<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2426 to 2440.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-proposed-icann-community-anti-harassment-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-national-policy-information-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/samyukta-prabhu-ambika-tandon-torsha-sarkar-and-aayush-rathi-august-4-2019-comments-on-national-digital-health-blueprint"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/vipul-kharbanda-february-25-2019-comments-on-draft-second-protocol-to-convention-on-cybercrime-budapest-convention"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-draft-national-policy-on-software-products"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-draft-national-policy-on-official-statistics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-niti-aayog-working-document-towards-responsible-aiforall"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/comments-on-draft-national-policy-on-official-statistics"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-proposed-icann-community-anti-harassment-policy">
    <title>Comments on the Proposed ICANN Community Anti-Harassment Policy </title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-proposed-icann-community-anti-harassment-policy</link>
    <description>
        &lt;b&gt;ICANN sought community input on the Proposed ICANN Community Anti-Harassment Policy on 7 November 2016. In response to this the Centre for Internet &amp; Society (CIS) submitted its comments.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;We at CIS are grateful for the opportunity to comment on the proposed ICANN Community Anti-Harassment Policy (“Policy”). We provide our specific comments to the Policy below, in three sections. The first section addresses the&lt;i&gt; Terms of &lt;/i&gt;​&lt;i&gt;Participation&lt;/i&gt;, the second deals with the &lt;i&gt;Reporting&lt;/i&gt;​&lt;i&gt; and Complaint&lt;/i&gt;​&lt;i&gt; Procedure&lt;/i&gt;, and the third places on record our observations on questions and issues for further consideration which have not been covered by the Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides various other observations, CIS broadly submitted:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The attempt to provide an exhaustive definition of “Specified Characteristics” results in its meaning being unclear and exclusionary.&lt;/li&gt;
&lt;li&gt;CIS strongly supports the phrase “including, but not limited to” that is followed by a bulleted list of inappropriate conduct.&lt;/li&gt;
&lt;li&gt;The word “consent” is entirely missing from the draft policy even though the deciding factor in the “appropriateness” of an act or conduct is active and explicit consent to the act by both/ all individuals involved.&lt;/li&gt;
&lt;li&gt;There is a need for clarity of communication platforms. The current Policy fails to specify instances of face-to-face and online communications.&lt;/li&gt;
&lt;li&gt;The policy fails to account for a body of persons (as is provided for in the IETF policy) for the redressal of harassment complaints.&lt;/li&gt;
&lt;li&gt;The provision for an informal resolution of a harassment issue is problematic as it could potentially lead to negative consequences for the complainant. &lt;/li&gt;
&lt;li&gt;The Ombudsperson’s discretion in the determination of remedial action is detrimental to transparency and accountability.&lt;/li&gt;
&lt;li&gt;The Policy in its current form lacks provisions for ensuring privacy and confidentiality of the complainant as well as interim relief while the Ombudsperson is looking into the complaint&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Read the Complete Submission &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/comments-on-icann-anti-harassment-policy.pdf"&gt;here&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-proposed-icann-community-anti-harassment-policy'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-proposed-icann-community-anti-harassment-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Padma Venkataraman, Rohini Lakshané, Sampada Nayak and Vidushi Marda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-01-13T15:56:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/comments-national-policy-information-technology">
    <title>Comments on the National Policy of Information Technology</title>
    <link>https://cis-india.org/internet-governance/comments-national-policy-information-technology</link>
    <description>
        &lt;b&gt;The NPIT 2011 has the laudable goal of making India a ‘knowledge economy with a global role’ by developing and deploying ICT solutions in all sectors to foster development within India and at a global level. The policy identifies several praiseworthy goals such as the promotion of open standards and open technologies, accessibility for persons with disabilities, affordable ICT services, transparency, accountability, technology development for Indian languages, placing data in public domain for use and value addition, using social media to engage with citizens and investing in indigenous R&amp;D and capacity building. We deeply appreciate this initiative of the Department of Information Technology and offer below brief comments to strengthen the draft.&lt;/b&gt;
        
&lt;h3&gt;Mission&lt;/h3&gt;
&lt;p&gt;It may be important to have one mission which is more citizen centric, for instance, to use ICT to empower and mainstream underprivileged sections of the population such as persons with disabilities, economically disadvantaged people, etc. All of the missions currently listed are related to making India an IT hub and around economic/commercial indicators and the focus on the human development aspect seems to be lacking.&lt;/p&gt;
&lt;h3&gt;Objectives&lt;/h3&gt;
&lt;p&gt;Objectives 8 and 9 which are dealing with government services could specifically mention accessibility. While access for persons with disabilities is covered in objective 12, it does not imply inherent accessibility of all government services, but merely an enablement of those which are required.&lt;/p&gt;
&lt;h3&gt;Enforcement Mechanism&lt;/h3&gt;
&lt;p&gt;While the policy has several commendable goals, there is little indication as to how it will be sought to be implemented. It would be helpful to have clear mention of the responsible authorities and execution mechanisms, including a mechanism for periodic review to ensure that all security, standards and quality guidelines and timelines are met.&lt;/p&gt;
&lt;h3&gt;Development of Language Technologies&lt;/h3&gt;
&lt;p&gt;Since the development of language technologies is extremely crucial to ensure that ICT access is possible for persons in both rural and urban areas, affordability should be stressed as a key aspect of this research and open source solutions may come out of public funded research.&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-national-policy-information-technology'&gt;https://cis-india.org/internet-governance/comments-national-policy-information-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-09T10:28:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/samyukta-prabhu-ambika-tandon-torsha-sarkar-and-aayush-rathi-august-4-2019-comments-on-national-digital-health-blueprint">
    <title>Comments on the National Digital Health Blueprint</title>
    <link>https://cis-india.org/internet-governance/blog/samyukta-prabhu-ambika-tandon-torsha-sarkar-and-aayush-rathi-august-4-2019-comments-on-national-digital-health-blueprint</link>
    <description>
        &lt;b&gt;The Ministry of Health and Family Welfare had released the National Digital Health Blueprint on 15 July 2019 for comments. The Centre for Internet &amp; Society submitted its comments.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This submission presents comments by the Centre for Internet and Society (CIS), on the National Digital Health Blueprint (NDHB) Report, released on 15th July 2019 for publicconsulations. It must be noted at the outset that the time given for comments was less than three weeks, and such a short window of time is inadequate for all stakeholdersinvolved to comprehensively address the various aspects of the Report. Accordingly, on behalf of all other interested parties, we request more time for consultations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We also note that the nature of data which would be subject to processing in the proposed digital framework pre-supposes a robust data protection regime in India, onewhich is currently absent. Accordingly, we also urge ceasing the implementation of the framework until the Personal Data Protection Bill is passed by the parliament. We wouldbe explaining our reasonings on this particular point below.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to download the &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/cis-comments-on-ndhb"&gt;full submission here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/samyukta-prabhu-ambika-tandon-torsha-sarkar-and-aayush-rathi-august-4-2019-comments-on-national-digital-health-blueprint'&gt;https://cis-india.org/internet-governance/blog/samyukta-prabhu-ambika-tandon-torsha-sarkar-and-aayush-rathi-august-4-2019-comments-on-national-digital-health-blueprint&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Samyukta Prabhu, Ambika Tandon, Torsha Sarkar and Aayush Rathi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-08-07T13:24:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011">
    <title>Comments on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011</link>
    <description>
        &lt;b&gt;Bhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Sensitive Personal Data Rules. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;I &lt;span&gt;&lt;span&gt;Preliminary&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.1  The Centre for Internet and Society (&lt;b&gt;“CIS”&lt;/b&gt;) is pleased to present this submission on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 that were notified by the Central Government in the Gazette of India vide Notification GSR 313(E) on 11 April 2011 (&lt;b&gt;“Sensitive Personal Data Rules” or “Rules”&lt;/b&gt;) to the Committee on Subordinate Legislation of the Fifteenth Lok Sabha.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.2 The protection of personal information lies at the heart of the right to privacy; and, for this reason, it is an imperative legislative and policy concern in liberal democracies around the world. In India, although remedies for invasions of privacy exist in tort law and despite the Supreme Court of India according limited constitutional recognition to the right to privacy&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;, there have never been codified provisions protecting the privacy of individuals and their personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Sensitive Personal Data Rules represent India’s first legislative attempt to recognise that all persons have a right to protect the privacy of their personal information. However, the Rules suffer from numerous conceptual, substantive and procedural weaknesses, including drafting defects, which demand scrutiny and rectification. The interpretation and applicability of the Rules was further confused when, on 24 August 2011, the Department of Information Technology of the Ministry of Communications attempted to reinterpret the Rules through a press release oblivious to the universally accepted basic proposition that law cannot be made or reinterpreted via press releases.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Therefore, the attention of the Committee on Subordinate Legislation of the Fifteenth Lok Sabha is called to the following submissions:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II &lt;span&gt;Principles to Facilitate Appraisal&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;2.1  The Sensitive Personal Data Rules are an important step towards building a legal regime that protects the privacy of individuals whilst enabling the secure collection, use and storage of personal information by state and private entities. The Rules are to be welcomed in principle. However, at present, the Rules construct an incomplete regime that does not adequately protect privacy and, for this reason, falls short of internationally accepted data protection standards.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This not only harms the personal liberties of Indian citizens, it also affects the ability of Indian companies to conduct commerce in foreign countries. More importantly, the Rules offer no protection against the state.&lt;/p&gt;
&lt;p&gt;2.2  To enact a comprehensive personal information protection regime, CIS believes that the Rules should proceed on the basis of the following broad principles:&lt;/p&gt;
&lt;p&gt;(a)   &lt;span&gt;Principle of Notice / Prior Knowledge&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All persons from whom personal information is collected have a right to know, before the personal information is collected and, where applicable, at any point thereafter: (i) of an impending collection of personal information; (ii) the content and nature of the personal information being collected; (iii) the purpose for which the personal information is being collected; (iv) the broad identities of all natural and juristic persons who will have access to the collected personal information; (v) the manner in which the collected personal information will be used; (vi) the duration for which the collected personal information will be stored; (vii) whether the collected personal information will be disclosed to third parties including the police and other law enforcement agencies; (viii) of the manner in which they may access, check, modify or withdraw their collected personal information; (ix) the security practices and safeguards that will govern the sanctity of the collected personal information; (x) of all privacy policies and other policies in relation to the collected personal information; (xi) of any breaches in the security, safety, privacy and sanctity of the collected personal information; and, (xii) the procedure for recourse, including identities and contact details of ombudsmen and grievance redress officers, in relation to any misuse of the collected personal information.&lt;/p&gt;
&lt;p&gt;(b)    &lt;span&gt;Principle of Consent&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Personal information must only be collected once the person to whom it pertains has consented to its collection. Such consent must be informed, explicit and freely given. Informed consent is conditional upon the fulfilment of the principle of notice/prior knowledge set out in the preceding paragraph. Consent must be expressly given: the person to whom the personal information to be collected pertains must grant explicit and affirmative permission to collect personal information; and, he must know, or be made aware, of any action of his that will constitute such consent. Consent that is obtained using threats or coercion, such as a threat of refusal to provide services, does not constitute valid consent. Any person whose personal information has been consensually collected may, at any time, withdraw such consent for any or no reason and, consequently, his personal information, including his identity, must be destroyed. When consent is withdrawn in this manner, the person who withdrew consent may be denied any service that requires the use of the personal information for which consent was withdrawn.&lt;/p&gt;
&lt;p&gt;(c)  &lt;span&gt;Principle of Necessity / Collection Limitation&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Personal information must only be collected when, where and to the extent necessary. Necessity cannot be established in general; there must be a specific nexus connecting the content of the personal information to the purpose of its collection. Only the minimal amount of personal information necessary to achieve the purpose should be collected. If a purpose exists that warrants a temporally specific, or an event-dependent, collection of personal information, such a collection must only take place when that specific time is reached or that event occurs. If the purpose of personal information is dependent upon, or specific to, a geographical area or location, that personal information must only be collected from that geographical area or location.&lt;/p&gt;
&lt;p&gt;(d)  &lt;span&gt;Right to be Forgotten / Principle of Purpose Limitation&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once collected, personal information must be processed, used, stored or otherwise only for the purpose for which it was collected. If the purpose for which personal information was collected is achieved, the collected personal information must be destroyed and the person to whom that personal information pertained must be ‘forgotten.’ Similarly, collected personal information must be destroyed and the person to whom it pertained ‘forgotten’ if the purpose for which it was collected expires or ceases to exist. Personal information collected for a certain purpose cannot be used or stored for another purpose nor even used or stored for a similar purpose to arise in the future without the express and informed consent of the person from whom it was collected in accordance with the principles of notice/prior knowledge and consent.&lt;/p&gt;
&lt;p&gt;(e)    &lt;span&gt;Right of Access&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All persons from whom personal information is collected have a right to access that personal information at any point following its collection to check its accuracy, make corrections or modifications and have destroyed that which is inaccurate. Where personal information of more than one person is held in an aggregated form such that affording one person access to it may endanger the right to privacy of another person, the entity holding the aggregated personal information must, to the best of its ability, identify the portion of the personal information that pertains to the person seeking access and make it available to him. All persons from whom personal information is collected must be given copies of their personal information upon request.&lt;/p&gt;
&lt;p&gt;(f)   &lt;span&gt;Principle­ regarding Disclosure&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Personal information, once collected, must never be disclosed. However, if the person to whom certain personal information pertains consents to its disclosure in accordance with the principle of consent after he has been made aware of the proposed disclosee and other details related to the personal information in accordance with the principle of notice/prior knowledge, the personal information may be disclosed. Consent to a disclosure of this nature may be obtained even during collection of the personal information if the person to whom it pertains expressly consents to its future disclosure. Notwithstanding the rule against disclosure and the consent exception to the rule, personal information may be disclosed to the police or other law enforcement agencies on certain absolute conditions. Since the protection of personal information is a policy imperative, the conditions permitting its disclosure must be founded on a clear and serious law enforcement need that overrides the right to privacy; and, in addition, the disclosure conditions must be strict, construed narrowly and, in the event of ambiguity, interpreted to favour the individual right to privacy. Therefore, (i) there must be a demonstrable need to access personal information in connection with a criminal offence; (ii) only that amount of personal information that is sufficient to satisfy the need must be disclosed; and, (iii), since such a disclosure is non-consensual, it must follow a minimal due process regime that at least immediately notifies the person concerned and affords him the right to protest the disclosure.&lt;/p&gt;
&lt;p&gt;(g)  &lt;span&gt;Principle of Security&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All personal information must be protected to absolutely maintain its sanctity, confidentiality and privacy by implementing safeguards against loss, unauthorised access, destruction, use, processing, storage, modification, de-anonymisation, unauthorised disclosure and other risks. Such a level of protection must include physical, administrative and technical safeguards that are constantly and consistently audited. Protection measures must be revised to incorporate stronger measures and mechanisms as and when they arise.&lt;/p&gt;
&lt;p&gt;(h) &lt;span&gt;Principle of Transparency / ‘Open-ness’&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;All practices, procedures and policies governing personal information must be made available to the person to whom that personal information pertains in a simple and easy-to-understand manner. This includes policies relating to the privacy, security and disclosure of that personal information. If an entity that seeks to collect personal information does not have these policies, it must immediately draft, publish and display such policies in addition to making them available to the person from whom it seeks to collect personal information before the collection can begin.&lt;/p&gt;
&lt;p&gt;(i)  &lt;span&gt;Principle of Accountability&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Liability attaches to the possession of personal information of another person. Since rights and duties, such as those in relation to privacy of personal information, are predicated on accountability, this principle binds all entities that seek to possess personal information of another person. As a result, an entity seeking to collect, use, process, store or disclose personal information of another person is accountable to that person for complying with all these principles as well as the provisions of any law. The misuse of personal information causes harm to the person to whom it pertains to attract and civil and criminal penalties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.3 These principles are reflective of internationally accepted best practices to form the basis upon which Indian legislation to protect personal information should be drafted. The Sensitive Personal Data Rules, in their current form, fall far short of the achieving the substantive intent of these principles. &lt;b&gt;CIS submits that either (i) the Sensitive Personal Data Rules should be replaced with new and comprehensive legislation that speaks to the objectives and purpose of these principles, or (ii) the Sensitive Personal Data Rules are radically modified by amendment to bring Indian law to par with world standards.&lt;/b&gt; Nevertheless, without prejudice to the preceding submission, CIS offers the following clause-by-clause comments on the Sensitive Personal Data Rules:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III &lt;span&gt;&lt;span&gt;Clause-by-Clause Analysis and Comments&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Rule 2 - Definitions&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3.1.1    Rule 2(1)(b) of the Sensitive Personal Data Rules defines “biometrics” as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"Biometrics" means the technologies that measure and analyse human body characteristics, such as 'fingerprints', 'eye retinas and irises', 'voice patterns', "facial patterns', 'hand measurements' and 'DNA' for authentication purposes.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.1.2   &lt;span&gt;Firstly&lt;/span&gt;, the Sensitive Personal Data Rules do not use the term “biometrics.” Instead, rule 3(vi), which defines sensitive personal data, uses the term “biometric information.” It is unclear why rule 2(1)(b) provides a definition of the technologies by which information is obtained instead of clearly identify the information that constitutes sensitive personal data. This is one of several examples of poor drafting of the Sensitive Personal Data Rules. &lt;span&gt;Secondly&lt;/span&gt;, biometric information is not used only for authentication; there are many other reasons for collecting and using biometric information. For instance, DNA is widely collected and used for medical research. Restricting the application of the definition to only that biometric information that is used for authentication is illogical to deprive the Rules of meaning.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.1.3    Therefore, it is proposed that rule 2(1)(b) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;““Biometric information” means any information relating to the physical, physiological or behavioural characteristics of an individual which enable their unique identification including, but not limited to, fingerprints, retinas, irises, voice patterns, facial patterns, Deoxyribonucleic acid (DNA) and genetic information.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2.1  Rule 2(1)(c) of the Sensitive Personal Data Rules defines “body corporate” in accordance with the definition provided in clause (i) of the Explanation to section 43A of the Information Technology Act, 2000 (&lt;b&gt;“IT Act”&lt;/b&gt;) as follows:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;“body corporate” means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2.2 &lt;span&gt;Firstly&lt;/span&gt;, this definition of a body corporate is poorly drafted to extend beyond incorporated entities to bring within its ambit even unincorporated professional organisations such as societies and associations which, by their very nature, are not bodies corporate.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an arbitrary reinterpretation of the fundamental principles of company law. As it presently stands, this peculiar definition will extend to public and private limited companies, including incorporated public sector undertakings, ordinary and limited liability partnerships, firms, sole proprietorships, societies and associations; but, &lt;span&gt;&lt;span&gt;will exclude public and private trusts&lt;/span&gt;&lt;/span&gt;&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; &lt;span&gt;and unincorporated public authorities&lt;/span&gt;. Hence, whereas non-governmental organisations that are organised as societies will fall within the definition of “body corporate,” those that are organised as trusts will not. Similarly, incorporated public authorities such as Delhi Transport Corporation and even municipal corporations such as the Municipal Corporation of Delhi will fall within the definition of “body corporate” but unincorporated public authorities such as the New Delhi Municipal Council and the Delhi Development Authority will not. This is a &lt;i&gt;prima facie&lt;/i&gt; violation of the fundamental right of all persons to be treated equally under the law guaranteed by Article 14 of the Constitution of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2.3  &lt;span&gt;Secondly&lt;/span&gt;, whereas state entities and public authorities often collect and use sensitive personal data, with the exception of state corporations the Sensitive Personal Data Rules do not apply to the state. This means that the procedural safeguards offered by the Rules do not bind the police and other law enforcement agencies allowing them a virtually unfettered right to collect and use, even misuse, sensitive personal data without consequence. Further, state entities such as the Unique Identification Authority of India or the various State Housing Boards which collect, handle, process, use and store sensitive personal data are not covered by the Rules and remain unregulated. It is not possible to include these unincorporated entities within the definition of a body corporate; but, in pursuance of the principles set out in paragraph 2.2 of this submission, the Rules should be expanded to all state entities, whether incorporated or not.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.2.4  Therefore, it is proposed that rule 2(1)(c) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;““body corporate” means the body corporate defined in sub-section (7) of section 2 read with section 3 of the Companies Act, 1956 (1 of 1956) and includes those entities which the Central Government may, by notification in the Official Gazette, specify in this behalf but shall not include societies registered under the Societies Registration Act, 1860 (21 of 1860), trusts created under the Indian Trusts Act, 1882 (2 of 1882) or any other association of individuals that is not a legal entity apart from the members constituting it and which does not enjoy perpetual succession.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Further, it is proposed that the Sensitive Personal Data Rules be re-drafted to apply to societies registered under the Societies Registration Act, 1860 and trusts created under the Indian Trusts Act, 1882 in a manner reflective of their distinctiveness from bodies corporate&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Furthermore, it is proposed that the Sensitive Personal Data Rules be re-drafted to apply to public authorities and the state as defined in Article 12 of the Constitution of India&lt;/b&gt;.&lt;/p&gt;
