<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1641 to 1655.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/2014-12-17_DoT-32-URL-Block-Order.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/december-2014-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/global-voices-december-30-2014-indians-plead-for-net-neutrality-as-aitel-raises-data-charges"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/business-standard-december-26-2014-anita-babu-why-india-failed-to-discover-the-isis-twitter-handle"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/reply-to-rti-filed-with-bsnl-regarding-network-neutrality-and-throttling"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-december-10-2014-athira-a-nair-frndineed-an-app-for-passenger-safety"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ibn-live-december-8-2014-are-cab-apps-safe"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/resources/2014-12-17_DoT-32-URL-Block-Order.pdf">
    <title>Department of Telecommunications Order u/s. 69A IT Act Blocking 32 URLS</title>
    <link>https://cis-india.org/internet-governance/resources/2014-12-17_DoT-32-URL-Block-Order.pdf</link>
    <description>
        &lt;b&gt;On December 17, 2014, the Dept. of Telecommunications blocked 32 URLs (as it was ordered to do so by the by Dept. of Electronics &amp; IT — specifically the Designated Officer under section 69A of the Information Technology Act, 2000 and under the Information Technology (Procedures and Safeguards for Blocking of Access of Information by Public) Rules, 2009), those being:



01) https://justpaste.it/
02) http://hastebin.com
03) http://codepad.org
04) http://pastie.org
05) https://pasteeorg
06) http://paste2.org
07) http://slexy.org
08) http://paste4btc.com/
09) http://0bin.net
10) http://www.heypasteit.com
11) http://sourceforge.net/projects/phorkie
12) http://atnsoft.com/textpaster
13) https://archive.org
14) http://www.hpage.com
15) http://www.ipage.com/
16) http://www.webs.com/
17) http://www.weebly.com/
18) http://www.000webhost.com/
19) https://www.freehosting.com
20) https://vimeo.com/
21) http://www.dailymotion.com/
22) http://pastebin.com
23) https://gist.github.com
24) http://www.ipaste.eu
25) https://thesnippetapp.com
26) https://snipt.net
27) http://tny.ct (Tinypaste) 
28) https://github.com (gist-it) 
29) http://snipplr.com/
30) http://termbin.com
31) http://www.snippetsource.net
32) https://cryptbin.com&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/2014-12-17_DoT-32-URL-Block-Order.pdf'&gt;https://cis-india.org/internet-governance/resources/2014-12-17_DoT-32-URL-Block-Order.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2014-12-31T14:36:01Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/december-2014-bulletin">
    <title>December 2014 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/december-2014-bulletin</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) wishes you a very happy new year and welcomes you to the twelfth issue of the newsletter (December 2014). &lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Highlights&lt;/h2&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; CIS prepared a		&lt;a href="http://cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain"&gt;policy brief&lt;/a&gt; that 		identifies the problem areas with the current work flow being used to publish documents and proposes suitable modifications to make them easy to 		locate, authentic and accessible.&lt;/li&gt;
&lt;li&gt;NVDA team conducted two workshops. The first one was held at the Hyderabad Central University	&lt;a href="http://cis-india.org/accessibility/blog/telugu-e-speak-training-with-nvda-december-2014"&gt;for reading and writing in Telugu&lt;/a&gt;. The second one was held at the Blind Empowerment Foundation in Kolkata	&lt;a href="http://cis-india.org/accessibility/blog/bangla-e-speak-training-with-nvda-december-2014"&gt;for reading and writing in Bangla&lt;/a&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Nehaa Chaudhari participated in the 29&lt;sup&gt;th&lt;/sup&gt; WIPO-SCCR held in Geneva from December 8 to 12, 2014 and on behalf of CIS gave statements on 		&lt;a href="http://cis-india.org/a2k/blogs/wipo-sccr-29-cis-intervention-on-proposed-treaty-for-protection-of-broadcasting-organizations"&gt; the Proposed Treaty for the Protection of Broadcasting Organizations &lt;/a&gt; , 		&lt;a href="http://cis-india.org/a2k/blogs/cis-statement-on-limitations-and-exceptions-for-education-teaching-research-institutions-and-persons-with-disabilities"&gt; Limitations and Exceptions for Education, Teaching, Research Institutions and Persons with Disabilities &lt;/a&gt; , made a 		&lt;a href="http://cis-india.org/a2k/blogs/wipo-sccr-29-cis-second-brief-intervention-on-broadcast-treaty"&gt; brief pointed intervention on the Broadcast Treaty &lt;/a&gt; , and briefly interviewed Prof. Crews on his 		&lt;a href="http://cis-india.org/a2k/blogs/cis-intervention-questions-to-prof-kenneth-crews-on-limitations-and-exceptions-for-libraries-and-archives"&gt; Updated Study on Limitations and Exceptions for Libraries and Archives &lt;/a&gt; . &lt;/li&gt;
&lt;li&gt; Nehaa Chaudhari 		&lt;a href="https://cis-india.org/a2k/blogs/the-broadening-of-definitions-in-the-proposed-broadcast-treaty-compared-to-other-international-conventions"&gt; analyses the broadening of definitions/concepts in the Proposed Broadcast Treaty &lt;/a&gt; versus those in pre-existing international instruments.&lt;/li&gt;
&lt;li&gt;Maggie Huang, an intern at CIS as part of the Pervasive Technologies projects conducted interviews with fabless semiconductor industry professionals 	in Taiwan. The findings are highlighted in two separate blog entries. The first one 	&lt;a href="http://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-part-3"&gt; explores some of their views on the current intellectual property system &lt;/a&gt; and the second 	&lt;a href="http://cis-india.org/a2k/blogs/interviews-with-semiconductor-industry-part-4"&gt; explores the tension between market forces and governmental intervention in providing access to mobile technology &lt;/a&gt; .&lt;/li&gt;
&lt;li&gt;Tejaswini Niranjana, a distinguished fellow at CIS		&lt;a href="http://cis-india.org/openness/blog/the-hindu-december-6-2014-tejaswini-niranjana-beyond-the-language-tussle"&gt;wrote an op-ed in the Hindu&lt;/a&gt; telling readers to see the ongoing Sanskrit versus German controversy as a welcome opportunity to discuss the real and persistent problems of our 		education system. &lt;/li&gt;
&lt;li&gt; Vidushi Marda and Bhairav Acharya have co-authored a		&lt;a href="http://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"&gt;white pape&lt;/a&gt;r that seeks to identify aspects of 		privacy in Islamic Law and demonstrate that the notion of privacy was recognized and protected in traditional Islamic law. &lt;/li&gt;
&lt;li&gt; Ashna Ashesh and Bhairav Acharya have		&lt;a href="https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law"&gt;produced a white paper&lt;/a&gt; seeks to locate privacy in Classical Hindu Law, and by doing so, displace the notion that privacy is an inherently 'Western' concept that is the 		product of a modernist legal system. &lt;/li&gt;
&lt;li&gt; Vipul Kharbanda authored a		&lt;a href="https://cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality"&gt;white paper&lt;/a&gt; establishing the 		relationship between privacy and confidentiality. &lt;/li&gt;
&lt;li&gt; Geetha Hariharan in a 		&lt;a href="http://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure"&gt; blog entry examines the constitutional validity of Section 69A &lt;/a&gt; and the Blocking Rules. &lt;/li&gt;
&lt;li&gt; Shyam Ponappa in an 		&lt;a href="http://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-december-4-2014-a-roadmap-for-digital-india"&gt; article published by the Business Standard &lt;/a&gt; writes that India's current policies for telecommunications don't serve our interests and tells readers what must change. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/accessibility"&gt;Accessibility and Inclusion&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the Hans Foundation we are doing two projects. The first project is on creating a national resource kit of state-wise laws, policies and 	programmes on issues relating to persons with disabilities in India. CIS in partnership with CLPR (Centre for Law and Policy Research) compiled the 	National Compendium of Policies, Programmes and Schemes for Persons with Disabilities (29 states and 6 union territories). The publication has been finalised and is being printed. The draft chapters and the quarterly reports can be accessed on the	&lt;a href="http://cis-india.org/accessibility/resources/national-resource-kit-project"&gt;project page&lt;/a&gt;. The second project is on developing text-to-speech software for 15 Indian languages. The progress made so far in the project can be accessed	&lt;a href="http://cis-india.org/accessibility/resources/nvda-text-to-speech-synthesizer"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►NVDA and eSpeak&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Monthly Update&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="http://cis-india.org/accessibility/blog/december-2014-nvda-report.pdf"&gt;December 2014 Report&lt;/a&gt; (Suman Dogra; December 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/telugu-e-speak-training-with-nvda-december-2014"&gt;Telugu eSpeak Training with NVDA&lt;/a&gt; (Organized by NVDA team; Hyderabad Central University, Hyderabad; December 1-2, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/bangla-e-speak-training-with-nvda-december-2014"&gt;Bangla eSpeak training with NVDA&lt;/a&gt; (Organized by NVDA team; Blind Empowerment Foundation, Kolkata; December 19-20, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/events/training-in-e-speak-malayalam"&gt;Training in Use of eSpeak with Malayalam&lt;/a&gt; (Co-organized by CIS, DAISY Forum of India and Chakshumathi Assistive Technology Centre; Trivandrum; January 24 - 25, 2015, Trivandrum). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain"&gt; Availability and Accessibility of Government Information in Public Domain &lt;/a&gt; (Sunil Abraham, Nirmita Narasimhan, Beliappa, and Anandhi Viswanathan; December 9, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/accessibility/news/first-meeting-of-high-level-committee-on-national-policy-on-universal-electronic-accessibility"&gt; First meeting of the high level committee on National Policy on Universal Electronic Accessibility &lt;/a&gt; (Organized by the Department of Electronics and Information Technology; December 30, 2014; New Delhi). Sunil Abraham participated in this meeting. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/accessibility/news/e-gov-reach-december-15-2014-geetanjali-minhas-when-technology-is-able-but-mindset-is-not"&gt;&lt;b&gt; &lt;/b&gt;When technology is able but the mindset is not &lt;/a&gt; (Governance Now; December 1-15 issue). Sunil Abraham and Nirmita Narasimhan gave their inputs. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As part of the Access to Knowledge programme we are doing two projects. The first one (Pervasive Technologies) under a grant from the International 	Development Research Centre (IDRC) is for research on the complex interplay between pervasive technologies and intellectual property to support 	intellectual property norms that encourage the proliferation and development of such technologies as a social good. The second one (Wikipedia) under a 	grant from the Wikimedia Foundation is for the growth of Indic language communities and projects by designing community collaborations and partnerships 	that recruit and cultivate new editors and explore innovative approaches to building projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;►Pervasive Technologies&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the Pervasive Technologies project, Maggie Huang conducted interviews with fabless semiconductor industry professionals in Taiwan. The findings 	from the samples are highlighted in four part series. The third and fourth parts have been published:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/a2k/blogs/interviews-with-semi-conductor-industry-part-3"&gt;&lt;b&gt; &lt;/b&gt;[Open] Innovation and Expertise &amp;gt; Patent Protection &amp;amp; Trolls in a Broken Patent Regime &lt;/a&gt; (Maggie Huang; December 26, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/copyright-management-in-age-of-mobile-music"&gt; "Copyright Management in the Age of Mobile Music" - Living Methodology Document &lt;/a&gt; (Maggie Huang; December 26, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nehaa Chaudhari attended the 29&lt;sup&gt;th&lt;/sup&gt; WIPO-SCCR held in Geneva from December 8 to 12. The following are the outputs:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/wipo-sccr-29-cis-intervention-on-proposed-treaty-for-protection-of-broadcasting-organizations"&gt; 29th Session of the WIPO SCCR: CIS Intervention on the Proposed Treaty for the Protection of Broadcasting Organizations &lt;/a&gt; (Nehaa Chaudhari; December 9, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/wipo-sccr-29-cis-second-brief-intervention-on-broadcast-treaty"&gt; 29th Session of the WIPO SCCR: CIS- 2nd (brief) Intervention on the Broadcast Treaty &lt;/a&gt; (Nehaa Chaudhari; December 11, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/the-broadening-of-definitions-in-the-proposed-broadcast-treaty-compared-to-other-international-conventions"&gt; The Broadening of Definitions in the Proposed Broadcast Treaty Compared to Other International Conventions &lt;/a&gt; (Nehaa Chaudhari; December 11, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/cis-intervention-questions-to-prof-kenneth-crews-on-limitations-and-exceptions-for-libraries-and-archives"&gt; 29th Session of the WIPO SCCR: CIS Intervention: Questions to Prof. Kenneth Crews on his Updated Study on Limitations and Exceptions for Libraries 			and Archives &lt;/a&gt; (Nehaa Chaudhari; December 14, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/cis-statement-on-limitations-and-exceptions-for-education-teaching-research-institutions-and-persons-with-disabilities"&gt; 29th Session of the WIPO SCCR: Statement on the Limitations and Exceptions for Education, Teaching, Research Institutions and Persons with 			Disabilities &lt;/a&gt; (Nehaa Chaudhari; December 20, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/blogs/protection-of-broadcasting-organisations-under-proposed-broadcast-treaty"&gt; Protection of Broadcasting Organisations under the Proposed Treaty as Compared to Other International Conventions &lt;/a&gt; (Nehaa Chaudhari; December 21, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/a2k/news/kei-10-december-2014-the-broadcasting-treaty-a-solution-in-search-of-a-problem"&gt;&lt;b&gt; &lt;/b&gt;Save the Date - 10 December 2014: The Broadcasting Treaty: A Solution in Search of a Problem? &lt;/a&gt; (Organized at WIPO; December 10, 2014). Nehaa Chaudhari was a speaker at this side event. The details were originally published by Knowledge Ecology 		International. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/a2k/news/knowledge-ecology-international-sccr-29-public-interest-organizations-statements-regarding-the-broadcasting-treaty"&gt;&lt;b&gt; &lt;/b&gt;SCCR 29: Public Interest Organizations Statements regarding the Broadcasting Treaty &lt;/a&gt; (Knowledge Ecology International; December 9, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/news/knowledge-ecology-international-sccr-29-december-11-2014-libraries-archives-public-interest-ngos-q-a-with-dr-crews"&gt; SCCR 29 Libraries, Archives and Public Interest NGOs in Q&amp;amp;A with Dr. Crews &lt;/a&gt; (Knowledge Ecology International; December 11, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/news/ip-watch-catherine-saez-december-18-2014-wipo-study-on-copyright-exceptions-stimulates-broad-discussion-with-author"&gt; At WIPO, Study On Copyright Exceptions Stimulates Broad Discussion With Author &lt;/a&gt; (Catherine Saez; December 18, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/a2k/news/ip-watch-catherine-saez-december-19-2014-wipo-delegates-hear-concerns-of-ngos-on-exceptions-for-libraries"&gt; WIPO Delegates Hear Concerns of NGOs on Exceptions for Libraries (Catherine Saez; IP Watch &lt;/a&gt; ; December 19, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Wikipedia&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of the &lt;a href="http://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;project grant from the Wikimedia Foundation&lt;/a&gt; we have reached out to 	more than 3500 people across India by organizing more than 100 outreach events and catalysed the release of encyclopaedic and other content under the 	Creative Commons (CC-BY-3.0) license in four Indian languages (21 books in Telugu, 13 in Odia, 4 volumes of encyclopaedia in Konkani and 6 volumes in 	Kannada, and 1 book on Odia language history in English).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Newspaper Article&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/the-hindu-december-6-2014-tejaswini-niranjana-beyond-the-language-tussle"&gt;&lt;b&gt; &lt;/b&gt;Beyond the Language Tussle &lt;/a&gt; (Tejaswini Niranjana; The Samaja, November 17, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/odia-wikisource-campus-project-at-kiss"&gt;&lt;b&gt; &lt;/b&gt;Odia Wikisource campus project at Kalinga Institute of Social Sciences &lt;/a&gt; (Subhashish Panigrahi; December 3, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/publications-under-creative-commons-license"&gt; Several Publications Now Available under Creative Commons License &lt;/a&gt; (Subhashish Panigrahi; December 28, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/blog/odia-wikisource-workshop-new-delhi-december-14-2014"&gt;Odia Wikisource workshop at New Delhi&lt;/a&gt; (Subhashish Panigrahi; December 30, 2014). &lt;i&gt;The event was organized by CIS in collaboration with "The Intellects" on December 14&lt;/i&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;News and Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K team gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/article-in-dhatri"&gt;Odia Wikipedia&lt;/a&gt; (Dhatri; December 1, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/odiapua-december-1-2014-article-on-odia-wikipedia"&gt;Odia Wikipedia&lt;/a&gt; (Odiapua; December 1, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/new-indian-express-december-5-2014-diana-sahu-access-to-rare-books-made-easy"&gt; Access to Rare Books Made Easy &lt;/a&gt; (Diana Sahu; Indian Express; December 5, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/hindu-businessline-december-13-2014-tulu-wikipedia-gets-some-push"&gt; Tulu Wikipedia gets some push &lt;/a&gt; (Hindu Businessline; December 13, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/kannada-prabha-december-14-2014-tulu-wikipedia-presentation"&gt;Tulu Wikipedia&lt;/a&gt; (Kannada Prabha; December 14, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/tulu-wikipedia-december-15-2014-coverage-in-vijaya-karnataka"&gt;Tulu Wikipedia&lt;/a&gt; (Vijaya Karnataka; December 15, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/tulu-wikipedia-coverage-in-vijayavani"&gt;Tulu Wikipedia&lt;/a&gt; (VijayaVani; December 27, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/the-hans-india-december-31-2014-works-of-veerasalingam-pantulu-on-web"&gt; Works of Veerasalingam Pantulu on web &lt;/a&gt; (Hans India; December 31, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/sakshi-december-31-2014-wiki-winter-camp"&gt;Wiki Winter Camp - Coverage in Sakshi&lt;/a&gt; (Sakshi; December 31, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/eenadu-december-31-wiki-winter-camp"&gt;Wiki Winter Camp - Coverage in Eenadu&lt;/a&gt; (Eenadu; December 31, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Co-organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/events/odia-wikisource-sabha-2014"&gt;Odia Wikisource Sabha 2014&lt;/a&gt; (Co-organized by CIS-A2K and Odia Wikimedia Community; November 28, 2014). Subhashish Panigrahi participated in the event. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/news/ict-for-development"&gt;ICT for Development&lt;/a&gt; (Organized by Christ University; December 3, 2014). Dr. U.B. Pavanaja was a speaker at this event. &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/swatantra-2014-icfoss-december-18-20-2014-fifth-international-free-software-conference-in-kerala"&gt; Swatantra 2014: Fifth International Free Software Conference, Kerala &lt;/a&gt; (Organized by ICFOSS, Govt. of Kerala; Hotel Hycinth by Sparsa, Trivandrum; December 18 - 20, 2014). T. Vishnu Vardhan chaired a session on Wikimedia 		and Access to Knowledge in India and Rahimanuddin Shaik co-presented on Making DLI Accessible. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Openness&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/blog/department-of-science-and-technology-department-of-biotechnology-adopt-open-access-policy"&gt;&lt;b&gt; &lt;/b&gt;Department of Science and Technology &amp;amp; Department of Biotechnology adopt Open Access Policy &lt;/a&gt; (Anubha Sinha; December 29, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/openness/news/omidyar-network-december-11-2014-tech-for-citizen-engagement-2014"&gt;&lt;b&gt; &lt;/b&gt;Tech for Citizen Engagement 2014 &lt;/a&gt; (Organized by Omidyar Network; New Delhi; December 11, 2014). Sunil Abraham was a speaker in the session "Rules of Engagement: Emerging Trends in 		Citizen Outreach". &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/openness/news/swatantra-2014-icfoss-december-18-20-2014-fifth-international-free-software-conference-in-kerala"&gt; Swatantra 2014: Fifth International Free Software Conference, Kerala &lt;/a&gt; (Organized by ICFOSS, Govt. of Kerala; Hotel Hycinth by Sparsa, Trivandrum; December 18 - 20, 2014). Prof. Subbiah Arunachalam was a speaker and made a 		presentation on Open Science. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a href="http://cis-india.org/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;►Privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As part of our Surveillance and Freedom: Global Understandings and Rights Development (SAFEGUARD) project with Privacy International we are engaged in 	enhancing respect for the right to privacy in developing countries. During the month we published the following blog entries:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;White Papers&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law"&gt;&lt;b&gt; &lt;/b&gt;Locating Constructs of Privacy within Classical Hindu Law &lt;/a&gt; (Ashna Ashesh and Bhairav Acharya; December 29, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality"&gt; Relationship between Privacy and Confidentiality &lt;/a&gt; (Vipul Kharbanda; December 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"&gt;&lt;b&gt; &lt;/b&gt;Identifying Aspects of Privacy in Islamic Law &lt;/a&gt; (Vidushi Marda and Bhairav Acharya; December 14, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Events&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy"&gt;&lt;b&gt; &lt;/b&gt;Security, Governments, and Data: Technology and Policy &lt;/a&gt; (Co-organized by CIS and the Observer Research Foundation; January 8, 2015; New Delhi). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/cpdp-2015"&gt;CPDP 2015&lt;/a&gt; : The eighth international conference on computers, privacy and data protection will be held in Brussels from January 21 to 23, 2015. CIS is a moral 		supporter of CPDP. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights"&gt;&lt;b&gt; &lt;/b&gt;Security and Surveillance: A public discussion on Optimizing Security while Safeguarding Human Rights &lt;/a&gt; (CIS; December 19, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Free Speech&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under a grant from the MacArthur Foundation, CIS is doing research on the restrictions placed on freedom of expression online by the Indian government and 	contribute studies, reports and policy briefs to feed into the ongoing debates at the national as well as international level. As part of the project we 	bring you the following outputs:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cis-receives-information-on-icanns-revenues-from-domain-names-fy-2014"&gt;&lt;b&gt; &lt;/b&gt;ICANN reveals hitherto undisclosed details of domain names revenues &lt;/a&gt; (Geetha Hariharan; December 8, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/ianas-revolving-door"&gt; Revolving Door Analysis: IANA Stewardship Transition Coordination Group &lt;/a&gt; (Lakshmi Venkataraman; December 10, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/is-india2019s-website-blocking-law-constitutional-2013-i-law-procedure"&gt; Is India's website-blocking law constitutional? - I. Law &amp;amp; procedure &lt;/a&gt; (Geetha Hariharan; December 11, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;►Other&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Participation in Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws"&gt;&lt;b&gt; &lt;/b&gt;National Seminar on Cyber Security &amp;amp; Cyber Laws - Issues and Concerns &lt;/a&gt; (Organized by the Advanced Centre for Research, Development &amp;amp; Training in Cyber Laws &amp;amp; Forensics; National Law School of India University, 		Bangalore; December 27 - 28, 2014). Sharath Chandra Ram was part of a plenary session on "Multi-Disciplinary Challenges in Ensuring Cyber Security". &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/overview-constitutional-challenges-on-itact"&gt;&lt;b&gt; &lt;/b&gt;Overview of the Constitutional Challenges to the IT Act &lt;/a&gt; (Pranesh Prakash; December 15, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/blog/reply-to-rti-filed-with-bsnl-regarding-network-neutrality-and-throttling"&gt; Reply to RTI filed with BSNL regarding Network Neutrality and Throttling &lt;/a&gt; (Tarun Krishnakumar; December 22, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;--------------------------------- 	&lt;br /&gt; &lt;b&gt;&lt;a href="http://cis-india.org/news"&gt;News &amp;amp; Media Coverage&lt;/a&gt; &lt;/b&gt;&lt;br /&gt; --------------------------------- 	&lt;br /&gt; CIS gave its inputs to the following media coverage:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/livemint-december-5-2014-moulishree-srivastava-india-sees-biggest-improvement-in-internet-freedom"&gt; India sees biggest improvement in Internet freedom, says report &lt;/a&gt; (Moulishree Srivastava; Livemint; December 5, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/ibn-live-december-8-2014-are-cab-apps-safe"&gt;Are Cab Apps safe?&lt;/a&gt; (IBN Live; December 8, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/economic-times-december-10-2014-athira-a-nair-frndineed-an-app-for-passenger-safety"&gt; FrndiNeed; an app for passengers' safety &lt;/a&gt; (Athira A. Nair; Economic Times; December 10, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors"&gt; Thank You To Our 2014 Sponsors &lt;/a&gt; (Medianama; December 22, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/business-standard-december-26-2014-anita-babu-why-india-failed-to-discover-the-isis-twitter-handle"&gt; Why did India fail to discover the ISIS Twitter handle? &lt;/a&gt; (Anita Babu; Business Standard; December 26, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance"&gt; Targeting surveillance &lt;/a&gt; (Ajai Sreevatsan; The Hindu; December 28, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/the-hindu-businessline-december-31-2015-s-ronendra-singh-"&gt; Centre blocks 32 websites for security reasons, restores some later &lt;/a&gt; (S. Ronendra Singh; Hindu Businessline; December 31, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/ndtv-december-31-2014-dot-reportedly-orders-blocking-of-32-websites-including-github-archiveorg-sourceforge"&gt; DoT Reportedly Orders Blocking of 32 Websites Including GitHub, Archive.org, SourceForge &lt;/a&gt; (NDTV; December 31, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/livemint-december-31-2014-moulishree-srivastava-govt-blocks-32-websites"&gt; Govt blocks 32 websites, including Vimeo and Github &lt;/a&gt; (Moulishree Srivastava; Livemint; December 31, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/ib-times-jeff-stone-december-31-2014-sites-blocked-in-india-for-anti-india-content-from-isis"&gt; Vimeo, DailyMotion, Pastebin Among Sites Blocked In India For 'Anti-India' Content From ISIS &lt;/a&gt; (Jeff Stone; IB Times; December 31, 2014). &lt;/li&gt;
&lt;li&gt; &lt;a href="https://cis-india.org/internet-governance/news/times-of-india-anupam-saxena-december-31-2014-pastein-dailymotion-github-blocked-after-dot-order"&gt; Pastebin, Dailymotion, Github blocked after DoT order: Report &lt;/a&gt; (Anupam Saxena; The Times of India; December 31, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="http://cis-india.org/telecom"&gt;Telecom&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is involved in promoting access and accessibility to telecommunications services and resources and has provided inputs to ongoing policy discussions 	and consultation papers published by TRAI. It has prepared reports on unlicensed spectrum and accessibility of mobile phones for persons with disabilities 	and also works with the USOF to include funding projects for persons with disabilities in its mandate:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Newspaper Column&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-december-4-2014-a-roadmap-for-digital-india"&gt;&lt;b&gt; &lt;/b&gt;A Road Map for Digital India &lt;/a&gt; (Shyam Ponappa; Business Standard; December 3, 2014 and Organizing India Blogspot; December 4, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;&lt;a href="http://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS is building research clusters in the field of Digital Humanities. The Digital will be used as a way of unpacking the debates in humanities and social 	sciences and look at the new frameworks, concepts and ideas that emerge in our engagement with the digital. The clusters aim to produce and document new 	conversations and debates that shape the contours of Digital Humanities in Asia:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="https://cis-india.org/raw/the-spaces-of-digital"&gt;The Spaces of Digital&lt;/a&gt; (P.P.Sneha; December 30, 2014). &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is a non-profit research organization that works on policy issues relating to freedom of expression, privacy, 	accessibility for persons with disabilities, access to knowledge and IPR reform, and openness (including open government, FOSS, open standards, etc.), and 	engages in academic research on digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Follow us elsewhere&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Twitter:&lt;a href="https://twitter.com/CISA2K"&gt; &lt;/a&gt;&lt;a href="https://twitter.com/CISA2K"&gt;https://twitter.com/CISA2K&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook group: &lt;a href="https://www.facebook.com/cisa2k"&gt;https://www.facebook.com/cisa2k&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Visit us at:&lt;a href="https://cis-india.org/"&gt; &lt;/a&gt; &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;https://meta.wikimedia.org/wiki/India_Access_To_Knowledge&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; E-mail: &lt;a href="mailto:a2k@cis-india.org"&gt;a2k@cis-india.org&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;► Support Us&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of 'The Centre for Internet and Society' and mail it to us at No. 	194, 2nd 'C' Cross, Domlur, 2nd Stage, Bengaluru - 5600 71.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;► Request for Collaboration:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and 	improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at sunil@cis-india.org. To discuss collaborations on Indic language Wikipedia, write to T. Vishnu Vardhan, Programme Director, A2K, at	&lt;a href="mailto:vishnu@cis-india.org"&gt;vishnu@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; CIS is grateful to its primary donor the Kusuma Trust founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin for its core funding 		and support for most of its projects. CIS is also grateful to its other donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans 		Foundation, MacArthur Foundation, and IDRC for funding its various projects. &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/december-2014-bulletin'&gt;https://cis-india.org/about/newsletters/december-2014-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2015-01-12T16:56:54Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws">
    <title>National Seminar on Cyber Security &amp; Cyber Laws - Issues and Concerns</title>
    <link>https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws</link>
    <description>
        &lt;b&gt;Sharath Chandra Ram was a panelist at this seminar organized by the Advanced Centre for Research, Development &amp; Training in Cyber Laws &amp; Forensics on December 27 and 28, 2014 at the National Law School of India University in Bangalore.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Sharath was part of a plenary session on "Multi-Disciplinary Challenges in Ensuring Cyber Security". He  spoke about 'multi-stakeholderim in cyber security and CERT programs of nations'.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: center; "&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;PROGRAMME SCHEDULE &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="5"&gt;
&lt;p align="center"&gt;&lt;b&gt;Day 1 - 27&lt;sup&gt;th&lt;/sup&gt; December 2014 &lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;09:00- 10:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;REGISTRATION&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;10:00- 11:00&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;INAUGURAL &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;SESSION&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;AT&lt;/p&gt;
&lt;p&gt;SHRI.&lt;/p&gt;
&lt;p&gt;KRISHNAPPA&lt;/p&gt;
&lt;p&gt;MEMORIAL HALL&lt;/p&gt;
&lt;p&gt;[ACADEMIC BLOCK]&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p&gt;Welcome &amp;amp; Introduction:&lt;b&gt; Dr. Nagarathna. A., &lt;/b&gt; Seminar Director&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Inaugural Address:&lt;b&gt; Shri. Pratap Reddy,&lt;/b&gt; IPS, IGP, Internal Security Division, Karnataka Police, Bangalore&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Key Note Address:&lt;b&gt; Dr. R. Venkata Rao, &lt;/b&gt;Vice Chancellor, NLSIU&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Vote of Thanks:&lt;b&gt; Dr. T. V. Subba Rao, &lt;/b&gt;Senior Professor, NLSIU&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;11:00-11:45&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;GROUP PHOTO &amp;amp; TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;11:45-01:00&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;PLENARY&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;SESSION&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;AT&lt;/p&gt;
