<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2641 to 2655.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/big-data-governance-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-brother-watching-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/outlookindia-october-28-2013-debarshi-dasgupta-beyond-the-searchlight"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/beyond-sharing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-beyond-public-squares-dumb-conduits-and-gatekeepers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/beyond-clicktivism"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011">
    <title>Big Data and the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules 2011</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011</link>
    <description>
        &lt;b&gt;Experts and regulators across jurisdictions are examining the impact of Big Data practices on traditional data protection standards and principles. This will be a useful and pertinent exercise for India to undertake as the government and the private and public sectors begin to incorporate and rely on the use of Big Data in decision making processes and organizational operations.This blog provides an initial evaluation of how Big Data could impact India's current data protection standards.&lt;/b&gt;
        &lt;p&gt;Experts and regulators across the globe are examining the impact of Big Data practices on traditional data protection standards and principles. This will be a useful and pertinent exercise for India to undertake as the government and the private and public sectors begin to incorporate and rely on the use of Big Data in decision making processes and organizational operations.&lt;/p&gt;
&lt;p&gt;Below is an initial evaluation of how Big Data could impact India's current data protection standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India currently does not have comprehensive privacy legislation - but the Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules 2011 formed under section 43A of the Information Technology Act 2000&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; define a data protection framework for the processing of digital data by Body Corporate. Big Data practices will impact a number of the provisions found in the Rules:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Scope of Rules: &lt;/b&gt;Currently the Rules apply to Body Corporate and digital data. As per the IT Act, Body Corporate is defined as &lt;i&gt;"Any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities."&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The present scope of the Rules excludes from its purview a number of actors that do or could have access to Big Data or use Big Data practices. The Rules would not apply to government bodies or individuals collecting and using Big Data. Yet, with technologies such as IoT and the rise of Smart Cities across India – a range of government, public, and private organizations and actors could have access to Big Data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Definition of personal and sensitive personal data: &lt;/b&gt;Rule 2(i) defines personal information as &lt;i&gt;"information that relates to a natural person which either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person."&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Rule 3 defines sensitive personal information as:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Password,&lt;/li&gt;
&lt;li&gt;Financial information,&lt;/li&gt;
&lt;li&gt;Physical/physiological/mental health condition,&lt;/li&gt;
&lt;li&gt;Sexual orientation,&lt;/li&gt;
&lt;li&gt;Medical records and history,&lt;/li&gt;
&lt;li&gt;Biometric information&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The present definition of personal data hinges on the factor of identification (data that is capable of identifying a person). Yet this definition does not encompass information that is associated to an already identified individual - such as habits, location, or activity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The definition of personal data also addresses only the identification of 'such person' and does not address data that is related to a particular person but that also reveals identifying information about another person - either directly - or when combined with other data points.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By listing specific categories of sensitive personal information, the Rules do not account for additional types of sensitive personal information that might be generated or correlated through the use of Big Data analytics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importantly, the definitions of sensitive personal information or personal information do not address how personal or sensitive personal information - when anonymized or aggregated – should be treated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Consent&lt;/b&gt;: Rule 5(1) requires that Body Corporate must, prior to collection, obtain consent in writing through letter or fax or email from the provider of sensitive personal data regarding the use of that data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a context where services are delivered with little or no human interaction, data is collected through sensors, data is collected on a real time and regular basis, and data is used and re-used for multiple and differing purposes - it is not practical, and often not possible, for consent to be obtained through writing, letter, fax, or email for each instance of data collection and for each use.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notice of Collection: &lt;/b&gt;Rule 5(3) requires Body Corporate to provide the individual with a notice during collection of information that details the fact that information is being collected, the purpose for which the information is being collected, the intended recipients of the information, the name and address of the agency that is collecting the information and the agency that will retain the information. Furthermore body corporate should not retain information for longer than is required to meet lawful purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this provision acts as an important element of transparency, in the context of Big Data, communicating the purpose for which data is collected, the intended recipients of the information, the name and address of the agency that is collecting the information and the agency that will retain the information could prove to be difficult to communicate as they are likely to encompass numerous agencies and change depending upon the analysis being done.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Access and correction&lt;/b&gt;: Rule 5(6) provides individuals with the ability to access sensitive personal information held by the body corporate and correct any inaccurate information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision would be difficult to implement effectively in the context of Big Data as vast amounts of data are being generated and collected on an ongoing and real time basis and often without the knowledge of the individual.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Purpose Limitation:&lt;/b&gt; Rule 5(5) requires that body corporate should use information only of the purpose which it has been collected.&lt;/p&gt;
&lt;p&gt;In the context of Big Data this provision would overlook the re-use of data that is inherent in such practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security:&lt;/b&gt; Rule 8 states that any Body Corporate or person on its behalf will be understood to have complied with reasonable security practices and procedures if they have implemented such practices and have in place codes that address managerial, technical, operational and physical security control measures. These codes could follow the IS/ISO/IEC 27001 standard or another government approved and audited standard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision importantly requires that data controllers collecting and processing data have in place strong security practices. In the context of Big Data – the security of devices that might be generating or collecting data and algorithms processing and analysing data is critical. Once generated, it might be challenging to ensure the data is being transferred to or being analysed by organisations that comply with such security practices as listed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Breach&lt;/b&gt; : Rule 8 requires that if a data breach occurs, Body Corporate would have to be able to demonstrate that they have implemented their documented information security codes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this provision holds a company accountable for the implementation of security practices, it does not address how a company should be held accountable for a large scale data breach as in the context of Big Data the scope and impact of a data breach is on a much larger scale.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Opt in and out and ability to withdraw consent&lt;/b&gt; : Rule 5(7) requires Body Corporate or any person on its behalf, prior to the collection of information - including sensitive personal information - must give the individual the option of not providing information and must give the individual the option of withdrawing consent. Such withdrawal must be sent in writing to the body corporate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The feasibility of such a provision in the context of Big Data is unclear, especially in light of the fact that Big Data practices draw upon large amounts of data, generated often in real time, and from a variety of sources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Disclosure of Information&lt;/b&gt;: Rule 6 maintains that disclosure of sensitive personal data can only take place with permission from the provider of such information or as agreed to through a lawful contract.