&lt;p&gt;3.3.1  Rule 2(1)(d) of the Sensitive Personal Data Rules defines “cyber incidents” as follows:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;"Cyber incidents" means any real or suspected adverse event in relation to cyber security that violates an explicitly or implicitly applicable security policy resulting in unauthorised access, denial of service or disruption, unauthorised use of a computer resource for processing or storage of information or changes to data, information without authorisation.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.3.2  Before examining the provisions of this clause, CIS questions the need for this definition. The term “&lt;i&gt;cyber incidents&lt;/i&gt;” is used only once in these rules: the proviso to rule 6(1) which specifies the conditions upon which personal information or sensitive personal data may be disclosed to the police or other law enforcement authorities without the prior consent of the person to whom the information pertains. An analysis of rule 6(1) is contained at paragraphs 3.11.1 – 3.11.4 of this submission. &lt;span&gt;Firstly&lt;/span&gt;, personal information and sensitive personal data should only be disclosed in connection with the prevention, investigation and prosecution of an existing offence. Offences cannot be created in the definitions clause of sub-statutory rules, they can only be created by a parent statute or another statute. &lt;span&gt;Secondly&lt;/span&gt;, the scope and content of “cyber incidents” are already covered by section 43 of the IT Act. When read with section 66 of IT Act, an offence is created that is larger than the scope of the term “cyber incidents” to render this definition redundant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.3.3   Therefore, it is proposed that the definition of “cyber incidents” in rule 2(1)(d) be deleted and the remaining clauses in sub-rule (1) of rule 2 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.4.1  Rule 2(1)(g) of the Sensitive Personal Data Rules defines “intermediary” in accordance with the definition provided in section 2(1)(w) of the IT Act. However, the term “intermediary” is not used anywhere in the Sensitive Personal Data Rules and so its definition is redundant. This is another instance of careless drafting of the Sensitive Personal Data Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.4.2   Therefore, it is proposed that the definition of “intermediary” in rule 2(1)(g) be deleted and the remaining clauses in sub-rule (1) of rule 2 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 3 - Sensitive Personal Data&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3.5.1    Rule 3 of the Sensitive Personal Data Rules provides an aggregated definition of sensitive personal data as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Sensitive personal data or information of a person means such personal information which consists of information relating to – &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)   password; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(ii)  financial information such as Bank account or credit card or debit card or other payment instrument details ; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(iii) physical, physiological and mental health condition; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iv) sexual orientation; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(v)  medical records and history; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vi) Biometric information; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(vii) any detail relating to the above clauses as provided to body corporate for providing service; and &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(viii) any of the information received under above clauses by body corporate for processing, stored or processed under lawful contract or otherwise: &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;provided that, any information that is freely available or accessible in public domain or furnished under the Right to Information Act, 2005 or any other law for the time being in force shall not be regarded as sensitive personal data or information for the purposes of these rules.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.5.2    In accordance with the principle that certain kinds of personal information are particularly sensitive, due to the intimate nature of their content in relation to the right to privacy, to invite privileged protective measures regarding the collection, handling, processing, use and storage of such sensitive personal data, it is surprising that rule 3 does not protect electronic communication records of individuals. Emails and chat logs as well as records of internet activity such as online search histories are particularly vulnerable to abuse and misuse and should be accorded privileged protection.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.5.3    Therefore, it is proposed that rule 3 be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;“Sensitive personal data or information of a person means personal information as to that person’s –&lt;/p&gt;
&lt;p&gt;(i)  passwords and encryption keys;&lt;/p&gt;
&lt;p&gt;(ii)  financial information including, but not limited to, information relating to his bank accounts, credit cards, debit cards, negotiable instruments, debt and other payment details;&lt;/p&gt;
&lt;p&gt;(iii) physical, physiological and mental condition;&lt;/p&gt;
&lt;p&gt;(iv)  sexual activity and sexual orientation;&lt;/p&gt;
&lt;p&gt;(v)   medical records and history;&lt;/p&gt;
&lt;p&gt;(vi)  biometric information; and&lt;/p&gt;
&lt;p&gt;(vii) electronic communication records including, but not limited to, emails, chat logs and other communications made using a computer;&lt;/p&gt;
&lt;p&gt;and shall include any data or information related to the sensitive personal data or information set out in this rule that is provided to, or received by, a body corporate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that, any information that is freely available or accessible in the public domain or furnished under the Right to Information Act, 2005 or any other law for the time being in force shall not be regarded as sensitive personal data or information for the purposes of these rules.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 4 - Privacy and Disclosure Policy&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;3.6.1    Rule 4 of the Sensitive Personal Data Rules, which obligates certain bodies corporate to publish privacy and disclosure policies for personal information, states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Body corporate to provide policy for privacy and disclosure of information. – &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(1) The body corporate or any person who on behalf of body corporate collects, receives, possess, stores, deals or handle information of provider of information, shall provide a privacy policy for handling of or dealing in personal information including sensitive personal data or information and ensure that the same are available for view by such providers of information who has provided such information under lawful contract. Such policy shall be published on website of body corporate or any person on its behalf and shall provide for –&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)  Clear and easily accessible statements of its practices and policies; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii) type of personal or sensitive personal data or information collected under rule 3; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iii) purpose of collection and usage of such information; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iv) disclosure of information including sensitive personal data or information as provided in rule 6; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(v)  reasonable security practices and procedures as provided under rule 8. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.6.2  This rule is very badly drafted, contains several discrepancies and is legally imprecise. &lt;span&gt;Firstly&lt;/span&gt;, this rule is overbroad to bind all bodies corporate that receive and use information, as opposed to “personal information” or “sensitive personal data.” All bodies corporate receive and use information, even a vegetable seller uses information relating to vegetables and prices; but, not all bodies corporate receive and use personal information and even fewer bodies corporate receive and use sensitive personal data. The application of this provision should turn on the reception and use of personal information, which includes sensitive personal data, and not simply information. &lt;span&gt;Secondly&lt;/span&gt;, although this rule only applies when a provider of information provides information, the term “provider of information” is undefined. It may mean any single individual who gives his personal information to a body corporate, or it may even mean another entity that outsources or subcontracts work that involves the handling of personal information. This lack of clarity compromises the enforceability of this rule. The government’s press release of 24 August 2011 acknowledged this error but since it is impossible, not to mention unconstitutional, for a statutory instrument like these Rules to be amended, modified, interpreted or clarified by a press release, CIS is inclined to ignore the press release altogether. It is illogical that privacy policies not be required when personal information is directly given by a single individual. This rule should bind all bodies corporate that receive and use personal information irrespective of the source of the personal information. &lt;span&gt;Thirdly&lt;/span&gt;, it is unclear whether separate privacy policies are required for personal information and for sensitive personal data. There is a distinction between personal information and sensitive personal data and since these Sensitive Personal Data Rules deal with the protection of sensitive personal data, this rule 4 should unambiguously mandate the publishing of privacy policies in relation to sensitive personal data. Any additional requirement for personal information must be set out to clearly mark its difference from sensitive personal data. &lt;span&gt;Fourthly&lt;/span&gt;, because of sloppy drafting, the publishing duties of the body corporate in respect of any sensitive personal data are unclear. For example, the phrase “&lt;i&gt;personal or sensitive personal data or information&lt;/i&gt;” used in clause (ii) is meaningless since “personal information” and “sensitive personal data or information” are defined terms.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.6.3  Therefore, it is proposed that rule 3 be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;b&gt;Duty to publish certain policies. – &lt;/b&gt;(1) Any body corporate that collects, receives, possesses, stores, deals with or handles personal information or sensitive personal data from any source whatsoever shall, prior to collecting, receiving, possessing, storing, dealing with or handling such personal information or sensitive personal data, publish and prominently display the policies listed in sub-rule (2) in relation to such personal information and sensitive personal data.&lt;/p&gt;
&lt;p&gt;(2) In accordance with sub-rule (1) of this rule, all bodies corporate shall publish separate policies for personal information and sensitive personal data that clearly state –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) the meanings of personal information and sensitive personal data in accordance with these rules;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) the practices and policies of that body corporate in relation to personal information and sensitive personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) descriptive details of the nature and type of personal information and sensitive personal data collected, received, possessed, stored or handled by that body corporate;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) the purpose for which such personal information and sensitive personal data is collected, received, possessed, stored or handled by that body corporate;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) the manner and conditions upon which such personal information and sensitive personal data may be disclosed in accordance with rule 6 of these rules; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) the reasonable security practices and procedures governing such personal information and sensitive personal data in accordance with rule 8 of these rules.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 5 - Collection of Information&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;3.7.1    Rule 5(1) of the Sensitive Personal Data Rules lays down the requirement of consent before personal information can be collected as follows:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Body corporate or any person on its behalf shall obtain consent in writing through letter or Fax or email from the provider of the sensitive personal data or information regarding purpose of usage before collection of such information.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.7.2 &lt;span&gt;Firstly&lt;/span&gt;, the principle and requirement of consent is of overriding importance when collecting personal information, which includes sensitive personal data. Pursuant to the principles laid down in paragraph 2.2 of this submission, consent must be informed, explicit and freely given. Since sub-rule (3) of rule 5 attempts to secure the informed consent of persons giving personal information, this sub-rule must establish that all personal information can only be collected upon explicit consent that is freely given, irrespective of the medium and manner in which it is given. &lt;span&gt;Secondly&lt;/span&gt;, it may be noted that sub-rule (1) only applies to sensitive personal data and not to other personal information that is not sensitive personal data. This is ill advised.  &lt;span&gt;Thirdly&lt;/span&gt;, this sub-rule relating to actual collection of personal information should follow a provision establishing the principle of necessity before collection can begin. The principle of necessity is currently laid down in sub-rule (2) of rule 5 which should be re-numbered to precede this sub-rule relating to collection.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.7.3   Therefore, it is proposed that rule 5(1) be re-numbered to sub-rule (2) of rule 5 and re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“A body corporate seeking to collect personal information or sensitive personal data of a person shall, prior to collecting that personal information or sensitive personal data, obtain the express and informed consent of that person in any manner, and through any medium, that may be convenient but shall not obtain such consent through threat, duress or coercion.”&lt;/p&gt;
&lt;p&gt;3.8.1    Rule 5(2) of the Sensitive Personal Data Rules sets out the principle of necessity governing the collection of personal information as follows:&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Body corporate or any person on its behalf shall not collect sensitive personal data or information unless — &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a)  the information is collected for a lawful purpose connected with a function or activity of the body corporate or any person on its behalf; and &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b) the collection of the sensitive personal data or information is considered necessary for that purpose.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.8.2    &lt;span&gt;Firstly&lt;/span&gt;, before allowing a body corporate to collect personal information, which includes sensitive personal data, the law should strictly ensure that the collection of such personal information is necessary. Necessity cannot be established in general, there must be a nexus connecting the personal information to the purpose for which the personal information is sought to be collected. This important sub-rule sets out the principles upon which personal information can be collected; and, should therefore be the first sub-rule of rule 5. &lt;span&gt;Secondly&lt;/span&gt;, this sub-rule only applies to sensitive personal data instead of all personal information. It is in the public interest that the principle of necessity applies to all personal information, including sensitive personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.8.3 &lt;b&gt;Therefore, it is proposed that rule 5(2) be re-numbered to sub-rule (1) of rule 5 and re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“No body corporate shall collect any personal information or sensitive personal data of a person unless it clearly establishes that –&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;(a) the personal information or sensitive personal data is collected for a lawful purpose that is directly connected to a function or activity of the body corporate; and&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;(b) the collection of the personal information or sensitive personal data is necessary to achieve that lawful purpose.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.9.1 Rule 5(3) of the Sensitive Personal Data Rules attempts to create an informed consent regime for the collection of personal information as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;While collecting information directly from the person concerned, the body corporate or any person on its behalf snail take such steps as are, in the circumstances, reasonable to ensure that the person concerned is having the knowledge of — &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(a)  the fact that the information is being collected; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(b)  the purpose for which the information is being collected; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(c)  the intended recipients of the information; and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(d)  the name and address of — &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)   the agency that is collecting the information; and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii)  the agency that will retain the information.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.9.2   &lt;span&gt;Firstly&lt;/span&gt;, this sub-rule (3) betrays the carelessness of its drafters by bringing within its application any and all information collected by a body corporate from a person instead of only personal information or sensitive personal data. &lt;span&gt;Secondly&lt;/span&gt;, this provision is crucial to establishing a regime of informed consent before personal information is given by a person to a body corporate. For consent to be informed, the person giving consent must be made aware of not only the collection of that personal information or sensitive personal data, but also the purpose for which it is being collected, the manner in which it will be used, the intended recipients to whom it will be sent or made accessible, the duration for which it will be stored, the conditions upon which it may be disclosed, the conditions upon which it may be destroyed as well as the identities of all persons who will collect, receive, possess, store, deal with or handle that personal information or sensitive personal data. &lt;span&gt;Thirdly&lt;/span&gt;, the use of the phrase “&lt;i&gt;take such steps as are, in the circumstances, reasonable&lt;/i&gt;” dilutes the purpose of this provision and compromises the establishment of an informed consent regime. Instead, the use of the term “reasonable efforts”, which has an understood meaning in law, will suffice to protect individuals while giving bodies corporate sufficient latitude to conduct their business.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.9.3    Therefore, it is proposed that rule 5(3) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;“A body corporate seeking to collect personal information or sensitive personal data of a person shall, prior to such collection, make reasonable efforts to inform that person of the following details in respect of his personal information or sensitive personal data –&lt;/p&gt;
&lt;p&gt;(a)  the fact that it is being collected;&lt;/p&gt;
&lt;p&gt;(b)  the purpose for which it is being collected;&lt;/p&gt;
&lt;p&gt;(c)  the manner in which it will be used;&lt;/p&gt;
&lt;p&gt;(d)  the intended recipients to whom it will be sent or made available;&lt;/p&gt;
&lt;p&gt;(e)  the duration for which it will be stored;&lt;/p&gt;
&lt;p&gt;(f)   the conditions upon which it may be disclosed;&lt;/p&gt;
&lt;p&gt;(g)  the conditions upon which it may be destroyed; and&lt;/p&gt;