&lt;p&gt;SHRI.&lt;/p&gt;
&lt;p&gt;KRISHNAPPA&lt;/p&gt;
&lt;p&gt;MEMORIAL HALL&lt;/p&gt;
&lt;p&gt;[ACADEMIC BLOCK]&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;THEME: &lt;b&gt; &lt;/b&gt;&lt;b&gt;"MULTI-DISCIPLINARY CHALLENGES IN ENSURING CYBER SECURITY"&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Members of the Panel:&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Mr. Subrahmanya Boda, &lt;/b&gt; CISO, GMR&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Mr. Sunil Varkey, &lt;/b&gt; CISO, WIPRO&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Mr. Ramesh Kauta&lt;/b&gt; , CISO, GE [India]&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Mr. T T Thomas, &lt;/b&gt; CTO Synergia Technologies,&lt;/p&gt;
&lt;p&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Mr. Rahul Matthan, &lt;/b&gt; Partner, Trilegal.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Sharath Chandra Ram (Sharathchandra Ramakrishnan), &lt;/b&gt; Researcher at Centre for Internet &amp;amp; Society&lt;/p&gt;
&lt;p&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Mr. Srinivas P, &lt;/b&gt; CISO, Infosys &amp;amp; Anchor, DSCI Bangalore Chapter [Moderator of the session]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;01:00-02:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;LUNCH BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;venue &lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Shri Krishnappa Memorial Hall (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;International Training Centre&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;02:00-03:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 1&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 2&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;03:30-04:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;04:00-05:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 3&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 4&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;6:00 to 7. 00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;&lt;b&gt;CULTURAL EVENING &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Venue: Quad, Academic Block &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="5"&gt;
&lt;p align="center"&gt;&lt;b&gt;Day 2 - 28&lt;sup&gt;th&lt;/sup&gt; December 2014&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;08:00-09:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;BREAK FAST&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;venue&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Shri Krishnappa Memorial Hall (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;International Training Centre&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;MPP Class Room (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;09:30- 11:00&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 5&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 6&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Technical Session 7&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;11:00- 11:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Shri Krishnappa Memorial Hall (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;&lt;b&gt;International Training Centre&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;MPP Class Room (Academic Block)&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;11:30-1:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 8&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 9&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p align="center"&gt;&lt;b&gt;Technical Session 10&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;01:30-02:30&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;LUNCH BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;02:30-03. 45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;PLENARY&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;SESSION&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;AT &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;SHRI. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;KRISHNAPPA &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MEMORIAL HALL&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;[ACADEMIC BLOCK]&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;THEME: &lt;b&gt;"SECURING CYBER SPACE THROUGH INSTITUTIONAL INVOLVEMENT" &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Members of the Panel:&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;1. &lt;b&gt;Dr. Kamble, &lt;/b&gt;Director, Computer Emergency Response Team [CERT] India, Dept of Electronics &amp;amp; IT, Ministry of IT, 					Government of India&lt;/p&gt;
&lt;p&gt;2. &lt;b&gt;Dr. S.B.N. Prakash, &lt;/b&gt;Senior Professor of Law, NLSIU&lt;/p&gt;
&lt;p&gt;3. &lt;b&gt;Mr. Naa Vijay Shankar,&lt;/b&gt; Cyber Law Consultant, Bangalore&lt;/p&gt;
&lt;p&gt;4. &lt;b&gt;Mr. Balasubramanya, &lt;/b&gt;Vice President, Tata Consultancy Services, Bangalore&lt;/p&gt;
&lt;p&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Mr. Ranganath,&lt;/b&gt; Delivery Project Executive, IBM, Bangalore&lt;/p&gt;
&lt;p&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Mr. Venkatesh Murthy, &lt;/b&gt; Senior Manager, Cyber Forensics, Data Security Council of India [DSCI], Bangalore.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;7. &lt;b&gt;Mr. M. D. Sharath, &lt;/b&gt;Dy. S. P., Cyber Police, Bangalore&lt;/p&gt;
&lt;p&gt;8. &lt;b&gt;Dr. Nagarathna. A.,&lt;/b&gt; Senior Assistant Prof of Law, NLSIU [Moderator]&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;3. 45 to 4. 00 &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p&gt;TEA BREAK&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;04:00-05:00 AT &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;SHRI. &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;KRISHNAPPA &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;MEMORIAL HALL&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;[ACADEMIC BLOCK]&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p align="center"&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;VALEDICTORY SESSION &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Seminar Resolutions:&lt;b&gt; Dr. T. V. Subba Rao, Senior Professor, NLSIU&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Valedictory Address &amp;amp; Distribution of Certificates: : &lt;b&gt;Dr. R. Venkata Rao,&lt;/b&gt; Vice Chancellor, NLSIU&lt;/p&gt;
&lt;p&gt;Vote of thanks:&lt;b&gt; Dr. Nagarathna. A., &lt;/b&gt;Seminar Director&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p align="center"&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws'&gt;https://cis-india.org/internet-governance/news/national-seminar-cyber-security-and-cyber-laws&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-31T02:04:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/global-voices-december-30-2014-indians-plead-for-net-neutrality-as-aitel-raises-data-charges">
    <title>Indians Plead for #NetNeutrality as Airtel Raises Data Charges </title>
    <link>https://cis-india.org/openness/blog-old/global-voices-december-30-2014-indians-plead-for-net-neutrality-as-aitel-raises-data-charges</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Click to read the article &lt;a class="external-link" href="http://globalvoicesonline.org/2014/12/30/indians-plead-for-netneutrality-as-airtel-raises-data-charges/"&gt;published in the Global Voices&lt;/a&gt; on December 30, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;After Indian mobile data service provider Airtel &lt;a href="http://gadgets.ndtv.com/telecom/news/airtel-unveils-voip-calling-pack-for-prepaid-customers-postpaid-plans-coming-soon-640220" target="_blank"&gt;announced&lt;/a&gt; plans to introduce data charges for VoIP usage, it received a rash of criticism from customers and open web advocates alike.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With 192.22 million users (as of August 2013), &lt;a href="http://en.wikipedia.org/wiki/Bharti_Airtel" target="_blank"&gt;Airtel &lt;/a&gt;is India's largest mobile telephony provider and Asia-Pacific's second largest mobile operator. Although plans are now on hold due to regulatory restrictions, advocates worry that the company may yet find a way impose the fee increase.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On December 26, company proposed to raise costs for mobile phone users who rely on services like WhatsApp, Skype, and Viber to communicate with their contacts, requiring them to pay Rs.0.04/10KB (0.063 USD, based on current conversion rate) for 3G and Rs. 0.10/10KB (0.158 USD) for 2G service where a local or national call will cost one third of this amount or less.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;If you pay a fixed amount for internet data pack, Airtel  will charge you extra for internet calls on Skype, Viber or any free  calling app. How much? 4 paise for every 10 Kilo Bytes on 3G and 10  paise for every 10 Kilo Bytes on 2G.&lt;/p&gt;
&lt;p&gt;- &lt;a href="http://netneutrality.in/" target="_blank"&gt;Netneutrality.in&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The new plan to charge Rs. 75 for 75 MB of data usage over VoIP calls was heavily criticized on social media:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;So let me get this straight. Airtel is worried about people using a mere 75 MB out of their data allowance? WTF? &lt;a href="https://twitter.com/hashtag/BoycottAirtel?src=hash"&gt;#BoycottAirtel&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;— Madhu Menon (@madmanweb) &lt;a href="https://twitter.com/madmanweb/status/548472041901260800"&gt;December 26, 2014&lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Messages against Airtel on Twitter and Facebook included hashtags such as &lt;a href="https://twitter.com/hashtag/BoycottAirtel?src=hash" target="_blank"&gt;#BoycottAirtel&lt;/a&gt; and &lt;a href="https://twitter.com/hashtag/NetNeutrality?src=hash" target="_blank"&gt;#NetNeutrality&lt;/a&gt;.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In protest of Airtel India's violation of net neutrality principles, I disabled all data packs in my mobile number .&lt;/p&gt;
&lt;p&gt;I am not using skype or viber usually . My usual video requirements are&lt;a href="http://chatb.org/" rel="nofollow" target="_blank"&gt;chatb.org&lt;/a&gt; and Google hangout. But a carrier breaking net neutrality is a very serious development . Raise your voice against this .&lt;/p&gt;
&lt;p&gt;Read More about Airtel Breaking Net Neutrality here &lt;a href="http://l.facebook.com/l.php?u=http%3A%2F%2Fnetneutrality.in%2F&amp;amp;h=5AQEupp_4&amp;amp;enc=AZODIt9843Zfg0KTigPc37NtkWll4o_jnCF5xk0p-rwPCJ6BGVPyr7nrt427PIw8sBdvQXe8FqbbLynwJCYwCQoel_zl5wgOfqAYMZMCnrqMP9VRFIct2P_5YCx9sRsnskHUTeoGK5GHimPYVlvtDhXpbbcaTPoWROlULIgdbRfG2w&amp;amp;s=1" rel="nofollow" target="_blank"&gt;http://netneutrality.in/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;I would like to port to some other services without gate keeping after a few weeks If airtel continues same path.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://www.facebook.com/hashtag/netneutrality?source=feed_text&amp;amp;story_id=1531344597115231"&gt;‪#‎netneutrality‬&lt;/a&gt; &lt;a href="https://www.facebook.com/hashtag/india?source=feed_text&amp;amp;story_id=1531344597115231"&gt;‪#‎india‬&lt;/a&gt; &lt;a href="https://www.facebook.com/hashtag/airtel?source=feed_text&amp;amp;story_id=1531344597115231"&gt;‪#‎airtel‬&lt;/a&gt; &lt;a href="https://www.facebook.com/hashtag/fail?source=feed_text&amp;amp;story_id=1531344597115231"&gt;‪#‎fail‬&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;- Anivar Joshina (on &lt;a href="https://www.facebook.com/anivar.aravind.a/posts/1531344597115231" target="_blank"&gt;Facebook&lt;/a&gt;)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;In an op-ed, Indian online news portal Niti Central's CEO &lt;a href="https://twitter.com/shashidigital" target="_blank"&gt;Shashi Shekhar&lt;/a&gt; said the move could put Indian Prime Minister Narendra Modi's “Digital India” initiative in jeopardy.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;&lt;a href="http://www.niticentral.com/2014/09/22/narendra-modis-digital-india-taking-shape-239067.html" target="_blank"&gt;Prime Minister Narendra Modi’s Vision of a Digital India&lt;/a&gt; will be  in jeopardy unless the larger mess in Telecom is fixed urgently on  priority and “Net Neutrality” does not make that priority list.&lt;/p&gt;
&lt;p&gt;- &lt;a href="https://twitter.com/shashidigital" target="_blank"&gt;Shashi Shekhar&lt;/a&gt;, CEO, Niti Central&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Airtel has not released any further response on the issue of net  neutrality since their initial announcement, which read as follows:&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;All Internet/data packs or plans (through which customer  can avail discounted rate) shall only be valid for internet browsing and  will exclude VoIP (Both incoming/ Outgoing). VoIP over data  connectivity would be charged at standard data rates of 4p / 10 KB (3G  service) and 10p / 10 KB (2G service).&lt;/p&gt;
&lt;p&gt;- Published on &lt;a href="http://telecomtalk.info/airtel-starts-charging-for-voip-data-viber-skype-charges/128118/" target="_blank"&gt;Telecomtalk.info &lt;/a&gt;&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/airtel.png" alt="Airtel" class="image-inline" title="Airtel" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reacting to the public outcry against Airtel, India's Union Minister of Communications &lt;a href="https://en.wikipedia.org/wiki/Ravi_Shankar_Prasad" target="_blank"&gt;Ravi Shankar Prasad&lt;/a&gt; &lt;a href="http://gadgets.ndtv.com/telecom/news/government-to-look-into-airtels-plan-to-charge-for-internet-calls-ravi-shankar-prasad-639713"&gt;pledged to look into matter&lt;/a&gt;. According to news portal &lt;a href="http://tech.firstpost.com/news-analysis/airtel-to-charge-extra-for-voip-calls-is-it-time-to-bid-goodbye-to-free-messaging-services-247004.html" target="_blank"&gt;First Post&lt;/a&gt;, telecom operators voiced opposition to &lt;a href="http://en.wikipedia.org/wiki/Over-the-top_content"&gt;“over-the-top”&lt;/a&gt; VoIP services like WhatsApp, Skype, and Viber for some time, but the &lt;a href="https://en.wikipedia.org/wiki/Telecom_Regulatory_Authority_of_India" target="_blank"&gt;Telecom Regulatory Authority of India&lt;/a&gt; (TRAI) has thus far stood in the way of a price increase.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Airtel has started on plans to charge OTT users  particularly using VOIP services like viber and skype. TRAI had earlier  this year rejected such demands from Indian operators. Even after this  Airtel has gone ahead and kickstarted this practice.&lt;/p&gt;
&lt;p&gt;- Sandip Pillai (on &lt;a href="https://www.change.org/p/telecom-regulatory-authority-of-india-request-trai-to-stop-airtel-from-charging-voip-users-and-protect-net-neutrality-at-par-with-other-nations" target="_blank"&gt;Change.org&lt;/a&gt;)&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Airtel has pushed for a policy level change to legitimize exceptional data charges and many other &lt;a href="http://en.wikipedia.org/wiki/Over-the-top_content"&gt;over-the-top&lt;/a&gt; services. But these were &lt;a href="http://in.reuters.com/article/2014/12/29/bharti-airtel-rates-idINKBN0K70A920141229" target="_blank"&gt;declined &lt;/a&gt;by  TRAI who contended that Airtel's plans were “illegal and violation of  net neutrality,” forcing Airtel to drop the plan — for now.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;In view of the news reports that a consultation paper  will be issued shortly by TRAI on issues relating to services offered by  OTT players including VOIP, we have decided not to implement our  proposed launch of VoIP packs.&lt;/p&gt;
&lt;p&gt;We have no doubt that as a result of the consultation process a  balanced outcome would emerge that would not only protect the interests  of all stakeholders and viability of this important sector but would  also encourage much needed investments in spectrum and roll out of data  networks to fulfill the objective of digital India.&lt;/p&gt;
&lt;p&gt;- Reported on &lt;a href="http://www.medianama.com/2014/12/223-airtel-withdraws-voip-charges-for-now-after-forcing-trais-hand-on-net-neutrality-consultation/" target="_blank"&gt;MediaNama&lt;/a&gt; by Nikhil Pahwa&lt;/p&gt;
&lt;/blockquote&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/global-voices-december-30-2014-indians-plead-for-net-neutrality-as-aitel-raises-data-charges'&gt;https://cis-india.org/openness/blog-old/global-voices-december-30-2014-indians-plead-for-net-neutrality-as-aitel-raises-data-charges&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-02-11T15:10:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality">
    <title>Relationship Between Privacy and Confidentiality</title>
    <link>https://cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality</link>
    <description>
        &lt;b&gt;The laws of breach of confidentiality and breach of privacy at first glance seem very similar to each other. If a doctor releases health information relating to a patient that s/he is treating then such an act would give rise to a claim both under the law of privacy as well as under the law of confidentiality.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Similar is the case with financial information released by a bank, etc. This makes one wonder exactly where and how it is that the law of breach of privacy intersects with that of the law of confidentiality. An enquiry into such a complex question of law requires a deeper appreciation of the relationship between these two different principles of law which require a better understanding of the origins and evolutions of these principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this paper we shall try to explore the origins of both the law of privacy as well as confidentiality as they have evolved in the field of tort law in India. Although our primary focus is Indian law, however in order to understand the evolution of these principles it is necessary to discuss their evolution in three common law jurisdictions, &lt;i&gt;viz. &lt;/i&gt;the United States of America, the United Kingdom and India. The reason for an analysis of these three jurisdictions will become clear as the reader goes further into this paper, however for ease of reference it would be better if the reason is clarified here itself. The concept of a right against breach of confidentiality has existed in English common law for a very long time, however the concept of a claim for breach of privacy originated only in American law, other than some statutory protection granted in the last couple of decades, has still not been granted recognition in English common law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a discussion of the evolution of these principles in both American and English law, we will then discuss these principles as they exist in Indian law. This discussion will (or should) at once become easier to understand and digest because of the deeper understanding of the interplay between these two principles gained from a reading of the first two chapters.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy Torts: American Origins&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Looking at the origins of privacy law it has been argued by many academics that the law of privacy in common law has its origins in an article published by 	Samuel Warren and Louis Brandies in the Harvard Law Review in 1890.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; Warren and Brandeis suggested that one 	could generalise certain cases on defamation, breach of copyright in unpublished letters, trade secrets and breach of confidence as all based upon the 	protection of a common value which they called privacy.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; The authors relied upon the existing body of cases 	relating to the law of confidentiality and interpreted it in a way so as to create a "right to privacy" which has evolved into a right quite different from 	the common understanding of confidentiality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although there are certain criticisms of the article by Warren and Brandeis, the background in which the article was written and the lacuna that these two 	scholars were trying to fill in the law of confidentiality as it existed at that time gives some context to the reasons why they felt the need to move away 	from the existing principles and propose a new principle of law. Samuel Warren and Louis Brandies were both worried about the invasion of personal space by the advent of the news and print media which was experiencing a boom during the late 19&lt;sup&gt;th&lt;/sup&gt; century.	&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; Warren and Brandeis were worried that although the existing body of law on confidentiality would protect 	a person from having their picture put on a postcard by their photographer without their consent,&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; however if there was no relationship between the two persons there would be no remedy available to the aggrieved party.	&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the criticisms of Warren and Brandeis' article is that to propose the existence of a right to privacy they relied heavily on the English case of	&lt;i&gt;Prince Albert &lt;/i&gt;v. &lt;i&gt;Strange&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;b&gt;[6]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;. It has been proposed by some academics that this was a case which dealt with confidentiality and literary property which was characterized by Warren and Brandeis as a privacy case.	&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; In this case Prince Albert sought to restrain publication of otherwise unpublished private etchings and 	lists of works which were made by Queen Victoria. The etchings appeared to have been removed surreptitiously from the private printer to whom these 	etchings were given and came into the possession of one Mr. Strange who wanted to print and sell the etchings. The case specifically rejected the existence 	of a right to privacy in the following words:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The case is not put by the Plaintiff on any principle of trust or contract, but on property; there is nothing to show contract or confidence. It cannot be 	maintained that privacy constitutes property, or that the Court will interfere to protect the owner in the enjoyment of it; Chadler v. Thompson (3 Camp. 	80). In &lt;i&gt;William Aldred's case&lt;/i&gt; (9 Rep. 58 b.), Wray C. J. said, "The law does not give an action for such things of delight"."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Infact the case mentioned the term "privacy" only once, but that statement was made in the context of whether a delay in granting an injunction in such 	cases would defeat the entire purpose of the suit and was not preceeded or followed by any discussion on a distinct right to privacy:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"In the present case, where privacy is the right invaded, postponing the injunction would be equivalent to denying it altogether. The interposition of this 	Court in these cases does not depend upon any legal right, and to be effectual, it must be immediate."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Warren and Brandeis interpreted this case in a different manner and came to the conclusion that the "principle which protects personal writings 	and all other personal productions, not against theft and physical appropriation, but against publication in any form, is in reality not the principle of 	private property, but that of an inviolate personality".&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The article further incorporated the language of Judge Cooley's treatise (&lt;i&gt;Cooley on Torts&lt;/i&gt;)&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; which 	used the phrase "the right to be let alone". They said that identifying this common element should enable the courts to declare the existence of a general principle which protected a person's appearance, sayings, acts and personal relations from being exposed in public.	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; However it has been argued by some scholars that this phrase was not used by Judge Cooley with as much 	import as has been given by Warren and Brandeis in their article. The phrase was used by Judge Cooley in mere passing while discussing why tort law protected against not only batteries but also assaults with no physical contact, and had no connection with privacy rights.	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Warren and Brandeis' article started getting almost immediate attention and some amount of recognition from various quarters,&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; though it cannot be said that it was universally well received.	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; However over time this tort of privacy slowly started getting recognized by various Courts throughout 	the United States and got a huge boost when it was recognized in a brief section in the &lt;i&gt;First Restatement of Torts&lt;/i&gt; published in 1939. The right to 	privacy in American jurisprudence got another boost and became fully entrenched later on specially with the endorsement of Dr. William Prosser who 	discussed privacy in his treatise on the law of torts, the subsequent editions of which had a more and more elaborate discussion of the tort of privacy. 	This development of the law was further enhanced by Dr. Prosser's position as a reporter of the &lt;i&gt;Second Restatement of Torts&lt;/i&gt;, which imported a four 	part taxonomy of the privacy tort which had been suggested by Dr. Prosser in his previous works.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus we see how, beginning with the article by Warren and Brandeis in 1890, the privacy tort in American jurisprudence developed over the years and became 	further entrenched due to the influence of William Prosser and his works on the tort of privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy Torts in England: An Elaborate Principle of Confidentiality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The law of confidentiality in English law, as applied in certain specific contexts such as attorney client privileges,	&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; doctor patient confidentiality,&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; etc. has been applied since hundreds and even though cases relating to the breach of confidentiality had already existed, however the case of &lt;i&gt;Prince Albert &lt;/i&gt;v.	&lt;i&gt;Strange&lt;/i&gt;,&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; be it due to the interesting facts or the fame of the parties involved, is still 	considered as the clearest and most well established precedent for the tort of breach of confidence.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; Similar cases relying upon this tort kept being decided by the English Courts but the tort of confidentiality was further cemented in English common law by 	the case of &lt;i&gt;Saltman Engineering Co. &lt;/i&gt;v. &lt;i&gt;Campbell Engineering Co.&lt;/i&gt;,&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; which expanded the 	application of the principle by holding that the obligation to respect confidence is not limited to only instances where parties have a contractual 	relationship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The seminal case on the tort of breach of confidentiality in English law was that of &lt;i&gt;Coco&lt;/i&gt; v. &lt;i&gt;A.N Clark (Engineers) Ltd.&lt;/i&gt;,	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; where an inventor enjoined a moped manufacturer from using design ideas communicated by the inventor 	during failed contractual negotiations with the manufacturer.&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; In this case Megarry J., held that a case 	of breach of confidence normally requires three elements to succeed, apart from contract, (i) the information itself must have the necessary quality of 	confidence about it, (ii) that information must have been imparted in circumstances importing an obligation of confidence, and (iii) there must be an 	unauthorised use of that information to the detriment of the party communicating it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Relying on the principles enunciated in the above cases and developed by subsequent decisions, English law relating to the tort of breach of 	confidentiality developed into a robust and flexible body of law protecting personal and commercial information from disclosure. Infact by the late 1990s, 	English law was very broad and gradually expanding in its scope of the tort of breach of confidentiality and Courts had stretched the idea of an obligation 	of confidence so as to include cases where there was not even any communication between the parties, such as secret photography and wiretapping. Further 	since third parties had already been reposed with an obligation of confidence when they knowingly received confidential material even if they did not have 	any relationship with the plaintiff, therefore the law of confidence could be extended to parties outside the relationship in which the confidence was initially made. This, although was not as broad and overarching as the American privacy tort, still had the ability to cover a wide range of cases.	&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While English Courts on the one hand kept trying to expand the scope of the confidentiality tort, they also categorically rejected the existence of a 	privacy tort on the lines developed under American jurisprudence. The suggestion of the existence of such a privacy tort in English law was most recently 	rejected by the House of Lords in the case of &lt;i&gt;Wainwright &lt;/i&gt;v. &lt;i&gt;Home Office&lt;/i&gt;,&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; by Lord 	Bingham in the following words:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"What the courts have so far refused to do is to formulate a general principle of "invasion of privacy" (I use the quotation marks to signify doubt about 	what in such a context the expression would mean) from which the conditions of liability in the particular case can be deduced."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this case the plaintiffs made a claim against the prison authorities for strip searching them before they went to meet an inmate and since the incident 	occurred before the coming into force of the Human Rights Act, 1998 of the UK had not yet come into force, so the plaintiffs also argued that there was an 	existing tortuous remedy based on a breach of privacy in common law. While discussing whether English Courts were amenable to or had ever recognized such a common law tort of privacy, the House of Lords cited decisions such as &lt;i&gt;Malone v Metropolitan Police Comr&lt;/i&gt;,	&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;and &lt;i&gt;R v Khan (Sultan)&lt;/i&gt;,&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;i&gt; &lt;/i&gt; in both of which the courts refused to recognize a general right to privacy in the context of tapping of telephones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The absence of any general cause of action for invasion of privacy was also acknowledged by the Court of Appeal in the context of a newspaper reporter and photographer invading into a patient's hospital bedroom in an effort to purportedly interview him and taking photographs, in the case of	&lt;i&gt;Kaye v Robertson&lt;/i&gt;.&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus relying on the above line of cases the House of Lords concluded that a general right to privacy does not exist in English common law:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"All three judgments are flat against a judicial power to declare the existence of a high-level right to privacy and I do not think that they suggest that 	the courts should do so. The members of the Court of Appeal certainly thought that it would be desirable if there was legislation to confer a right to 	protect the privacy of a person in the position of Mr Kaye against the kind of intrusion which he suffered, but they did not advocate any wider principle."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus it is clear that English Courts have time and again denied the existence of an American style right to privacy as emanating from common law. The 	Courts have instead tried to expand and widen the scope of the tort of confidentiality so as to cover various situations which may arise due to the 	pervasiveness of technology and which the traditional interpretation of the law of confidentiality was not equipped to deal with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore it is now a little clearer that the reason for the existence of the confusion between the torts of privacy and confidentiality is that the right 	to privacy had its origins in the common law precedents but the right to privacy developed as a distinct and separate right in America, primarily due to 	the influence of Warren and Brandeis's article as well as the works of William Prosser, whereas the Courts in England did not adopt this principle of 	privacy and instead favored a much more elaborate right to confidentiality. In the Indian context, this has led to some amount of confusion because, Indian 	case laws, as will be seen in the following chapter, borrowed heavily from American jurisprudence when discussing the right to privacy and not all cases 	have been able to clearly bring out the difference between the principles of privacy and confidentiality.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Indian Law&lt;/h2&gt;
