for the phone number:&lt;/p&gt;
&lt;p&gt;The Principal Attorney&lt;br /&gt;Wilson and co Chambers&lt;br /&gt;#18 Harms Road Manchester&lt;br /&gt;L14JJ - London.&lt;br /&gt;Supreme Solicitors, Principal Attorneys and Property Managers&lt;/p&gt;
&lt;p&gt;Kind Attention: Client,&lt;br /&gt;This Honorable Chambers is in receipt of your mail. It is very&amp;nbsp;important for you to know that laxity will not be accepted anymore.&amp;nbsp;For the online transfer of this payment, you do not need any phone&amp;nbsp;number, all you need is the IFSC Code already supplied to you. Once&amp;nbsp;more, the IFSC Code is HDFC0000609. That is all you need to make an&amp;nbsp;online transfer.&lt;/p&gt;
&lt;p&gt;While I stopped following the scam at this point, many people might have continued with the process without any knowledge of it being a scam. Thus, one should be very sceptical about individuals or organizations who ask for personal and banking information.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Conclusions&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;In my experiment with scam baiting, I realized that:&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;They introduced me to various parties to make this entire scheme look professional. I initially assumed that I would have to carry out the process with the Shell Petroleum Development Company alone.&lt;/li&gt;&lt;li&gt;In the beginning of the experiment I initially thought the scam was about taking my account number and hacking into it. During my experiment I realized that the scam was not designed to make money by emptying my bank account, but instead was designed to profit off of the various admission fees such as the Sworn Affidavit.&lt;/li&gt;&lt;li&gt;Due to the speed by which they were able to respond to my emails, I realized that they had pre-prepared fake documents – ready to send to anyone who emailed them regarding claiming the offered lottery prize. &amp;nbsp;&lt;/li&gt;&lt;li&gt;Throughout all of our e-mail exchanges I noticed that the individuals behind the scam only used a G-mail account. Curious, I checked their IP address – hoping to find out more information and possibly track their location – but found that Google does not reveal senders IP address information (which is in fact a very good thing in terms of privacy protection!) &amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;For a detailed understanding of different types of scams visit &lt;a class="external-link" href="http://www.fairtrading.nsw.gov.au/Consumers/Scams/Types_of_scams.html"&gt;here&lt;/a&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/scam-baiting'&gt;https://cis-india.org/internet-governance/blog/privacy/scam-baiting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sahana</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-13T10:43:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rti-and-third-party-info">
    <title>RTI and Third Party Information: What Constitutes the Private and Public?</title>
    <link>https://cis-india.org/internet-governance/blog/rti-and-third-party-info</link>
    <description>
        &lt;b&gt;The passing of the Right to Information Act, 2005 was seen as giving an empowering tool in the hands of the citizens of India, six years post its implementation, loopholes have surfaced with misuse of the many fundamental concepts, which have yet not been defined to allow for a consistent pattern of decisions. Among many problems that emerge with the Act, a major problem is defining the extent to which an individual has access to other people’s information. While most of us tend to think that asking for other people’s phone numbers, personal details like passport number or IT returns are private and would be kept so, under the RTI Act and as seen in the Central Information Commission (CIC) decisions, all of these details can be availed of by someone who doesn’t know you at all!&lt;/b&gt;
        
&lt;p&gt;According to section 2 (n) of the RTI Act, 2005, 'third party' means a person other than the citizen making a request for information and includes a 'public authority'. This implies that the term 'third party' includes anyone other than the appellant or the respondent. In matters where an appellant is seeking information not regarding his or her own activities, or is asking for details of shared records that list details of several persons other than him or her, information cannot be provided until the ‘third party’ consents to disclosure and subsequently until the Central Public Information Office (CPIO), after considering the implications of such disclosure allows it. Section 11 (1) the Act provides the procedure to access third party information wherein the appellant needs to request for the third party’s consent after which the CPIO will produce a written request to the 'third party' and within a stipulated time period obtain their response. However, it is not the information bearer (third party) who holds the key to disclosure. The power, by the RTI Act, 2005, is vested in the public information officer who will then, either see a 'larger public interest', or otherwise allow disclosure based on the merits of the case.&lt;/p&gt;
&lt;p&gt;In such a situation, it is interesting to
see who the Central Information Commission (CIC) regards as 'third party'.
While going through the judgments delivered by the CIC, one comes across
several judgments that tell you who can and who cannot access your information.
While a son or daughter naturally inherits his/her father’s wealth, land or
other possessions, they do not inherit his position for obtaining information.
This is just one instance. Similar holds true for access to information of a
deceased kin. Unless the public information officer sees a ‘larger public
interest’ in disclosure of such information, it cannot be revealed even to the
deceased’s wife, husband or children unless they hold a power of attorney specifically
to a right to access information.&lt;/p&gt;
&lt;p&gt;This brings us to the question of ‘larger public interest’ and what information can be delved to anyone for this cause. While the RTI Act, 2005, clearly states that the appellant needs not a reason to ask for any information, it is largely based on the public information officer’s inference as to what the appellant may do with the data and hence, maybe deemed as acting in public interest or for personal gains. This also produces positions of potential criminality and the need for State subjects to prove themselves as ideal information seekers, void of malice in order for the public information officer to rule in their favour.&lt;/p&gt;
&lt;p&gt;Third party position is a problematic one as it only goes so far as to define the state-mediated interaction between two subjects in relation to each other through legal machinery that holds massive discretionary powers to disclose or withhold information. Hence, while, in relation to ‘third party’, a subject may need to justify his larger benevolent interests, the State finds no problems revealing or disclosing information for its own good. In Shri Rajender Kumar Arya vs Dy. Commissioner of Police (DCP), (4 March 2009), the commission ruled that they now have the decision of the Madras High Court in the context of right to privacy in light of the RTI Act. The Madras High Court observed that with the advent of the Right to Information Act, section 3 of the Act entitles a citizen to the right of information. Section 4(2) of the said Act obliges a public authority to disclose information to common people. Even personal information or information, which may otherwise amount to an invasion of privacy, may also be disclosed if the larger public interest so warrants. The court in fact came to the conclusion that the right to privacy virtually fades out in front of the 'Right to Information' and 'larger public interest’. This tells us that ‘third party’ is a mere negotiating position from which the State itself regulates information flow to citizens and can revoke these privileges as and when needed.&lt;/p&gt;
&lt;p&gt;Moreover, there is no clear definition to the ‘larger public interest’ or ‘invasion of privacy’. In several judgments, the committee upholds principles of natural justice to justify instance of public good but these cannot be upheld for all decisions. It is also interesting to see what comes under the purview of ‘public information’. It’s a misconception if you think that you hold the right to revealing your age, birth date, place you belong to, your marks, the rank that you hold, the salary you get, the returns you file or subsequently any of this information regarding your children. As upheld in&amp;nbsp;&lt;a class="external-link" href="http://www.indiankanoon.org/doc/1835611/"&gt;&lt;em&gt;Madhulika Rastogi vs Regional Passport Office, New Delhi&lt;/em&gt;&lt;/a&gt;,&amp;nbsp;on 4 February 2009, &lt;a class="external-link" href="http://www.rti.india.gov.in/cic_decisions/SG-18022009-41.pdf"&gt;&lt;em&gt;M. Rajamannar vs PIO, AC Division, Indira Gandhi National Open University&lt;/em&gt;&lt;/a&gt; on 18 February 2009 and &lt;a class="external-link" href="http://www.rti.india.gov.in/cic_decisions/AD-16022009-03.pdf"&gt;&lt;em&gt;A.V.Subrahmanyam vs BSNL, Hyderabad&lt;/em&gt;&lt;/a&gt; on 16 February 2009 — the judgments illustrate that information submitted to public authorities at any point in time whether to get admitted to school, to get a license, to pass a public services examination or even file a divorce; all qualify for access to other people because they have been knowingly submitted to the public domain. A lot of sensitive information like passport details, telephone call records and medical records that can map intimate interactions of a person’s daily life can also be obtained if larger public interest is proven.&lt;/p&gt;
&lt;p&gt;Hence, it becomes important to revise and rethink the commonly accepted notions of privacy, especially when information gains such strategic importance as well as fluidity through fast expanding platforms as well as tools such as RTI. While one may confidently think that information generated by the self, pertaining to one’s own business and life rightfully belongs to the private domain, it is very important to realize the constantly looming hold of the State to any information. In such a situation, what you can claim as private data totally depends on how much common interest it garners.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rti-and-third-party-info'&gt;https://cis-india.org/internet-governance/blog/rti-and-third-party-info&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Noopur Raval</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-24T09:21:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/aadhaar-truth">
    <title>Aadhaar’s moment of truth</title>
    <link>https://cis-india.org/news/aadhaar-truth</link>
    <description>
        &lt;b&gt;It’s time for the unique identity project to answer tough questions it has dodged so far, writes MA Arun in the Deccan Herald. &lt;/b&gt;
        
&lt;p&gt;On June 25, 2009, Prime Minister Manmohan Singh generated one of the biggest feel-good headlines of UPA2. He appointed former Infosys CEO Nandan Nilekani as Chairperson of Unique Identification Authority of India (UIDAI), which had been set up to assign a unique number to every resident of the country.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;UIDAI – billed as the world’s largest e-governance project – presented a numbing technical challenge. Fingerprint and iris samples of one billion plus Indian residents had to be collected along with details of name, gender, birth date and address. A unique identity had to be assigned to each resident in return and then authenticate it online whenever called for.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Nilekani using his stature in the IT industry assembled a smart team of engineers, who could take the challenge head on. He also started tirelessly crisscrossing the country promoting the project and tying up with different government agencies and PSUs.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;He addressed countless gatherings conveying a simple message: Indian growth has bypassed the poor and giving them legal identity was the first step in acknowledging their existence and making government services accessible.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In the last two years, there has been a little change in his script and in the response of the audience, which has by and large remained breathless and adulatory. There have been a few jarring notes. Once in a while he is accosted by individuals and organisations, who say the project takes away their privacy. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;Most memorably, on January 7, 2011, Nilekani faced an uncharacteristically unruly audience at IISc, Bangalore, which demanded strong protection to privacy. People who attended the meeting found Nilekani evasive as protesting students waved placards outside the venue, urging him to go back. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;But for the media, this reporter included, the dissenting opinion from possibly fringe protesters, sounded exaggerated, making too much of a small issue, debating an academic issue of little practical value.&lt;/p&gt;
&lt;p&gt;Perhaps reflecting the larger prevailing sentiments on Aadhaar, Sujeet Pillai of Feecounter, says with the rise of social networking, privacy has already eroded. "We put more information on Facebook and Twitter than we share with Aadhaar. The benefits of the project outweigh the cost," he adds. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;Many say it is only the middleclass which worries about privacy, while the poor would be more concerned about the benefits. &amp;nbsp; Trying to address privacy concerns, Aadhaar officials have maintained they collect just basic details, enrollment is voluntary and information is encrypted. Your approval is required to authenticate your identity and while revealing who you are, the system just gives a yes or no response, they say.&lt;/p&gt;
&lt;p&gt;Over the last year Aadhaar has picked up steam and observers, who expected the bureaucracy to resist, given its anti-corruption overtone, are mildly surprised. Various government departments are embracing it in competition. Several central ministries, state governments, PSUs have begun to tie their programmes to the Aadhaar number.&lt;/p&gt;
&lt;p&gt;Aadhaar officials say they are on course to enroll 600 million by 2014 and by October this year they expect to start enrolling one million numbers a day. The pilot projects at Mysore, Tumkur and Hyderabad have already enrolled 85 per cent of the population and the project is ramping up to other districts and states.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Early last month the Cabinet Committee on Security in a seemingly unrelated move gave partial approval for a Home ministry project, National Intelligence Grid (Natgrid). The development alarmed the privacy advocates to again raise a cry over Aadhaar. Among other things, Natgrid, being run by an ex-army man, Capt Raghu Raman, reportedly seeks to integrate 21 databases - &amp;nbsp;railways, airlines, stock exchanges, income tax, bank account details, credit card transactions, visa and immigration records, telecom service providers and chemical vendors.&lt;/p&gt;
&lt;p&gt;Most of us reading this article appear in many these databases, which today are islands of information controlled by different government agencies. They cover different segments of the population and may overlap to some extent. Stitching together these disparate databases together would require a mammoth exercise to uniquely identify all Indian residents. That is precisely what Aadhaar, the missing link, is doing, say critics.&lt;/p&gt;
&lt;p&gt;"If Aadhaar ever succeeds in assigning a unique number to all residents, it will take a maximum of two years to create a common Natgrid database. Using a terminal in his office, a cop would be able to watch whatever you do - &amp;nbsp;travelling, talking, buying - &amp;nbsp;in real time. &amp;nbsp;The surveillance technology is pretty straightforward," says noted security expert and IIT Mumbai alumni, Dr Samir Kelekar of Teknotrends.&lt;/p&gt;
&lt;p&gt;The system is being designed to catch terrorists and criminals, say Natgrid supporters. "But why subject the entire population to potentially the same level of surveillance," asks Sunil Abraham of Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;Noted jurist Usha Ramanathan says since 2008 several measures such as the Collection of Statistics Act, The Information Technology Act, &amp;nbsp;Aadhaar, National Grid have come about to collect information about people. “After 9/11 in the guise of homeland security USA expanded police powers. Something similar is happening in India after 26/11,” she says.&lt;/p&gt;
&lt;p&gt;The claims of Aadhaar benefiting the poor is untested as there has been no feasibility study, she adds. "This is a security project masquerading as an anti-poverty project," says Abraham. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;Aadhaar has eluded a debate so far on these issues, say critics. Ramanathan says she made three attempts in November 2009, July 2010 and February 2011 to engage Nilekani, Aadhaar Director General R S Sharma and few other project officials on the issue.&lt;/p&gt;
&lt;h3&gt;Dubious demands&lt;/h3&gt;
&lt;p&gt;A New Delhi-based Aadhaar government official, speaking on the condition of anonymity, said there was no discussion within the project on the potential risks it posed. "The main focus is in making a paradigm shift in governance and reaching out to the poor to ensure that the Rs 3,26,000 crore being spent on subsidy is not pilfered," he said.&lt;/p&gt;
&lt;p&gt;But he went on to acknowledge that Aadhaar was like 'nuclear energy', which could be used to either make bombs or generate electricity. “It is for the media and civil society to apply pressure for the right safeguards," he said. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;While the engineers and bureaucrats are steamrolling the project, the laws of the land and the promised safeguards are yet to catch up with it.&lt;/p&gt;
&lt;p&gt;Indian judiciary has also given a free hand to the law enforcement authorities to conduct surveillance. According to the latest Google Transparency Report, Indian government officials made 67 requests to remove contentious items from various Google services between July to December 2010. Only 6 requests were backed by court orders and rest were demands made by police and other executive agencies.&lt;/p&gt;
&lt;p&gt;Why is Nilekani who has emerged as the face of Aadhaar silent about the security dimension of the project, ask critics. After all, the Infosys credo is to ‘disclose when in doubt’, they point out. "Nilekani and team are good people without any evil intention. They have never lived in villages and believe that technology can solve any problem," says Abraham.&lt;/p&gt;
&lt;p&gt;Ramanathan differs. "In 2009, I would have said he was unaware of the possible risks of Aadhaar. I will not attribute that innocence to him anymore. People in power tend to be blinded by it," she says.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;"Their response has varied from ‘nobody else is asking these questions’, ‘have not come prepared to address these issues today’ and ‘we will get back to you’," she says. &amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;p&gt;Critics also accuse Aadhaar officials of presenting a misleading picture. Enrollment started as a voluntary exercise, but is now being made mandatory to get LPG cylinders. "They were supposed to collect only basic details, but Aadhaar enrollment forms now ask for email ids and phone numbers," Ramanathan said.&lt;/p&gt;
&lt;div&gt;This news appeared in the Deccan Herald on 5 July 2011. The original post can be read &lt;a class="external-link" href="http://www.deccanherald.com/content/173274/aadhaars-moment-truth.html"&gt;here&lt;/a&gt;.&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/aadhaar-truth'&gt;https://cis-india.org/news/aadhaar-truth&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-07-05T07:16:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/june-2011-bulletin">