&lt;p&gt;(h)  the identities of all persons and bodies corporate who will collect, receive, possess, store, deal with or handle it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.10.1  Rule 5(4) of the Sensitive Personal Data Rules lays down temporal restrictions to the retention of personal information:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Body corporate or any person on its behalf holding sensitive personal data or information shall not retain that information for longer than is required for the purposes for which the information may lawfully be used or is otherwise required under any other law for the time being in force.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.10.2  Since this sub-rule (4) only applies to sensitive personal data instead of all personal information, bodies corporate are permitted to hold personal information of persons that is not sensitive personal data for as long as they like even after the necessity that informed the collection of that personal information expires and the purpose for which it was collected ends. This is a dangerous provision that deprives the owners of personal information of the ability to control its possession to jeopardise their right to privacy. The Sensitive Personal Data Rules should prescribe a temporal limit to the storage of all personal information by bodies corporate.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.10.3  Therefore, it is proposed that rule 5(4) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“No body corporate shall store, retain or hold personal information or sensitive personal data for a period longer than is required to achieve the purpose for which that personal information or sensitive personal data was collected.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 6 - Disclosure of Information&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.11.1  Rule 6(1) of the Sensitive Personal Data Rules, which deals with the crucial issue of disclosure of personal information, states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Disclosure of sensitive personal data or information by body corporate to any third party shall require prior permission from the provider of such information, who has provided such information under lawful contract or otherwise, unless such disclosure has been agreed to in the contract between the body corporate and provider of information, or where the disclosure is necessary for compliance of a legal obligation: &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provided that the information shall be shared, without obtaining prior consent from provider of information, with Government agencies mandated under the law to obtain information including sensitive personal data or information for the purpose of verification of identity, or for prevention, detection, investigation including cyber incidents, prosecution, and punishment of offences. The Government agency shall send a request in writing to the body corporate possessing the sensitive personal data or information stating clearly the purpose of seeking such information. The Government agency shall also state that the information so obtained shall not be published or shared with any other person.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.11.2  In addition to errors and discrepancies in drafting, this sub-rule contains wide and vague conditions of disclosure of sensitive personal data to gravely impair the privacy rights and personal liberties of persons to whom such sensitive personal data pertains. A summary of drafting errors and discrepancies follows: &lt;span&gt;Firstly&lt;/span&gt;, this sub-rule only applies to sensitive personal data instead of all personal information. The protection of personal information that is not sensitive personal data is an essential element of the right to privacy; hence, prohibiting bodies corporate from disclosing personal information at will is an important public interest prerogative. &lt;span&gt;Secondly&lt;/span&gt;, the use of the phrase “&lt;i&gt;any third party&lt;/i&gt;” lends vagueness to this provision since the term “third party” has not been defined. &lt;span&gt;Thirdly&lt;/span&gt;, the repeated use of the undefined phrase “&lt;i&gt;provider of information&lt;/i&gt;” throughout these Rules and in this sub-rule is confusing since, as pointed out in paragraph 3.6.2 of this submission, it could mean either or both of the single individual who consents to the collection of his personal information or another entity that transfers personal information to the body corporate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.11.3  Further, the conditions upon which bodies corporate may disclose personal information and sensitive personal data without the consent of the person to whom it pertains are dangerously wide. &lt;span&gt;Firstly&lt;/span&gt;, the disclosure of personal information and sensitive personal data when it is “&lt;i&gt;necessary for compliance of a legal obligation&lt;/i&gt;” is an extremely low protection standard. The law must intelligently specify the exact conditions upon which disclosure sans consent is possible; since the protection of personal information is a public interest priority, the conditions upon which it may be disclosed must outweigh this priority to be significant and serious enough to imperil the nation or endanger public interest. The disclosure of personal information and sensitive personal data for mere compliance of a legal obligation, such as failure to pay an electricity bill, is farcical. &lt;span&gt;Secondly&lt;/span&gt;, the proviso sets out the conditions upon which the state, through its law enforcement agencies, may access personal information and sensitive personal data without the consent of the person to whom it pertains. Empowering the police with access to personal information can serve a public good if, and only if, it results in the prevention or resolution of crime; if not, this provision will give the police carte blanche to misuse and abuse this privilege. Hence, personal information should only be disclosed for the prevention, investigation and prosecution of an existing criminal offence. &lt;span&gt;Thirdly&lt;/span&gt;, the definition and use of the term “&lt;i&gt;cyber incidents&lt;/i&gt;” is unnecessary because section 43 of the IT Act already lists all such incidents. In addition, when read with section 66 of the IT Act, there emerges a clear list of offences to empower the police to seek non-consensual disclosure of personal information to obviate the need for any further new terminology. &lt;span&gt;In sum&lt;/span&gt;, with regard to the non-consensual disclosure of personal information for the purposes of law enforcement: a demonstrable need to access personal information to prevent, investigate or prosecute crime must exist; only that amount of personal information sufficient to satisfy the need must be disclosed; and, finally, no disclosure may be permitted without clearly laid down procedural safeguards that fulfil the requirements of a minimal due process regime.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.11.4  Therefore, it is proposed that rule 6(1) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“No body corporate shall disclose any personal information or sensitive personal data to anyone whosoever without the prior express consent of the person to whom the personal information or sensitive personal data to be disclosed pertains.&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;Provided that if the personal information or sensitive personal data was collected pursuant to an agreement that expressly authorises the body corporate to disclose such personal information or sensitive personal data, and if the person to whom the personal information or sensitive personal data pertains was aware of this authorisation prior to such collection, the body corporate may disclose the personal information or sensitive personal data without obtaining the consent of the person to whom it pertains in the form and manner specified in such agreement.&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;Provided further that if a reasonable threat to national security, defence or public order exists, or if the disclosure of personal information or sensitive personal data is necessary to prevent, investigate or prosecute a criminal offence, the body corporate shall, upon receiving a written request from the police or other law enforcement authority containing the particulars and details of the personal information or sensitive personal data to be disclosed, disclose such personal information or sensitive personal data to such police or other law enforcement authority without the prior consent of the person to whom it pertains.”&lt;/p&gt;
&lt;p&gt;3.12.1  Rule 6(2) of the Sensitive Personal Data Rules creates an additional disclosure mechanism:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Notwithstanding anything contain in sub-rule (1), any sensitive personal data on Information shall be disclosed to any third party by an order under the law for the time being in force.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.12.2  This sub-rule is overbroad to enable anyone’s sensitive personal data to be disclosed to any other person without the application of any standards of necessity, proportionality or due process and without the person to whom the sensitive personal data pertains having any recourse or remedy. Such provisions are the hallmarks of authoritarian and police states and have no place in a liberal democracy. For instance, the invocation of this sub-rule will enable a police constable in Delhi to exercise unfettered power to access the biometric information or credit card details of a politician in Kerala since an order of a policeman constitutes “&lt;i&gt;an order under the law&lt;/i&gt;”. Pursuant to our submission in paragraph 3.11.4, adequate measures exist to secure the disclosure of personal information or sensitive public data in the public interest. The balance of convenience between privacy and public order has already been struck. This sub-rule should be removed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.12.3 Therefore, it is proposed that rule 6(2) be deleted and the remaining sub-rules in rule 6 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3.13.1  Rule 6(4) of the Sensitive Personal Data Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The third party receiving the sensitive personal data or information from body corporate or any person on its behalf under sub-rule (1) shall not disclose it further.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.13.2  &lt;span&gt;Firstly&lt;/span&gt;, as mentioned elsewhere in this submission, the phrase “&lt;i&gt;third party&lt;/i&gt;” has not been defined. This is a drafting discrepancy that must be rectified. &lt;span&gt;Secondly&lt;/span&gt;, this sub-rule only encompasses sensitive personal data and not other personal information that is not sensitive personal data. &lt;span&gt;Thirdly&lt;/span&gt;, it may be necessary, in the interests of business or otherwise, for personal information or sensitive personal data that has been lawfully disclosed to a third person to be disclosed further if the person to whom that personal information consents to it.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.13.3  Therefore, it is proposed that rule 6(4) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“Personal information and sensitive personal data that has been lawfully disclosed by a body corporate to a person who is not the person to whom such personal information or sensitive personal data pertains in accordance with the provisions of these rules may be disclosed further upon obtaining the prior and express consent of the person to whom it pertains.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 7 - Transfer of Information&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.14.1  Rule 7 of the Sensitive Personal Data Rules sets out the conditions upon which bodies corporate may transfer personal information or sensitive personal data to other bodies corporate in pursuance of a business arrangement:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;A body corporate or any person on its behalf may transfer sensitive personal data or information including any information, to any other body corporate or a person in India, or located in any other country, that ensures the same level of data protection that is adhered to by the body corporate as provided for under these Rules. The transfer may be allowed only if it is necessary for the performance of the lawful contract between the body corporate or any person on its behalf and provider of information or where such person has consented to data transfer.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.14.2  This provision allows personal information and sensitive personal data to be transferred across international borders to other bodies corporate in pursuance of a business agreement. The transfer of such information is a common feature of international commerce in which Indian information technology companies participate with significant success. Within India too, personal information and sensitive personal data is routinely transferred between companies in furtherance of an outsourced business model. Besides affecting ease of business, the sub-rule also affects the ability of persons to control their personal information and sensitive personal data. However, the sub-rule has been poorly drafted: &lt;span&gt;firstly&lt;/span&gt;, the simultaneous use of the phrases “&lt;i&gt;provider of information&lt;/i&gt;” and “&lt;i&gt;such person&lt;/i&gt;” is imprecise and misleading; &lt;span&gt;secondly&lt;/span&gt;, the person to whom any personal information or sensitive personal data pertains must pre-consent to the transfer of such information.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.14.3  Therefore, it is proposed that rule 7 be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“A body corporate may transfer any personal information or sensitive personal data in its possession to another body corporate, whether located in India or otherwise, if the transfer is pursuant to an agreement that binds the other body corporate to same, similar or stronger measures of privacy, protection, storage, use and disclosure of personal information and sensitive personal data as are contained in these rules, and if the express and informed consent of the person to whom the personal information or sensitive personal data pertains is obtained prior to the transfer.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 8 - Reasonable Security Practices&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.15.1  Following rule 8(1) of the Sensitive Personal Data Rules that prescribes reasonable security practices and procedures necessary for protecting personal information and sensitive personal data, rule 8(2) asserts that the international standard ISO/IEC 27001 fulfils the protection standards required by rule 8(1):&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;&lt;i&gt;The international Standard IS/ISO/IEC 27001 on "Information Technology - Security Techniques - Information Security Management System - Requirements" is one such standard referred to in sub-rule (1).&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.15.2  ISO/IEC 27001 is an information security management system standard that is prescribed by the International Organisation for Standardisation and the International Electrotechnical Commission. CIS raises no objection to the content or quality of the ISO/IEC 27001 standard. However, to achieve ISO/IEC 27001 compliance and certification, one must first purchase a copy of the standard. A copy of the ISO/IEC 27001 standard costs approximately Rs. _____/-. The cost of putting in place the protective measures required by the ISO/IEC 27001 standard are higher: these include the cost of literature and training, the cost of external assistance, the cost of technology, the cost of employees’ time and the cost of certification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.15.3  Therefore, to bring these standards within the reach of small and medium-sized Indian bodies corporate, an appropriate Indian authority, such as the Bureau of Indian Standards, should re-issue affordable standards that are equivalent to ISO/IEC 27001. &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IV &lt;span&gt;The Press Release of 24 August 2011&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.1  The shoddy drafting of the Sensitive Personal Data Rules resulted in national and international confusion about its interpretation. However, instead of promptly correcting the embarrassingly numerous errors in the Rules, the Department of Information Technology of the Ministry of Communications and Information Technology chose to issue a press release on 24 August 2011 that was published on the website of the Press Information Bureau. The content of that press release is brought to the attention of the Committee of Subordinate Legislation as follows:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;Clarification on Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 Under Section 43A of the Information Technology ACT, 2000.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;Press Note&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;The Department of Information Technology had notified Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 under section 43A of the Information Technology Act, 2000 on 11.4.2011 vide notification no. G.S.R. 313(E).&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;These rules are regarding sensitive personal data or information and are applicable to the body corporate or any person located within India. Any such body corporate providing services relating to collection, storage, dealing or handling of sensitive personal data or information under contractual obligation with any legal entity located within or outside India is not subject to the requirement of Rules 5 &amp;amp; 6. Body corporate, providing services to the provider of information under a contractual obligation directly with them, as the case may be, however, is subject to Rules 5 &amp;amp; 6. Providers of information, as referred to in these Rules, are those natural persons who provide sensitive personal data or information to a body corporate. It is also clarified that privacy policy, as prescribed in Rule 4, relates to the body corporate and is not with respect to any particular obligation under any contract. Further, in Rule 5(1) consent includes consent given by any mode of electronic communication.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Ministry of Communications &amp;amp; Information Technology (Dept. of Information Technology) &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Press Information Bureau, Government of India, Bhadra 2, 1933, August 24, 2011&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;&lt;i&gt;SP/ska &lt;br /&gt; (Release ID :74990)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.2  It is apparent from a plain reading of the text that this press release seeks to re-interpret the application of rules 5 and 6 of the Sensitive Personal Data Rules insofar as they apply to Indian bodies corporate receiving personal information collected by another company outside India. Also, it seeks to define the term “providers of information” to address the confusion created by the repeated use this term in the Rules. Further, it re-interprets the scope and application of rule 4 relating to duty of bodies corporate to publish certain policies. Furthermore, it seeks to amend the provisions of rule 5(1) relating to manner and medium of obtaining consent prior to collecting personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.3  At the outset, it must be understood that a press release is not valid law. According to Article 13(3) of the Constitution of India,&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;...&lt;i&gt;law&lt;/i&gt; &lt;i&gt;includes any Ordinance, order, bye law, rule, regulation, notification, custom or usages having in the territory of India the force of law.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Law includes orders made in exercise of a statutory power as also orders and notifications made in exercise of a power conferred by statutory rules.&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;[See, &lt;i&gt;Edward Mills&lt;/i&gt; AIR 1955 SC 25 at pr. 12, &lt;i&gt;Babaji Kondaji Garad&lt;/i&gt; 1984 (1) SCR 767 at pp. 779-780 and &lt;i&gt;Indramani Pyarelal Gupta&lt;/i&gt; 1963 (1) SCR 721 at pp. 73-744]&lt;/p&gt;
&lt;p&gt;Sub-delegated orders, made in exercise of a power conferred by statutory rules, cannot modify the rules.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt; &lt;span&gt;[See, &lt;i&gt;Raj Narain Singh&lt;/i&gt; AIR 1954 SC 569 and &lt;i&gt;Re Delhi Laws Act&lt;/i&gt; AIR 1951 SC 332]&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;span&gt;Therefore, press releases, which are not made or issued in exercise of a delegated or sub-delegated power are not “law” and cannot modify statutory rules.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;V &lt;span&gt;Summary&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;5.1&lt;span&gt; &lt;/span&gt;CIS submits that the following provisions of the Sensitive Personal Data Rules be amended or annulled&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Rule 2(1)(b);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 2(1)(c);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 2(1)(d);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 2(1)(g);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 3;&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 4(1);&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 5(1);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 5(2);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 5(3);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 5(4);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 6(1);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 6(1) Proviso;&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 6(2);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 6(4);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 7; and&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 8.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;5.2 CIS submits that the Committee on Subordinate Legislation &lt;span&gt;should take a serious view of the press release issued by the &lt;/span&gt;&lt;span&gt;Department of Information Technology of the Ministry of Communications and Information Technology on 24 August 2011.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;5.3 CIS submits &lt;/span&gt;&lt;span&gt;that in exercise of the powers granted to the Committee on Subordinate Legislation under Rules 317 and 320 of the Lok Sabha Rules of Procedure, the provisions of the Sensitive Personal Data Rules listed in the preceding paragraph 5.1 should be annulled; and, the Committee may be pleased to consider and recommend as an alternative the amendments proposed by CIS in this submission.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;5.4 CIS thanks the Committee on Subordinate Legislation for the opportunity to present this submission and reiterates its commitment to supporting the Committee with any clarification, question or other requirement it may have.&lt;/span&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See generally, &lt;i&gt;Kharak Singh&lt;/i&gt; AIR 1963 SC 1295, &lt;i&gt;Gobind&lt;/i&gt; (1975) 2 SCC 148, &lt;i&gt;R. Rajagopal&lt;/i&gt; (1994) 6 SCC 632, &lt;i&gt;People’s Union for Civil Liberties&lt;/i&gt; (1997) 1 SCC 301 and &lt;i&gt;Canara Bank&lt;/i&gt; (2005) 1 SCC 496.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. See &lt;i&gt;infra&lt;/i&gt; pr. 4.3.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See, for comparison, Directive 95/46/EC of 24 October 1995 of the European Parliament and Council, the Data Protection Act, 1998 of the United Kingdom and the Proposed EU Regulation on on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation).&lt;/p&gt;
&lt;p class="MsoFootnoteText"&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].&lt;span&gt;See generally, &lt;i&gt;Board of Trustees of Ayurvedic College&lt;/i&gt; AIR 1962 SC 458 and &lt;i&gt;S. P. Mittal&lt;/i&gt; AIR 1983 SC 1.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;span&gt;See &lt;/span&gt;&lt;span&gt;generally, &lt;i&gt;W. O. Holdsworth&lt;/i&gt; AIR 1957 SC 887 and &lt;i&gt;Duli Chand&lt;/i&gt; AIR 1984 Del 145.&lt;/span&gt;&lt;/p&gt;
&lt;div id="_mcePaste"&gt; &lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T12:13:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011">
    <title>Comments on the Information Technology (Guidelines for Cyber Cafe) Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011</link>
    <description>
        &lt;b&gt;Bhairav Acharya on behalf of the Centre for Internet and Society submitted the following comments on the Information Technology (Guidelines for Cyber Cafe Rules), 2011.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;I  &lt;span&gt;Preliminary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.1 This submission presents preliminary clause-by-clause comments from the Centre for Internet and Society (“&lt;b&gt;CIS&lt;/b&gt;”) on the Information Technology (Guidelines for Cyber Café) Rules, 2011 that were notified by the Central Government in the Gazette of India vide Notification GSR 315(E) on 11 April 2011 (“&lt;b&gt;Cyber Café Rules&lt;/b&gt;”).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.2 This submission is for the consideration of the Committee on Subordinate Legislation of the Fifteenth Lok Sabha. In its 21&lt;sup&gt;st&lt;/sup&gt; Report, the Committee on Subordinate Legislation presciently noted that:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“…&lt;i&gt;statutory rules ought to be framed and notified not only in time but utmost care and caution should also be exercised in their formulation and finalization so as to get rid of any avoidable discrepancies. As far as possible, the aim should be to prevent needless litigation arising subsequently from badly framed rules.&lt;/i&gt;” [See the 21&lt;sup&gt;st&lt;/sup&gt; Report of the Lok Sabha Committee on Subordinate Legislation presented on 16 December 2011 at pr. 2.1]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, the Cyber Café Rules have been poorly drafted, contain several discrepancies and, more seriously, may impinge upon constitutionally guaranteed freedoms of Indian citizens. The attention of the Committee on Subordinate Legislation is accordingly called to the following provisions of the Cyber Cafe Rules:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;II  &lt;span&gt;Validity of the Cyber Cafe Rules&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.1 The Cyber Cafe Rules are made in exercise of powers granted under section 87(2)(zg) read with section 79(2) of the Information Technology Act, 2000 (&lt;b&gt;“IT Act”&lt;/b&gt;). Read together, these delegated powers invest the executive with the power to frame rules for exempting cyber cafes from liability for any third party information, data or communication link if they comply with Central Government guidelines. The empowerment made by section 87(2)(zg) of the IT Act pertains to:&lt;/p&gt;
&lt;p&gt;“&lt;i&gt;the guidelines to be observed by the intermediaries under sub-section (2) of section 79&lt;/i&gt;”&lt;/p&gt;
&lt;p&gt;Sections 79 (1) and (2) state:&lt;/p&gt;