&lt;h3&gt;Tort of Breach of Privacy&lt;br clear="all" /&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Any analysis of the right to privacy in India, be it in the realm of constitutional law or tort law almost always includes within its ambit a discussion of the two celebrated cases of &lt;i&gt;Kharak Singh &lt;/i&gt;v. &lt;i&gt;Union of India&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;b&gt;[27]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; and	&lt;i&gt;Govind &lt;/i&gt;v. &lt;i&gt;State of M.P.,&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;b&gt;[28]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; which elevated the right to privacy to the 	pedestal of a fundamental right under Indian law. However, an unintended consequence of this has been that pretty much every commentator on Indian law 	includes a discussion of these two cases when discussing the right to privacy, be it under constitutional law or under tort law. However, there is one 	problem with such an analysis of the right to privacy, &lt;i&gt;viz.&lt;/i&gt; these two cases were dealing with a pure constitutional law question and relied upon 	American case laws to read into Article 21 an inbuilt right to privacy. However from a strictly tort law perspective, these cases are not relevant at all, and the seminal case for the tort of breach of privacy would have to be the Apex Court decision in &lt;i&gt;R. Rajagopal &lt;/i&gt;v. &lt;i&gt;State of Tamil Nadu&lt;/i&gt;,	&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt; which specifically recognized this distinction and stated that the right to privacy has two different 	aspects, (i) the constitutional right to privacy, and (ii) the common law right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The facts of the &lt;i&gt;R. Rajagopal &lt;/i&gt;case revolve around the publishing of the autobiography written by the prisoner Auto Shankar, who had been placed in 	jail for committing multiple murders. The autobiography contained proof of involvement of many IAS, IPS officers in his crimes. Although Shankar had 	initially requested that the magazine print his autobiography, he later requested that his story not be published. The publishers held that it was their 	right to publish the autobiography while the IPS and IAS officers on the other hand claimed that Auto Shankar was trying to defame them and wanted to ban 	its publication. The Supreme Court in this case, implicitly accepts the existence of a right to privacy under Indian tort law when&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"21.The question is how far the principles emerging from the United States and English decisions are relevant under our constitutional system. So far as 	the freedom of press is concerned, it flows from the freedom of speech and expression guaranteed by Article 19(1)(a). But the said right is subject to 	reasonable restrictions placed thereon by an existing law or a law made after the commencement of the Constitution in the interests of or in relation to 	the several matters set out therein. Decency and defamation are two of the grounds mentioned in clause (2). 	&lt;i&gt; Law of torts providing for damages for invasion of the right to privacy and defamation and Sections 499/500 IPC are the existing laws saved under 		clause (2). &lt;/i&gt; "&lt;/p&gt;
&lt;p&gt;Discussing the distinction between the two aspects of the right to privacy, the Court held:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The right to privacy as an independent and distinctive concept originated in the field of Tort law, under which a new cause of action for damages 	resulting from unlawful invasion of privacy was recognized. This right has two aspects which are but two faces of the same coin (1) the general law of 	privacy which affords a tort action for damages resulting from an unlawful invasion of privacy and (2) the constitutional recognition given to the right to 	privacy which protects personal privacy against unlawful governmental invasion. The first aspect of this right must be said to have been violated where, 	for example, a person's name or likeness is used, without his consent, for advertising or non-advertising purposes or for that matter, his life story is 	written whether laudatory or otherwise and published without his consent as explained hereinafter. In recent times, however, this right has acquired a 	constitutional status."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a discussion of the various arguments presented by the parties (a number of which are not relevant for the purposes of this paper), the Supreme Court 	laid down the following principles regarding freedom of the press and the right to privacy:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) The right to privacy is implicit in the right to life and liberty guaranteed to the citizens of this country by Article 21. It is a "right to be let 	alone". A citizen has a right to safeguard the privacy of his own, his family, marriage, procreation, motherhood, child-bearing and education among other 	matters. 	&lt;i&gt; None can publish anything concerning the above matters without his consent whether truthful or otherwise and whether laudatory or critical. If he does 		so, he would be violating the right to privacy of the person concerned and would be liable in an action for damages. Position may, however, be 		different, if a person voluntarily thrusts himself into controversy or voluntarily invites or raises a controversy. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The rule aforesaid is subject to the exception, that any publication concerning the aforesaid aspects becomes unobjectionable if such publication is 	based upon public records including court records. This is for the reason that once a matter becomes a matter of public record, the right to privacy no 	longer subsists and it becomes a legitimate subject for comment by press and media among others. We are, however, of the opinion that in the interests of 	decency [Article 19(2)] an exception must be carved out to this rule, viz., a female who is the victim of a sexual assault, kidnap, abduction or a like 	offence should not further be subjected to the indignity of her name and the incident being publicised in press/media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) There is yet another exception to the rule in (1) above - indeed, this is not an exception but an independent rule. In the case of public officials, it 	is obvious, right to privacy, or for that matter, the remedy of action for damages is simply not available with respect to their acts and conduct relevant 	to the discharge of their official duties. This is so even where the publication is based upon facts and statements which are not true, unless the official 	establishes that the publication was made (by the defendant) with reckless disregard for truth. In such a case, it would be enough for the defendant 	(member of the press or media) to prove that he acted after a reasonable verification of the facts; it is not necessary for him to prove that what he has 	written is true. Of course, where the publication is proved to be false and actuated by malice or personal animosity, the defendant would have no defence 	and would be liable for damages. It is equally obvious that in matters not relevant to the discharge of his duties, the public official enjoys the same 	protection as any other citizen, as explained in (1) and (2) above. It needs no reiteration that judiciary, which is protected by the power to punish for 	contempt of court and Parliament and legislatures protected as their privileges are by Articles 105 and 104 respectively of the Constitution of India, 	represent exceptions to this rule."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The above principles have ruled the roost on the issue of privacy and freedom of the press under Indian law, with certain minimal additions. It has been 	held by the Delhi High Court that even though a claim for damages may be made under tort law for breach of privacy, the Court may even grant a pre-publication injunction to prevent a breach of privacy.&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt; The principles laid down in&lt;i&gt;R. Rajagopal&lt;/i&gt; were further clarified in the case of &lt;i&gt;Indu Jain &lt;/i&gt;v. &lt;i&gt;Forbes Incorporated&lt;/i&gt;,	&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; where a case was filed by Indu Jain in the Delhi High Court to stop Forbes magazine from featuring her 	family in the Forbes List of Indian Billionaires. After a discussion of the various authorities and cases on the issue the Court summarized the principles 	relating to privacy and freedom of the press and applying those principles rejected the claim of the plaintiff. However for the purposes of our discussion 	these principles are extremely useful, and have been listed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"(V) Public or general interest in the matter published has to be more than mere idle curiosity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(VI) Public figures like public officials play an influential role in ordering society. They have access to mass media communication both to influence the 	policy and to counter-criticism of their views and activities. The citizen has a legitimate and substantial interest in the conduct of such persons and the 	freedom of press extends to engaging in uninhibited debate about the involvement of public figures in public issues and events. (Ref. (1994) 6 SCC 632 R. 	Rajagopal &amp;amp; Anr. Vs. State of Tamil Nadu &amp;amp; Others Para 18).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(VII) Right to privacy that rests in an individual may be waived by him by express or implied consent or lost by a course of conduct which estops its 	assertions. Such implication may be deduced from the conduct of the parties and the surrounding circumstances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(VIII) A public person or personage is one who by his standing, accomplishment, fame, mode of life or by adopting a profession or calling which gives the 	public a legitimate interest in his doings, affairs and character has so become a public figure and thereby relinquishes at least a part of his privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(IX) The standard to be adopted for assessing as to whether the published material infracts the right to privacy of any individual is that of an ordinary 	man of common sense and prudence and not an out of ordinary or hyper-sensitive man. (Ref. (2007) 1 SCC 143 &lt;i&gt;Ajay Goswami v. UOI &amp;amp; Ors.&lt;/i&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(X) Even though in this country, the freedom of press does not have presumptive priority as in some other jurisdictions including the United States of 	America, however the importance of a free media of communication to a healthy democracy has to receive sufficient importance and emphasis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(XI) In evaluating a relief to be granted in respect of a complaint against infraction of the right to privacy, the court has to balance the rights of the 	persons complaining of infraction of right to privacy against freedom of press and the right of public to disclosure of newsworthy information. Such 	consideration may entail the interest of the community and the court has to balance the proportionality of interfering with one right against the 	proportionality of impact by infraction of the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(XII) The publication has to be judged as a whole and news items, advertisements and published matter cannot be read without the accompanying message that 	is purported to be conveyed to public. Pre-publication censorship may not be countenanced in the scheme of the constitutional framework unless it is 	established that the publication has been made with reckless disregard for truth, publication shall not be normally prohibited. (Ref.: (2007) 1 SCC 143 	Ajay Goswami Vs. UOI &amp;amp; Ors.; (1994) 6 SCC 632 R. Rajagopal &amp;amp; Anr. Vs. State of Tamil Nadu &amp;amp; Others and AIR 2002 Delhi 58 Khushwant Singh &amp;amp; 	Anr. Vs. Maneka Gandhi)."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus we see that the right to privacy in Indian law, even in the realm of tort law has had an inextricable connection with constitutional principles and 	constitutional cases have had a very huge impact on the development of this right in India. However a perusal of these cases shows that the right to 	privacy is available only insofar as information which is personal in nature, however in situations where the information is non-personal in nature the 	right to privacy may not be as useful and this is where, as we shall see below, the tort of breach of confidentiality comes in to fill the void.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Tort of Breach of Confidentiality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While there have been a number of landmark cases in India on the issue of breach of confidence in a contractual or a statutory setting, these cases are not 	very relevant for a discussion on the tort of breach of confidentiality. This is not to say that the tort of breach of confidentiality is non-existent in 	Indian law, the Courts here have time and again accepted that there does exist such a tortuous remedy in certain situations. We shall now try to examine 	the contours of this principle of torts by discussing some of the landmark cases on the topic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of &lt;i&gt;Petronet LNG Ltd.&lt;/i&gt; v. &lt;i&gt;Indian Petro Group and Another&lt;/i&gt;,	&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; the Delhi High Court considered a claim by a corporation seeking to prevent a 	news and media group from reporting its confidential negotiations and contracts with counterparties. The claim was based upon both the right to privacy as 	well as the right to confidentiality but in this case the court, looking at the fact that the plaintiff was a corporation and also the type of information 	involved denied the claim on the right to privacy. However, it did allow the injunction claimed by the corporation based on the right to confidentiality. 	Summarizing its discussion of the right to confidentiality, the Court stated thus:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"49. It may be seen from the above discussion, that originally, the law recognized relationships- either through status (marriage) or arising from contract 	(such as employment, contract for services etc) as imposing duties of confidentiality. The decision in &lt;i&gt;Coco&lt;/i&gt; (1969) marked a shift, though 	imperceptibly, to a possibly wider area or zone. &lt;i&gt;Douglas&lt;/i&gt; noted the paradigm shift in the perception, with the enactment of the Human Rights Act; 	even before that, in &lt;i&gt;Attorney General (2)&lt;/i&gt; (also called the &lt;i&gt;Spycatcher case&lt;/i&gt;, or the &lt;i&gt;Guardian case&lt;/i&gt;) the Court acknowledged that 	there could be situations -where a third party (likened to a passerby, coming across sensitive information, wafting from the top of a building, below) 	being obliged to maintain confidentiality, having regard to the nature and sensitivity of the information….."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While discussing the factors that the Court would have to consider while deciding a claim based on the breach of confidentiality, the Delhi High Court 	relied upon and quoted from English judgments as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"50. Even while recognizing the wider nature of duty - in the light of the Human Rights Act, 1998, and Articles 8 and 10 of the European Convention, it was 	cautioned that the court, in each case, where breach of confidentiality, is complained, and even found- has to engage in a balancing process; the factors 	to be weighed while doing so, were reflected in &lt;i&gt;A&lt;/i&gt; v. &lt;i&gt;B Plc&lt;/i&gt; [2003] QB 195; the latest judgment in &lt;i&gt;H.R.H. Prince of Wales&lt;/i&gt; indicates that the court would look at the kind of information, the nature of relationship, etc, and also consider proportionality, while weighing whether 	relief could be given:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The court will need to consider whether, having regard to the nature of the information and all the relevant circumstances, it is legitimate for the owner 	of the information to seek to keep it confidential or whether it is in the public interest that the information should be made public….&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;..In applying the test of proportionality, the nature of the relationship that gives rise to the duty of confidentiality may be important."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Holding that the principles discussed in the English cases given in the context of individual rights of confidentiality would also hold good in the case of 	corporations, the Court held that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"51. Though the reported cases, discussed above, all dealt with individual right, to confidentiality of private information (&lt;i&gt;Duchess of Argyll&lt;/i&gt;;&lt;i&gt;Frazer&lt;/i&gt;; &lt;i&gt;Douglas&lt;/i&gt;; &lt;i&gt;Campbell&lt;/i&gt; and &lt;i&gt;H.R.H. Prince of Wales&lt;/i&gt;) yet, the formulations consciously approved in the	&lt;i&gt;Guardian&lt;/i&gt;, and &lt;i&gt;Campbell&lt;/i&gt;, embrace a wider zone of confidentiality, that can possibly be asserted. For instance, professional records of 	doctors regarding treatment of patients, ailments of individuals, particulars, statements of witnesses deposing in investigations into certain types of 	crimes, particulars of even accused who are facing investigative processes, details victims of heinous assaults and crimes, etc, may, be construed as 	confidential information, which, if revealed, may have untoward consequences, casting a corresponding duty on the person who gets such information - either 	through effort, or unwittingly, not to reveal it. Similarly, in the cases of corporations and businesses, there could be legitimate concerns about its 	internal processes and trade secrets, marketing strategies which are in their nascent stages, pricing policies and so on, which, if prematurely made 	public, could result in irreversible, and unknown commercial consequences. However, what should be the approach of the court when the aggrieved party 	approaches it for relief, would depend on the facts of each case, the nature of the information, the corresponding content of the duty, and the balancing 	exercise to be carried out. It is held, therefore, that even though the plaintiff cannot rely on privacy, its suit is maintainable, as it can assert 	confidentiality in its information."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from privacy, the law of confidentiality has been used in cases where there has been a definite harm to one side but none of the other laws provide for any relief. This was the situation in the case of &lt;i&gt;Zee Telefilms Limited&lt;/i&gt; v. &lt;i&gt;Sundial Communications Pvt Ltd&lt;/i&gt;,	&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; where a company which developed television and media programming had discussed their concept of a new 	show with a network during negotiations which could not be finalized. The network however subsequently tried to start a new show which was based on the 	same concept and idea as the one presented by the plaintiff company. The plaintiff sued the network, inter alia on a claim for breach of confidential 	information and asked that the network be prevented from airing its show. In this case the plaintiff's claim based on copyright was rejected because 	copyright only subsists on the expression of an idea and not the idea itself, therefore the tort of breach of confidentiality had to be resorted to in 	order to give relief to the plaintiffs. Discussing the difference between confidentiality and copyright, the Division Bench of the Bombay High Court held:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"10. The law of the confidence is different from law of copyright. In paragraph 21.2 (page 721), [of Copinger and Skone-James on Copyright (13th Edn.)] the 	learned author has pointed out that right to restrain publication of work upon the grounds, that to do so would be breach of trust of confidence, is a 	broader right than proprietary right of copyright. There can be no copyright of ideas or information and it is not infringement of copyright to adopt or 	appropriate ideas of another or to publish information received from another, provided there is no substantial copying of the form in which those ideas 	have, or that information has, been previously embodied. But if the ideas or information have been acquired by a person under such circumstances that it 	would be a breach of good faith to publish them and he has no just case or excuses for doing so, the court may grant injunction against him. The 	distinction between the copyright and confidence may be of considerable importance with regard to unpublished manuscripts / works submitted, and not 	accepted, for publication or use. Whereas copyright protects material that has been reduced to permanent form, the general law of confidence may protect 	either written or oral confidential communication. Copyright is good against the world generally while confidence operates against those who receive 	information or ideas in confidence. Copyright has a fixed statutory time limit which does not apply to confidential information, though in practice 	application of confidence usually ceases when the information or ideas becomes public knowledge. Further the obligation of confidence rests not only on the 	original recipient, but also on any person who received the information with knowledge acquired at the time or subsequently that it was originally given in 	confidence."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A similar view, in a similar fact situation Single Judge Bench of the Delhi High Court had also came to a similar conclusion in the case of	&lt;i&gt;Anil Gupta&lt;/i&gt; v. &lt;i&gt;Kunal Das Gupta&lt;/i&gt;.&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law of confidentiality has also come to the rescue of employers in attempting to prevent important business and client information from being taken or copied by the employees for their personal gain. In the case of &lt;i&gt;Mr. Diljeet Titus, Advocate&lt;/i&gt; v. &lt;i&gt;Mr. Alfred A. Adebare&lt;/i&gt;,	&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt; the Delhi High Court had to decide a claim based on breach of confidentiality when some ex-employees 	of a law firm tried to take away client lists and drafts of legal agreements and opinions from their earlier employer-law firm. Discussing the importance 	of preventing employees or former employees from away which such actions, the Court held as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"81. I am in full agreement with the views expressed in &lt;i&gt;Margaret,&lt;/i&gt; &lt;i&gt;Duchess of Argyll (Feme Sole)&lt;/i&gt; v. &lt;i&gt;Duke of Argyll and Ors.&lt;/i&gt; (1965) 1 All ER 611, that a Court must step in to restrain a breach of confidence independent of any right under law. Such an obligation need not be 	expressed but be implied and the breach of such confidence is independent of any other right as stated above. The obligation of confidence between an 	advocate and the client can hardly be re-emphasised. Section 16 of the Copyright Act itself emphasizes the aspect of confidentiality &lt;i&gt;de hors&lt;/i&gt; even 	the rights under the Copyright Act. If the defendants are permitted to do what they have done it would shake the very confidence of relationship between 	the advocates and the trust imposed by clients in their advocates. The actions of the defendants cause injury to the plaintiff and as observed by 	Aristotle: 'It makes no difference whether a good man defrauds a bad one, nor whether a man who commits an adultery be a good or a bad man; the law looks 	only to the difference created by the injury."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court allowed the claim of the law firm holding that the relationship between a law firm and its attorneys is of a nature where information passed 	between them would be covered by the law of confidence and would not be allowed to be copied or used by the attorneys for their individual gain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, in 2009, the principles relating to breach of confidentiality under Indian law were very succinctly summarized by the Bombay High Court in the 	case of &lt;i&gt;Urmi Juvekar Chiang &lt;/i&gt;v. &lt;i&gt;Global Broadcasting News Limited&lt;/i&gt;,&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt; where in a fact 	situation similar to the ones in &lt;i&gt;Zee Telefilms &lt;/i&gt;case and the &lt;i&gt;Anil Gupta&lt;/i&gt; case, the Court discussed a number of previous cases on breach of 	confidentiality and laid down the following principles:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"8. The principles on which the action of breach of confidence can succeed, have been culled out as&lt;/p&gt;
&lt;p&gt;(i) he (Plaintiff) had to identify clearly what was the information he was relying on;&lt;/p&gt;
&lt;p&gt;(ii) he (Plaintiff) had to show that it was handed over in the circumstances of confidence;&lt;/p&gt;
&lt;p&gt;(iii) he (Plaintiff) had to show that it was information of the type which could be treated as&lt;/p&gt;
&lt;p&gt;confidential; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) he (Plaintiff) had to show that it was used without licence or there was threat to use it…… It is further noted that at interlocutory 	stage, the Plaintiff does not have to prove (iii) and (iv) referred to above, as he will at the trial. But the Plaintiff must address them and show that he 	has atleast seriously arguable case in relation to each of them."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the above discussion on Indian law it is clear that the Courts in India have tried to incorporate the best of both worlds, in the sense that it has 	taken and adopted the principle of a right to privacy, a breach of which would give rise to an action in torts, from American jurisprudence while rejecting 	the stand taken by English Courts in rejecting such a right to privacy. However, Indian Courts have often referred to the decisions given by English Courts 	as well as American Courts in interpreting the principle of the right to confidentiality. Therefore on an overall examination it would appear that insofar 	as the rights to privacy and confidentiality are concerned, Indian jurisprudence has more in common with American law rather than English law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The law of privacy does not seem to have existed as a recognizable principle of law before it was propounded in the article by Warren and Brandeis in the 	Harvard Law Review in 1890. It slowly gained traction in American jurisprudence over the twentieth century but was rejected outright by the Courts in 	England, which preferred to follow the principle of confidentiality rather than privacy and tried to expand that old principle to fit newer and newer 	situations. Since Indian law borrows heavily from English law and to a smaller extent also from American law, the Courts in India have accepted both, the 	principle of a right to privacy as well as a right to confidentiality. This is not to say that the Courts in America do not recognize a right to 	confidentiality and only accept a right to privacy. Infact American Courts, just like their Indian counterparts, recognize both a right to confidentiality 	as well as a right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since Indian courts accept both the concept of breach of privacy as well as breach of confidentiality, one should not try to figure out if a particular 	circumstance is more appropriate for the one over the other, but actually use both principles to supplement one another for achieving the same objective. 	For example in situations where the conditions required for the application of the law of confidentiality do not exist such as disclosure of personal 	information by a person who did not receive it in a confidential capacity, one could apply the principle of privacy to prevent such information being 	disclosed or claim a remedy after disclosure. On the other hand if the information to be disclosed is not of a personal nature then one could try to 	utilize the law of confidentiality to prevent disclosure or claim damages.&lt;/p&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Harry Kalven, Jr., &lt;i&gt;Privacy in Tort Law-Were Warren and Brandeis Wrong?&lt;/i&gt;, "31 Law &amp;amp; Contemp. Problems". 326, 327 (1966). Elbridge L. 			Adams, &lt;i&gt;The Right of Privacy, and Its Relation to the Law of Libel&lt;/i&gt;, 39 AM. L. REV. 37 (1905).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office&lt;/i&gt;, 2003 UKHL 53.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, "96 Georgetown Law Journal", 123 at 			128 and 132 (2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;i&gt;Pollard &lt;/i&gt; v. &lt;i&gt;Photographic Co.&lt;/i&gt;, (1888) 40 Ch. D. 345.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; It is also said that this concern arose out of the personal experience of Samuel Warren, whose wedding announcement as well as the report on his 			sister-in-law's death in the newspapers did not go down well with him. 			&lt;a href="http://www.english.illinois.edu/-people-/faculty/debaron/380/380powerpoint/privacy.pdf"&gt; http://www.english.illinois.edu/-people-/faculty/debaron/380/380powerpoint/privacy.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; (1848) 41 Eng. Rep. 1171 (Ch.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, "96 Georgetown Law Journal", 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Samuel D. Warren and Louis D. Brandeis, &lt;i&gt;The Right to Privacy&lt;/i&gt;, "4 Harvard Law Review", 193 at 207 (1890).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Thomas M. Cooley, &lt;i&gt;The Law Of Torts&lt;/i&gt;, 2&lt;sup&gt;nd&lt;/sup&gt; Ed., 1888, p. 29.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office&lt;/i&gt;, 2003 UKHL 53.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, "96 Georgetown Law Journal", 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; As early as in 1891, the case of &lt;i&gt;Schuyler&lt;/i&gt; v. &lt;i&gt;Curtis&lt;/i&gt;, 45 NYS 787 (Sup. Ct., 1891) involving the erection of a statue of a dead 			person, recognized the principle proposed in Warren and Brandeis' article.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Most famously the case of &lt;i&gt;Robertson &lt;/i&gt;v. &lt;i&gt;Rochester folding Box Co.&lt;/i&gt;, 64 NE 442 (NY 1902) where the New York Court of appeals 			specifically rejected a the existence of a right to privacy as proposed by Warren and Brandeis.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, "96 Georgetown Law Journal", 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Bredd v. Lovelace, (1577) 21 Eng. Rep. 33 (Ch.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; For doctor patient confidentiality we need look no further than the Hippocratic Oath itself which states "Whatever, in connection with my 			professional service, or not in connection with it, I see or hear, in the life of men, which ought not to be spoken of abroad, I will not divulge, 			as reckoning that all such should be kept secret".&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; (1848) 41 Eng. Rep. 1171 (Ch.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, 96 GEORGETOWN LAW JOURNAL, 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; [1948] 65 RPC 203.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; [1969] RPC 41 (UK).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, 96 GEORGETOWN LAW JOURNAL, 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, 96 GEORGETOWN LAW JOURNAL, 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; 2003 UKHL 53.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; [1979] Ch 344.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; [1997] AC 558.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; [1991] FSR 62&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; &lt;i&gt;Phoolan Devi &lt;/i&gt; v. &lt;i&gt;Shekhar Kapoor and others&lt;/i&gt;, &lt;a href="http://indiankanoon.org/doc/793946/"&gt;http://indiankanoon.org/doc/793946/&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; &lt;a href="http://lobis.nic.in/dhc/GM/judgement/25-01-2010/GM12102007S21722006.pdf"&gt; http://lobis.nic.in/dhc/GM/judgement/25-01-2010/GM12102007S21722006.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; &lt;a href="http://lobis.nic.in/dhc/SRB/judgement/25-04-2009/SRB13042009S11022006.pdf"&gt; http://lobis.nic.in/dhc/SRB/judgement/25-04-2009/SRB13042009S11022006.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; &lt;a href="http://indiankanoon.org/doc/603848/"&gt;http://indiankanoon.org/doc/603848/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; &lt;a href="http://indiankanoon.org/doc/1709727/"&gt;http://indiankanoon.org/doc/1709727/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; &lt;a href="http://delhicourts.nic.in/may06/DILJEET%20TITUS%20VS.%20ALFED%20A.%20ADEBARE.htm"&gt; http://delhicourts.nic.in/may06/DILJEET%20TITUS%20VS.%20ALFED%20A.%20ADEBARE.htm &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; &lt;a href="http://indiankanoon.org/doc/582634/"&gt;http://indiankanoon.org/doc/582634/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality'&gt;https://cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-30T14:27:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance">
    <title>Targeting surveillance</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance</link>
    <description>