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision addresses disclosure and does not take into account the “sharing” of information that is enabled through networked devices, as well as the increasing practice of companies to share anonymized or aggregated data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy Policy&lt;/b&gt; : Rule 4 requires that body corporate have in place a privacy policy on their website that provides clear and accessible statements of its practices and policies, type of personal or sensitive personal information that is being collected, purpose of the collection, usage of the information, disclosure of the information, and the reasonable security practices and procedures that have been put in place to secure the information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the context of Big Data where data from a variety of sources is being collected, used, and re-used it is important for policies to 'follow data' and appear in a contextualized manner. The current requirement of having Body Corporate post a single overarching privacy policy on its website could prove to be inadequate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Remedy&lt;/b&gt; : Section 43A of the Act holds that if a body corporate is negligent in implementing and maintain reasonable security practices and procedures which results in wrongful loss or wrongful gain to any person, the body corporate can be held liable to pay compensation to the affected person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision will provide limited remedy for an affected individual in the context of Big Data. Though important to help prevent data breaches resulting from negligent data practices, implementation of reasonable security practices and procedures cannot be the only hinging point for determining liability of a Body Corporate for violations and many of the harms possible through Big Data are not in the form of wrongful loss or wrongful gain to another person. Indeed many harms possible through Big Data are non-economic in nature – including physical invasion of privacy, and discriminatory practices that can arise from decisions based on Big Data analytics. Nor does the provision address the potential for future damage that can result from a 'Big Data data breach'.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The safeguards noted in the above section are not the only legal provisions that speak to privacy in India. There are over fifty sectoral legislation that have provisions addressing privacy - for example provisions addressing confidentiality of health and banking information. The government of India is also in the process of drafting a privacy legislation. In 2012 the Report of the Group of Experts on Privacy provided recommendations for a privacy framework in India. The Report envisioned a framework of co-regulation - with sector level self regulatory organization developing privacy codes (that are not lower than the defined national privacy principles) and that are enforced by a privacy commissioner.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Perhaps this method would be optimal for the regulation of Big Data- allowing for the needed flexibility and specificity in standards and device development. Though the Report notes that individuals can seek remedy from the court and the Privacy Commissioner can issue fines for a violation, the development of privacy legislation in India has yet to clearly integrate the importance of due process and remedy. With the onset of Big Data - this will become more important than ever.&lt;/p&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The use and generation of Big Data in India is growing. Plans such as free wifi zones in cities&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;, city wide CCTV networks with facial recognition capabilities&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;, and the implementation of an identity/authentication platform for public and private services&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;, are indicators towards a move of data generation that is networked and centralized, and where the line between public and private is blurred through the vast amount of data that is collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In such developments and innovations what is privacy and what role does privacy play? Is it the archaic inhibitor - limiting the sharing and use of data for new and innovative purposes? Will it be defined purely by legislative norms or through device/platform design as well? Is it a notion that makes consumers think twice about using a product or service or is it a practice that enables consumer and citizen uptake and trust and allows for the growth and adoption of these services?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;How privacy will be regulated and how it will be perceived is still evolving across jurisdictions, technologies, and cultures - but it is clear that privacy is not being and cannot be overlooked. Governments across the world are reforming and considering current and future privacy regulation targeted towards life in a quantified society. As the Indian government begins to roll out initiatives that create a "Digital India" indeed a "quantified India", taking privacy into consideration could facilitate the uptake, expansion, and success of these practices and services. As the Indian government pursues the opportunities possible through Big Data it will be useful to review existing privacy protections and deliberate on if, and in what form, future protections for privacy and other rights will be needed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt;Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules 2011). Available at: http://deity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt;Group of Experts on Privacy. (2012). &lt;i&gt;Report of the Group of Experts on Privacy.&lt;/i&gt; New Delhi: Planning Commission, Government of India. Retrieved May 20, 2015, from http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; NDTV. “Free Public Wi-Fi Facility in Delhi to Have Daily Data Limit. NDTV, May 25&lt;sup&gt;th&lt;/sup&gt; 2015, Available at: &lt;a href="http://gadgets.ndtv.com/internet/news/free-public-wi-fi-facility-in-delhi-to-have-daily-data-limit-695857"&gt;http://gadgets.ndtv.com/internet/news/free-public-wi-fi-facility-in-delhi-to-have-daily-data-limit-695857&lt;/a&gt;. Accessed: July 2&lt;sup&gt;nd&lt;/sup&gt; 2015.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt;FindBiometrics Global Identity Management. “Surat Police Get NEC Facial Recognition CCTV System”. July 21&lt;sup&gt;st&lt;/sup&gt; 2015. Available at: http://findbiometrics.com/surat-police-nec-facial-recognition-27214/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt;UIDAI Official Website. Available at: https://uidai.gov.in/&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011'&gt;https://cis-india.org/internet-governance/blog/big-data-and-information-technology-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-11T07:01:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world">
    <title>Big Data and Positive Social Change in the Developing World: A White Paper for Practitioners and Researchers</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world</link>
    <description>
        &lt;b&gt;I was a part of a working group writing a white paper on big data and social change, over the last six months. This white paper was produced by a group of activists, researchers and data experts who met at the Rockefeller Foundation’s Bellagio Centre to discuss the question of whether, and how, big data is becoming a resource for positive social change in low- and middle-income countries (LMICs).&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Bellagio Big Data Workshop Participants. (2014). “Big data and positive social change in the developing world: A white paper for practitioners and researchers.” Oxford: Oxford Internet Institute. Available online: &lt;a class="external-link" href="http://ssrn.com/abstract=2491555"&gt;http://ssrn.com/abstract=2491555&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Our working definition of big data includes, but is not limited to, sources such as social media, mobile phone use, digitally mediated transactions, the online news media, and administrative records. It can be categorised as data that is provided explicitly (e.g. social media feedback); data that is observed (e.g. mobile phone call records); and data that is inferred and derived by algorithms (for example social network structure or inflation rates). We defined four main areas where big data has potential for those interested in promoting positive social change: advocating and facilitating; describing and predicting; facilitating information exchange and promoting accountability and transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In terms of &lt;span class="ff5"&gt;advocating and facilitating&lt;/span&gt;,&lt;span class="_0 _"&gt; &lt;/span&gt; we discussed ways in which volunteered data may &lt;span class="_0 _"&gt; &lt;/span&gt;help organisations to open up new public spa&lt;span class="_0 _"&gt;&lt;/span&gt;ces for discussion and awareness&lt;span class="_0 _"&gt;&lt;/span&gt;-building; how both aggregating data and working across different databa&lt;span class="_0 _"&gt;&lt;/span&gt;ses can be tools for building awa&lt;span class="_0 _"&gt;&lt;/span&gt;reness, and howthe digital data commons can also configure new&lt;span class="_0 _"&gt;&lt;/span&gt;&lt;span class="ff5"&gt; &lt;/span&gt;communities and actions&lt;span class="_0 _"&gt;&lt;/span&gt; (sometimes