    <title>June 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/june-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage:&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research knowledge base, the RAW programme has been collaborating with different organisations and individuals to focus on its three year thematic of Histories of the Internets in India. Six monographs Rewiring Bodies, Archive and Access, Pornography and the Law, The Leap of Rhodes or, How India Dealt with the Last Mile Problem - An Inquiry into Technology and Governance, Transparency and Politics and Internet, Society and Space in Indian Cities are published online and will be launched later this year.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/cis-raw/histories/Internetcities/cept-centre-for-role-of-internet"&gt;CEPT      to Set up Centre to Research Role of Internet in Social Development&lt;/a&gt; [Published in the Indian Express on June 18, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Upcoming Event in CEPT, Ahmedabad&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/conferences/conference-blogs/workshop"&gt;Locating      Internets: Histories of the Internet(s) in India — Research Training and      Curriculum Workshop: Call for Participation&lt;/a&gt; [Deadline for submission –      15 July 2011; Workshop from 19 to 22 August 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives with a Cause?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a knowledge programme initiated by CIS and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who want to critically engage with the dominant discourse on youth, technology and social change, in order to look at the alternative practices and ideas in the Global South. It also aims at building new ecologies that amplify and augment the interventions and actions of the digitally young as they shape our futures.&lt;/p&gt;
&lt;h3&gt;The Digital Natives Newsletter&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/dn/digital-dinosaurs/weblogentry_view"&gt;The      Digital Dinosaurs&lt;/a&gt; [Volume 5]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt; Pathways&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;HE Cell's initiative on social justice, in collaboration with CIS, has initiated the Pathways Project for Learning in Higher Education. It is supported by the Ford Foundation. Under this project, nine under-graduate colleges in different parts of India will be identified to provide special skills in livelihood, knowledge and technology to underprivileged students in those colleges.&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/grants/pathways-project/pathways-proposal-info/weblogentry_view"&gt;Pathways      for Learning in Higher Education&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/accessibility/blog/2011/06/21/communications-and-video-accessibility"&gt;Policy      Spotlight: 21st Century Communications and Video Accessibility Act&lt;/a&gt; [Written by Deepti Bharthur; contains an e-mail interview with Jenifer      Simpson, Senior Director for Government Affairs and head of the      Telecommunications &amp;amp; Technology Policy Initiative at the American      Association of People with Disabilities ]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/accessibility/blog/2011/06/13/ict-sri-lanka"&gt;ICT      Accessibility in Sri Lanka&lt;/a&gt; [Written by Nirmita Narasimhan]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;CIS believes that access to knowledge and culture is essential as it promotes creativity and innovation and bridges the gaps between the developed and developing world positively. Hence, the campaigns for an international treaty on copyright exceptions for print-impaired, advocating against PUPFIP Bill, calls for the WIPO Broadcast Treaty to be restricted to broadcast, questioning the demonization of 'pirates', and supporting endeavours that explore and question the current copyright regime.&lt;/p&gt;
&lt;h3&gt;Statement&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/ipr/blog/sccr-22ndsession-cis-statement"&gt;Statement      of CIS, India, on the WIPO Broadcast Treaty at the 22nd SCCR&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/ipr/blog/lid-on-royalty-outflows"&gt;Putting      a Lid on Royalty Outflows — How the RBI can Help Reduce your IP Costs&lt;/a&gt; [Written by Sanjana Govil]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that innovation and creativity should be fostered through openness and collaboration and is committed towards promotion of open standards, open access, and free/libre/open source software.&lt;/p&gt;
&lt;h3&gt;Submission&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/openness/blog/2011/06/08/draft-ndsap-comments"&gt;Comments      on the draft National Data Sharing and Accessibility Policy&lt;/a&gt; [submitted      to the National Spatial Data Infrastructure]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Although there may not be one centralized authority that rules the Internet, the Internet does not just run by its own volition: for it to operate in a stable and reliable manner, there needs to be in place infrastructure, a functional domain name system, ways to curtail cyber crime across borders, etc. The Tunis Agenda of the second World Summit on the Information Society (WSIS), paragraph 34 defined Internet governance as “the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.”  Its latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;New Articles&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/the-present-and-future-dangers-of-indias-draconian-new-internet-regulations/weblogentry_view"&gt;The      Present — and Future — Dangers of India's Draconian New Internet      Regulations&lt;/a&gt; [By Anja Kovacs in the Caravan on June 1, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/big-brother-watching-you/weblogentry_view"&gt;Big      Brother is Watching You&lt;/a&gt; [By Sunil Abraham in Deccan Herald on June 1,      2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/2011/06/08/digital-is-political"&gt;The      Digital is Political&lt;/a&gt; [By Nishant Shah in Down to Earth, Issue of June      15, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/want-to-be-watched/weblogentry_view"&gt;Do      You Want to be Watched?&lt;/a&gt; [By Sunil Abraham in Pragati on June 8, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/2011/06/09/snooping-to-data-abuse"&gt;Snooping      Can Lead to Data Abuse&lt;/a&gt; [By Sunil Abraham in Mail Today on June 9,      2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/2011/06/22/privacy-and-security"&gt;Privacy      and Security Can Co-exist&lt;/a&gt; [By Sunil Abraham in Mail Today on June 21,      2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Column in Indian Express&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah, Director-Research will be writing a series of columns on Internet and Society issues:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/2011/06/08/password-in-hindi"&gt;Say      'Password' in Hindi&lt;/a&gt; [By Nishant Shah in the Indian Express, May 15,      2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Upcoming Event&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/socio-financial-online-networks"&gt;Socio-financial      Online Networks: Globalizing Micro-Credit through Micro-transactional      Networked Platforms – A Public Lecture by Radhika Gajalla&lt;/a&gt; [at the      Centre for Internet and Society, Bangalore, July 8, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing a project, ‘Privacy in Asia’. &lt;i&gt;It is funded by Privacy International (PI), UK and the International Development Research Centre, Canada and is being administered in collaboration with the Society and Action Group, Gurgaon&lt;/i&gt;. The two-year project commenced on 24 March 2010 and will be completed as agreed to by the stakeholders. It was set up with the objective of raising awareness, sparking civil action and promoting democratic dialogue around challenges and violations of privacy in India. In furtherance of these goals it aims to draft and promote over-arching privacy legislation in India by drawing upon legal and academic resources and consultations with the public.&lt;/p&gt;
&lt;h3&gt;Featured Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/2011/06/14/copyright-enforcement"&gt;Copyright      Enforcement and Privacy in India&lt;/a&gt; [Written by Prashant Iyengar]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Articles&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/2011/06/04/street-view-of-private-and-public"&gt;A      Street View of Private and the Public&lt;/a&gt; [By Prashant Iyengar in Tehelka      on June 4, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/blind-man-view-of-elephunt%20/?searchterm=The%20new%20Right%20to%20Privacy%20Bill%202011%20%E2%80%94%20A%20Blind%20Man%27s%20View%20of%20the%20Elephunt"&gt;The      new Right to Privacy Bill 2011 — A Blind Man's View of the Elephunt&lt;/a&gt; [By Prashant Iyengar in Privacy India website on June 8, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/2011/06/03/bloggers-rights-and-privacy"&gt;Bloggers'      Rights Subordinated to Rights of Expression: Cyber Law Expert&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Event organised in Guwahati&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-guwahati-conference.pdf/view"&gt;Privacy      matters&lt;/a&gt; [Donbosco Institute, Kharguli, Guwahati, June 23, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Upcoming Events&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/internet-surveillance-policy-lecture"&gt;Internet      Surveillance Policy: “…the second time as farce?” – A Public Lecture by      Caspar Bowden&lt;/a&gt; [TERI, Bangalore, June 27, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/privacy-matters-hyderabad"&gt;Privacy      Matters - A Public Conference in Hyderabad&lt;/a&gt; [Osmania University Center      for International Program, Hyderabad, July 9, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers. CIS campaigns to facilitate this:&lt;/p&gt;
&lt;h3&gt;Articles by Shyam Ponappa&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website as well.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/telecom/blog/2011/06/08/ntp-2011-objective"&gt;NTP      2011 Objective: Broadband&lt;/a&gt; [published in the Business Standard on June 2,      2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Miscellaneous&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/notices/technology-transparency-accountability"&gt;Technology,      Transparency and Accountability: A Bar-Camp in Delhi&lt;/a&gt; [June 5, 2011,      Delhi]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/notices/communication-policy-advocacy-technology-and-online-freedom-of-expression-a-toolkit-for-media-development"&gt;Communication      Policy Advocacy, Technology, and Online Freedom of Expression: A Toolkit      for Media Development&lt;/a&gt; [June 20 – July 1, 2011, Budapest, Hungary]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/cyber-space-hackers-paradise"&gt;Your cyber space is a hackers paradise&lt;/a&gt; [Mail Today, June 6, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/centaur-reveals-personal-info"&gt;Centaur website reveals guests' personal info&lt;/a&gt; [Times of India, June 20, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/seamier-side-of-texting"&gt;Mumbai Takes Note of Sexting, the Seamier Side of Texting&lt;/a&gt; [Times of India, June 19, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/state-just-did-to-you"&gt;Look what the state just did to you&lt;/a&gt; [Mid Day, June 12, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/india-e-tolerance"&gt;Tough neighbourhood tests India's e-tolerance&lt;/a&gt; [Times of India, June 12, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/looser-web-rules"&gt;India Weighing Looser Web Rules&lt;/a&gt; [Wall Street Journal, May 30, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/public-data-on-web"&gt;Public data on the Web leaves much to be desired&lt;/a&gt; [Hindu, May 28, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/aadhar-coming-to-bengaluru"&gt;What documents will you need, to get UID?&lt;/a&gt; [CitizenMatters.in, May 28, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/mobile-education-villages"&gt;Mobile education comes to villages&lt;/a&gt; [Mail Today, May 27, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/google-stalks-street"&gt;Google now stalks your street&lt;/a&gt; [Hindu, May 27, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/women-love-facebook"&gt;Women in love with Facebook&lt;/a&gt; [Deccan Herald, May 27, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/google-unveils-controversial-street-view"&gt;Google Unveils Controversial Street View Mapping in B’lore&lt;/a&gt; [Economic Times, Mumbai, May 27, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/e-g-8-report-internet-rights"&gt;NGOs say eG8 report must stress internet rights&lt;/a&gt; [TELECOMPAPER, May 26, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Follow us elsewhere&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="http://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Follow CIS on &lt;a href="http://identi.ca/main/remote?nickname=cis"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/group.php?gid=28535315687"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="http://www.cis-india.org/"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/june-2011-bulletin'&gt;https://cis-india.org/about/newsletters/june-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-30T07:14:57Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/socio-financial-online-networks">
    <title>Socio-financial Online Networks: Globalizing Micro-Credit through Micro-transactional Networked Platforms – A Public Lecture by Radhika Gajalla</title>
    <link>https://cis-india.org/events/socio-financial-online-networks</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society invites you to a public lecture by Prof. Radhika Gajalla of Bowling Green State University. She will give a lecture on how microfinance online functions through the social networked online space and the micro-transactional abilities of the interface together work to enhance financialization of the globe.  &lt;/b&gt;
        
&lt;p&gt;In her lecture, she will focus on how this is made possible by the increased digitalization of financial practices and the role micro practices play in producing globalization. She will also lay emphasis on the fact that the increased digitalization of finance also means that "financial literacy" is also removed into the virtual space so that it is further away from subaltern daily praxis while simultaneously staging subaltern presence in cosmopolitan space through mobilizing structures of 'feeling' that &lt;a class="external-link" href="https://researchers.anu.edu.au/researchers/black-s"&gt;Dr. Shameem Black&lt;/a&gt; refers to as "sentimental sympathy".&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Prof. Gajalla’s lecture will also touch upon issues like what online socially networked micro-credit websites do visually and through the use of multiple tools that are embedded in the discourse of interactivity is to make it seem as if the subaltern is indeed participating in these networks. Thus, the appearance of a subaltern presence is produced. In this production of appearance of the subaltern presence in online contexts, just as in other visual and static contexts, the complexity of socio-cultural and economic intersections are not clearly revealed or accounted for. This reproduces exotic notions of the authentic, mummified ‘other’ and offers the subaltern image up for consumption. In turn, as Web 2.0 tools are set up to actually reach the offline subaltern via non-profit or for profit representatives that connect to these online networks, the subaltern in turn is tapped as a consumer for capital.&lt;/p&gt;
&lt;h2&gt;Radhika Gajjala&lt;/h2&gt;
&lt;p&gt;Radhika Gajjala is a Professor of Media and Communication at Bowling Green State University and Director of the American Culture Studies program. Her book, &amp;nbsp;"&lt;a class="external-link" href="http://www.amazon.com/Cyber-Selves-Feminist-Ethnographies-South/dp/0759106924"&gt;Cyber Selves: Feminist Ethnographies of South Asian Women&lt;/a&gt;" was published in 2004. She has co-edited collections on "&lt;a class="external-link" href="http://books.google.com/books?id=cMZFoROURUQC&amp;amp;source=gbs_similarbooks_r&amp;amp;cad=2"&gt;South Asian Technospaces&lt;/a&gt;", "&lt;a class="external-link" href="http://www.taylorandfrancis.com/books/details/9780415877916/"&gt;Global Media Culture and Identity&lt;/a&gt;" and "&lt;a class="external-link" href="http://www.hamptonpress.com/Merchant2/merchant.mvc?Screen=PROD&amp;amp;Product_Code=1-57273-776-X&amp;amp;Category_Code=NDCC"&gt;Webbing Cyberfeminist Practice: Communities, Pedagogies, and Social Action&lt;/a&gt;". She is presently working on a forthcoming book, "Weavings of the Real and Virtual: Cyberculture and the Subaltern" to be published in 2012 and is also working on two interrelated projects — one on "Microfinance Online and Money in Virtual Worlds and Social Media" in relation to the ITization and NGOization of global socio-economic work and play environments and the other on "Coding and Placement of Affect and Labour in Digital Diasporas".&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/socio-financial-online-networks'&gt;https://cis-india.org/events/socio-financial-online-networks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-06-24T11:37:52Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/internet-surveillance-policy-lecture">
    <title>Internet Surveillance Policy: “…the second time as farce?” – A Public Lecture by Caspar Bowden</title>
    <link>https://cis-india.org/events/internet-surveillance-policy-lecture</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Bangalore, invites you to a public lecture by Caspar Bowden*, the Chief Privacy Adviser of Microsoft’s Worldwide Technology Office, on Internet Surveillance Policy: “…the second time as farce?&lt;/b&gt;
        
&lt;h3&gt;Abstract&lt;/h3&gt;
&lt;p&gt;In 2000, as Director of the independent think-tank, "&lt;a class="external-link" href="http://www.fipr.org/"&gt;Foundation for Information Policy Research&lt;/a&gt;", Caspar led a campaign to revise several aspects of a new comprehensive UK law governing electronic surveillance ("&lt;a class="external-link" href="http://www.fipr.org/rip/"&gt;the RIP Act&lt;/a&gt;"). UK legislated in this area many years before most other countries, and the approach was widely criticized although some amendments were achieved. After a hiatus of a decade, many Commonwealth countries are now copying the RIP law (evidently unaware of the original controversies over its defects). Caspar will discuss the legal-technical intricacies of such legislation, the underlying policy dilemmas, the background context of the failed 1990s policy of “key escrow”, and the subsequent privacy catastrophe of blanket retention of the “traffic data” of all of the 500m citizens of the EU.&lt;/p&gt;
&lt;h2&gt;Caspar Bowden&lt;/h2&gt;
&lt;p&gt;Caspar Bowden is Microsoft's Worldwide Technology Officer for Privacy, providing advice on technology policy matters concerning privacy in over 40 countries, with particular focus on Europe and regions with horizontal privacy law. His goal is to ensure that users of Microsoft products and services are in control of their personal data and that fair information practices are respected. He is a specialist in data protection policy, privacy enhancing technology research, identity management and authentication.&lt;/p&gt;
