<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1161 to 1175.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/stand-up-for-digital-rights-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-3-2016-gay-pride-charade"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-today-july-13-2016-bisakha-datta-belling-the-trolls"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/meeting-on-net-neutrality-and-related-issues"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/factordaily-pranesh-prakash-and-japreet-grewal-july-13-2016-no-india-did-not-oppose-un-move-to-make-internet-access-a-human-right"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ciol-july-7-2016-india-may-not-be-guilty-of-opposing-un-move-to-save-internet-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/times-now-july-8-2016-flashpoint-troll-control-maneka-versus-ncw"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/events/stand-up-for-digital-rights-1">
    <title>Stand up for Digital Rights</title>
    <link>https://cis-india.org/internet-governance/events/stand-up-for-digital-rights-1</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) invites you to a discussion on a set of Recommendations for Ethical Research, a report on human rights and private online intermediaries which describes key areas where such actors have responsibilities. The discussion is on coming Friday, July 29, 2016 at the Centre for Internet &amp; Society's Delhi office from 3.00 p.m. to 5.00 p.m.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The discussion intends to launch a report on human rights and private online intermediaries, which describes key areas where such actors have responsibilities and provides a detailed set of Recommendations for Ethical Tech. This work is the culmination of a year-long research project led by the Centre for Law and Democracy (CLD), in collaboration with the Arabic Network for Human Rights Information (ANHRI), the Centre for Internet and Society (CIS), Open Net Korea, the Center for Studies on Freedom of Expression and Access to Information at the University of Palermo (CELE) and researchers with the University of Ottawa and the Munk School of Global Affairs at the University of Toronto. The key themes for discussion would include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;General Human Rights Responsibilities and Private Online Intermediaries&lt;/li&gt;
&lt;li&gt;Expanding Access&lt;/li&gt;
&lt;li&gt;Net Neutrality&lt;/li&gt;
&lt;li&gt;Content Moderation&lt;/li&gt;
&lt;li&gt;Privacy&lt;/li&gt;
&lt;li&gt;Transparency and Informed Consent&lt;/li&gt;
&lt;li&gt;Responding to State Interferences&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We look forward to meeting you and making this a forum for knowledge exchange a success.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/stand-up-for-digital-rights-1'&gt;https://cis-india.org/internet-governance/events/stand-up-for-digital-rights-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-25T15:29:41Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all">
    <title>One Pokémon to Rule Them All</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all</link>
    <description>
        &lt;b&gt;America’s head start on the augmented reality game Pokémon Go shows that the interweb is not an egalitarian space.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/technology-others/one-pokemon-to-rule-them-all-2917316/"&gt;published in the Indian Express&lt;/a&gt; on July 17, 2016&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;I was busy, writing, when a Telegram message trickled in. It was a friend who asked me if I had looked at the new Pokémon Go game which has been getting more attention than national elections and global warfare in the USA lately. A location-based augmented reality game that involves the users moving around their physical environments “collecting” pokemon characters that appear hiding in different locations has a large part of the American population in a frenzy, leading to aching soles, traffic accidents, and involuntary bumping into things and people as the players move around, their eyes glued to their screens. The global release of the game is still in the pipeline, and so the rest of us will have to make do with the videos and screen grabs of the game.&lt;br /&gt;&lt;br /&gt;While a big Pikachu fan myself, I don’t see myself going crazy over this game as and when my geography allows me for it, but the friend who had written to me about it is perturbed. An avid gamer and a self-proclaimed Pokémon fan, he is devastated that the users in privileged geography are going to get a head start in the global leader boards that he can never catch up with. The interwebz is already abuzz with players sharing hacks, cracks, bugs, cheat codes, and tips to collect more Pokémon, discover hidden powers, and rise quickly in the ranks as they drive, walk, run and jog around their neighbourhoods, in the quest of catching those delightful monsters on their phones. While my friend is aware that this cloud-based game will have multiple servers for different geographies, and so there will be relative rankings and customised interfaces for each community of players, he was feeling cheated about living in India and not having access to the first release of the game that has all the attention on the social web right now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘It almost makes me want to leave India and move to the USA,’ he said in mock frustration. It made me think about the privilege of geography when it comes to the presumed flatness of the digital world. One of the imaginations of the peer-to-peer architectures of the internet is its promise of flatness. With a series of non-discriminatory principles like #NetNeutrality and #ZeroRating enshrined as the fundamental attributes of the digital internet, we are often led to believe that when we are online, we are equal. This idea is so prevalent that in most of our technology-based development practices and policies, we think of access as the “be all”, if not the “end all”, of our activities. The rhetoric promises that if we get everybody online, we will have an egalitarian society where everybody will have equal access to resources, and equity by participating in the decision-making processes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite overwhelming evidence that the digital world is anecdotally and systemically a space of exclusion, contestation, and intimidation, we continue to propagate the idea that these are “human” problems. Humans, fragile, frail and foolish in their being, contaminate the digital space. Humans, mired in the analogue systems of hatred and abuse, appropriate technologies to perpetuate these older forms of discrimination. The technological structures are imagined as pure, sterile, and committed to constructing parameters of equality through their neutral promises of universal access and seamless connectivity. Technology is clean, the human being is impure. Technology is robust, the human frail. Technology is flat, human hierarchical. These narratives of a neutral and egalitarian technology consequently lead us to put more importance and faith in algorithmic decisions and data-driven governance and policing. We have come to believe that because technologies are neutral, they will do a better job of regulating us than we do ourselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pokémon Go, and its obvious geographical privilege reminds us that the digital is not flat. It is oriented towards a very obvious logic of geopolitical, economic, racial, and identity privileging that continues to promote some parts of the world as favoured standards of first access. The exclusive release of Pokémon Go reminds us that the digital is as subject to Euro-American centrism which treat these erstwhile imperial geographies as the beginning points of all digital activities, slowly expanding their fold to other regions through a trickle-down politics and economics. Whether you are waiting impatiently to join the global bandwagon of Pokémon collection, or are ready to shrug this off as another thing that people do on the web, this differential, preferential, and variable access of the internet is something we definitely want to consider as we continue to push for the digital as the solution to human problems.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all'&gt;https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-17-2016-one-pokemon-to-rule-them-all&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-25T01:16:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-3-2016-gay-pride-charade">
    <title>The Gay Pride Charade</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-3-2016-gay-pride-charade</link>
    <description>
        &lt;b&gt;For most of the milllenials, news is formed by trends, what goes viral, and often open to speculation, projection, manipulation and deceit.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/the-gay-pride-charade-2889743/"&gt;published in Indian Express&lt;/a&gt; on July 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The world of social media can be a minefield of misinformation, and it does get difficult to verify facts and ensure the veracity of the information that comes to us on the winged notifications of our apps. This becomes starkly clear in times of crises. Hence, when the historic and heinous shootout at a gay night club in Orlando, USA, shook the world with horror and grief a couple of weeks ago, when the first tweets appeared on my timeline, my initial reaction was denial. Instead of believing those first responders, I was already searching for more credible news lines that could confirm — or hopefully deny — the massacre. It took only a few minutes, though, to realise that #StandWithOrlando was a reality that we will have to accommodate in the story of continued violence and abuse of sexual minorities around the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, not all deception is bad. One of the most fantastic responses to the shoot-out was from a Quebec-based satirical website called JournalDemourreal.com that published a photoshopped image showing the Canadian PM Justin Trudeau kissing the leader of the Canadian opposition party Tom Mulcair, with a headline that the two, despite their differences, are “united against homophobia”. I know that I liked this fake story four times on different newsfeeds, half-believing, half-wishing that it was true, before I realised that it is a hoax. Morphed as it might be, the doctored image enabled people to talk about the tragedy as demanding a personal and a policy-level action, ranging from acceptance and freedom, to control of guns and protecting the rights of life and dignity for the sexual minorities who continue to remain persecuted in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The image also allowed many queer people in different parts of the  world — especially in the countries where homosexuality continues to be  criminalised and severely punished — to participate not only in the  global grief but also to demand that their governments take more  responsibility towards its queer population.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this photoshopped picture was making the rounds, another  tweet showed up on my timeline. This time it was a tweet from our  media-savvy PM, &lt;a href="http://indianexpress.com/profile/politician/narendra-modi/"&gt;Narendra Modi&lt;/a&gt;,  who claimed that he was “shocked at the shootout in Orlando.”And  further added that his “thoughts and prayers are with the bereaved  families and the injured”. When I saw this tweet, my reaction again, was  that this must be another joke. Because even as queer rights activists  in the country struggle to fight for the decriminalisation of  homosexuality, through their curative petitions in the Supreme Court in  India, PM Modi’s government has continued its hateful diatribe against  queer people in the country. His party has called homosexuality  “anti-Indian” and “anti-family”. The party’s favourite, Baba Ramdev,  continues his hate speech, offering to cure homosexuality through yoga.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ever since the current government took power, documented hate crimes against queer people have more than doubled in the country. So when the PM decided to offer his condolences to those in Orlando, I figured that either it was a fake Twitter account masquerading as the PM or it was some kind of a hacker troll — maybe Anonymous, the online guerrilla activists, who recently took over ISIS- friendly websites and filled them up with information about male homosexuality as a response to the shoot-out — had taken control of the Twitter account. But it turned out that this piece of information was not photoshopped or hacked. It was actually true, and we were to believe in earnest that while the government doesn’t care about the millions of queer people being denied their rights to live and love in their country, it is heartbroken about what happened in the USA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It does make you wonder about the world we live in, where a photoshopped image sounded more plausible than an undoctored tweet. It emphasises why Orlando cannot be treated as one isolated instance in another country, but that #WeAreOrlando. For right now, Orlando is also in India. It is a reminder that while we have been fortunate not to have such an instance of dramatic violence, there are millions of people in the country who are forced to live and die in deception for their sexual orientation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-3-2016-gay-pride-charade'&gt;https://cis-india.org/internet-governance/blog/indian-express-nishant-shah-july-3-2016-gay-pride-charade&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-25T01:10:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-today-july-13-2016-bisakha-datta-belling-the-trolls">
    <title>Belling the trolls</title>
    <link>https://cis-india.org/internet-governance/news/india-today-july-13-2016-bisakha-datta-belling-the-trolls</link>
    <description>
        &lt;b&gt;Online abuse - specially against women - is like one of those rapidly-mutating viruses that resists all antibodies.&lt;/b&gt;
        &lt;p&gt;The article by Bishakha Datta was &lt;a class="external-link" href="http://indiatoday.intoday.in/story/social-media-trolls-rape-threats-online/1/714343.html"&gt;published in India Today&lt;/a&gt; on July 13, 2016. Rohini Lakshane was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;We have always known that the proof of the pudding lies in the eating. And the pleasure with which it is savoured. This month, we saw its online avatar. Barely had Maneka Gandhi launched the Twitter hashtag #IAmTrolledHelp than the trolls were all over it. Trolling with all their might. Abusing both Gandhi and textile minister Smriti Irani, thereby proving her point: that something needs to be done about the unending stream of online abuse that women face every day.&lt;/p&gt;
&lt;p&gt;Online abuse - specially against women - is like one of those rapidly-mutating viruses that resists all antibodies. It's everywhere, in many different forms. I'm not talking about the everyday sexism that's our daily bread. That we deal with. I'm not talking about androcentrism, or the assumption that men, and male experience, are at the centre of the universe. That we live with, constantly rolling our eyes in our heads.&lt;/p&gt;
&lt;p&gt;I'm talking rape threats. Gang rape threats. Graphic gang rape threats with vivid descriptions of postures. Death threats. Those, in my view, are not free speech. They are a call to arms, incitement to violence. Especially when it's an invisible cyber-army behind the threats, backing each other up, preying on a woman. Wilding. Trying to break her. Trying to humiliate her. Trying to get her to shut up, out of the misplaced notion that only men have the right to air their thoughts and opinions online. In a public space.&lt;/p&gt;
&lt;p&gt;In one of her essays, Egyptian writer Fatima Mernissi introduces the concept of 'trespassing in the nude' to explain how men in Morocco think of public spaces-as a men-only zone. Social norms dictate that Moroccan women not seek to be part of public space; women who break that rule are seen to be trespassing. But women who dare to step into public spaces without their veils-that's even worse. That's trespassing in the nude. And trespassing, of course, demands punishment.&lt;/p&gt;
&lt;p&gt;On the internet, women who speak out are seen as trespassers. And women who speak about things men consider their preserve are seen to doubly trespass. Or trespass in the nude. As British writer Laurie Penny famously said, "A woman's opinion is the short skirt of the internet." It is an excuse to harass.&lt;/p&gt;
&lt;p&gt;The women on Morocco's streets were punished by stoning, as are the women who loiter on the streets of the internet. Online abuse is as good as stoning someone who has an opinion with words. When journalist Swati Chaturvedi got massively harassed last year, she wrote about her experience: "Journalists, specially women, are hunted for sport, abused, slandered and hounded by trolls who hunt in hyena-like packs. The problem is that you have an opinion and are behaving like a journalist, not a cheerleader."&lt;/p&gt;
&lt;p&gt;Little wonder than that Chaturvedi, like many other women online, have welcomed Gandhi's initiative to curb online abuse. As do I. I'm writing this in the middle of conducting a digital security workshop. At lunch, one of the participants described how she can't bear to be on her company's social media feed for more than an hour each morning. It's just an endless stream of filth. And something needs to be done about this filth if we want a #SwachhBharat.&lt;/p&gt;
&lt;p&gt;Many women have tried ignoring online abuse. It continues. Others have tried fighting back. It continues. Some have tried humour, including the Peng Collective's brilliant Zero Trollerance campaign. The trolls march on, undeterred, like Tolkien's orcs. Of course, it's important to distinguish between trolling and abuse, but sometimes when you're facing the shitstream, there's just so much semantic jugglery you can take. No matter what you call it, you just want it off.&lt;/p&gt;
&lt;p&gt;And that's where Gandhi's initiative makes sense, as one more pathway to a #SwachhBharat, since we now live both on and offline. But one that'll work only if she can take on her party's trolls. Who are now trolling her too. Yes, cybercells and cops do exist, but that route doesn't always work. Social media platforms make promises to their users, but they are rarely kept. "Not a single tweet that I've ever reported has been taken down," says Rohini Lakshane of the Centre for Internet and Society, who's helping us with our digital security workshop.&lt;/p&gt;
&lt;p&gt;This is not only about safety. It's about digital citizenship. Women are neither interlopers nor outsiders online. We belong there just as we belong here. We intend to loiter online full-throated. We're not content with a purely offline #SwachhBharat that cleans rivers and ponds. We want online #SwachhStreams too.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-today-july-13-2016-bisakha-datta-belling-the-trolls'&gt;https://cis-india.org/internet-governance/news/india-today-july-13-2016-bisakha-datta-belling-the-trolls&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-24T16:44:18Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity">
    <title>Perumal Murugan and the Law on Obscenity </title>