serendipitously) through data science and aggregation. Finally, we also&lt;span class="_0 _"&gt;&lt;/span&gt; looked at the problem of overexposure and ho&lt;span class="_0 _"&gt;&lt;/span&gt;wactivists and organisations can&lt;span class="_0 _"&gt;&lt;/span&gt; protect themselves and hide their digital footprin&lt;span class="_0 _"&gt;&lt;/span&gt;ts. The challenges w&lt;span class="ls2"&gt;e&lt;/span&gt; identified in this area were how to interpret data&lt;span class="_0 _"&gt;&lt;/span&gt; correctly when supplementary information may b&lt;span class="_0 _"&gt;&lt;/span&gt;e lacking; organisational capacity constraints aro&lt;span class="_0 _"&gt;&lt;/span&gt;und processing and storing data,&lt;span class="_0 _"&gt;&lt;/span&gt; and issues around data dissemination, i.e. the pos&lt;span class="_0 _"&gt;&lt;/span&gt;sible negative consequences of inadvertently ide&lt;span class="_0 _"&gt;&lt;/span&gt;ntifying groups or individuals&lt;span class="_0 _"&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Next, we looked at the way big data can help describe and predict, functions which are particularly important in the academic, development and humanitarian areas of work where researchers can combine data into new dynamic, high-resolution datasets to detect new correlations and surface new questions. With data such as mobile phone data and Twitter analytics, understanding the data’s comprehensiveness, meaning and bias are the main challenges, accompanied by the problem of developing new and more comprehensive ethical systems to protect data subjects where data is observed rather than volunteered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next group of activities discussed was facilitating information exchange. We looked at mobile-based information services, where it is possible for a platform created around a particular aim (e.g. agricultural knowledge-building) to incorporate multiple feedback loops which feed into both research and action. The pitfalls include the technical challenge of developing a platform which is lean yet multifaceted in terms of its uses, and particularly making it reliably available to low-income users. This kind of platform, addressed by big data analytics, also offers new insights through data discovery and allows the provider to steer service provision according to users’ revealed needs and priorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our last category for big data use was accountability and transparency, where organisations are using crowdsourcing methods to aggregate and analyse information in real time to establish new spaces for critical discussion, awareness and action. Flows of digital information can be managed to prioritise participation and feedback, provide a safe space to engage with policy decisions and expose abuse. The main challenges are how to keep sensitive information (and informants) safe while also exposing data and making authorities accountable; how to make the work sustainable without selling data, and how to establish feedback loops so that users remain involved in the work beyond an initial posting. In the crowdsourcing context, new challenges are also arising in terms of how to verify and moderate real-time flows of information, and how to make this process itself transparent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, we also discussed the relationship between big and open data. Open data can be seen as a system of governance and a knowledge commons, whereas big data does not by its nature involve the idea of the commons, so we leaned toward the term ‘opening data’, i.e. processes which could apply to commercially generated as much as public-sector datasets. It is also important to understand where to prioritise opening, and where this may exclude people who are not using the ‘right’ technologies: for example, analogue methods (e.g. nailing a local authority budget to a town hall door every month) may be more open than ‘open’ digital data that’s available online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our discussion surfaced many questions to do with representation and meaning: must datasets be interpreted by people with local knowledge? For researchers to get access to data that is fully representative, do we need a data commons? How are data proprietors engaging with the power dynamics and inequalities in the research field, and how can civil society engage with the private sector on its own terms if data access is skewed towards elites? We also looked at issues of privacy and risk: do we need a contextual risk perspective rather than a single set of standards? What is the role of local knowledge in protecting data subjects, and what kinds of institutions and practices are necessary? We concluded that there is a case to be made for building a data commons for private/public data, and for setting up new and more appropriate ethical guidelines to deal with big data, since aggregating, linking and merging data present new kinds of privacy risk. In particular, organisations advocating for opening datasets must admit the limitations of anonymisation, which is currently being ascribed more power to protect data subjects than it merits in the era of big data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our analysis makes a strong case that it is time for civil society groups in particular to become part of the conversation about the power of data. These groups are the connectors between individuals and governments, corporations and governance institutions, and have the potential to promote big data analysis that is locally driven and rooted. Civil society groups are also crucially important but currently underrepresented in debates about privacy and the rights of technology users, and civil society as a whole has a responsibility for building critical awareness of the ways big data is being used to sort, categorise and intervene in LMICs by corporations, governments and other actors. Big data is shaping up to be one of the key battlefields of our era, incorporating many of the issues civil society activists worldwide have been working on for decades. We hope that this paper can inform organisations and&lt;br /&gt;individuals as to where their particular interests may gain traction in the debate, and what their contribution may look like.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/big-data-and-positive-social-change.pdf"&gt;Click to download the full white paper here&lt;/a&gt;&lt;/b&gt;. (PDF, 1.95 Mb)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world'&gt;https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-10-01T03:52:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/big-data-governance-india">
    <title>Big Data and Governance in India</title>
    <link>https://cis-india.org/internet-governance/events/big-data-governance-india</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) is happy to invite you to a discussion on the role of Big Data in governance in India with a focus on Digital India, UID Scheme and Smart Cities Mission in India on January 23, 2016 at CIS office in Bangalore from 11 a.m. to 4 p.m.&lt;/b&gt;
        &lt;h3&gt;&lt;a href="https://cis-india.org/internet-governance/blog/background-note-big-data" class="internal-link"&gt;Background Note&lt;/a&gt;&lt;/h3&gt;
&lt;hr /&gt;
&lt;p&gt;The roundtable discussion intends to delve deeper into various issues around the role of big data in Government schemes and projects like the Digital India, the UID Scheme and the 100 Smart Cities Mission. Some of the topics would include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Use/Assumptions about use of Big Data.&lt;/li&gt;
&lt;li&gt;The public dialogue in the context of Big Data, rights, and governance.&lt;/li&gt;
&lt;li&gt;Status and Role of India's data protection standards impacted by Big Data.&lt;/li&gt;
&lt;li&gt;Legal hurdles posed by Big Data.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;We look forward to making this a forum for knowledge exchange and a learning opportunity for our friends and colleagues attending the discussion.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Contact:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Vanya Rakesh vanya@cis-india.org +919586572707&lt;/li&gt;
&lt;li&gt;Amber Sinha amber@cis-india.org +919620180343&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Agenda&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Introduction&lt;br /&gt;11:00 am - 11.30 am&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Introduction about “Big Data in the Global South: Mitigating Harms” and “Big Data in Indian Governance”.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Digital India&lt;br /&gt;11.30 am - 1:00 pm&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Discussion&lt;br /&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Schemes under Digital India and how Big Data pertains to them&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Scale and nature of data being collected&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Actors involved&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Research Methodology and coding&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;“Cradle to grave” identity&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Need for privacy legislation/data protection policies&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1:00 pm- 2:00 pm &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Big Data and Smart Cities&lt;br /&gt;2:00 pm - 3:30pm &lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Discussion&lt;br /&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Use/Assumptions about use of Big Data in Smart cities.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Organisations/companies driving the use of Big Data in Governance in India&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The public dialogue around the scheme in the context of big data, rights, and governance&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Impact of Big Data on India's Data Protection Standards &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Impact of Big Data on other legislation/policy besides privacy . What type of 'legal hurdles' could Big Data pose?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Need for creating regulatory/legal framework&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3:30pm-4:00pm&lt;/td&gt;