&lt;p&gt;Earlier he was the director of the Foundation for Information Policy Research and was also an expert adviser to the UK Parliament for the passage of three bills concerning privacy issues, and was co-organizer of the influential Scrambling for Safety public conferences on UK encryption and surveillance policy. His previous career over two decades ranged from investment banking (proprietary trading risk-management for option arbitrage), to software engineering (graphics engines and cryptography), including work for Goldman Sachs, Microsoft Consulting Services, Acorn, Research Machines, and IBM.&lt;/p&gt;
&lt;h3&gt;Who should attend?&lt;/h3&gt;
&lt;p&gt;This public talk aims to engage in a dialogue with anybody interested in questions of technology, surveillance, policy and the politics of Internet based governance. Students, research scholars, academics, practitioners, those in the business of technology development, design and study, are invited to attend the lecture that approaches the issue from different angles of technology, society and politics.&amp;nbsp;&lt;/p&gt;
&lt;div&gt;&lt;strong&gt;Entry: Free; Limited Seating&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Registration recommended: prasad@cis-india.org&lt;br /&gt;&lt;br /&gt;For additional info &lt;a href="https://cis-india.org/internet-governance/internet-privacy-surveillance.pdf" class="internal-link" title="Internet Privacy and Surveillance"&gt;click here [PDF, 521 kb]&lt;/a&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;* &lt;em&gt;Caspar is speaking in his private capacity and his remarks do not necessarily reflect any official Microsoft position&lt;/em&gt;&lt;/div&gt;
&lt;div&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/div&gt;
&lt;h2&gt;Videos&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;embed width="250" height="250" allowfullscreen="true" allowscriptaccess="always" wmode="transparent" type="application/x-shockwave-flash" src="http://blip.tv/play/AYLM2GsA"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/internet-surveillance-policy-lecture'&gt;https://cis-india.org/events/internet-surveillance-policy-lecture&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Lecture</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-09-08T03:19:35Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-and-security">
    <title>Privacy and Security Can Co-exist</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-and-security</link>
    <description>
        &lt;b&gt;The blanket surveillance the Centre seeks is not going to make India more secure, writes Sunil Abraham in this article published in Mail Today on June 21, 2011.&lt;/b&gt;
        
&lt;p&gt;TODAY, the national discourse around the “ right to privacy” posits privacy as antithetical to security.&lt;/p&gt;
&lt;p&gt;Nothing can be farther from the truth. Privacy is a necessary but not sufficient condition for security. A bank safe is safe only because the keys are held by a trusted few. No one else can access these keys or has the ability to duplicate them. The 2008 amendment of the IT Act and their associated rules notified April 2011 propose to eliminate whatever little privacy Indian netizens have had so far. Already as per the Internet Service Provider ( ISP) licence, citizens using encryption above 40- bit were expected to deposit the complete decryption key with the Ministry of Communications and Information Technology. This is as intelligent as citizens of a neighbourhood making duplicates of the keys to their homes and handing them over at the local police station.&lt;/p&gt;
&lt;h3&gt;Surveillance&lt;/h3&gt;
&lt;p&gt;Surveillance in any society is like salt in cooking — essential in small quantities but completely counter- productive even slightly in excess. Blanket surveillance makes privacy extinct, it compromises anonymity, essential ingredients for democratic governance, free media, arts and culture, and, most importantly, commerce and enterprise. The Telegraph Act only allowed for blanket surveillance as the rarest of the rare exception. The IT Act, on the other hand, mandates multitiered blanket surveillance of all lawabiding citizens and enterprises.&lt;/p&gt;
&lt;p&gt;When your mother visits the local cybercafe to conduct an e- commerce transaction, at the very minimum there are two levels of blanket surveillance. According to the cyber- cafe rules, all her transaction logs will be captured and stored by the operator for a period of one year. This gentleman would also have access to her ID document and photograph. The ISPs would also store her logs for two years to be in compliance with the ISP licence ( even though none of them publish a data- retention policy). Some e- commerce website, to avoid liability, will under the Intermediary Due Diligence rules also retain logs.&lt;/p&gt;
&lt;p&gt;Data retention at the cyber- cafe, by the ISP and also by the application service provider does not necessarily make Indian cyberspace more secure. On the contrary, redundant storage of sensitive personal information only opens up multiple points of failure and leaks — in the age of Nira Radia and Amar Singh no sensible bank would accept such intrusion into their core business processes.&lt;/p&gt;
&lt;p&gt;Surveillance capabilities are not a necessary feature of information systems.&lt;/p&gt;
&lt;p&gt;They have to be engineered into these systems. Once these features exist they could potentially serve both the legally authorised official and undesirable elements.&lt;/p&gt;
&lt;p&gt;Terrorists, cyber- warriors and criminals will all find systems with surveillance capabilities easier to compromise.&lt;/p&gt;
&lt;p&gt;In other words, surveillance compromises security at the level of system design. There were no Internet or phone lines in the Bin Laden compound — he was depending on a store and forward arrangement based on USB drives. Do we really think that registration of all USB drives, monitoring of their usage and the provision of back doors to these USBs via a master key would have led the investigators to him earlier?&lt;/p&gt;
&lt;h3&gt;Myth&lt;/h3&gt;
&lt;p&gt;Increase in security levels is not directly proportional to an increase in levels of surveillance gear. This is only a myth perpetuated by vendors of surveillance software and hardware via the business press. You wouldn't ask the vendors of Xray machines how many you should purchase for an airport, would you? An airport airport with 2,000 X- ray machines is not more secure than one with 20. But in the age of UID and NATGRID, this myth has been the best route for reaching salestargets using tax- payers’ money.&lt;/p&gt;
&lt;p&gt;Surveillance must be intelligent, informed by evidence and guided by a scientific method. Has the ban on public WiFi and the current ID requirements at cyber- cafes led to the arrest of terrorists or criminals in India? Where is the evidence that more resource hungry blanket surveillance is going to provide a return on the investment? Unnecessary surveillance is counter- productive and distracts the security agenda with irrelevance.&lt;/p&gt;
&lt;p&gt;Finally, there is the question of perception management. Perceptions of security do not only depend on reality but on personal and popular sentiment. There are two possible configurations for information systems — one, where the fundamental organising principle is trust and second, where the principle is suspicion.&lt;/p&gt;
&lt;p&gt;Systems based on suspicion usually give rise to criminal and corrupt behaviour.&lt;/p&gt;
&lt;h3&gt;Perception&lt;/h3&gt;
&lt;p&gt;If the state were to repeatedly accuse its law- abiding citizens of being terrorists and criminals it might end up provoking them into living up to these unfortunate expectations. If citizens realise that every moment of their digital lives is being monitored by multiple private and government bodies, they will begin to use anonymisation and encryption technology round the clock even when it is not really necessary. Ordinary citizens will be forced to visit the darker and nastier corners of the Internet just to download encryption tools and other privacy enabling software. Like prohibition this will only result in further insecurity and break- down of the rule of law.&lt;/p&gt;
&lt;p&gt;The writer is executive director of the Bangalore- based Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;Read the original published in Mail Today &lt;a class="external-link" href="http://epaper.mailtoday.in/Details.aspx?boxid=231936750&amp;amp;id=55069&amp;amp;issuedate=2162011"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-and-security'&gt;https://cis-india.org/internet-governance/blog/privacy-and-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-21T09:05:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement">
    <title>Copyright Enforcement and Privacy in India</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement</link>
    <description>
        &lt;b&gt;Copyright can function contradictorily, as both the vehicle for the preservation of privacy as well as its abuse, writes Prashant Iyengar. The research examines the various ways in which privacy has been implicated in the shifting terrain of copyright enforcement in India and concludes by examining the notion of the private that emerges from a tapestry view of the relevant sections of Copyright Act.&lt;/b&gt;
        &lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Copyright can function contradictorily, as both the vehicle for the  preservation of privacy as well as its abuse. This paper examines the  various ways in which privacy has been implicated in the shifting  terrain of copyright enforcement in India. Chiefly, there are three  kinds of situations that we will be discussing here: The first is  straightforward and deals with the physical privacy intrusion caused by  the execution of search and seizure orders during the investigation of  infringement. The second situation involves the violation of privacy  through the misappropriation of confidential information. The last  situation involves the wrongful appropriation of a person’s persona or  their ‘publicity’ – the photographs of celebrities, for instance – for  private gain. Instances of each of these situations, and the manner in  which the courts have negotiated the privacy claims that have arisen are  described in the sections that follow. In addition, Copyright law,  dealing as it does mainly with offences of the nature of unauthorised  publicity/publication putatively inscribes certain spaces and activities  as either public or private. The concluding section of this paper  examines the notion of the private that emerges from a tapestry view of  various sections of the Copyright Act.&lt;/p&gt;
&lt;h2&gt;Copyright Enforcement&lt;/h2&gt;
&lt;h3&gt;Context setting&lt;/h3&gt;
&lt;p&gt;Over the past several decades there has been an increasing awareness  globally – and within India – of the importance of 'knowledge societies'  which, in contrast to earlier industrial or agrarian societies,  leverage 'information' as the key raw material and output of  a range of  productive activity. As one UNESCO Report puts it "Knowledge is today  recognized as the object of huge economic, political and cultural  stakes"[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#1"&gt;1&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;In this new paradigm, investment in Information and Communications  Technology (ICT), the enactment of strong Intellectual Property laws,  and their strict enforcement are prescribed as imperative in  facilitating the transition away from the older economic modes. The  promise of the knowledge society is particularly alluring for developing  countries, like India, where it is viewed as a vehicle for achieving  what Ravi Sundaram has termed 'temporally-accelerative' development[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#2"&gt;2&lt;/a&gt;],  through which we would be able to transcend our "historical  disabilities", and achieve parity with the incumbent masters of the  world. &lt;span class="Apple-style-span"&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#3"&gt;3&lt;/a&gt;]&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In their eagerness to provide the best  supportive conditions to usher in this coveted knowledge society,  nations have been tightening their Intellectual Property regimes  – including copyright law. This has entailed a two fold expansion,  firstly, in the scope of copyright to include, for instance,  ‘technological protection measures’ within their ambit and secondly, in  the powers of investigation, search and seizure put at the disposal  enforcement agencies. In addition, as we shall see, courts in India have  enthusiastically bought into this vision of a knowledge economy, and  this has fuelled their eagerness to craft innovative – if legally  unsound – orders which put tremendously intrusive powers in the hands of  copyright owners. Taken together, these developments have taken their  toll on the privacy of individuals which this section will explore in  further detail. We begin with a brief description of the statutory  mechanism for copyright enforcement – both civil and criminal - under  the Copyright Act. We then move on to the way courts have crafted new  orders that magnify the powers of copyright owners to the detriment of  the privacy of individuals. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Civil and Criminal Enforcement under the Copyright Act&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;The Copyright Act provides for both civil and criminal remedies for  infringement. Section 55 provides for civil remedies and declares that,  upon infringement, "the owner of the copyright shall be entitled to all  such remedies by way of injunction, damages, accounts and otherwise as  are or may be conferred by law for the infringement of a right." Civil  suits are instituted at the appropriate district court having  jurisdiction – including where the plaintiff resides.&lt;/p&gt;
&lt;p&gt;Similarly, Chapter XIII (Sections 63-70) provides a range of criminal  penalties for infringing copyrights which are typically punishable with  terms of imprisonment that “may extend up to three years” along with a  fine. These offences would be taken cognizance of and tried at the court  of the Metropolitan Magistrate or Judicial Magistrate of the First  class [Sec 70], in the same manner as all cognizable offences[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#4"&gt;4&lt;/a&gt;] in  India i.e., by following the procedures under the Code of Criminal  Procedure, 1973. Section 64 of the Copyright Act dealing with police  powers was amended in 1984 to give plenary powers to police officers, of  the rank of a sub-inspector and above, to seize without warrant all  infringing copies of works “if he is satisfied” that an offence of  infringement under section 63, “has been, is being, or is likely to be,  committed”. Prior to amendment, this power could only be exercised by a  police officer when the matter had already been taken cognizance of by a  Magistrate.  Prima facie, this is a very sweeping power since its  exercise is unsupervised by the judiciary and only depends on the  “satisfaction” of a police officer. To put matters in perspective, under  the Income Tax Act, dealing with the far more sensitive issue of tax  evasion, a search and seizure can only be conducted based on information  already in the possession of the investigating authority.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#5"&gt;5&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;In &lt;i&gt;Girish Gandhi &amp;amp; Ors. v Union of India&lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#6"&gt;6&lt;/a&gt;],  a case before the Rajasthan High Court, the petitioner, who ran a video  cassette rental business, challenged the constitutional validity of the  wide powers granted to police officers under this section. Citing  various instances of violations of privacy that the abuse of the section  could occasion, the petitioner contended:&lt;/p&gt;
&lt;p&gt;"The provisions of section 64 itself gives arbitrary and naked powers  without any guidelines to the police officer to seize any material from  the shop and thus, drag the video owners to the litigation. He has  given instances in the petition that &lt;i&gt;police officer usually demands for video cassettes to be given to them free of charge for viewing it at their homes&lt;/i&gt; and in case, on any reason either the video cassette is not available  or it is not given free of charge, there is likelihood that police  officer shall misuse his powers and try to seize the material for  prosecution under the various provisions of the Act."&lt;/p&gt;
&lt;p&gt;Although the High Court dismissed the petition on the grounds that it  did not disclose any actual injury to the petitioner, it upheld the  constitutionality of the section by reading the word "satisfaction" to  mean that the "police officer will not act until and unless he has got  some type of information on which information he is satisfied and his  satisfaction shall be objective."&lt;/p&gt;
&lt;p&gt;[Section 64] is also not arbitrary for the reason that guidelines and  safeguards are provided under Sections 51, 52 and 52A and Section 64(2)  of the Copyright Act, coupled with the fact that &lt;i&gt;it is expected of  the police officer that he would not act arbitrarily and his  satisfaction shall always based on some material or knowledge and he  shall only proceed for action under Section 64 in a bona fide manner and  not for making a roving inquiry&lt;/i&gt;. (emphasis added)&lt;/p&gt;
&lt;p&gt;Despite the pious hopes expressed in this decision, they do not  appear to have influenced the actual behaviour of police officers. In  May 2011, the Delhi High Court struck down a notification issued by the  Commissioner of Police which had instructed all subordinate  functionaries of the police to "attend to and provide assistance"  whenever any complaint "in respect of violation of the provisions of  Copyright Act, 1957" was received from three companies: Super Cassettes  Industries Limited, Phonographic Performance Ltd and Indian Performance  Right Society Ltd.  This virtually amounted to the commandeering of the  criminal enforcement system by a few private owners for their own  private interests. In their suit, the petitioner — Event and  Entertainment Management Association — had contended that the police  machinery "cannot be made to act at the behest of certain privileged  copyright owners". Striking the notification down, as unconstitutional,  Justice Muralidhar of the Delhi High Court held:&lt;/p&gt;
&lt;p&gt;"To the extent the impugned circular privileges the complaints from  SCIL over other complaints from owners of copyright it is unsustainable  in law for the simple reason that there has to be equal protection of  the law in terms of Article 14 of the Constitution. The police are not  expected to act differently depending on who the complainant is. All  complaints under the Act require the same seriousness of response and  the promptitude with which the police will take action, &lt;i&gt;Likewise, the  caution that the Police is required to exercise by making a preliminary  inquiry and satisfying itself that prima facie there is an infringement  of copyright will be no different as regards the complaints or  information received under the Act&lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#7"&gt;7&lt;/a&gt;]."&lt;/p&gt;
&lt;p&gt;The Judge also issued some welcome remarks on the manner in which complaints under Section 64 were to be handled:&lt;/p&gt;