    <link>https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;On July 5, 2016, the Madras High Court saved Perumal Murugan’s novel, &lt;i&gt;Mathorubhagan&lt;/i&gt; from oblivion when it dismissed the claims against Murugan on the grounds of obscenity, spreading disharmony between communities, blasphemy, and defamation and upheld his freedom of expression in &lt;i&gt;S. Tamilselvan &amp;amp; Perumal Murugan versus Government of Tamil Nadu&lt;/i&gt;. This judgment has received wide appreciation for its support for freedom of expression. What made it applause-worthy? Do we have reservations with the view of the High Court?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Murugan’s book is about a married couple, Kali and Ponna, who fail to have a child despite decades of their marriage. They succumb to social and familial pressures to allow Ponna (the wife) to participate in a sexual orgy (unrestrained sexual encounter involving many people) at a religious festival (the Vaikasi Car Festival) that takes place in Arthanareeswarar Temple, for begetting a child. The local community claimed that in the book, Murugan denigrated the Arthanareeswarar Temple, the deity, Lord Arthanareeswarar, festivities relating to Vaikasi Car Festival and the women of the Kongu Vellala Gounder community. Some sections of the community believed that the facts in the story were not true and found that the sexual mores associated with the community in the book were offensive.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Court was required to evaluate, whether the novel was obscene (&lt;/span&gt;&lt;i&gt;Section 292 of Indian Penal Code, 1860 (IPC)&lt;/i&gt;&lt;span&gt;), offensive to the community (&lt;/span&gt;&lt;i&gt;Section 153A of IPC&lt;/i&gt;&lt;span&gt;) and the religion (&lt;/span&gt;&lt;i&gt;Section 295 of IPC&lt;/i&gt;&lt;span&gt;); and whether the State had the responsibility to protect the writer from mob violence on account of his controversial book. The Court held that the book was neither offensive nor did it hurt community or religious sentiments. The Court also held that the State had a positive obligation to protect Murugan against the mob. It would be useful to look at the analysis of the Court in drawing these conclusions and see if we completely agree with it.&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The Court relied on the standard for determining obscenity in &lt;a href="https://indiankanoon.org/doc/195958005/"&gt;&lt;i&gt;Aveek Sarkar v. State of West Bengal&lt;/i&gt;&lt;/a&gt; wherein, it was held that what is lascivious/appealing to the prurient interest/depraved or corrupt has to be tested using the contemporary ‘community standards. The Court was of the view that the novel was not offensive by the current mores (&lt;i&gt;para 150 and 151&lt;/i&gt;). &lt;span&gt;The Court further relied on &lt;/span&gt;&lt;a href="https://indiankanoon.org/doc/1191397/"&gt;&lt;i&gt;MF Hussain v. Rajkumar Pandey&lt;/i&gt;&lt;/a&gt;&lt;span&gt;, (&lt;/span&gt;&lt;i&gt;also decided by Justice Sanjay Kishan Kaul&lt;/i&gt;&lt;span&gt;) wherein it was held, that while evaluating obscenity in a work, “&lt;/span&gt;&lt;i&gt;the judge has to place himself in the position of the author in order to appreciate what the author really wishes to convey and thereafter, placing himself in the position of the reader in every age group in whose hand the book is likely to fall, arrive at a dispassionate conclusion&lt;/i&gt;&lt;span&gt;.”It is necessary to mention here that the community standards test has been criticised by scholars, worldwide, as it is difficult to divorce subjective morality of an individual and ascertain what those standards are. This indeterminacy interferes with the ability of judges to apply these standards. There is established scholarship that says that judges cannot divorce themselves from their subjectivities while evaluating obscenity in work of art or literature and may often reinforce the moral norms of the majority in the society thus crushing the moral standards of the minority. In India, we have a mixed bag of judgments that address the issue of obscenity. Seeing the difficulty in application of the community standards test, it is noteworthy that the ultimate fate of a book, painting or a film is dependent on the morality of an individual judge. In fact, the Court had asked a pertinent question in the judgment, “&lt;/span&gt;&lt;i&gt;Would it be desirable for the Courts to intervene or should it be left to the readers to learn for themselves what they think and feel of the issue in question?&lt;/i&gt;&lt;span&gt;” (&lt;/span&gt;&lt;i&gt;para 136&lt;/i&gt;&lt;span&gt;) However, it eventually reinforced these standards by applying the existing precedents on obscenity. &lt;/span&gt;&lt;span&gt;The Court added thatunder Section 292, it was required to first prove whether the novel was obscene at all and only if it was found to be obscene it should be tested within the parameters of exceptionsit would fall under. The Court found that the novel was not obscene. There was no need to evaluate its social character to save it from a ban. While drawing this conclusion, the Court stated that, “&lt;/span&gt;&lt;i&gt;sex, per se, was not treated as undesirable, but was an integral part right from the existence of civilization&lt;/i&gt;&lt;span&gt;” (&lt;/span&gt;&lt;i&gt;para 149&lt;/i&gt;&lt;span&gt;) and that “&lt;/span&gt;&lt;i&gt;in our society, we seem to be more bogged down by conservative Victorian philosophy rather than draw inspiration from our own literature and scriptures.&lt;/i&gt;&lt;span&gt;”The Court also said, “&lt;/span&gt;&lt;i&gt;there are different kinds of books available on the shelves of book stores to be read by different age groups from different strata. If you do not like a book, simply close it.&lt;/i&gt;&lt;span&gt;”&lt;/span&gt;&lt;i&gt;(para 148&lt;/i&gt;&lt;span&gt;) While this reflects a progressive view of the judges on sexual morality, we have reservations on court’s reliance on ancient literature to justify why sex and its depiction in art or literature is not obscene.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;We appreciate the observations that the Court has made while determining whether the novel hurt community or religious sentiments. The Court has acknowledged the declining tolerance level of the society (&lt;/span&gt;&lt;i&gt;para 154&lt;/i&gt;&lt;span&gt;) and stated that “&lt;/span&gt;&lt;i&gt;any contra view or social thinking is met at times with threats or violent behaviour&lt;/i&gt;&lt;span&gt;” (&lt;/span&gt;&lt;i&gt;para 142&lt;/i&gt;&lt;span&gt;).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;The Court addressed the issue of harassment of writers and artists at the hands of a mob and held that there should “&lt;i&gt;be a presumption in favour of free speech and expression as envisaged under Article 19(1)(a) of the Constitution of India&lt;/i&gt;” and emphasized the need for the State to protect those who suffer from hostility of several sections of a society as a consequence of holding a different view (&lt;i&gt;para 175&lt;/i&gt;).Citing &lt;i&gt;MF Hussain v. Rajkumar Pandey&lt;/i&gt;, the Court said “&lt;i&gt;freedom of speech has no meaning if there is no freedom after speech.&lt;/i&gt;”The Court has identified the problematic sphere of mob violence and how it affects freedom of expression. However, we do not agree with what the Court held subsequently. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;Reproducing an extract of the judgment here, &lt;/span&gt;&lt;span style="text-align: justify; "&gt;“&lt;/span&gt;&lt;i style="text-align: justify; "&gt;There is bound to be a presumption in favour of free speech and expression as envisaged under Article 19(1)(a) of the Constitution of India unless a court of law finds it otherwise as falling within the domain of a reasonable restriction under Article 19(2) of the Constitution of India.” &lt;/i&gt;&lt;span style="text-align: justify; "&gt;(&lt;/span&gt;&lt;i style="text-align: justify; "&gt;para 184&lt;/i&gt;&lt;span style="text-align: justify; "&gt;) &lt;/span&gt;&lt;span style="text-align: justify; "&gt;The words, “&lt;/span&gt;&lt;i style="text-align: justify; "&gt;unless a court of law finds it otherwise as falling within the domain of a reasonable restriction under Article 19(2) of the Constitution of India.&lt;/i&gt;&lt;span style="text-align: justify; "&gt;” indicate that the judiciary has the power to determine whether a certain type of speech could be restricted under Article 19 (2) of the Constitution of India. This understanding is incorrect. &lt;/span&gt;&lt;span style="text-align: justify; "&gt;The language of Article 19 (2) makes it clear that speech could only be restricted by ‘law’ and judiciary cannot assume the authority to restrict speech. It has the authority to decide the applicability and the constitutionality of the law that restricts speech. The relevant part of Article 19 (2) is reproduced below for reference. &lt;/span&gt;&lt;i style="text-align: justify; "&gt;“&lt;/i&gt;&lt;i style="text-align: justify; "&gt;(2) Nothing in sub clause (a) of clause ( 1 ) shall affect the operation of any existing law, or prevent the State from making any law, in so far as such law imposes reasonable restrictions on the exercise of the right….&lt;/i&gt;&lt;span style="text-align: justify; "&gt;” &lt;/span&gt;&lt;span style="text-align: justify; "&gt;The Court further acknowledged that &lt;/span&gt;&lt;i style="text-align: justify; "&gt;“the State and the police authorities would not be the best ones to judge such literary and cultural issues, which are best left to the wisdom of the specialists in the field and thereafter, if need be, the Courts”&lt;/i&gt;&lt;span style="text-align: justify; "&gt; (&lt;/span&gt;&lt;i style="text-align: justify; "&gt;para 181&lt;/i&gt;&lt;span style="text-align: justify; "&gt;). The Court thus issued directions to the Government &lt;/span&gt;&lt;i style="text-align: justify; "&gt;to constitute an expert body to deal with situations arising from such conflicts of views so that an independent opinion is forthcoming, keeping in mind the law evolved by the judiciary&lt;/i&gt;&lt;span style="text-align: justify; "&gt;(&lt;/span&gt;&lt;i style="text-align: justify; "&gt;para 181&lt;/i&gt;&lt;span style="text-align: justify; "&gt;)&lt;/span&gt;&lt;i style="text-align: justify; "&gt;. &lt;/i&gt;&lt;span style="text-align: justify; "&gt;There are concerns with this mandate of the Court; firstly, constituting an expert body to resolve conflict of views will not serve any purpose unless there are guidelines to evaluate work. It is difficult to dissociate subjectivity and ascertain objective standards for evaluating offensiveness of literary or artistic work. Secondly, reliance on expert opinion and then courts completely disregards existing law. Under Section 95 of the Code of Criminal Procedure,1973, the Government has the power to declare forfeiture of works which, it considers in violation of section 153A or section 153B or section 292 or section 293 or section 295A of the Indian Penal Code, 1860. The power to evaluate a piece of writing or other work has already been given to the government. The Court has created a parallel mechanism for evaluation by giving directions to constitute an expert panel. In the event this mechanism fails to resolve the conflict, it is suggested that courts would then be approached to address the matter. This is in complete disregard of the powers of the Government under Section 95.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In the Murugan judgment, the Court has attempted to provide a narrow interpretation of what is considered obscene, emphasized the need for the society to be more tolerant and for State to protect those members of the society who, on account of their views, suffer at the hands of an intolerant society. It is for these reasons, the judgment is, undoubtedly a sound precedent for protection of speech in India. However, it is concerning to see that in drawing these conclusions, the Court has reinforced vague legal standards of obscenity and in that regard, it remains yet another addition to the mixed bag of judgments.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity'&gt;https://cis-india.org/internet-governance/perumal-murugan-and-the-law-on-obscenity&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Japreet Grewal</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Hate Speech</dc:subject>
    
    
        <dc:subject>Article 19(1)(a)</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-09T13:01:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/meeting-on-net-neutrality-and-related-issues">
    <title>Meeting on Net Neutrality and Related Issues </title>
    <link>https://cis-india.org/internet-governance/news/meeting-on-net-neutrality-and-related-issues</link>
    <description>
        &lt;b&gt;A meeting was convened by the Telecom Regulatory Authority of India on July 15, 2016 in New Delhi to discuss Net Neutrality and related issues. Sunil Abraham attended this meeting. &lt;/b&gt;
        &lt;p&gt;Click to &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/trai-invitation-letter-to-discuss-net-neturality"&gt;view the Invitation Letter&lt;/a&gt; sent by the Telecom Regulatory Authority of India.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/meeting-on-net-neutrality-and-related-issues'&gt;https://cis-india.org/internet-governance/news/meeting-on-net-neutrality-and-related-issues&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-08-02T15:56:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle">
    <title>New Approaches to Information Privacy – Revisiting the Purpose Limitation Principle</title>
    <link>https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle</link>
    <description>
        &lt;b&gt;Article on Aadhaar throwing light on privacy and data protection.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This was &lt;a class="external-link" href="http://www.digitalpolicy.org/revisiting-the-principles-of-purpose-limitation-under-existing-data-protection-norms/"&gt;published in Digital Policy Portal&lt;/a&gt; on July 13, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Last year, Mukul Rohatgi, the Attorney General of India, called into question existing jurisprudence of the last 50 years on the constitutional validity of the right to privacy.&lt;sup&gt;1&lt;/sup&gt; Mohatgi was rebutting the arguments on privacy made against Aadhaar, the unique identity project initiated and implemented in the country without any legislative mandate.&lt;sup&gt;2&lt;/sup&gt; The question of the right to privacy becomes all the more relevant in the context of events over the last few years—among them, the significant rise in data collection by the state through various e-governance schemes,&lt;sup&gt;3&lt;/sup&gt; systematic access to personal data by various wings of the state through a host of surveillance and law enforcement initiatives launched in the last decade,&lt;sup&gt;4&lt;/sup&gt; the multifold increase in the number of Indians online, and the ubiquitous collection of personal data by private parties.&lt;sup&gt;5&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;These developments have led to a call for a comprehensive privacy legislation in India and the adoption of the National Privacy Principles as laid down by the Expert Committee led by Justice AP Shah.&lt;sup&gt;6&lt;/sup&gt; There are privacy-protection legislation currently in place such as the Information Technology Act, 2000 (IT Act), which was enacted to govern digital content and communication and provide legal recognition to electronic transactions. This legislation has provisions that can safeguard—and dilute—online privacy. At the heart of the data protection provisions in the IT Act lies section 43A and the rules framed under it, i.e., Reasonable security practices and procedures and sensitive personal data information.&lt;sup&gt;7&lt;/sup&gt;Section 43A mandates that body corporates who receive, possess, store, deal, or handle any personal data to implement and maintain ‘reasonable security practices’, failing which, they are held liable to compensate those affected. Rules drafted under this provision also mandated a number of data protection obligations on corporations such the need to seek consent before collection, specifying the purposes of data collection, and restricting the use of data to such purposes only. There have been questions raised about the validity of the Section 43A Rules as they seek to do much more than mandate in the parent provisions, Section 43A— requiring entities to maintain reasonable security practices.&lt;/p&gt;
&lt;h3&gt;Privacy as control?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Even setting aside the issue of legal validity, the kind of data protection framework envisioned by Section 43A rules is proving to be outdated in the context of how data is now being collected and processed. The focus of Section 43 A Rules—as well as that of draft privacy legislations in India&lt;sup&gt;8&lt;/sup&gt;—is based on the idea of individual control. Most apt is Alan Westin’s definition of privacy: “the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to other.”&lt;sup&gt;9&lt;/sup&gt; Westin and his followers rely on the normative idea of “informational self- determination”, the notion of a pure, disembodied, and atomistic self, capable of making rational and isolated choices in order to assert complete control over personal information. More and more this has proved to be a fiction especially in a networked society.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Much before the need for governance of information technologies had reached a critical mass in India, Western countries were already dealing with the implications of the use of these technologies on personal data. In 1973, the US Department of Health, Education and Welfare appointed a committee to address this issue, leading to a report called ‘Records, Computers and Rights of Citizens.’&lt;sup&gt;10&lt;/sup&gt; The Committee’s mandate was to “explore the impact of computers on record keeping about individuals and, in addition, to inquire into, and make recommendations regarding, the use of the Social Security number.” The Report articulated five principles which were to be the basis of fair information practices: transparency; use limitation; access and correction; data quality; and security. Building upon these principles, the Committee of Ministers of the Organization for Economic Cooperation and Development (OECD) arrived at the Guidelines on the Protection of Privacy and Transborder Flows of Personal Data in 1980.&lt;sup&gt;11&lt;/sup&gt; These principles— Collection Limitation, Data Quality, Purpose Specification, Use Limitation, Security Safeguards, Openness, Individual Participation and Accountability—are what inform most data protection regulations today including the APEC Framework, the EU Data Protection Directive, and the Section 43A Rules and Justice AP Shah Principles in India.&lt;/p&gt;
&lt;p&gt;Fred Cate describes the import of these privacy regimes as such:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;“All of these data protection instruments reflect the same approach: tell individuals what data you wish to collect or use, give them a choice, grant them access, secure those data with appropriate technologies and procedures, and be subject to third-party enforcement if you fail to comply with these requirements or individuals’ expressed preferences”&lt;sup&gt;12&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is in line with Alan Westin’s idea of privacy exercised through individual control. Therefore the focus of these principles is on empowering the individuals to exercise choice, but not on protecting individuals from harmful or unnecessary practices of data collection and processing. The author of this article has earlier written&lt;sup&gt;13&lt;/sup&gt; about the sheer inefficacy of this framework which places the responsibility on individuals. Other scholars like Daniel Solove,&lt;sup&gt;14&lt;/sup&gt; Jonathan Obar&lt;sup&gt;15&lt;/sup&gt; and Fred Cate&lt;sup&gt;16&lt;/sup&gt; have also written about the failure of traditional data protection practices of notice and consent. While these essays dealt with the privacy principles of choice and informed consent, this paper will focus on the principles of purpose limitation.&lt;/p&gt;
&lt;h3&gt;Purpose Limitation and Impact of Big Data&lt;/h3&gt;
&lt;p&gt;The principles of purpose limitation or purpose specification seeks to ensure the following four objectives:&lt;/p&gt;