&lt;td&gt;Tea/Coffee&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;h2&gt;Detailed Agenda&lt;/h2&gt;
&lt;h3&gt;Digital India&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Scope of schemes under Digital India and how Big Data pertains to them&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What are the ways in which Big Data is defined?&lt;/li&gt;
&lt;li&gt;What aspects of Digital India initiatives pertain to Big Data?&lt;/li&gt;
&lt;li&gt;What could be the harms/benefits of Big Data for Digital India?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Scale and nature of data being collected&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What do the schemes intend to quantify?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Actors involved&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What kinds of issue arise in PPP model?&lt;/li&gt;
&lt;li&gt;Questions about ownership of data, access-control and security&lt;/li&gt;
&lt;li&gt;Application of Section 43A rules to private parties involved&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Research Methodology and coding&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What the relevant questions that need to be asked in mapping each scheme?&lt;/li&gt;
&lt;li&gt;How do we view e-governance initiatives vis-a-vis privacy principles?&lt;/li&gt;
&lt;li&gt;What are the rights of citizens, and how are they impacted?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;“Cradle to grave” identity&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What does ‘cradle to grave’ digital identity mean?&lt;/li&gt;
&lt;li&gt;What is the impact of using the Aadhaar number?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Need for privacy legislation/data protection policies&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What aspects of the right to privacy pertain to the schemes?&lt;/li&gt;
&lt;li&gt;Extending the Section 43A rules to government agencies&lt;/li&gt;
&lt;li&gt;Justice Shah committee’s nine privacy principles.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Big Data and Smart Cities&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Use/Assumptions about use of Big Data in Smart cities&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;What can be termed as big data in the context of smart cities.&lt;/li&gt;
&lt;li&gt;What would be the role of big data.&lt;/li&gt;
&lt;li&gt;Where do we see use/potential use of big data in the smart cities.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;What bodies/companies are driving the use of Big Data in Governance in India? &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Identifying actors involved.&lt;/li&gt;
&lt;li&gt;Defining the role of: Government bodies, Private companies like IT Companies, consultants, etc.  in use of big data. Clarity on ownership, storage, use, re-use, deletion of data. Question of accountability in case of breach/misuse.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;What has been the public dialogue around a scheme in the context of big data, rights, and governance? &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Weighing promises of big data.&lt;/li&gt;
&lt;li&gt;Weighing challenges of big data.&lt;/li&gt;
&lt;li&gt;Concerns around big data- data security, privacy, digital resilience of infrastructure, risks of identity management, Circumvention of democracy, social exclusion, right to equality, right to access, etc.&lt;/li&gt;
&lt;li&gt;Issue of governance and implementation: role of SPVs.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;How are India's data protection standards impacted by Big Data? &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Need for developing standards.&lt;/li&gt;
&lt;li&gt;Drawing from existing international standards.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Are there other legislation/policy besides privacy impacted by Big Data? what type of 'legal hurdles' could Big Data pose?&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Legal landscaping: impact on current laws/policies/provisions.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Need for creating regulatory/legal framework?&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/big-data-governance-india'&gt;https://cis-india.org/internet-governance/events/big-data-governance-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Smart Cities</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    

   <dc:date>2016-01-17T01:57:45Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-brother-watching-you">
    <title>Big Brother is Watching You</title>
    <link>https://cis-india.org/internet-governance/blog/big-brother-watching-you</link>
    <description>
        &lt;b&gt;The government is massively expanding its surveillance power over law-abiding citizens and businesses, says Sunil Abraham in this article published by the Deccan Herald on June 1, 2011.&lt;/b&gt;
        
&lt;p&gt;Imagine: An HIV positive woman calls a help-line from an ISD/STD booth. The booth operator can get to know who she called, when and for how long. But he would not have any idea on who she is or where she lives.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Now, instead of a phone call, imagine that she uses a cyber café to seek help on a website for HIV positive people. The cyber-cafe operator would have a copy of her ID – remember that many ID documents have phone numbers and addresses. He may then take her photograph using his own camera. One can only hope that he will take only a mug-shot without using the zoom lens inappropriately. He would also use a software – to log her Internet activities and make a reasonable guess on her HIV status.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The average Facebook page may have 50 different URLs to display the various images, animations and videos that are linked to that page. Each of those URLs would be stored, regardless of whether she scrolls down to see any of them.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The cyber-cafe operator is obliged under the Cyber Cafe rules to store this information for a period of one year. But there are no clear guidelines on when and how he should dispose of these logs. An unethical operator could leak the logs to a marketeer, a spammer, a neighbourhood Romeo or the local moral police. A careless operator maybe vulnerable to digital or physical theft and before you know it, such logs could end up on the Internet.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Ever since 26/11, cyber-cafes in metros have been photocopying ID documents – but so far not a single terrorist attack has been foiled or a crime solved thanks to this highly intrusive measure. But despite the lack of evidence to prove the efficacy of the current levels of surveillance, the government has decided to expand them exponentially.&lt;/p&gt;
&lt;p&gt;Imagine again: A media organisation such as Deccan Herald is investigating a public interest issue with the help of a whistle-blower or an anonymous informant. Deccan Herald reporters may think that by turning the encryption on when using Gmail or Hotmail they are protecting their source.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;But the ISP serving Deccan Herald is obliged by the license terms to log all traffic be it broadband, dial-up or mobile users passing through it. Again, there are no clear guidelines on when to delete these logs and none of the Indian ISPs publicly publish a data retention policy. Besides retaining data, the ISPs have to install real-time surveillance equipment within their network infrastructure and make them available for government officials. If a government official wants to track who is talking to Deccan Herald reporters, he just has to ask. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;With ISPs and online service providers – all the police have to do is send an information request under Section 92 of the Code of Criminal Procedure. In other words, they don't even have to bother about a court order. Between January 2010 to June 2010 Google received 1,430 information requests from India. &amp;nbsp;Many other companies, for example, Microsoft, are not as transparent as Google about the state surveillance. So we will never know what they are subjected to.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;If the whistle-blower was using Blackberry, all traffic would be transferred from the device to the RIM's Network Operation Centre situated outside India in an encrypted tunnel before it travels onto the Internet. This prevents the government from learning which mail server is being used from the logs and surveillance equipment at the ISP premises. And that is why the government has been engaged in a five-year long public fight with RIM over access to Blackberry traffic.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Now, thanks to the IT Act, the government can demand the service providers, including RIM, to hand over the decryption keys by accusing any individual of a variety of vague offenses -- for example engaging in communication that is ‘grossly harmful’ or ‘harms minors in any way’ – &amp;nbsp;under the IT Act. Refusal to hand over the keys is punishable with a jail term of three years.