&lt;p&gt;In order that the power to seize in terms of Section 64 of the Act is  not exercised in an arbitrary and whimsical manner, it has to be hedged  in with certain implied safeguards that constitute a check on such  power. Consequently, prior to exercising the power of seizure under  Section 64(1) of the Act the Police officer concerned has to necessarily  be prima facie satisfied that there is an infringement of copyright in  the manner complained of. In other words, merely on the receipt of the  information or a complaint from the owner of a copyright about the  infringement of the copyrighted work, the Police is not expected to  straightway effect seizure. Section 52 of the Act enables the person  against whom such complaint is made to show that one or more of the  circumstances outlined in that provision exists and that therefore there  is no infringement. During the preliminary inquiry by the Police, if  such a defence is taken by the person against whom the complaint is made  it will be incumbent on the Police to prima facie be satisfied that  such defence is untenable before proceeding further with the  seizure.(emphasis added)[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#8"&gt;8&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;This decision significantly tempers the severity of possible searches  and seizures conducted by the police under Copyright Law. It advances  the cause of privacy by reining in the power of the state to arbitrarily  intrude on citizens.&lt;/p&gt;
&lt;p&gt;Parallel to the attempt at ‘hedging in’ of police powers in criminal  enforcement by this High court, there has been a move to expand powers  of investigative bodies in civil suits. The next sub-section looks at  two innovations by courts – Anton Piller Orders and John Doe orders –  which are mechanisms unwarranted by civil procedural law, but crafted by  high courts specifically to deal with copyright investigation.&lt;/p&gt;
&lt;h3&gt;'Anton Piller' orders and 'John Doe' Orders&lt;/h3&gt;
&lt;p&gt;In addition to the extensive police powers under the Copyright Act  mentioned above, plaintiffs have other, equally intrusive powers at  their disposal. In the past decade it has become common for copyright  owners and owners-associations to employ civil procedure to emulate the  same kind of invasiveness. This is done via the mechanism of so-called  ‘Anton Piller’ orders  - orders obtained unilaterally ‘ex-parte’ (in the  absence of the defendant) from civil courts which permit  court-appointed officers, accompanied by representatives of the  plaintiffs themselves, to search premises and seize evidence without  prior warning to the defendant. Frequently, courts have also issued  ‘John Doe’ orders[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#9"&gt;9&lt;/a&gt;] –orders  to search and seize against unnamed/unknown defendants - which  virtually translates into untrammelled powers in the hands of the  plaintiffs, aided by court-appointed local commissioners, to raid any  premises they set their eyes on.&lt;/p&gt;
&lt;p&gt;Although the authority of the courts under Indian law to grant these orders is suspect[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#10"&gt;10&lt;/a&gt;],  they have virtually been regularized in practice over the past decade  through routine issual by the High Courts, especially the Delhi High  Court. This has led to a widespread phenomenon of powerful copyright  owning groups such as the Business Software Alliance and the Indian  Performing Right Society Limited managing to successfully assume for  themselves almost plenary powers of search and seizure as they go about  knocking on the doors of small businesses and demanding to be allowed to  audit their software. An anonymous post on the popular Indian  Intellectual Property Weblog ‘Spicy IP’ graphically conveys the  invasiveness inherent in the execution of these orders:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Ghost Post on IP (Software) Raids: Court Sponsored Extortion?&lt;/b&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#11"&gt;11&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Picture this:&lt;/i&gt;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;You are working in your office one day, when all of a sudden, a group  of people arrive unannounced brandishing a court order. The order  allows them to walk into your office and conduct an audit of all your  office computers to collect evidence of the use of unlicensed software  in your office.&lt;/p&gt;
&lt;p&gt;This group consists of a court-appointed commissioner, lawyers  representing the plaintiff, and technical persons who will carry out the  actual software audit.&lt;/p&gt;
&lt;p&gt;Knowing that to disobey the order will amount to a contempt of court, you allow the group to carry out the audit.&lt;/p&gt;
&lt;p&gt;The audit lasts several hours and continues well into the night.  Needless to say, it is physically and emotionally draining on you as  your work has come to a stand-still. Everyone around you knows there is  some court proceeding going on. You have already lost face with your  employees, and possibly even clients who have visited your office during  the audit.&lt;/p&gt;
&lt;p&gt;As you have several dozen computers purchased over a period of time,  and the audit is conducted unannounced, you may not have the time to  gather documentation and invoices demonstrating the purchase of licensed  software.&lt;/p&gt;
&lt;p&gt;While the court order allows you to back up your valuable client and  business data, the plaintiff’s lawyers don’t allow you to do so, stating  that documents/ data found on machines that contain any unlicensed  software may not be backed up.&lt;/p&gt;
&lt;p&gt;All computers found with copies of what the plaintiff’s lawyers are  calling unlicensed software are seized and sealed. You do not have the  time, presence of mind or legal representation to argue that such copies  may be backup copies allowed under the law, or that therefore several,  or all of the seized machines are not liable to be seized, or that such  copies are actually allowed under the software license.&lt;/p&gt;
&lt;p&gt;Even more importantly, your licensed servers are seized because they  are found to contain back-up copies of software, allowed under the law,  but deemed infringing by the plaintiff’s lawyers.&lt;/p&gt;
&lt;p&gt;At the end of the audit, you are informed that your computers contain  copies of unlicensed software to varying degrees. You are made to sign a  report prepared by the commissioner, along with sheets that represent  the software audit of each computer in your office.&lt;/p&gt;
&lt;p&gt;Most of your computers and servers are seized and sealed. You are  told that you cannot touch them till the court allows you to. You are  not even allowed to separate the hard drives of those machines that  contain the alleged unlicensed software, for the purpose of seizure, so  as to enable you to continue using the rest of the machine, even though  the court order clearly states that only storage media containing the  unlicensed software is to be seized.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In a 2008 case, Autodesk Inc vs. AVT Shankardass[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#12"&gt;12&lt;/a&gt;], the Delhi High Court – which happens to be the most enthusiastic issuer of Anton Piller orders[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#13"&gt;13&lt;/a&gt;] –issued  guidelines on the considerations which judges should weigh before  granting such orders in software piracy cases. Worryingly, the  guidelines stipulate that "The test of reasonable and credible  information regarding the existence of pirated software or incriminating  evidence should not be subjected to strict proof". Instead the court  prescribes that "It has to be tested on the touchstone of pragmatism and  the natural and normal course of conduct and practice in trade."&lt;/p&gt;
&lt;p&gt;The Court also included a few guidelines meant to safeguard the  defendant. These include the possibility of requiring the plaintiff to  deposit costs in the court "so that in case pirated software or  incriminating evidence is not found then the defendant can be suitably  compensated for the obtrusion in his work or privacy." Although on the  face of it, these guidelines threatened to open up the floodgates for  the granting of Anton Pillar orders, in fact, these fears seem not to  have been realized. The privacy-invasive ambitions of IP owners have  been subverted by a combination of the security requirements stipulated  in the Autodesk guidelines above, the judiciary’s own  inefficiency/inconsistency and a greater assertiveness and defiance on  the part of defendants. The following passage from the 2011 Special 301  India Country Report on Copyright Protection and Enforcement[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#14"&gt;14&lt;/a&gt;], prepared  by the IIPA, records the industry’s frustrations in obtaining Anton  Pillar orders from the courts over the past year:&lt;/p&gt;
&lt;p&gt;Unfortunately, in 2010, such enforcement efforts have become much  less effective due to judges imposing conditions on such orders.&lt;/p&gt;
&lt;p&gt;With periodic changes to the roster of judges on the Original Side  Jurisdiction of the Delhi High Court (which is done as a matter of  routine and procedure where the roster changes every 6 months), BSA  reports: 1) the imposition of security costs on Plaintiffs; 2) the grant  of local commission orders without orders to seize and seal computer  systems containing pirated/unlicensed software; 3) granting the right to  Defendants to obtain back up copies of their proprietary data while at  the same time ensuring that the evidence of infringement is preserved in  electronic form; 4) assigning a low number of technical experts for  large inspections, making carrying out orders more time-consuming and  raising court commissioners’ fees; and 5) ineffective implementation and  lack of deterrence from contempt proceedings against defendants who  disrupt or defy Anton Pillar orders.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#15"&gt;15&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;Notwithstanding this temporary setback, Anton Piller orders and John  Doe orders remain powerful weapons in the arsenal of large copyright  owners who continue to use it in ways that are extremely intrusive.  These orders exemplify an instance of how courts rarely reflect on the  privacy implications of the orders that they themselves issue –similar  action undertaken by the executive would have most likely invited the  court’s consideration on whether they violate privacy.&lt;/p&gt;
&lt;p&gt;In the next section we move on to private ‘technological’ measures of  enforcing copyright which are likely to receive statutory sanction.&lt;/p&gt;
&lt;h3&gt;Technological Measures&lt;/h3&gt;
&lt;p&gt;In the light of the industry’s perception of a weakening of its  enforcement options due to the judiciary’s waning enthusiasm, it remains  to be seen what new manoeuvres they would make to strengthen  enforcement.  One foreseeable arena of conflict would be the new  measures proposed to be included in the Copyright Act that criminalise  the circumvention of ‘technological protection measures’ (TPMs) built  into software by manufacturers. The proposed new Section 65A  criminalises the circumvention of “an effective technological measure  applied for the purpose of protecting any of the rights conferred by  this Act," "with the intention of infringing such rights”. This is  punishable with imprisonment up to two years and a fine. However the  section also creates a vast list of exceptions including research,  testing, national security etc which make it a comparatively soft tool  in the hands of prosecutors. Among the list of exceptions is a clause  that enables the circumvention of TPMs in order to facilitate purposes  that are 'not expressly prohibited' – including, conceivably, to  exercise fair dealing rights under Section 52. Although this is a  welcome provision, it requires, as a condition of its exercise, that the  person ‘facilitating the circumvention’ maintain a record of the  persons for whose benefit this has been done. This has led to  apprehensions of violations of privacy especially from disability rights  groups, who would potentially be the biggest users of this section as  it would enable them to make electronic content more widely accessible.  However, the lawful exercise of this right would mean that each instance  of use of electronic content – say an e-book – by a disabled person  would be recorded, which could deter them from accessing content. It  would also clearly amount to a violation of their privacy compared to  other analog users who are not required to similarly maintain logs each  time they share books, for instance.&lt;/p&gt;
&lt;p&gt;On the whole, despite the effect these measures have of diminishing  absolute control over our electronic resources, the fact that the IIPA -  which has been one the most rapid ‘defenders’ of IP - has consistently  complained about their inadequacy in its Special 301 Reports[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#16"&gt;16&lt;/a&gt;] gives us some cause for optimism that the privacy invasions it could occasion would not be too severe.&lt;/p&gt;
&lt;p&gt;Meanwhile, in a first of its kind, in 2005 the High Court of Andhra  Pradesh permitted the prosecution, under the Copyright Act, of persons  accused of having circumvented technological protection measures in  mobile devices.&lt;/p&gt;
&lt;p&gt;In Syed Asifuddin and Ors. v The State of Andhra Pradesh [&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#17"&gt;17&lt;/a&gt;] the  accused had altered the software on the mobile handsets provided by one  service provider (Reliance), so that the same handset could be used to  access the network of a rival provider (Tata Indicom). The Court  observed that "if a person alters computer programme of another person  or another computer company, the same would be infringement of the  copyright."  The matter was then relegated to the trial court to receive  evidence on whether in fact such alteration had occurred.&lt;/p&gt;
&lt;p&gt;This ruling, if correct, effectively negates the need for any  amendment to the law since circumvention of technological measures  typically involves an unauthorized alteration of copyrighted code. Of  course it would always be open to the defendant to assert his fair  dealing rights in defence, but that issue was not deliberated upon by  the High Court in this instance.&lt;/p&gt;
&lt;h3&gt;Portents&lt;/h3&gt;
&lt;p&gt;With the terrain of copyright infringement increasingly shifting from  ‘street piracy’ to online piracy, it remains to be seen how innovations  in copyright enforcement impact privacy. Three events are particularly  interesting in this context.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In August 2007, a techie from Bangalore was arrested on charges  of having posted incendiary images of a popular folk hero on a website.  He had been traced based on the IP Address details provided by a leading  ISP. It later turned out that the IP address information was incorrect.  By the time the error was noticed, he had already been held in jail  illegally for a period of 50 days.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#19"&gt;19&lt;/a&gt;] Shocking  as this incident is, it offers a portent of the gravity of the possible  privacy abuses that we are likely to witness in the years to come as  copyright owners begin to hunt down infringers on the Internet.&lt;/li&gt;
&lt;li&gt;In  2006, the Delhi High Court the pioneer among the Indian Judiciary in  issuing John Doe orders added another feather to its cap by permitting  the filing of a suit against an IP address. In a case of defamation by  email from an unknown sender, a company was able to successfully file a  suit against the IP address and obtain an order against the ISP to track  down the user who was later impleaded as a party to the suit. This case  and the growing number of John Doe orders issued, indicates that the  judiciary in India has been quite willing to partner with litigants in  their fishing expeditions. While it cannot be gainsaid that this has  aided the legitimate interests of litigants, this has come at the price  of a callous disregard for the interests of consumer privacy in India,  which, as the incident described above highlights, could easily descend  into a full blown human rights violation. &lt;/li&gt;
&lt;li&gt;With the arrest in  November 2010 of a four-member gang from Hyderabad for uploading media  content – including popular film titles - on Bittorrent, the popular  online file sharing tool, the industry has signalled its capacity and  willingness to take the battle over copyright to the Internet.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#20"&gt;20&lt;/a&gt;] New  rules notified under the Information Technology Act make it mandatory  for 'intermediaries' (ISPs) to co-operate in locating and removing  ‘infringing content’ that is stored or transmitted by them.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#21"&gt;21&lt;/a&gt;]  This will facilitate untrammelled access to users by copyright industries. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Although it is too early to predict the future for the Internet that  these developments will result in, they are definitely a source of  apprehension from the perspective of privacy.&lt;/p&gt;
&lt;h2&gt;Copyright and Confidential Information&lt;/h2&gt;
&lt;p&gt;Although the protection of 'confidential information' and 'copyright' occupy distinct realms in the law[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#22"&gt;22&lt;/a&gt;],  they converge occasionally, and copyright has been used as an  instrument by people and organisations to protect their confidential  information. In fact it has become quite routine for written pleadings  by plaintiffs in cases to assert the omnibus infringement of their  ‘copyrights, confidential information, trade secrets, trademarks designs  etc’ without specifying which of the claims is urged. For instance  in Mr. M. Sivasamy v M/S. Vestergaard Frandsen[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#23"&gt;23&lt;/a&gt;] a  case before the Delhi High Court, the plaintiffs claimed  that. "Defendants are violating the trade secrets, confidential  information and copyrights of the plaintiffs.”; Similarly in Dietrich  Engineering Consultant v Schist India &amp;amp; Ors , before the Bombay High  Court, the plaintiffs contended"..the suit is filed to prevent   unauthorized and illegal use of the plaintiffs  confidential  information and infringement of the 1st  plaintiffs Copyright".[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#24"&gt;24&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;In one of the earliest cases of this kind, Zee Telefilms Ltd. v  Sundial Communications Pvt. Ltd, the Bombay High Court delivered a  ruling in favour of the plaintiffs on both grounds of copyright  infringement and confidential information. Here the employees of the  plaintiffs – a company engaged in the business of producing television  serials - had developed the concept for a program which they had  registered with the Film Writers Association. Subsequently, they made a  confidential pitch of the concept to the representatives of the  defendants, a well known TV channel. Although initially the defendants  appeared reluctant to take the concept forward, they proceeded later on,  without the authorization of the plaintiffs, to produce a TV serial  that closely mirrored the ideas contained in the show conceived by the  plaintiff. In an action seeking to restrain the defendants from  proceeding with their production, the High Court agreed with  the plaintiff’s claims both on the count of copyright infringement and  confidentiality. Curiously, the determination of both issues turned on  the similarities between the plaintiff’s and defendant’s concepts –  which is traditionally a determination relevant only to copyright cases.  On the issue of confidentiality, the court held "Keeping in view  numerous striking similarities in two works and in the light of the  material produced on record, it is impossible to accept that the  similarities in two works were mere coincidence...the plaintiffs'  business prospect and their goodwill would seriously suffer if the  confidential information of this kind was allowed to be used against  them in competition with them by the defendants."&lt;/p&gt;
&lt;p&gt;Although a clear line is demarcated between the claims of  confidentiality and copyright in this case, this distinction is less  sharp in other cases of the same nature.&lt;/p&gt;