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li&gt;Personal information collected and processed should be adequate and relevant to the purposes for which they are processed.&lt;/li&gt;
&lt;li&gt;The entities collect, process, disclose, make available, or otherwise use personal information only for the stated purposes.&lt;/li&gt;
&lt;li&gt;In case of change in purpose, the data’s subject needs to be informed and their consent has to be obtained.&lt;/li&gt;
&lt;li&gt;After personal information has been used in accordance with the identified purpose, it has to be destroyed as per the identified procedures.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;The purpose limitation along with the data minimisation principle—which requires that no more data may be processed than is necessary for the stated purpose—aim to limit the use of data to what is agreed to by the data subject. These principles are in direct conflict with new technology which relies on ubiquitous collection and indiscriminate uses of data. The main import of Big Data technologies on the inherent value in data which can be harvested not by the primary purposes of data collection but through various secondary purposes which involve processing of the data repeatedly.&lt;sup&gt;17&lt;/sup&gt;Further, instead to destroying the data when its purpose has been achieved, the intent is to retain as much data as possible for secondary uses. Importantly, as these secondary uses are of an inherently unanticipated nature, it becomes impossible to account for it at the stage of collection and providing the choice to the data subject.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Followers of the discourse on Big Data would be well aware of its potential impacts on privacy. De-identification techniques to protect the identities of individuals in dataset face a threat from an increase in the amount of data available either publicly or otherwise to a party seeking to reverse-engineer an anonymised dataset to re-identify individuals. &lt;sup&gt;18&lt;/sup&gt; Further, Big Data analytics promise to find patterns and connections that can contribute to the knowledge available to the public to make decisions. What is also likely is that it will lead to revealing insights about people that they would have preferred to keep private.&lt;sup&gt;19&lt;/sup&gt;In turn, as people become more aware of being constantly profiled by their actions, they will self-regulate and ‘discipline’ their behaviour. This can lead to a chilling effect.&lt;sup&gt;20&lt;/sup&gt; Meanwhile, Big Data is also fuelling an industry that incentivises businesses to collect more data, as it has a high and growing monetary value. However, Big Data also promises a completely new kind of knowledge that can prove to be revolutionary in fields as diverse as medicine, disaster-management, governance, agriculture, transport, service delivery, and decision-making.&lt;sup&gt;21&lt;/sup&gt; As long as there is a sufficiently large and diverse amount of data, there could be invaluable insights locked in it, accessing which can provide solutions to a number of problems. In light of this, it is important to consider what kind of regulatory framework is most suitable which could facilitate some of the promised benefits of Big Data and at the same time mitigate its potential harm. This, coupled with the fact that the existing data protection principles have, by most accounts, run their course, makes the examination of alternative frameworks even more important. This article will examine some alternate proposals made to the existing framework of purpose limitation below.&lt;/p&gt;
&lt;h3&gt;Harms-based approach&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Some scholars like Fred Cate&lt;sup&gt;22&lt;/sup&gt; and Daniel Solove&lt;sup&gt;23&lt;/sup&gt; have argued that there is a need for the primary focus of data protection law to move from control at the stage of data collection to actual use cases. In his article on the failure of Fair Information Practice Principles,&lt;sup&gt;24&lt;/sup&gt;Cate puts forth a proposal for ‘Consumer Privacy Protection Principles.’ Cate envisions a more interventionist role of the data protection authorities by regulating information flows when required, in order to protect individuals from risky or harmful uses of information. Cate’s attempt is to extend the principles of consumer protection law of prevention and remedy of harms.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In a re-examination of the OECD Privacy Principles, Cate and Viktor Mayer Schöemberger attempt to discard the use of personal data to only purposes specified. They felt that restricting the use of personal to only specified purposes could significantly threaten various research and beneficial uses of Big Data. Instead of articulating a positive obligations of what personal data collected could be used for, they attempt to arrive at a negative obligation of use-cases prevented by law. Their working definition of the Use specification principle broaden the scope of use cases by only preventing use of data “if the use is fraudulent, unlawful, deceptive or discriminatory; society has deemed the use inappropriate through a standard of unfairness; the use is likely to cause unjustified harm to the individual; or the use is over the well-founded objection of the individual, unless necessary to serve an over-riding public interest, or unless required by law.”&lt;sup&gt;25&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While most standards in the above definition have established understanding in jurisprudence, the concept of unjustifiable harm is what we are interested in. Any theory of harms-based approach goes back to John Stuart Mill’s dictum that the only justifiable purpose to exert power over the will of an individual is to prevent harm to others. Therefore, any regulation that seeks to control or prevent autonomy of individuals (in this case, the ability of individuals to allow data collectors to use their personal data, and the ability of data collectors to do so, without any limitation) must clearly demonstrate the harm to the individuals in question.&lt;/p&gt;
&lt;p&gt;Fred Cate articulates the following steps to identify tangible harm and respond to its presence:&lt;sup&gt;26&lt;/sup&gt;&lt;/p&gt;
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li&gt;Focus on Use — Actual use of the data should be considered, not mere possession. The assumption is that the collection, possession, or transfer of information do not significantly harm people, rather it is the use of information following such collection, possession, or transfer.&lt;/li&gt;
&lt;li&gt;Proportionality — Any regulatory measure must be proportional to the likelihood and severity of the harm identified.&lt;/li&gt;
&lt;li&gt;Per se Harmful Uses — Uses which are always harmful must be prohibited by law&lt;/li&gt;
&lt;li&gt;Per se not Harmful Uses — If uses can be considered inherently not harmful, they should not be regulated.&lt;/li&gt;
&lt;li&gt;Sensitive Uses — In case where the uses are not per se harmful or not harmful, individual consent must be sought for using that data for those purposes.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;The proposal by Cate argues for what is called a ‘use based system’, which is extremely popular with American scholars. Under this system, data collection itself is not subject to restrictions; rather, only the use of data is regulated. This argument has great appeal for both businesses who can reduce their overheads significantly if consent obligations are done away with as long as they use the data in ways which are not harmful, as well as critics of the current data protection framework which relies on informed consent. Lokke Moerel explains the philosophy of ‘harms based approach’ or ‘use based system’ in United States by juxtaposing it against the ‘rights based approach’ in Europe.&lt;sup&gt;27&lt;/sup&gt; In Europe, rights of individuals with regard to processing of their personal data is a fundamental human right and therefore, a precautionary principle is followed with much greater top-down control upon data collection. However, in the United States, there is a far greater reliance on market mechanisms and self-regulating organisations to check inappropriate processing activities, and government intervention is limited to cases where a clear harm is demonstrable.&lt;sup&gt;28&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Continuing research by the Centre for Information Policy Leadership under its Privacy Risk Framework Project looks at a system of articulating what harms and risks arising from use of collected data. They have arrived a matrix of threats and harms. Threats are categorised as —a) inappropriate use of personal information and b) personal information in the wrong hands. More importantly for our purposes, harms are divided into: a) tangible harms which are physical or economic in nature (bodily harm, loss of liberty, damage to earning power and economic interests); b) intangible harms which can be demonstrated (chilling effects, reputational harm, detriment from surveillance, discrimination and intrusion into private life); and c) societal harm (damage to democratic institutions and loss of social trust).&lt;sup&gt;29&lt;/sup&gt;For any harms-based system, a matrix like above needs to emerge clearly so that regulation can focus on mitigating practices leading to the harms.&lt;/p&gt;
&lt;h3&gt;Legitimate interests&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Lokke Moerel and Corien Prins, in their article “Privacy for Homo Digitalis – Proposal for a new regulatory framework for data protection in the light of Big Data and Internet of Things”&lt;sup&gt;30&lt;/sup&gt; use the ideal of responsive regulation which considers empirically observable practices and institutions while determining the regulation and enforcement required. They state that current data protection frameworks—which rely on mandating some principles of how data has to be processed—is exercised through merely procedural notification and consent requirements. Further, Moerel and Prins feel that data protection law cannot only involve a consideration of individual interest but also needs to take into account collective interest. Therefore, the test must be a broader assessment than merely the purpose limitation articulating the interests of the parties directly involved, but whether a legitimate interest is achieved.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Legitimate interest has been put forth as an alternative to the purpose limitation. Legitimate is not a new concept and has been a part of the EU Data Protection Directive and also finds a place in the new General Data Protection Regulation. Article 7 (f) of the EU Directive&lt;sup&gt;31&lt;/sup&gt; provided for legitimate interest balanced against the interests or fundamental rights and freedoms of the data subject as the last justifiable reason for use of data. Due to confusion in its interpretation, the Article 29 Working Party, in 2014,&lt;sup&gt;32&lt;/sup&gt;looked into the role of legitimate interest and arrived at the following factors to determine the presence of a legitimate interest— a) the status of the individual (employee, consumer, patient) and the controller (employer, company in a dominant position, healthcare service); b) the circumstances surrounding the data processing (contract relationship of data subject and processor); c) the legitimate expectations of the individual.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Federico Ferretti has criticised the legitimate interest principle as vague and ambiguous. The balancing of legitimate interest in using the data against fundamental rights and freedoms of the data subject gives the data controllers some degree of flexibility in determining whether data may be processed; however, this also reduces the legal certainty that data subject have of their data not being used for purposes they have not agreed to.&lt;sup&gt;33&lt;/sup&gt;However, it is this paper’s contention that it is not the intent of the legitimate interest criteria but the lack of consensus on its application which creates an ambiguity. Moerel and Prins articulate a test for using legitimate interest which is cognizant of the need to use data for the purpose of Big Data processing, as well as ensuring that the rights of data subjects are not harmed.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As demonstrated earlier, the processing of data and its underlying purposes have become exceedingly complex and the conventional tool to describe these processes ‘privacy notices’ are too lengthy, too complex and too profuse in numbers to have any meaningful impact.&lt;sup&gt;34&lt;/sup&gt;The idea of information self-determination, as contemplated by Westin in American jurisprudence, is not achieved under the current framework. Moerel and Prins recommend five factors&lt;sup&gt;35&lt;/sup&gt; as relevant in determining the legitimate interest. Of the five, the following three are relevant to the present discussion:&lt;/p&gt;
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li style="text-align: justify;"&gt;Collective Interest — A cost-benefit analysis should be conducted, which examines the implications for privacy for the data subjects as well as the society, as a whole.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The nature of the data — Rather than having specific categories of data, the nature of data needs to be assessed contextually to determine legitimate interest.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Contractual relationship and consent not independent grounds — This test has two parts. First, in case of contractual relationship between data subject and data controller: the more specific the contractual relationship, the more restrictions apply to the use of the data. Second, consent does not function as a separate principle which, once satisfied, need not be revisited. The nature of the consent (opportunities made available to data subject, opt in/opt out, and others) will continue to play a role in determining legitimate interest.&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Replacing the purpose limitation principles with a use-based system as articulated above poses the danger of allowing governments and the private sector to carry out indiscriminate data collection under the blanket guise that any and all data may be of some use in the future. The harms-based approach has many merits and there is a stark need for more use of risk assessments techniques and privacy impact assessments in data governance. However, it is important that it merely adds to the existing controls imposed at data collection, and not replace them in their entirety. On the other hand, the legitimate interests principle, especially as put forth by Moerel and Prins, is more cognizant of the different factors at play — the inefficacy of existing purpose limitation principles, the need for businesses to use data for purposes unidentified at the stage of collection, and the need to ensure that it is not misused for indiscriminate collection and purposes. However, it also poses a much heavier burden on data controllers to take into account various factors before determining legitimate interest. If legitimate interest has to emerge as a realistic alternative to purpose limitation, there needs to be greater clarity on how data controllers must apply this principle.&lt;/p&gt;
&lt;h3&gt;Endnotes&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Prachi Shrivastava, “Privacy not a fundamental right, argues Mukul Rohatgi for Govt as Govt affidavit says otherwise,” Legally India, Jyly 23, 2015, http://www.legallyindia.com/Constitutional-law/privacy-not-a-fundamental-right-argues-mukul-rohatgi-for-govt-as-govt-affidavit-says-otherwise.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt; Rebecca Bowe, “Growing Mistrust of India’s Biometric ID Scheme,” Electronic Frontier Foundation, May 4, 2012, https://www.eff.org/deeplinks/2012/05/growing-mistrust-india-biometric-id-scheme.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Lisa Hayes, “Digital India’s Impact on Privacy: Aadhaar numbers, biometrics, and more,” Centre for Democracy and Technology, January 20, 2015, https://cdt.org/blog/digital-indias-impact-on-privacy-aadhaar-numbers-biometrics-and-more/.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;“India’s Surveillance State,” Software Freedom Law Centre, http://sflc.in/indias-surveillance-state-our-report-on-communications-surveillance-in-india/.&lt;/li&gt;
&lt;li&gt;“Internet Privacy in India,” Centre for Internet and Society, http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Vivek Pai, “Indian Government says it is still drafting privacy law, but doesn’t give timelines,” Medianama, May 4, 2016, http://www.medianama.com/2016/05/223-government-privacy-draft-policy/.&lt;/li&gt;
&lt;li&gt;Information Technology (Intermediaries Guidelines) Rules, 2011,&lt;br /&gt; http://deity.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Discussion Points for the Meeting to be taken by Home Secretary at 2:30 pm on 7-10-11 to discuss the drat Privacy Bill, http://cis-india.org/internet-governance/draft-bill-on-right-to-privacy.&lt;/li&gt;
&lt;li&gt;Alan Westin, Privacy and Freedom (New York: Atheneum, 2015).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;US Secretary’s Advisory Committee on Automated Personal Data Systems, Records, Computers and the Rights of Citizens, http://www.justice.gov/opcl/docs/rec-com-rights.pdf.&lt;/li&gt;
&lt;li&gt;OECD Guidelines on the Protection of Privacy and Transborder Flows of Personal Data, http://www.oecd.org/sti/ieconomy/oecdguidelinesontheprotectionofprivacyandtransborderflowsofpersonaldata.htm&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Fred Cate, “The Failure of Information Practice Principles,” in Consumer Protection in the Age of the Information Economy, ed. Jane K. Winn (Burlington: Aldershot, Hants, England, 2006) http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1156972.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Amber Sinha and Scott Mason, “A Critique of Consent in Informational Privacy,” Centre for Internet and Society, January 11, 2016, http://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy.&lt;/li&gt;
&lt;li&gt;Daniel Solove, “Privacy self-management and consent dilemma,” Harvard Law Review 126, (2013): 1880.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Jonathan Obar, “Big Data and the Phantom Public: Walter Lippmann and the fallacy of data privacy self management,” Big Data and Society 2(2), (2015), doi: 10.1177/2053951715608876.&lt;/li&gt;
&lt;li&gt;Supra Note 12.&lt;/li&gt;
&lt;li&gt;Supra Note 14.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Paul Ohm, “Broken Promises of Privacy: Responding to the Surprising Failure of Anonymization” available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1450006; Arvind Narayanan and Vitaly Shmatikov, “Robust De-anonymization of Large Sparse Datasets” available at https://www.cs.utexas.edu/~shmat/shmat_oak08netflix.pdf.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;D. Hirsch, “That’s Unfair! Or is it? Big Data, Discrimination and the FTC’s Unfairness Authority,” Kentucky Law Journal, Vol. 103, available at: http://www.kentuckylawjournal.org/wp-content/uploads/2015/02/103KyLJ345.pdf&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;A Marthews and C Tucker, “Government Surveillance and Internet Search Behavior”, available at http://ssrn.com/abstract=2412564; Danah Boyd and Kate Crawford, “Critical Questions for Big Data: Provocations for a cultural, technological, and scholarly phenomenon”, Information, Communication &amp;amp; Society, Vol. 15, Issue 5, (2012).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Scott Mason, “Benefits and Harms of Big Data”, Centre for Internet and Society, available at http://cis-india.org/internet-governance/blog/benefits-and-harms-of-big-data#_ftn37.&lt;/li&gt;
&lt;li&gt;Cate, “The Failure of Information Practice Principles.”&lt;/li&gt;
&lt;li&gt;Solove, “Privacy self-management and consent dilemma,” 1882.&lt;/li&gt;
&lt;li&gt;Cate, “The Failure of Information Practice Principles.”&lt;/li&gt;