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Finally, imagine that an Indian enterprise is developing trade-secrets or handling trade-secrets on behalf of their international partners. This enterprise is using a VPN or virtual private network for confidential digital communication. As per the ISP license all encryption above 40-bit is only permitted with written permission from DoT along with mandatory deposit of the decryption key.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In the age of wire-tap leaks, only a miniscule minority of international business partners would trust the government of India not to leak or misuse the keys that have been deposited with them. Most individuals, SMEs and large enterprises routinely use encryption higher than 40 bit strength. For example, Gmail uses128 bit and Skype uses 256 bit encryption. Many services use dynamic encryption, that is generate &amp;nbsp;different keys for each session.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;So far I have not heard of anyone who has actually secured permission or deposited the keys. In other words, the Indian enterprise has two choices – either break the law to protect business confidentiality or obey it and lose clients.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The IT Act (Amendment 2008) and its associated Rules, notified in April this year are a massive expansion of blanket surveillance on ordinary, law-abiding Indians. They represent a paradigm shift in surveillance and a significant dilution in privacy protections afforded to citizens under the Telegraph Act.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This has terrifying consequences for our plural society, free media and businesses. Department of Information Technology in particular Dr. Gulshan Rai's office has so far only brushed aside these concerns and denied receiving feedback from the industry and civil society. If our media continues to ignore this clamp down on our civil liberties, we will soon have to furnish ID documents before purchasing thumb drives. After all, Bin Laden was found using them in his Abbottabad home.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.deccanherald.com/content/165420/big-brother-watching-you.html"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-brother-watching-you'&gt;https://cis-india.org/internet-governance/blog/big-brother-watching-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-03-21T09:32:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you">
    <title>Big Brother is watching you</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you</link>
    <description>
        &lt;b&gt;India has no requirements of transparency whether in the form of disclosing the quantum of interception or in the form of notification to people whose communication was intercepted.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article by Chinmayi Arun was &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/big-brother-is-watching-you/article5530857.ece"&gt;published in the Hindu&lt;/a&gt; on January 3, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Gujarat telephone tapping controversy is just one of  many kinds of abuse that surveillance systems enable. If a relatively  primitive surveillance system can be misused so flagrantly despite  safeguards that the government claims are adequate, imagine what is to  come with the Central Monitoring System (CMS) and Netra in place.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;News  reports indicate Netra — a “NEtwork TRaffic Analysis system” — will  intercept and examine communication over the Internet for keywords like  “attack,” “bomb,” “blast” or “kill.” While phone tapping and the CMS  monitor specific targets, Netra is vast and indiscriminate. It appears  to be the Indian government’s first attempt at mass surveillance rather  than surveillance of predetermined targets. It will scan tweets, status  updates, emails, chat transcripts and even voice traffic over the  Internet (including from platforms like Skype and Google Talk) in  addition to scanning blogs and more public parts of the Internet.  Whistle-blower Edward Snowden said of mass-surveillance dragnets that  “they were never about terrorism: they’re about economic spying, social  control, and diplomatic manipulation. They’re about power.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;So  far, our jurisprudence has dealt with only targeted surveillance; and  even that in a woefully inadequate manner. This article discusses the  slow evolution of the right to privacy in India, highlighting the  context and manner in which it is protected. It then discusses  international jurisprudence to demonstrate how the right to privacy  might be protected more effectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy and the Constitution&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A  proposal to include the right to privacy in the Constitution was  rejected by the Constituent Assembly with very little debate.  Separately, a proposal to give citizens an explicit fundamental right  against unreasonable governmental search and seizure was also put before  the Constituent Assembly. This proposal was supported by Dr. B.R.  Ambedkar. If accepted, it would have included within our Constitution  the principles from which the United States derives its protection  against state surveillance. However, the proposed amendment was rejected  by the Constituent Assembly.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Fortunately, the  Supreme Court has gradually been reading the right to privacy into the  fundamental rights explicitly listed in the Constitution. After its  initial reluctance to affirm the right to privacy in the 1954 case of &lt;i&gt;M.P. Sharma vs. Satish Chandra, &lt;/i&gt;the  court came around to the view that other rights and liberties  guaranteed in the Constitution would be seriously affected if the right  to privacy was not protected. In &lt;i&gt;Kharak Singh vs. The State of U.P., &lt;/i&gt;the  court recognised “the right of the people to be secure in their  persons, houses, papers, and effects” and declared that their right  against unreasonable searches and seizures was not to be violated. The  right to privacy here was conceived around the home, and unauthorised  intrusions into homes were seen as interference with the right to  personal liberty.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;If the &lt;i&gt;Kharak Singh &lt;/i&gt;judgment  was progressive in its recognition of the right to privacy, it was  conservative about the circumstances in which the right applies. The  majority of judges held that shadowing a person could not be seen to  interfere with that person’s liberty. Dissenting with the majority,  Justice Subba Rao maintained that broad surveillance powers put innocent  citizens at risk, and that the right to privacy is an integral part of  personal liberty. He recognised that when a person is shadowed, her  movements will be constricted, and will certainly not be free movements.  His dissenting judgment showed remarkable foresight and his reasoning  is consistent with what is now a universally acknowledged principle that  there is a “chilling effect” on expression and action when people think  that they are being watched.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The right to privacy as defined by the Supreme Court now extends beyond government intrusion into private homes. After &lt;i&gt;Govind vs. State of M.P.&lt;/i&gt;, and &lt;i&gt;Dist. Registrar and Collector of Hyderabad vs. Canara Bank&lt;/i&gt;,  this right is seen to protect persons and not places. Any inroads into  this right for surveillance of communication must be for permissible  reasons and according to just, fair and reasonable procedure. State  action in violation of this procedure is open to a constitutional  challenge.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Our meagre procedural safeguards against phone tapping were introduced in &lt;i&gt;PUCL vs. Union of India &lt;/i&gt;(1997)  after the Supreme Court was confronted with extensive, undocumented  phone tapping by the government. The apex court found itself compelled  to lay down what it saw as bare minimum safeguards, consisting mostly of  proper record-keeping and internal executive oversight by senior  officers such as the home secretary, the cabinet secretary, the law  secretary and the telecommunications secretary. These safeguards are of  little use since they are opaque and rely solely on members of the  executive to review surveillance requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Right and safeguards&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;There  is a difference between targeted surveillance in which reasons have to  be given for surveillance of particular people, and the  mass-surveillance which Netra sets up. The question of mass surveillance  and its attendant safeguards has been considered by the European Court  of Human Rights in &lt;i&gt;Liberty and Others vs. the United Kingdom&lt;/i&gt;.  