&lt;p&gt;In a more recent case &lt;i&gt;Diljeet Titus, Advocate v Mr. Alfred A. Adebare &amp;amp; Ors&lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#25"&gt;25&lt;/a&gt;] four  associates of the plaintiff’s law firm quit together to start their own  practice. While leaving they took documents they had drafted including  agreements, due diligence reports and a list of clients along with them.  The plaintiff filed a suit for injunction, asserting both that this  material was confidential and that he owned the copyrights over them.  The Delhi High Court agreed and issued an injunction restraining the  defendants from “utilizing the material of the plaintiff forming subject  matter of the suit and from disseminating or otherwise exploiting the  same including the data for their own benefit.” What is interesting in  this case is the conflation of confidentiality and copyright – both in  the allegations of the plaintiff and the rebuttals of the defendant who  sought to resist claims of confidentialty on grounds that they had  themselves authored the papers in question.&lt;/p&gt;
&lt;p&gt;Curiously, where copyright and confidentiality claims coincide, it  would appear that the parameters of determining copyright infringement  end up determining the issue of confidentiality as well.&lt;/p&gt;
&lt;p&gt;In the next section we move on to the last copyright/privacy issue  that we had flagged in the introduction – the invocation of copyright in  aid of the ‘right to publicity’ of individuals which can be read as a  kind of privacy claim.&lt;/p&gt;
&lt;h2&gt;Copyright and Publicity&lt;/h2&gt;
&lt;p&gt;Do we have a copyright over our identities – our names, our  appearances, our life histories, our reputation and our bodies - so that  we have an actionable interest in preventing their deployment in public  without our express authorization?&lt;/p&gt;
&lt;p&gt;This question has arisen in a limited set of cases in India that  raise interesting questions. As with the confidentiality cases discussed  above, the lines separating ‘defamation’ actions from ‘copyright’  claims is not brightly drawn in these cases.  Neither is the line  linking copyright to the protection of privacy clearly evident. All one  can say with confidence is that copyright and privacy are two words  tossed into the plaints by the plaintiffs while asserting their claims.&lt;/p&gt;
&lt;p&gt;In one of the most high-profile cases of its kind, Phoolan Devi v Shekhar Kapoor[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#26"&gt;26&lt;/a&gt;] the  Delhi High Court was faced with the question of whether ‘public  figures’ are entitled to any degree of control over the representation  of their lives. Here the petitioner, Phoolan Devi, a reformed bandit,  had 'licensed'[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#27"&gt;27&lt;/a&gt;] the  production of a biopic on her life to the defendant, a film director of  note, who was to consult the plaintiff’s own writings and those of her  authorised biographer in making the film. However, the defendant – the  director of the biopic – had exceeded this mandate and also depicted  incidents that emerged from various newspaper accounts – including a  graphic gang rape scene where the plaintiff was the victim, and a  massacre which she had allegedly orchestrated. Although generally  well-known, neither of these incidents were either admitted to by the  plaintiff herself or mentioned in the plaintiff’s own writings and those  of her biographer. Even worse, the film had not been shown to her even  several months after it had been released to national and international  audiences.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#28"&gt;28&lt;/a&gt;] In  Arundhati Roy’s moving words the producers of the film “[R]e-invent her  life. Her loves. Her rapes. They implicate her in the murder of  twenty-two men that she denies having committed. Then they try to  slither out of showing her the film!”[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#29"&gt;29&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;One of the contentions that the petitioner’s advocate had advanced  was that the defendant had no right “to mutilate or distort the facts as  based upon prison diaries” and that any such distortion would fall  afoul of her right under Sec 57 of the Indian Copyright Act. This  section confers certain ‘special rights’ on the author including the  right to claim authorship and to restrain any distortion/mutilation or  modification of the work that would be prejudicial to his/her honour or  reputation.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#30"&gt;30&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;These rights survive any assignment of the copyright made by the  author i.e. they can e asserted by the author above any contract entered  into by her with third parties such as the producer in this case. The  Court framed the question it was faced with in these terms:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;[T]he question before me is whether such person like the plaintiff  has no right to defend when someone enlarges the terrible facts, enters  the realm of her private life, depicts in graphic details rape, sexual  intercourse, exhibits nudity, portrays the living person which brings  shame, humiliation and memories of events which haunts and will go on  haunting the plaintiff, more so the person is still living. Whether the  plaintiff has no right and her life can become an excuse for film makers  and audience to participate in an exercise of legitimate violence with  putting all inhibitions aside.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Ultimately, the High Court sided with the petitioner and issued an  injunction restraining the defendant from exhibiting his film.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#31"&gt;31&lt;/a&gt;] This  decision was based more on a consideration of constitutional right to  privacy principles than an evaluation of the plaintiff’s case under  Copyright law. However, it does provide an interesting factual matrix  for the exploration of the way in which protection of copyright and  privacy might overlap.&lt;/p&gt;
&lt;p&gt;In a contrasting case before the Bombay High Court, &lt;i&gt;Manisha Koirala v Shashilal Nair &amp;amp; Ors &lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#32"&gt;32&lt;/a&gt;] an  injunction was sought against the release of a film in which the  petitioner, a noted actress, was depicted in the nude through the device  of a ‘body double’. Here the plot was entirely fictional and the  plaintiff, a noted actress, had agreed to perform in the film with  ‘substituted shots’ during the scenes in the story that involved nudity.  Subsequently, she appears to have reconsidered this decision and  objected to the very inclusion of these scenes in its final version. In  her petition before the court, she alleged defamation and malicious  injurious falsehood, arguing that the exhibition of the film would  result in a violation her right to privacy "as the objectionable shots,  attempt to expose the body of a female which is suggested to be that of  the plaintiff". She contended that “the right to portray her on screen  can only be exercised in a manner, which is subject to the fundamental  principle that such portrayal can only be with her unconditional  consent." "The present rendition" of her part in the film, she alleged  was “an invasion of privacy as it is embarrassing and will cause  irreparable damage to her reputation which remains untarnished thereby  causing irreparable loss and injury”. Although Copyright is not invoked  in this case by the petitioner, there is an audible echo of some of the  reputational anxieties that had animated Phoolan Devi’s case mentioned  above. The difference, however, is that in this case the petitioner’s  claim was not grounded in a quest for control over her biography, but  over the image of her body. Unlike the previous case, here the Court was  unsympathetic to the petitioner’s claims. The court treated her  previous ‘consents’ as determinative of all issues and dismissed her  case holding:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The Court ...cannot be a moral guardian in this context. ..It is..  clear to my mind that once having agreed to act in the film it will be  too late for the plaintiff .. to hold that a case of defamation has been  made out.. To maintain a case of malicious falsehood it must be held  out that the statement was false. In the instant case what is sought to  be contended is that the scenes involving the film artist would result  in an action of malicious injurious falsehood or malicious falsehood by  associating the plaintiff's with the scenes which she had not enacted..  The plaintiff was prima facie aware as earlier held and that the scenes  formed part of the story board have been enacted by a double and  consequently it cannot be said that in the present case the plaintiff  has been able to establish a case of malicious falsehood."[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#33"&gt;33&lt;/a&gt;]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;One of the facts that was relevant in the court’s decision was that  the defendant, as the ‘holder of the copyright in the film’, had  incurred vast expenditure in publicising its release. Here, in a  reversal of the Phoolan Devi case, copyright is held up as a shield  against a competing privacy claim. The issue of the extent of overlap  between copyright and privacy however remains unsettled in law. In April  2007, the Madras High Court granted a temporary injunction against the  publishers of an unauthorised biography of former Tamil Nadu Chief  Minister Jayalalitha. In her petition she alleged that the biography  “had been written without any verification of facts. Such a publication  would spoil her image and damage her status in politics and public  life.” Her petition contended that “No one has a right to publish  anything concerning personal private matters without consent, whether  truthful or otherwise, whether laudatory or critical.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#34"&gt;34&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;Although it does not reference Copyright law, this case is another  illustration of the enduring relevance of the question of whether we are  entitled to the exclusive authorship of our private life-stories.&lt;/p&gt;
&lt;h2&gt;The Private under the Copyright Act&lt;/h2&gt;
&lt;p&gt;In its various sections, the Copyright Act inscribes certain spaces  and actions as either public or private. Specified activities are  labelled public even though they are conducted within the domestic  confines of one’s home. Similarly, activities that infringe copyright  are nevertheless immunised from prosecution due to the fact that they  are conducted for a ‘private’ purpose. In this concluding section of  this paper, we try to piece together a narrative of privacy and the  private domain that emerges from a combined reading of various sections  and decisions under the Copyright Act.&lt;/p&gt;
&lt;p&gt;We begin, here, by collating the Copyright Act’s various  articulations of the ‘public’ and ‘private’. By treating them as  intertwining, &lt;i&gt;mutually constitutive&lt;/i&gt; terms, we proceed to analyse  these various articulations in the Copyright Act with a view to seeing  what account of the private realm may emerge.&lt;/p&gt;
&lt;h3&gt;Public/Publish&lt;/h3&gt;
&lt;p&gt;One of the key rights that most owners of copyrights enjoy is the  exclusive right to "publish" or "communicate their work to the public".&lt;/p&gt;
&lt;p&gt;The Act defines "publication" to mean “making a work available to the  public by issue of copies or by communicating the work to the public”.  Significantly, in case of dispute, if the issue of copies or  communication to the public is “of an insignificant nature” it is deemed  not to constitute a publication [Section 6]. This signals that the  notions of publicity and publication under the Copyright Act are in some  senses moored to the magnitude of the receiving public. The ‘private’  then is constituted, reciprocally, as the ‘insignificant public’.&lt;/p&gt;
&lt;p&gt;Under the Indian Copyright Act, "communication to the public" occurs  when a person makes any work “available for being seen or heard or  otherwise enjoyed by the public directly or by any means of display or  diffusion other than by issuing copies of such work”. Such communication  occurs “regardless of whether any member of the public actually sees,  hears or otherwise enjoys the work so made available.”[Section 2(ff)][&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#35"&gt;35&lt;/a&gt;]&lt;/p&gt;
&lt;h3&gt;Private&lt;/h3&gt;
&lt;div&gt;The word ‘private’ is expressly referenced in four provisions of the Copyright Act.&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Section 39 declares that “the making of any sound recording or  visual recording for the private use of the person making such  recording, or solely for purposes of bona fide teaching or research”  would not violate the broadcast reproduction right or performer's right;&lt;/li&gt;
&lt;li&gt;Section  51 which stipulates when copyrights are infringed declares that the  “imports into India, any infringing copies of the work” would constitute  an infringement except if it is only a single copy of any work that is  imported “for the private and domestic use of the importer”.&lt;/li&gt;
&lt;li&gt;Section 52(1) of the Copyright Act lists certain acts as not infringing of copyright. These include:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;(a) a fair dealing with a literary, dramatic, musical or  artistic work, not being a computer programme, for the purposes of  private use, including research. A proposed amendment to this section  seeks to extend this protection to all ‘personal’ uses in addition to  ‘private uses including research[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#36"&gt;36&lt;/a&gt;]. ‘Personal use’ has been interpreted in non-copyright contexts to include the family members of the person living with him.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#37"&gt;37&lt;/a&gt;] The  definition of ‘person’ under the General Clauses Act includes a  “company or association or body of individuals, whether incorporated or  not”. Although the case law on the point is scant[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#38"&gt;38&lt;/a&gt;], it  would be interesting to see if ‘personal use’ can be read to include  the use by companies internally, thereby casting a shroud of privacy on  corporations for the purpose of copyright.&lt;/li&gt;
&lt;li&gt;(p) the reproduction,  for the purpose of research or private study or with a view to  publication, of an unpublished literary, dramatic or musical work kept  in a library, museum or other institution to which the public has  access.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;In addition to the provisions listed above, Section 52 the Act also  shields certain spaces and occasions as immune from the charge of  copyright infringement (although they are not specially designated as  ‘private’). These include educational institutions[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#39"&gt;39&lt;/a&gt;], non-profit clubs, societies[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#40"&gt;40&lt;/a&gt;], religious institutions[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#41"&gt;41&lt;/a&gt;] and religious ceremonies including marriages.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#42"&gt;42&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;Perhaps the most elaborate calibration of the boundaries between the  'private' and 'public' under the Indian Ccopyright Act by the judiciary  occurs in the case &lt;i&gt;Garware Plastics and Polyester vs Telelink &amp;amp; Ors&lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#43"&gt;43&lt;/a&gt;].,  decided by the Bombay High Court in 1989. The case called for the  determination of whether films transmitted via neighbourhood cable  networks and viewed in the privacy of customers’ homes would constitute  an unauthorised ‘communication to the public’ under the Copyright Act.  Here the defendants had purchased video tapes of popular films and begun  transmitting them over cable networks owned by them. For this they  charged a monthly maintenance fee from their customers. Under the  Copyright Act then in force, ‘communication to the public’ was defined  simply as "communication to the public in whatever manner, including  communication through satellite.” After an extensive review of English  law on the subject, the court ruled that this did constitute an  unauthorised communication to the public:&lt;/p&gt;
&lt;p&gt;"Whether a communication is to the public or whether it is a private  communication depends essentially on the persons receiving the  communication. If they can be characterized as the public or a protein  of the public , the communication is to the public…From the authorities  the principal criteria which emerge for determining the issue are(1) the  character of audience and whether it can be described as a private or  domestic audience consisting of family members or members of the  household, (2) whether the audience in relation to the owner of the  copyright can be so considered…Applying the test of the character of the  audience watching these video films , can this audience be called a  Section of the public or is this audience a private or domestic audience  of the defendants ? In the present case &lt;i&gt;it cannot be said that the  audience which watches video films shown by the defendants consists of  family members and guests of the defendants. The video film may be  watched by a large Section of the public in the privacy of their  homes. But this does not make it a private communication so as to take  it our of the definition of "broadcast" under the Copyright Act, 1957&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;It is true that the network operates through the connection of a  cable to all these various apartments or houses. But this cannot in any  way affect the character of the audience. The viewers are not members of  one family or their guests. They do not have even the homogeneity of  club members of one family or their guests. They do not have even the  homogeneity of a club membership.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#44"&gt;44&lt;/a&gt;] (emphasis added)&lt;/p&gt;
&lt;p&gt;A central feature emerging from this case that distinguishes public  form private in Copyright law is homogeneity or affiliation: that space  is marked ‘private’ where a pre-affiliated group – united either by  kinship or association in pursuit of a common goal – comes together in  pursuit of a non-commercial common interest. Conversely, ‘Public’ is  where the unaffiliated congregate. On the face, this accords with the  spirit of the various fair dealing rights under the Copyright Act which  carve out immunised spaces for institutions that correspond to these  definitions – educational institutions, religious institutions and  ceremonies, amateur clubs etc are immune from infringement actions  because, one could say, their activities are ‘private’.&lt;/p&gt;
&lt;p&gt;In 1994 the Copyright Act was amended to fortify this conclusion by  expanding the definition of ‘communication to the public’ to include  ‘communication through satellite or cable or any other means of  simultaneous communication to more than one household or place of  residence including residential rooms of any hotel or hostel shall be  deemed to be communication to the public;” (Sec 2(ff), Explanation)&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;I would like to conclude this paper with some reflections on the  assertion I made in the introduction about copyright law being both an  instrument for the protection and violation of privacy. From the  discussion in the previous sections, it follows:&lt;/p&gt;