&lt;li&gt;Fred Cate and Viktor Schoenberger, “Notice and Consent in a world of Big Data,” International Data Privacy Law 3(2), (2013): 69.&lt;/li&gt;
&lt;li&gt;Solove, “Privacy self-management and consent dilemma,” 1883.&lt;/li&gt;
&lt;li&gt;Lokke Moerel, “Netherlands: Big Data Protection: How To Make The Draft EU Regulation On Data Protection Future Proof”, Mondaq, March 11. 2014, http://www.mondaq.com/x/298416/data+protection/Big+Data+Protection+How+To+Make+The+Dra%20ft+EU+Regulation+On+Data+Protection+Future+Proof%20al%20Lecture.&lt;/li&gt;
&lt;li&gt;Moerel, “Netherlands: Big Data Protection.”&lt;/li&gt;
&lt;li&gt;Centre for Information Policy Leadership, “A Risk-based Approach to Privacy: Improving Effectiveness in Practice,” Hunton and Williams LLP, June 19, 2014, https://www.informationpolicycentre.com/uploads/5/7/1/0/57104281/white_paper_1-a_risk_based_approach_to_privacy_improving_effectiveness_in_practice.pdf.&lt;/li&gt;
&lt;li&gt;Lokke Moerel and Corien Prins, “Privacy for Homo Digitalis: Proposal for a new regulatory framework for data protection in the light of Big Data and Internet of Things”, Social Science Research Network, May 25, 2016, http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2784123.&lt;/li&gt;
&lt;li&gt;EU Directive 95/46/EC – The Data Protection Directive, https://www.dataprotection.ie/docs/EU-Directive-95-46-EC-Chapter-2/93.htm.&lt;/li&gt;
&lt;li&gt;Article 29 Data Protection Working Party, “Opinion 06/2014 on the notion of legitimate interests of the data controller under Article 7 of Directive 95/46/EC,” http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2014/wp217_en.pdf.&lt;/li&gt;
&lt;li&gt;Frederico Ferretti, “Data protection and the legitimate interest of data controllers: Much ado about nothing or the winter of rights?,” Common Market Law Review 51(2014): 1-26. http://bura.brunel.ac.uk/bitstream/2438/9724/1/Fulltext.pdf.&lt;/li&gt;
&lt;li&gt;Sinha and Mason, “A Critique of Consent in Informational Privacy.”&lt;/li&gt;
&lt;li&gt;Moerel and Prins, “Privacy for Homo Digitalis.”&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle'&gt;https://cis-india.org/internet-governance/blog/digital-policy-portal-july-13-2016-new-approaches-to-information-privacy-revisiting-the-purpose-limitation-principle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-11-09T13:54:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/factordaily-pranesh-prakash-and-japreet-grewal-july-13-2016-no-india-did-not-oppose-un-move-to-make-internet-access-a-human-right">
    <title>No, India did NOT oppose the United Nations move to “make internet access a human right”</title>
    <link>https://cis-india.org/internet-governance/blog/factordaily-pranesh-prakash-and-japreet-grewal-july-13-2016-no-india-did-not-oppose-un-move-to-make-internet-access-a-human-right</link>
    <description>
        &lt;b&gt;Last Friday, the United Nations Human Rights Council (UNHRC) passed a resolution titled “The promotion, protection and enjoyment of human rights on the Internet.”&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Pranesh Prakash and Japreet Grewal &lt;a class="external-link" href="http://factordaily.com/no-india-not-oppose-united-nations-move-make-internet-access-human-right/"&gt;was published in Factordaily&lt;/a&gt; on July 13, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Several media outlets, including &lt;a href="http://www.theverge.com/2016/7/4/12092740/un-resolution-condemns-disrupting-internet-access"&gt;T&lt;/a&gt;&lt;a href="http://www.theverge.com/2016/7/4/12092740/un-resolution-condemns-disrupting-internet-access" target="_blank"&gt;he Verge&lt;/a&gt;, &lt;a href="http://indiatoday.intoday.in/technology/story/un-seeks-to-make-web-access-human-right-india-joins-saudi-arabia-in-opposing-it/1/707353.html"&gt;India Today&lt;/a&gt;, and &lt;a href="https://www.buzzfeed.com/sheerafrenkel/intentionally-banning-access-to-the-internet-is-not-ok-says?utm_term=.uxVr5YzNpQ#.xrwYvzrpLy" target="_blank"&gt;BuzzFeed&lt;/a&gt;,  reported that the resolution was ‘opposed’ by China, Russia, Saudi  Arabia, South Africa and India. The Verge, for instance, reported that  these countries “specifically opposed” a clause of the resolution that “&lt;i&gt;condemns unequivocally measures to intentionally prevent or disrupt access to or dissemination of information online&lt;/i&gt; &lt;i&gt;and calls for all countries to refrain from such measures&lt;/i&gt;”.   This is pure bunkum.  Some media organisations have also been reporting  that the UNHRC resolution “declares that access to the Internet is a  human right”. This too is fiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What’s the truth?  The UNHRC resolution covers wide ground, including  the reaffirmations of two previous resolutions, which stated that the  same rights that people have offline must also be protected online as  well.  As ARTICLE19, an international free speech NGO, &lt;a href="https://www.article19.org/resources.php/resource/38428/en/unhrc:-reject-attempts-to-weaken-resolution-on-human-rights-and-the-internet" target="_blank"&gt;notes&lt;/a&gt;:  “The draft resolution goes further than its predecessors, including by  stressing the importance of an accessible and open Internet to the  achievement of the Sustainable Development Goals, as well as in calling  for accountability for extrajudicial killings, arbitrary detentions and  other violations against people for expressing themselves online.”   Importantly, the resolution “unequivocally condemns” internet shutdowns,  such as the one that happened in Kashmir just last week after security  forces killed guerrilla Burhan Wani.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This resolution was, in fact, adopted without any opposition. So why the brouhaha over countries like India?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Here are the facts&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were four separate amendments, two of which were proposed by Belarus, China and Russia (referred as &lt;a href="https://documents-dds-ny.un.org/doc/UNDOC/LTD/G16/139/31/PDF/G1613931.pdf?OpenElement"&gt;L85&lt;/a&gt;, &lt;a href="https://documents-dds-ny.un.org/doc/UNDOC/LTD/G16/138/28/PDF/G1613828.pdf?OpenElement"&gt;L86&lt;/a&gt; in this article) and the other two were proposed by Belarus, China, Russia and Iran (referred as &lt;a href="https://documents-dds-ny.un.org/doc/UNDOC/LTD/G16/138/37/PDF/G1613837.pdf?OpenElement"&gt;L87&lt;/a&gt; and &lt;a href="https://documents-dds-ny.un.org/doc/UNDOC/LTD/G16/138/52/PDF/G1613852.pdf?OpenElement"&gt;L88&lt;/a&gt;).   None of these amendments comment on the paragraph in the resolution  that condemns intentional disruption of access or dissemination of  internet services. So the headlines in most of the reports are just  plain wrong. Let’s examine each of these four amendments one by one&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;b&gt;L85&lt;/b&gt;, an amendment was suggested to a paragraph  that refers to past resolutions by the UNHRC and the UN General Assembly  relating to freedom of expression and the right to privacy online. The  amendment, which proposed including a reference to a previous UNHRC  resolution on the rights of children online, was later withdrawn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;b&gt;L86&lt;/b&gt; the proposed amendments both added and  removed some text, and was hotly opposed by organisations like  ARTICLE19. The proposed amendment said that the same rights people have  offline must also be protected online, in particular, freedom of  expression and the right to privacy, in accordance with articles 17 and  19 of the International Covenant on Civil and Political Rights (ICCPR), a  multilateral treaty adopted by the United National General Assembly to  respect civil and political rights of individuals. Major additions: Some  text on right to privacy and a reference to Article 17 of the ICCPR,  which is about privacy. Major deletions: a reference to the Universal  Declaration on Human Rights, and language stating that that freedom of  expression is “applicable regardless of frontiers and through any media  of one’s choice”, which is present in article 19 of the ICCPR.  However,  article 19 of the ICCPR is incorporated by reference even in the  proposed amendment!  So is there a real loss in purely legal terms?  Not  really.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendments in &lt;b&gt;L87&lt;/b&gt; sought to replace the term  “human rights based approach” that stressed on the need to provide and  expand access to the internet, and to replace it with the term  “comprehensive and integrated approach.” The problem is that there is no  clarity about what a “human rights based approach” to providing and  expanding access to the internet is. What does it even mean? Is there a  “human rights based approach” to spectrum auctions and spectrum sharing?  Or the laying of fibre optic cables? Or anything else associated with  internet access?  If there is, indeed, a human rights based approach to  providing and expanding access to the internet, it should be spelt out,  rather than simply calling it that. Similarly, the term “comprehensive  and integrated approach” is equally vague.&lt;/p&gt;
&lt;div class="pullquote-align-left vcard perfect-pullquote" style="text-align: justify; "&gt;
&lt;blockquote&gt;
&lt;p&gt;Even  if one harbours reservations about these amendments, none of these  amendments could be reasonably be characterised as “opposing” the  condemnation of Internet shutdowns or “opposing” online freedoms.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Finally, in &lt;b&gt;L88&lt;/b&gt;, the amendments proposed that the UN  resolution should acknowledge concerns about using the internet and  information technology for spreading ideas about “racial superiority or  hatred, incitement to racial discrimination, xenophobia and related  intolerance.” In the light of this, it is difficult to understand how  adding concerns relating to hate speech to the resolution is seen as  “being opposed” to online freedoms, especially when there is no direct  action contemplated in the proposed amendment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, in Paragraph 9, gender violence is mentioned, and in  Paragraph 11, incitement to hatred is mentioned.  Adding an additional,  more specific reference can &lt;a href="https://www.article19.org/data/files/pdfs/conferences/iccpr-links-between-articles-19-and-20.pdf"&gt;hardly be construed as being opposed to online freedoms&lt;/a&gt;.  After all, states have a positive obligation to enact laws to prohibit  hate speech under Article 20 (2) of the ICCPR, which is a centrepiece of  international human rights law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if one harbours reservations about these amendments, none of  these amendments could be reasonably be characterised as “opposing” the  condemnation of Internet shutdowns or “opposing” online freedoms. And  factually, no states (including India, China, South Africa, Russia, and  more) voted against the resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A game of Chinese whispers&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So why did so many prominent news organisations around the world get  it so wrong? My theory is that it happened because organisation like  ARTICLE19 put out press releases on what they perceived as the  ‘weakening’ of the resolutions by the amendments examined above, and  their regret that even democratic states like India and South Africa  voted for these amendments.  This was wrongly portrayed in much of the  media as opposition by these countries to the resolution itself, to  online freedoms, and particularly as opposition to the idea of  condemning internet shutdowns.  Thanks to the Chinese whispers nature of  news reporting, this mistaken idea spread far and wide without any of  the reporters bothering to check the original UN documents.&lt;/p&gt;
&lt;div class="pullquote-align-right vcard perfect-pullquote" style="text-align: justify; "&gt;
&lt;blockquote&gt;
&lt;p&gt;It  is shameful if India condemns internet shutdowns at the UNHRC while  deploying them for purposes such as preventing cheating during an  examinations, during Ganesha &lt;i&gt;visarjan&lt;/i&gt;, during Eid, during wrestling matches, and during protests.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;However, regardless of the faulty reportage, there is a real crisis  in India, with organisations like Medianama and  the Software Freedom  Law Centre having counted at least nine internet shutdowns this year  alone, and at least 30 since 2013. It is shameful if India condemns  internet shutdowns at the UNHRC while deploying them for purposes such  as preventing cheating during an examinations, during Ganesha &lt;i&gt;visarjan&lt;/i&gt;, during Eid, during wrestling matches, and during protests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We at the Centre for Internet and Society have previously explained  why a Gujarat High Court order allowing for an internet shutdown during  riots &lt;a href="http://cis-india.org/internet-governance/blog/the-legal-validity-of-bans-on-internet-part-i"&gt;was wrong&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/the-legal-validity-of-internet-bans-part-ii"&gt;in law&lt;/a&gt;,  and violated our Constitution as well as our international human rights  obligations.  That is something the India media ought to be focussing  far more on, but aren’t.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lastly, it would also be welcome for the individual civil society  organisations that signed an open letter to UNHRC members to explain why  they too believed that these amendments would have significantly harmed  our freedoms online.  We see it instead as a case of ‘human rights  politics’ being played out, when none of the proposed amendments would  have had much of a negative legal impact, but only a political impact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Should civil society organisations really get worked up about these?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Edited by: &lt;a href="http://factordaily.com/author/pranav/"&gt;Pranav Dixit&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/factordaily-pranesh-prakash-and-japreet-grewal-july-13-2016-no-india-did-not-oppose-un-move-to-make-internet-access-a-human-right'&gt;https://cis-india.org/internet-governance/blog/factordaily-pranesh-prakash-and-japreet-grewal-july-13-2016-no-india-did-not-oppose-un-move-to-make-internet-access-a-human-right&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pranesh Prakash and Japreet Grewal</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-13T16:09:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case">
    <title>Tamil Nadu likely to hold Facebook accountable for suicide case</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case</link>
    <description>
        &lt;b&gt;The recent suicide of a 21-year-old woman from Salem district in Tamil Nadu over her morphed pictures being uploaded on Facebook could turn into a flash-point between the state police and the world's most-popular social networking site.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by V. Prem Shanker was &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/politics-and-nation/tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case/articleshow/53182832.cms"&gt;published in the Economic Times&lt;/a&gt; on July 13, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"We are exploring the possibility of holding Facebook accountable for the delay in responding to our requests since that was one of the factors which led to the young lady committing suicide," Salem superintendent of police Amit Kumar Singh told ET in an exclusive interaction. On June 23, the Salem police had received a complaint from the father of the 21-year-old stating that someone had uploaded her morphed nude pictures on Facebook. The father had requested the police to get the photographs removed from the site and also find and warn the perpetrator.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The police recorded the complaint the same evening and later sent what is called a 'Law Enforcement Online Request' to Facebook asking for details of the IP address from which the morphed photographs were uploaded on the website. Officials also requested Facebook to take down the objectionable photographs of the young woman.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Five days after the request was sent, Facebook responded with the IP address on June 28 and within 12 hours after that the police cracked the case and nabbed the suspect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, all this was a bit too late because the previous day, on June 27, the young woman had ended her life. Her morphed nude photographs were taken down only on the day of her death, according to the police.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Apart from addressing Facebook, we also investigated the case from other angles but couldn't make headway. Thus, there was nothing we could do about the pictures still being online apart from waiting for Facebook to act," Singh said, adding "enforcement of compliance is a matter of grave concern."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Officials are considering charging Facebook with abetment to suicide and including Facebook in the chargesheet if the site is found culpable after investigations. However, the state police is said to be discussing with legal experts on how this can be done as there is no precedent for a website having been charged in a crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook did not reply to an email seeking comment. Earlier in a communique, responding to criticisms of police inaction in this case, Singh had pointed out that "Only Facebook can block a page and it exercises this discretion as per its Facebook Community Standards and not the law of the land it is being viewed in. Facebook does not provide the police with any special powers to take down a page even if the police receive a cognizable complaint of identity theft and uploading of obscene content. There is no tool available, at least as of now, with the police to coerce or goad Facebook to act expeditiously even if the matter is very urgent and there is a flagrant violation of Indian law."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts point out that the disparity with which Facebook treats child abuse laws and copyright infringements as opposed to violation of women's rights is stark.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Look at the war against child pornography. In the United Kingdom there is an independent foundation that has immunity under UK child pornography law. They generate a database and circulate it across all platforms and ensure that it is kept absolutely squeaky clean," points out Sunil Abraham, executive director of Bengaluru based research organisation, Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There definitely needs to be a law to ensure that such platforms do not violate the law of the land, especially when it comes to women's rights. But in interim, the government can create an information escrow or a platform where the victims can place on record their problems and it is there for these sites to see and take action," Abraham added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case'&gt;https://cis-india.org/internet-governance/news/economic-times-v-prem-shanker-july-13-2016-tamil-nadu-likely-to-hold-facebook-accountable-for-suicide-case&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-13T13:44:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net">
    <title>Place for a safety net</title>
    <link>https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net</link>
    <description>
        &lt;b&gt;Vinupriya took her life last week, humiliated by the morphed images of her naked body posted on a social media site. Experts warn that the spike in Internet traffic brings with it an increase in online sexual crimes. Measures must be taken urgently to save lives, they tell T.V. Jayan.