&lt;p&gt;“&lt;b&gt;&lt;i&gt;79. Exemption from liability of intermediary in certain cases. –&lt;/i&gt;&lt;/b&gt;&lt;i&gt; (1) Notwithstanding anything contained in any law for the time being in force but subject to the provisions of sub-sections (2) and (3), an intermediary shall not be liable for &lt;span&gt;any third party information, data, or communication link made available or hosted by him&lt;/span&gt;. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(2) The provisions of sub-section (1) shall apply if— &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(a) the function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hasted; or&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(b) the intermediary does not— &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)  initiate the transmission, &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii) select the receiver of the transmission, and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iii) select or modify the information contained in the transmission; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(c) the intermediary observes due diligence while discharging his duties under this Act and also observes &lt;span&gt;such other guidelines as the Central Government may prescribe in this behalf&lt;/span&gt;.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.2 Hence, section 79(2) permits the Central Government to prescribe guidelines for cyber cafes to comply with in order to claim the general exemption from liability granted by section 79(1) of the IT Act. The Cyber Cafe Rules constitute those guidelines. However, the liability from which cyber cafes may be exempted extends only to “&lt;i&gt;any third party information, data, or communication link made available or hosted&lt;/i&gt;” by users of cyber cafes. In other words, the liability of cyber cafes (the exemption from which is supposed to be controlled by the Cyber Cafe Rules) is only in respect of the information, data or communication links of their users. No liability is assigned to cyber cafes for failing to collect identity information of their users. Therefore, the Cyber Cafe Rules made under the power granted by section 79(2)(c) of the IT Act cannot make cyber cafes liable for user identification information. In accordance with sections 79(2)(c) and 79(1) read with section 87(2)(zg) of the IT Act, the Cyber Cafe Rules may legitimately deal with the duties of cyber cafes in respect of any information, data or communication links of their users, but not in respect of user identification. However, the thrust of the Cyber Cafe Rules, and the pith of their provisions, is concerned solely with registering and identifying cyber cafe users including collecting their personal information, photographing them, storing their personal information and reporting these non-content related details to the police. There is even a foray into interior design to dictate the height limits of furniture inside cyber cafes. All of this may be a legitimate governance concern, but it cannot be undertaken by the Cyber Cafe Rules. &lt;b&gt;To the extent that the Cyber Cafe Rules deal with issues beyond those related to any information, data or communication links of cyber cafe users, the Rules exceed the permissible limit of delegated powers under section 79(2) and 87(2)(zg) of the IT Act and, consequently, are &lt;i&gt;ultra vires&lt;/i&gt; the IT Act.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III Clause-by-Clause Analysis and Comments&lt;/b&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 2 - Definitions&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.1  Rule 2(1)(c) of the Cyber Cafe Rules defines a cyber cafe in accordance with the definition provided in section 2(1)(na) of the IT Act as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;“cyber cafe” means any facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This definition of a cyber cafe is overbroad to bring within its ambit any establishment that offers internet access in the course of its business such as airports, restaurants and libraries. In addition, some State Road Transport Corporations offer wi-fi internet access on their buses; and, Indian Railways, as well as Bangalore Metro Rail Corporation Limited, plans to offer wi-fi internet access on some of its trains. These will all fall within the definition of “cyber cafe” as it is presently enacted. The definition of “cyber cafe” should be read down to only relate to commercial establishments that primarily offer internet access to the general public for a fee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that rule 2(1)(c) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“notwithstanding anything contained in clause (na) of sub-section (1) of section 2 of the Act, and for the purposes of these rules only, “cyber cafe” means, any commercial establishment which primarily offers access to the internet to members of the general public for consideration for any purpose but does not include any educational or academic institution, office or place where access to the internet is restricted to authorised persons only.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2 Rule 2(1)(e) of the Cyber Cafe Rules defines “data” in accordance with the definition provided in section 2(1)(o) of the IT Act. However, the term “data” is not used anywhere in the Cyber Cafe Rules and so its definition is redundant. This is one of several instances of careless drafting of the Cyber Cafe Rules.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that the definition of “data” in rule 2(1)(e) be deleted and the clauses in sub-rule (1) of rule 2 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.3 Rule 2(1)(g) of the Cyber Cafe Rules defines “intermediary” in accordance with the definition provided in section 2(1)(w) of the IT Act. While all cyber cafes are intermediaries, not all intermediaries are cyber cafes: there are different categories of intermediaries that are regulated by other rules under the IT Act. The Cyber Cafe Rules make no mention of any other category of intermediaries other than cyber cafes; indeed, the term “intermediary” is not used anywhere in the Cyber Cafe Rules. Its definition is therefore redundant.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that the definition of “intermediary” in rule 2(1)(g) be deleted and the clauses in sub-rule (1) of rule 2 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Rule 3 - Agency for Registration of Cyber Cafes&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;4.1 Rule 3 of the Cyber Cafe Rules, which attempts to set out a registration regime for cyber cafes, as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;b&gt;&lt;i&gt;3. Agency for registration of cyber cafe. –&lt;/i&gt;&lt;/b&gt;&lt;i&gt; (1) All cyber cafes shall be registered with a unique registration number with an agency called as registration agency as notified by the Appropriate Government in this regard. The broad terms of registration shall include: &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i) name of establishment; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii) address with contact details including email address; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iii) whether individual or partnership or sole properitership or society or company; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iv) date of incorporation; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(v) name of owner/partner/proprietor/director; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vi) whether registered or not (if yes, copy of registration with Registrar of Firms or Registrar of Companies or Societies); and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vii) type of service to be provided from cyber cafe &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Registration of cyber cafe may be followed up with a physical visit by an officer from the registration agency. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(2) The details of registration of cyber cafe shall be published on the website of the registration agency. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(3) The Appropriate Government shall make an endeavour to set up on-line registration facility to enable cyber cafe to register on-line. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(4) The detailed process of registration to be mandatorily followed by each Registration Agency notified by the Appropriate Government shall be separately notified under these rules by the central Government.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS raises two unrelated and substantial objections to this provision: &lt;span&gt;firstly&lt;/span&gt;, all cyber cafes across India are already registered under applicable local and municipal laws such as the relevant State Shops and Establishments Acts and the relevant Police Acts that provide detailed information to enable the relevant government to regulate cyber cafes; and, &lt;span&gt;secondly&lt;/span&gt;, the provisions of rule 3 create an incomplete and clumsy registration regime that does not clearly establish a procedure for registration within a definite timeframe and does not address the consequences of a denial of registration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.2  At the outset, it is important to understand the distinction between registration and licensing. The state may identify certain areas or fields of business, or certain industries, to be regulated by the conditions of a licence in the public interest. These may include shops selling alcohol or guns; or, industries such as telecommunications, mining or nuclear power. Licences for various activities are issued by the state for a limited term on the basis of need and public interest and licensees are permitted to operate only within the term and conditions of the licence. Failure to observe licence conditions can result in the cancellation of the licence and other penalties, sometimes even criminal proceedings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Registration, on the other hand, is an information-gathering activity that gives no power of intervention to the state unless there is a general violation of law. The primary statutory vehicle for achieving this registration are the various Shops and Establishments Acts of each State and Union Territory and other municipal registration regulations. For example, under section 5 of the Delhi Shops and Establishments Act, 1954, an establishment, which includes shops, commercial establishments and places of public amusement and entertainment, must fulfil the following registration requirements:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;b&gt;&lt;i&gt;5. Registration of establishment. –&lt;/i&gt;&lt;/b&gt;&lt;i&gt; (1) Within the period specified in sub-section (5), the occupier of every establishment shall send to the Chief Inspector a statement in a prescribed form, together with such fees as may be prescribed, containing &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(a) the name of the employer and the manager, if any; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(b) the postal address of the establishment; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(c) the name, if any, of the establishment, &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(d) the category of the establishment, i.e. whether it is a shop, commercial establishment, residential hotel, restaurant eating house, theatre or other place of public amusement or entertainment; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(e) the number of employees working about the business of the establishment; and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(f) such other particulars as may be prescribed. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(2) On receipt of the statement and the fees, the Chief Inspector shall, on being satisfied about the correctness of the statement, register the establishment in the Register of Establishments in such manner as may be prescribed and shall issue, in a prescribed form, a registration certificate to the occupier. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(3) The registration certificate shall be prominently displayed at the establishment and shall be renewed at such intervals as may be prescribed in this respect. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(4) In the event of any doubt or difference of opinion between an occupier and the Chief Inspector as to the category to which shall after such enquiry, as it may think proper, decide the category of each establishment and the decision thereto shall be final for the purpose of this Act. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(5) Within ninety days from the date mentioned in column 2 below in respect of the establishment mentioned in column 1, the statement together with fees shall be sent to the Chief Inspector under sub-section (1).&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides the registration regime, the Shops and Establishments Acts also enact inspection regimes to verify the accuracy of all registered information, the maintenance of labour standards and other public safety requirements. These are not addressed by the Cyber Cafe Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.3 In addition to the various Shops and Establishments Acts which prescribe registration procedures, &lt;span&gt;all premises within which cyber cafes operate are subject to a further licensing regime under the various State Police Acts&lt;/span&gt; as places of public amusement and entertainment. For example, a cyber cafe is deemed to be a “place of public amusement” under section 2(9) of the Bombay Police Act, 1951 and therefore subject to the licensing, registration and regulatory provisions of the Rules for Licensing and Controlling Places of Public (Other than Cinemas) and Performances for Public Amusement including Cabaret Performances, Discotheque, Games, Poll Game, Parlours, Amusements Parlours providing Computer Games, Virtual Reality Games, Cyber Cafes with Net Connectivity, Bowling Alleys, Cards Rooms, Social Clubs, Sports Clubs, Meals and Tamasha Rules, 1960. Similar provisions exist in Delhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In view of these two-fold registration requirements under the Shops and Establishments Acts and relevant Police Acts, creating yet another layer of registration is unwarranted. The Cyber Cafe Rules do not prescribe any new registration requirement that has not already been covered by the Shops and Establishments Acts and Police Acts. Multiple overlapping legislations will create confusion within the various departments of the relevant government and, more importantly, will result in non-compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.4 Without prejudice to the preceding comments relating to already existing registration requirements under the Shops and Establishments Acts and Police Acts, rule 3 of the Cyber Cafe Rules are very poorly drafted and do not fulfil the requirements of a valid registration regime. Most State governments have not notified a registration agency for cyber cafes as required by the Cyber Cafe Rules, probably because appropriate provisions under the Shops and Establishments Acts already exist. No time-limit has been specified for the registration process. This means that the (as yet non-existent) registration agency may delay, whether out of inefficiency or malice, a registration application without consequences for the delay. This not only discourages small and medium enterprises to hinder economic growth, it also encourages corruption as cyber cafe operators will be forced to pay a bribe to receive their registration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.5 Furthermore, rule 3(4) of the Cyber Cafe Rules, which calls on the Central Government to notify rules made by State governments, reads as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;(4) The detailed process of registration to be mandatorily followed by each Registration Agency notified by the Appropriate Government shall be separately notified under these rules by the central Government.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This nonsensical provision, which gives the Central Government the power to notify rules made by State governments, &lt;i&gt;prima facie&lt;/i&gt; violates the constitutional scheme of division of legislative powers between the Union and States. Rules that have been made by State governments, the subject matter of which is within the legislative competence of the State legislatures, are notified by those State governments for application within their States and no separate notification of these rules can be done by the Central Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that rule 3 be deleted in entirety and the remaining rules be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 4 - Identification of User&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5.1 Rule 4 of the Cyber Cafe Rules attempts to establish the identity of cyber cafe users. This is a legitimate and valid exercise to prevent unlawful use of cyber cafes. Sub-rule (1) of rule 4 reads as follows:&lt;/p&gt;
&lt;p&gt;“&lt;i&gt;(1) The Cyber Cafe shall not allow any user to use its computer resource without the identity of the user being established. The intending user may establish his identify by producing a document which shall identify the users to the satisfaction of the Cyber Cafe. Such document may include any of the following:&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)   Identity card issued by any School or College; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii)  Photo Credit Card or debit card issued by a Bank or Post Office; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iii) Passport; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iv) Voter Identity Card; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(v)  Permanent Account Number (PAN) card issued by Income-Tax Authority; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vi) Photo Identity Card issued by the employer or any Government Agency; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vi) Driving License issued by the Appropriate Government; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vii) Unique Identification (UID) Number issued by the Unique Identification Authority of India (UIDAI).&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of credits cards or debit cards to verify identity is specifically discouraged by the Reserve Bank of India because it directly results in identity theft, fraud and other financial crimes. Online credit card fraud results in large losses to individual card-holders and to banks. The other identity documents specified in rule 4 will suffice to accurately establish the identity of users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that the use of credit or debit cards as a means of establishing identity in rule 4(1)(ii) be deleted and the remaining clauses in sub-rule (1) of rule 4 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p class="DefaultCxSpFirst"&gt;5.2  Rule 4(2) of the Cyber Café Rules compels the storage of photographs and other personal information of users by cyber cafés:&lt;/p&gt;
&lt;p&gt;“&lt;i&gt;The Cyber Cafe shall keep a record of the user identification document by either storing a photocopy or a scanned copy of the document duly authenticated by the user and authorised representative of cyber cafe. Such record shall be securely maintained for a period of at least one year.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this submission does not question the requirement of storing user information for the purposes of law enforcement, this rule 4(2) does not prescribe the standards of security, confidentiality and privacy that should govern the storage of photographs and other personal information by cyber cafes. Without such a prescription, cyber cafes will simply store photographs of users, including minors and women, and important personal information that can be misused, such as passport copies, in a file with no security. This is unacceptable. Besides endangering vulnerable user information, it makes identity theft and other offences easier to perpetrate. If cyber cafes are to collect, store and disclose personal information of users, they must be bound to strict standards that explicitly recognise their duties and obligations in relation to that personal information. In this regard, the attention of the Committee on Subordinate Legislation is called to CIS’ submission regarding the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that rule 4(2) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“Any information of any user collected by a cyber cafe under this rule shall be collected, handled, stored and disclosed in accordance with the provisions of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, for a period not exceeding six months from the date of collection of that information.”&lt;/p&gt;
&lt;p&gt;5.3  Sub-rule (3) of rule 4 allows cyber cafe users to be photographed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;(3) In addition to the identity established by an user under sub-rule (1), he may be photographed by the Cyber Cafe using a web camera installed on one of the computers in the Cyber Cafe for establishing the identity of the user. Such web camera photographs, duly authenticated by the user and authorised representative of cyber cafe, shall be part of the log register which may be maintained in physical or electronic form.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the identity documents listed in rule 4(1) all contain a photograph of their owner, the need for further photography is unnecessary. This provision needlessly burdens cyber cafe owners, who will be required to store two sets of photographs of users – their photographic identity documents in addition to individual photographs, and invades the individual privacy rights of users who will be exposed to unnecessary photography by private cyber cafe operators. Granting a non-state entity the right to take photographs of other individuals to no apparent gain or purpose is avoidable, especially when no measures are prescribed to regulate the safe and lawful storage of such photographs. Without strict safety measures governing the taking and storing of photographs of users, including minor girls and women, the Cyber Cafe Rules leave open the possibility of gross misuse of these photographs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that sub-rule (3) of rule 4 be deleted and the remaining sub-rules of rule 4 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;5.4  Sub-rue (4) of rule 4 reads as follows:&lt;/p&gt;
&lt;p&gt;“&lt;i&gt;(4) A minor without photo Identity card shall be accompanied by an adult with any of the documents as required under sub-rule (1).&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regulating a minor’s access and use of the internet may serve a public good but it cannot be achieved by law. Information deemed unsuitable for minors that is available via other media, such as video, television or magazines, is not legally proscribed for minors. The law cannot and does not regulate their availability to minors. The protection of minors is an overriding public and jurisprudential concern, but law alone cannot achieve this end. Most minors do not possess photographic identity documents and rule 4(4) will, if implemented, result in internet access being taken away from minors. Restricting a minor’s ability to access useful, educational and other harmless content available on the internet is harmful to the public interest as it discourages education and awareness.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that rule 4(4) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A minor who does not possess any of the identity documents listed under sub-rule (1) of this rule may provide the name and address of his parent or guardian prior to using the cyber cafe.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5.5  Rule 4(5) of the Cyber Cafe Rules states that a user “&lt;i&gt;shall be allowed to enter the cyber cafe after he has established his identity&lt;/i&gt;.” However, since rule 4(1) already addresses identity verification by specifically preventing a cyber cafe from “&lt;i&gt;allow[ing] any user to use its computer resource without the identity of the user of the user being established&lt;/i&gt;,” this rule 4(5) is redundant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that rule 4(4) be deleted and the remaining sub-rules of rule 4 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;5.6  Rule 4(6) of the Cyber Cafe Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;(6) The Cyber cafe shall immediately report to the concerned police, if they have reasonable doubt or suspicion regarding any user.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision is legally imprecise, poorly drafted and impossible to enforce. The nature of doubt or suspicion that is necessary before contacting the police is unclear. A cyber cafe may doubt whether a customer is able to pay the bill for his internet usage, or be suspicious because of the length of a person’s beard. Requiring the police to be called because someone is doubtful is ridiculous. Furthermore, reasonableness in law is a well-established concept of rationality; it is not open to interpretation. “Reasonable doubt” is a criminal law threshold that must be reached in order to secure a conviction. Reporting requirements must be clear and unambiguous.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that rule 4(6) be deleted.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Rule 5 - Log Register&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;6.1  Rule 5(3) of the Cyber Cafe Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;(3) Cyber Cafe shall prepare a monthly report of the log register showing date- wise details on the usage of the computer resource and submit a hard and soft copy of the same to the person or agency as directed by the registration agency by the 5th day of next month.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision is akin to telephone tapping. If phone companies are not required to report the call histories of each of their users and cable television providers not required to report individual viewing preferences, there is no reason for cyber cafes to report the internet usage of users. There may be instances where public interest may be served by monitoring the internet history of specific individuals, just as it is possible to tap an individual’s telephone if it is judicially determined that such a need exists. However, in the absence of such protective provisions to safeguard individual liberties, this sub-rule (3) is grossly violative of the individual right to privacy and should be removed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that rule 5(3) be deleted and the remaining sub-rules of rule 5 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 7&lt;b&gt; - &lt;/b&gt;Inspection of Cyber Cafe&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;7.1  Rule 7 of the Cyber Cafe Rules provides for an inspection regime:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;An officer autnorised by the registration agency, is authorised to check or inspect cyber cafe and the computer resource of network established therein, at any time for the compliance of these rules. The cyber cafe owner shall provide every related document, registers and any necessary information to the inspecting officer on demand.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The corollary of a registration regime is an inspection regime. This is necessary to determine that the information provided during registration is accurate and remains updated. However, as stated in paragraphs 3.2 – 3.4 of this submission, a comprehensive and more easily enforceable registration and inspection regime already exists in the form of the various Shops and Establishments Acts in force across the country. Those provisions also provide for the consequences of an inspection, which the Cyber Cafe Rules do not.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that rule 7 be deleted.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;IV &lt;span&gt;Summary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;8.1  In sum:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Under the delegated powers contained in section 87(2)(zg) read with section 79(2) of the IT Act, the Central Government does not have the competence to make rules for identifying cyber cafe users including collecting, storing and disclosing personal information of cyber cafe users nor for prescribing the interior design of cyber cafes and, to the extent that the Rules do so, they are &lt;i&gt;ultra vires&lt;/i&gt; the parent statute;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) The attention of the Committee on Subordinate Legislation is invited to the following provisions of the Cyber Cafe Rules which require amendment or annulment:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Rule 2(1)(c);&lt;/li&gt;
&lt;li&gt;Rule 2(1)(e);&lt;/li&gt;