&lt;p&gt;Firstly, that 'property' – as embodied by copyright law – is, at  best, an unreliable guarantor of privacy. It works when bussed along  with dignity claims– for instance the Phoolan Devi case where the  petitioner’s suffering underlay her property claim– but fails when  asserted as ‘property’ per se (as in Manisha Koirala’s case[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#45"&gt;45&lt;/a&gt;]).  One does not (under the Indian Copyright Act, at least) have a reliable  ‘property’ interest in one’s life story, bodily representation, name  etc. This stands in contrast with other regimes such as the US where  several states have enacted ‘Right to publicity’ statutes or have  recognised publicity rights through common law processes.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#46"&gt;46&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;These rights can be read to offer people a 'property' means for  protecting their privacy (by preventing unauthorised publicity) in those  jurisdictions. Analogous claims are unavailable in India.&lt;/p&gt;
&lt;p&gt;Secondly, that ‘property’ operates frequently as a license for the  violation of privacy with impunity.  This emerges most clearly from the  cases of copyright investigation that we examined in Section 1.2 above.  Pecuniary copyright interests appear to completely overwhelm any regard  for competing privacy concerns.&lt;/p&gt;
&lt;p&gt;Thirdly, that, notwithstanding the preceding two points, the  copyright act does protect privacy in limited ways. Chiefly these are a)  By conferring limited copyright on 'unpublished works', it enables  authors to restrict their publication except on terms acceptable to  them. b) The Act grants a very wide “Performer’s right” to performers  and no sound or visal recording may be made of them without their  express consent. No such recording can broadcast or communicated to the  public without their consent. This gives a very powerful weapon of  control in the hands of performers to restrict the extent to which  representations of them are publicised. C) As mentioned above in the  penultimate section of this paper, various fair dealing exceptions carve  out spaces of privacy where infringing acts are granted immunity – for  instance private uses, uses in educational institutions and libraries,  etc.&lt;/p&gt;
&lt;p&gt;Lastly, with the arena of copyright infringement shifting gradually  to the internet, it is foreseeable that the IT Act will be employed with  greater frequency in the coming years to do the work of copyright  enforcement. The legal regime already supports this change through  provisions in the IT Act which preserve all existing rights available  under the Copyright Act [Section 81 (proviso) of the IT Act] and put new  powers of take-down [see Intermediary Guidelines] in the hands of  Copyright Owners. Thus on the one hand, copyright owners would be able  to lawfully hack into potential infringers’ computers while enjoying  immunity under the IT Act. On the other hand, ‘intermediaries’ would be  legally bound to co-operate in copyright enforcement including,  conceivably, handing over a number of personal details of those accused  of copyright infringement. In other jurisdictions, such as the EU, such  ‘co-operation’ is heavily policed by judicial oversight where personally  identifiable information is involved[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#47"&gt;47&lt;/a&gt;]. Contrastingly,  in India, with its diminished concerns for privacy and limited  awareness of how IP address data can seriously imperil privacy, there is  a very real threat that these provision will license the wholesale  violation of online privacy.&lt;/p&gt;
&lt;pre&gt;Notes&lt;/pre&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;[1]Anon, 2005. Towards Knowledge  Societies, Paris: UNESCO. Available at:  http://unesdoc.unesco.org/images/0014/001418/141843e.pdf [Accessed April  20, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;[2]Sundaram says "Temporal acceleration  was a significant part of the imaginary of developmentalism - this was  inherent in the logic of 'catching up' with the core areas of the world  economy by privileging a certain strategy of growth that actively  delegitimized local and 'traditional' practices."&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;[3]This aspiration underlies several of  the policy documents prepared in India in the last decade –  Illustratively, the report submitted by the National Task Force on  Information Technology (NTFIT) in 1998 captures this sentiment well:  “For India, the rise of Information Technology is an opportunity to  overcome historical disabilities and once again become the master of  one's own national destiny. IT is a tool that will enable India to  achieve the goal of becoming a strong, prosperous and self-confident  nation. In doing so, IT promises to compress the time it would otherwise  take for India to advance rapidly in the march of development and  occupy a position of honor and pride in the comity of nations” Tiwari,  Ghanshyam et al. Government of India. Central Advisory Board of  Education, Ministry of Human Resource Development .Report of the Central  Advisory Board of Education Committee On Universalisation of Secondary  Education. New Delhi: 2005&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;[4]There is some ambiguity on whether  offences under the Copyright Act punishable with imprisonment “which may  extend to three years” are 'cognizable' or not. The Code of Criminal  Procedure 1973 classifies all offences which prescribe a penalty of  three years and above as cognizable and non bailable [First Schedule].  Offences which are punishable with imprisonment of less than three years  are classified as ‘non-cognizable’ and ‘bailable’. In the absence of a  definitive ruling from the Supreme Court on this issue, different High  Courts have offered conflicting interpretations. See Singh, S. &amp;amp;  Aprajita, 2008. Insight into the nature of offence of Copyright  Infringement. Journal of Intellectual Property Rights, 13(6),  pp.583-589. Available at:  http://nopr.niscair.res.in/bitstream/123456789/2433/1/JIPR%2013%286%29%20583-589.pdf  [Accessed May 12, 2011]. See also Agarwal, D.K., 2010. Arrest under the  customs act ? Bailable or non-bailable offence. Translation  Interpreting Services. Available at:  http://translation-tech.com/blog/213/arrest-under-the-customs-act-bailable-or-non-bailable-offence/  [Accessed May 12, 2011]. The determination of this issue would have  wide ranging implications since the police have a wider assortment of  powers with respect to interrogation, arrest, search and seizure in the  course of investigating cognizable offences than they have with respect  to non-cognizable offences. &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="5"&gt;[5]"Where Director of Inspection or  Commissioner in consequence of information in his possession, has reason  to believe that any person having in possession of any money, etc.."  has not disclosed it for purposes of Income Tax.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="6"&gt;[6]AIR 1997 Raj 78 &amp;lt; http://indiankanoon.org/doc/661363/&amp;gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="7"&gt;[7]Event and Entertainment Management  Association  v. Union of India (Delhi HC) Order dated 2nd May 2011  &amp;lt;http://courtnic.nic.in/dhcorder/dhcqrydisp_o.asp?pn=84697&amp;amp;yr=2011&amp;gt;.  Harkauli, S., 2011. HC nullifies police circular on copyright issue.  The Pioneer. Available at:  http://www.dailypioneer.com/336974/HC-nullifies-police-circular-on-copyright-issue.html  [Accessed May 9, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="8"&gt;[8]Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="9"&gt;[9]As recently as April 2011, the Delhi  high court restrained “cable operators nationwide from telecasting  matches of the Indian Premier League (IPL) without authorization from  MSM Satellite (Singapore) Pte Ltd, which owns the broadcasting rights.  See Bailay, R., 2011. Cable operators can’t telecast IPL without  authorization, says HC. Livemint. Available at:  http://www.livemint.com/articles/2011/04/27212449/Cable-operators-can8217t-te.html?atype=tp  [Accessed May 13, 2011]. For an early history of John Doe orders in  India, see Krishnamurthy, N. &amp;amp; Anand, P., 2003. India Trade marks in  a state of change. Managing Intellectual Property. Available at:  http://www.managingip.com/Article/1321770/India-Trade-marks-in-a-state-of-change.html  [Accessed May 13, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="10"&gt;[10]These orders are granted by the  Court supposedly under Section 75 read with Order 26 of the Code of  Civil Procedure which empowers the court to appoint “Local  Commissioners” to record evidence in special cases. I have stated my  opinions elsewhere on why I believe these powers may not be invoked for  the purpose of effecting routine searches and seizures in the manner as  is currently being practiced by the higher judiciary – especially the  Delhi High Court. See Iyengar, P., 2009. BSA’s response on Spicy IP – in  perspective. Original Fakes. Available at:  http://originalfakes.wordpress.com/2009/04/04/bsas-response-on-spicy-ip-in-perspective/  [Accessed May 10, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="11"&gt;[11]Anon, 2009. Ghost Post on IP  (Software) Raids: Court Sponsored Extortion? SPICY IP. Available at:  http://spicyipindia.blogspot.com/2009/03/ghost-post-on-ip-software-raids-court.html  [Accessed May 10, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="12"&gt;[12]Autodesk Inc Vs. AVT Shankardass,  Available at:  http://delhicourts.nic.in/Jul08/Autodesk%20Inc%20Vs.%20AVT%20Shankardass.pdf  [Accessed May 10, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="13"&gt;[13]The 2011 Special 301 Country Report  on India prepared by the IIPA specifically cites the Delhi High Court  in this context, statng “The industry enjoys a very high success rate  with respect to the grant of such orders at the Delhi High Court”.  According to this report, the Business Software Alliance was able to  obtain 34 such orders in 2009.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="14"&gt;[14]Anon, 2011. Special 301 Report on  Copyright Protection and Enforcement: 2011 India Country Report,  International Intellectual Property Alliance. Available at:  http://www.iipa.com/rbc/2011/2011SPEC301INDIA.pdf [Accessed May 9,  2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="15"&gt;[15]Ibid at. Pp 41-42.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="16"&gt;[16]The 2010 Special 301 Country Report  lists the following defects of the proposed Section 65A: “(a) does not  cover access controls and is limited only to TPMs protecting the  exercise of exclusive rights; (b) covers only the “act” of circumvention  and does not also cover manufacturing, trafficking in, or distributing  circumvention devices or services; (c) does not define an “effective  technological measure”; (d) contains an exception which would appear to  permit circumvention for any purpose that would not amount to  infringement under the act (thereby almost completely eviscerating any  protection); (e) creates other overbroad exceptions; and (f) provides  for only criminal and not civil remedies."&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="17"&gt;[17]Syed Asifuddin And Ors. v The State Of Andhra Pradesh, 2005 CriLJ 4314 (Andhra Pradesh HC ).&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="18"&gt;[18]Ibid.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="19"&gt;[19]Holla, A., 2009. Wronged, techie  gets justice 2 yrs after being jailed. Mumbai Mirror. Available at:  http://www.mumbaimirror.com/index.aspx?page=article&amp;amp;sectid=2&amp;amp;contentid=200906252009062503144578681037483  [Accessed March 23, 2011]. See also Nanjappa, V., 2008. “I have lost  everything.” Rediff.com News. Available at:  http://www.rediff.com/news/2008/jan/21inter.htm [Accessed March 23,  2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="20"&gt;[20]Pahwa, N., 2010. Hyderabad Police  Arrests Torrent Uploaders - MediaNama. MediaNama. Available at:  http://www.medianama.com/2010/11/223-hyderabad-police-arrests-torrent-uploaders/  [Accessed May 12, 2011]. &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="21"&gt;[21]GSR 314(E) Dated 11 April 2011:  Information Technology (Intermediaries guidelines) Rules, 2011  http://www.mit.gov.in/sites/upload_files/dit/files/GSR314E_10511(1).pdf  [Accessed May 12, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="22"&gt;[22]See Zee Telefilms Ltd. v Sundial Communications Pvt. Ltd., 2003 (5) BomCR 404 (Bombay High Court 2003).&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="23"&gt;[23]Mr. M. Sivasamy v M/S. Vestergaard Frandsen (Delhi High court 2009).&amp;lt; http://indiankanoon.org/doc/916718/&amp;gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="24"&gt;[24]Dietrich Engineering Consultant v  Schist India &amp;amp; Ors (Bombay High Court, 2009) &amp;lt;  http://indiankanoon.org/doc/1634545/&amp;gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="25"&gt;[25]Mr. Diljeet Titus, Advocate vs Mr. Alfred A. Adebare And Ors, 130 DLT 330 (Delhi High Court 2006).&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="26"&gt;[26]Phoolan Devi v Shekhar Kapoor And  Ors. (1994). DLT (Vol. 57 (1995), p. 154). Retrieved from  http://indiankanoon.org/doc/793946/&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="27"&gt;[27]The conditions under which this  license were obtained speak eloquently to the ills of the current  copyright system. According to Phoolan Devi’s lawyer, the noted advocate  Indira Jaisingh, the contract was signed by Phoolan Devi while she was  behind prison bars. She did not speak or understand Hindi or English and  only spoke in a local dialect. The copyright contract was written  entirely in English and gave her a paltry sum or Rs. 2 lakh – which was a  pittance considering the budget and projected returns from the film.  Jaisingh, I., 2001. Supreme Court lawyer Indira Jaisingh pays tribute to  Phoolan Devi. Available at:  http://www.rediff.com/news/2001/jul/26spec.htm [Accessed June 10, 2011].  Arundhati Roy’s two superb critiques of the film and its director  movingly capture why this is not a simple case of copyright assignment.  See Roy, A., 1994. The Great Indian Rape Trick - I. Sawnet. Available  at: http://www.sawnet.org/books/writing/roy_bq1.html [Accessed June 10,  2011].; Roy, A., 1994. The Great Indian Rape Trick - II. Sawnet.  Available at: http://www.sawnet.org/books/writing/roy_bq2.html [Accessed  June 10, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="28"&gt;[28]Ibid, Roy, A., 1994. The Great Indian Rape Trick - I. &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="29"&gt;[29]Ibid, Roy, A., 1994. The Great Indian Rape Trick - II&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="30"&gt;[30]Section 57 of the Act reads  “Author’s Special Rights: ‘Independently of the author's copyright and  even after the assignment either wholly or partially of the said  copyright, the author of a work shall have the right-&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;(a) to claim authorship of the work; and&lt;br /&gt;&lt;span class="Apple-style-span"&gt;(b)  to restrain or claim damages in respect of any distortion, mutilation,  modification or other act in relation to the said work which is done  before the expiration of the term of copyright if such distortion,  mutilation, modification or other act would be prejudicial to his honour  or reputation:”&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;a name="31"&gt;[31]The case was later  settled out of court with Phoolan Devi being able to secure a  substantially higher compensation. Ultimately, the case was not about  the depiction of rape generally, but primarily about Phoolan Devi’s  sovereign right to decide the terms on which her own life would be  represented.&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="32"&gt;[32]Manisha Koirala v Shashilal Nair  &amp;amp; Ors. (2002). BomCR (Vol. 2003 (2), p. 136). Retrieved from  http://indiankanoon.org/doc/1913646/&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="33"&gt;[33]Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="34"&gt;[34]Anon, 2011. High Court Grants  Injunction Till June 7 Against Publishing Book on Jayalalithaa. The  Hindu, p.01. Available at:  http://www.hindu.com/2011/04/27/stories/2011042762360100.htm [Accessed  May 12, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="35"&gt;[35]For a more dispersed account on the  concept of the ‘public’ under Indian law, See Iyengar, P, ‘Where the  private and the public collide’, iCommons Lab Report, September- October  2007, pp. 7-8, Icommons.org, &amp;lt;  http://archive.icommons.org/articles/what-is-public&amp;gt; last visited May  2011&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="36"&gt;[36]Copyright (Amendment) Bill 2010 http://prsindia.org/uploads/media/Copyright%20Act/Copyright%20Bill%202010.pdf &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="37"&gt;[37]See Sivasubramania Iyer v. S.H.  Krishnaswamy AIR 1981 Ker 57 , a case under  Kerala Buildings (Lease  &amp;amp; Rent Control) Act 1965.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="38"&gt;[38]Goods purchased for the private use  of a corporation would be goods purchased for the ”personal use” of the  corporation. 158 IC 703.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="39"&gt;[39]52(1)(g), (h) and (i)&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="40"&gt;[40]52(1)(k) and (l)&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="41"&gt;[41]52(1)(l)&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="42"&gt;[42]52(1)(za)&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="43"&gt;[43]AIR 1989 Bom 331, 1989 (2) BomCR 433, (1989) 91 BOMLR 139 &amp;lt;http://indiankanoon.org/doc/858705/&amp;gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="44"&gt;[44]Ibid.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="45"&gt;[45]At first glance this distinction  may seem facile since even Manisha Koirala invoked ‘reputational harm’  as a prop to buttress her property claim. However, I believe this case  was complicated by the fact that the court had to consider whether the  display of someone else’s body could have implicated Manisha Koirala’s  privacy/dignity. Koirala was, in effect, arguing that she had absolute  ‘proprietorial’ control over all representations of her body – a  property argument which the court was unwilling to concede. &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="46"&gt;[46]See Footnote 90 and accompanying  text in Samuelson, P., 2000. Privacy as Intellectual Property? SSRN  eLibrary; Stanford Law Review. Available at:  http://ssrn.com/paper=239412 [Accessed on June 14, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="47"&gt;[47]Lebatard, F.-R., Copyright  Enforcement and the Protection of Privacy in France. Translegal.  Available at:  http://www.translegal.com/feature-articles/copyright-enforcement-and-the-protection-of-privacy-in-france  [Accessed June 14, 2011].&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement'&gt;https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-14T10:27:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/state-just-did-to-you">
    <title>Look what the state just did to you</title>
    <link>https://cis-india.org/news/state-just-did-to-you</link>
    <description>
        &lt;b&gt;The government's recent introduction of new rules in the IT Act allows 'offensive' material on any website to be removed within 36 hours. Did the state just arm everyone to shoot the messenger, online?Th&lt;/b&gt;
        
&lt;p&gt;Let's say a newspaper published a contentious piece that begs to be questioned in the court of law. What would happen if instead of the journalist who wrote the article or the editor who published it, we decide to sue the newspaper boy who delivered the paper? Irrational? According to bloggers and digital media experts, new rules notified under the Information Technology Act 2008, has armed everyone to shoot the messenger, online. Will this challenge our fundamental freedom of speech and expression, and the fabric of the Internet as we know it?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In April this year, the Department of Information Technology (DIT) introduced a new set of rules called Intermediary Due Diligence. According to it, every citizen has the right to complain against any digital content to the website host or any ISP that serves the content or any cybercafe from which the content is available, etc (legally referred to as intermediary). In other words, any website that carries content  Twitter, Facebook, YouTube, blogs and even newspaper websites  can be sued for the content they carry, even if it is a third party that has written it.&lt;/p&gt;