Drawing upon its own past jurisprudence, the European Court insisted on  reasonable procedural safeguards. It stated quite clearly that there are  significant risks of arbitrariness when executive power is exercised in  secret and that the law should be sufficiently clear to give citizens  an adequate indication of the circumstances in which interception might  take place. Additionally, the extent of discretion conferred and the  manner of its exercise must be clear enough to protect individuals from  arbitrary interference. The principles laid down by the European Court  in relation to phone-tapping also require that the nature of the  offences which may give rise to an interception order, the procedure to  be followed for examining, using and storing the data obtained, the  precautions to be taken when communicating the data to other parties,  and the circumstances in which recordings may or must be erased or the  tapes destroyed be made clear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;b&gt;Opaque and ineffective&lt;/b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Our  safeguards apply only to targeted surveillance, and require written  requests to be provided and reviewed before telephone tapping or  Internet interception is carried out. CMS makes the process of tapping  more prone to misuse by the state, by making it even more opaque: if the  state can intercept communication directly, without making requests to a  private telecommunication service provider, then it is one less layer  of scrutiny through which the abuse of power can reach the public. There  is no one to ask whether the requisite paperwork is in place or to  notice a dramatic increase in interception requests.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;India  has no requirements of transparency whether in the form of disclosing  the quantum of interception taking place each year, or in the form of  subsequent notification to people whose communication was intercepted.  It does not even have external oversight in the form of an independent  regulatory body or the judiciary to ensure that no abuse of surveillance  systems takes place. Given these structural flaws, the Amit Shah  controversy is just the beginning of what is to come. Unfettered mass  surveillance does not bode well for democracy.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;&lt;i&gt;(Chinmayi  Arun is research director, Centre for Communication Governance,  National Law University, Delhi, and fellow, Centre for Internet and  Society, Bangalore.)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you'&gt;https://cis-india.org/internet-governance/blog/the-hindu-january-3-2014-chinmayi-arun-big-brother-is-watching-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-06T09:31:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete">
    <title>Big Brother is here: Amid snooping row, govt report says monitoring system 'practically complete'</title>
    <link>https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete</link>
    <description>
        &lt;b&gt;The recently released 2017-18 annual report of the Centre for Development of Telematics (C-DOT) says that surveillance equipment is being rolled out in 21 service areas across the country.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Keerthana Sankaran was published in &lt;a class="external-link" href="http://www.newindianexpress.com/nation/2018/dec/24/big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete-1915866.html"&gt;New Indian Express&lt;/a&gt; on December 26, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;While last week's government order on  snooping caused an uproar, the Centre's plans for a far-reaching  monitoring system have been in the making for almost a decade -- with  the groundwork being done by the previous UPA regime. The recently  released 2017-18 annual report of the Centre for Development of  Telematics (C-DOT) says that India’s ‘Central Monitoring System’ (CMS)  is “practically complete”, confirming that the Orwellian ‘Big Brother’  is here.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report says that surveillance equipment is being rolled out in 21  service areas across the country and operations have commenced in 12  service areas. The system will monitor and intercept calls and messages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government claims the CMS is based on the Telegraph Act of 1885  which states that the central or state government may intercept messages  if the government is “satisfied that it is necessary or expedient to do  so in the interests of the sovereignty and integrity of India, the  security of the state, friendly relations with foreign states or public  order or for preventing incitement to the commission of an offence.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even though the surveillance system was publicly announced in 2009,  C-DOT’s annual report of 2007-2008 had hinted at a testing phase for a  “lawful interception, monitoring” system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A post from the website of the Centre for Internet and Society describes how the CMS could work. Network providers are all required to give interconnected Regional Monitoring Centres access to their network servers. The article also points out that there is no law that describes the CMS.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS was approved by the Cabinet Committee on Security during the  UPA government in 2011, receiving flak from experts and the press for  not safeguarding the citizen’s right to privacy. However, in a Lok Sabha  session in May 2016, Telecom Minister Ravi Shankar Prasad said that the  system is for the “process of lawful interception”, adding that  regional monitoring centres in Delhi and Mumbai had been  operationalised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The latest C-DOT report also talks about a Centre of Excellence for  Lawful Interception being set up, which would use high-end technologies -  such as open source intelligence, image processing and search engine  tools to scan Twitter and Facebook - for surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Thursday, the Ministry of Home Affairs released a notification,  authorising 10 central agencies to intercept, monitor and decrypt any  "information generated, transmitted, received or stored in any  computer." While the public and opposition parties expressed alarm over  the new order, the C-DOT report clearly shows that state surveillance  plans are already in an advanced stage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These government moves are taking place despite the August 2017  landmark judgement by the Supreme Court, which declared the right to  privacy as a fundamental right which will protect citizens from  intrusive activities by the state.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete'&gt;https://cis-india.org/internet-governance/news/new-indian-express-keerthana-sankaran-december-26-2018-big-brother-is-here-amid-snooping-row-govt-report-says-monitoring-system-practically-complete&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-26T15:22:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/outlookindia-october-28-2013-debarshi-dasgupta-beyond-the-searchlight">
    <title>Beyond the Searchlight</title>
    <link>https://cis-india.org/news/outlookindia-october-28-2013-debarshi-dasgupta-beyond-the-searchlight</link>
    <description>
        &lt;b&gt;Should we be wary of Google’s all-pervasiveness? &lt;/b&gt;
        &lt;p&gt;This article Debarshi Dasgupta was &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?288214"&gt;published in the Outlook&lt;/a&gt; on October 23, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Search Google&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Some queries to type in the window&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Is what is good for Google good for India, especially after Brazil and the EU question its actions?&lt;/li&gt;
&lt;li&gt;Are politicians sending out the right signals by associating with Google’s initiatives?&lt;/li&gt;
&lt;li&gt;Is Google directing the internet intellectual discourse in a way that will benefit it?&lt;/li&gt;
&lt;li&gt;Does Google initiate the kind of offline activities it does here in other democracies?&lt;/li&gt;
&lt;li&gt;Is Google shutting out potential competition by obtaining a stranglehold on the internet?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Google’s policy, its CEO Eric Schmidt had once said, was to get right  up to the creepy line, but not cross it. It has generated contentious  debate about the firm’s activities and products, whether it’s accessing  your e-mails to feed you targeted ads, something we have now come to  accept grudgingly, or its soon-to-be-rel­eased Google Glass that comes  fitted with miniature cameras and has advocates all worried about the  next big breach on the privacy frontier.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Not just online, where privacy violations and anti-competitive  practices have raised concerns globally, some of Google’s offline  activities in India too should have us asking questions based on  conflict of interest and lack of transparency. Here too, the company  seems to have placed itself right next to the creepy line. Especially  the way it has gone about sponsoring research at key think-tanks and  academia on areas that direc­tly concern its business interests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nothing illustrates this better than the work of PRS Legislative  Research, which Google has funded  in the past. PRS produces policy  briefi­ngs that are sent out to lawmakers and the media, including on  internet governance. PRS hasn’t got a clearance to receive foreign funds  since it became independent of the Centre for Policy Research in 2010,  where it was launched, and has since then been largely funded by  domestic sources.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ISpy.png/@@images/3132fe8b-54a1-4e6b-a14a-f744172a7cc9.png" alt="I Spy" class="image-inline" title="I Spy" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Prashant.png" alt="Prashant" class="image-inline" title="Prashant" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prashant Reddy, Blogger&lt;/p&gt;