        &lt;b&gt;In the fall of 2005, Scotland Yard raided a flat in west London and arrested a suspected al-Qaeda militant known by a teasing Arabic nickname, Irhabi (“Terrorist”) 007.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article by Ajai Sreevatsan was &lt;a class="external-link" href="http://www.thehindu.com/sunday-anchor/targeting-surveillance/article6731202.ece"&gt;published in the Hindu&lt;/a&gt; on December 28, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The similarities between Irhabi 007, later identified as Younis Tsouli, and India’s Mehdi Masoor Biswas are uncanny.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Neither  participated in any terror attack. Their reputation stems from an  alleged involvement as cyber propagandists for proto-terror groups —  Irhabi was distributing manuals and teaching online seminars on behalf  of the emerging al-Qaeda faction in Iraq, while Mehdi is alleged to be  an IS sympathiser. Both in their early 20s with cover identities during  the day, and separated by a decade in technological evolution.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Such  expertise within terror groups is hardly surprising, says Sunil Abraham  of the Centre for Internet and Society. “Any organisation engaged in a  war for hearts and minds and oil fields will exploit contemporary  technology to its fullest potential,” he says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Irhabi  currently serves a 16-year jail term, while Mehdi awaits his trial.  What their cases highlight is that the phenomenon of young, tech-savvy  armchair radicals is nothing new.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Research done at  Israel’s Haifa University, which tracks the proliferation of terrorist  websites, shows that the number of such sites went up from fewer than  100 in the late-1990s to more than 4,800 in just a decade. There is also  credible evidence that an al-Qaeda website posted a sketched-out  proposal for the 2004 Madrid bombings three months before the attack.  Another macabre example is the crowd-sourcing effort launched in 2005 by  the Victorious Army Group to build its website. By the competition’s  rules, the winner would get to fire a rocket at an American base.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As  Indian agencies gear up to respond to similar online threats in this  part of the world, Mr. Abraham says India should not repeat the mistakes  made by the West over the previous decade. “We should not get caught up  in big data surveillance,” he says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Surveillance is  like salt. It could be counter-productive even if slightly in excess.  Ideally, surveillance must be targeted. Indiscriminate surveillance just  increases the size of the haystack, making it difficult to find the  needles,” Mr. Abraham says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Even in the case of  Mehdi, his identity was uncovered not by online spying but by Channel 4  which did some old-fashioned detective work,” he says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In  any case, recent events show that the threat of online terror  propaganda might be overblown. Much like online activism, it is subject  to the law of diminishing returns.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A set of letters sent by newly recruited volunteers of IS was leaked to the French newspaper &lt;i&gt;Le Figaro &lt;/i&gt;earlier  this month and it shows youngsters complaining about being made to do  the dishes or the Iraqi winter. One of them wrote: “I’m fed up to the  back teeth. My iPod no longer works out here. I have got to come home.”  Of the estimated 1,100 young French who are believed to have joined the  IS, more than 100 have already returned.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The IS may  have Twitter on its side. But the harsh realities of Iraq and the  gruesome ideology behind the slick doctrinal videos are a lot harder to  sell.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Mr. Abraham says there is no such thing as a  Twitter revolution or a social media terror group. “Such statements  underestimate the role of ideology and human beings,” he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance'&gt;https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-30T14:10:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law">
    <title>Locating Constructs of Privacy within Classical Hindu Law</title>
    <link>https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law</link>
    <description>
        &lt;b&gt;This white paper seeks to locate privacy in Classical Hindu Law, and by doing so, displace the notion that privacy is an inherently ‘Western’ concept that is the product of a modernist legal system. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Introduction: Conceptions of Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Because of the variance exhibited by the various legal, social, and cultural aspects of privacy, it cannot be easily defined.	&lt;a name="_ftnref1"&gt;&lt;/a&gt; As a legal concept, privacy may form a constitutional claim, a statutory entitlement, a tortious action 	or an equitable remedy. As a constitutional claim, privacy is either an explicitly recognised right&lt;a name="_ftnref2"&gt;&lt;/a&gt; that is capable of independent enforcement,&lt;a name="_ftnref3"&gt;&lt;/a&gt; read into a pre-existing right	&lt;a name="_ftnref4"&gt;&lt;/a&gt;, or located within the penumbra of a larger right.&lt;a name="_ftnref5"&gt;&lt;/a&gt; Statutory recognition of privacy may be afforded by both criminal and civil statutes. The offence of criminal defamation for instance, is perceived as an 	act of violating an individual's privacy by tarnishing his or her reputation.&lt;a name="_ftnref6"&gt;&lt;/a&gt; Similarly the provision of in camera trials for divorce proceedings is an illustration of a civil statute implicitly recognising privacy.	&lt;a name="_ftnref7"&gt;&lt;/a&gt; As a tortious claim the notion of privacy is commonly understood in terms of the right against trespass 	of property. Equity, co-terminus with a statutory mandate or in isolation, may also be a source of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most legal conceptions of privacy in everyday use in India originated from the English common law. Other constitutional and statutory constructions of privacy, even when not found in the common law, arise within a broader modernist system of law and justice that originated in Europe.&lt;a name="_ftnref8"&gt;&lt;/a&gt; During the European colonisation of India, the British (and, in a different manner, the French	&lt;a name="_ftnref9"&gt;&lt;/a&gt;) attempted to recreate the common law in India through the establishment of a new legal and courts 	system, and the wholesale importation of the European idea of law&lt;a name="_ftnref10"&gt;&lt;/a&gt;. The very notion of privacy, as well 	as its legal conception, is a product of this legal modernity.&lt;a name="_ftnref11"&gt;&lt;/a&gt; In post-colonial societies, the argument 	against the right to privacy is usually premised on its perceived alien-ness - as a foreign idea brought by colonisers and imposed on a traditionalist 	society that favoured communitarian living over individual rights - in an effort to discredit it.&lt;a name="_ftnref12"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fallacy of this argument lies in its ignorance of the cultural plurality of privacy.&lt;a name="_ftnref13"&gt;&lt;/a&gt; To begin with, 	the idea that is connoted by the modernist notion of privacy pre-dated the introduction of common law in India. By the time of the Enlightenment, Hindu law 	and Islamic law were established legal systems with rich histories of jurisprudence and diverse schools of law within them, each with their own juristic 	techniques and rules of interpretation.&lt;a name="_ftnref14"&gt;&lt;/a&gt; While neither Hindu law nor Islamic law use a term that readily 	translates to "privacy", thereby precluding a neat transposition of meanings between them, the notion of privacy existed and can be located in both the 	legal traditions. In this paper, the term 'privacy' is used to describe both the modernist notion that arises from the principle of personal autonomy as 	well as the diverse pre-modern concepts in Hindu and Islamic jurisprudence that resemble or relate to this notion. These pre-modern concepts are diverse, 	and do not permit an easy analysis. For instance, the &lt;i&gt;Manusmriti,&lt;/i&gt; which is a source of classical Hindu law, prohibits bathing in tanks that belong 	to other men.&lt;a name="_ftnref15"&gt;&lt;/a&gt; Additionally it prohibits the use of wells, gardens, carriages, beds, seats and houses 	without the owner's permission.&lt;a name="_ftnref16"&gt;&lt;/a&gt; These prohibitions are not driven by the imperatives of privacy alone. 	The rationale is that in using others' belongings one appropriates a portion of their sins.&lt;a name="_ftnref17"&gt;&lt;/a&gt; Hence, these privacy protections are linked to an ideal of purity. Islamic law also restricts the use or misappropriation of another's property.	&lt;a name="_ftnref18"&gt;&lt;/a&gt; However, this prohibition is designed to protect private property; it has no ideological link to 	purity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This paper attempts to locate constructs of privacy in classical Hindu law. The purpose of this exercise is not to privilege one legal system over another. 	Therefore, we do not intend to normatively assess the existing modernist discourse on privacy. We simply seek to establish the existence of alternate 	notions of privacy that pre-date modernity and the common law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scope of the paper is confined to locating privacy in classical Hindu law. The materials within the realm of classical Hindu law, relevant to this exercise are- the &lt;i&gt;sruti&lt;/i&gt;, &lt;i&gt;smriti&lt;/i&gt;, and &lt;i&gt;acara&lt;/i&gt;. &lt;i&gt;Sruti&lt;/i&gt; comprises of the	&lt;i&gt;Vedas, Brahmanas, Aranyakas and the Upanishads.&lt;/i&gt; It is considered to symbolise the spirit of Hindu law and is not the source of any positivist 	command as such.&lt;a name="_ftnref19"&gt;&lt;/a&gt; &lt;i&gt;Smriti&lt;/i&gt; involves various interpretations of the &lt;i&gt;sruti&lt;/i&gt;, We have 	however restricted ourselves to the &lt;i&gt;Dharmashastras &lt;/i&gt;in this realm. Acara refers to the body of customary practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The review of the material at hand however, is not exhaustive. The reasons for this are twofold- &lt;i&gt;first&lt;/i&gt;, given the vast expanse of Hindu 	jurisprudence, the literature review has been limited; &lt;i&gt;second, &lt;/i&gt;there is a limited availability of reliable English translations of ancient legal 	treatises.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This paper is divided into two parts. The first part of this paper deals with the interface of colonisation with Hindu law and elucidates the nature of Hindu law. With the advent of colonialism, classical Hindu law was gradually substituted by a modernist legal system.	&lt;a name="_ftnref20"&gt;&lt;/a&gt; Exploring the characteristics of modernity, the factors that contributed to the displacement of 	classical Hindu law will be identified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the factors that contributed to the displacement was the uncertainty that characterised classical Hindu law.	&lt;a name="_ftnref21"&gt;&lt;/a&gt; Classical Hindu law was an amalgamation of three sources, as. In an attempt to rule out the 	uncertainty, and the lack of positive command, the modernisation of Hindu law was brought about.&lt;a name="_ftnref22"&gt;&lt;/a&gt; Accordingly this part shall also examine the nature of Hindu law. Furthermore it shall determine whether the application of codified modern Hindu law, is 	informed by the precepts of classical Hindu law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Having explicated the nature of Hindu law, the next part will focus on identifying instances of privacy in classical Hindu law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before ascertaining specific instances, however, this part will lay down a general understanding of privacy as it existed then. It will be demonstrated 	that regardless of the absence of an equivalent term, an expectation of privacy existed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The specific illustrations of privacy will then be mapped out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the different aspects wherein an expectation of privacy exists, there is also a possibility of competing claims. In the event that such conflicts 	arise, this part will attempt to resolve the same.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Part 1: The Transmogrification of the Nature of Hindu Law&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;The evolution of Hindu jurisprudence can be charted through three phases- classical, colonial, and modern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the classical phase, it was embodied by the Dharmashastra which elaborated on customary practices, legal procedure, as well as punitive measures. The 	Dharamshastra was accompanied by the Vedas, and acara. Whether this body of jurisprudence could be called 'law' in the strict modernist sense of the term 	is debatable.&lt;a name="_ftnref23"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modernity has multifarious aspects.&lt;a name="_ftnref24"&gt;&lt;/a&gt; However, we are concerned with modernity in the context of legal 	systems, for the purpose of this paper. The defining attribute of a modernist legal system is the need for positivist precepts that are codified by a legislature.&lt;a name="_ftnref25"&gt;&lt;/a&gt; The underlying rationale for formalised legislation is the need for certainty in law.&lt;a name="_ftnref26"&gt;&lt;/a&gt; Law is to be uniformly applied within the territory.&lt;a name="_ftnref27"&gt;&lt;/a&gt; The formalised legislation is to be enforced by hierarchized courts.&lt;a name="_ftnref28"&gt;&lt;/a&gt; Furthermore this codified law can be modified through provisions for amendment, if need be.	&lt;a name="_ftnref29"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This modernist understanding is what informs the English common law. With the advent of colonialism, common law was imported to India. The modernist legal 	system was confronted by plural indigenous legal systems here that were starkly different in nature.&lt;a name="_ftnref30"&gt;&lt;/a&gt; In 	the given context, the relevant indigenous system is classical Hindu law. The classical precepts were interpreted by the British. These interpretations 	coupled with the sources of Classical Hindu law, constituted colonial Hindu law.&lt;a name="_ftnref31"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is pertinent to note that these interpretations were undertaken through a modernist lens. The implication was the attempted modernisation of a 	traditional legal system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The traditional system of Classical Hindu law did not exhibit any of the introduced features. To begin with not all of classical Hindu law was text based.	&lt;a name="_ftnref32"&gt;&lt;/a&gt; The problem with the textual treatises was threefold. First, they were not codes enacted by a 	legislature, but written by various scholars. Second, they were not phrased as positivist precepts. Third, their multiplicity was accompanied with the lack 	of an established hierarchy between these texts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally classical Hindu law was the embodiment of &lt;i&gt;dharma&lt;/i&gt;, which in itself was an amorphous concept. The constitutive elements of&lt;i&gt;dharma&lt;/i&gt; were law, religious rites, duties and obligations of members of a community, as well as morality.&lt;a name="_ftnref33"&gt;&lt;/a&gt; These elements do not however, exhaustively define &lt;i&gt;dharma&lt;/i&gt;. There exist varying definitions of	&lt;i&gt;dharma&lt;/i&gt;,&lt;a name="_ftnref34"&gt;&lt;/a&gt; and in some cases even ancient texts dealing with &lt;i&gt;dharma&lt;/i&gt; fail to articulate 	its definition.&lt;a name="_ftnref35"&gt;&lt;/a&gt; This is on account of the fact that the meaning of &lt;i&gt;dharma&lt;/i&gt;, varied depending on the in which it is used&lt;a name="_ftnref36"&gt;&lt;/a&gt; Owing to the fact that classical Hindu jurisprudence was informed by	&lt;i&gt;dharma, &lt;/i&gt;the former was an amalgamation of law, religion and morality. Therefore it was categorised as jurisprudence that lacked the secularity 	exhibited by modern positivist law.&lt;a name="_ftnref37"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The co-existence of law and morality in classical Hindu law has led to various debates regarding its nature.	&lt;a name="_ftnref38"&gt;&lt;/a&gt; Before explicating the nature of classical Hindu law, its sources must be elaborated on. As referred 	to, the sources are &lt;i&gt;sruti&lt;/i&gt;, &lt;i&gt;smriti&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;and&lt;i&gt; acara&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sruti is constituted by the &lt;i&gt;Vedas&lt;/i&gt;,&lt;i&gt; Brahmanas&lt;/i&gt;,&lt;i&gt; Aranyakas&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;and&lt;i&gt; Upanishads&lt;/i&gt;. Vedas are divine revelations that contain no positive precept &lt;i&gt;per se&lt;/i&gt;. They are considered as the spirit of law, and believed to be the source of the rules of dharma.&lt;a name="_ftnref39"&gt;&lt;/a&gt; The Vedas are constituted by the Rigveda, Samveda, Yajurveda and Athravaveda.&lt;a name="_ftnref40"&gt;&lt;/a&gt; Based on the Vedic texts, treatises have been written elucidating religious practices.	&lt;a name="_ftnref41"&gt;&lt;/a&gt; These texts are known as the Brahmanas.&lt;a name="_ftnref42"&gt;&lt;/a&gt; The 	Aranyakas and the Upanishads engage in philosophical enquiries of the revelation in the Vedas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interpretations of the Sruti by various scholars are embodied in the Smriti. The connotations of smriti are twofold.	&lt;a name="_ftnref43"&gt;&lt;/a&gt; First, it implies knowledge transmitted through memory, as opposed to knowledge directly revealed by 	divinity.&lt;a name="_ftnref44"&gt;&lt;/a&gt; Additionally, it is the term used to collectively reference the Dharmasutras and 	Dharmashastra.&lt;a name="_ftnref45"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dharmasutras were essentially interpretations of revelation in only prose form, or a mixture of prose and verse.	&lt;a name="_ftnref46"&gt;&lt;/a&gt; They detailed the duties and rituals to be carried out by a person, through the four stages, of his or 	her life. The duties laid down also varied depending on the caste of a person.&lt;a name="_ftnref47"&gt;&lt;/a&gt; They also laid down 	guidelines for determining punishments.&lt;a name="_ftnref48"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dharmasastras on the other hand were in the verse form. Though their subject matter coincided with the Dharmasutra in terms of domestic duties and rituals, 	they had a wider ambit. The Dharmasastras also dealt with subjects such as statecraft, legal procedure for adjudicating disputes. In a limited way, they 	marked the diversification from strictly religious precepts, from those that were legal in nature. For instance the Manusmriti was an amalgamation of law 	and ritual. The Yajnawalkya Samhita however, has separate parts that deal with customary practices, legal procedure, and punitive measures. The Narada 	Smriti, in turn deals only with legal procedure and rules of adjudication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is opined that in due course of time, the Aryan civilisation diversified.&lt;a name="_ftnref49"&gt;&lt;/a&gt; Their life and literature 	were no longer limited to sacrificial practices, but took on a more 'secular' form.&lt;a name="_ftnref50"&gt;&lt;/a&gt; The Arthashastra is 	evidence of such diversification.&lt;a name="_ftnref51"&gt;&lt;/a&gt; Unlike the Dharmashastra, it deals with strategies to be employed in governance, regulations with regard to urban planning, commercialisation of surrogacy, espionage, among other things.	&lt;a name="_ftnref52"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third source of classical Hindu law, acara refers to customary practices and their authoritativeness was determined by the people.&lt;a name="_ftnref53"&gt;&lt;/a&gt; Their prevalence over textual tradition is contentious.	&lt;a name="_ftnref54"&gt;&lt;/a&gt; Some opine that acara prevails over textual traditions. However, the opposing school of thought 	believes that customary practices prevail only if the text is unclear or disputed.&lt;a name="_ftnref55"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other sources of classical Hindu law include the &lt;i&gt;itihas &lt;/i&gt;(epics such as the Mahabharata and Ramayana), and digests written by scholars.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the diversity of sources and its non-conformity to positivism, the nature of classical Hindu law is a heavily contested issue. For instance, with regard to the legal procedure in the Dharmashastra, Maynes opines that these rules qualified as law in the modernist sense.&lt;a name="_ftnref56"&gt;&lt;/a&gt; Ludo Rocher however, opines that textual treatises would not qualify as law.	&lt;a name="_ftnref57"&gt;&lt;/a&gt; Classical Hindu law can admittedly not be identified as strictly legal or strictly moral. However, it 	does in a limited way recognise the distinction between legal procedure and morality.&lt;a name="_ftnref58"&gt;&lt;/a&gt; This is to say, 	it is not merely a source of rituals, but also lays down precepts that are jurisprudentially relevant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On account of its non-conformity with characteristics of a modernist legal system, classical Hindu law was displaced by its colonial version. The British 	attempted to accomplish this though the process of codification.&lt;a name="_ftnref59"&gt;&lt;/a&gt; The colonial attempts to codify Hindu 	law were carried forward by the Indian government post-independence. The result was the Hindu Code Bill. The context in which this codification took place must be examined in order to better comprehend this transmogrification. Post-independence, the idea of a Uniform Civil Code had been debated.&lt;a name="_ftnref60"&gt;&lt;/a&gt; However it was at odds with the Nehruvian notion of secularity.	&lt;a name="_ftnref61"&gt;&lt;/a&gt; The codification of Hindu personal law was an attempt at modernising it, without infringing on the religious freedom of Hindus.&lt;a name="_ftnref62"&gt;&lt;/a&gt; The idea was to confine the influence of religion to the private sphere.	&lt;a name="_ftnref63"&gt;&lt;/a&gt; What emerged was the Hindu Code Bill, which served as the blueprint for the Hindu Marriage Act, the Hindu Succession Act, the Hindu Minority and Guardianship Act and, the Hindu Adoption and Maintenance Act.	&lt;a name="_ftnref64"&gt;&lt;/a&gt; Colonial Hindu law was thus displaced by modern Hindu law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Galanter observes however, modernisation through legislations may formalise or even modify classical precepts, but cannot erase them completely.	&lt;a name="_ftnref65"&gt;&lt;/a&gt; For instance, Section 7 of the Hindu Marriage Act, which prescribes the ceremonial requirements for a 	Hindu marriage, replicates those prescribed in Classical Hindu law.&lt;a name="_ftnref66"&gt;&lt;/a&gt; Additionally a plethora of judicial 	decisions have relied on or taken into consideration, precepts of ancient Hindu jurisprudence.&lt;a name="_ftnref67"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is evident thus that ancient precepts still inform modern Hindu law. Given their relevance, it would be erroneous to write off classical Hindu law as 	completely irrelevant in a modernist context.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Part II: Precepts of Privacy in Classical Hindu Law&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As referred to, we have not come across a terminological equivalent of the term 'privacy' in the course of our research. The linguistic lacuna is 	admittedly a hurdle in articulating the pre-modern understanding of privacy as found in Hindu jurisprudence. It is not however, an argument against the 	very existence of privacy. The lack of pre-modern terminology necessitates the usage of modern terms in classifying the aspects of privacy detailed in 	Hindu jurisprudence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, broadly speaking, the aspects of privacy we have culled out from the material at hand are those of physical space/ property, thought, bodily 	integrity, information, communication, and identity. As will be demonstrated these aspects overlap on occasion and are by no means an exhaustive 	indication. In order to contextualise these aspects within the realm of Hindu jurisprudence, they are detailed below through specific illustrations.&lt;/p&gt;
&lt;p align="left"&gt;&lt;i&gt;A. &lt;/i&gt; &lt;i&gt;Privacy of physical Space/ property&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Akin to the modern legal system that first understood privacy in proprietary terms,&lt;a name="_ftnref68"&gt;&lt;/a&gt; Hindu jurisprudence 	too accorded importance to privacy in terms of physical space. This is further illustrated by the similarity between the common law notion of a man's house being his castle,&lt;a name="_ftnref69"&gt;&lt;/a&gt; and the institutional primacy accorded by the Naradsmriti to the household	&lt;a name="_ftnref70"&gt;&lt;/a&gt;. The common denominator here is the recognition of a claim to privacy against the sovereign. This claim operated against society at large as well. For instance, an individual caught trespassing on someone else's property was liable to be fined.	&lt;a name="_ftnref71"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These religious precepts were supplemented by those reflected in texts such as the Arthashastra. By way of illustration the house building regulations 	prescribed by it are largely informed by the recognition of a need for privacy. To begin with, a person's house should be built at a suitable distance from 	a neighbour's house, to prevent any inconvenience.&lt;a name="_ftnref72"&gt;&lt;/a&gt; In addition the house's doors and windows should 	ideally not face a neighbours doors and windows directly.&lt;a name="_ftnref73"&gt;&lt;/a&gt; The occupants of the house should ensure the 	doors and windows are suitably covered.&lt;a name="_ftnref74"&gt;&lt;/a&gt; Furthermore in the absence of a compelling justification, 	interference in a neighbour's affairs is penalised.&lt;a name="_ftnref75"&gt;&lt;/a&gt;Juxtaposed to religious texts that often perceived 	privacy as a concept driven by the imperative of purity,&lt;a name="_ftnref76"&gt;&lt;/a&gt; the Arthashastra is reflective of a secular 	connotation of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the household was privileged as the foundational institution in Hindu jurisprudence, claims of privacy extend beyond one's house to other physical 	objects as well, regardless of whether they were extensions of the household or not. For instance, both the Yajnawalkya Samhita and the Manusmriti condemn 	the usage of another person's property without his or her permission.&lt;a name="_ftnref77"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What is noteworthy in the context of personal property is that in an era infamous for the denigration of women, Hindu jurisprudence recognised a woman's 	claim over property. This property, also known as Stridhana, had varied definitions. In the Yajnawalkya Samhita for instance, it is conceptualised as, 	"What has been given to a woman by the father, the mother, the husband or a brother, or received by her at the nuptial fire, or given to her on her 	husband's marriage with another wife, is denominated Stridhana or a woman's property".&lt;a name="_ftnref78"&gt;&lt;/a&gt; In the 	Manusmriti, it is defined as "What was given before the nuptial fire, what was given on the bridal procession, what was given in token of love, and what 	was received from her brother, mother, or father, that is called the sixfold property of a woman".&lt;a name="_ftnref79"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond mere cognizance of proprietary rights however, these precepts were also informed by the notion of exclusivity. Consequently, a woman's husband or 	his family were precluded from using her Stridhana, unless they were in dire straits. Additionally it was a sin for a woman's relatives to use her wealth 	even if the same was done unknowingly.&lt;a name="_ftnref80"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;B. &lt;/i&gt; &lt;i&gt;Privacy of Thought&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the aspect of physical space, a claim to privacy vis-a-vis the intangible realm of thought was afforded by Hindu jurisprudence. In the modern context the link between solitude and privacy has been recognised as early as 1850 by Warren and Brandeis.	&lt;a name="_ftnref81"&gt;&lt;/a&gt; The key distinction is that in the modern era this need for solitude was seen as a function of the 	increasing invasion of privacy.&lt;a name="_ftnref82"&gt;&lt;/a&gt; In the pre-modern era however, solitude was considered essential for 	self-actualisation, and not as a response to the increasing invasion of the private realm. Meditation in solitude was perceived as enabling existence in 	the highest state of being.&lt;a name="_ftnref83"&gt;&lt;/a&gt; In fact a life in solitude was identified as a pre-requisite for being 	liberated.&lt;a name="_ftnref84"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though solitude itself is intangible, engaging in meditation would require a tangible solitary space.&lt;a name="_ftnref85"&gt;&lt;/a&gt; This is where the privacy of thought overlapped with the aspect of privacy of space. Accordingly, the Arthashastra prescribed that forest areas be set 	aside for meditation and introspection.&lt;a name="_ftnref86"&gt;&lt;/a&gt; It also recognised the need for ascetics to live within these 	spaces harmoniously, without disturbing each other.&lt;a name="_ftnref87"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is evident, that as far as the aspects of privacy were concerned, there were no watertight compartments.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;C. &lt;/i&gt; &lt;i&gt;Privacy with respect to bodily integrity&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A claim to privacy of thought can only be substantively realised when complemented by the notion of privacy with respect to bodily integrity, as corporeal 	existence serves as a precursor to mental well-being. The inference drawn from the relevant precepts concerning this aspect is that they were largely 	women-centric. Arguably they were governed by a misplaced patriarchal notion that women's modesty needed to be protected. At best they could be considered 	as implicit references to an expectation of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Manusmriti states, "But she who…goes to public spectacles or assemblies, shall be fined six krishnalas".	&lt;a name="_ftnref88"&gt;&lt;/a&gt; Restrictions operating during a woman's menstruation were twofold. Her family was prohibited from 	seeing her. Additionally cohabitation with such a woman was also forbidden.&lt;a name="_ftnref89"&gt;&lt;/a&gt; It should be pointed out 	that that these constructs had little to do with a woman's expectation of privacy. They were forbidden due to the attached implications of impurity that 	would vest in the defaulter. A woman's autonomy with regard to her body was not regarded as a factor meriting consideration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there were constructs, albeit limited, which were more egalitarian in their approach and did recognise her autonomy. They established that women do have an expectation of privacy in terms of bodily integrity. Sexual assault was considered as an offence.	&lt;a name="_ftnref90"&gt;&lt;/a&gt; Evidence of this is found in the Yajnawalkya Samhita which states, "If many persons know a woman 	against her will, each of them should be made to pay a fine of twenty four panas".&lt;a name="_ftnref91"&gt;&lt;/a&gt; In addition, the 	Arthashastra vested in commercial sex workers the right to not be held against their will.&lt;a name="_ftnref92"&gt;&lt;/a&gt; Further it 	expressly states that even a commercial sex worker cannot be forced to engage in sexual intercourse.&lt;a name="_ftnref93"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Women could make a claim to privacy not only against society at large, but also against their husbands. Ironically, while our contemporary legal system (i.e., the Indian legal system) fails to criminalise marital rape, the &lt;i&gt;Manusmriti&lt;/i&gt; considered it an offence.	&lt;a name="_ftnref94"&gt;&lt;/a&gt; Additionally, husbands were also prohibited from looking at their wives when the latter were in a 	state of relaxation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;D. &lt;/i&gt; &lt;i&gt;Privacy of Information and Communication&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the three aspects explicated above were by and large restricted to the individual, the privacy of information and communication has been largely 	confined by Hindu jurisprudence to the realm of the sovereign. Both the Manusmriti and the Arthashastra acknowledge the importance of a secret council that 	aids the king in deliberations.&lt;a name="_ftnref95"&gt;&lt;/a&gt; These deliberations are to be carried on in a solitary place that was well-guarded.&lt;a name="_ftnref96"&gt;&lt;/a&gt; The decisions made in these deliberations are to be revealed on a need to know basis.	&lt;a name="_ftnref97"&gt;&lt;/a&gt; That is to say, only persons concerned with the implementation of these decisions are to be informed. 	The Manusmriti also provides for private deliberation by the king on matters not involving governance. It provides, "At midday or midnight , when his 	mental and bodily fatigues are over, let him deliberate, either with himself alone or with his ministers on virtue, pleasure, and wealth".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from governance, privacy of information also pertained to certain types of documents that were considered private in nature. These are documents that 	involve transactions such as partition, giving of a gift, purchase, pledge and debt. What is interesting about this precept is the resemblance it bears to 	the common law notion of privity. The common characteristic of the documents referred to, is that they concerned transactions undertaken between two or 	more persons. The rights or obligations arising from these transactions were confined to the signatories of these documents. It could be possible that the 	privatisation of these documents was aimed at guarding against disruption of transactions via third party intrusions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The limited reference to private communications is found within the realm of governance, within the context of privacy of information. The only illustration of this that we have come across is the precept in the Arthashastra that requires intelligence to be communicated in code.	&lt;a name="_ftnref98"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;E. &lt;/i&gt; &lt;i&gt;Privacy of Identity &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The final aspect that warrants detailing is the privacy of identity. The notion of privacy of identity can be understood in two ways. The first deals with 	protection of personal information that could be traced back to someone, thus revealing his or her identity. The second recognises the component of 	reputation. It seeks to prevent the misappropriation or maligning of a person's identity and thus reputation. In ancient Hindu jurisprudence there is 	evidence of recognition of the latter. An illustration of the same is offered by the precept which states "For making known the real defects of a maiden, 	one should pay a fine of a hundred panas".