&lt;li&gt;Rule 2(1)(g);&lt;/li&gt;
&lt;li&gt;Rule 3(1);&lt;/li&gt;
&lt;li&gt;Rule 3(4);&lt;/li&gt;
&lt;li&gt;Rule 4(1);&lt;/li&gt;
&lt;li&gt;Rule 4(2);&lt;/li&gt;
&lt;li&gt;Rule 4(3);&lt;/li&gt;
&lt;li&gt;Rule 4(4);&lt;/li&gt;
&lt;li&gt;Rule 4(5);&lt;/li&gt;
&lt;li&gt;Rule 4(6);&lt;/li&gt;
&lt;li&gt;Rule 5(3); and&lt;/li&gt;
&lt;li&gt;Rule 7.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;(c)  The Cyber Cafe Rules are extremely poorly framed, rife with discrepancies and will give rise to litigation. They should be selectively annulled and, to prevent a repeat of the same mistakes, new rules may be framed in concert with experts, professional organisations and civil society in a democratic manner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8.2 CIS would like to conclude by taking this opportunity to present its compliments to the Committee on Subordinate Legislation and to offer the Committee any assistance or support it may require.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T12:15:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011">
    <title>Comments on the Information Technology (Electronic Service Delivery) Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011</link>
    <description>
        &lt;b&gt;Bhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Information Technology (Electronic Services Delivery) Rules, 2011. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I &lt;span&gt;&lt;span&gt;Preliminary&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.1  This submission presents comments from the Centre for Internet and Society (&lt;b&gt;“CIS”&lt;/b&gt;) on the Information Technology (Electronic Service Delivery) Rules, 2011 that were notified by the Central Government in the Gazette of India vide Notification GSR 316(E) on 11 April 2011 (&lt;b&gt;“ESD Rules”&lt;/b&gt; or &lt;b&gt;“Rules”&lt;/b&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.2  The ESD Rules were notified only eight months before the Electronic Delivery of Services Bill, 2011 was tabled in the Lok Sabha on 27 December 2011 (Bill 137 of 2011) (&lt;b&gt;“EDS Bill” &lt;/b&gt;or&lt;b&gt; “Bill”&lt;/b&gt;). Both the ESD Rules and the EDS Bill are concerned with enabling computer-based electronic delivery of government services to Indian citizens (&lt;b&gt;“electronic service delivery”&lt;/b&gt;). Both the Rules and the Bill originate from the same government department: the Department of Electronics and Information Technology of the Ministry of Communications and Information Technology. Since the EDS Bill seeks to enact a comprehensive legislative framework for mandating and enforcing electronic service delivery, the purpose of the ESD Rules are called into question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II &lt;span&gt;&lt;span&gt;Basic Issues Regarding Electronic Service Delivery&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.1  CIS believes that there are significant conceptual issues regarding electronic service delivery that demand attention. The Department-related Parliamentary Standing Committee on Information Technology of the Fifteenth Lok Sabha (&lt;b&gt;“Standing Committee”&lt;/b&gt;) raised a few concerns when it submitted its 37th Report on the EDS Bill on 29 August 2012. There is a clear need for a national debate on the manner of effecting exclusive electronic service delivery to the exclusion of manual service delivery. Some of these issues are briefly summarised as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Mandatory exclusive electronic service delivery pre-supposes the ability of all Indian citizens to easily access such mechanisms. While there are no authoritative national statistics on familiarity with computer-related technologies, it is apparent that a large majority of Indians, most of whom are likely to be already marginalised and vulnerable, are totally unfamiliar with such technologies to endanger their ability to receive basic government services;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b)  Consequent upon mandatory exclusive electronic service delivery for basic government services, a large group of ‘middlemen’ will arise to facilitate access for that majority of Indians who cannot otherwise access these services. This group will control the interface between citizens and their government. As a result, citizens’ access to governance will deteriorate. This problem may be mitigated to a certain extent by creating a new class of public servants to solely facilitate access to electronic service delivery mechanisms;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) The issue of governmental incapacity at the citizen-government interface might be addressed by contracting private service providers to operate mandatory exclusive electronic service delivery mechanisms. However, it is difficult to see how commercialising access to essential government services serves the public interest, especially when public funds will be expended to meet the costs of private service providers. Permitting private service providers to charge a fee from the general public to allow access to essential government services is also ill advised;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d)  All electronic service delivery, whether mandatory to the exclusion of other service delivery mechanisms or offered simultaneously with manual service delivery, must be accompanied by strong data protection measures to ensure the sanctity of sensitive personal information shared online with the state. At present, there are no specific laws that bind the state, or its agents, to the stringent requirements of privacy necessary to protect personal liberties. In the same vein, strong data security measures are necessary to prevent sensitive personal information from being compromised or lost;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) All electronic service delivery, whether mandatory to the exclusion of other service delivery mechanisms or offered simultaneously with manual service delivery, must ensure ease and equality of accessibility. For this reason, electronic service delivery mechanisms should conform to the National Policy on Open Standards, 2010 (or the proposed National Electronic Access Policy which is currently awaiting adoption), the Interoperability Framework for E-Governance in India and the Website Guidelines of the National Informatics Centre;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) Electronic service delivery requires infrastructure which India does not currently have but can develop. Only 1.44 per cent of India’s population has access to a broadband internet connection&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; and current daily energy demand far exceeds supply. On the other hand, the number of broadband subscribers is increasing,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; the annual installed capacity for electricity generation is growing&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; and the literacy rate is increasing.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.2  The ESD Rules do not address any of the issues raised in the preceding paragraph. As a result, they cannot be seen to represent the result of a national consensus on the crucial question of mandating exclusive electronic service delivery and the means of enforcing such a scheme. Further, very few of the provisions of the Rules are binding; instead, the Rules appear to be drafted to serve as a minimal model for electronic service delivery. &lt;b&gt;In this background, CIS believes that the Rules should be treated as an incomplete arrangement that prescribe the minimal standards necessary to bind private service providers before comprehensive and statutory electronic service delivery legislation is enacted, perhaps in the form of the EDS Bill or otherwise. &lt;/b&gt;Therefore, without prejudice to the issues raised in the preceding paragraph, CIS offers the following comments on the provisions of the Rules while reserving the opportunity to make substantive submissions on electronic service delivery in general to an appropriate forum at a later date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III &lt;span&gt;Improper Exercise of Subordinate Legislative Power&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.1  Rule 317 of the Rules of Procedure and Conduct of Business in the Lok Sabha (Fourteenth Edition, July 2010) (&lt;b&gt;“Rules of Procedure”&lt;/b&gt;), which empowers the Committee on Subordinate Legislation to scrutinise exercises of statutory delegation of legislative powers for impropriety, states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;There shall be a Committee on Subordinate Legislation to scrutinize and report to the House whether the powers to make regulations, rules, subrules, bye-laws etc., conferred by the Constitution or delegated by Parliament are being properly exercised within such delegation.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the Committee on Subordinate Legislation is specifically empowered by rule 320(vii) of the Rules of Procedure to examine any provision of the ESD Rules to consider “&lt;i&gt;whether it appears to make some unusual or unexpected use of the powers conferred by the Constitution or the Act pursuant to which it is made.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2 Accordingly, the attention of the Committee on Subordinate Legislation is called to an improper exercise of delegated power under rule 3(1) of the ESD Rules, which states:&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may on its own or through an agency authorised by it, deliver public services through electronically- enabled kiosks or any other electronic service delivery mechanism.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;This sub-rule (1) empowers both the Central Government and State Governments to provide electronic service delivery on their own.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.3 The ESD Rules are made in exercise of delegated powers conferred under section 87(2)(ca) read with section 6-A(2) of the Information Technology Act, 2000 (&lt;b&gt;“IT Act”&lt;/b&gt;). Section 87(2)(ca) of the IT Act empowers the Central Government to make rules to provide for:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;the manner in which the authorised service provider may collect, retain and appropriate service charges under sub-section (2) of section 6-A.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Section 6-A(2) of the IT Act states:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;The appropriate Government may also authorise any service provider authorised under sub-section (1) to collect, retain and appropriate such service charges, as may be prescribed by the appropriate Government for the purpose of providing such services, from the person availing such service.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prima facie&lt;/i&gt;, the delegated powers under section 87(2)(ca) read with section 6-A(2) of the IT Act, in exercise of which the ESD Rules are made, only permit delegated legislation to regulate private service providers, &lt;span&gt;they do not permit the executive to exercise these powers to empower itself to conduct electronic service delivery on its own&lt;/span&gt;.&lt;b&gt; Therefore, to the extent that the ESD Rules authorise the Central Government and State Governments to provide electronic service delivery on their own, such authorisation constitutes an improper exercise of delegated power and is &lt;i&gt;ultra vires&lt;/i&gt; the IT Act.&lt;/b&gt; This may be resolved by deriving the delegated legislative competence of the ESD Rules from section 87(1) of the IT Act, instead of section 87(2)(ca) read with section 6-A(2).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IV &lt;span&gt;Clause-by-Clause Comments&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 2 - Definitions&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;4.1.1     Rule 2(c) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"authorised agent" means an agent of the appropriate Government or service provider and includes an operator of an electronically enabled kiosk who is permitted under these rules to deliver public services to the users with the help of a computer resource or any communication device, by following the procedure specified in the rules&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In accordance with the argument regarding improper exercise of delegated power contained in paragraphs 3.1 – 3.3 of this submission, the appropriate Government cannot undertake electronic service delivery under these Rules. Consequently, the appropriate Government cannot appoint an agent to provide electronic service delivery on behalf, and under the control, of the appropriate Government since, as the principal, the appropriate Government would be responsible for the acts of its agents. Instead, private service providers may provide electronic service delivery as contractees of the appropriate Government who might enter into such contracts as a sovereign contractor. Therefore, only a private service provider may appoint an authorised agent under these Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.1.2 Therefore, it is proposed that rule 2(c) is amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;““authorised agent” means an agent of a service provider, and includes an operator of an electronically enabled kiosk, who is permitted under these rules to deliver public services with the help of a computer resource or any communication device, by following the procedure specified in these rules”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3 - &lt;span&gt;System of Electronic Service Delivery&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;4.2.1    Rule 3(3) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may determine the manner of encrypting sensitive electronic records requiring confidentiality, white they are electronically signed.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This sub-rule is supposed to prescribe stringent standards to maintain the security, confidentiality and privacy of all personal information used during electronic service delivery transactions. In the absence of transactional security, electronic service delivery will invite fraud, theft and other misuse to impugn its viability as a means of delivering public services. However, the use of the term “&lt;i&gt;may&lt;/i&gt;” leaves the prescription of security standards up to the discretion of the appropriate Government. Further, the language of the sub-rule is unclear and imprecise.&lt;/p&gt;
&lt;p&gt;4.2.2    &lt;b&gt;Therefore, it is proposed that rule 3(3) is amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“The appropriate Government shall, prior to any electronic service delivery, determine the manner of encrypting electronic records and shall prescribe standards for maintaining the safety, security, confidentiality and privacy of all information collected or used in the course of electronic service delivery.”&lt;/p&gt;
&lt;p&gt;4.3.1    Rule 3(5) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may allow receipt of payments made by adopting the Electronic Service Delivery System to be a deemed receipt of payment effected in compliance with the financial code and treasury code of such Government.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Firstly&lt;/span&gt;, if these Rules enable payments to be made electronically, they must also validate the receipt of these payments. Inviting citizens to make electronic payments for government services without recognising the receipt of those payments is farcical to attract abusive and corrupt practices. Therefore, it is imperative that these Rules compulsorily recognise receipt of payments, either by deeming their receipt to be valid receipts under existing law or by specially recognising their receipt by other means including the law of evidence. Either way, electronic receipts of electronic payments must be accorded the validity in law that manual/paper receipts have; and, copies of such electronic receipts must be capable of being adduced in evidence. &lt;span&gt;Secondly&lt;/span&gt;, the use of the phrase “&lt;i&gt;financial code and treasury code&lt;/i&gt;” is avoidable since these terms are undefined.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.3.2 Therefore, it is proposed that rule 3(5) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“Any receipt of payment made by electronic service delivery shall be deemed to be a valid receipt of such payment under applicable law and shall be capable of being adduced as evidence of such payment.”&lt;/p&gt;
&lt;p&gt;4.4.1    Rule 3(6) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may authorise service providers or their authorised agents to collect, retain and appropriate such service charges as may be specified by the appropriate Government for the purpose of providing such services from the person availing such services: &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;Provided that the apportioned service charges shall be clearly indicated on the receipt to be given to the person availing the services.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This sub-rule is an almost verbatim reproduction of the provisions of section 6-A(2) of the IT Act which reads as follows:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may also authorise any service provider authorised under sub-section (1) to collect, retain and appropriate such service charges, as may be prescribed by the appropriate Government for the purpose of providing such services, from the person availing such service.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the IT Act specifically delegates to the appropriate Governments the power to authorise service providers to levy charges, rule 3(6) of the ESD Rules that merely copies the provisions of the parent statute is meaningless. The purpose of delegated legislation is to give effect to the provisions of a statute by specifying the manner in which statutory provisions shall be implemented. Copying and pasting statutory provisions is a absurd misuse of delegated legislative powers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.4.2 Therefore, it is proposed that sub-rule (6) is deleted and the remaining sub-rules of rule 3 are renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4.5.1 Rule 3(7) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government shall by notification specify the scale of service charges which may be charged and collected by the service providers and their authorised agents for various kinds of services.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;This is an almost verbatim reproduction of the provisions of section 6-A(4) of the IT Act which reads as follows:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government shall, by notification in the Official Gazette, specify the scale of service charges which may be charged and collected by the service providers under this section.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted in paragraph 4.3.1 of this submission, the purpose of delegated legislation is not to copy the provisions of the parent statute, but to amplify the scope of the delegated power and the manner of effecting its implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.5.2  Therefore, it is proposed that sub-rule (7) is deleted and the remaining sub-rules of rule 3 are renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4.6.1 Rule 3(8) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may also determine the norms on service levels to be complied with by the Service Provider and the authorised agents.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no quarrel with the power of the government to determine norms for, or directly prescribe, service levels to regulate service providers. However, without a scheme of statutory or sub-statutory penalties for contravention of the prescribed service levels, a sub-delegated service level cannot enforce any penalties. Simply put, &lt;span&gt;the state cannot enforce penalties unless authorised by law&lt;/span&gt;. Unfortunately, rule 3(8) contains no such authorisation. Service levels for service providers without a regime of penalties for non-compliance is meaningless, especially since service providers will be engaged in providing access to essential government services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.6.2  Therefore, it is proposed that rule 3(8) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“The appropriate Government shall prescribe service levels to be complied with by all service providers and their authorised agents which shall include penalties for failure to comply with such service levels.”&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Thirty-Seventh Report of the Standing Committee on Information Technology (2011-12) on the Electronic Delivery of Services Bill, 2011 (New Delhi: Lok Sabha Secretariat, 29 August 2012) at pp. 13, 17 and 34. See also, &lt;i&gt;Telecom Sector in India: A Decadal Profile&lt;/i&gt; (New Delhi: Telecom Regulatory Authority of India, 8 June 2012).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Annual Report (2011-12) of the Department of Telecommunications, Ministry of Communications and Information Technology, Government of India (New Delhi: Department of Telecommunications, 2012) at pp. 5 and 1-3.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Report of the Working Group on Power of the Twelfth Plan (New Delhi: Planning Commission, Government of India, January 2012).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Provisional Report of the Census of India 2011 (New Delhi: Registrar General and Census Commissioner, 2011) from p. 124.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011'&gt;https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T12:12:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/vipul-kharbanda-february-25-2019-comments-on-draft-second-protocol-to-convention-on-cybercrime-budapest-convention">
    <title>Comments on the Draft Second Protocol to the Convention on Cybercrime (Budapest Convention) </title>
    <link>https://cis-india.org/internet-governance/blog/vipul-kharbanda-february-25-2019-comments-on-draft-second-protocol-to-convention-on-cybercrime-budapest-convention</link>
    <description>
        &lt;b&gt;Following consultations with data protection, civil society, industry and others, during the Cybercrime Convention Committee (T-CY) meeting from 29 November 2018 onwards, the Cybercrime Convention Committee has sought additional contributions regarding the provisional draft text for a Second Additional Protocol to the Budapest Convention on Cybercrime (“Budapest Convention”).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Centre for Internet and Society, (“CIS”), is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, and open access), internet governance, telecommunication reform, digital privacy, artificial intelligence, freedom of expression, and cyber-security. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the rights of stakeholders. CIS is thankful to the Cybercrime Convention Committee for this opportunity to provide feedback to the Draft.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft text addresses three issues viz. language of requests, emergency multilateral cooperation and taking statements through video conferencing. Click to download the &lt;a href="https://cis-india.org/internet-governance/comments-on-the-draft-second-protocol-to-the-convention-on-cybercrime-budapest-convention" class="internal-link"&gt;entire submission here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/vipul-kharbanda-february-25-2019-comments-on-draft-second-protocol-to-convention-on-cybercrime-budapest-convention'&gt;https://cis-india.org/internet-governance/blog/vipul-kharbanda-february-25-2019-comments-on-draft-second-protocol-to-convention-on-cybercrime-budapest-convention&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-02-25T16:48:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10">
    <title>Comments on the Draft Outcome Document of the UN General Assembly’s Overall Review of the Implementation of WSIS Outcomes (WSIS+10)</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10</link>
    <description>
        &lt;b&gt;Following the comment-period on the Zero Draft, the Draft Outcome Document of the UN General Assembly's Overall Review of implementation of WSIS Outcomes was released on 4 November 2015. Comments were sought on the Draft Outcome Document from diverse stakeholders. The Centre for Internet &amp; Society's response to the call for comments is below.&lt;/b&gt;
        &lt;p class="Normal1" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="Normal1" style="text-align: justify; "&gt;The WSIS+10 Overall Review of the Implementation of WSIS Outcomes, scheduled for December 2015, comes as a review of the WSIS process initiated in 2003-05. At the December summit of the UN General Assembly, the WSIS vision and mandate of the IGF are to be discussed. The Draft Outcome Document, released on 4 November 2015, is towards an outcome document for the summit. Comments were sought on the Draft Outcome Document. Our comments are below.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The Draft Outcome Document of the UN General Assembly’s Overall Review of the Implementation of WSIS Outcomes (“&lt;i&gt;the current Draft&lt;/i&gt;”) stands considerably altered from the Zero Draft. With references to development-related challenges, the Zero Draft covered areas of growth and challenges of the WSIS. It noted the persisting digital divide, the importance of innovation and investment, and of conducive legal and regulatory environments, and the inadequacy of financial mechanisms. Issues crucial to Internet governance such as net neutrality, privacy and the mandate of the IGF found mention in the Zero Draft.&lt;/li&gt;
&lt;li&gt;The current Draft retains these, and adds to them. Some previously-omitted issues such as surveillance, the centrality of human rights and the intricate relationship of ICTs to the Sustainable Development Goals, now stand incorporated in the current Draft. This is most commendable. However, the current Draft still lacks teeth with regard to some of these issues, and fails to address several others. &lt;/li&gt;
&lt;li&gt;In our comments to the Zero Draft, CIS had called for these issues to be addressed. We reiterate our call in the following paragraphs.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;strong&gt;(1) &lt;/strong&gt;&lt;strong&gt;ICT for Development&lt;/strong&gt;&lt;/h2&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;In the current Draft, paragraphs 14-36 deal with ICTs for development. While the draft contains rubrics like ‘Bridging the digital divide’, ‘Enabling environment’, and ‘Financial mechanisms’, the following issues are unaddressed:&lt;/li&gt;