&lt;p&gt;So, even though over 190 million users worldwide publish over a billion comments a week on social broadcast medium Twitter, if someone were to find a particular 'Tweet' offensive  even if it hasn't been written by an Indian  they can ask Twitter to remove the tweet, failing which, they can sue the site.&lt;/p&gt;
&lt;p&gt;According to the rules, every intermediary (read website) is now required to hire a grievance officer, to whom the offended party can send their complaint. The website is given 36 hours, to remove the comment, post or content, failing which the website is liable to judicial action.&lt;/p&gt;
&lt;p&gt;The website owner no longer possesses the discretion to ignore complaints and uphold the freedom of speech of his site's users without risking liability himself.&lt;/p&gt;
&lt;h3&gt;Is the rule unconstitutional?&lt;/h3&gt;
&lt;p&gt;According to Pranesh Prakash, programme manager for Centre for Internet and Society, Bengaluru, the new rules are unconstitutional.&lt;/p&gt;
&lt;p&gt;The pre-existing section 79 of the IT Act states that intermediaries (that is to say, websites) are not liable for third party information (such as comments, posts, tweets or posts) as long as they are mere conduits, observe 'due diligence' and don't encourage criminal activity. The new rules were meant to clarify what 'due diligence' meant. A draft of the rules was released in February, and the final rules were added to the IT Act in April.&lt;/p&gt;
&lt;p&gt;"The rules have gone far beyond mere clarification. The Department has imposed rules that insist that intermediaries play the role of a judge and executioner on mere complaint, without any opportunity for the other side to be heard," says Prakash.&lt;/p&gt;
&lt;p&gt;In a press release issued on May 11 this year, &amp;nbsp;the DIT stated, "The Government adopted a transparent process for formulation of the Rules under the Information Technology Act. The draft rules were published on the Department of Information Technology website for comments [in February] and were widely covered by the media. None of the Industry Associations and other stakeholders objected to the formulation, which is now being cited in some section of media."&lt;/p&gt;
&lt;p&gt;However, media analysts disagree. &amp;nbsp;"The DIT was expected to create a public listing of comments submitted. From what we've seen on their website, they haven't," says Nikhil Pahwa, editor of Medianama, a website that offers analyses of news on various forms of media, including the Internet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Interestingly, some Members of Parliament registered their protest against the draft rules.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Rajya Sabha member Rajeev Chandrashekar registered his protest against the draft rules during Zero Hour on March 22, and received the support of three other MPs  Kumar Deepak Das, P Rajeev, Mahendra Mohan.&lt;/p&gt;
&lt;p&gt;His argument was also published on his website: "The execution of these rules could result in a shutting down of the Internet, which is the main form of expression for growing Indians, if the information posted is found inconvenient to Government, institutions or individuals. This would also take away the right to freedom of expression of bloggers and other Internet users in the country. The Government must call for transparent public consultation/public opinion."&lt;/p&gt;
&lt;h3&gt;Restricting freedom of speech&lt;/h3&gt;
&lt;p&gt;What's more, say lawyers, the ground on which a person can find a comment offensive is vague and open to interpretation.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Apar Gupta, a lawyer associated with the Software Freedom Law Centre in New Delhi, says, "The grounds to block content are arbitrary. In a situation like this, any intelligent critique, discourse etc can be deemed offensive and no one can do anything about it."&lt;/p&gt;
&lt;p&gt;Nor is it mandatory for the website to inform the person, who has posted a comment that someone else found offensive, before removing it.&lt;/p&gt;
&lt;p&gt;"In a case like this, the so-called violator does not even have the opportunity to be heard or defend himself, which is a violation of the principles of natural justice," adds Prakash.&lt;/p&gt;
&lt;p&gt;Websites no longer have a final say in regulating content, as they are legally bound to remove matter that has been found offensive. The removed content can be re-instated if the website wins a lawsuit against the complainant  if it chooses to go through with one in the first place.&lt;/p&gt;
&lt;p&gt;"Suppose you do not like what I have posted on Twitter, and file a complaint with the grievance officer.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Twitter has two options  remove the content and be safe or keep it and be liable. What do you think is easier for Twitter? Obviously, it wouldn't want to be party to hundreds of lawsuits," explains Gupta.&lt;/p&gt;
&lt;p&gt;Before the rules were notified, a police complaint could be registered, a civil suit filed, or a 'nodal officer'  required to be designated in all government departments  could be approached, which would be followed by a judicial probe. If the content was eventually found offensive, the website would be asked to remove it.&lt;/p&gt;
&lt;p&gt;"Now, websites will lose protection from law if they don't take down 'offensive' content. They have no incentive to uphold the freedom of speech of their users. Instead, they have been provided incentives to take down all content about which they receive complaints without applying their minds," Prakash points out.&lt;/p&gt;
&lt;p&gt;Then again, in our country where anything from a paragraph in a history textbook to a 15-second jig by a politician can be deemed offensive, analysts fear that the rules can be rampantly misused.&lt;/p&gt;
&lt;p&gt;"The rule will be used by conservatives and not liberals. Lots of organised people (political parties, bureaucrats etc) will take down all content against them. People could end up using the rule to challenge a website and making money by agreeing for an out of court settlement," fears Gupta.&lt;/p&gt;
&lt;p&gt;"It can become a tool for harassment," Shivam Vij, a member of radical critique blog Kafila, adds tersely.&lt;/p&gt;
&lt;p&gt;The new clause has the potential to immediately address truly offensive material, such as child pornography, online grooming of young girls and boys by paedophiles (such as the recent case of Paul Wilson who was convicted in Birmingham for grooming 20 minors online) and videos taken on the sly (one such case led Rutgers university student Tyler Clementi to commit suicide, when a video of him having sex with a fellow male student was posted online). However, it is a double-edged sword that calls for further debate on what can be posted and what can be removed.&lt;/p&gt;
&lt;p&gt;One way to do this is to make information public. If a site is blocked or content removed, there should be a public notice issued and a list should be maintained of all requests for removals or blocks. Also, the reason for removing or blocking a piece of content, and the authority responsible for taking that decision should be made public. When a user visits a blocked site, there should be a notice about the block, and a specific recourse mentioned for getting the block removed.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;This article by Yoshita Sengupta was published in Mid Day on June 12, 2011. Read the original &lt;a class="external-link" href="http://www.mid-day.com/specials/2011/jun/120611-Information-Technology-Act-newspaper.htm"&gt;here&lt;/a&gt;&lt;/em&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/state-just-did-to-you'&gt;https://cis-india.org/news/state-just-did-to-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-06-16T10:51:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/india-e-tolerance">
    <title>Tough neighbourhood tests India's e-tolerance</title>
    <link>https://cis-india.org/news/india-e-tolerance</link>
    <description>
        &lt;b&gt;The combination of having restrictive neighbours as well as security threats could make freedom on the web in India a casualty, writes Anahita Mukherji in this article published by the Times of India on June 12, 2011.
&lt;/b&gt;
        
&lt;p&gt;While Indians have enjoyed relatively free cyberspace, growing security threats have resulted in new laws that may tighten the screws on India's freedom on the web. This is one of the findings of a global report titled Freedom on the Net 2011.&lt;/p&gt;
&lt;p&gt;There is a widespread fear that the lack of internet freedom in neighbouring countries, like China and Pakistan, may adversely impact India. "If restrictions are placed in certain countries, information links get weakened. Also, governments tend to copy moves of other countries when it comes to a restriction of freedom on the net," said Ketan Tanna, the India researcher for the report.&lt;/p&gt;
&lt;p&gt;However, Sarah Cook, Asian research analyst and assistant editor for Freedom on the Net, said that while India may be in a tough neighborhood, it is also possible to seek out the "best practices from countries further afield, or even design its own, and not follow the 'worst practices' from the countries next door".&lt;/p&gt;
&lt;p&gt;"It is ultimately up to the Indian government and people to decide how adversely they let being in a tough neighborhood impact internet freedom. It is true that there are objective threats that India faces. All of these can be used as justifications for why the government should be given wide authority to block certain content or monitor internet traffic. But in a democratic society, such needs must be balanced against citizens' rights to free expression and privacy. Ensuring transparency, accountability and legal specificity in any measures taken to restrict the free flow of information is an important way of balancing those factors," said Cook in an email interview with TOI.&lt;/p&gt;
&lt;p&gt;Recent regulations have given the government more freedom to censor content. In 2008, Parliament passed amendments to the IT Act, which came into effect in 2009 and have expanded the government's monitoring capabilities. Two months ago, the government enforced another set of guidelines on internet usage. They make it mandatory for intermediaries (ISPs, websites, blogs etc) to notify users not to publish or use information that could be harmful, defamatory or cause annoyance in any way. If an intermediary is informed of such information by the government, it has to block it within 36 hours.&lt;/p&gt;
&lt;p&gt;According to the new rules, content that "threatens the unity, integrity, defence, security or sovereignty of India, friendly relations with foreign states or public order" is entitled to a ban.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;An RTI activist from The Centre for Internet and Society managed to get a list of 11 officially banned websites in India in April 2011.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Nikhil Pahwa, the founder editor of Medianama, a digital media portal, feels the new guidelines could result in a further slide in India's rank.&lt;/p&gt;
&lt;p&gt;Read the original published in the Times of India &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2011-06-12/mumbai/29649550_1_freedom-security-threats-countries"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/india-e-tolerance'&gt;https://cis-india.org/news/india-e-tolerance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-06-15T10:51:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/snooping-to-data-abuse">
    <title>Snooping Can Lead to Data Abuse</title>
    <link>https://cis-india.org/internet-governance/blog/snooping-to-data-abuse</link>
    <description>
        &lt;b&gt;THE NATGRID, aiming to link databases of 21 departments and ministries for better counter-terror measures, adopts blunt policy approach, subjecting every citizen to the same level of blanket surveillance, instead of a targeted approach that intelligently focuses on geographic or demographic areas that are currently important, writes Sunil Abraham in this article published by Mail Today on June 9, 2011.&lt;/b&gt;
        
&lt;p&gt;THE NATGRID, aiming to link databases of 21 departments and ministries for better counter- terror measures, adopts blunt policy approach, subjecting every citizen to the same level of blanket surveillance, instead of a targeted approach that intelligently focuses on geographic or demographic areas that are currently important.&lt;br /&gt;&lt;br /&gt;All you manage to do with the current approach help software, hardware and biometric equipment vendors achieve their sales targets. It is quite unlikely that security agencies will learn anything insightful by putting everybody under the same degree of surveillance. There is no scientific evidence to show that we will be a safer nation if the government eavesdropped into all aspects of a citizen’s life. Targeted surveillance, on the other hand, is like good old- fashioned detective work. Put a particular section — of potential troublemakers — under surveillance and leave the others alone.&lt;/p&gt;
&lt;p&gt;With round- the- clock, 100- per cent, 360- degree surveillance, all the data is scrutinised all the time. The more effective approach is to sample and collect data while maintaining data trails. If anything suspicious is noticed, the rest of the trail can be dug up. Blanket surveillance only leads to leaks and abuse and tremendous distraction. The surveillance infrastructure will be overburdened as 99 per cent of the records and files scanned will be of no interest terms of fighting terrorism, etc.&lt;/p&gt;
&lt;p&gt;The 21 databases need to be opened only when there is anything suspicious in any of the extracted and scrutinised samples or subsets. If there is a suspicious pattern, it should lead to opening of subsets in all the databases. Obviously, there should be ways in which the databases can talk to each other — demand for a particular subset, and not for all the records to be available to agencies all the time.&lt;/p&gt;
&lt;p&gt;The NATGRID has to be able to let investigators selectively go in and out of the necessary subsets data. No one should be able to have a 360 degree view of all activities of all Indians. AS OF now, the NATGRID design does not appear to have a safeguard for data abuse. And no matter what you see Hollywood movies, this configuration does not exist in Europe or the US. Two important forms of protections that should be available in democracies with robust privacy laws are missing in India. The first is breach notification.&lt;/p&gt;
&lt;p&gt;If intelligence agencies and the police have looked up your files, you have a right to be informed. Secondly, you can request for a copy of the information that is maintained on you and request modifications if the data is inaccurate, so as to prevent harassment. Such checks and balances are necessary an intelligent and appropriate surveillance regime.&lt;/p&gt;
&lt;p&gt;Merging all 21 databases for 1.2 billion people into a single system only provides a juicy target for any internal or external enemy. From the perspective national security, it is a foolish thing to do. Terrorist groups will be able to target a single failure point destroy over a billion lives. Since the current configuration of the NATGRID only undermines national security, one is forced conclude that national security is a false pretext.&lt;/p&gt;
&lt;p&gt;This explains the deep scepticism among many the intelligence agencies involved. The real purpose of the project is to scare citizens in the age of Arab springs. The NATGRID is a disciplinary measure aimed at social engineering of citizens’ behaviour. Unfortunately, our media has been misled by the corporate cheerleaders of this humongous waste of money.&lt;/p&gt;
&lt;p&gt;The writer is executive director at the Centre for Internet and Society in Bangalore.&lt;br /&gt;( As told to Max Martin)&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://epaper.mailtoday.in/epaperhome.aspx?issue=962011"&gt;Follow on Mail Today&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/publications/snooping-data-abuse.pdf" class="internal-link" title="Snooping Can Lead to Data Abuse (PDF)"&gt;Download the original here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/snooping-to-data-abuse'&gt;https://cis-india.org/internet-governance/blog/snooping-to-data-abuse&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T10:39:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/new-right-to-privacy-bill">
    <title>The New Right to Privacy Bill 2011 — A Blind Man's View of the Elephunt</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/new-right-to-privacy-bill</link>
    <description>
        &lt;b&gt;Over the past few days various newspapers have reported the imminent introduction in Parliament, during the upcoming Monsoon session, of a Right to Privacy Bill. Since the text of this bill has not yet been made accessible to the public, this post attempts to grope its way – through guesswork  – towards a picture of what the Bill might look like from a combined reading of all the newspaper accounts, writes Prashant Iyengar in this blog post which was posted on the Privacy India website on June 8, 2011.&lt;/b&gt;
        
&lt;p&gt;I am relying entirely on the following three newspaper accounts in the &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2011-06-04/india/29620422_1_privacy-law-ministry-confidentiality"&gt;Times of India&lt;/a&gt;, the &lt;a class="external-link" href="http://www.thehindu.com/news/national/article2082643.ece"&gt;Hindu&lt;/a&gt; and the &lt;a class="external-link" href="http://www.deccanchronicle.com/channels/nation/north/draft-right-privacy-bill-tough-leaks-653"&gt;Deccan Chronicle&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;A Constitutional/Fundamental Right?&lt;/h3&gt;
&lt;p&gt;The Times of India piece which broke the story seems to have misunderstood/misquoted Law Minister Veerappa Moily. The article is titled “Right to privacy may become fundamental right” which connotes a constitutional amendment. However this is inconsistent with the later portions of the same article as well as subsequent newspaper accounts in DC and the Hindu. So its safe to assume that this will not be a fundamental right to privacy, but a statutory right to privacy – like what the Right to Information Act grants us.&lt;/p&gt;
&lt;h3&gt;Preamble&lt;/h3&gt;
&lt;p&gt;I’m extrapolating here from the Hindu article:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;"To provide for such a right [of privacy] to citizens of India AND to regulate collection, maintenance, use and dissemination of their personal information."&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;So it’s an omnibus Privacy and Data Protection Law that’s being passed. How nice.&amp;nbsp; This addresses some of the &lt;a href="https://cis-india.org/advocacy/igov/privacy-india/c.i.s-responds-to-privacy-approach-paper/" class="external-link"&gt;misgivings&lt;/a&gt; that we had last year against the "&lt;a href="https://cis-india.org/internet-governance/publications/privacyapproachpaper" class="external-link"&gt;Approach Paper on Privacy&lt;/a&gt;" released by the Department of Personnel and Training.&lt;/p&gt;
&lt;h3&gt;Definition of ‘Right to Privacy’&lt;/h3&gt;