&lt;a name="_ftnref99"&gt;&lt;/a&gt; Another precept prescribes that false accusations against 	anyone in general are punishable by a fine. Additionally, there is also a restriction operating against destroying or robbing a person of his or her 	virtue.&lt;a name="_ftnref100"&gt;&lt;/a&gt; In the modern context, the above would be understood under the rubric of defamation. These 	precepts are indicative of the fact that defamation was recognised as an offence way before the modern legal system afforded cognizance to the same.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The dominant narrative surrounding the privacy debate in India is that of the alien-ness of privacy. This paper has attempted to displace the notion that 	privacy is an inherently 'Western' concept that is the product of a modernist legal system. No doubt the common understanding of the legal conception of 	privacy is informed by modernity. In fact, the research conducted in support of this paper has been synthesised from privacy information through a 	modernist lens. The fact still remains however, that privacy is an amorphous context, and its conceptions vary across cultures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To better appreciate the relevance of Classical Hindu law in a modernist context, the nature of Hindu law must be examined first. While Hindu jurisprudence 	might not qualify as law in the positivist sense of the term, its precepts continue to inform India's statues and judicial pronouncements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is subjective and eludes a straitjacketed definition. On occasion this elusiveness is a function of its overlapping and varying aspects. At other 	times it stems from a terminological lacuna that complicates the explication of privacy. These impediments notwithstanding, it is abundantly clear that the 	essence of privacy is reflected in Hindu culture and jurisprudence. This may give pause to thought to those who seek to argue that 'collectivist' cultures 	do not value privacy or exhibit the need for it.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; Daniel J. Solove, &lt;i&gt;A Taxonomy of Privacy&lt;/i&gt;, University of Pennsylvania Law Review, Vol. 154(3), January 2006.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; Upendra Baxi, &lt;i&gt;Who Bothers About the Supreme Court: The Problem of Impact of Judicial Decisions&lt;/i&gt;, available at 			http://clpr.org.in/wp-content/uploads/2013/08/whobothersabouttheSupremeCourt.pdf (Last visited on December 23, 2014) (The enforceability of rights 			often sets their individual enjoyment apart from their jurisprudential value); In India, the reading of privacy into Article 21 has not resulted in 			a mechanism to enforce a standalone right to privacy, See R.H. Clark, Constitutional Sources of the Penumbral Right to Privacy, available at 			http://digitalcommons.law.villanova.edu/cgi/viewcontent.cgi?article=2046&amp;amp;context=vlr (Last visited on December 23, 2014) (In the United States, 			the right to privacy was located in the penumbra of the right to personal autonomy).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; See PUCL v. Union of India, AIR 1997 SC 568.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; See Griswold v. Connecticut, 381 U.S. 479 (1965); Lawrence v. Texas, 539 U.S. 558 (2003).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; See The Indian Penal Code, 1850, Section 499.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; See The Hindu Marriage Act, 1955 Section 22; The Special Marriage Act, 1954, Section 33.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; Bhairav Acharya &amp;amp; Vidushi Marda, &lt;i&gt;Identifying Aspects of Privacy in Islamic Law&lt;/i&gt;, available at 			http://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law (Last visited on December 23, 2014).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; See Robert Lingat, The Classical Law of India (1973).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt; Donald R. Davis, Jr., The Spirit of Hindu Law (2010) (This importation must be viewed against the backdrop of the characteristics of the era of 			Enlightenment wherein primacy was accorded to secular reason and the positivist conception of law. Davis observes "One cannot deny the increasing 			global acceptance of a once parochial notion of law as rules backed by sanctions enforced by the state. This very modern, very European notion of 			law is not natural, not a given; it was produced at a specific moment in history and promulgated systematically and often forcibly through the institutions of what we now call the nation-state, especially those nations that were also colonial powers.)"; But see Alan Gledhill,			&lt;i&gt;The Influence of Common Law and Equity on Hindu Law Since 1800&lt;/i&gt;, available at http://www.jstor.org/stable/755588 (Last visited on December 			23, 2014); Werner Menski, &lt;i&gt;Sanskrit Law: Excavating Vedic Legal Pluralism&lt;/i&gt;, available at 			http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1621384 (Last visited on December 23, 2014) (However, this replacement of traditional legal 			systems did not extend to personal laws. Personal laws in India continue to be community-based, sometimes un-codified, draw from a diverse set of 			simultaneously applicable sources and traditional schools of jurisprudence.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 8, Acharya &amp;amp; Marda.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; Privacy International, &lt;i&gt;A New Dawn: Privacy in Asia&lt;/i&gt;, available at 			https://www.privacyinternational.org/reports/a-new-dawn-privacy-in-asia/background (Last visited on December 28, 2013) ("It is only recently that 			the debate around privacy was stuck in this "collectivist" vs. "individualistic" cultural discourse…we discovered that privacy concerns and 			the need for safeguards were often embedded deeply in a nation, and &lt;i&gt;not just as a response to a modern phenomenon.&lt;/i&gt;").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; Privacy International, &lt;i&gt;A New Dawn: Privacy in Asia&lt;/i&gt;, available at 			https://www.privacyinternational.org/reports/a-new-dawn-privacy-in-asia/background (Last visited on December 28, 2013)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; J. Duncan M. Derrett, &lt;i&gt;The Administration of Hindu Law by the British&lt;/i&gt;, available at http://www.jstor.org/stable/177940 (Last visited on 			December 23, 2014).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Manusmriti, Chapter IV, 201.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt; Manusmriti, Chapter IV, 202.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;&lt;/a&gt; Wael B. Hallaq, An Introduction to Islamic Law 31 (2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;&lt;/a&gt; Donald R. Davis, Jr., The Spirit of Hindu Law (2010).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn20"&gt;&lt;/a&gt; Marc Galanter, &lt;i&gt;The Displacement of Traditional Law in Modern India&lt;/i&gt;, Journal of Social Issues, Vol. XXIV, No. 4, 1968.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 20, Galanter.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 10, Menski.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;&lt;/a&gt; Werner Menski, Hindu Law: Beyond Tradition and Modernity (2003).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;&lt;/a&gt; Ashcroft as cited in Werner Menski, Hindu Law: Beyond Tradition and Modernity (2003).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a name="_ftn27"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 20, Galanter.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a name="_ftn28"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a name="_ftn29"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a name="_ftn30"&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a name="_ftn31"&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a name="_ftn32"&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a name="_ftn33"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 19, Davis.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a name="_ftn34"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a name="_ftn35"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a name="_ftn36"&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a name="_ftn37"&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a name="_ftn38"&gt;&lt;/a&gt; J. Duncan M. Derrett, Introduction to Modern Hindu Law (1963); &lt;i&gt;Supra&lt;/i&gt; note 19, Davis.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a name="_ftn39"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 9, Lingat.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a name="_ftn40"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a name="_ftn41"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a name="_ftn42"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a name="_ftn43"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a name="_ftn44"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a name="_ftn45"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a name="_ftn46"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a name="_ftn47"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a name="_ftn48"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a name="_ftn49"&gt;&lt;/a&gt; John D. Mayne, Hindu Law (1875).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a name="_ftn50"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a name="_ftn51"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 49, Mayne.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a name="_ftn52"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a name="_ftn53"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 19, Davis.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a name="_ftn54"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a name="_ftn55"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a name="_ftn56"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 49, Mayne.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a name="_ftn57"&gt;&lt;/a&gt; Ludo Rocher, Studies in Hindu Law and Dharamasastra (2012).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn58"&gt;&lt;/a&gt; For instance the Yajnawalkya Samhita has clear delineations in its chapters, segregating customary practices, legal procedure and punitive 			measures.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn59"&gt;&lt;/a&gt; Madhu Kishwar, &lt;i&gt;Codified Hindu Law: Myth and Reality&lt;/i&gt;, available at http://www.jstor.org/stable/4401625 (Last visited on December 23, 2014).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a name="_ftn60"&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a name="_ftn61"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 59.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a name="_ftn62"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a name="_ftn63"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a name="_ftn64"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a name="_ftn65"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 20, Galanter.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a name="_ftn66"&gt;&lt;/a&gt; See The Hindu Marriage Act, 1955, Section 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn67"&gt;&lt;/a&gt; Saroj Rani v. Sudarshan Kumar Chadda, AIR 1984 SC 1562 (reflected the importance accorded by classical Hindu law to marital stability); M 			Govindaraju v. K Munisami Goundu 1996 SCALE (6) 13(The Supreme Court looked to ancient Shudra custom to adjudicate on a matter of adoption); 			Rajkumar Patni v. Manorama Patni, II (2000) DMC 702 (The Madhya Pradesh High Court, relied on the definition of Stridhan by Manu.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a name="_ftn68"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 8, Acharya &amp;amp; Marda.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a name="_ftn69"&gt;&lt;/a&gt; Semayne v. Gresham, 77 Eng. Rep. 194, 195; 5 Co. Rep. 91, 195 (K.B. 1604).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn70"&gt;&lt;/a&gt; As cited in Julius Jolly, The Minor Law Books 164 (1889), ("A householder's house and field are considered as the two fundamentals of his 			existence. Therefore let not the king upset either of them; for that is the root of the householders").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn71"&gt;&lt;/a&gt; Manmath Nath Dutt, The Dharamshastra - Hindu Religious Codes, Volume 1, 103 (1978) (Yajnawalkya Samhita, Chapter II 235-236: "He…who opens 			the doors of a closed house [without the permission of the master]…should be punished with fifty panas. Such is the law.").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn72"&gt;&lt;/a&gt; L.N. Rangarajan, Kautalya: The Arthashastra 371 (1992) ("O be built at a suitable distance from the neighbours property so as not to cause 			inconvenience to the neighbour").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn73"&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; ., ("…doors and windows shall be made so as not to cause annoyance by facing a neighbour's door or window directly").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn74"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 72, Rangarajan, ("when the house is occupied the doors and windows shall be suitably covered").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a name="_ftn75"&gt;&lt;/a&gt; &lt;i&gt; Id.&lt;/i&gt;, 376.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a name="_ftn76"&gt;&lt;/a&gt; See Manusmriti, Chapter IV, 201-202.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn77"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 71, Dutt, 27 (Yajnawalkya Samhita, Chapter I , 160: "One should avoid the bed, seat, garden-house and the conveyance belonging to another 			person.").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a name="_ftn78"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 71, Dutt, 89 (Yajnawalkya Samhita, Chapter II, 146).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a name="_ftn79"&gt;&lt;/a&gt; Manusmriti, Chapter IX, 194.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a name="_ftn80"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 71, Dutt Volume 2, 276 (Angiras Samhita, Chapter I, 71).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a name="_ftn81"&gt;&lt;/a&gt; Samuel D. Warren &amp;amp; Louis D. Brandeis, &lt;i&gt;The Right to Privacy&lt;/i&gt;, Harvard Law Review, Vol. IV, December 15, 1890, No.5.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a name="_ftn82"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn83"&gt;&lt;/a&gt; Manusmriti, Chapter IV, 258; &lt;i&gt;Supra &lt;/i&gt;note 71, Dutt, 134 (Yajnawalkya Samhita Chapter III, 111: "Having withdrawn the mind, understanding, 			retentive faculty and the senses from all their objects, the soul, the lord…should be meditated upon.").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a name="_ftn84"&gt;&lt;/a&gt; Manu Chapter VI, 44.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn85"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 71, Dutt, 186 (Harita Chapter VII, 6: "Situated in a solitary place with a concentrated mind, he should, till death mediate on the			&lt;i&gt;atman&lt;/i&gt;, that is situated both in the mind and the external world… ").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a name="_ftn86"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 72, Rangarajan, (Arthashastra, 2.2.2).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a name="_ftn87"&gt;&lt;/a&gt; Supra note72, Rangarajan, (Arthashastra 3.16.33-36).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a name="_ftn88"&gt;&lt;/a&gt; Manusmriti IX, 84&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a name="_ftn89"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 71, Dutt, Volume 2, 350 (Samvarta Samhita,163).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a name="_ftn90"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 71, Dutt, Volume 1, 112 (Yajnawalkya Samhita, Chapter II, 291).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a name="_ftn91"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 71, Dutt, Volume 1, 113 (Yajnawalkya Samhita, Chapter II, 294).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a name="_ftn92"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 72, Ranjarajan (Arthashastra 2.27.14).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a name="_ftn93"&gt;&lt;/a&gt; Supra note 72, Rangarajan (Arthashastra 4.13.38).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a name="_ftn94"&gt;&lt;/a&gt; Manusmriti, X, 62&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn95"&gt;
&lt;p&gt;&lt;a name="_ftn95"&gt;&lt;/a&gt; Manusmriti Part VII, &lt;i&gt;Supra &lt;/i&gt;note 101, Rangarajan (Arthashastra 1.15.2-5, 1.15.13-17).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn96"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn96"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 72, Rangarajan (Arthashastra 1.15.2-5 : The scrutiny of governance related affairs was take place in a secluded and well-guarded spot, where 			it could not be overheard. No unauthorised person was allowed to approach these meetings.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn97"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn97"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 72, Rangarajan (Arthashastra 1.15.13-17: "…Only those who have to implement it should know when the work is begun or when it has been 			completed.").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn98"&gt;
&lt;p&gt;&lt;a name="_ftn98"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 72, Rangarajan.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn99"&gt;
&lt;p&gt;&lt;a name="_ftn99"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 71, Dutt, Volume 1, 112 (Yajnawalkya Samhita, Chapter II, 292).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn100"&gt;
&lt;p&gt;&lt;a name="_ftn100"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 71, Dutt, Volume 4, 919 (Vishnu Samhita, Chapter LII, 16).&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law'&gt;https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Ashna Ashesh and Bhairav Acharya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-01-01T13:56:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/business-standard-december-26-2014-anita-babu-why-india-failed-to-discover-the-isis-twitter-handle">
    <title>Why did India fail to discover the ISIS Twitter handle?</title>
    <link>https://cis-india.org/internet-governance/news/business-standard-december-26-2014-anita-babu-why-india-failed-to-discover-the-isis-twitter-handle</link>
    <description>
        &lt;b&gt;India's surveillance system fails to track the servers of internet giants like Google or Facebook because these do not have servers in the country, says a leading cyber law expert.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Anita Babu was &lt;a class="external-link" href="http://www.business-standard.com/article/current-affairs/why-india-failed-to-discover-the-isis-twitter-handle-114122500522_1.html"&gt;published in the Business Standard&lt;/a&gt; on December 26, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Back in 2009, after the investigation team, probing into the 26/11  Mumbai terror attacks, almost cracked the case, it was the US’s Federal  Bureau of Investigation (FBI) which connected the missing links by  arresting David Headley, the mastermind.&lt;br /&gt; &lt;br /&gt; Five years later, India &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Is" target="_blank"&gt;is &lt;/a&gt;staring  at a similar situation, when Bengaluru-based Mehdi Masroor Biswas, was  allegedly found to be operating a pro-ISIS (Islamic State) &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Twitter" target="_blank"&gt;Twitter &lt;/a&gt;handle.  It was a British broadcaster, Channel 4, which blew the lid off  Biswas’s activity. Soon after the report, Indian authorities swung into  action.  Last year, when communal violence broke out in some parts of  Uttar Pradesh, a Pakistani news organisation reported that a fake video  was being circulated to fan sentiments.&lt;br /&gt; &lt;br /&gt; But, why have Indian agencies failed to detect such activities which  pose a threat to the national security? A senior government official  said intelligence agencies in the country scan the internet for leads.  But, in the light of increased threats, systems need to be beefed up  significantly.  Perhaps, as a first step towards this, the home ministry  on Wednesday formed a committee to prepare a road map for tackling  cyber crimes in the country.&lt;br /&gt; &lt;br /&gt; It will give suitable recommendations on all facets of cyber crime,  apart from suggesting possible partnerships with public and private  sector, non-governmental organisations and international bodies.&lt;br /&gt; &lt;br /&gt; According to Sunil Abraham, executive director of a Bengaluru-based  research organisation, the Centre for Internet and Society, it’s time we  move closer towards intelligent and targeted surveillance, rather than  mass surveillance. This will require monitoring a selected accounts or  profiles, instead of tapping information from across the population.  Old-fashioned detective work is also very important, as it has helped  zero in on Biswas.&lt;br /&gt; &lt;br /&gt; Another problem the country faces is that a lot of data is being pooled  in by multiple agencies, but of little use. “We must free up our law  enforcement agencies and intelligence services from the curse of having  too much data,” Abraham adds. Since most of the internet companies are  headquartered outside India, the authorities face a lot of difficulties  in accessing information from these networks.&lt;br /&gt; &lt;br /&gt; “India’s surveillance system fails to track the servers of internet giants like &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Google" target="_blank"&gt;Google &lt;/a&gt;or &lt;a class="storyTags" href="http://www.business-standard.com/search?type=news&amp;amp;q=Facebook" target="_blank"&gt;Facebook &lt;/a&gt;because  these do not have servers in the country. Our system is only confined  within the country,” says Pavan Duggal, a leading cyber law expert.&lt;br /&gt; &lt;br /&gt; Since the US has the capability to access information from telecom  companies, service providers such as Twitter and Facebook and the  consortia that run submarine cables, these companies cooperate in a much  more effective and immediate manner, adds Abraham. “But these are  things that we will never be able to do in India,” he adds.&lt;br /&gt; &lt;br /&gt; For instance, India follows the mutual legal assistance treaty  procedure, to gather and exchange information in an effort to enforce  public laws or criminal laws. However, this is a time-consuming process  and often takes up to two years before we get any data from these  companies.&lt;br /&gt; &lt;br /&gt; But due to the threat of cyber-terrorism being shared by both companies  and governments, companies such as Google, Twitter and Facebook are  cooperating more than before, experts say.&lt;br /&gt; &lt;br /&gt; Internet and Jurisdiction Project, an international group that works  towards ensuring digital coexistence, tries to get a procedural law  between two countries in a harmonised manner and includes collection,  storage, handling and processing of evidence.&lt;br /&gt; &lt;br /&gt; More lubricating efforts should be undertaken internationally on these  lines, say experts. Hopefully, the new committee will take steps in this  direction.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/business-standard-december-26-2014-anita-babu-why-india-failed-to-discover-the-isis-twitter-handle'&gt;https://cis-india.org/internet-governance/news/business-standard-december-26-2014-anita-babu-why-india-failed-to-discover-the-isis-twitter-handle&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-27T03:27:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy">
    <title>Security, Governments, and Data: Technology and Policy</title>
    <link>https://cis-india.org/internet-governance/events/security-governments-data-technology-policy</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society and the Observer Research Foundation invite you to a one day conference on January 8, 2015 in New Delhi. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;About the Conference&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conference will focus on the technologies, policies, and practices around cyber security and surveillance. The conference will reach out to a number of key stakeholders including civil society, industry, government, and academia and explore the present scenario in India to reflect on ways forward.&lt;/p&gt;
&lt;h3 align="left" class="western"&gt;&lt;strong&gt;Conference &lt;/strong&gt;&lt;strong&gt;Context&lt;/strong&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;&lt;span&gt;Ensuring the security of the India’s cyber space is a complex, challenging, and ever changing responsibility that the government is tasked with.  Doing so effectively requires a number of factors to come together in a harmonized strategy including: laws &amp;amp; policies, technical capabilities, markets, and a skilled workforce. It also requires collaboration on multiple levels including with foreign governments, domestic and foreign industry, and law enforcement. The first of these is particularly important given the ability of attackers to penetrate across borders and the global nature of data. Any strategy developed by India must be proactive and reactive – evolving defences to prevent a potential threat and applying tactics to respond to a real time threat. To do so, the government of India must legally have the powers to take action and must have the technical capability to do so. Yet, many of these powers and technical capabilities require a degree of intrusion into the lives of citizens and residents of India through means such as surveillance. Thus, such measures must be considered in light of principles of proportionality and necessity, and legal safeguards are needed to protect against the violation of privacy. Furthermore, a principle of optimization must be considered i.e, how much surveillance achieves the most amount of security and how can this security be achieved with the optimal mix of technology, policy and enforcement.&lt;/span&gt;&lt;/p&gt;
&lt;h3 align="left" class="western"&gt;Panel Descriptions&lt;/h3&gt;
&lt;p align="left"&gt; &lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt;Challenges &amp;amp; Present Scenario&lt;/strong&gt;&lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;span&gt;Protecting and enhancing the cyber security of India is a complex and dynamic responsibility. The challenge of securing cyber space is magnified by the demarcated nature of the internet, the multiplicity of vulnerabilities that can be exploited at the national level, the magnitude of infrastructure damage possible from a cyber attack, and the complexity of application of a jurisdiction’s law to a space that is technologically borderless. A comprehensive ‘cyber security’ ecosystem is required to address such challenges – one that involves technology, skills, and capabilities – including surveillance capabilities.  The Government of India has taken numerous steps to address and resolve such challenges.  In July 2013, the National Cyber Security Policy  was published for the purpose of creating an enabling framework for the protection of India’s cyber security. In February 2014, the 52&lt;/span&gt;&lt;sup&gt;nd&lt;/sup&gt;&lt;span&gt; Standing Committee on Information Technology issued a report assessing the implementation of this policy – in which they found that a number of areas needed strengthening. The Government of India has also proposed the establishment of a number of centres focused on cyber security – such as the National Cyber Coordination Center and the National Critical Information Infrastructure Protection Centre.  CERT-IN, under the Department of Electronics and Information Technology is presently the body responsible for overseeing and enforcing cyber security in India, while other bodies such as the Resource Centre for Cyber Forensic and TERM cells under the Department of Telecommunications play critical roles in overseeing and undertaking capabilities related to cyber security.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Law &amp;amp; Policy&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span&gt;India has five statutes regulating the collection and use of data for surveillance purposes. These laws define circumstances on which the government is justified in accessing and collecting real time and stored data as well as procedural safeguards they must adhere to when doing so. The Department of Telecommunications has also issued the Unified Access License which, among other things,  mandates service providers to provide technical support to enable such collection. The Indian judicial system has also provided a number of Rulings that set standards for the access, collection, and use of data as well as defining limitations and safeguards that must be respected in doing so. The draft Privacy Bill 2011, released by the Department of Personnel and Training, also contained provisions addressing surveillance in the context of interception and the use of electronic video recording devices. In the Report of the Group of Experts on Privacy, the AP Shah Committee found that the legal regime for surveillance in India was not harmonized and lacked safeguards. Furthermore, in the era where the direct collection of large volumes of data is easily possible, there is a growing need to re-visit questions about the legitimate and proportionate collection and use (particularly as evidence) of such data. Questions are also arising about the applicability of standards and safeguards to the state. At a global level, catalyzed by the leaks by Edward Snowden, there has been a strong push for governments to review and structure their surveillance regimes to ensure that they are in line with international human rights standards.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Architecture &amp;amp; Technology&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span&gt;India is in the process of architecting a number of initiatives that seek to enable the collection and sharing of intelligence such as the CMS, NATGRID, and NETRA. At a regional level, the Ministry of Home Affairs is in the process of implementing ‘Mega Policing Cities’ which include the instalment of CCTV’s and centralized access to crime related information. Globally, law enforcement and governments are beginning to take advantage of the possibilities created by ‘Big Data’ and ‘open source’ policing. The architecture and technology behind any surveillance and cyber security initiative are key to its success. Intelligently and appropriately designed projects and technology can also minimize the possibility of intrusions into the private lives of citizens. Strong access controls, decentralized architecture, and targeted access are all principles that can be incorporated into the architecture and technology behind a project or initiative. At the same time, the technology or process around a project can serve as the ‘weakest link’ – as it is vulnerable to attacks and tampering. Such possibilities raise concerns about the use of foreign technology and dependencies on foreign governments and companies.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;International and Domestic Markets&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;span&gt;Globally, the security market is growing – with companies offering a range of services and products that facilitate surveillance and can be used towards enhancing cyber security. In India, the security market is also growing with studies predicting that it will reach $1.06 billion by 2015.  Recognizing the potential threat posed by imported security and telecom equipment, India also develops its own technologies through the Centre for Development of Telematics –attached to the Department of Telecommunications, and the Centre for Development of Advanced Computing – attached to the Department of Electronics and Information Technology. At times India has also imposed bans on the import of technologies believed to be compromised.  Towards this end, the Government of India  has a number of bodies responsible for licensing, auditing, and certifying the use of security and telecommunication equipment.  Though India has recognized the security vulnerabilities posed by these technologies, as of yet it has not formally recognized the human rights violations that are made possible. Indeed, though India has submitted a request to be a signing member of the &lt;/span&gt;&lt;span&gt;Wassenaar agreement, they have yet to be accepted.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;11.00&lt;/td&gt;
&lt;td&gt;Registration &amp;amp; Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30&lt;/td&gt;
&lt;td&gt;Key Note Speech&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.00&lt;/td&gt;
&lt;td&gt;Challenges &amp;amp; Present Scenario&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;/td&gt;
&lt;td&gt;Law &amp;amp; Policy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.00&lt;/td&gt;
&lt;td&gt;Architecture &amp;amp; Technology&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.00&lt;/td&gt;
&lt;td&gt;International &amp;amp; Domestic Markets&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.00&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.30&lt;/td&gt;
&lt;td&gt;Conclusion &amp;amp; Closing Remarks&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/security-governments-data-technology-policy'&gt;https://cis-india.org/internet-governance/events/security-governments-data-technology-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-24T08:06:59Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/reply-to-rti-filed-with-bsnl-regarding-network-neutrality-and-throttling">
    <title>Reply to RTI filed with BSNL regarding Network Neutrality and Throttling</title>
    <link>https://cis-india.org/internet-governance/blog/reply-to-rti-filed-with-bsnl-regarding-network-neutrality-and-throttling</link>
    <description>
        &lt;b&gt;As part of its work on Network Neutrality, the Centre for Internet and Society through Tarun Krishnakumar had filed a Right To Information (RTI) application with Bharat Sanchar Nigam Ltd. (BSNL), a state-owned teleco holding a market share of 65 per cent in the Indian land line and broadband markets — regarding its position on and adherence to Network Neutrality principles. 