&lt;p&gt;&lt;b&gt;“That an Indian user seeking arbitration&lt;br /&gt;with Google has to do so in a California &lt;br /&gt;court reeks of double standards.”&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Does this growing network mean Google is having a say in shaping  internet governance laws? Maybe yes. They should have a say by all  means, just as other interested parties must get theirs. But given its  influence and the certain opaqueness that marks its activities, some  more transparency can only boost the cred­entials of a firm whose  informal motto is—“Don’t be evil”. Google may have helped you find that  bit of information from the googol tera bytes of online data but it has  so far largely evaded discussion on how it has gone on to become big and  influential in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But while it may have been forced to back out from fun­ding PRS   direc­tly, Google’s web of res­earch fellows in this country is growing.   In August this year, the Asia Internet Coalition, of which Goo­gle is a   founding member, selected its two inaugural India fellows—Shehla  Rashid  Shora and Astik Sinha, both of whom will analyse policies  concerning  the internet environment here. Sinha also happens to be a  social media  advisor for BJP MP Anurag Thakur.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;So big that it hobnobs with Narendra Modi in the first of its Hangout series  and, quite contrary to its espousal of free speech, has comfortable  questions pitched to him. Or so influential that it has telecom minister  Kapil Sibal, its bete noire from 2011 when his ministry was forcing  them to pull down content, to attend the launch of  chand­nichowkonline.in, a business direct­ory of Sibal’s constituency. &lt;i&gt;Outlook&lt;/i&gt; made several attempts to get a reaction from Google but rec­eived none by the time this article had to go to the press.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Google.png" alt="Nikon" class="image-inline" title="Nikon" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="fsppicturecaption"&gt;&lt;b&gt;Blurred lines&lt;/b&gt; Paid ads seem no different from search results for cameras &lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Google, since 2011, has also placed three fellows so far under its  annual Google Public Policy Fellowship prog­ramme at the Bangalore-based  Cen­tre for Internet and Society (CIS). The research is supposed to  focus on “acc­ess to knowledge, openness in India, freedom of  expression, pri­vacy, and telecom”. Yet another crucial funding in May  2013 went to the Centre for Communication Gover­na­nce at the National  Law University in New Delhi, which does research on areas directly  linked to its business interests. The agreement contains a clause that  says “Google will not be excluded from any future business  opportunities”. Its research director Chi­n­mayi Arun did not respond to  &lt;i&gt;Outlook&lt;/i&gt;’s e-mail and said she was too busy to speak when &lt;i&gt;Outlook&lt;/i&gt; called her up.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;A third institution Google has fun­ded is the media watch website The  Hoot. After the 26/11 attacks in Mum­bai when the government hastily  amended the IT Act, clamping down in a restrictive spirit, noted  journalist and the website’s editor Sevanti Ninan was one of the many  criticising the government publi­cly in her articles. Google, she says,  contac­ted her somewhere around mid-2009 seeking a proposal on how they  could help with what she was working on. Ninan sent one proposing a Free  Speech Hub and received a grant of $22,000 in January 2010  (approximately Rs 10 lakh at 2010 exchange rates) from Google to do so.  The hub is an online forum to track free speech violation and highlight  problems surrounding freedom of speech and expression and regulation of  media.&lt;/p&gt;
&lt;p&gt;The commitment was renewed in February 2012 with ano­ther grant  of Rs 42 lakh. Ninan says that while Goo­gle was “not interested in  media ethics but free speech”, its app­roach was entirely “hands-off” to  what the site could include on the hub. “I think it’s entirely up to  the org­anisation being funded to decide how it handles a grant. At the  same time, anything Google does should be under scrutiny just like other  corporations.”&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Anja.png" alt="Anja Kovacs" class="image-inline" title="Anja Kovacs" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;“More transparency&lt;br /&gt;and accountability&lt;br /&gt;can only be good,&lt;br /&gt;both for Google and for the organisation&lt;br /&gt;it funds.”&lt;br /&gt;&lt;/b&gt;Anja Kovacs, Internet Democracy Project&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;So just as it is necessary to publicise that Shell has ties with the India  chapter of Brookings Institution or that Reliance sponsors the Observer  Resea­rch Foundation, it is important that people know where Google is  putting its money and for what gains. In fact, more so in the case of  Google, a firm that touches our lives in so many more ways that Shell or  Reliance does. Yet, a lot of what Google has been doing has gone  without adequate publicity and scrutiny. Should we be any less sceptical  of Google funding resea­rch that helps formulate policies on internet  governance than we should be of, let’s say, the Tatas and Jindals on  mining? “Google has huge money and its funding of research can be a very  contentious issue, especially if it seeks to influence resea­rch.  Therefore, parties who swear by full disclosure and transparency must  adhere to it,” says senior journalist Paranjoy Guha Thakurta. “More  transpare­ncy and accountability can only be good, both for Google and  the organisations it funds,” adds Anja Kovacs, who works with the  Internet Democracy Project.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/narendramodi.png" alt="Narendra Modi" class="image-inline" title="Narendra Modi" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="fsppicturecaption"&gt;&lt;b&gt;The great connector&lt;/b&gt; Hangout with Narendra Modi&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;But there has been little of that transparency online. For instance, the  Rules and Regulations Review of The Infor­mation Technology Rules, 2011,  put out and sent to MPs by PRS Legislative Research has no mention that  an interested party (Google) has funded its work. Similarly, The Hoot  has no mention of Google funding it on the ‘About the Hub’ page even  though it has details of Google’s funding on the ‘Support The Hoot’  page. Google has also funded numerous ngos, in areas such as health and  education, and has sought to promote the use of technology (often  theirs, such as in the ongoing Google Impact Challenge Award).&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/sunil.png" alt="sunil" class="image-inline" title="sunil" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;“Because there is &lt;br /&gt;no privacy &lt;br /&gt;commissioner, &lt;br /&gt;Indian citizens are &lt;br /&gt;left vulnerable to &lt;br /&gt;Google when it comes to &lt;br /&gt;privacy.”&lt;/b&gt;&lt;br /&gt;Sunil Abraham, CIS, Bangalore&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;This offline influence apart, Google’s hold online is worrying enough to  call for action. The way it manipulates search results to favour  clients of its AdSense programme is a global concern. For instance, a  search for a popular phone model throws up matches of Google’s clients  and features them more prominently than the actual site of the product.  The Jaipur-based Consumer Unity and Trust Society (CUTS) conducted a  survey that found most internet users could not tell an ad from an  organic search result from Google. Says Madhav Dar, an independent  anti-trust economist, “Given its financial clout and dominance of  e-commerce, Google can directly deny traffic to downstream sites. And  because the internet ecosystem is still in a formative stage here, this  is something that requires intense and urgent scrutiny by the  Competition Commission of India (CCI).”&lt;/p&gt;
&lt;p&gt;CUTS filed a formal complaint with the CCI in June last year alleging  anti-competitive practices and abuse of its dominant position.  Bharat­Matrimony.com too filed a complaint with the CCI in 2012 accusing  it of directing online users’ search for “Bharat+Matrimony” to its  rivals.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;For many, Google crossed the creepy line when it declared, in a court  filing in August this year, that people sending e-mails to any of  Google’s 425 million Gmail users need have no “reasonable expectation”  that their communications are confidential. This is something that  concerns Sunil Abraham, the executive director of CIS, which hosts  Google fellows but has received no funding from the firm. “India has no  omnibus horizontal statutes, neither sufficiently evolved vertical  statutes in specific areas of telecommunication or the internet,” he  says. “And because of that there is no office of the privacy  commissioner in India and the absence of this regulator doesn’t tame the  voracious appetite that Google has for personal information. This  happens in other jurisdictions, but the Indian citizen is left  vulnerable to Google when it comes to privacy.” “Part of Google’s  practice can be absolutely abhorrent, such as the way in which it seeks  to have a monopoly in digitising information and being the only one to  organise it,” adds Kovacs.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/amitabh.png" alt="Amitabh" class="image-inline" title="Amitabh" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Amitabh Bachchan Google maps his home at WEF in Davos&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Another controversial move online has been the decision between Airtel and Google to allow the former’s subscribers free usage of Google’s service up to 1 GB. This has thrown up concerns of violation of “network neutrality”, a widely acknowledged concept that requires internet service providers to not discriminate against third party applications and service.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Journalist and blogger Shivam Vij, however, thinks concerns surrounding Google’s offline activities are misplaced. “As long as they keep coming out with transparency reports that show the majority of requests for user data and content removal are refused, I’d consider them an ally. One should be grateful that Google is funding to protect free speech and ashamed that Indian firms aren’t,” he says. “And if they really have been trying to influence MPs, they would have bribed them, not put out research.”&lt;/p&gt;