&lt;p&gt;The Hindu article appears to quote directly from the Bill.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Every individual shall have a right to his privacy — confidentiality of communication made to, or, by him — including his personal correspondence, telephone conversations, telegraph messages, postal, electronic mail and other modes of communication; confidentiality of his private or his family life; protection of his honour and good name; protection from search, detention or exposure of lawful communication between and among individuals; privacy from surveillance; confidentiality of his banking and financial transactions, medical and legal information and protection of data relating to individual.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;This is a wonderfully expansive definition of the right to privacy which spans diverse areas including privacy of communications, reputational privacy, bodily/physical privacy, confidentiality, privacy of records and data protection. I’m especially pleased that this section does not limit this right to privacy only to claims against the state (as in the Right to Information Act).&lt;/p&gt;
&lt;p&gt;The Deccan Chronicle article contains a slightly different definition of 'right to privacy' under the Bill. Here the right to privacy includes "confidentiality of communication, family life, bank and health records, protection of honour and good name and protection from use of photographs, fingerprints, DNA samples and other samples taken at police stations and other places."&lt;/p&gt;
&lt;p&gt;This wording is slightly more granular, but less broad. I’m wondering if it is a part of the same section, or a different one entirely.&lt;/p&gt;
&lt;h3&gt;Interception&lt;/h3&gt;
&lt;p&gt;What is most interesting is the attempt made in this Bill at harmonization of interception rules across all modes of "communication". (Currently there are different rules/procedures that followed depending on the mode of communication used – Indian Post Act, Telegraph Act, IT Act.)&lt;/p&gt;
&lt;p&gt;Here are some of the sweeping changes sought to be introduced:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The bill prohibits interception of communications except in certain cases with approval of Secretary-level officer – not below the rank of home secretary at the Central level and home secretaries in state governments&lt;/li&gt;
&lt;li&gt;Mandatory destruction of intercepted material by the service provider within two months of discontinuance of interception.&lt;/li&gt;
&lt;li&gt;Constitution of a Central Communication Interception Review Committee (CCIRC) to examine and review all interception orders passed (under all Acts?).&lt;/li&gt;
&lt;li&gt;CCIRC empowered to order destruction of material intercepted under the Telgraph Act.&lt;/li&gt;
&lt;li&gt;"unauthorised interception" (by whom?) punishable with a maximum of five years’ imprisonment, or a fine of Rs 1 lakh, or both, for each such interception. This makes it a cognizable, non-bailable offense.&lt;/li&gt;
&lt;li&gt;Disclosure of legally intercepted communication by “government officials, employees of service providers and other persons” will be punishable with imprisonment up to three years. (It is unclear whether this will be a cognizable offence or not)&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Data Protection&lt;/h3&gt;
&lt;p&gt;The Bill adds muscle to the newly introduced Data Protection Rules under the IT Act, by creating an overarching statutory regime for Data Protection.&lt;/p&gt;
&lt;p&gt;Thus, the bill forbids "any person having a place of business in India but has data using equipment located in India" from collecting or processing, using or disclosing "any data relating to individual to any person without consent of such individual". I assume that there will be exceptions to this section. The wording of this section seems to preclude its application to the government (unless you can interpret the ‘government’ to mean ‘a person having a place of business in India’. I have no views on the likelihood of that argument.&lt;/p&gt;
&lt;p&gt;The bill evidently authorizes the establishment of an oversight body called “Data Protection Authority of India” that will investigate complaints about alleged violations of data protection. The following appear to be the functions of this body&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;to monitor development in data processing and computer technology;&lt;/li&gt;
&lt;li&gt;to examine law and to evaluate its effect on data protection&lt;/li&gt;
&lt;li&gt;to give recommendations and to receive representations from members of the public on any matter generally affecting data protection.&lt;/li&gt;
&lt;li&gt;to investigate any data security breach and issue orders to safeguard the security interests of affected individuals whose personal data&amp;nbsp; has or is likely to have been compromised by such breach.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Video Surveillance&lt;/h3&gt;
&lt;p&gt;The bill includes a very interesting prohibition on "closed circuit television or other electronic or by any other mode", except in certain cases as per the specified procedure.&lt;/p&gt;
&lt;p&gt;No further details are provided about the exceptions or the procedure and one expects the devil to be in the details.&lt;/p&gt;
&lt;h3&gt;Bodily Privacy&lt;/h3&gt;
&lt;p&gt;The bill prohibits "surveillance by following a person".&lt;/p&gt;
&lt;p&gt;This innocuously worded provision has the potential to effect sweeping changes in the criminal administration of this country (if it is even applicable to the state police machinery) . Currently, Police Acts in the various states contain no provisions that enable a person to challenge the surveillance imposed on them. This new section could provide a powerful new shield to the victims of police harassment.&lt;/p&gt;
&lt;h3&gt;Impersonation and Financial Fraud&lt;/h3&gt;
&lt;p&gt;In a section apparently dealing with identity theft, the Bill criminalises inter alia "posing as another person when apprehended for a crime" and "using another’s identity to obtain credit, goods and services".&lt;/p&gt;
&lt;p&gt;I think the first (at least) is unnecessary since it is already covered by the crime of Impersonation under the IPC.&lt;/p&gt;
&lt;h3&gt;Residual&lt;/h3&gt;
&lt;p&gt;A curious provision appears to be a fine imposed on “any persons who obtain any record of information concerning an individual from any officer of the government or agency under false pretext”. Such a person shall be punishable with a fine of up to Rs. 5 lakh.(unclear whether there is a term of imprisonment in addition).&lt;/p&gt;
&lt;p&gt;It will be interesting to see how this section conflicts with the Right to Information under which no 'pretext' need be given to the public authority.&lt;/p&gt;
&lt;p&gt;I also think it is ill-conceived to penalise the person obtaining the record of information – the government body in custody of the information should be made more responsible in scrutinizing the 'pretext' before handing over such information.&lt;/p&gt;
&lt;h3&gt;Tailpiece&lt;/h3&gt;
&lt;p&gt;That’s all I can make out from the three articles referenced. Looks like it’s going to be a really interesting bill. I’m optimistic about it for the sincere attempt it appears to make to grapple with the protean nature of Privacy concerns we encounter. Veerappa Moily has claimed that this bill will be introduced in the monsoon session in July but has also cautioned that "it’s difficult to commit the timeframe". I think we should make haste slowly with this Bill and hope that the Law Ministry will have the wisdom to solicit public comment before introducing it in Parliament.&lt;/p&gt;
&lt;p&gt;I’d greatly appreciate someone sending me a copy of the bill if you have access to it.&lt;/p&gt;
&lt;p&gt;Read the article published on the Privacy India website &lt;a class="external-link" href="http://privacyindia.org/2011/06/08/the-new-right-to-privacy-bill-2011/"&gt;here.&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/new-right-to-privacy-bill'&gt;https://cis-india.org/internet-governance/blog/privacy/new-right-to-privacy-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-02-29T05:45:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/want-to-be-watched">
    <title>Do You Want to be Watched?</title>
    <link>https://cis-india.org/internet-governance/blog/want-to-be-watched</link>
    <description>
        &lt;b&gt;The new rules under the IT Act are an assault on our freedom, says Sunil Abraham in this article published in Pragati on June 8, 2011.&lt;/b&gt;
        
&lt;p&gt;Privacy is a necessary but not sufficient condition for security. A bank safe is safe only because the keys are held by a trusted few. No one else can access these keys or has the ability to duplicate them. The 2008 Amendment of the Information Technology (IT) Act and their associated rules notified April 2011 proposes to eliminate whatever little privacy Indian netizens have had so far. Already as per the internet service provider (ISP) &amp;nbsp;license, citizens using encryption above 40-bit were expected to deposit the complete decryption key with the Ministry of Communications and Information Technology. This is as intelligent as citizens of a neighbourhood making duplicates of the keys to their homes and handing them over at the local police station. With the IT Act’s latest rules things get from bad to worse. (For an analysis of the new rules under the IT Act, see the In Parliament section of this issue).&lt;/p&gt;
&lt;p&gt;Now imagine my daughter visits the neighborhood cybercafe, the manager would now be entitled to scan her ID document and take a photograph of her using his own camera. He would also be authorised to capture her browser history including unencrypted credentials and authentication factors. He would then store this information for a period of one year and provide them to any government entity that sends him a letter. He could continue to hold on to the files as there would be no clear guidelines or penalties around deletion. The ISP that provides connectivity to the cybercafe would store a copy of my daughter’s Internet activities for two years. None of our ISPs publish or provide on request a copy of their data retention policies.&lt;/p&gt;
&lt;p&gt;Now suppose my daughter used an online peer-production like Wikipedia or social-media platform like MySpace to commit an act of blasphemy by drawing fan-art for her favorite Swedish symphonic black metal band. A neo-Pentecostal Church sends a takedown notice to the website hosting the artwork. Unfortunately, this is a fringe Web 2.0 platform run by Indian entrepreneur who happens to be a friend of yours. When the notice arrived, our entrepreneur was in the middle of a three-week trek in the Himalayas. Even though he had disabled anonymous contributions and started comprehensive data retention of user activity on the site, unfortunately he was not able to delete the offending piece of content within 36 hours. If the honourable judge is convinced, both your friend and my daughter would be sitting in jail for a maximum of three years for the newly christened offence of blasphemous online speech.&lt;/p&gt;
&lt;p&gt;You might dismiss my misgivings by saying “after all we are not China, Saudi Arabia or Myanmar”, and that no matter what the law says we are always weak on implementation. But that is completely missing the point. The IT Act appears to be based on the idea that the the Indian public can be bullied into self-censorship via systemic surveillance. Employ tough language in the law and occasionally make public examples of certain minor infringers. There have been news reports of young men being jailed for using expletives against Indian politicians or referring to a head of state as a “rubber stamp.” The message is clear—you are being watched so watch your tongue.&lt;/p&gt;
&lt;p&gt;Surveillance capabilities are not a necessary feature of information systems. They have to be engineered into these systems. Once these features exists, they could potentially serve both the legally authorised official and other undesirable elements. Terrorists, cyber-warriors and criminals will all find systems with surveillance capabilities easier to compromise. In other words, surveillance compromises security at the level of system design. There were no internet connections or phone lines in the bin Laden compound—he was depending on store and forward arrangement based on USB drives. Do we really think that registration of all USB drives, monitoring of their usage and the provision of back doors to these USBs via master key would have lead the investigators to him earlier? Has the ban on public wi-fi and the current ID requirements at cyber-cafes led to the arrest of any terrorists or criminals in India? Where is the evidence that resource hungry blanket surveillance is providing return on investment? Intelligence work cannot be replaced with resource-hungry blanket surveillance. Unnecessary surveillance distracts the security with irrelevance.&lt;/p&gt;
&lt;p&gt;Increase in security levels is not directly proportional to increase in levels of surveillance. A certain amount of surveillance is unavoidable and essential. But after the optimum amount of surveillance has been reached, additional surveillance only undermines security. The multiple levels of data retention at the cybercafe, by the ISP and also by the application service provider does not necessarily make Indian cyberspace more secure. On the contrary, redundant storage of personal sensitive information only acts as multiple points of failure and leaks—in the age of Niira Radia and Amar Singh one does not have be reminded of authorised and unauthorised surveillance and their associated leaks.&lt;/p&gt;
&lt;p&gt;Finally, there is the question of perception management. Perceptions of security does not only depend on reality but on personal and popular sentiment. There are two possible configurations for information systems—one, where the fundamental organising principle is trust or second, where the principle is suspicion. Systems based on suspicion usually gives rise to criminal and corrupt behavior. If the state were to repeatedly accuse its law-abiding citizens of being terrorists and criminals, it might end up provoking them into living up to these unfortunate expectations. If citizens realise that every moment of their digital lives is being monitored by multiple private and government bodies—they will begin to use anonymisation and encryption technology round the clock even when it is not really necessary. Ordinary citizens will be forced to visit the darker and nastier corners of the internet just to download encryption tools and other privacy enabling software. Like the prohibition, this will only result in further insecurity and break-down in the rule of law.&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://pragati.nationalinterest.in/2011/06/do-you-want-to-be-watched/"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/want-to-be-watched'&gt;https://cis-india.org/internet-governance/blog/want-to-be-watched&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T09:11:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/digital-is-political">
    <title>The Digital is Political </title>
    <link>https://cis-india.org/internet-governance/blog/digital-is-political</link>
    <description>
        &lt;b&gt;Technologies are not just agents of politics, there is politics in their design, writes Nishant Shah in this article published in Down to Earth in the Issue of June 15, 2011.&lt;/b&gt;
        
&lt;p&gt;The links between digital technologies and politics, especially in the light of the recent West Asian-North African uprisings, have been well-established. But there is a pervasive belief that the technologies of computing, in themselves, are apolitical. There are two warring groups when it comes to debates around political participation and social change that the digital and Internet technologies have fostered.&lt;br /&gt;&lt;br /&gt;On the one hand are people who celebrate the negotiation- and intervention-making power of these technologies and attribute to them great power that can change the world. On the other are those who look at these developments with suspicion, trying to make a case for the power of the human will rather than the scope of technology design.&lt;br /&gt;&lt;br /&gt;Both sides remain convinced that there is a cause-and-effect link between technology and politics, but nobody talks about the politics of technology. The functional focus on digital technologies—economic prosperity, time-space shrinkage, transparent interaction and governance—has been overwhelming. This fosters a pervasive belief that technologies of computation and communication are agnostic to politics: there is a disconnect between everyday practices of technology and spectrum of politics within which we operate.&lt;br /&gt;&lt;br /&gt;Let me give an example to explain this. Take a blank sheet of paper. To all appearances, it is completely agnostic to the uses it can be put to. It can become a letter of love, it can become a note of dismissal, shattering the dreams of somebody who is fired, it can be a promissory note facilitating legal and economic transactions, or it can become the rag to mop a spill on your desk. It is generally presumed that the piece of paper does not have any design or agency. And yet, it is obvious from history that this sheet of paper did indeed revolutionise the world.&lt;br /&gt;&lt;br /&gt;The advent of the printing press, the ability to mass-produce paper, the possibility of sending disembodied messages, the power of the paper to store information which can then be retrieved, has been transforming the world the last 500 years. It is a technologised platform that, by its very design possibilities and limitations, is able to shape, not only how we have communicated with each other, but also how we think. Let us remember the first proof of our identity is not in images or in sounds, but in a document, printed on a piece of paper, that declares us human and alive and legally present—the birth certificate.&lt;br /&gt;&lt;br /&gt;We have grown so used to the world of writing and of printing that we have appropriated paper as an integral part of the human socio-cultural fabric. However, technology interfaces and products have not only a political agenda in their design, but also the power to shape the ways in which human history and memory function. The blank sheet of paper, in its inability to capture oral traditions, eradicates them. The tyranny of a piece of paper brings a fixity to articulations which are fluid. To think of the paper as bereft of political design, ambition and destiny, would be to neglect the lessons learned in history.&lt;br /&gt;&lt;br /&gt;The digital interface needs to be understood through similar prisms. It is presumed that the digital interface in itself is not political in nature. Or politics is reduced to the level of content. In the process certain significant questions remain unanswered: who owns the digital technologies? Who supports them? Who benefits from them? Who controls them? Who remains excluded? Who is being made to bear the burdens?&lt;br /&gt;&lt;br /&gt;Questions about exclusion and discrimination, built into the very structure of technology, are often overlooked. How do technologies determine who gets a voice? How do the digital webs exclude those who shall always remain outcasts? What happens to our understanding of the relationship between the state and the citizen? What are our digital rights? How does the technology design mitigate social evils? How does technology emerge as the de-facto arbitrator of law?&lt;br /&gt;&lt;br /&gt;Politics plays a part in the very presence and design of these technologies. It is perhaps time to proclaim that like the personal, the “The Technological is the Political.”&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.downtoearth.org.in/content/digital-political"&gt;Read the original here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/digital-is-political'&gt;https://cis-india.org/internet-governance/blog/digital-is-political&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T09:14:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