&lt;/b&gt;
        &lt;p align="justify"&gt;&lt;a class="external-link" href="http://www.telegraphindia.com/1160710/jsp/7days/story_95759.jsp"&gt;The article was published in the Telegraph on July 10, 2016&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="justify"&gt;Sangeeta (not her name) was 25 and working for a private company in  Mumbai when she suddenly told her family that she was going to quit her  job and stay at home. Her parents were flummoxed, but questioning and  coaxing yielded no answers. As the days rolled on, the management  graduate slipped into depression. Her worried family took her to a  counsellor. And it was only then that she came out with her story.&lt;/p&gt;
&lt;p align="justify"&gt;Soon after she joined the company, Sangeeta got romantically involved  with her boss. By the time she learnt he was married, the involvement  had taken a physical turn. And when she tried to put an end to it, the  man, who had recorded their intimate moments, used the video clips to  blackmail her for sexual favours. After Sangeeta's confession and a  police complaint, the blackmailing boss was nabbed and put behind bars.&lt;/p&gt;
&lt;p align="justify"&gt;Vinupriya, an undergraduate student from Salem, Tamil Nadu, was not  so lucky. She found that her morphed images had been uploaded on  Facebook. She committed suicide last week after her parents refused to  believe her story, and the police failed to act swiftly.&lt;/p&gt;
&lt;p align="justify"&gt;Cyber experts are alarmed by the increase in online crimes against  women in India. According to them, what is more worrying is that though  the risks are catastrophic, the issues are not being addressed at a  larger level.&lt;/p&gt;
&lt;p align="justify"&gt;"Vinupriya's case is particularly frightening. I suspect this would  be the first of many such tragedies. They might even result in honour  killings, as such crimes can destroy the reputation of families," says  American cyber lawyer Parry Aftab, executive director of the voluntary  organisation, Wired Safety, which she founded 20 years ago, and which  deals extensively with cyber stalking and other crimes.&lt;/p&gt;
&lt;p align="justify"&gt;Earlier this week, a man was arrested in Delhi for sending obscene  messages to more than 1,500 women in the National Capital Region.  According to the police, the miscreant would randomly dial any number  and if the caller turned out to be a woman, he would save the number and  later check out her WhatsApp profile picture. He would then send  obscene clips to the woman. One news report said some of the marriages  were in trouble because husbands had seen the messages and suspected  that their wives were in a relationship with the man sending those  explicit messages.&lt;/p&gt;
&lt;p align="justify"&gt;Aftab has been studying the dangers of online stalking for a while.  There are no figures on this in India, but a top United Nations  official, stationed in New Delhi and dealing with trafficking, told her  that about 500 rape and sexual assault cases were recorded and shared  over WhatsApp in India this year.&lt;/p&gt;
&lt;p align="justify"&gt;She referred to a study conducted in the US that said one in three  girls and boys engaged in sexting. Children involved in sexting  contemplated suicide three times more than others of the same age, she  said.&lt;/p&gt;
&lt;p align="justify"&gt;According to her, Wired Safety volunteers come across five cases of  sextortion and sexting every day from Asian countries, including India,  and act upon them by red-flagging social media organisations where such  images are posted.&lt;/p&gt;
&lt;p align="justify"&gt;Pavan Duggal, a cyber lawyer based in Delhi, feels that social media  service providers are not doing enough to stop online sexual abuse.  "They are hiding behind a 2015 Supreme Court judgment, which said  content can be removed only on judicial orders or in response to  government notifications," he says.&lt;/p&gt;
&lt;p align="justify"&gt;The verdict he refers to was delivered in a case filed by a student  called Shreya Singhal. In 2012, two girls were arrested over their  Facebook post questioning the Mumbai shutdown for Shiv Sena patriarch  Bal Thackeray's funeral. The incident made an impression on Singhal, a  student of astrophysics at the University of Bristol, who was in India  at the time.&lt;/p&gt;
&lt;p align="justify"&gt;Upon research she discovered that Section 66(A) of India's IT Act was  subjective and any seemingly offensive social media post could land  anyone in jail. Singhal filed a writ petition in the Supreme Court  protesting that the section violated the constitutional right to freedom  of speech and expression, and in 2015, the apex court ruled in her  favour.&lt;/p&gt;
&lt;p align="justify"&gt;This judgment, however, emboldened cyber miscreants. "All the cyber  bullies and cyber stalkers now have a misplaced feeling that nothing can  happen to them," says Duggal. He points out that while the delivery of  justice takes time, the harassment happens 24x7.&lt;/p&gt;
&lt;p align="justify"&gt;"Who do the victims turn to for help? There are provisions in the  2011 IT rules that clearly say that social medial service providers  should have rules and regulations in place to deal with objectionable  content, but they do not act," he holds.&lt;/p&gt;
&lt;p align="justify"&gt;Aftab, however, believes that some efforts are in place. She cites  the example of Microsoft's PhotoDNA technology, which is used by many  social media and online search firms, including Facebook, Google and  Twitter, to prevent child pornography on the Internet. PhotoDNA works by  creating a number of mini hashes on a single image and combining them  to have a full hash. If anything is changed, even a pixel, then the hash  signature will not match.&lt;/p&gt;
&lt;p align="justify"&gt;But she holds that on a larger scale, it is difficult to  technologically deal with revenge porn, sextortion (using a sexual or  provocative image to blackmail people for sexual favours) and sexting  (sharing sexually provocative images of people, especially women) with  the intention of damaging reputation.&lt;/p&gt;
&lt;p align="justify"&gt;Sunil Abraham, executive director of the Bangalore-based Centre for  Internet and Society, hints at a lack of initiative on the part of the  social media organisations. "When it comes to enforcing intellectual  property, organisations like Facebook do an excellent job of keeping  their platform free of copyright infringement," he says. "So, clearly  these companies can police activities on their platform when it affects  their bottom-line."&lt;/p&gt;
&lt;p align="justify"&gt;And while this debate continues, more and more Indians join the  online experience, thereby increasing the chances of more such cases.  Aftab, who plans to set up a voluntary organisation relating to cyber  safety in India, says it is best to focus on proactive measures in the  interim.&lt;/p&gt;
&lt;p align="justify"&gt;Last month, she addressed 1,200 teenage girls from a Bangalore  college. "One of the first questions posed to me was from a young girl  who said she was currently being blackmailed by someone who threatened  to morph her pictures into sexually explicit images and send them to her  family and others. Morphed image issue seems to be a lot more serious  in India than in the West."&lt;/p&gt;
&lt;p align="justify"&gt;The problem, she stresses, is that such incidents can lead to  self-harm. To counter this, the affected person needs to inform his or  her family and enlist their support. Together, they should approach  social media organisations to ensure that the objectionable content is  removed in time. To prevent the offenders from doing further harm, they  then need to take the help of law enforcement agencies.&lt;/p&gt;
&lt;p align="justify"&gt;"The government for its part must amplify the voices of women and  hold these Internet corporations accountable for an information escrow.  There should be an independent mechanism to monitor whether Internet  platforms are taking complaints from women seriously," Abraham says.  Only then can a young girl like Vinupriya pluck up the courage to fight  online abuse.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net'&gt;https://cis-india.org/internet-governance/news/the-telegraph-july-10-2016-place-for-a-safety-net&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-13T02:45:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy">
    <title>Trans Pacific Partnership and Digital 2 Dozen: Implications for Data Protection and Digital Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy</link>
    <description>
        &lt;b&gt;In this essay, Shubhangi Heda explores the concerns related to data protection and digital privacy under the Trans Pacific Partnership (TPP) agreement signed recently between United States of America and eleven countries located around the pacific ocean region, across South America, Australia, and Asia. TPP  is a free trade agreement (FTA) that emphasises, among other things, the need for liberalising global digital economy. The essay also analyses the critical document titled ‘Digital 2 Dozen’ (D2D), which compiles the key action items within TPP addressing liberalisation of digital economy, and sets up the relevant goals for the member nations.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;1. &lt;strong&gt;&lt;a href="#1"&gt;Introduction&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;2. &lt;strong&gt;&lt;a href="#2"&gt;Analysis of TPP and D2D&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;2.1. &lt;strong&gt;&lt;a href="#2-1"&gt;Trans Pacific Partnership (TPP)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;2.2. &lt;strong&gt;&lt;a href="#2-2"&gt;Digital 2 Dozen (D2D)&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;3. &lt;strong&gt;&lt;a href="#3"&gt;Major Criticisms of the Digital Agenda of TPP&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;3.1. &lt;strong&gt;&lt;a href="#3-1"&gt;Data Protection&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;3.2. &lt;strong&gt;&lt;a href="#3-2"&gt;Digital Privacy&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;4. &lt;strong&gt;&lt;a href="#4"&gt;Implications of TPP for RCEP&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;5. &lt;strong&gt;&lt;a href="#5"&gt;Implications of TPP in the Context of EU Safe Harbour Judgement&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;6. &lt;strong&gt;&lt;a href="#6"&gt;Implications of TPP for India after US-India Cyber Relationship Agreement&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;7. &lt;strong&gt;&lt;a href="#7"&gt;Conclusion&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;8. &lt;strong&gt;&lt;a href="#8"&gt;Endnotes&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;9. &lt;strong&gt;&lt;a href="#9"&gt;Author Profile&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 id="1"&gt;1. Introduction&lt;/h2&gt;
&lt;p&gt;This essay explores the concerns related to data protection and digital privacy under the Trans Pacific Partnership (TPP) agreement signed recently between United States of America and eleven countries located around the pacific ocean region, across South America, Australia, and Asia &lt;strong&gt;[1]&lt;/strong&gt;. TPP is a free trade agreement (FTA) that emphasises, among other things, the need for liberalising global digital economy. The essay also analyses the critical document titled ‘Digital 2 Dozen’ (D2D), which compiles the key action items within TPP addressing liberalisation of digital economy, and sets up the relevant goals for the member nations. TPP requires the member countries to facilitate unhindered digital data flow across nations, for commercial and governmental purposes, which evidently have major implications for national and regional data protection and privacy regimes. These implications must also be seen in the context the recent judgement by  the EU Court of Justice against the validity of the EU-USA data transfer agreement of 2000. Further, the essay discusses the potential impacts that TPP/D2D might have on India, in the context of the ongoing USA-India Cyber Relationship dialogue. If the privacy concerns are not raised right now TPP might act as a model framework for future FTAs which will fail to encompass proper data protection and digital privacy regime within it.&lt;/p&gt;
&lt;h2 id="2"&gt;2. Analysis of TPP and D2D&lt;/h2&gt;
&lt;h3 id="2-1"&gt;2.1. Trans Pacific Partnership (TPP)&lt;/h3&gt;
&lt;p&gt;Trans Pacific Partnership (TPP) is a large multi-partner free trade agreement amongst twelve Asia-Pacific countries, which is closely led by geo-political and economic strategies of the USA. Countries started the negotiation of TPP in 2008 when USA joined Pacific Four (P-4) negotiations and in 2015 negotiations of TPP was concluded  and text  was released. Ministers from the member countries signed the agreement on February 4, 2016 &lt;strong&gt;[2]&lt;/strong&gt;. The main aim of TPP is to liberalise trade and investment beyond what is provided for within the WTO. It is also considered to be a strategic move by the US to counter the trade linkages that are being established in the Asian region. TPP largely covers topics of market access, and rules on various related issues such as intellectual property rights, labour laws, and environment standards &lt;strong&gt;[3]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Between 1992 -2012 there has been an upsurge in bilateral trade agreements being signed in Asia from 25 to 103 and the effect of these FTAs is called the ‘noodle bowl effect’. TPP is seen as framework which will replace these FTAs which  are causing the ‘noodle bowl effect’.While these FTAs are being replaced but with TPP being signed there are various bilateral arrangements signed along with TPP. USA has also stated that TPP will not affect the already existing NAFTA &lt;strong&gt;[4]&lt;/strong&gt;. While TPP is being concluded  there is another free trade agreement being negotiated between USA and EU , which is Trans Trade and Investment Partnership (TTIP). Both  TPP and TTIP  and are considered to be serving similar objective  which is to deal with new and modern trade issues. Also both the  agreements are US led and since negotiation for TPP are now finalised it may have a significant impact on TTIP &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;TPP is one of the first document which deals specifically with digital economy and applies across borders.  The main aims of TPP are to promote free flow of data across borders without data localisation. It aims to remove national clouts and regional internets. It also includes provisions to combat theft of trade secrets. It allows you to create transparent regulatory process with inputs from various stakeholders. It also aims to provide access to tools and procedures for conduct of e-commerce &lt;strong&gt;[6]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Some of the major criticism to TPP were regarding the issues related to &lt;strong&gt;[7]&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;environment, wherein it does not address the issue of climate change  and the language used in the agreement  is very weak;&lt;/li&gt;
&lt;li&gt;labour rights  provision mandates parties to adhere to the ILO provision  but it  does not seem to  provide for effective framework  and might not bring the desired change;&lt;/li&gt;
&lt;li&gt;investment chapter is seen to be controversial because of the investor state dispute settlement clause which will allow foreign investor to sue government over policies that might cause harm to them;&lt;/li&gt;
&lt;li&gt;e-commerce and telecommunication chapter raises major privacy concerns;&lt;/li&gt;
&lt;li&gt;intellectual property chapter wherein it includes controversial rules regarding pharmaceutical companies and data exclusivity apart from the privacy concerns.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 id="2-2"&gt;2.2 Digital 2 Dozen (D2D)&lt;/h3&gt;
&lt;p&gt;D2D is set of rules and aims which is specifically drafted to be followed for the trade agreements related to open internet and digital economy. More specific aims of TPP as provided within the ‘Digital 2 Dozen,’ aiming for more liberalised trade in digital goods and services, are &lt;strong&gt;[8]&lt;/strong&gt;:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;promoting free and open internet,&lt;/li&gt;
&lt;li&gt;prohibiting digital custom duties,&lt;/li&gt;
&lt;li&gt;securing basic non-discrimination principles,&lt;/li&gt;
&lt;li&gt;enabling cross-border data flows,&lt;/li&gt;
&lt;li&gt;preventing localization barriers,&lt;/li&gt;
&lt;li&gt;barring forced technology transfers,&lt;/li&gt;
&lt;li&gt;advancing innovative authentication methods,&lt;/li&gt;
&lt;li&gt;delivering enforceable consumer protections,&lt;/li&gt;
&lt;li&gt;safeguarding network competition,&lt;/li&gt;
&lt;li&gt;fostering innovative encryption products, and&lt;/li&gt;
&lt;li&gt;building an adaptable framework.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Strategic goal of the US in introducing D2D as goals of TPP has been to set up a trend within Asian region for all the trade agreements. It is expected to ensure that if TPP is a success, similar goals and policy frameworks will be followed for other trade agreements as we. For example, the USA-India partnership also enshrines similar aims and so does the USA-Korea partnership. Hence while India is not part of TPP, USA is nonetheless trying to get India into a partnership which is similar to the TPP. The language proposed by the USA in TPP negotiations  has always been supportive for cross border data flows as it claims that companies have mechanism to keep a privacy check and privacy would not be undermined, but countries like New Zealand and Australia which have strong privacy protection laws nationally have raised concerns which will be discussed in further sections &lt;strong&gt;[9]&lt;/strong&gt;. Also not only in  privacy rights but Digital Dozen initiative also affects other digital rights related to - excessive copyright terms  TPP proposed to extend the term of copyright to hundred years which deprive access to knowledge; as in the U.S motive to give more power to private entities , the  ISP obligations enumerated within TPP which puts freedom of expression and privacy at risk as ISPs are allowed to check for copyright infringement and TPP does not put any privacy restriction in this regard; introduction of new fair use rules; ban on circumvention of digital locks or DRMs; no compulsory limitation for persons with disabilities; lack of fair use for journalistic right; while net neutrality is major issue is many developing nations in Asia no effective provision for net neutrality is  aimed at in the D2D initiative; prohibits open source mandates which puts barrier for countries which want to release any software as open source as a policy decision &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="3"&gt;3. Major Issues Related to Data Protection and Privacy in the TPP&lt;/h2&gt;
&lt;h3 id="3-1"&gt;3.1. Data Protection&lt;/h3&gt;