&lt;li&gt;Equitable development for all;&lt;/li&gt;
&lt;li&gt;Accessibility to ICTs for persons with disabilities;&lt;/li&gt;
&lt;li&gt;Access to knowledge and open data.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Equitable development&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;In the &lt;a class="external-link" href="http://www.itu.int/net/wsis/docs/geneva/official/dop.html"&gt;Geneva Declaration of Principles&lt;/a&gt; (2003), two goals are set forth as the Declaration’s “ambitious goal”: (a) the bridging of the digital divide; and (b) equitable development for all (¶ 17). The current Draft speaks in detail about the bridging of the digital divide, but the goal of equitable development is conspicuously absent. At WSIS+10, when the WSIS vision evolves to the creation of inclusive ‘knowledge societies’, equitable development should be both a key principle and a goal to stand by.&lt;/li&gt;
&lt;li&gt;Indeed, inequitable development underscores the persistence of the digital divide. The current Draft itself refers to several instances of inequitable development; for ex., the uneven production capabilities and deployment of ICT infrastructure and technology in developing countries, landlocked countries, small island developing states, countries under occupation or suffering natural disasters, and other vulnerable states; lack of adequate financial mechanisms in vulnerable parts of the world; variably affordable (or in many cases, unaffordable) spread of ICT devices, technology and connectivity, etc. &lt;/li&gt;
&lt;li&gt;What underscores these challenges is the inequitable and uneven spread of ICTs across states and communities, including in their production, capacity-building, technology transfers, gender-concentrated adoption of technology, and inclusiveness. &lt;/li&gt;
&lt;li&gt;As such, it is essential that the WSIS+10 Draft Outcome Document reaffirm our commitment to equitable development for all peoples, communities and states.&lt;/li&gt;
&lt;li&gt;We suggest the following inclusion to &lt;strong&gt;paragraph 5 of the current Draft&lt;/strong&gt;:&lt;/li&gt;
&lt;/ol&gt; 
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;&lt;span style="text-align: justify; "&gt;“5. We reaffirm our common desire and commitment to the WSIS vision to build &lt;/span&gt;&lt;i style="text-align: justify; "&gt;&lt;span&gt;an equitable,&lt;/span&gt;&lt;/i&gt;&lt;span style="text-align: justify; "&gt; people-centred, inclusive, and development-oriented Information Society…”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Accessibility for persons with disabilities&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;10. Paragraph 13 of the Geneva Declaration of Principles (2003) pledges to “pay particular attention to the special needs of marginalized and vulnerable groups of society” in the forging of an Information Society. Particularly, ¶ 13 recognises the special needs of older persons and persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;11. Moreover, ¶ 31 of the Geneva Declaration of Principles calls for the special needs of persons with disabilities, and also of disadvantaged and vulnerable groups, to be taken into account while promoting the use of ICTs for capacity-building. Accessibility for persons with disabilities is thus core to bridging the digital divide – as important as bridging the gender divide in access to ICTs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;12. Not only this, but the &lt;a class="external-link" href="http://www.itu.int/net/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;WSIS+10 Statement on the Implementation of WSIS Outcomes&lt;/a&gt; (June 2014) also reaffirms the commitment to “provide equitable access to information and knowledge for all… including… people with disabilities”, recognizing that it is “crucial to increase the participation of vulnerable people in the building process of Information Society…” (¶8).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;13. In our previous submission, CIS had suggested language drawing attention to this. Now, the current Draft only acknowledges that “particular attention should be paid to the specific ICT challenges facing… persons with disabilities…” (paragraph 11). It acknowledges also that now, accessibility for persons with disabilities constitutes one of the core elements of quality (paragraph 22). However, there is a glaring omission of a call to action, or a reaffirmation of our commitment to bridging the divide experienced by persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;14. We suggest, therefore, the addition of the following language the addition of &lt;strong&gt;paragraph 24A to the current Draft&lt;/strong&gt;. Sections of this suggestion are drawn from ¶8, WSIS+10 Statement on the Implementation of WSIS Outcomes.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"24A. &lt;span style="text-align: justify; "&gt;Recalling the UN Convention on the rights of people with disabilities, the Geneva principles paragraph 11, 13, 14 and 15, Tunis Commitment paras 20, 22 and 24, and reaffirming the commitment to providing equitable access to information and knowledge for all, building ICT capacity for all and confidence in the use of ICTs by all, including youth, older persons, women, indigenous and nomadic peoples, people with disabilities, the unemployed, the poor, migrants, refugees and internally displaced people and remote and rural communities, it is crucial to increase the participation of vulnerable people in the building process of information Society and to make their voice heard by stakeholders and policy-makers at different levels. It can allow the most fragile groups of citizens worldwide to become an integrated part of their economies and also raise awareness of the target actors on the existing ICTs solution (such as tolls as e- participation, e-government, e-learning applications, etc.) designed to make their everyday life better. We recognise need for continued extension of access for people with disabilities and vulnerable people to ICTs, especially in developing countries and among marginalized communities, and reaffirm our commitment to promoting and ensuring accessibility for persons with disabilities. In particular, we call upon all stakeholders to honour and meet the targets set out in Target 2.5.B of the Connect 2020 Agenda that enabling environments ensuring accessible telecommunication/ICT for persons with disabilities should be established in all countries by 2020.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Access to knowledge and open data&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;15. The Geneva Declaration of Principles dedicates a section to access to information and knowledge (B.3). It notes, in ¶26, that a “rich public domain” is essential to the growth of Information Society. It urges that public institutions be strengthened to ensure free and equitable access to information (¶26), and also that assistive technologies and universal design can remove barriers to access to information and knowledge (¶25). Particularly, the Geneva Declaration advocates the use of free and open source software, in addition to proprietary software, to meet these ends (¶27).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;16. It was also recognized in the WSIS+10 Statement on the Implementation of WSIS Outcomes (‘Challenges-during implementation of Action Lines and new challenges that have emerged’) that there is a need to promote access to all information and knowledge, and to encourage open access to publications and information (C, ¶¶9 and 12).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;17. In our previous submission, CIS had highlighted the importance of open access to knowledge thus: “…the implications of open access to data and knowledge (including open government data), and responsible collection and dissemination of data are much larger in light of the importance of ICTs in today’s world. As Para 7 of the Zero Draft indicates, ICTs are now becoming an indicator of development itself, as well as being a key facilitator for achieving other developmental goals. As Para 56 of the Zero Draft recognizes, in order to measure the impact of ICTs on the ground – undoubtedly within the mandate of WSIS – it is necessary that there be an enabling environment to collect and analyse reliable data. Efforts towards the same have already been undertaken by the United Nations in the form of ‘Data Revolution for Sustainable Development’. In this light, the Zero Draft rightly calls for enhancement of regional, national and local capacity to collect and conduct analyses of development and ICT statistics (Para 56). Achieving the central goals of the WSIS process requires that such data is collected and disseminated under open standards and open licenses, leading to creation of global open data on the ICT indicators concerned.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;18. This crucial element is missing from the current Draft of the WSIS+10 Outcome Document. Of course, the current Draft notes the importance of access to information and free flow of data. But it stops short of endorsing and advocating the importance of access to knowledge and free and open source software, which are essential to fostering competition and innovation, diversity of consumer/ user choice and ensuring universal access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;19. We suggest the following addition – of &lt;strong&gt;paragraph 23A to the current Draft&lt;/strong&gt;:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"23A. &lt;span style="text-align: justify; "&gt;We recognize the need to promote access for all to information and knowledge, open data, and open, affordable, and reliable technologies and services, while respecting individual privacy, and to encourage open access to publications and information, including scientific information and in the research sector, and particularly in developing and least developed countries.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;strong&gt;(2) &lt;/strong&gt;&lt;strong&gt;Human Rights in Information Society&lt;/strong&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;20. The current Draft recognizes that human rights have been central to the WSIS vision, and reaffirms that rights offline must be protected online as well. However, the current Draft omits to recognise the role played by corporations and intermediaries in facilitating access to and use of the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;21. In our previous submission, CIS had noted that “the Internet is led largely by the private sector in the development and distribution of devices, protocols and content-platforms, corporations play a major role in facilitating – and sometimes, in restricting – human rights online”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;22. We reiterate our suggestion for the inclusion of &lt;strong&gt;paragraph 43A to the current Draft&lt;/strong&gt;:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"43A. &lt;span style="text-align: justify; "&gt;We recognize the critical role played by corporations and the private sector in facilitating human rights online. We affirm, in this regard, the responsibilities of the private sector set out in the Report of the Special Representative of the Secretary General on the issue of human rights and transnational corporations and other business enterprises, A/HRC/17/31 (21 March 2011), and encourage policies and commitments towards respect and remedies for human rights.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;strong&gt;(3) &lt;/strong&gt;&lt;strong&gt;Internet&lt;/strong&gt; &lt;strong&gt;Governance&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;The support for multilateral governance of the Internet&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;23. While the section on Internet governance is not considerably altered from the zero draft, there is a large substantive change in the current Draft. The current Draft states that the governance of the Internet should be “multilateral, transparent and democratic, with full involvement of all stakeholders” (¶50). Previously, the zero draft recognized the “the general agreement that the governance of the Internet should be open, inclusive, and transparent”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;24. A return to purely ‘multilateral’ Internet governance would be regressive. Governments are, without doubt, crucial in Internet governance. As scholarship and experience have both shown, governments have played a substantial role in shaping the Internet as it is today: whether this concerns the availability of content, spread of infrastructure, licensing and regulation, etc. However, these were and continue to remain contentious spaces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;25. As such, it is essential to recognize that a plurality of governance models serve the Internet, in which the private sector, civil society, the technical community and academia play important roles. &lt;strong&gt;We recommend returning to the language of the zero draft in ¶32: “open, inclusive and transparent governance of the Internet”.&lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Governance of Critical Internet Resources&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;26. It is curious that the section on Internet governance&lt;strong&gt; &lt;/strong&gt;in both the zero and the current Draft makes no reference to ICANN, and in particular, to the ongoing transition of IANA stewardship and the discussions surrounding the accountability of ICANN and the IANA operator. The stewardship of critical Internet resources, such as the root, is crucial to the evolution and functioning of the Internet. Today, ICANN and a few other institutions have a monopoly over the management and policy-formulation of several critical Internet resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;27. While the WSIS in 2003-05 considered this a troubling issue, this focus seems to have shifted entirely. Open, inclusive, transparent and &lt;i&gt;global&lt;/i&gt; Internet are misnomer-principles when ICANN – and in effect, the United States – continues to have monopoly over critical Internet resources. The allocation and administration of these resources should be decentralized and distributed, and should not be within the disproportionate control of any one jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;28. Therefore, we reiterate our suggestion to add &lt;strong&gt;&lt;span&gt;paragraph 53A&lt;/span&gt;&lt;/strong&gt; after Para 53:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"53A. &lt;span style="text-align: justify; "&gt;We affirm that the allocation, administration and policy involving critical Internet resources must be inclusive and decentralized, and call upon all stakeholders and in particular, states and organizations responsible for essential tasks associated with the Internet, to take immediate measures to create an environment that facilitates this development.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Inclusiveness and Diversity in Internet Governance&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;29. The current Draft, in ¶52, recognizes that there is a need to “promote greater participation and engagement in Internet governance of all stakeholders…”, and calls for “stable, transparent and voluntary funding mechanisms to this end.” This is most commendable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30. The issue of inclusiveness and diversity in Internet governance is crucial: today, Internet governance organisations and platforms suffer from a lack of inclusiveness and diversity, extending across representation, participation and operations of these organisations. As CIS submitted previously, the mention of inclusiveness and diversity becomes tokenism or formal (but not operational) principle in many cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;31. As we submitted before, the developing world is pitifully represented in standards organisations and in ICANN, and policy discussions in organisations like ISOC occur largely in cities like Geneva and New York. For ex., 307 out of 672 registries listed in ICANN’s registry directory are based in the United States, while 624 of the 1010 ICANN-accredited registrars are US-based.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;32. Not only this, but 80% of the responses received by ICANN during the ICG’s call for proposals were male. A truly global and open, inclusive and transparent governance of the Internet must not be so skewed. Representation must include not only those from developing countries, but must also extend across gender and communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;33. We propose, therefore, the addition of a &lt;strong&gt;&lt;span&gt;paragraph 51A&lt;/span&gt;&lt;/strong&gt; after Para 51:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"51A. &lt;span style="text-align: justify; "&gt;We draw attention to the challenges surrounding diversity and inclusiveness in organisations involved in Internet governance, including in their representation, participation and operations. We note with concern that the representation of developing countries, of women, persons with disabilities and other vulnerable groups, is far from equitable and adequate. We call upon organisations involved in Internet governance to take immediate measures to ensure diversity and inclusiveness in a substantive manner.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;Prepared by Geetha Hariharan, with inputs from Sunil Abraham and Japreet Grewal. All comments submitted towards the Draft Outcome Document may be found &lt;a class="external-link" href="http://unpan3.un.org/wsis10/Preparatory-Process-Roadmap/Comments-on-Draft-Outcome-Document"&gt;at this link&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICT4D</dc:subject>
    
    
        <dc:subject>Call for Comments</dc:subject>
    
    
        <dc:subject>WSIS+10</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Open Source</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2015-11-18T06:33:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-draft-national-policy-on-software-products">
    <title>Comments on the Draft National Policy on Software Products</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-draft-national-policy-on-software-products</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society submitted public comments to the Department of Electronics &amp; Information Technology (DeitY), Ministry of Information &amp; Communications Technology, Govt. of India on the National Policy of Software
Products on December 9, 2016. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;I. Preliminary&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;1.&lt;/strong&gt; This submission presents comments by the Centre for Internet and Society, India (“​&lt;strong&gt;CIS&lt;/strong&gt;​”) on the ​Draft National Policy on Software Products &lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt; (“​&lt;strong&gt;draft policy&lt;/strong&gt;”),​ released by the Ministry of Electronics &amp;amp; Information Technology (“&lt;strong&gt;MeitY&lt;/strong&gt;​ ​”).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;2.&lt;/strong&gt; CIS commends MeitY on its initiative to present a draft policy, and is thankful for the opportunity to put forth its views in this public consultation period.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;3.&lt;/strong&gt; This submission is divided into three main parts. The first part, ‘Preliminary’, introduces the document; the second part, ‘About CIS’, is an overview of the organization; and, the third part contains the comments by CIS on the Draft National Policy on Software Products.&lt;/p&gt;
&lt;h2&gt;II. About CIS&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;4.&lt;/strong&gt; CIS is a non-​profit organisation &lt;a name="fr2" href="#fn2"&gt;[2]&lt;/a&gt; that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, freedom of speech and expression, intermediary liability, digital privacy, and cyber​ security.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;5.&lt;/strong&gt; CIS values the fundamental principles of justice, equality, freedom and economic development. This submission is consistent with CIS' commitment to these values, the safeguarding of general public interest and the protection of India's national interest at the international level. Accordingly, the comments in this submission aim to further these principles.&lt;/p&gt;
&lt;h2&gt;III. Comments on the Draft National Policy on Software Products&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;General Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;6.&lt;/strong&gt; CIS commends MeitY on its initiative to develop a consolidated National Policy on Software Products. We believe that there are certain salient points in the draft policy that deserve particular appreciation for being in the interest of all stakeholders, especially the public. An indicative list of such points include:&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;&lt;li&gt;A focus on aiding digital inclusion via software, especially in the fields of finance, education and healthcare.&lt;/li&gt;
&lt;li&gt;The recognition of the need for openness and application of open data principles in the private and public sector. Identifying the need for diversification of the information technology sector into regions outside the developed cities in India.&lt;/li&gt;
&lt;li&gt;Identifying the need for innovation and original research in emerging fields such as Internet of Things and Big Data.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;7.&lt;/strong&gt; We observe that the draft policy weighs in the favour of creating a thriving digital economy, which indeed is a commendable objective per se. However, there are certain aspects which remain to be addressed by the draft policy, to ensure that the growth of our domestic software industry truly achieves the vision set out in Digital India for better delivery of government services and maximisation of the public interest.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;8.&lt;/strong&gt; We submit that the proposed policy should include certain additional guiding principles to direct creation of software and its end-utilisation. These principles would ensure responsible, inclusive, judicious and secure software product life cycle by all the relevant stakeholders, including the industry, the government and especially the public. An indicative list of such principles that we believe should be explicitly included in the policy are:&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;&lt;li&gt;Ensuring that internationally accepted principles of privacy are followed in software development and utilisation, including public awareness.&lt;/li&gt;
&lt;li&gt;Requiring basic yet sufficient standards of information security to ensure protection of user data at all stages of the software product life cycle.&lt;/li&gt;
&lt;li&gt;Enforcing lingual diversity in software to allow for India’s diverse population to operate indigenous software in an inclusive manner.&lt;/li&gt;
&lt;li&gt;Mandating minimum standards on accessibility in software creation, procurement and implementation to ensure sustainable use by the differently-abled.&lt;/li&gt;
&lt;li&gt;Focusing on transparency &amp;amp; accountability in software procurement for all public funded projects.&lt;/li&gt;
&lt;li&gt;Implementing the utilisation of Free and Open Source Software (“​&lt;strong&gt;FOSS&lt;/strong&gt;​”) in the execution of public funded projects as per the mandate of the Policy on Adoption of Open Source Software for Government of India; thereby incentivising the creation of FOSS for use in both private and public sector.&lt;/li&gt;
&lt;li&gt;For software to be truly inclusive of the goals of Digital India, it is essential that to provide supports to Indic languages and scripts without yielding an inferior experience or results for the end user in non-English interfaces. Software already deployed should be translated and localised.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;9.&lt;/strong&gt; The inclusion of these principles in substantive clauses of the policy will go a long way in ensuring the sustainable and transparent growth of domestic software product ecosystem.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Specific Comments&lt;/strong&gt;&lt;/h3&gt;
&lt;h4&gt;&lt;strong&gt;10.&lt;/strong&gt; Development of a robust Electronic Payment Infrastructure&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;10.1.&lt;/strong&gt; CIS observes that clauses 5.4 and 6.7 of the draft policy aim to establish a seamless electronic payment infrastructure. We submit that an electronic payment infrastructure should be designed with strong standards of information security, privacy and inclusivity (both accessibility and lingual).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;10.2.&lt;/strong&gt; We recommend that the policy mandate minimum standards of information security, privacy and inclusivity in all payment systems across private and public sectors. The policy should, therefore, ideally specify the respective standards for these categories, for instance ISO 27001 and National Policy on Universal Electronics Accessibility &lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt;, alongside other industry standards for Electronic Payment Infrastructure.&lt;/p&gt;
&lt;h4&gt;11. Government Procurement&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;11.1.&lt;/strong&gt; CIS observes that clause 6.1 of the draft policy seeks to develop a framework for inclusion of Indian software in government procurement. It is commendable that the draft policy identifies the need for a better framework. CIS notes that the existing procurement procedure allows for usage of Indian software. In fact, the Government e-Marketplace(eGM) already has begun to incorporate some of these principles in general procurement.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;11.2.&lt;/strong&gt; Indeed, the presence of a transparent and accountable government procurement, which leverages technology and the internet, is key to ensuring a sustainable and fair market. CIS recommends that the policy refer to these guiding principles to enable the development of a viable cache of Indian software products by creating more avenues, including government procurement.&lt;/p&gt;