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The application — targeted at easing the information asymmetry between internet service providers (ISPs) and consumers — elicited responses that provide interesting insights into the functioning of ISPs in India.&lt;/p&gt;
&lt;p&gt;The application queried BSNL about its:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Adherence to net neutrality / non-discrimination principles&lt;/li&gt;
&lt;li&gt;Throttling on the basis of content&lt;/li&gt;
&lt;li&gt;Throttling on the basis of protocol&lt;/li&gt;
&lt;li&gt;Limiting traffic / speeds for pornographic websites&lt;/li&gt;
&lt;li&gt;Limiting traffic / speeds for P2P / torrent connection&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In its reply, BSNL denied all forms of throttling on the basis of content and reaffirmed that it is bound by the terms of its ISP license granted by the Department of Telecommunications. The application and response are below:&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h3 style="text-align: center; "&gt;&lt;a name="application"&gt;&lt;/a&gt;&lt;b&gt;&lt;span&gt;Application&lt;/span&gt;:&lt;/b&gt;&lt;/h3&gt;
&lt;p align="center" style="text-align: center; "&gt;&lt;b&gt;&lt;span&gt;Request for Information under the Right to Information Act, 2005&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;To,&lt;/p&gt;
&lt;p&gt;Sh. Suresh Kumar&lt;br /&gt;Addl.GM (MIS)  &amp;amp; CPIO ,BSNL Co.&lt;br /&gt;R. No. -29, IR Hall&lt;br /&gt;Eastern Court, Janpath&lt;br /&gt;New Delhi – 110001&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Date of application&lt;/b&gt;: 08-10-2014&lt;/p&gt;
&lt;p align="center" style="text-align: center; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Subject: Network Neutrality / Throttling / Data discrimination policies of BSNL&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Please provide information as to the policies of BSNL / decisions taken in respect of the following questions. Please supply where possible a copy of the relevant documents, minutes of meeting, position papers etc.&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Does BSNL support the principle of net neutrality and non-discrimination of data?&lt;/li&gt;
&lt;li&gt;Does BSNL regulate internet traffic flows depending on the type of content being accessed by the user on its broadband connections?&lt;/li&gt;
&lt;li&gt;Does BSNL regulate internet traffic flows depending on the type of protocol being used by the user on its broadband connections?&lt;/li&gt;
&lt;li&gt;Please provide details of the various types of content/protocols for which BSNL regulates traffic and the nature of such regulations, restrictions as the case may be.&lt;/li&gt;
&lt;li&gt;Please provide a list of traffic for which BSNL engages in limiting internet speed or throttling.&lt;/li&gt;
&lt;li&gt;Does BSNL limit internet traffic or upload/download speeds for pornographic websites and content?&lt;/li&gt;
&lt;li&gt;Does BSNL limit internet traffic or upload/download speeds for Peer-to-peer or torrent connections?&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Please provide copies of all documents that pertain to BSNL’s policies and decisions in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is certified that I am a citizen of India and that I do not fall within the BPL category. I am enclosing Rupees thirty (Rs. 30) towards the application fee and photocopying costs under the RTI Act for the information and documents requested. Kindly inform me at the address stated below if any further fees are required to be paid.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Applicant&lt;/b&gt;:&lt;/p&gt;
&lt;p&gt;Tarun Krishnakumar&lt;br /&gt;Centre for Internet and Society&lt;br /&gt;No.194, 2nd C Cross Road, Domlur II Stage,&lt;br /&gt;Bangalore - 560071&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h3 style="text-align: center; "&gt;&lt;span&gt;RESPONSE FROM BSNL:&lt;/span&gt;&lt;/h3&gt;
&lt;div style="text-align: center; "&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;To,&lt;/p&gt;
&lt;p&gt;Sh. Tarun Krishnakumar&lt;br /&gt;Centre for Internet and Society&lt;br /&gt;No. 194, 2&lt;sup&gt;nd&lt;/sup&gt; C Cross Road, Domulur II stage,&lt;br /&gt;Bengaluru – 560071&lt;/p&gt;
&lt;p&gt;&lt;span style="text-decoration: underline;"&gt;Subject: Supply of Information under RTI ACT – 2005&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Case of Shri. Tarun Krishnakumar – reg.&lt;/p&gt;
&lt;p&gt;Ref:  -   1. No. BSNL/BBNW/RTI Act/Vol II/2012-13/52 dtd 28.10.2014&lt;/p&gt;
&lt;p&gt;2. No. 23-744/14-RTI dtd 21.10.2014&lt;/p&gt;
&lt;p&gt;With reference to the above subject, for the point wise information furnished as below:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;BSNL is following the guidelines as per the ISP License Agreement of DOT.&lt;/li&gt;
&lt;li&gt;NO, BSNL is NOT regulating the Internet traffic flow based on content.&lt;/li&gt;
&lt;li&gt;NO, BSNL is not regulating the Internet traffic flow based on the type of protocol.&lt;/li&gt;
&lt;li&gt;Not Applicable&lt;/li&gt;
&lt;li&gt;Not Applicable&lt;/li&gt;
&lt;li&gt;NO&lt;/li&gt;
&lt;li&gt;NO&lt;/li&gt;
&lt;li&gt;The documents relating to above are available on DOT’s website http://dot.gov.in&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;(Sd/-)&lt;/p&gt;
&lt;p&gt;DE Admin and APIO&lt;br /&gt;O/o General Manager&lt;br /&gt;BBNW, BSNL,&lt;br /&gt;5&lt;sup&gt;th&lt;/sup&gt; floor, BG (E), TE Building,&lt;br /&gt;Lazar Road, Fraser Town,&lt;br /&gt;Bengaluru – 560005&lt;br /&gt;Tel No. 080 - 25808878&lt;/p&gt;
&lt;p&gt;Copy to:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The Addl. GM (A) &amp;amp; CPIP O/o CGM, BBNW, New Delhi for information pl.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The scanned version of the reply is available &lt;a class="external-link" href="https://www.scribd.com/doc/250739602/BSNL-Reply-on-Net-Neutrality"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/reply-to-rti-filed-with-bsnl-regarding-network-neutrality-and-throttling'&gt;https://cis-india.org/internet-governance/blog/reply-to-rti-filed-with-bsnl-regarding-network-neutrality-and-throttling&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tarun</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Access</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2014-12-22T14:45:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors">
    <title>Thank You To Our 2014 Sponsors</title>
    <link>https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors</link>
    <description>
        &lt;b&gt;Today’s the last day of work in 2014 for the editorial team at MediaNama, though we’ll run a Holiday Wire update intermittently this week, we’ll have a brief year end review for each major segment. Thank you for reading us in 2014, and have a great Christmas and New Year.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog entry was &lt;a class="external-link" href="http://www.medianama.com/2014/12/223-thank-you-to-our-2014-sponsors-spice-digital-antfarm-astro-vision-bruceclay-buongiorno-ccavenue-cis-e2e-fortumo-getit-google-india-com-info-edge-onmobile-qualcomm-times-internet/"&gt;published in Medianama&lt;/a&gt; on December 22, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;From the business side, it’s been a great 2015 for us, and we really  appreciate the support we received in 2014 from all our sponsors,  especially Spice Digital, our annual sponsor, and Antfarm,  which supported us for almost the entire year. We’re still working, for  an idea of our 2015 plans and editorial calendar, please see the  presentation &lt;a href="http://www.medianama.com/advertise/" target="_blank" title="advertise on medianama"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Annual Sponsor:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.medianama.com/2011/08/223-thank-you-sponsors-one97-spice-digital/spice-logo-3/" rel="attachment wp-att-34993"&gt;&lt;/a&gt;-&lt;a href="http://www.spicedigital.in/" title="Spice Digital "&gt; Spice Digital Ltd&lt;/a&gt;:  a part of Spice Global Group – US$2 Billion conglomerate promoted by  Dr. BK Modi, is one of India’s leading Mobile Value Added Services  company and offers innovative solutions for Telecom Operators,  Enterprises and Government using mobile connectivity media – Voice, SMS,  USSD, WAP &amp;amp; 3G. We are preferred partner of all major telecom  service providers in India and providing services to international  telecom players in over 20 countries across the globe. We are pioneers  in innovation and technology and committed to deliver excellent Award  winning products and services to the customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have exclusive tie-ups with Hungama and PPL for music streaming services.&lt;br /&gt; We have acquired two leading international VAS players, MMS (Indonesia) and Beoworld (Malaysia).&lt;br /&gt; Recently, we had a major financial investment from MediaTek (Taiwan).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Our sponsors during 2014:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://antfarm.in/" title="Antfarm"&gt;Antfarm&lt;/a&gt; is  an innovation sandbox based out of Mumbai. It is led by a team of blue  sky thinkers, entrepreneurs and professionals. The company takes great  ideas with disruptive potential, puts together all the key ingredients  of people, technology, strategy, marketing and capital to build these  into scalable companies. The ultimate aim is to create global businesses  that are ideated and built out of India. The first set of companies  launched are &lt;a href="http://stylista.com/"&gt;Stylista.com&lt;/a&gt;, &lt;a href="http://arrive.com/signin"&gt;Arrive.com&lt;/a&gt;, Fork Media, and the farm is currently scaling up ideas in education, travel &amp;amp; leisure, retail, ad-tech and healthcare.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.clickastro.com/"&gt;Astro-Vision&lt;/a&gt; is a name easily recognized and held in great esteem in the world of  astrology services. Its products range from software that run on the  latest operating systems to web based solutions for major portals and  the latest range of mobile phones. Astro-Vision’s focus has always been  on providing innovative astrology solutions using the latest  technologies in the field of IT and communications. From Desktop PCs to  internet portals and mobiles phones, Astro- Vision’s range of solutions  includes stand alone applications, online apps and astro content  services. The company has strategic tie-ups with major IT enabled  service networks like Suvidhaa, Reliance world, One stop shop and many  networks under the Government of India’s CSC scheme, including Spanco  and GNG. Many popular Indian websites today are powered by  Astro-Vision’s web based astrology solutions and astrology content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.bruceclay.com/in/" title="Bruceclay"&gt;Bruce Clay&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.buongiorno.com/" title="Buongiorno"&gt;Buongiorno&lt;/a&gt;, founded  in 1999, is known in the worldwide mobile commerce ecosystem for  developing and managing paid apps and content that help consumers get  greater enjoyment from mobile devices. On July 2012, after the  settlement of a successful public tender offer, Buongiorno became a  wholly-owned subsidiary of NTT DOCOMO – a global leader in mobile  telecommunications technologies and services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With direct connections to more than 130 telecom operators in 25  countries, over 10 years’ experience and a team of 600 professionals,  Buongiorno makes the mobile internet experience happen for consumers  globally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.medianama.com/wp-content/uploads/ccavenue_highres.jpg"&gt;&lt;/a&gt;- &lt;a href="http://www.ccavenue.com/" title="CCAvenue"&gt;CCAvenue&lt;/a&gt; is India’s largest payment gateway solution powering 85% of the  eMerchants in India across all verticals &amp;amp; has played the role of a  catalyst to the growth of ecommerce with real time, multi-currency,  multiple payment options online payment processing services. The  solution is powered by proprietary technology that integrates  transaction-processing, advance shopping cart, Invoicing, mobile page,  risk assessment and fraud control, smart analytical dashboards, live  monitoring of bank gateways, financial reporting etc. CCAvenue is the  only complete PG solution in the country that has the unique ability to  offer the full spectrum of 100+ Internet payment options.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;5 Credit Cards&lt;/li&gt;
&lt;li&gt;50 Debit Cards&lt;/li&gt;
&lt;li&gt;6 ATM cum Debit Cards&lt;/li&gt;
&lt;li&gt;50+ Netbankings&lt;/li&gt;
&lt;li&gt;Mobile Payments&lt;/li&gt;
&lt;li&gt;4 Cash Cards&lt;/li&gt;
&lt;li&gt;CCAvenue PhonePay IVRS Based Payment Systems.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://cis-india.org/"&gt;The Centre for Internet and Society&lt;/a&gt; (CIS)  is a non-profit research organization that works on policy issues  relating to freedom of expression, privacy, accessibility for persons  with disabilities, access to knowledge and IPR reform, and openness  (including open government data, free/open source software, open  standards, open access to scholarly literature, open educational  resources, and open video), and engages in academic research on digital  natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS critically engages with concerns of &lt;a href="http://cis-india.org/about/substantive-areas/digital-pluralism" title="Digital Pluralism"&gt;digital pluralism&lt;/a&gt;, &lt;a href="http://cis-india.org/about/substantive-areas/public-accountability"&gt;public accountability&lt;/a&gt; and &lt;a href="http://cis-india.org/publications/curricula-and-teaching"&gt;pedagogic practices&lt;/a&gt;, in the field of Internet and Society, with particular emphasis on South-South dialogues and exchange.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hosting and Support&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.e2enetworks.com" rel="nofollow" title="E2E Networks"&gt;E2E Networks&lt;/a&gt;:  India’s most clued in dedicated hosting company founded by geeks. E2E  Networks Private Limited has been into the business of providing Low  latency Dedicated Servers and VPS Servers in India since 2009. E2E  Networks goes way beyond merely provisioning servers/cloud  infrastructure. Our expertise includes strategies and managed services  help for implementing the most suitable cloud architecture based on  public, private or hybrid cloud platforms for your web facing or  enterprise applications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://fortumo.com/" title="Fortumo"&gt;Fortumo&lt;/a&gt; allows any developer to set up payment processing for web and mobile  services, games or apps using carrier billing. Payments work for PC  applications, web services and HTML5, Android, Windows Phone &amp;amp;  Windows 8 apps. Fortumo supports payments in 81 countries through 300  mobile operators. Get started with our self-service setup (no monthly  fees or minimum volume commitments) at &lt;a href="http://fortumo.com/"&gt;http://fortumo.com&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.freeads.in/" title="FreeAds"&gt;Getit Infomedia&lt;/a&gt; is India’s digital supermarket for SMEs  to get relevant business leads. We seamlessly deliver excellent value  across all media platforms be it Voice, Mobile Applications, Online,  WAP, Web chat, Print etc. The services provide presence, enquiries and  leads to its advertisers while ensuring end users (consumers) have  access to the best information, benefits and offers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Sponsor&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.google.com" title="Google"&gt;Google&lt;/a&gt; is a global technology leader focused on improving the ways people  connect with information. Google’s innovations in web search and  advertising have made its website a top internet property and its brand  one of the most recognized in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.india.com/" title="India.com"&gt;India.com&lt;/a&gt; is a joint venture between two media giants – Zee Entertainment Enterprise Ltd (ZEEL) and www.&lt;a href="http://pmc.india.com/"&gt;PMC.com&lt;/a&gt; is  all about the new India that is funny, witty, shocking. It shows the  new age Indian in their language. India.com provides a perspective that  is reflective of the changing dynamic of the role media plays in India.  Find out what the new India is saying only at &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt;. Discover India and Indians at &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt; for  no one covers the new India as &lt;a href="http://india.com/"&gt;india.com&lt;/a&gt;! Get the latest updates follow @indiacom on Twitter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.infoedge.in/"&gt;Info Edge (India) Limited&lt;/a&gt; is among the leading internet companies in India. Info Edge runs leading  internet businesses – Naukri.com -India’s no. 1 job site,  Jeevansathi.com – one of the leading matrimonial portal,99acres.com –  India’s No.1 real estate portal and Shiksha.com – India’s leading  education portal. The company also owns Quadrangle – an offline  executive search business, and Naukri Gulf (a leading jobsite in the  Middle East market). Info Edge also owns Brijj.com, a professional  networking site and Allcheckdeals.com, an online real estate brokerage  firm which is run as a subsidiary company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;- &lt;a href="http://www.onmobile.com/"&gt;OnMobile Global Ltd&lt;/a&gt;.  is a pioneer in white-labelled, Value Added Products and Services [VAS]  for mobile, landline and media service providers. The #1 VAS specialist  in emerging and high-growth markets, OnMobile touches the lives of over  1500 million mobile users across 55 countries each month. With our  diverse product portfolio of Mobile Music, multi-screen Video Gateway  and delivery solutions, Phone Backup and Personal Cloud Management  solutions, Voice and Video portals, M-Commerce products and services, we  generate 2 – 5% contribution for top customers and top line revenues of  over US $800 million for over 92 customers globally. We deliver our  products by the best combination of a hosted Cloud with on-site  operations at the customer premises or through products deployed in  customer networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Founded in 2000, OnMobile has business spread across India, U.S.,  LATAM, Africa, Australia, Middle East and Europe. The company was  publicly listed in India in 2008. Recent acquisitions include Voxmobili  (2007), Telisma (2008), Dilithium Networks (2010) and LiveWire (2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;OnMobile is the first Indian telecom VAS Company to go public. The  company’s shares are listed on the Bombay Stock Exchange (BSE) and the  National Stock Exchange (NSE) as on March 31, 2010&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://qualcommventures.com/" title="Qualcomm Ventures"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.qualcommventures.com/" title="Qualcomm Ventures"&gt;Qualcomm Ventures&lt;/a&gt; is the investment arm of Qualcomm Inc. (NASDAQ: QCOM), a Fortune 500  company with operations across the globe.As the Venture Capital  investment arm of Qualcomm, the world leader in next-generation mobile  technologies, Qualcomm Ventures has been making strategic investments in  early-stage technology companies since 2000. With a $500 million fund  commitment, Qualcomm Ventures seeks to make strategic investments in  early stage high-technology companies that have the potential to  dramatically transform our world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;QPRIZE (&lt;a href="http://www.qprize.com/"&gt;www.qprize.com&lt;/a&gt;)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;QPrize™ is Qualcomm Venture’s Seed investment competition. It’s  designed to provide entrepreneurs their first level of funding so they  can launch their idea into a successful start-up business. The QPRIZE  competition was first launched in 2009 to promote innovation in the  technology industry and is designed to identify the industry’s most  promising early-stage technology companies. We are looking for bright,  energetic and resourceful entrepreneurs who have a passion for bringing  new technologies and services to market. Our goal is to have QPrize act  as a catalyst for our winners, providing the initial capital to launch  their great ideas and support the company to its first institutional  funding round.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;– &lt;a href="http://www.timesinternet.in/"&gt;Times Internet (TIL)&lt;/a&gt; is a premier digital product company and the digital arm of The Times  of India Group. It reaches over 100m visitors and serves 2 billion  pageviews every month across web and mobile, with businesses across  news, entertainment, sports, local, ecommerce, classifieds, startup  investments, local partnerships, and more.TIL’s key properties in the  news category include&lt;a href="http://t.signauxtrois.com/link?url=http://timesofindia.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=9862a753-3036-4fb0-d995-d0f039be5863"&gt;timesofindia.com&lt;/a&gt;, &lt;a href="http://t.signauxtrois.com/link?url=http://economictimes.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=ad63a5e6-eeea-4036-a025-091733356fe5"&gt;economictimes.com&lt;/a&gt; and &lt;a href="http://t.signauxtrois.com/link?url=http://navbharattimes.com/&amp;amp;ukey=agxzfnNpZ25hbHNjcnhyGAsSC1VzZXJQcm9maWxlGICAgPesw9YKDA&amp;amp;k=deefd481-21fd-4574-f85e-bd03ecd42c23"&gt;navbharattimes.com&lt;/a&gt;.  Under its fold are topmost internet entertainment portals in India —  Gaana.com – the music broadcasting service and BoxTV.com – the video  streaming site. Indiatimes Shopping emerges as one of the top five  e-commerce companies in India &amp;amp; TimesCity, a lifestyle destination  covering recommendations across Restaurants, Movies, Events, Nightlife  in your city. Times Internet has also entered into partnerships with  global companies offering them its tremendous reach through online media  platforms under its initiative called &lt;a href="http://timesofindia.indiatimes.com/topic/TLP"&gt;Times Global Partners(TGP)&lt;/a&gt;.  The TGP portfolio ranges from licensing partnerships to investments and  acquisition. In the last year, TGP has made four acquisitions, twelve  global partnerships, four minority investments and over 20 investments  into start-ups through TLabs in the Indian ecosystem.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors'&gt;https://cis-india.org/internet-governance/news/medianama-december-22-2014-thank-you-to-our-2014-sponsors&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-27T14:27:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights">
    <title>Security and Surveillance: A public discussion on Optimizing Security while Safeguarding Human Rights</title>
    <link>https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to a public discussion on optimizing security and safeguarding human rights at its Bangalore office on Friday, December 19th, 2014, 16:00 to 18:00.&lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society, in collaboration with Privacy International UK, has undertaken exploratory research into surveillance, security, and the security market in India.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Through this research, we hope to understand and document policy and law associated with security, surveillance, and the security market in India and learn about the regulation of security and related technologies such as encryption, filtering, monitoring software, and interception equipment. We also hope to understand the import and export policy regime for dual use technologies.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Such findings will be critical in creating evidence based research to inform security policy and regulation in India and work towards enabling regulatory frameworks that optimize the nation’s security while protecting the rights of citizens.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights'&gt;https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-19T08:46:34Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law">
    <title>Identifying Aspects of Privacy in Islamic Law</title>
    <link>https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law</link>
    <description>
        &lt;b&gt;This white paper seeks to identify aspects of privacy in Islamic Law and demonstrate that the notion of privacy was recognized and protected in traditional Islamic law.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I. Introduction&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nuances of privacy have been deliberated by numerous scholars till date, without arriving at a definite answer.	&lt;a name="_ftnref1"&gt;&lt;/a&gt; It has been perceived as a right to be left alone,&lt;a name="_ftnref2"&gt;&lt;/a&gt; as mere secrecy,&lt;a name="_ftnref3"&gt;&lt;/a&gt; as the right to a legitimate area of seclusion and solitude.&lt;a name="_ftnref4"&gt;&lt;/a&gt; Privacy is a particularly nebulous concept, with a tendency of resting on intuitionist arguments.	&lt;a name="_ftnref5"&gt;&lt;/a&gt; However, finding refuge in intuitionist arguments has not lent to a clear understanding of the term itself. This presents a peculiar predicament; while privacy is demanded, nobody seems to have a clear understanding of what it truly means.	&lt;a name="_ftnref6"&gt;&lt;/a&gt; Daniel Solove opines that privacy is a concept in disarray, it is about everything and hence it seems to 	be about nothing.&lt;a name="_ftnref7"&gt;&lt;/a&gt; Solove finds agreement in a variety of literature, where privacy has been described as a "chameleon-like word",&lt;a name="_ftnref8"&gt;&lt;/a&gt; a term suffering from an "embarrassment of meanings",	&lt;a name="_ftnref9"&gt;&lt;/a&gt; a "powerful rhetorical battle cry".&lt;a name="_ftnref10"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditional notions such as bodily privacy, privacy within one's home, or privacy resulting out of private property are received with far less scepticism 	than more recent aspects of privacy. With the burgeoning increase in information exchange, the ambit of privacy concerns is widened but not always 	understood. While earlier notions of privacy confined themselves to physical intrusions, it is now possible to invade a person's privacy without physically 	intruding on their space. &lt;a name="_ftnref11"&gt;&lt;/a&gt; As capabilities to intrude on privacy increase, the demand for respecting 	privacy grows stronger. In their historic article, Warren and Brandeis referred to privacy as an incorporeal notion, referring to cases of defamation, proprietary harms, contractual harms, breach of confidence to conclude that all such cases belonged to an umbrella principle of the right to privacy.	&lt;a name="_ftnref12"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.II Aspects of Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;William Prosser, a torts scholar, in 1860 attempted to classify privacy comprehensively. He contemplated four kinds of activities as impinging on a 	person's privacy. They were 	&lt;br /&gt; 1. Intrusion upon the plaintiff's seclusion or solitude, or into his private affairs. 	&lt;br /&gt; 2. Public disclosure of embarrassing private facts about the plaintiff. 	&lt;br /&gt; 3. Publicity which places the plaintiff in a false light in the public eye. 	&lt;br /&gt; 4. Appropriation, for the defendant's advantage, of the plaintiff's name or likeness.&lt;a name="_ftnref13"&gt;&lt;/a&gt; &lt;br /&gt; While this classification lent some structure to the understanding of privacy, it restricted itself to only tort law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A wider taxonomy was offered by Daniel Solove, imbibing concerns of digital privacy and information technology. Focussing on activities that invade 	privacy, Solove argued that information collection, aggregation of information, dissemination of such aggregated information and invasion into people's 	private affairs are the aspects integral to understanding the privacy concerns of a data subject.&lt;a name="_ftnref14"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its policy paper on privacy in India, the Data Security Council of India (DSCI) recognised privacy issues in the context of e-commerce, transactional 	privacy, cyber crime, national security, and cross border data flows.&lt;a name="_ftnref15"&gt;&lt;/a&gt; Similarly the Department of Personnel and Training (DoPT) in 2011 focussed on understanding privacy in the context of data protection and surveillance.	&lt;a name="_ftnref16"&gt;&lt;/a&gt; Subsequently, in 2012, the Planning Commission of India set up the A.P. Shah Committee to look into 	issues of data protection. This Committee classified the dimensions of privacy into four main categories; interception and access, audio and video 	recording, access and use of personal identifiers, and bodily and genetic material.&lt;a name="_ftnref17"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The classification of privacy for the purpose of this paper is under the heads of bodily privacy, informational and communications privacy, and territorial 	and locational privacy.&lt;a name="_ftnref18"&gt;&lt;/a&gt; Bodily privacy stems from the notion of personal autonomy and inviolate 	personality. Battery, rape, voyeurism are all examples of the recognition of the need to protect the privacy of one's body. Communications and 	informational privacy refers to the protection of sensitive personal information, specific communications and private conversations. Interception of messages, spying, hacking or tapping phone lines are all activities that impinge on privacy under this head. India's ambitious biometric project,	&lt;i&gt;Aadhar, &lt;/i&gt;has brought to the fore concerns surrounding personal information. Territorial privacy is developed from the notion of private property, 	the tort of trespass being ample recognition of the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.III Is India a Private Nation?