&lt;p&gt;One of the major concern raised against TPP is regarding data protection provisions that have been integrated within the E- Commerce chapter of the agreement. Article 14.11 and Article 14 .13 are the ones that deal with data flow related to consumer information.Article 14.11 in the agreement puts a requirement on the member states to allow transfer of data across border and  Article 14.13 does not allow the companies to host data on local servers.  Concerns were raised in few member states for instance, Australian Privacy Foundation raised concerns over Article 14.11 which requires transfers to be allowed in context of business activities of service suppliers. It claimed that exception to this provision is very narrow and the repercussion for not following the exception is that investor state dispute settlement proceedings can be initiated, which is not sufficient to protect privacy. Also, it highlighted the issue that with the narrow exception provided under Article 14.13 which relates to prohibition on data localisation, it might have adverse effect on the implementation of national privacy laws within Australia &lt;strong&gt;[11]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Another provision which is of major concern is Article 14.13 which prohibit data localisation. It will raise problems for countries like Indonesia and China which will have to change their local laws to implement the provision &lt;strong&gt;[12]&lt;/strong&gt;. Since there already has been a major concern with regard to USA- EU Safe Harbour Agreement which was later  made subject to the ECJ’s ruling on data protection, which invalidated any arrangement which provides voluntary enterprises responsibility to enforce privacy. But both the USA and EU are in process of renegotiating the agreement.The major concern was that in EU data protection is a fundamental right while in USA data protection is more consumer centric. When similar concerns were raised in TPP negotiations, they were rebutted as USA claimed that FTA does not concern itself with data protection &lt;strong&gt;[13]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;In 2012 Australia proposed an alternative language to TPP which allowed countries to place restriction on data flow as long as it was not a barrier to trade. U.S responded to concerns raised by the Australia through a side letter which ensured Australia that U.S and Australia have a mutual understanding in relation to privacy and U.S will ensure the privacy of  data with regards to  Australia. While Australia’s concern was given acknowledgement other countries which raised similar issues were not given any assurances &lt;strong&gt;[14]&lt;/strong&gt;. US instead proposed ad- hoc strategy that gave private companies power to form privacy policy with implementation through state machinery &lt;strong&gt;[15]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3 id="3-2"&gt;3.2. Digital Privacy&lt;/h3&gt;
&lt;p&gt;Article 14.8 in the E- Commerce chapter of the  agreement states that countries can form legal framework for the protection of rights but the kind of ‘legal framework’ is not defined. Also, nowhere it states that the privacy protection or data protection laws are expressly exempted, rather it states that any such policy implemented by member states will be put under review of TPP standards. The standards which TPP proposes to follow are based on the underlying idea that any such policy should not hinder free trade in any way. This test will be applied by tribunals which are experts in trade and investment and not on data protection or human rights &lt;strong&gt;[16]&lt;/strong&gt;. While Article 14.8 provides for protection of private information of consumers but the footnote to the provision renders it ineffective. The footnote states that member countries can adopt legal framework for the protection of data which can be done by self-regulation by industry and does not provide for any comprehensive data protection obligation upon the member states &lt;strong&gt;[17]&lt;/strong&gt;. Similar to this Article 13.4 of the telecommunications chapter under TPP also states that  the countries can apply regulation regarding confidentiality of the messages as long as it is not “a means of arbitrary or unjustifiable discrimination or a disguised restriction on trade in services" &lt;strong&gt;[18]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;Another chapter which raises major concerns about the privacy rights is intellectual property. It affects privacy  through the provisions related to technological protective measures and the provision that regulate ISP’s liability. Regarding the TPM provision, the TPP follows the DMCA model whereby the exception to anti- circumvention provision is very narrow and does not apply to anti- trafficking provision. The exception allows user to circumvent TPM if it affect the user's privacy in any way, although this provision does not apply to ant- trafficking of TPM. The provision regarding ISP’s liability states that there should be cooperation between ISPs and rights holders and it does not prohibit ISPs to monitor its users. Also TPP proposes the notice for takedown and  identification of the infringer  by the ISP  but this  provision is not in consonance with  laws of member states, like that of Peru which does not have any copyright law on ISP . Also many countries have tried to introduce proper privacy laws along with implementation of ISP liability but that is not done within the TPP &lt;strong&gt;[19]&lt;/strong&gt;. TPP as whole aims to give greater power to private regulators without providing for minimum standard for protection of privacy.&lt;/p&gt;
&lt;p&gt;Although TPP  is not a data protection agreement but it consequently deals with various aspects of data protection, hence it is prospective model for privacy and data protection practices in future trade agreements. If positive obligations are included within the free trade agreements it will have an advancing impact on the data protection regime.&lt;/p&gt;
&lt;h2 id="4"&gt;4.Implications of TPP for RCEP&lt;/h2&gt;
&lt;p&gt;While TPP has such lacunas similar provision are proposed in RCEP to which India is a party and which will have serious implication as many of the countries have inadequate data protection laws nationally and with the introduction of such an FTA the exploitation of privacy rights will be rampant &lt;strong&gt;[20]&lt;/strong&gt;. To avoid this EU directive on data protection should be taken into consideration in the negotiations of such FTAs. But for the RCEP negotiations are still going on and in India many companies like Flipkart, Snapdeal etc. have started preparing for the changing norms. The government claims that it is going to accept best practices in the region which indicates that it is going to have same policies as that of TPP. Although people from industry have raised concerns that while there are national laws but it is difficult to check third party involvement within the business and it is becoming increasingly difficult to keep the consumer data confidential &lt;strong&gt;[21]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="5"&gt;5. Implications of TPP in the Context of  EU Safe-Harbour Judgement&lt;/h2&gt;
&lt;p&gt;Mr. Maximillian Schrems, an Austrian National residing in Austria, has been a user of the Facebook social network since 2008. Any person residing in EU who wishes to use Facebook is required to conclude, at the time of his registration, a contract with Facebook Ireland (a subsidiary of Facebook Inc. which itself is established in Unites States). Some or all of the personal data of the Facebook Ireland’s users who residing in EU is transferred to servers belonging to Facebook Inc. that are located in United States, where it undergoes processing. On 25 June 2013 Mr Schrems made a complaint to the commissioner by which he in essence asked the latter to exercise his statutory powers by prohibiting Facebook Ireland from transferring his personal data to Unites States, and this led to the &lt;em&gt;Maximillian Schrems v Data Protection Commissioner&lt;/em&gt; case &lt;strong&gt;[22]&lt;/strong&gt;. He contended that in his complaint that the law and practice in force in that country did not ensure adequate protection of the personal data held in its territory against the surveillance activities that were engaged in thereby by the public authorities. Mr Schrems referred in this regard to the revelations made by Edward Snowden concerning the activities of the United States intelligence services, in particular those of the NSA.(para 26, 27, 28). The case came in  the court ruled that “that a third country which ensures an adequate level of protection, does not prevent a supervisory authority of a Member State, within the meaning of Article 28 of the EU 94/46 directive as amended, from examining the claim of a person concerning the protection of his rights and freedoms in regard to the processing of personal data relating to him which has been transferred from a Member State to that third country when that person contends that the law and practices in force in the third country do not ensure an adequate level of protection. The ruling implies that personal data cannot be transferred to third country which does not provide adequate level of protection.&lt;/p&gt;
&lt;p&gt;EU safe harbour judgment and EU directive on privacy provide contrasting rules related to privacy. While TPP gives power to private entities to formulate rules regarding privacy while the recent  ECJ judgment  invalidated giving such power to private entities  under EU-US Safe Harbour Agreement. Also in context of the same judgment Hamburg’s Commissioner for Data Privacy And Freedom of Information announced an investigation into the data transfer taking place through Facebook and Google to U.S. Hence in the light of the recent judgment member states within EU are not allowed to permit cross border data flow, in contrast to this one of the main goals of TPP is to maintain free flow of data across border &lt;strong&gt;[23]&lt;/strong&gt;. EU is this regard has also set forth the proposal to introduce General Data Protection Regulation. (GDPR). Although U.S and EU are trying to renegotiate the agreement but the privacy concerns raised cannot be ignored. Hence following the same model as was invalidate  under the ECJ judgment lets US exploit privacy of member states  under TPP. Similar concerns as raised within the judgment are also raised in India as it also following the same model within U.S-India Cyber Relationship Agreement and in RCEP negotiations.&lt;/p&gt;
&lt;h2 id="6"&gt;6. Implications of TPP in the context of USA-India Cyber Relationship&lt;/h2&gt;
&lt;p&gt;While India is not part of TPP  but it might have an effect on the  U.S India Cyber Relationship Agreement. In August 2015 there was re- initiation of the India-U.S cyber dialogue to address common concerns related to cybersecurity and to develop better partnerships between public and private sector for betterment of digital economy &lt;strong&gt;[24]&lt;/strong&gt;. One of the key aim of this agreement is free flow of information between two nations, which suffers from similar problem that it will put privacy of the citizens at risk. Also India does not have any bilateral treaty which ensures cyber data protection in such a scenario the only solution is data localisation, but this agreement will put data at risk &lt;strong&gt;[25]&lt;/strong&gt;. Hence while the TPP negotiations were going on and also RCEP is being discussed the concerns about privacy and data protection need to be raised as mention in earlier section regarding implications of TPP on RCEP, the USA-India Cyber Relationship also faces the same implications..Although  the aim of USA-India Cyber Relationship is to ensure cybersecurity. After the cases of Muzaffarnagar riots, upheaval in  North -Eastern states  and Gujarat riots, India has realised it is important to ensure compliance from the social media companies. India sees the USA-India Cyber Relationship as an opportunity to achieve this goal. The Google Transparency Report states that that India made around three thousand requests to Google for user data &lt;strong&gt;[26]&lt;/strong&gt;, which indicate at the country's interest in having a common data understanding with the major social media companies (almost all of which are located in USA) about requesting and sharing of user activity data. While this concern is being addressed through the agreement, it is difficult to ignore the clause related to free flow of information, and if the meaning of the term is extended and adopted from TPP itself will put digital privacy of Indian citizens at risk &lt;strong&gt;[27]&lt;/strong&gt;.&lt;/p&gt;
&lt;h2 id="7"&gt;7. Conclusion&lt;/h2&gt;
&lt;p&gt;Even though TPP negotiation are completed but the ratification of the agreement is still underway. TPP is  being seen as one of a kind trade agreement because  it is the first time that countries across the globe have come together as a whole to address concerns of modern trade. Although it fails to address some of the key concerns related to  privacy and data protection which are becoming increasingly important. Data protection and privacy issues cannot be seen in isolation  and needs to merged within the modern day trade agreements. The D2D component by the USA is strategic move to have trade dominance in Asia  and to compete with China’s growth . TPP has privacy and data protection lacunae within the e- commerce , telecommunications and intellectual property discussion.Although it might have serious implications on RCEP negotiation and  USA- India Cyber Relationship Dialogue.  Similar concern regarding data protection has already been  addressed by ECJ judgment invalidating USA-EU  Safe Harbour Agreement but the similar ad - hoc strategy has been incorporated within TPP.  Since TPP might be considered as best practice model for  future FTAs in the Asian region it is important to raise and address these privacy concerns now.&lt;/p&gt;
&lt;h2 id="8"&gt;8. Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt;  The signatory countries include Australia, Canada, Japan, Malaysia, Mexico, Peru, United States of America, Vietnam, Chile, Brunei, Singapore, New Zealand. "The Trans-Pacific Partnership,"
&lt;a href="http://www.ustr.gov/tpp"&gt;http://www.ustr.gov/tpp&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; "The Origins and Evolution of the Trans-Pacific Partnership (TPP)," Global Research, &lt;a href="http://www.globalresearch.ca/the-origins-and-evolution-of-the-trans-pacific-partnership-tpp/5357495"&gt;http://www.globalresearch.ca/the-origins-and-evolution-of-the-trans-pacific-partnership-tpp/5357495&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; Fergusson, Ian F., Mark A. McMinimy &amp;amp; Brock R. Williams, "The Trans-Pacific Partnership (TPP): In Brief," (2015), &lt;a href="http://digitalcommons.ilr.cornell.edu/key_workplace/1477/"&gt;http://digitalcommons.ilr.cornell.edu/key_workplace/1477/&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; Gajdos, Lukas, &lt;em&gt;The Trans-Pacific Partnership and its impact on EU trade&lt;/em&gt;, Policy Department, Directorate-General for External Policies, Policy Briefing (2013), &lt;a href="http://www.europarl.europa.eu/RegData/etudes/briefing_note/join/2013/491479/EXPO-INTA_SP(2013)491479_EN.pdf"&gt;http://www.europarl.europa.eu/RegData/etudes/briefing_note/join/2013/491479/EXPO-INTA_SP(2013)491479_EN.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; Twining, Daniel, Hans Kundnani &amp;amp; Peter Sparding, &lt;em&gt;Trans-Pacific Partnership: geopolitical implications for EU-US relations&lt;/em&gt;, Policy Department, Directorate-General for External Policies, June 24 (2016), &lt;a href="http://www.europarl.europa.eu/RegData/etudes/STUD/2016/535008/EXPO_STU(2016)535008_EN.pdf"&gt;http://www.europarl.europa.eu/RegData/etudes/STUD/2016/535008/EXPO_STU(2016)535008_EN.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; USTR, "Remarks by Deputy U.S. Trade Representative Robert Holleyman to the New Democrat Network," &lt;a href="https://ustr.gov/about-us/policy-offices/press-office/speechestranscripts/2015/may/remarks-deputy-us-trade"&gt;https://ustr.gov/about-us/policy-offices/press-office/speechestranscripts/2015/may/remarks-deputy-us-trade&lt;/a&gt; (last visited Jul 4, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt;  Murphy, Katharine, "Trans-Pacific Partnership: four key issues to watch out for," The Guardian, November 6, 2015, &lt;a href="https://www.theguardian.com/business/2015/nov/06/trans-pacific-partnership-four-key-issues-to-watch-out-for"&gt;https://www.theguardian.com/business/2015/nov/06/trans-pacific-partnership-four-key-issues-to-watch-out-for&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; USTR, "The Digital 2 Dozen" (2016), &lt;a href="https://ustr.gov/sites/default/files/Digital-2-Dozen-Final.pdf"&gt;https://ustr.gov/sites/default/files/Digital-2-Dozen-Final.pdf&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; Fergusson, Ian F.m Mark A. McMinimy &amp;amp; Brock R. Williams, "The Trans-Pacific Partnership (TPP) negotiations and issues for congress," (2015), &lt;a href="http://digitalcommons.ilr.cornell.edu/key_workplace/1412/"&gt;http://digitalcommons.ilr.cornell.edu/key_workplace/1412/&lt;/a&gt; (last visited Jul 8, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; "How the TPP Will Affect You and Your Digital Rights," Electronic Frontier Foundation (2015), &lt;a href="https://www.eff.org/deeplinks/2015/12/how-tpp-will-affect-you-and-your-digital-rights"&gt;https://www.eff.org/deeplinks/2015/12/how-tpp-will-affect-you-and-your-digital-rights&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; Australian Privacy Foundation (APF), &lt;em&gt;Trans Pacific Partnership Agreement&lt;/em&gt; (2016), &lt;a href="https://www.privacy.org.au/Papers/Parlt-TPP-160310.pdf"&gt;https://www.privacy.org.au/Papers/Parlt-TPP-160310.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[12]&lt;/strong&gt; Greenleaf, Graham, "The TPP &amp;amp; Other Free Trade Agreements: Faustian Bargains for Privacy?," SSRN (2016), &lt;a href="http://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2732386"&gt;http://papers.ssrn.com/sol3/Papers.cfm?abstract_id=2732386&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[13]&lt;/strong&gt; "GED-Project: Transatlantic Data Flows and Data Protection," GED Blog (2015), &lt;a href="https://ged-project.de/topics/competitiveness/transatlantic-data-flows-and-data-protection-the-state-of-the-debate/"&gt;https://ged-project.de/topics/competitiveness/transatlantic-data-flows-and-data-protection-the-state-of-the-debate/&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[14]&lt;/strong&gt; Geist, Michael, "The Trouble with the TPP, Day 14: No U.S. Assurances for Canada on Privacy," (2016), &lt;a href="http://www.michaelgeist.ca/2016/01/the-trouble-with-the-tpp-day-14-no-u-s-assurances-for-canada-on-privacy/"&gt;http://www.michaelgeist.ca/2016/01/the-trouble-with-the-tpp-day-14-no-u-s-assurances-for-canada-on-privacy/&lt;/a&gt; (last visited Jul 4, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[15]&lt;/strong&gt; Aaronson, Susan Ariel, "What does TPP mean for the Open Internet?" From &lt;em&gt;Policy Brief on Trade Agreements and Internet Governance Prepared for the Global Commission on Internet Governance&lt;/em&gt; (2015), &lt;a href="https://www.gwu.edu/~iiep/events/DigitalTrade2016/TPPPolicyBrief.pdf"&gt;https://www.gwu.edu/~iiep/events/DigitalTrade2016/TPPPolicyBrief.pdf&lt;/a&gt; (last visited Jul 5, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[16]&lt;/strong&gt; Lomas, Natasha, "TPP Trade Agreement Slammed For Eroding Online Rights," TechCrunch, &lt;a href="http://social.techcrunch.com/2015/11/05/tpp-vs-privacy/"&gt;http://social.techcrunch.com/2015/11/05/tpp-vs-privacy/&lt;/a&gt; (last visited Jun 30, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[17]&lt;/strong&gt; "Q&amp;amp;A: The Trans-Pacific Partnership," Human Rights Watch (2016), &lt;a href="https://www.hrw.org/news/2016/01/12/qa-trans-pacific-partnership"&gt;https://www.hrw.org/news/2016/01/12/qa-trans-pacific-partnership&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[18]&lt;/strong&gt; "TPP Full Text Released," People Over Politics (2015), &lt;a href="http://peopleoverpolitics.org/2015/11/07/tpp-just-as-bad-as-you-thought/"&gt;http://peopleoverpolitics.org/2015/11/07/tpp-just-as-bad-as-you-thought/&lt;/a&gt; (last visited Jul 7, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[19]&lt;/strong&gt; "Right to Privacy in Trans-Pacific Partnership (TPP ) Negotiations," Knowledge Ecology International, &lt;a href="http://keionline.org/node/1164"&gt;http://keionline.org/node/1164&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[20]&lt;/strong&gt; Asian Trade Centre, "E-Commerce and Digital Trade Proposals for RCEP (2016)," &lt;a href="http://static1.squarespace.com/static/5393d501e4b0643446abd228/t/575a654c86db438e86009fa1/1465541967821/RCEP+E-commerce+June+2016.pdf"&gt;http://static1.squarespace.com/static/5393d501e4b0643446abd228/t/575a654c86db438e86009fa1/1465541967821/RCEP+E-commerce+June+2016.pdf&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[21]&lt;/strong&gt; "E-commerce companies like Flipkart, Snapdeal to beef up data security to meet RCEP norms," The Economic Times, &lt;a href="http://economictimes.indiatimes.com//articleshow/49068419.cms"&gt;http://economictimes.indiatimes.com//articleshow/49068419.cms&lt;/a&gt; (last visited Jul 1, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[22]&lt;/strong&gt; ECLI:EU:C:2015:650 (C -362/14)&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[23]&lt;/strong&gt; King et al., "Privacy law, cross-border data flows, and the Trans Pacific Partnership Agreement: what counsel need to know," Lexology, &lt;a href="http://www.lexology.com/library/detail.aspx?g=b5c0b400-8161-4439-a4b7-131552ad5209"&gt;http://www.lexology.com/library/detail.aspx?g=b5c0b400-8161-4439-a4b7-131552ad5209&lt;/a&gt; (last visited Jul 4, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[24]&lt;/strong&gt; "U.S.-India Business Council Applauds Resumption of Cybersecurity Dialogue," U.S.-India Business Council (2015), &lt;a href="http://www.usibc.com/press-release/us-india-business-council-applauds-resumption-cybersecurity-dialogue"&gt;http://www.usibc.com/press-release/us-india-business-council-applauds-resumption-cybersecurity-dialogue&lt;/a&gt; (last visited Jul 5, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[25]&lt;/strong&gt; Sukumar, Arun Mohan, "India Is Coming up Against the Limits of Its Strategic Partnership With the United States," The Wire (2016), &lt;a href="http://thewire.in/40403/india-is-coming-up-against-the-limits-of-its-strategic-partnership-with-the-united-states/"&gt;http://thewire.in/40403/india-is-coming-up-against-the-limits-of-its-strategic-partnership-with-the-united-states/&lt;/a&gt; (last visited Jul 4, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[26]&lt;/strong&gt;  Countries – Google Transparency Report, &lt;a href="https://www.google.com/transparencyreport/userdatarequests/countries/"&gt;https://www.google.com/transparencyreport/userdatarequests/countries/&lt;/a&gt; (last visited Jul 8, 2016).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[27]&lt;/strong&gt; Sukumar, Arun Mohan, "A case for the Net’s Ctrl+Alt+Del," The Hindu, September 5, 2015, &lt;a href="http://www.thehindu.com/opinion/op-ed/a-case-for-the-nets-ctrlaltdel/article7616355.ece"&gt;http://www.thehindu.com/opinion/op-ed/a-case-for-the-nets-ctrlaltdel/article7616355.ece&lt;/a&gt; (last visited Jul 5, 2016).&lt;/p&gt;