&lt;h4&gt;12. Incentives for Digital India oriented software&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;12.1.&lt;/strong&gt; CIS observes that clause 6.3 of the draft policy incentivises the creation of software addressing the action pillars of the commendable Digital India programme.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;12.2.&lt;/strong&gt; For development of superior quality software which will ensure excellent success of the Digital India programme, CIS recommends that the incentives should be provided ​&lt;em&gt;contingent &lt;/em&gt;to the incorporation of certain minimum standards of software development. Such products and services should, ​&lt;em&gt;inter alia&lt;/em&gt;, adhere to the stipulations under National Policy on Universal Electronics Accessibility, the Guidelines for Indian Government Websites, Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011, etc. In the process, the software should be subjected to reviews by a neutral entity to gauge the compliance with the abovementioned minimum standards.&lt;/p&gt;
&lt;h4&gt;13. Increasing adoption of Open APIs and Open Data&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;13.1.&lt;/strong&gt; CIS observes that clause 6.6 of the draft policy promotes the use of open APIs and open data in development of e-government services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;13.2.&lt;/strong&gt; We strongly recommend that open APIs and open data principles be adopted by software used in all government organizations, and non-commercial software . Open Data and Open APIs can serve a vital role in ensuring transparent, accountable and efficient governance, which can be leveraged in a major way within the policy by the public and civil society.&lt;/p&gt;
&lt;h4&gt;14. Creation of Enabling Environment for Innovation, R&amp;amp;D, and IP Creation and Protection&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;14.1.&lt;/strong&gt; CIS observes that clause 8.1 of the draft policy seeks to create an enabling environment for innovation, R&amp;amp;D, and IP creation and protection.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;14.2.&lt;/strong&gt; CIS submits that the existing TRIPS-compliant Indian intellectual property law regime is adequately designed to incentivise creativity and innovation in the area of software development. The Indian Patents Act, 1970 read with the Guidelines for Examination of Computer Related Inventions, 2016 do not permit the patenting of ​&lt;em&gt;computer programmes per se&lt;/em&gt;. Several Indian software developers, notably small and medium sized development companies have made evidence-based submissions to the government previously on the negative impact of software patenting on software innovation &lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;14.3.&lt;/strong&gt; CIS recommends that the proposed policy re-affirm the adequacy of the Indian intellectual property regime to protect software development, in compliance with the TRIPS Agreement.&lt;/p&gt;
&lt;h2&gt;IV. Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;15.&lt;/strong&gt; CIS commends the MeitY on the development of the draft policy. We strongly urge MeitY to address the issues highlighted above, especially emphasising the incorporation of essential principles such as information security, privacy, accessibility, etc. Adoption of such measures will ensure a fair balance between commercial growth of domestic software industry and the maximisation of public interest.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;]. National Policy on Software Products (2016, Draft internal v1. 15) available at &lt;a class="external-link" href="http://meity.gov.in/sites/upload_files/dit/files/National%20Policy%20on%20Software%20Products.pdf"&gt;http://meity.gov.in/sites/upload_files/dit/files/National%20Policy%20on%20Software%20Products.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://meity.gov.in/sites/upload_files/dit/files/National%20Policy%20on%20Software%20Products.pdf"&gt;[&lt;/a&gt;&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;]. See The Centre for Internet and Society, available at &lt;a class="external-link" href="http://cis- india.org"&gt;http://cis- india.org&lt;/a&gt; for details of the organization,and our work.&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;]. See &lt;a class="external-link" href="http://meity.gov.in/sites/upload_files/dit/files/Accessible-format-National%20Policy%20on%20Universal%20Electronics.pdf"&gt;http://meity.gov.in/sites/upload_files/dit/files/Accessible-format-National%20Policy%20on%20Universal%20Electronics.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;]. See &lt;a class="external-link" href="http://economictimes.indiatimes.com/articleshow/52159304.cms?utm_source=contentofinterest&amp;amp;amp;utm_me%20dium=text&amp;amp;amp;utm_campaign=cppst"&gt;http://economictimes.indiatimes.com/articleshow/52159304.cms?utm_source=contentofinterest&amp;amp;utm_me  dium=text&amp;amp;utm_campaign=cppst&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-draft-national-policy-on-software-products'&gt;https://cis-india.org/internet-governance/blog/comments-on-draft-national-policy-on-software-products&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anubha Sinha, Rohini Lakshané, and Udbhav Tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>National Software Policy</dc:subject>
    
    
        <dc:subject>Open Source</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2016-12-12T14:45:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-draft-national-policy-on-official-statistics">
    <title>Comments on the Draft National Policy on Official Statistics</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-draft-national-policy-on-official-statistics</link>
    <description>
        &lt;b&gt;This submission presents comments by the Centre for Internet &amp; Society, India (“CIS”) on the Draft National Policy on Official Statistics which was released to the public by the Ministry of Statistics and Programme Implementation on 17th May 2018 for comments and views.&lt;/b&gt;
        &lt;p&gt;Edited by Swaraj Barooah. Download a PDF of the submission &lt;a class="external-link" href="http://cis-india.org/internet-governance/files/comments-on-draft-national-policy-on-official-statistics"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Preliminary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;CIS appreciates the Government’s efforts in realising the importance of the need for high quality statistical information enshrined in the Fundamental Principles of Official Statistics as adopted by the UN General Assembly in January 2014. CIS is grateful for the opportunity to put forth its views on the draft policy. This submission was made on 31st May, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, this submission highlights some general defects in the draft policy: there is lack of principles guiding data dissemination policies; there are virtually no positive mandates set for Government bodies for secure storage and transmission of data; and while privacy is mentioned as a concern, it has been overlooked in designing the principles of the implementation of surveys. Then, this submission puts forward specific comments suggesting improvements to various sections in the draft policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS would also like to point out the short timeline between the publication of the &lt;a class="external-link" href="http://mospi.gov.in/announcements/suggestions-invited-draft-national-policy-official-statistics"&gt;draft policy&lt;/a&gt; (18th May, 2018), and the deadline set for the stakeholders to submit their comments (31st May, 2018). Considering that the policy has widespread implications for all Ministries, citizens, and State legislation rights (proposed changes include a Constitutional Amendment), it is necessary that such call-for-comments are publicised widely, and enough time is given to the public so that the Government can receive well-researched comments.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;General Comments&lt;/h2&gt;
&lt;h3&gt;Data dissemination&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For data dissemination, the draft policy does not stress upon a general principle or set of principles, and often disregards principles specified in the Fundamental Principles of Official Statistics, which are the very principles the Government intends to draw its policies on official statistics from. Rather it relies on context-specific provisions that fail to summarise and articulate a general philosophy for the dissemination of official statistics, and fails to practically embody some stated goals. The first principle on Official Statistics, as realised by the United Nations General Assembly, clearly states that: “[...] official  statistics  that  meet  the  test  of  practical utility  are  to  be  compiled  and  made  available  on  an  impartial  basis  by  official statistical agencies to honour citizens’ entitlement to &lt;a class="external-link" href="https://unstats.un.org/unsd/dnss/gp/FP-New-E.pdf"&gt;public information&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Let us compare this with Section 5.1.7 (9) of the draft policy, which refers to policies regarding core statistics: it mentions a data “warehouse” to be maintained by the NSO which should be accessible to private and public bodies. While this does point towards an open data policy, such a vision has not been articulated in any part thereof.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft policy, at the outset, should have general guiding principles of publishing data openly and freely (once it meets the utility test, and it has been ensured that individual privacy will not be violated by the publishing of such statistics). This should serve well to inform further regulations and related policies governing the use and publishing of statistics, like the &lt;a class="external-link" href="https://cis-india.org/internet-governance/comments-on-the-statistical-disclosure-control-report"&gt;Statistical Disclosure Control Report&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A general commitment to a well-articulated policy on data dissemination will ensure easy-to-follow principles for the various Ministries that will refer to the document. The additional principles that come with open data principles should also be described by the policy document: a commitment to publishing data in a machine-readable format, making it available in multiple data formats (.txt, .csv, etc.), and including its metadata.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data storage and usage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the absence of a regime for data protection, it is absolutely necessary that a national policy on statistics provide positive mandates for the encryption of all digitally-stored personal and sensitive information collected through surveys. Even though the current draft of the policy mentions the need to protect confidential information, it sets no mandatory requirements on the Government to ensure the security of such information, especially on digital platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, all transmission of potentially sensitive information should be done with the digital signatures of the employee/Department/Ministry authorising said transmission. This will ensure the integrity and authenticity of the information, and provide with an auditable trail of the information flowing between entities in the various bodies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is appreciable that Section 5.7.9 of the draft policy notes, “[a]ll statistical surveys represent a degree of privacy invasion, which is justified by the need for an alternative public good, namely information.” However, all statistical surveys may not be proportionate in their invasiveness, even if they might serve a legitimate public goal in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft policy does not address how privacy concerns can be taken into account while designing the survey itself. A necessary outcome of the realisation of the possible privacy violations that may arise due to surveys is that all data collection be “minimally intrusive”, the data be securely stored (see previous comment section, ‘Data storage and usage’), and the surveyed users have control over the data even after they have parted with their information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the policy deals extensively with the implementation of surveys, the following should details should be clearly laid out in the policy:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The extent to which an individual has control over the data they have provided to the surveying agency.&lt;/li&gt;
&lt;li&gt;The means of redressal available to an individual who feels that his/her privacy has been violated through the publication of certain statistical information&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Specific Comments&lt;/h2&gt;
&lt;p&gt;Section 5.1: Dichotomising official statistics as core statistics and other official statistics&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reasons for dichotomising official statistics has not been appropriately substantiated with evidence, considering the wide implications of policy proposals that arise from the definition of “core statistics.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Firstly, the descriptions of what constitutes “core statistics” casts too wide a net by only having a single vague qualitative criterion, i.e. “national importance.” All the other characteristics of the “core statistics” are either recommendations or requirements as to how the data will be handled and thus, pose no filter to what can constitute “core statistics.” The wide net is apparent in the fact that even the initially-proposed list of “core statistics”, given in Annex-II of the policy, has 120 categories of statistics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondly, the policy does not provide reasons for why the characteristics of “core statistics”, highlighted in Section 5.1.5, should not apply to all official statistics at the various levels of Government. Therefore, the utility of the proposed dichotomy has also not been appropriately substantiated with illustrative examples of how “core statistics” should be considered qualitatively different from all official statistics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This definition may lead to widespread disagreement between the States and the Centre, because Section 5.2 proposes that “core statistics” be added to the Union List of the Seventh Schedule of the Constitution. How the proposal may affect Centre-State responsibilities and relations pertaining to the collection and dissemination of statistics is elaborated in the next section.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recommendations&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy should not make a forced dichotomy between “core” and (&lt;i&gt;ipso facto&lt;/i&gt;) non-core statistics. If a distinction is to be made for any reason(s) (such as for the purposes of delineating administrative roles) then such reason must be clearly defined, along with a clear explanation for why such a dichotomy would alleviate the described problem. The definitions should have tangible and unambiguous qualitative criteria.&lt;/p&gt;
&lt;p&gt;Section 5.2: Constitutional amendment in respect of core statistics&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main proposal in the section is that the Seventh Schedule of the Constitution be amended to include “core statistics” in the Union List. This would give the Parliament the legislative competence to regulate the collection, storage, publication and sharing of such statistics, and the Central Government the power to enforce such legislation. Annex-II provides a tentative list of what would constitute “core statistics”; as is apparent, this list is wide-ranging and consists over 120 items which span the gamut of administrative responsibilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The list includes items such as “Landholdings Number, area, tenancy, land utilisation [...]” (S. No. 21), and “Statistics on land records” (S. No. 111) while most responsibilities of land regulation currently lie with the States. Similarly, items in Annex-II venture into statistics related to petroleum, water, agriculture, electricity, and industry; some of which are in the Concurrent or State List.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Statistics are metadata. There is no reason for why the administration of a particular subject lie with the State, and the regulation of data about such subject should lie with solely with the Central Government. It is important to recognise that adding the vaguely defined “core statistics” to the Union List, while enabling the Central Government to execute and plan such statistical exercises, will also prevent the States from enacting any legislation that regulates the management of statistics regarding its own administrative responsibilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regulation of State Government records in general has been a contentious issue, and its place in our federal structure has been debated several times &lt;a class="external-link" href="https://thewire.in/tech/states-power-enact-data-protection-laws"&gt;in the Parliament&lt;/a&gt;&lt;span&gt;:&lt;/span&gt; the enactment of Public Records Act, 1993; the Right to Information Act, 2005; and the Collection of Statistics Act, 2008 are predicated on an assumption of such competence lying with the Parliament. However, it is equally important to recognise the role States have played in advancing transparency of Government records. For example, State-level Acts analogous to the Right to Information Act existed in Tamil Nadu and Karnataka before the Central Government enactment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recommendations&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;We strongly recommend that “statistics” be included in the Concurrent List, so that States are free to enact progressive legislation which advances transparency and accountability, and is not in derogation of Parliamentary legislation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Ministry should view this statistical policy document as a venue to set the minimum standards for the collection, handling and publication of statistics regarding its various functions. If the item is added to the Concurrent List, the States, through local legislation, will only have the power to improve on the Central standards since in a case of conflict, State-levels laws will be superseded by Parliamentary ones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 5.3: Mechanism for regulating core statistics including auditing&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The draft policy in Section 5.3.2 says, “[...] The Committee will be assisted by a Search Committee headed by the Vice-Chairperson of the NITI Aayog, in which a few technical experts could be included as Members.” The non-commital nature of the word ‘could’ in this statement detracts from the importance of having technical experts on this committee, by making their inclusion optional. The policy also does not specify who has the power to include technical experts as Members in the Search Committee. The statement should include either a minimum number of a  specific number or members, and not use the non-committal word “could”&lt;/p&gt;
&lt;p&gt;The National Statistical Development Council, as mentioned in 5.3.9, is supposed to “handle Centre-State relations in the areas of official statistics, the Council should be represented by Chief Ministers of six States to be nominated by the Centre” (Section 5.3.10). The draft does not elaborate on the rationale behind including just six states in the Council. It does not recommend any mechanism on the basis of which Centre will nominate states in the council.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Recommendations&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The policy should recommend a minimum number of technical experts who &lt;i&gt;must&lt;/i&gt; be included in the search committee, along with a clear process for how such members are to be appointed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the policy appropriately recognises the great diversity in India and the unique challenges faced by each State. Thus, each State has its unique requirements. Since in Section 5.3.11, the policy recommends that council meet at a low frequency of at least once in a year, all States should be represented in the Council.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 5.4: Official Machinery to implement directions on core statistics&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The functions of Statistics Wing in the MOSPI, laid out in Section 5.4.7, include advisory functions which overlap with functions of National Statistical Commission (NSC) mentioned in Section 5.3.5. Some regulatory functions of Statistics Wing, like “conducting quality checks and auditing of statistical surveys/data sets”, overlap with the regulatory functions of NSC mentioned in Section 5.3.7.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In section 5.3.1, the draft policy explicitly mentions that “what is feasible and desirable is that production of official statistics should continue with the Government, whereas the related regulatory and advisory functions could be kept outside the Government”. But Statistics Wing is a part of the government and it also has regulatory and advisory functions. It will adversely affect the power of NSC as an autonomous body.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are inconsistencies in the draft-policy regarding the importance and need of a decentralized statistical system. In section 3 [Objectives], it has been emphasized that the Indian Statistical System shall function within decentralized structure of the system.  But, in section 5.4.15, the draft says that decentralized statistical system poses a variety of problems, and advocates for a unified statistical system. Again, in section 5.15, draft emphasizes the development of sub-national statistical systems. These views are inconsistent and create confusion regarding the nature of statistical system that policy wants to pursue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recommendations&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The functions of the NSC should be kept in its exclusive domain. Any such overlapping functions should be allocated to one agency taking into consideration the Fundamental Principles on Official Statistics.&lt;/p&gt;
&lt;p&gt;The inconsistencies regarding the decentralisation philosophy of the statistical system should be addressed.&lt;/p&gt;
&lt;p&gt;Section 5.5: Identifying statistical products required through committees&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Comments&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Section 5.5.2 recognises data confidentiality as a goal for statistical coordination, it does not take into account the violation of privacy that might occur due to the sharing of data. For example, a certain individual might agree to share personal information with a particular Ministry, but have apprehensions about it being shared with other Ministries or private parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Recommendations&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We recommend that point 4 in Section 5.5.2 be read as, “enabling sharing of data without compromising the privacy of individuals and the confidentiality/security of data.”The value of of the individual privacy stems from both the recent Supreme Court judgment that affirmed privacy as a Fundamental Right, and also Principle 6 of the of the Fundamental Principles of Official Statistics. Realising privacy as a goal in this section will add a realm of individual control that is already articulated in Section 5.7.9.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Annex-VII: Guidelines on Outsourcing statistical activities&lt;/h2&gt;
&lt;h3&gt;Comments&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 6 defines “sensitive information” in an all-inclusive manner and does not leave space for further inclusion of any information that may be interpreted as sensitive. For example, biometric data has not been listed as “sensitive information”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 9.1, draft says, “[t]he identity of the Government agency and the Contractor may be made available to informants at the time of collection of data”. It is imperative that informants have the right to verify the identity of the Government agency and the Contractor before parting with their personal information.&lt;/p&gt;
&lt;h3&gt;Recommendations&lt;/h3&gt;
&lt;p&gt;The definition of “sensitive information” should be broad-based with scope for further inclusion of any kind of data that may be deemed “sensitive.”&lt;/p&gt;
&lt;p&gt;Section 9.1 must mandate that the identity of the Government agency and the Contractor be made available to informants at the time of collection of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 9.6 can be redrafted to state that each informant must be informed of the manner in which the informant could access the data collected from the informant in a statistical project, as also of the measures taken to deny access on that information to others, except in the cases specified by the policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 10.2 can be improved to state that if information exists in a physical form that makes the removal of the identity of informants impracticable (e.g. on paper), the information should be recorded in another medium and the original records must be destroyed.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-draft-national-policy-on-official-statistics'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-draft-national-policy-on-official-statistics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Gurshabad Grover and Sandeep Kumar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-06-07T02:54:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act">
    <title>Comments on the  Draft Digital Information Security in Healthcare Act </title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society submitted comments to the Ministry of Health &amp; Family Welfare, Government of India on the draft Digital Information Security in Healthcare Act on April 21, 2018.