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In October, 2010, the government published an approach paper for legislation on privacy. In explaining the need for privacy legislation in India, the paper 	states, 	&lt;br /&gt; &lt;br /&gt; &lt;i&gt; "India is not a particularly private nation. Personal information is often shared freely and without thinking twice. Public life is organized without 		much thought to safeguarding personal data. In fact, the public dissemination of personal information has over time, become a way of demonstrating the 		transparent functioning of the government."&lt;a name="_ftnref19"&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The notion of privacy being a foreign construct carves the argument that legislation on privacy would mean subjecting India to an alien cultural value. 	However, this ignores the possibility of privacy being culturally subjective.&lt;a name="_ftnref20"&gt;&lt;/a&gt; Cultures have exhibited 	different measurements by which they measure public and private realms.&lt;a name="_ftnref21"&gt;&lt;/a&gt; This paper aims to demonstrate 	that while the word "privacy" does not find explicit reference in traditional Indian law, the essence of privacy as we understand it today has existed in 	traditional Indian culture, specifically Indian Islamic culture, pre-dating colonialism in India and modernity in India's legal system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.IV Displacement of traditional Indian Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Contemporary Indian law functions within a rubric that was constructed after the "expropriation" of traditional law.	&lt;a name="_ftnref22"&gt;&lt;/a&gt; India's colonial legacy rendered the displacement of traditional Indian law with a unified modern legal system abounding in European ideas of modernity and legal systems, leaving it is a state of "fractured modernity".	&lt;a name="_ftnref23"&gt;&lt;/a&gt; Before the British rule, Indians were governed by their personal laws and these laws did not aim to 	unify the nation in ways that Western legal systems did.&lt;a name="_ftnref24"&gt;&lt;/a&gt;. The decision to establish a modern legal 	system stemmed from the desire to administer the law as a function of the state, which would have been impractical at best in the absence of a unified 	legal system.&lt;a name="_ftnref25"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Edward Said eloquently states that the colonial experience does not end when the last European flag comes down or when the last white policeman leaves.	&lt;a name="_ftnref26"&gt;&lt;/a&gt; One cannot help but agree with Said, as the understanding of law in contemporary India is constructed 	on the principles of the English common law and on ideas of a modern legal system. While the word "privacy" does not arise in traditional law, this paper 	argues that the notions of privacy as we perceive it today did exist hitherto the modernization of India's legal system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.V Structure of the paper&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Part I has laid down the foundation of this paper and the arguments it endeavours to make, Part II explains the sources of Islamic law and attempts 	at locating privacy in them. It also explains certain pervasive concepts that will enhance an understanding of privacy in Islamic law. This paper restricts itself to &lt;i&gt;Sunni &lt;/i&gt;Islamic law. Part III gives an indication of privacy rights in India's neighbouring Islamic countries (both predominantly	&lt;i&gt;Sunni),&lt;/i&gt; Pakistan and Bangladesh; and highlights the legal framework for privacy in these countries.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II. Privacy in Islamic Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.I Sources of Islamic Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before locating aspects of privacy in Islamic Law, an understanding of its structure and sources will be helpful. Islamic Law is composed of	&lt;i&gt;Shariah, &lt;/i&gt;and &lt;i&gt;fiqh. Shariah&lt;/i&gt; indicates the path a faithful Muslim must undertake to attain guidance in the present world and deliverance to 	the next&lt;i&gt;.&lt;/i&gt; &lt;i&gt;Fiqh, &lt;/i&gt;the jurisprudence of Islam, refers to the rational understanding of &lt;i&gt;Shariah&lt;/i&gt; and human reasoning to appreciate 	the practical implications of Islam. While &lt;i&gt;Shariah&lt;/i&gt; is divine revelation, &lt;i&gt;fiqh&lt;/i&gt; is the human inference of &lt;i&gt;Shariah&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principle tenet of Islam is unwavering obedience to the teachings of God. According to Muslim belief, the &lt;i&gt;Quran&lt;/i&gt; is the divine communication 	from Allah to the Prophet of Islam. It is the foremost record of the word of God, and for this reason is considered the apex source of Islamic law. It is 	in the &lt;i&gt;Quran&lt;/i&gt; that basic norms of &lt;i&gt;Shariah&lt;/i&gt; are found, and it embodies the exact words of God as was revealed to the Prophet over a period of 23 years. &lt;i&gt;Fiqh&lt;/i&gt;, or the understanding of &lt;i&gt;Shariah&lt;/i&gt;, also finds its origins in the holy &lt;i&gt;Quran&lt;/i&gt;.	&lt;a name="_ftnref27"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Sunnah&lt;/i&gt; or Prophetic traditions are the ingredients for the model behaviour of a Muslim as demonstrated by the Prophet. It is a "way, course, 	rule, mode, or manner, of acting or conduct of life."&lt;a name="_ftnref28"&gt;&lt;/a&gt; The &lt;i&gt;Sunnah&lt;/i&gt; were compiled through the 	communications of Prophet Muhammad in the form of &lt;i&gt;Hadiths&lt;/i&gt; which are communications, stories or conversations; and may be religious or secular; 	historical or recent.&lt;a name="_ftnref29"&gt;&lt;/a&gt; The narrators of the &lt;i&gt;Hadith&lt;/i&gt; are known as "&lt;i&gt;isnad&lt;/i&gt;" who convey the 	"&lt;i&gt;matn&lt;/i&gt;" or the substance of the Prophet's actions or words as narrated through oral communications through the years. Due to its very nature, the accuracy of the &lt;i&gt;Sunnah&lt;/i&gt; came under considerable scrutiny, with concerns as to its possible fabrication and dilution.	&lt;a name="_ftnref30"&gt;&lt;/a&gt; However, with a well devised system of recording and verifying sources, the &lt;i&gt;Sunnah &lt;/i&gt; accompanies the imperative source of Islamic law, the &lt;i&gt;Quran.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other sources of Islam are found in human reasoning, or &lt;i&gt;ijtihad&lt;/i&gt;. &lt;i&gt;Ijtihad &lt;/i&gt;assumes a variety of secondary sources such as analogical reasoning &lt;i&gt;(Qiyas),&lt;/i&gt; unanimous consensus &lt;i&gt;(Ijma),&lt;/i&gt; decisions in favour of public interest (&lt;i&gt;isthihsan), &lt;/i&gt;and presumption of continuity	&lt;i&gt; (istishab)&lt;/i&gt;.&lt;a name="_ftnref31"&gt;&lt;/a&gt; &lt;br /&gt; &lt;i&gt;Ijtihad&lt;/i&gt; entails a resilient effort; an exertion in interpreting the primary sources in order to understand &lt;i&gt;Shariah, &lt;/i&gt;to infer the law which is not explicit 	or evident. The legitimacy of &lt;i&gt;Ijma&lt;/i&gt; is found in the Prophetic tradition, which states that the followers of Islam would never agree on an error, 	and will never unite on misguidance.&lt;a name="_ftnref32"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Quran and Sunnah &lt;/i&gt;lie at the pinnacle of Islamic jurisprudence and their authoritativeness lends a ready inference of legal principles derived from them. In exploring the concept of Privacy in Islamic Law, this paper will focus mainly on the material available in the &lt;i&gt;Quran &lt;/i&gt;and	&lt;i&gt;Sunnah.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.II The Public and Private in Islam&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the doctrine of &lt;i&gt;Shariah&lt;/i&gt;, every aspect of life is deemed to be private unless shown otherwise.	&lt;a name="_ftnref33"&gt;&lt;/a&gt; The public sphere is that in which governmental authority operates, making it both transparent and 	open to scrutiny and observation. Since its inception, Islam has considered the idea of governance with reasonable scepticism, ascribing to the view that 	there is no concept of a human ruler beyond reproach.&lt;a name="_ftnref34"&gt;&lt;/a&gt; This perhaps gave impetus to the idea of a 	private sphere as one that is inhabited exclusively by an individual and the divine, excluding any interference of the State; except with permission from 	religious law. In Islamic belief, a pious individual had submitted himself to God, and not the worldly State. Hence, all aspects of his life will align 	with the tenets of Islamic law and in pursuance with the will of God.&lt;a name="_ftnref35"&gt;&lt;/a&gt; Any failure to perform religious duties on the part of a Muslim is beyond the scope of another; it is only a consideration between him and the divine.	&lt;a name="_ftnref36"&gt;&lt;/a&gt; It is believed that the Prophet said, 	&lt;i&gt; "Those, who acknowledge God in words, and not at heart, do not find fault with their fellow Muslims. The wrongdoing of those who do so become the 		subject of God's scrutiny, and when God looks into someone's wrongdoing then all shall be truly exposed" &lt;/i&gt; &lt;a name="_ftnref37"&gt;&lt;/a&gt; The individual is bestowed with complete freedom of action in the private sphere, subject only to the will of the divine. To govern another is wholly 	beyond the capacity of any individual, and this forms a pervasive theme in Islamic jurisprudence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic Law recognizes that it is inevitable for every society to impose certain requirements on individuals both by the law and by societal norms. In 	respect of a public domain, Islam prescribes an amalgam of requirements of a Muslim community and the teachings of Islam. While committing sins in private is beyond the scope of public or governmental scrutiny, committing a sin in public amounts to a crime, meriting worldly punishment.	&lt;a name="_ftnref38"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic law provides for an individual's obligations to the divine at all times, and to the state in matters within the public domain.	&lt;a name="_ftnref39"&gt;&lt;/a&gt; This is the most striking difference between Islamic law and modern law, as the function of enforcement of the law and punishment are forfeited to the state in a modern legal system, by virtue of the social contract.	&lt;a name="_ftnref40"&gt;&lt;/a&gt; However, in Islamic societies, the concept of social contract does not exist. Instead, an individual's 	obligations lie to the state only if acts meriting worldly punishment occur in the public sphere.&lt;a name="_ftnref41"&gt;&lt;/a&gt; It is 	this distinction in the obligations of individuals that leads to conflicts between the application of Islamic law and modern law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Quran&lt;/i&gt; is replete with rules for all believers to ordain good and forbid evil (al-amrbi al-Ma'rufwa al-nahy 'an al-munkar').	&lt;a name="_ftnref42"&gt;&lt;/a&gt; This divine injunction is a restriction of freedom in the private sphere. The notion of privacy in the 	public sphere was tested through the office of the &lt;i&gt;muhtasib,&lt;/i&gt; or compliance officer. These officers were appointed to ensure that the quality of life is preserved in Islamic societies. Personal or private matters which were visible in the public realm were liable to scrutiny from the	&lt;i&gt;muhtasib&lt;/i&gt; as well. However, this does not extend to matters such as surveillance and spying even on the authority of the state. The Prophet, 	according to the &lt;i&gt;hadith &lt;/i&gt;of Amir Mu'awiyah remarked, &lt;b&gt;&lt;i&gt;"&lt;/i&gt;&lt;/b&gt; &lt;i&gt; If&lt;b&gt; &lt;/b&gt;you try to find out the secrets of the people, then you will definitely spoil them or at least you will bring them to the verge of 		ruin." &lt;/i&gt; &lt;a name="_ftnref43"&gt;&lt;/a&gt; In fact, modern jurists admonish the idea of surveillance as &lt;i&gt;"exactly what Islam has called as the root cause of mischief in politics.&lt;/i&gt;"	&lt;a name="_ftnref44"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.III. Privacy in Islamic Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bodily Privacy &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sanctity of one's bodily privacy is well recognised in Islamic Law. The &lt;i&gt;Quran&lt;/i&gt; (24:58)&lt;a name="_ftnref45"&gt;&lt;/a&gt; demarcates certain periods in a day which are times of privacy for an individual, and indicates the need for prior permission before one may enter the 	private sphere of another. These periods are before the prayer at dawn, during the afternoon where one rests, and after the night prayer. This verse also calls upon children who have not yet reached the age of puberty to get accustomed to asking for permission before entering rooms apart from their own.	&lt;a name="_ftnref46"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As far as bodily seizure of individuals accused of crimes goes, the Traditions indicate a general disinclination towards pre-adjudication restraint of individuals. The very occurrence of it appears to be a cause of discomfort as recorded in the Traditions.	&lt;a name="_ftnref47"&gt;&lt;/a&gt; One of the Prophet's closest companions, Umar, is believed to have encourages officials to speed up adjudication processes so that the accused could not be deprived of the comfort of their homes and families.	&lt;a name="_ftnref48"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;bodily privacy and modesty&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the Quran stipulates gender equality, the norms of bodily privacy and modesty applicable to men are far less rigorous than the rules of modesty 	that apply to women.&lt;a name="_ftnref49"&gt;&lt;/a&gt; While staring is not contemplated as a crime in modern jurisdictions, the Quran 	directs "believing men to lower their gaze and be modest." &lt;a name="_ftnref50"&gt;&lt;/a&gt; At the same time, it directs women to adhere to strict rules of clothing and conduct, with directions on how to conduct oneself both in private as well as public.	&lt;a name="_ftnref51"&gt;&lt;/a&gt; Interestingly, with the use of full-body scanners at airports around the world, the bodily privacy of Muslims came to the forefront with several Muslim scholars opining that such use of scanners was in direct violation of the tenets of Islam.&lt;a name="_ftnref52"&gt;&lt;/a&gt; According to the Quran, the modesty of a Muslim woman is an indication of her faith.	&lt;a name="_ftnref53"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communication and Informational Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is, in many ways, inextricably linked to the notions of personal autonomy, and inviolate personality. Privacy in matters apart from those concerned with proprietary interests was only developed as a legal idea around the ninth century, although the &lt;i&gt;Quran &lt;/i&gt;made ample references to it.	&lt;a name="_ftnref54"&gt;&lt;/a&gt; Whilst the term "privacy" is not directly alluded to in the &lt;i&gt;Quran&lt;/i&gt;, it contains verses 	emphasizing the importance of respecting personal autonomy. The &lt;i&gt;Quran&lt;/i&gt; (49:12) rebukes those who wish to pry into matters which do not concern them, or harbour suspicions in respect of others, conceding that some suspicions can even be considered crimes.	&lt;a name="_ftnref55"&gt;&lt;/a&gt; This implies an injunction against investigation; which complements the prohibition of circulation of 	information pertaining to an individual's private sphere (24:19).&lt;a name="_ftnref56"&gt;&lt;/a&gt; According to this verse, publication 	of immorality is desirous of punishment. A reasonable conclusion from the reading of these verses is that the &lt;i&gt;Quran&lt;/i&gt; mandates respect for the 	private sphere, guaranteeing that a faithful believer will not violate it.&lt;a name="_ftnref57"&gt;&lt;/a&gt; The Prophet is reported to have said that non interference of individuals in matters that do not concern them is a sign of their good faith.	&lt;a name="_ftnref58"&gt;&lt;/a&gt; Interestingly, the injunction against unwarranted search is for all members of a Muslim community, not 	just followers of Islam. An extension of the concept of informational privacy is the privacy of one's opinion, which is believed to be beyond reproach regardless of its contents. Deeds in the public sphere can be subject to worldly punishment, but thoughts and opinions everywhere, are not subject to it.	&lt;a name="_ftnref59"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Sunnah&lt;/i&gt; have also emphasized on privacy in communications. The Prophet once said,	&lt;i&gt;"He, who looks into a letter belonging to his brother, looks into the Hellfire&lt;/i&gt;"&lt;a name="_ftnref60"&gt;&lt;/a&gt; , indicating that private communications shall enjoy their privacy even in the public domain. This is evident from another saying of the Prophet,&lt;i&gt;"Private encounters result in entrustment&lt;/i&gt;", which entails a restriction on communications arising out of private meetings.	&lt;a name="_ftnref61"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Territorial Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Domestic privacy is considered an important facet of Islamic life and this idea pervades different aspects of &lt;i&gt;Shariah&lt;/i&gt;. Privacy in regard to 	proprietary interests was in fact the first legal conception of privacy recognised by Muslim jurists. &lt;a name="_ftnref62"&gt;&lt;/a&gt; The &lt;i&gt;Quran&lt;/i&gt; (24:27-8) forbids entering another's house in lieu of permission to do the same. &lt;a name="_ftnref63"&gt;&lt;/a&gt; It seeks to ensure that a person visiting another's house is welcome in that house; reminding individuals of their rights during such visits. Further, the	&lt;i&gt;Quran&lt;/i&gt; (2:189) envisions visits made to other's houses only through the front door, indicating respect and transparency in visiting another's 	dwelling place.&lt;a name="_ftnref64"&gt;&lt;/a&gt; Muslim scholars are of the opinion that such rules were laid down in order to safeguard one's private sphere; to allow people to modify their behaviour to accommodate a visitor in a private domain.	&lt;a name="_ftnref65"&gt;&lt;/a&gt; Clarifying the reasons for such rules, a jurist offered the following explanation, 	&lt;i&gt; "The first greeting is for the residents to hear the visitor, the second is for the residents to be cautious( fa-ya khudhu hidhrahum),and the third is 		for them to either welcome the visitor or send him away."&lt;/i&gt;&lt;a name="_ftnref66"&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy in the domestic sphere extends to both physical privacy as well as intangible privacy. The Prophet opined that if one's gaze has entered into a 	private home before his body does, permission to enter the home would be redundant. This follows from the idea that if a person curiously peeps into 	another's home, it is equivalent to him entering it himself. The right to privacy is extended to absolve the home owner of any guilt in the event of attack 	on the intruder. &lt;a name="_ftnref67"&gt;&lt;/a&gt; Curiously, the right to privacy within one's home is extended to privacy in respect 	of sinful behaviour within his private sphere; the accountability of a Muslim to his fellow humans is only to be discerned in respect of his public 	actions.&lt;a name="_ftnref68"&gt;&lt;/a&gt; This is illustrated by an interesting story in the &lt;i&gt;Hadith &lt;/i&gt;of Umar ibn al-Khattab. 	Khattab climbed the wall of a house on the suspicion of wine being consumed within the premises. On his suspicion being confirmed, he chided them for their 	conduct. They then reminded him that while he pointed out their sins, he himself was guilty of three sins; spying on them, failing to greet them and also 	not approaching their house through the front door. He agreed with them and walked away. &lt;a name="_ftnref69"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rationale behind recognising privacy in the domestic sphere is not just illegal intrusion into one's physical space; it is also intrusion into matters 	of sensitivity which widens the scope for privacy in Islamic Law.&lt;a name="_ftnref70"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III Privacy in Shariah Based States&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Locating aspects of privacy is Shariah-based states is particularly challenging due to the duality of obligations that exists in their legal framework. 	While Islamic law focuses on obligations of individuals to the divine in all affairs and the state only in public matters, legal obligations in modern 	states are understood vis-à-vis the state only.&lt;a name="_ftnref71"&gt;&lt;/a&gt; The incorporation of Islam into these modern legal 	systems represents the attempt at reconciling two distinct sources of law. This Part will consider the legal frameworks for privacy in Pakistan and 	Bangladesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III.I Pakistan&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic law has had a profound impact on the legal system of Pakistan.&lt;a name="_ftnref72"&gt;&lt;/a&gt; This Islamic Republic integrates	&lt;i&gt;Shariah&lt;/i&gt; law into its common law system, as is evident from Article 227(1) of the 1973 Constitution of Pakistan ("the 1973 Constitution"). It 	reads, " 	&lt;i&gt; All existing laws shall be brought in conformity with the Injunctions of Islam as laid down in the Holy Quran and Sunnah, in this Part referred to as 		the Injunctions of Islam, and no law shall be enacted which is repugnant to such injunction". &lt;/i&gt; &lt;a name="_ftnref73"&gt;&lt;/a&gt; In addition to the Constitutional safeguards, General Zia-ul-Haq, between 1977 and 1988 provided great impetus to Pakistan's process of incorporating Islam 	into its common law system through the establishment of appellate religious courts and also enactment of the &lt;i&gt;Hudood&lt;/i&gt; criminal law, which was 	consequently criticized for being discriminatory and arbitrary.&lt;a name="_ftnref74"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Constitutional Provisions&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Enshrined in the 1973 Constitution is the fundamental right of persons not to be subject to any action detrimental to the life, liberty, body, reputation 	or property. While referring to the rights of individuals, Article 4(1) lays down, 	&lt;i&gt; "To enjoy the protection of law and to be treated in accordance with law in the inalienable right of every citizen. Wherever he may be, and of every 		other person for the time being within Pakistan." &lt;/i&gt; &lt;a name="_ftnref75"&gt;&lt;/a&gt; While aspects of privacy can be read into this Article quite emphatically, the 1973 Constitution explicitly recognises the right to privacy, dignity and the inviolability of persons in Article 14(1),&lt;i&gt;"The dignity of man, subject to law, the privacy of home, shall be inviolable".&lt;/i&gt; &lt;a name="_ftnref76"&gt;&lt;/a&gt; The sanctity of these rights is vigorously upheld as laws inconsistent with fundamental rights are 	declared to be void to the extent of their inconsistency.&lt;a name="_ftnref77"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bodily Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 1973 Constitution recognises the fundamental right of persons not to be subject to any action detrimental to the life, liberty, body, reputation or 	property.&lt;a name="_ftnref78"&gt;&lt;/a&gt; The Pakistan Penal Code (Act XLV of 1860) refers to the protection of privacy of women in 	Section 509, upholding the modesty of women.&lt;a name="_ftnref79"&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communications and Informational Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Pakistan Telecommunication (Re-organisation) Act 1996 enables investigating authorities under the Act to take cognizance of illegalities in 	communications.&lt;a name="_ftnref80"&gt;&lt;/a&gt; These authorities submit their reports to the courts, ensuring the accountability of 	such events, as well as legitimising search and seizure in pursuance of intercepted communications. The Act also makes arrangements for authorised interception of communications in cases of national security, although the wide and sweeping powers bestowed under this Section are a cause for concern.	&lt;a name="_ftnref81"&gt;&lt;/a&gt; Moreover, any person causing annoyance to another through a telephone is liable to criminal punishment 	under the Telegraph Act, 1885.&lt;a name="_ftnref82"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Medical&lt;a name="_ftnref83"&gt;&lt;/a&gt;and Financial&lt;a name="_ftnref84"&gt;&lt;/a&gt; information is recognised as a 	unit of privacy in the legal system of Pakistan. The delicate balance between transparency of government action and extent of privacy of information is 	struck in the Freedom of Information Ordinance, which exempts divulging information regarding personal privacy of individuals, private documents and 	financial privacy.&lt;a name="_ftnref85"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As far as digital privacy is concerned, the law in Pakistan is still at a nascent stage. In 2000, Pakistan implemented the National Information Technology 	Policy and Action Plan, which provided for confidentiality of transactional information.&lt;a name="_ftnref86"&gt;&lt;/a&gt; In 2002, an 	Electronic Transactions Ordinance was passed with a view to recognise and protect electronic transactions, setting up a framework within which privacy of 	information can be guaranteed and authenticity can be verified.&lt;a name="_ftnref87"&gt;&lt;/a&gt; There is no devoted law on data protection yet, although a Draft Electronic Data Protection Bill was published by the Ministry of Information in 2005.	&lt;a name="_ftnref88"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Territorial and Locational Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Akin to notions of privacy of the home in Islamic law, criminal trespass is a punishable offence under the Pakistan Penal Code.	&lt;a name="_ftnref89"&gt;&lt;/a&gt; Pakistan has an unfortunately intimate relationship with terrorism. The Anti Terrorism Act of 1997 	incorporates some provisions which raise concerns as to the sanctity of individual privacy. The Act allows an officer of police, armed forces or civil armed forces to enter and search any premise, &lt;a name="_ftnref90"&gt;&lt;/a&gt; and to seize any property	&lt;a name="_ftnref91"&gt;&lt;/a&gt; they suspect to be connected to a terrorist act, without a warrant. Perhaps what is more worrying is that the entry of an officer is not subject to review, unlike in other Islamic countries like the United Arab Emirates.	&lt;a name="_ftnref92"&gt;&lt;/a&gt; The trade off between personal liberties and national security is acutely felt in Pakistan, with 	intelligence agencies carrying on mass surveillance, without any legal framework providing for the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III.II Privacy in Bangladesh&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bangladesh identifies itself as a secular nation, although Islam is the state religion. &lt;a name="_ftnref93"&gt;&lt;/a&gt; The Constitution of Bangladesh uses the word privacy in the context of both territorial and communications privacy.	&lt;a name="_ftnref94"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bodily Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bangladesh Penal Code, similar to Pakistan's, contains a section guaranteeing the bodily privacy of a woman and prohibiting any form of outraging her 	modesty.&lt;a name="_ftnref95"&gt;&lt;/a&gt; It criminalises assault,&lt;a name="_ftnref96"&gt;&lt;/a&gt; and also provides 	for private defence in case of assault.&lt;a name="_ftnref97"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communications Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy of communications is subject to interception for the purpose of public safety, as envisaged in the Telegraph Act, 1885.&lt;a name="_ftnref98"&gt;&lt;/a&gt; It also contains provisions regarding unlawful interception of messages,&lt;a name="_ftnref99"&gt;&lt;/a&gt; as well as tampering or damaging communications.	&lt;a name="_ftnref100"&gt;&lt;/a&gt;The Telecommunications (Amendment) Act 2006 gives the police sweeping powers to intercept mobile 	communications as well. However, a notice was issued to the government after this amendment to demonstrate its legality. Bangladesh also has the Right to 	Information Act, 2009 to promote transparency in governance, although it has a considerable number of agencies exempt from the Act as well. Provisions for 	cyber crime are enshrined in the Information and Communication Technology Act, 2006.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Territorial Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the context of territorial privacy, the Bangladesh Penal Code recognises criminal trespass,&lt;a name="_ftnref101"&gt;&lt;/a&gt; house 	trespass,&lt;a name="_ftnref102"&gt;&lt;/a&gt; lurking house trespass&lt;a name="_ftnref103"&gt;&lt;/a&gt; and house 	breaking&lt;a name="_ftnref104"&gt;&lt;/a&gt; as offences under Bangladeshi law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IV. Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is a comprehensive term that entails a plethora of claims, making an exact definition of the term difficult to come by. In the absence of an 	explicit reference to privacy in the Indian Constitution, the Supreme Court has brought the right to privacy within the penumbra of Article 21 through 	various case laws.&lt;a name="_ftnref105"&gt;&lt;/a&gt; In 2010, the Government in its approach paper on privacy claimed that India is 	not a particularly private nation.&lt;a name="_ftnref106"&gt;&lt;/a&gt; In order to comprehensively understand India's modern legal 	framework, it is imperative to analyze the concepts of traditional law as they existed hitherto the colonial era. Although the term "privacy" is a modern 	construct, this paper has sought to demonstrate that the notion of privacy was well recognized and protected in traditional Islamic law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the discussion above, it is evident that the concept of privacy in &lt;i&gt;Shariah&lt;/i&gt; law rests convincingly within the taxonomy adopted in this paper. 	