&lt;h2 id="9"&gt;9. Author Profile&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Shubhangi Heda&lt;/strong&gt; is a Student of Jindal Global Law School, O.P Jindal Global University. She has completed her fourth year. She gives due importance to popular culture in her life and loves to read fiction and like to watch TV-shows, her favorite being 'White Collar'.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy'&gt;https://cis-india.org/internet-governance/blog/tpp-and-d2-implications-for-data-protection-and-digital-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shubhangi Heda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Trans Pacific Partnership</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Free Trade Agreement</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    

   <dc:date>2016-07-12T07:56:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ciol-july-7-2016-india-may-not-be-guilty-of-opposing-un-move-to-save-internet-rights">
    <title>India may not be guilty of opposing UN move to save internet rights</title>
    <link>https://cis-india.org/internet-governance/news/ciol-july-7-2016-india-may-not-be-guilty-of-opposing-un-move-to-save-internet-rights</link>
    <description>
        &lt;b&gt;India is a democratic country, but the standards for freedom of expression promised to us—online and offline—are highly questionable, especially with online content being censured and comedians being threatened to be arrested for sedition.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://www.ciol.com/india-may-not-be-guilty-of-opposing-un-move-to-save-internet-rights/"&gt;published by Ciol&lt;/a&gt; on July 7, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;So the media criticism came as no surprise when India supported the  amendments proposed by countries like China and Russia last week when  the United Nations Human Rights Council (UNHRC) passed a &lt;a href="http://www.ciol.com/internet-access-is-a-basic-human-right-un-resolution/" target="_blank"&gt;resolution&lt;/a&gt; on the “promotion, protection and enjoyment of human rights on the Internet”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to some media reports, countries like Russia, China, and  Saudi Arabia, as well as democracies like South Africa and India, called  for the UN to delete a passage in the resolution that ‘condemns  unequivocally measures to intentionally prevent or disrupt access to our  dissemination of information online’.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has also been struggling to draft a comprehensive privacy bill,  and most recently came out with a geospatial information regulation  bill that would establish ownership over all forms of location data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the fact that the resolution was adopted without a vote  (with oral revision)—as noted by the UNHRC—puts these news reports on a  faulty ground. So technically, India did not ‘vote against’ the  resolution. Moreover, none of the four amendments supported by India  called for the deletion of a passage that condemned the prevention or  disruption of Internet access and online information dissemination, as  noted by the Centre for Internet and Society. Although, India flouts the  said clause in spirit, back at home.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Out of the four amendments—L85-88 in the UNHRC resolution–the first  amendment (L85) sought to include a reference to fighting against the  exploitation of children online. This was withdrawn by Russia before it  was considered by member states. L86 can truly be described as diluting  language regarding freedom of expression online. L88 includes reference  to hate speech, asks to introduce a new paragraph that states “Expresses  its concern at the use of the Internet and information and  communications technology to disseminate ideas based on racial  superiority or hatred, and incitement to racial discrimination,  xenophobia, and related intolerance.” This amendment was proposed by  Belarus, China, Iran and the Russian Federation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering that the Internet and other online media technologies are  increasingly used for incitement and as a means of propagating  intolerance and xenophobia in India and other Asian countries, the  resolution does touch on an important issue. But it doesn’t seek to  limit internet freedom particularly.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ciol-july-7-2016-india-may-not-be-guilty-of-opposing-un-move-to-save-internet-rights'&gt;https://cis-india.org/internet-governance/news/ciol-july-7-2016-india-may-not-be-guilty-of-opposing-un-move-to-save-internet-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-09T02:58:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights">
    <title>India No Haven For Net Freedom But It Did Not Oppose UN Move on Internet Rights</title>
    <link>https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights</link>
    <description>
        &lt;b&gt;India hasn’t had the best record when it comes to Internet rights. The country regularly carries out Internet shutdowns under flimsy pretexts, is still fumbling when it comes to the drafting of a comprehensive privacy bill, and most recently came out with a geospatial information regulation bill that would establish ownership over all forms of location data.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://thewire.in/49131/india-internet-resolution-freedom-rights-vote/"&gt;The article by Anuj Srinivas was published in the Wire on July 6, 2016&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;So, last week, when the United         Nations Human Rights Council (UNHRC)&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://www.ohchr.org/EN/NewsEvents/Pages/DisplayNews.aspx?NewsID=20226&amp;amp;LangID=E" rel="external nofollow" target="_blank" title="passed"&gt;passed&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;a resolution on the         “promotion, protection and enjoyment of human rights on the         Internet”, it wasn’t surprising to see the wave of media         criticism of the amendments that were proposed by countries such         as China and Russia – and which were supported by India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;South Africa’s &lt;i&gt;Mail &amp;amp; Guardian&lt;/i&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://mg.co.za/article/2016-07-04-sa-votes-against-internet-freedoms-in-un-resolution" rel="external nofollow" target="_blank" title="ran "&gt;ran&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;a story headlined         “South Africa votes with China, Russia and India against         Internet freedoms in UN resolution”. &lt;i&gt;Private Internet           Access’s &lt;/i&gt;&lt;a href="https://www.privateinternetaccess.com/blog/2016/07/these-17-countries-dont-believe-that-freedom-of-expression-on-the-internet-is-a-human-right/" rel="external nofollow" target="_blank" title="headline"&gt;headline&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;was “These 17 Countries         Don’t Believe that Freedom of Expression on the Internet is a         Human Right”. Popular tech website &lt;i&gt;The Verge&lt;/i&gt; &lt;a href="http://www.theverge.com/2016/7/4/12092740/un-resolution-condemns-disrupting-internet-access" rel="external nofollow" target="_blank" title="noted"&gt;noted&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;that the resolution was         opposed “by a minority of authoritarian regimes including         Russia, China and Saudi Arabia, as well as democracies like         South Africa and India. These nations called for the UN to         delete a passage in the resolution that ‘condemns unequivocally         measures to intentionally prevent or disrupt access to our         dissemination of information online’.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The Verge&lt;/i&gt;‘&lt;i&gt;s &lt;/i&gt;report was followed up         by a number of Indian publications including &lt;i&gt;&lt;a href="http://indiatoday.intoday.in/technology/story/un-seeks-to-make-web-access-human-right-india-joins-saudi-arabia-in-opposing-it/1/707353.html" rel="external nofollow" target="_blank" title="IndiaToday"&gt;IndiaToday&lt;/a&gt; &lt;/i&gt;and &lt;i&gt;&lt;a href="http://www.medianama.com/2016/07/223-right-to-internet-un-resolution/" rel="external nofollow" target="_blank" title="Medianama"&gt;Medianama&lt;/a&gt; – &lt;/i&gt;the         latter incorrectly stating that the UNHRC resolution “recognised         Internet usage as a basic human right – as well a host of other&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="https://www.privateinternetaccess.com/blog/2016/07/these-17-countries-dont-believe-that-freedom-of-expression-on-the-internet-is-a-human-right/" rel="external nofollow" target="_blank" title="global           publications"&gt;global publications&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The facts&lt;/b&gt;&lt;br /&gt; There were two fundamental mistakes with some of these reports.         Firstly, the resolution was adopted without vote (with oral         revision) &lt;a href="http://tion%20which%20recognized%20internet%20usage%20as%20a%20basic%20human%20right./" rel="external nofollow" target="_blank" title="as noted"&gt;as noted&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;by the UNHRC. Therefore,         while there were a number of countries which co-sponsored the         resolution and many that didn’t, it is completely wrong to state         that India – as the&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;i&gt;Mail           &amp;amp; Guardian &lt;/i&gt;reported – or any other country, voted         against the resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondly, as&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="https://twitter.com/pranesh/status/750257769844871168" rel="external nofollow" target="_blank" title="noted"&gt;noted&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;by the Centre for         Internet and Society, none of the four amendments supported by         India called for the deletion of a passage that condemned the         prevention or disruption of Internet access and online         information dissemination. Although it may fit neatly within         India’s history of issuing Internet block orders, no country was         opposed to this paragraph at the UNHRC forum (although many         countries including India flout this clause in spirit back at         home). No such amendment was proposed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What then were these four amendments, which &lt;i&gt;Article           19&lt;/i&gt;, an organisation that advocates freedom of expression,&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="https://www.article19.org/resources.php/resource/38428/en/unhrc:-reject-attempts-to-weaken-resolution-on-human-rights-and-the-internet" rel="external nofollow" target="_blank" title="stated "&gt;stated&lt;/a&gt;would         “substantially weaken the resolution”? Out of the four         amendments (referred to as L85-88 in the UNHRC resolution), the         first amendment (L85) – which sought to include a reference to         fighting against the exploitation of children online – was         withdrawn by Russia before it was considered by member states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other three amendments, while not completely         endorsed by the countries that co-sponsored the resolution, do         carry a certain level of nuance. Only one of the amendments         (L86) can truly be described as diluting language regarding         freedom of expression online, although this could have been         potentially a result of procedural politics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;L88: Including Reference to Hate Speech&lt;/b&gt;&lt;br /&gt; This amendment – proposed by Belarus, China, Iran and the         Russian Federation – asks to introduce a new paragraph that         states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Expresses its concern at the use of the         Internet and information and communications technology         to disseminate ideas based on racial superiority or hatred, and         incitement to racial discrimination, xenophobia and related         intolerance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Article 19&lt;/i&gt; &lt;a href="https://www.article19.org/resources.php/resource/38428/en/unhrc:-reject-attempts-to-weaken-resolution-on-human-rights-and-the-internet" rel="external nofollow" target="_blank" title="says of this           amendment"&gt;says of this           amendment&lt;/a&gt; that it would “undermine the intended focus of         the draft resolution on protecting human rights online, in         particular freedom of expression..” While it is true that a few         paragraphs of the resolution’s preamble include a reference to         hate speech, it is difficult to see what harm this amendment         would have brought in and even more difficult to accept that it         would dilute the focus of the overall resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Using the Internet and other online media technologies         for incitement and as&lt;a href="http://www.bbc.com/news/world-asia-india-19292572" rel="external nofollow" target="_blank" title=" a means "&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;a means&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/a&gt;of propagating         intolerance and xenophobia is a very real problem in India and         other Asian countries, the most notable example of which was the         role that social media played in the exodus of north-east Indian         migrants from Bangalore four years ago. While shutdowns are         obviously not the best way of dealing with this, it is important         to acknowledge the role of the Internet as a medium in this         aspect. In sum, this amendment certainly would not have diluted         the resolution’s aim of promoting freedom of expression online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;L87: Human-Rights Approach&lt;/b&gt;&lt;br /&gt; The second amendment replaces the term “human rights-based         approach” with “comprehensive and integrated approach” in  two         paragraphs on expanding Internet access:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;PP17: &lt;/span&gt;&lt;span&gt;Stressing the importance of applying           a&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;comprehensive           and integrated&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/b&gt;(&lt;span&gt;human rights-based&lt;/span&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;approach)           in providing and expanding access to the Internet and for the           Internet to be open, accessible and nurtured by           multistakeholder participation,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;OP5: &lt;/span&gt;&lt;span&gt;Affirms also the importance of           applying a&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;comprehensive           and integrated&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/b&gt;(&lt;span&gt;human rights-based&lt;/span&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;approach)           in providing and in expanding access to Internet and requests           all States to make efforts to bridge the many forms of digital           divides..&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This amendment was a little trickier. According to         people involved in the country stakeholder discussions, whom &lt;i&gt;The           Wire&lt;/i&gt;spoke with, the aversion to a ‘human-rights’ approach         towards expanding Internet access came as a result of China and         Russia playing procedural politics. The language that was         proposed in the amendment – “comprehensive and integrated” –         while certainly not the strongest possible language that could         have been used, would not have legally diluted the proposal to         expand Internet access while maintaining an open and         multistakeholder approach towards Internet governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Stepping back, what would a human rights-based         approach in expanding Internet access look like? Would it         include legitimising the act of zero-rating and the approval of         schemes such as Facebook’s Free Basics? Both of which,         incidentally, have been banned in India. While the proposed         amendment certainly does not speak well of the motivations of         China, Russia and India, the term is also vague enough that its         mere removal doesn’t indicate a lack of support towards Internet         freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;L88 – Right to privacy and removal of UDHR           reference&lt;/b&gt;&lt;br /&gt; This amendment, proposed by China and the Russian Federation,         was more straightforward. In two paragraphs, it sought to add         the specific term ‘right to privacy’, while in another paragraph         it proposed removing reference to language from, and articles         in, the&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://www.un.org/en/universal-declaration-human-rights/" rel="external nofollow" target="_blank" title="Universal           Declaration of Human Rights"&gt;Universal           Declaration of Human Rights&lt;/a&gt;.  Had the amendment been         passed, the changes in the following paragraphs would have been         made:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;PP7: &lt;/span&gt;&lt;i&gt;&lt;span&gt;Noting&lt;/span&gt;&lt;/i&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;that           the exercise of human rights, in particular the right to           freedom of expression&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;and           the right to privacy&lt;/b&gt;&lt;span&gt;, on           the Internet is an issue of increasing interest and importance           as the rapid pace of technological development enables           individuals all over the world to use new information and           communication technologies,&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;OP15: &lt;/span&gt;&lt;i&gt;&lt;span&gt;Decides&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/i&gt;&lt;span&gt;to continue its consideration of the           promotion, protection and enjoyment of human rights, including           the right to freedom of expression&lt;/span&gt;&lt;b&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;and the right to           privacy&lt;/b&gt;&lt;span&gt;, on the Internet           and other information and communication technology, as well as           of how the Internet can be an important tool for fostering           citizen and civil society participation, for the realisation           of development in every community and for exercising human           rights, in accordance with its programme of work.