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This submission presents comments by the Centre for Internet and Society, India (“CIS”) on the Draft Digital Information Security in Healthcare Act, released by Ministry of Health &amp;amp; Family Welfare, Government of India. CIS has conducted research on the issues of privacy, data protection and data security since 2010 and is thankful for the opportunity to put forth its views. This submission was made on April 21, 2018.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/comments-on-draft-digital-information-security-in-healthcare-act"&gt;Download the full submission here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-information-security-in-healthcare-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha and Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    

   <dc:date>2018-05-01T02:05:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-niti-aayog-working-document-towards-responsible-aiforall">
    <title> Comments on NITI AAYOG Working Document: Towards Responsible #AIforAll</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-niti-aayog-working-document-towards-responsible-aiforall</link>
    <description>
        &lt;b&gt;The NITI Aayog Working Document on Responsible AI for All released on 21st July 2020 serves as a significant statement of intent from NITI Aayog, acknowledging the need to ensure that any conception of “Responsible AI” must fulfill constitutional responsibilities, incorporated through workable principles. However, as it is a draft document for discussion, it is important to highlight next steps for research and policy levers to build upon this report.&lt;/b&gt;
        
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Read our comments in their entirety &lt;a href="https://cis-india.org/internet-governance/comments-to-aiforall-pdf" class="internal-link" title="Comments to AIForAll pdf"&gt;here&lt;/a&gt;.&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-niti-aayog-working-document-towards-responsible-aiforall'&gt;https://cis-india.org/internet-governance/blog/comments-on-niti-aayog-working-document-towards-responsible-aiforall&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas, Arindrajit Basu and Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Artificial Intelligence</dc:subject>
    

   <dc:date>2020-08-18T06:25:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017">
    <title>Comments on Information Technology (Security of Prepaid Payment Instruments) Rules, 2017</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society submitted comments on the Information Technology (Security of Prepaid Payment Instruments) Rules, 2017. The comments were prepared by Udbhav Tiwari, Pranesh Prakash, Abhay Rana, Amber Sinha and Sunil Abraham. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;1. Preliminary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;1.1. This submission presents comments by the Centre for Internet and Society&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; in response to the Information Technology (Security of Prepaid Payment Instruments) Rules 2017 (“the Rules”).&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; The Ministry of Electronics and Information Technology (MEIT) issued a consultation paper (pdf) which calls for developing a framework for security of digital wallets operating in the country on March 08, 2017. This proposed rules have been drafted under provisions of Information Technology Act, 2000, and comments have been invited from the general public and stakeholders before the enactment of these rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;2. The Centre for Internet and Society&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;2.1. The Centre for Internet and Society, (“CIS”), is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, and open access), internet governance, telecommunication reform, digital privacy, and cyber-security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.2. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved, especially the privacy and data security of citizens. CIS is thankful to the MEIT for this opportunity to provide feedback to the draft rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;3. Comments&lt;/h3&gt;
&lt;h4 style="text-align: justify; "&gt;3.1  General Comments&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Penalty&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no penalty for not complying with these rules.  Even the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 doesn’t have penalties.  Under section 43A of the Information Technology Act (under which the 2011 Rules have been promulgated), a wrongful gain or a wrongful loss needs to be demonstrated.  This should not be a requirement for financial sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Expansion to Contractual Parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A majority of these rules, in order to be effective and realistically protect consumer interest, should also be expanded to third parties, agents, contractual relationships and any other relevant relationship an e-PPI issuer may delegate as a part of their functioning.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.2  Rule 2: Definitions&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Certain key words relevant to the field of e-PPI based digital payments such as authorisation, metadata, etc. are not defined in the rules and should both be defined and accounted for in the rules to ensure modern developments such as big data and machine learning, digital surveillance, etc. do not violate human rights and consumer interest.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.2  Rule 7: Definition of personal information&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 7 provides an exhaustive list of data that will be deemed to be personal information for the purposes of the Rules. While &lt;b&gt;information collected&lt;/b&gt; at the time of issuance of the pre-paid payment instrument and during its use is included within the scope of Rule 7, it makes no reference to metadata generated and collected by the e-PPI issuer.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.3 Rule 4: Inadequate privacy protections&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 4(2) specifies the details that the privacy policies of each e-PPI issuer must contain. However, these specifications are highly inadequate and fall well below the recommendations under the National Privacy Principles in Report of the Group of Experts on Privacy chaired by Justice A P Shah.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: The Rules should include include clearly specified rights to access, correction and opt in/opt out, continuing obligations to seek consent in case of change in policy or purpose and deletion of data after purpose is achieved. Additionally, it must be required that a log of each version of past privacy policies be maintained along with the relevant period of applicability.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.4 Rule 10: Reasonable security practices&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Financial information (“such as bank account or credit card or debit card or other payment instrument details”) is already invoked in an inclusive manner in the definition of ‘personal information’ in Rule 7.  Given this there is no need to make the Reasonable Security Practices Rules applicable to financial data through this provisions: it already is, and it is best to avoid unnecessary redundancy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solution: This entire rule should be removed.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.5  Rule 12: Traceability&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: There is a requirement created under this rule that payment-related interactions with customers or other service providers be “appropriately trace[able]”.  But it is unclear what that would practically mean: would IP logging suffice? would IMEI need to be captured for mobile transactions? what is “appropriately” traceable? — none of those questions are answered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion: The NPCI’s practices and RBI regulations, for instance, seek to limit the amount of information that entities like e-PPI providers have.  These rules need to be brought in line with those practices and regulations.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.6 Rule 5: Risk Assessment&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 5 requires e-PPI issuers to carry out risk assessments associated with the security of the payments systems at least once a year and after any major security incident. However, there are no transparency requirements such as publications of details of such review, a summary of the analysis, any security vulnerabilities discovered etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Broaden the scope of this provision to include not just risk assessments but also security audits.&lt;/li&gt;
&lt;li&gt;Mandate publication of risk assessment and security audit reports.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.7 Rule 11: End-to-End Encryption&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The rule concerning end-to-end encryption (E2E) needs significantly greater detailing to be effective in ensuring the the protection of information at both storage and transit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: Elements such as Secure Element or a Secured Server and Trusted User Interface, both concepts to enable secure payments, can be detailed in the rule and a timeline can be established to require hardware, e-PPI practices and security standards to realistically account for such best practices to ensure modern, secure and industry accepted implementation of the rule.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.8 Rule 13: Retention of Information&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 13 leaves the question of retention entirely unanswered by deferring the future rulemaking to the Central Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: Rule 13 should be expanded to include the various categories of information that can be stored, guidelines for the short-term (fast access) and long-term storage of the information retained under the rule and other relevant details. The rule should also include the security standards that should be followed in the storage of such information, require access logs be maintained for whenever this information is accessed by individuals, detail secure destruction practices at the end of the retention period  and finally mandate that end users be notified by the e-PPI issuer of when such retained information is accessed in all situations bar exceptional circumstances such as national security, compromising an ongoing criminal investigations, etc.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.9 Rule 14: Reporting of Cyber Incidents&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 14 is an excellent opportunity to uphold transparency, accountability and consumer rights by mandating time- and information-bound notification of cyber incidents to customers, including intrusions, database breaches and any other compromise of the integrity of the financial system. While the requirement of reporting such incidents to CERT-In is already present in the Rule 12 of the CERT Rules, the rule retains the optional nature of notifying customers. The rule should include an exhaustive list of categories or kinds of cyber incidents that should be reported to affected end users without compromising the investigation of such breaches by private organisations and public authorities. Further, the rule should also include penalties for non-compliance of this requirement (both to CERT-In and the consumer) to serve as an incentive for e-PPI issuers to uphold consumer public interest. The rule should be expanded to include a detailed mechanism for such reporting, including when e-PPI issuers and the CERT-In can withhold information from consumers as well as requiring the withheld information be disclosed when the investigation has been completed. Finally, the rule should also require that such disclosures be public in nature and consumers not be required to not disseminate such information to enable informed choice by the end user community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) In Rule 14(3) “may” should be substituted by “shall”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Penalties of up to 5 lakh rupees may be imposed for each day that the e-PPI issuer fails to report any severe vulnerability that could likely result in harm to customers.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.10 Rule 15: Customer Awareness and Education&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 15 on Customer Awareness and Education by e-PPI issuers does not take into account the vast lingual diversity and varied socio-economic demographic that makes up the end users of e-PPI providers in India, by mandating the actions under the rule must account for these factors prior to be propagated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: The rule must ensure that e-PPI issuers track record in carrying out awareness is regularly held accountable by both the government and public disclosures on their websites. Further, the rule can be made more concrete and effective by including mobile operating systems in their scope (along with equipments), mandating awareness for best practices for inclusive technologies like USSD banking, specifying notifications to include SMS reports of financial transactions, etc.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.11 Rule 16: Grievance Redressal&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 16 lays down the requirement of grievance redressal, without specifying appellate mechanisms (both within the organisation and at the regulatory level), accountability (via penalties) for non-compliance of the rule nor requiring a clear hierarchy of responsibility within the e-PPI organisation. These factors seriously compromise the efficacy of a grievance redressal framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: Similar rules for grievance redressal that have been enacted by the Insurance Regulatory and Development Authority for the insurance sector and the Telecom Regulatory Authority of India for the telecom sector can and should serve as a reference point for this rule. Their effectiveness and real world operation should also be monitored by the relevant authorities while ensuring sufficient flexibility exists in the rule to uphold consumer rights and the public interest. Proper appellate mechanisms at the regulatory level are essential along with penalties for non-compliance.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.12 Rule 17: Security Standards&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 17 empowers the Central Government to mandate security standards to be followed by e-PPI issuers operating in India. While appreciable in its overall outlook on ensuring a minimum standard of security, the Rule needs be improved upon to make it more effective. This can be in done by specifying certain minimum security standards to ensure all e-PPI issuers have a minimal level of security, instead of leaving them open to being intimated at a later date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: Standards that can either be made mandatory or be used as a reference point to create a new standard under Rule 17(2) are ISO/IEC 14443, IS 14202, ISO/IEC 7816, PCI DSS, etc. Further, the Rule should include penalties for non-compliance of these standards, to make them effectively enforceable by both the government and end users alike. Additional details like the maximum time period in which such security standards should be implemented post their notification, requiring regular third party audits to ensure continuing compliance and effectiveness and requiring updated standards be used upon their release will go a long way in ensuring e-PPI issuers fulfil their mandate under these Rules.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://meity.gov.in/sites/upload_files/dit/files/draft-rules-security%20of%20PPI-for%20public%20comments.pdf"&gt;http://meity.gov.in/sites/upload_files/dit/files/draft-rules-security%20of%20PPI-for%20public%20comments.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017'&gt;https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2017-03-23T01:54:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/comments-on-draft-national-policy-on-official-statistics">
    <title>Comments on Draft National Policy on Official Statistics</title>
    <link>https://cis-india.org/internet-governance/files/comments-on-draft-national-policy-on-official-statistics</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/comments-on-draft-national-policy-on-official-statistics'&gt;https://cis-india.org/internet-governance/files/comments-on-draft-national-policy-on-official-statistics&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Gurshabad Grover</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2018-06-07T01:58:22Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards">
    <title>Comments on Draft Electronic Health Records Standards</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society submitted its comments on the Draft Electronic Health Records Standards to the Ministry of Health and Family Welfare.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To,&lt;br /&gt;Ministry of Health and Family Welfare,&lt;br /&gt;Room 307 D,&lt;br /&gt;Nirman Bhavan,&lt;br /&gt;New Delhi 110108&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Subject: Comments on the Electronic Health Record (EHR) Standards of India&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Electronic Health Record (EHR) Standards (hereinafter “EHR Standards”) were publicly circulated on March 18, 2016 seeking comments and views from stakeholders and the general public. Having reviewed the EHR Standards and referred to other robust standards dealing with the same subject matter, we wish to submit the following comments on the EHR Standards.&lt;/p&gt;
&lt;h4&gt;Standards and Interoperability&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The EHR Standards state that the "primary aim of interoperability standards is to ensure syntactic (structural) and semantic (inherent meaning) 	interoperability of data amongst systems at all times" &lt;a name="_ftnref1"&gt;[1]&lt;/a&gt;. It is mentioned that set of standards outlined in this document represents an incremental approach to adopting standards and that they need to be flexible and modifiable to adapt to the demographic and resource diversity in India.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;The EHR Standards make a reference to syntactic and semantic interoperability without really defining these terms or stipulating clear steps for how 	they may be achieved. It is suggested that these terms are clearly defined. Syntactic interoperability can be defined as ensuring the preservation of the 	clinical purpose of the data during transmission among healthcare systems. Similarly, semantic interoperability can defined as enabling multiple systems to interpret the information that has been exchanged in a similar way through pre-defined shared meaning of concepts &lt;a name="_ftnref2"&gt;[2]&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Inadequate human resource capacity remains a critical challenge to the adoption of e-health standards. The WHO and ITU eHealth Strategy Toolkit &lt;a name="_ftnref3"&gt;[3]&lt;/a&gt; recommends the development of effective health ICT workforce, capable of designing, building, operating and supporting e-health services. This workforce could participate in standards development, as well as the localization of international standards to fit a country's specific need. The EHR Standards 	should also include mechanisms and solutions to address these issues.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4&gt;Ownership of Data&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The physical or electronic records, which are generated by the healthcare provider are held in trust by them on behalf of the patient &lt;a name="_ftnref4"&gt;[4]&lt;/a&gt;. It is stated that the contained data which is sensitive personal data or personal information of the patient as per the Information Technology Act, 2000 is owned by the patients, however the medium for storage or transmission of such data is owned by the healthcare provider.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Currently, the EHR Standards state that the contained data which are the sensitive personal data of the patient is owned by the patient. While medical 	records and history is included within the scope of sensitive personal data under the Information Technology Act, 2000, the definition of "Personal Health 	Information" under the EHR Standards is more expansive. Therefore, it is recommended that all Personal Health Information is deemed to be owned by the patient.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Currently, the EHR Standards do not clearly specify the bodies and individuals who would be subject to the requirements under this document. A definition similar to that of "covered entities" under the US Health Insurance Portability and Accountability Act (HIPAA) could be used &lt;a name="_ftnref5"&gt;[5]&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4&gt;Privileges of Patient&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Currently, the privileges of the patient include the rights to inspect and view their medical records. Further, the patient can request a healthcare organization that stores/maintains their medical records, to withhold specific information that they do not want disclosed to other&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;organizations or individuals. Also, patients can demand information from a healthcare provider on the details of disclosures performed on the patient's medical records &lt;a name="_ftnref6"&gt;[6]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;Currently, the EHR Standards only refer to "medical records" as being available for inspection and review of the patients. This should be expanded to 	also include information about enrollment, payment, claims adjudication, case or medical management record systems maintained by or for a health plan; or 	Other records that are used, to make decisions about individuals by healthcare providers or other bodies &lt;a name="_ftnref7"&gt;[7]&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;The EHR standards do not currently stipulate that the upon request by a patient, healthcare providers must exercise timeliness in providing the 	information to them. A time-limit such 30 calendar days should be clearly stated within which the healthcare provider must process the request.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;The right of patients to request information from a healthcare provider on the details of disclosures should include within its scope the rights to 	receive the date of the disclosure; the name and address of the entity or person who received the information; a brief description of the medical 	information disclosed; and; a brief summary of the purpose of the disclosure &lt;a name="_ftnref8"&gt;[8]&lt;/a&gt;.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;A right to seek amendment of the one's medical records should also be provided to patients in cases where the information is incomplete.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4&gt;Patient Identifying Information&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Under the Standards, Personal identifiers include the following: Name, Address (all geographic subdivisions smaller than street address, and PIN code) All 	elements (except years) of dates related to an individual (including date of birth, date of death, etc.), Telephone, cell (mobile) phone and/or Fax 	numbers, Email address, Bank Account and/or Credit Card Number, Medical record number, Health plan beneficiary number, Certificate/license number, Any vehicle or other any other device identifier or serial numbers, PAN number, Passport number, AADHAAR card, Voter ID card, Fingerprints/Biometrics, Voice 	recordings that are non-clinical in nature, Photographic images and that possibly can individually identify the person, Any other unique identifying number, characteristic, or code &lt;a name="_ftnref9"&gt;[9]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The above mentioned list is not adequate and exhaustive such as the definition and scope of Protected Health Information under the HIPAA &lt;a name="_ftnref10"&gt;[10]&lt;/a&gt;. The following identifiers must be included within the scope of Patient Identifying Information: Device identifiers and serial numbers, Web Universal Resource Locators (URLs), Internet Protocol (IP) address numbers.&lt;/p&gt;
&lt;h4&gt;Disclosure of Protected/Sensitive Information&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The EHR Standards state that disclosure of protected/sensitive information for use in treatment, payments and other healthcare operations must be only done after obtaining a general consent of the patient. On the other hand, disclosures for for non-routine and most non-health care purposes must be done only 	after obtaining the specific consent of the patient. Only for certain specified national priority activities, such as notifiable/communicable diseases, it is stated that "the health information may be disclosed to appropriate authority as mandated by law without the patient's prior authorization."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Comments:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;The terms "specific consent" and "general consent" need to be clearly defined.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;In cases of disclosures for for non-routine and most non-health care purposes, a written authorisation should be mandatory. It should be clearly specified that a healthcare provider may not condition treatment, payment, enrollment, or benefits eligibility on an individual granting an authorization.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;There is confusion due to the use of numerous terms such as "health information", "protected health information", "sensitive personal data", "personal information" and "protected/sensitive information" in the EHR Standards for the same purpose. Some of these above terms are defined while the others are not. In order to remove the ambiguity caused due to this, it is recommended that the term "protected health information" is used throughout the document.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;All bodies dealing with medical data should be required to abide by the principle of "data minimisation" in use and disclosure. They must take 	reasonable efforts to use, disclose, and request only the minimum amount of protected health information needed to accomplish the intended purpose of the 	use, disclosure, or request.&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;div style="text-align: justify;"&gt;For internal uses, healthcare providers and other entities must develop and implement policies and procedures that restrict access and uses of protected 	health information based on the specific roles of the members of their workforce.&lt;/div&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;&lt;br /&gt;Amber Sinha,&lt;br /&gt;Centre for Internet and Society,&lt;br /&gt;No. 194, 2nd 'C' Cross,&lt;br /&gt;Domlur, 2nd Stage,&lt;br /&gt;Bengaluru, 560071&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;[1]&lt;/a&gt; Page 7 of the EHR Standards.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;[2]&lt;/a&gt; Funmi Adebesin, Rosemary Foster, Paula Kotze, Darelle van Greunen, "A review of interoperability standards in e-Health and imperatives for their 			adoption in Africa", Research Article - SACJ No. 50, July 2013; L. E. Whitman and H. Panetto. "The missing link: Culture and language barriers to 			interoperability", Annual Reviews in Control, vol. 30, no. 2, 2006.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;[3]&lt;/a&gt; WHO and ITU. "National eHealth Strategy Toolkit", available at &lt;a href="http://goo.gl/uxMvE"&gt;http://goo.gl/uxMvE&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;[4]&lt;/a&gt; Page 19 of the EHR Standards.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;[5]&lt;/a&gt; Covered Entity includes a healthcare provider ( Doctors, Clinics, Psychologists, Dentists, Chiropractors, Nursing Homes, Pharmacies), a health plan 			(Insurance companies, HMOs, Company Health Plans, Government programs that pay for health care) and Healthcare Clearinghouse.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;[6]&lt;/a&gt; Page 20 of the EHR Standards.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;[7]&lt;/a&gt; Individuals' Right under HIPAA to Access their Health Information 45 CFR § 164.524, available at &lt;a href="http://www.hhs.gov/hipaa/for-professionals/privacy/guidance/access/"&gt; http://www.hhs.gov/hipaa/for-professionals/privacy/guidance/access/ &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;[8]&lt;/a&gt; Patient Rights Under HIPAA Accounting of Disclosures of Health Information, available at &lt;a href="http://uthscsa.edu/hipaa/patientrights/accountingofdisclosures.pdf"&gt;http://uthscsa.edu/hipaa/patientrights/accountingofdisclosures.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;[9]&lt;/a&gt; Page 21 of the EHR Standards.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;[10]&lt;/a&gt; See: &lt;a href="http://cphs.berkeley.edu/hipaa/hipaa18.html"&gt;http://cphs.berkeley.edu/hipaa/hipaa18.html&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards'&gt;https://cis-india.org/internet-governance/blog/comments-on-draft-electronic-health-records-standards&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2016-12-15T08:45:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