The &lt;i&gt;Quran&lt;/i&gt; and &lt;i&gt;Hadith&lt;/i&gt; accommodate concerns surrounding private property, personal autonomy, protection of private communications, domestic 	life, modesty and the modern idea of surveillance. In addition to this, Islamic jurisprudence ascribes to the idea of a public and private sphere. The 	public sphere is occupied by society and governmental action, being liable to scrutiny and observation. On the other hand, the private sphere is occupied 	by the individual and the divine alone, free from any interference except in accordance with &lt;i&gt;Shariah&lt;/i&gt; law. Inspite of the term "privacy" not 	finding explicit mention in the &lt;i&gt;Quran&lt;/i&gt; or &lt;i&gt;Hadith&lt;/i&gt;, a closer analysis of &lt;i&gt;Shariah&lt;/i&gt; reveals privacy as a pervasive theme in Islamic 	jurisprudence.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; Daniel Solove, &lt;i&gt;A Taxonomy of Privacy, &lt;/i&gt;Vol. 154, No.3&lt;i&gt; &lt;/i&gt;University of Pennsylvania Law Journal, 477 (2006).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; Samuel D. Warren &amp;amp; Louis D. Brandeis, &lt;i&gt;The Right to Privacy&lt;/i&gt;, 4 Harvard Law Review 193, 193 (1890).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; Richard A. Posner, &lt;i&gt;Privacy, Surveillance and the Law, Vol. 75 No. 1&lt;/i&gt;&lt;i&gt; &lt;/i&gt;The University of Chicago Law Review&lt;i&gt; &lt;/i&gt;245, 245			&lt;i&gt; &lt;/i&gt;(2008).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; Blanca Rodríguez Ruiz, Privacy in Telecommunications: A European and an American Approach 39 (1st ed. 1997).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; James Q. Whitman, &lt;i&gt;The Two Western Cultures of Privacy : Dignity versus Liberty, &lt;/i&gt;113 Yale Law Journal 1152, 1153 (2004).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; Whitman, &lt;i&gt;supra &lt;/i&gt;note 5, at 1153.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; Solove, &lt;i&gt;supra &lt;/i&gt;note 1, at 479.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Referencing Lillian r. BeVier,			&lt;i&gt;Information About Individuals in the Hands of Government: Some Reflections on Mechanisms for Privacy Protection&lt;/i&gt;, 4 WM. &amp;amp; MARY BILL 			RTS. J. 455, 458 (1995) .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Referencing KIM LANE SCHEPPELE, LEGAL SECRETS 184-85 (1988).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Referencing 1 J. THOMAS MCCARTHY, THE RIGHTS OF PUBLICITY AND PRIVACY § 5.59 (2d ed. 2005).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; Solove, &lt;i&gt;supra &lt;/i&gt;note 1, at 560.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; Samuel D. Warren &amp;amp; Louis D. Brandeis, &lt;i&gt;supra &lt;/i&gt;note 2, at 193.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; William L Prosser, &lt;i&gt;Privacy, &lt;/i&gt;48 California Law Review 383,389 (1960).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; Solove, &lt;i&gt;supra &lt;/i&gt;note 1, at 488.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Data Security Council of India, Policy Paper: Privacy in India. Available at 			https://www.dsci.in/sites/default/files/Policy%20Paper%20-%20Privacy%20in%20India.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt; Department of Personnel and Training, (DoPT) Approach Paper for a Legislation on Privacy. Report available at 			http://ccis.nic.in/WriteReadData/CircularPortal/D2/D02rti/aproach_paper.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;&lt;/a&gt; Justice Ajit.P.Shah Committee, Report of the Group of Experts on Privacy, 60. Available at - 			http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;&lt;/a&gt; Bhairav Acharya, at http://freespeechhub.thehoot.org/freetracker/storynew.php?storyid=565&amp;amp;sectionId=10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;&lt;/a&gt; DoPT, Approach Paper. &lt;i&gt;supra&lt;/i&gt; note 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20"&gt;&lt;/a&gt; Whitman, &lt;i&gt;supra&lt;/i&gt; note 5, at 1154.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;&lt;/a&gt; Chandran Kukathas, &lt;i&gt;Cultural Privacy&lt;/i&gt;, Vol. 91, No. 1 The Monist 68, 69 (2008).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;&lt;/a&gt; Marc Galanter, &lt;i&gt;Displacement of Traditional Law in Modern India, &lt;/i&gt;Vol XXIV, No. 4 Journal of Social Issues 65, 67 (1968).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;&lt;/a&gt; Stuart Corbridge &amp;amp; John Harriss, Reinventing India: Liberalization, Hindu Nationalism and Popular Democracy 238 (Reprint, 2006).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;&lt;/a&gt; Galanter, &lt;i&gt;supra&lt;/i&gt; note 22, at 66.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 67.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;&lt;/a&gt; Edward Said, &lt;i&gt;Representing the Colonized: Anthropology's Interlocutors&lt;/i&gt;, Vol. 15 No.2 Critical Inquiry 205, 207 (1989).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a name="_ftn27"&gt;&lt;/a&gt; Mohammad Hashim Kamali, Shari'ah Law, An Introduction 19 (2009)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a name="_ftn28"&gt;&lt;/a&gt; M Mustafa Al Azami, Studies in Hadith Methodology and Literature 7 (2002).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a name="_ftn29"&gt;&lt;/a&gt; &lt;i&gt;Id. &lt;/i&gt; at 3.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a name="_ftn30"&gt;&lt;/a&gt; NJ Coulson, A History of Islamic Law 22 (1964)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a name="_ftn31"&gt;&lt;/a&gt; Kamali, &lt;i&gt;s&lt;/i&gt;&lt;i&gt;upra &lt;/i&gt;note 27, at 19.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a name="_ftn32"&gt;&lt;/a&gt; &lt;i&gt;Sunan Ibn Majah&lt;/i&gt; , Book of Tribulations (Kitab al-Fitan) , #3950, available at http://sunnah.com/ibnmajah/36.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a name="_ftn33"&gt;&lt;/a&gt; Mohsen Kadivar, &lt;i&gt;An Introduction to the Private and Public Debate in Islam, &lt;/i&gt;Vol.70 , No. 3 Social Research 659, 663 (2003).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a name="_ftn34"&gt;&lt;/a&gt; Lara Aryani, &lt;i&gt;Privacy Rights in Shariah and Shariah-based States, &lt;/i&gt;Vol. 3, Iss.2, Journal of Islamic State Practices in International Law, 3 			(2007)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a name="_ftn35"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a name="_ftn36"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 665.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a name="_ftn37"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; at 667. Referencing Koleini, Mohammad. Al-Kaafi. Qom, Vol. 2: 353 1388.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a name="_ftn38"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 671.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a name="_ftn39"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a name="_ftn40"&gt;&lt;/a&gt; &lt;i&gt;Social Contract Theory of John Locke(1932-1704) in the Contemporary World&lt;/i&gt; , SelectedWorks of Daudi Mwita, Nyamaka (2011) Available at http://works.bepress.com/cgi/viewcontent.cgi?article=1009&amp;amp;context=dmnyamaka.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a name="_ftn41"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a name="_ftn42"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 673.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a name="_ftn43"&gt;&lt;/a&gt; Abul a'la Mawdudi, Human Rights in Islam 24 (1995). Also available online, at 			http://books.google.co.in/books?id=RUJWdCOmmxoC&amp;amp;printsec=frontcover#v=onepage&amp;amp;q&amp;amp;f=false.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a name="_ftn44"&gt;&lt;/a&gt; Aryani, &lt;i&gt;supra &lt;/i&gt;note 34, at 13.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a name="_ftn45"&gt;&lt;/a&gt; This indicates Sura 24 : verse 58.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a name="_ftn46"&gt;&lt;/a&gt; Holy Quran, 24:58 - O you who have believed, let those whom your right hands possess and those who have not [yet] reached puberty among you ask 			permission of you [before entering] at three times: before the dawn prayer and when you put aside your clothing [for rest] at noon and after the 			night prayer. [These are] three times of privacy for you. There is no blame upon you nor upon them beyond these [periods], for they continually 			circulate among you - some of you, among others. Thus does Allah make clear to you the verses; and Allah is Knowing and Wise. (Translation from 			Sahih International available at http://quran.com/24/58)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a name="_ftn47"&gt;&lt;/a&gt; Reza Sadiq, &lt;i&gt;Islam's Fourth Amendment : Search and Seizure in Islamic Doctrine and Muslim Practice, &lt;/i&gt;Vol. 40 Georgetown Journal of 			International Law 703, 730 (2008 - 2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a name="_ftn48"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 733. Referencing IBRAHIM ABDULLA&lt;b&gt; &lt;/b&gt;AL-MARZOUQI, Human Rights in Islamic Law 392 (2000).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a name="_ftn49"&gt;&lt;/a&gt; Rohen Peterson, &lt;i&gt;The Emperor's New Scanner :Muslim Women at the Intersection of the First Amendment and Full Body Scanners, &lt;/i&gt;22 Hastings 			Women's Law Journal 339, 343 (2011).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a name="_ftn50"&gt;&lt;/a&gt; Holy Quran, 24:30 - Tell the believing men to reduce [some] of their vision and guard their private parts. That is purer for them. Indeed, Allah is 			Acquainted with what they do. (Translation from Sahih International available at http://quran.com/24/30-31).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a name="_ftn51"&gt;&lt;/a&gt; Holy Quran, 24:31- And tell the believing women to reduce [some] of their vision and guard their private parts and not expose their adornment 			except that which [necessarily] appears thereof and to wrap [a portion of] their headcovers over their chests and not expose their adornment except 			to their husbands, their fathers, their husbands' fathers, their sons, their husbands' sons, their brothers, their brothers' sons, their sisters' 			sons, their women, that which their right hands possess, or those male attendants having no physical desire, or children who are not yet aware of 			the private aspects of women. And let them not stamp their feet to make known what they conceal of their adornment. And turn to Allah in 			repentance, all of you, O believers, that you might succeed. (Translation from Sahih Internation, available at http://quran.com/24/30-31).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a name="_ftn52"&gt;&lt;/a&gt; David Garner&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Muslims warned not to go through airport body scanners because they violate Islamic rules on nudity&lt;/i&gt;, The daily 			mail, (Feb 12, 2010). 			&lt;a href="http://www.dailymail.co.uk/news/article-1250616/Muslims-warned-airport-body-scanners-violate-Islamic-rules-nudity.html#ixzz3KF8hS6q3"&gt; http://www.dailymail.co.uk/news/article-1250616/Muslims-warned-airport-body-scanners-violate-Islamic-rules-nudity.html#ixzz3KF8hS6q3 &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a name="_ftn53"&gt;&lt;/a&gt; Holy Quran, 33:59 - O Prophet, tell your wives and your daughters and the women of the believers to bring down over themselves [part] of their 			outer garments. That is more suitable that they will be known and not be abused. And ever is Allah Forgiving and Merciful. (Translation from Sahih 			International, available at http://quran.com/33/59.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a name="_ftn54"&gt;&lt;/a&gt; Eli Alshech,			&lt;i&gt;"Do Not Enter Houses Other than Your Own": The Evolution of the Notion of a Private Domestic Sphere in Early Sunnī Islamic Thought&lt;/i&gt; Vol. 11, No. 3, Islamic Law and Society 291, 304 (2004).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a name="_ftn55"&gt;&lt;/a&gt; Holy Quran, 49:12 - O you who have believed, avoid much [negative] assumption. Indeed, some assumption is sin. And do not spy or backbite each 			other. Would one of you like to eat the flesh of his brother when dead? You would detest it. And fear Allah ; indeed, Allah is Accepting of 			repentance and Merciful. ( Translation from Sahih International, available at http://quran.com/49/12)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a name="_ftn56"&gt;&lt;/a&gt; Holy Quran, 24:19 - Indeed, those who like that immorality should be spread [or publicized] among those who have believed will have a painful 			punishment in this world and the Hereafter. And Allah knows and you do not know. ( Translation from Sahih International, available at 			http://quran.com/24/19)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a name="_ftn57"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 666.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a name="_ftn58"&gt;&lt;/a&gt; Ahmad Atif Ahmad, Islam Modernity violence and everyday life 176 (1&lt;sup&gt;st&lt;/sup&gt; ed. 2009)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a name="_ftn59"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 667.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a name="_ftn60"&gt;&lt;/a&gt; &lt;i&gt; &lt;/i&gt; &lt;i&gt;Ibid&lt;/i&gt; , at 178.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a name="_ftn61"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a name="_ftn62"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra &lt;/i&gt;note 54, at 291.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a name="_ftn63"&gt;&lt;/a&gt; Holy Quran, 24:27-8 - O you who have believed, do not enter houses other than your own houses until you ascertain welcome and greet their 			inhabitants. That is best for you; perhaps you will be reminded. And if you do not find anyone therein, do not enter them until permission has been 			given you. And if it is said to you, "Go back," then go back; it is purer for you. And Allah is Knowing of what you do. ( Translation from Sahih 			International, available at http://quran.com/24)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a name="_ftn64"&gt;&lt;/a&gt; Holy Quran, 2:189 - They ask you, [O Muhammad], about the new moons. Say, "They are measurements of time for the people and for Hajj." And it is 			not righteousness to enter houses from the back, but righteousness is [in] one who fears Allah. And enter houses from their doors. And fear Allah 			that you may succeed. (Translation from Sahih International, available at http://quran.com/2)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a name="_ftn65"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra &lt;/i&gt;note 54, at 308.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a name="_ftn66"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 306. Referencing Ibn Abi Hatim, 8&lt;b&gt; &lt;/b&gt;TAF5IRAL-QUR'ANAL-'ADHIM &lt;i&gt;2566 &lt;/i&gt;(Makiabat Nlilr Mustaffi 1999).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a name="_ftn67"&gt;&lt;/a&gt; Ahmad, &lt;i&gt;supra &lt;/i&gt;note 58, at 177.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a name="_ftn68"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra note &lt;/i&gt;54&lt;i&gt;, at 324.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a name="_ftn69"&gt;&lt;/a&gt; Aryani, supra note 34, at 4. Also see Ahmad, &lt;i&gt;supra &lt;/i&gt;note 24, at 178.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a name="_ftn70"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra note &lt;/i&gt;54&lt;i&gt;, &lt;/i&gt;at 310.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a name="_ftn71"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra&lt;/i&gt; note 33, at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a name="_ftn72"&gt;&lt;/a&gt; Moeen Cheema, &lt;i&gt;Beyond Beliefs: Deconstructing the Dominant Narratives of the Islamization of Pakistan's Law, &lt;/i&gt;60 American Journal of 			Comparative Law 875 (2012).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a name="_ftn73"&gt;&lt;/a&gt; The Constitution of the Islamic Republic of Pakistan, 1973. Available at http://www.na.gov.pk/publications/constitution.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a name="_ftn74"&gt;&lt;/a&gt; Cheema, &lt;i&gt;supra &lt;/i&gt;note 72, at 879.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a name="_ftn75"&gt;&lt;/a&gt; The Constitution of the Islamic Republic of Pakistan, 1973, &lt;i&gt;supra &lt;/i&gt;note 73&lt;i&gt;.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a name="_ftn76"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a name="_ftn77"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Article 8 - "(1) Any law, or any custom or usage having the force of law, in so far as it is inconsistent with the rights conferred by this 			Chapter, shall, to the extent of such inconsistency, be void. (2) The State shall not make any law which takes away or abridges the right so 			conferred and any law made in contravention of this clause shall, to the extent of such contravention, be void&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a name="_ftn78"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Article 4(2)(a) - "no action detrimental to the life, liberty, body, reputation or property of any person shall be taken except in accordance with 			law."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a name="_ftn79"&gt;&lt;/a&gt; Section 509, Pakistan Penal Code (Act XLV of 1860), Available at http://www.oecd.org/site/adboecdanti-corruptioninitiative/46816797.pdf.&lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a name="_ftn80"&gt;&lt;/a&gt; Section 32, Pakistan Telecommunication (Re-Organisation) Act, 1996. Available at http://www.pta.gov.pk/media/pta_act_140508.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a name="_ftn81"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Section 54.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a name="_ftn82"&gt;&lt;/a&gt; Section 25-D, Pakistan Telegraph Act, 1885. Available at http://www.fia.gov.pk/law/Offences/26.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p&gt;&lt;a name="_ftn83"&gt;&lt;/a&gt; Section 12, Pakistan Medical and Dental Council Code of Ethics. Available at 			http://www.pmdc.org.pk/LinkClick.aspx?fileticket=v5WmQYMvhz4%3D&amp;amp;tabid=292&amp;amp;mid=845.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a name="_ftn84"&gt;&lt;/a&gt; http://www.sbp.org.pk/publications/prudential/ordinance_62.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p&gt;&lt;a name="_ftn85"&gt;&lt;/a&gt; Section 8, Freedom of Information Ordinance, 2002. Available at 			http://infopak.gov.pk/Downloads/Ordenances/Freedom_of_%20Information_Ordinance2002.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a name="_ftn86"&gt;&lt;/a&gt; Pakistan IT Policy and Action Plan, available at http://www.unapcict.org/ecohub/resources/pakistan-information-technology-policy.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a name="_ftn87"&gt;&lt;/a&gt; Electronic Transactions Ordinance, available at http://www.pakistanlaw.com/eto.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a name="_ftn88"&gt;&lt;/a&gt; For a more detailed account, see			&lt;a href="http://www.supremecourt.gov.pk/ijc/articles/10/1.pdf"&gt;http://www.supremecourt.gov.pk/ijc/articles/10/1.pdf&lt;/a&gt;. Second draft available at 			http://media.mofo.com/docs/mofoprivacy/PAKISTAN%20Draft%20Law%202nd%20Revision%20.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a name="_ftn89"&gt;&lt;/a&gt; Sections 441 - 462, Pakistan Penal Code (XLV of 1860) Chapter XVII, "Offences against Property".&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a name="_ftn90"&gt;&lt;/a&gt; Section 5, Anti Terrorism Act, 1997. Available at http://www.fia.gov.pk/law/ata1997.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a name="_ftn91"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Section 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a name="_ftn92"&gt;&lt;/a&gt; Lara Aryani, &lt;i&gt;supra&lt;/i&gt; note 34, at 21.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a name="_ftn93"&gt;&lt;/a&gt; Julhas Alam, &lt;i&gt;Bangladesh moves to retain Islam as state religion, &lt;/i&gt;Cns News, 			http://cnsnews.com/news/article/bangladesh-moves-retain-islam-state-religion.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a name="_ftn94"&gt;&lt;/a&gt; Article 43, Constitution of Bangladesh. Available at http://www1.umn.edu/humanrts/research/bangladesh-constitution.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn95"&gt;
&lt;p&gt;&lt;a name="_ftn95"&gt;&lt;/a&gt; Section 509, Bangladesh Penal Code,1860. Available at http://bdlaws.minlaw.gov.bd/print_sections_all.php?id=11.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn96"&gt;
&lt;p&gt;&lt;a name="_ftn96"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Sections 351- 358.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn97"&gt;
&lt;p&gt;&lt;a name="_ftn97"&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; . Section 100.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn98"&gt;
&lt;p&gt;&lt;a name="_ftn98"&gt;&lt;/a&gt; Section 5, Bangladesh Telegraph Act, 1885. Available at http://bdlaws.minlaw.gov.bd/print_sections_all.php?id=55.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn99"&gt;
&lt;p&gt;&lt;a name="_ftn99"&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; . Section 24.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn100"&gt;
&lt;p&gt;&lt;a name="_ftn100"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Section 25.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn101"&gt;
&lt;p&gt;&lt;a name="_ftn101"&gt;&lt;/a&gt; &lt;i&gt; &lt;/i&gt; Bangladesh Penal Code, 1860. &lt;i&gt;supra &lt;/i&gt;note 95&lt;i&gt;. &lt;/i&gt;Section 441.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn102"&gt;
&lt;p&gt;&lt;a name="_ftn102"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Section 442.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn103"&gt;
&lt;p&gt;&lt;a name="_ftn103"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Section 443.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn104"&gt;
&lt;p&gt;&lt;a name="_ftn104"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Section 445.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn105"&gt;
&lt;p&gt;&lt;a name="_ftn105"&gt;&lt;/a&gt; See, Kharak Singh v. State of Uttar Pradesh, AIR 1963 SC 1295 : (1964) 1 SCR 332; Govind v. State of Madhya Pradesh, AIR 1975 SC 1378; Rajagopal v. 			State of Tamil Nadu, AIR 1995 SC 264; People's Union for Civil Liberties (PUCL) v. Union of India, AIR 1997 SC 568; X v. Hospital Z, AIR 1999 SC 			495.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn106"&gt;
&lt;p&gt;&lt;a name="_ftn106"&gt;&lt;/a&gt; DoPT, Approach Paper. &lt;i&gt;supra&lt;/i&gt; note 16.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law'&gt;https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vidushi Marda and Bhairav Acharya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-01-01T14:04:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-december-10-2014-athira-a-nair-frndineed-an-app-for-passenger-safety">
    <title>FrndiNeed; an app for passengers' safety</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-december-10-2014-athira-a-nair-frndineed-an-app-for-passenger-safety</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Athira A. Nair was &lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2014-12-10/news/56917144_1_new-app-police-control-room-uber"&gt;published in the Economic Times&lt;/a&gt; on December 10, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Even as the nation recovers from the shock of an &lt;a href="http://economictimes.indiatimes.com/topic/Uber"&gt;Uber&lt;/a&gt; passenger being raped by her cabbie, there is a new app that has  repackaged itself to "get back the lost trust and security for the daily  commuter". &lt;a href="http://economictimes.indiatimes.com/topic/FrndiNeed"&gt;FrndiNeed&lt;/a&gt;,  a socially-enabled app, which utilizes the user's geo-location,  connects the user with friends in the vicinity and requests them for a  lift. The app, a variant of those that poke friends for instant  meet-ups, has an SOS tab for emergency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kunal Kishore, the Delhi-based co-founder of FrndiNeed, said the app  was originally meant to catch up with friends who were within a 2-5 km  radius."However, when we developed the app in August, we thought of such  (women's security) situations also," he told ET.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Newer app developers are looking at preventing a crisis and creating safer situations for &lt;a href="http://economictimes.indiatimes.com/topic/women"&gt;women&lt;/a&gt; rather than just providing panic buttons. Delhi-based group &lt;a href="http://economictimes.indiatimes.com/topic/Socialcops"&gt;Socialcops&lt;/a&gt; collects data from civilians and authorities to find the safest and  fastest routes for users. This app tells the police about the routes  which need attention. Prukalpa Shankar, co-founder, said: "We are  launching the SocialCops application in Kar nataka through the new  Mobile One governance platform."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jasmeen Patheja, founder of the  Blank Noise Project, said apps should be part of a larger system  connecting the woman with the neighbourhood, the police and family, and  not something that creates panic. "The Circleof6 app created primarily  in the US scenario where daterapes are rampant, puts the user in touch  with six friends the minute she begins to feel uncomfortable on a date,"  she said.Jasmeen has not come across a case in which an app has helped a  woman in an emergency .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The police is tweaking its app to  connect women in trouble to the police. Their six-month-old `DCP SahAya'  app will incorporate a facility which will alert the police control  room or the local police station, revealed Rohini Katoch Sepat, DCP &lt;a href="http://economictimes.indiatimes.com/topic/Bengaluru"&gt;Bengaluru&lt;/a&gt; South-East.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://economictimes.indiatimes.com/topic/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;, the executive director of the &lt;a href="http://economictimes.indiatimes.com/topic/Centre%20for%20Internet"&gt;Centre for Internet&lt;/a&gt; and Society, believes that while certain mobile apps could provide a  degree of safety, it would be naive to think that technology will be the  solution."How many people do you trust to help you at any time of  night? For women, whose emergency contacts are their parents, it would  be difficult to alert them on a date night. Also, in the most  pessimistic scenario, the mobile signal could be dead, and you may not  be able to give an alert at all."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jessie Paul, CEO of Paul Writer  Strategic Advisory, felt that although IT is an enabler and apps are a  step in the right direction, they were not preventive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"To some  extent, I believe these are superficial. We should have a centralized  database for crime which will make it difficult for criminals to escape  and rehabilitate in other parts of the country ," he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-december-10-2014-athira-a-nair-frndineed-an-app-for-passenger-safety'&gt;https://cis-india.org/internet-governance/news/economic-times-december-10-2014-athira-a-nair-frndineed-an-app-for-passenger-safety&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-27T17:05:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/ibn-live-december-8-2014-are-cab-apps-safe">
    <title>Are Cab Apps safe?</title>
    <link>https://cis-india.org/internet-governance/news/ibn-live-december-8-2014-are-cab-apps-safe</link>
    <description>
        &lt;b&gt;Cab services are increasingly relying on mobile apps to book, track and charge you for journeys. While tech watchers say there is a digital trail.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Originally &lt;a class="external-link" href="http://ibnlive.in.com/news/are-cab-apps-safe/517145-62-129.html"&gt;published by IBNLive&lt;/a&gt; on December 8, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"You can always share your location, the app has a feature for you to  share your location through the way to whoever is waiting at the other  end," said Aprameya Radhakrishna, CEO Taxi For Sure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There's also a major safety loopholes. "We have more complicated  technological safegaurd. All the cab driver has to do is use a very  primitive technique. He just has to pull off his battery and can ensure  that he throws away the phone of the traveller, and no one would know,"  said Sunil Abraham, Head, Centre For Internet And Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So can you trust technology to safeguard you? Rest assured that someone  will be monitoring your journey back in some control room?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;People feel that there should be some kind of an automatically generated alert system. Had the tracker been switched off, that could have been a point of loophole.&lt;br /&gt;&lt;br /&gt;Great degree of automation is possible here but finally it is the human oversight which is critical eventually, in any technology.&lt;br /&gt;&lt;br /&gt;Technology, ultimately, doesn't have all the answers, can't provide all solutions against crime prevention. We have seen instances when criminals have attacked women in ATMs knowing full well they are caught on camera, we have seen attacks by unruly drivers at road toll booths, regardless of the surveillance cameras.&lt;br /&gt;&lt;br /&gt;While technology helps in tracking digital footprints that a criminal has taken, it hasn't deterred the criminal from doing what he wants to. For that, we have to be on guard.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ibn-live-december-8-2014-are-cab-apps-safe'&gt;https://cis-india.org/internet-governance/news/ibn-live-december-8-2014-are-cab-apps-safe&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-27T17:01:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