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;OP1: &lt;/span&gt;&lt;i&gt;&lt;span&gt;Affirms&lt;/span&gt;&lt;/i&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;that           the same rights that people have offline must also be           protected online, in particular freedom of expression&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;del&gt;which is applicable regardless             of frontiers and through any media of one’s choice&lt;/del&gt;, &lt;/span&gt;&lt;b&gt;and           the right to privacy &lt;/b&gt;&lt;span&gt;in           accordance with articles&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;17           and&lt;/b&gt;&lt;span&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;19 of the&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;del&gt;Universal Declaration of Human             Rights and the&lt;/del&gt; &lt;/span&gt;&lt;span&gt;&lt;a href="http://www.ohchr.org/en/professionalinterest/pages/ccpr.aspx" rel="external nofollow" target="_blank" title="International             Covenant on Civil and Political Rights;"&gt;International Covenant on Civil and             Political Rights;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On one hand, this amendment would have added specific         reference to the right to privacy. That specific term doesn’t         appear in the draft resolution, although there are a few         references to privacy in general in the resolution’s preamble.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the addition of a ‘right to privacy’ is         coupled with a watering down of clear references to the         protection of freedom of expression.   Cynical observers would         rightly note that China and Russia are probably less concerned         with online privacy and more irked with the clear support of         freedom of expression “regardless of frontiers” and “in         accordance with the Universal Declaration of Human Rights”;         which is probably why this particular proposed amendment         combined both issues to improve its chances of passing. While         there is little doubt that this amendment would have diluted the         resolution’s focus on protecting freedom of expression, the         alternative phrasing also doesn’t create legal loopholes that         renders it useless. Moreover, it still contains reference to the         International Covenant on Civil and Political Rights, especially         Article 19, which goes beyond Article 19 of the UDHR .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;India, a guardian?&lt;/b&gt;&lt;br /&gt; It would be naive and wrong to take a strong position either         way. To state that the amendments supported by India are         all antithetical to the spirit of the UNHRC resolution, as some         have done, is simply incorrect. On the other hand, this doesn’t         mean India, and even less, China and Russia, are guardians of         Internet freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UNHRC resolution in its entirety&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://www.un.org/ga/search/view_doc.asp?symbol=A/HRC/32/L.20" rel="external nofollow" target="_blank" title="is a fine           document"&gt;is a fine document&lt;/a&gt;.         While non-binding, it provides a foundation for claiming that         the same rights people have offline “must also be protected         online”. Other crucial sections state that governments “should         ensure accountability for all human rights violations and abuses         committed against persons for exercising their human rights         online”, while condemning “measures to intentionally prevent or         disrupt access to or dissemination of information online”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the amendments India supported may not wholly         oppose this resolution, it is also true that successive Indian         governments also do not have an admirable track-record         of upholding the resolution’s aims. Freedom for online speech         had to be reclaimed in the form of court judgements, with the         current government&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://www.newslaundry.com/2016/03/28/is-section-66a-coming-back/" rel="external nofollow" target="_blank" title="still           supporting regulations"&gt;still           supporting regulations&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;that         would allow it clamp down on online freedom of expression. In         certain states within the country, Internet shutdowns happen         without public explanations or justifiable reasoning. Over the         last four years, for instance, Jammu and Kashmir&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;&lt;a href="http://thewire.in/29857/jammu-kashmir-has-lost-18-days-of-mobile-internet-access-over-last-four-years/" target="_blank" title="has lost"&gt;has           lost&lt;/a&gt;&lt;span class="Apple-converted-space"&gt; &lt;/span&gt;18 days of         Internet access. While it may not have wholly opposed the UNHRC         resolution, the country still has a ways to go in terms of         Internet freedom.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights'&gt;https://cis-india.org/internet-governance/news/the-week-anuj-srinivas-july-6-2016-india-no-haven-for-net-freedom-but-did-not-oppose-un-move-on-internet-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-07-09T02:25:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/times-now-july-8-2016-flashpoint-troll-control-maneka-versus-ncw">
    <title>Flashpoint #TrollControl: Maneka versus NCW</title>
    <link>https://cis-india.org/internet-governance/news/times-now-july-8-2016-flashpoint-troll-control-maneka-versus-ncw</link>
    <description>
        &lt;b&gt;Amidst the debate over controlling online trolls - the proposal by Union Women and Child Development Minister to curb violence against women on the internet has triggered a fight between the minister and the National Commission for Women (NCW). &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While Maneka Gandhi asked the NCW to monitor the internet to control trolls against women - NCW Chief Lalitha Kumaramangalam questioning the feasibility of the Minister's proposal, saying the internet is too big a space to be monitored. Sunil Abraham was interviewed. Times Now Television interviewed Sunil Abraham on this. &lt;strong&gt;&lt;a class="external-link" href="http://www.timesnow.tv/videoshow/4491210.cms"&gt;Watch the video here&lt;/a&gt;&lt;/strong&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/times-now-july-8-2016-flashpoint-troll-control-maneka-versus-ncw'&gt;https://cis-india.org/internet-governance/news/times-now-july-8-2016-flashpoint-troll-control-maneka-versus-ncw&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-09T02:11:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace">
    <title>FB &amp; Google have already monopolised Indian cyberspace</title>
    <link>https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace</link>
    <description>
        &lt;b&gt;In an interview with Catch, Sunil Abraham, executive director of Center for Internet &amp; Society, puts the recent US-India cyber relationship framework into perspective. Abraham also talks about how Indian surveillance policies are outdated and why the country has failed to check the hegemonic tendencies of companies like Facebook and Google.&lt;/b&gt;
        &lt;p&gt;The &lt;a class="external-link" href="http://www.catchnews.com/science-technology/fb-google-have-already-monopolised-indian-cyberspace-1467505123.html/fullview"&gt;interview was published by Catch News&lt;/a&gt; on July 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy6_of_Sunil.png/@@images/d7f757de-b4fc-46a2-a9b3-cca0e46e32e7.png" alt="Sunil Abraham" class="image-inline" title="Sunil Abraham" /&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="quick_pill_news_description"&gt;US-India signed a cyber  relationship framework earlier this month.  Could you explain some of  the takeouts that may have important  implications in the near future?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the framework, both sides have made a "commitment to the multi-stakeholder model of Internet governance" - in immediate practical terms that means India will accept the Internet Assigned Numbers Authority (IANA) transition proposed for the Internet Corporation for Assigned Names and Numbers (ICANN). Unfortunately, as my colleague Pranesh Prakash points out "U.S. state control over the core of the internet's domain name system is not being removed by the transition that is currently underway."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India along with Brazil and other emerging powers should have insisted that the question of jurisdiction be addressed before the transition. We must remember, that the multi-stakeholder model is just a fancy name for open and participatory self-regulation by the private sector. While the multi-stakeholder model is useful as a complement to traditional state-led regulation, it cannot be used to protect human rights or ensure the security of a nation state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[That is precisely why - the very next sentence in the announcement for the the framework for the US-India Cyber Relationship says "a recognition of the leading role for governments in cyber security matters relating to national security". This is because ICANN-style multistakeholderism requires all stakeholders to be on "equal footing" without "distinct roles and responsibilities". In other words, the governments are saying that the multistakeholder model is fine for all Internet Governance areas with the exception of Cyber Security. Given the limits of the multistakeholder model this is indeed the wise thing to do. Since American corporations dominate the Internet, US foreign policy has historically pushed for the multistakeholder model as fig leaf for forbearance and reduced foreign regulatory burden American corporations operating in other jurisdictions. Therefore India must not drink the multistakeholder cool-aid whole sale. It cannot afford a laissez-faire approach where it waits for corporations to self-regulate - it must regulate whenever public interest or human rights are harmed. In other words, it must go beyond the multistakeholder model and produce appropriate regulation where necessary. Needless to add - it must also deregulate in areas where harms don't exist. Apart from this many of the details of the announcement are positive steps that will increase security in India and the USA, and indeed the also across the world.]&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="quick_pill_news_description"&gt;What are some aspects of Intellectual Property Rights that should be looked at, in the context of the framework?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There is some language around Intellectual Property Rights (IPR) that should be examined carefully too. The US corporations benefit from a maximalist IP regime. But Make in India, Digital India and Startup India all depend on flexibilities to the IP regime and therefore India should refuse signing. Trans-Pacific Partnership (TPP) obligations like the "Digital 2 Dozen" which the US is actively proselytizing across the Pacific. If we make that mistake, we will make zero progress in indigenous security research and product development and also many other areas of our economy, health sector and education sector will be severely compromised. Therefore it would be best to keep IP rights expansion and enforcement out of the framework for the US-India Cyber Relationship.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;span class="quick_pill_news_description"&gt;The PIL seeking a ban on  WhatsApp was refused by the SC recently.  Encrypted messaging services  like Telegram however, have been used in  the past by terror groups.  What's your take on such end-to-end  encryption services?&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Privacy and security are two sides of the same coin. You cannot have one without the other. End-to-end encryption is the basis for online privacy. End-to-end encryption is a pre-requisite for many legitimate actions of law abiding citizens online such as commerce, banking, tele-medicine, protection of intellectual property, witness/source protection, client confidentiality etc. Therefore, banning end-to-end encryption would mean the death of individual privacy and national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the government wants to promote cyber security it should promote the use of end-to-end encryption amongst law abiding citizens.&lt;br /&gt;&lt;br /&gt;Terrorist have to be stopped through targeted profiling, surveillance and interception. Big data analytics may be useful to watch for patterns in the meta data but there is no replacement for good old fashioned police work.&lt;br /&gt;&lt;br /&gt;Once suspects have been identified the encrypted channels can be compromised by:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Placing trojans on the end-user devices&lt;/li&gt;
&lt;li&gt;Performing man-in-the-middle attacks and&lt;/li&gt;
&lt;li&gt;Using brute force attacks with super computers.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Snowden's revelations have made it very clear that blanket and mass surveillance does not help foil terror attacks or stop organised crime. So far, research and government reports from across the world indicate that only a minority of terrorists use encryption. However, this situation may change.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;We don't have any proper encryption policy under the IT Act yet. What's taking so long and what are the key points that any policy in this matter must include in future?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We need many different types of encryption policies. We need a policy that mandates encryption and digital signature for all government personnel and also for all government transactions. We need policies that promote research and development in cryptography and mathematics. We need to update our criminal procedure code so that encrypted communications and data can be targeted by law enforcement and used effectively in the criminal justice process.&lt;/p&gt;
&lt;p&gt;However, we should not have any broad encryption policy that tries to regulate encryption as a technology. That would be a highly regressive move and will be impossible to enforce. That would breed contempt for rule of law.&lt;/p&gt;
&lt;h3&gt;Surveillance and the  tech around it has been contentious for various  governments. Where do  we stand vis-a-vis regulating surveillance  measures by the state?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Our   surveillance and interception laws are outdated. They need to be   modernized to deal with advancements in technology and also global   developments when it comes to data protection and privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In   fact, our organisation was part of a global effort called Necessary and   Proportionate which identified 13 principles to modernise surveillance   which are connected to various aspects such as Legality, Legitimate  aim,  Competent judicial authority, Integrity of communications and  systems  and more. Some of these principles may have to be customised  for the  Indian context. [For example, given the load on courts perhaps India should stay with executive authorization of interceptions and data access requests. However, getting the law correct is only half the job. For the law cannot fix what the technology has broken. Some surveillance projects are well designed. For ex. the NATGRID - from what I understand it is a standard and platform that which will allow 12 security, intelligence and law enforcement agencies to temporarily make unions of sub-sets of 21 data sources. These automated temporary databases will be created under existing data access provisions of the law. I also hope the NATGRID is also using cryptography to ensure the maintenance of a non-repudiable log that will identify all officers involved in authorizing the each request and accessing the resultant data. Unfortunately, other surveillance projects are unmitigated disasters. For example, UID or Aadhaar. Many Indians don't realize that Aadhaar is a surveillance project. Biometrics is just a fancy name for remote, covert and non-consensual identification technology. Using the UID database the government can identify every single Indian without their consent. The so called "consent layer" in the India Stack is being developed by volunteers outside the UIDAI to avoid transparency under the Right to Information Act. Nothing in the current layer of the "consent layer" allows citizens to revoke consent. There is no facility in the UID Act to delete yourself from the database. Identity information aka the UID number and authentication information aka your biometrics for about a billion Indians have been collected and stored in a centralized location. It is as if our parliamentarians have written an open letter to criminals and foreign governments says "here is the information you need to wreck whole sale damage - come and get it". Hopefully the Supreme Court will save us from this impending disaster.]&lt;/p&gt;
&lt;h3&gt;With a sluggish US market, India has  the biggest potential for  companies like FB &amp;amp; Google, next only to  China. Do you feel that in  the quest to take over the Indian market, FB  &amp;amp; Google are going to  monopolise cyberspace in India?&lt;/h3&gt;
&lt;p&gt;I   have news for you - they have already monopolised Indian cyberspace.   They have completely wiped out competition in certain domains.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One   of the many reasons they have done this is because we don't have laws   and regulations to temper their hegemonic tendencies. For example, we   could use data portability and interoperability mandates for social   media to spark competition in markets where there are entrenched  monopolies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Competition  law can be used to protect other firms  from abuse of market power.  Consumer protection law and privacy law  could be used to ensure that  user's rights are not compromised in the  race for market share. In  addition, a modern privacy law compliant with  the best practices in the  European Data Protection Regulation 2016,  would allow emerging Indian  companies to compete with giants like  Facebook and Google on a level  playing field. [Speaking of level playing field - only recently has the government introduced the "equalization levy". This was long overdue. Imagine the amount of tax that could have been collected so far and damage that has been done to competition. Regardless the current NDA government deserves our kudos for ensuring that Facebook and Google contribute their fair share of taxes. The new IPR Policy was also an opportunity to address the monopoly of Google and Facebook. There should have been a concerted attempt to use free/open source software, open standard and open content to bolster Indic language technologies. A billion dollars from every spectrum auction should be used to create incentives for Indian private sector, research and academic organisation who can contribute openly to the Indic cyberspace. This is the market where we can still build a highly competitive market. Today, given government inaction - millions of Indians are training Google's language platforms every time they use machine translation or speech to text technologies. This corpus of information will not be available for public interest research. Ideally we should also have Indians contributing to commons-based peer production projects like Wikipedia for their Indic language needs. Unfortunately the government totally missed this opportunity.]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace'&gt;https://cis-india.org/internet-governance/news/catch-news-asad-ali-july-3-2016-fb-and-google-have-already-monopolised-indian-cyberspace&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Google</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-07-08T15:59:46Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