&lt;p&gt;Nikhil Pahwa, who runs Medianama, a digital media news and analysis website, is another person who says “he won’t look a gift horse in the mouth”. “I don’t know what the motives are, but I support what they are doing, especially given the way the state and Indian firms are failing us when it comes to protecting free speech online,” he adds. The only concern he has about Google is regarding its reported unwillingness to agree to a deal between the Advertising Agencies Association of India (AAAI) and the Internet and Mobile Association of India (IAMAI). The deal seeks to ensure smaller online publishers and advertising networks are paid on time by advertisers, who, in most cases, delay payments to smaller entities but always pay bigger players like Google on time. “Smaller players are suffering due to delay in payments, which can extend up to a year, a problem that Google does not face. The IAMAI initiative is something that Google is unwilling to support because it does not impact them,” he adds.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/SevantiNinan.png" alt="Sevanti Ninan" class="image-inline" title="Sevanti Ninan" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;"Anything that &lt;br /&gt;Google does should &lt;br /&gt;be under scrutiny &lt;br /&gt;just like other corporations."&lt;/b&gt;&lt;br /&gt;Sevanti Ninan, Editor, The Hoot&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ChandniChowk.png" alt="Chandni Chowk" class="image-inline" title="Chandni Chowk" /&gt;&lt;/th&gt;&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Qutub.png" alt="Qutub" class="image-inline" title="Qutub" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;&lt;span class="fsppicturecaption"&gt;&lt;b&gt;The outreach&lt;/b&gt; Sibal attends the launch of chandnichowkonline, a business directory of his constituency; Qutub Minar, digitised&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Criticising or questioning some of Google’s policies does not amount to  siding with the government on cracking down on free speech on the  internet. &lt;a href="http://images.outlookindia.com/images/coverpics/outlookindia/large/big_cover_20111219.jpg" target="_blank"&gt;&lt;i&gt;Outlook&lt;/i&gt; ran a cover in December 2011&lt;/a&gt; where it was severely critical of the government’s atte­mpt to muzzle  online dissent. Neither does concern about Google’s activities stem from  a fear of the foreign hand. Its expansion into Indian civil society has  to be seen as an attempt by a profits-driven corporation to ensure its  market interests in India are protected. The country becomes all the  more important given the trouble it has been having in Brazil and in  Europe, where the firm has been slapped with a slew of anti-trust  charges. Keeping a close watch will only help enforce Google’s policy in  India—not crossing the creepy line.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/outlookindia-october-28-2013-debarshi-dasgupta-beyond-the-searchlight'&gt;https://cis-india.org/news/outlookindia-october-28-2013-debarshi-dasgupta-beyond-the-searchlight&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-23T11:15:27Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill">
    <title>Beyond the PDP Bill: Governance Choices for the DPA</title>
    <link>https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill</link>
    <description>
        &lt;b&gt;This article  examines the specific governance choices the Data Protection Authority (DPA) in India  must deliberate on vis-à-vis its standard-setting function, which are distinct from those it will encounter as part of its enforcement and supervision functions.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The Personal Data Protection Bill, 2019, was introduced in the Lok Sabha on 11 December 2019. It lays down an overarching framework for personal data protection in India. Once revised and approved by Parliament, it is likely to establish the first comprehensive data protection framework for India. However, the provisions of the Bill are only one component of the forthcoming data protection framework It further proposes setting up the Data Protection Authority (DPA) to oversee the final enforcement, supervision, and standard-setting. The Bill consciously chooses to vest the responsibility of administering the framework with a regulator instead of a government department. As an independent agency, the DPA is expected to be autonomous from the legislature and the Central Government and capable of making expert-driven regulatory decisions in enforcing the framework.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Furthermore, the DPA is not merely an implementing authority; it is also expected to develop privacy regulations for India by setting standards. As such, it will set the day-to-day obligations of regulated entities under its supervision. Thus, the effectiveness with which it carries out its functions will be the primary determinant of the impact of this Bill (or a revised version thereof) and the data protection framework set out under it.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The final version for the PDP Bill may or may not provide the DPA with clear guidance regarding its functions. In this article, we emphasise the need to look beyond the Bill and instead examine the specific governance choices the DPA must deliberate on vis-à-vis its standard-setting function, which are distinct from those it will encounter as part of its enforcement and supervision functions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;A brief timeline of the genesis of a distinct privacy regulator for India&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The vision of an independent regulator for data protection in India emerged over the course of several intervening processes that set out to revise India’s data protection laws. In fact, the need for a dedicated data protection regulation for India, with enforceable obligations and rights, was debated years before the &lt;a href="https://thewire.in/government/privacy-aadhaar-supreme-court"&gt;Aadhaar&lt;/a&gt;, &lt;a href="https://www.thehindu.com/news/national/urgent-need-for-data-protection-laws-experts/article23314655.ece"&gt;Cambridge Analytica&lt;/a&gt;, and &lt;a href="https://www.livemint.com/opinion/online-views/pegasus-has-given-privacy-legislation-a-jab-of-urgency-11628181453098.html"&gt;Pegasus&lt;/a&gt;&lt;sup&gt; &lt;/sup&gt;revelations captured the public imagination and mainstreamed conversations on privacy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;Right to Privacy Bill, 2011&lt;/a&gt;, which never took off, recognised the right to privacy in line with Article 21 of the Constitution of India, which pertains to the right to life and personal liberty. The Bill laid down express conditions for collecting and processing data and the rights of data subjects. It also proposed setting up a Data Protection Authority (DPA) to supervise and enforce the law and advise the government in policy matters. Upon review by the Cabinet, it was &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;suggested&lt;/a&gt; that the Authority be revised to an Advisory Council, given its role under the Bill was limited.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Subsequently, in 2012, the AP Shah Committee Report &lt;a href="https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy.pdf"&gt;recommended&lt;/a&gt; a principle-based data protection law, focusing on set standards while refraining from providing granular rules, to be enforced through a co-regulatory structure. This structure would consist of central and regional-level privacy commissioners, self-regulatory bodies, and data protection officers appointed by data controllers. There were also a few private members’ bills &lt;a href="https://saveourprivacy.in/media/all/Brief-PDP-Bill-25.12.2020.pdf"&gt;introduced&lt;/a&gt; between 2011 and 2019.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;None of these efforts materialised, and the regulatory regime for data protection and privacy remained embedded within the Information Technology Act, 2000, and the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (SPDI Rules). Though the &lt;a href="https://www.meity.gov.in/writereaddata/files/GSR313E_10511%281%29_0.pdf"&gt;SPDI Rules&lt;/a&gt; require body corporates to secure personal data, their enforcement is &lt;a href="https://www.indiacode.nic.in/show-data?actid=AC_CEN_45_76_00001_200021_1517807324077&amp;amp;orderno=49"&gt;limited&lt;/a&gt; to cases of negligence in abiding by these limited set of obligations pertaining to sensitive personal information only, and which have caused wrongful loss or gain – a high threshold to prove for aggrieved individuals. Otherwise, the &lt;a href="https://www.meity.gov.in/writereaddata/files/GSR314E_10511%281%29_0.pdf"&gt;Intermediary Guidelines&lt;/a&gt;, 2011 require all intermediaries to generally follow these Rules under Rule 3(8).&amp;nbsp; The enforcement of these obligations is &lt;a href="https://www.ikigailaw.com/dispute-resolution-framework-under-the-information-technology-act-2000/#acceptLicense"&gt;entrusted&lt;/a&gt; to adjudicating officers (AO) appointed by the central government, who are typically bureaucrats appointed as AOs in an ex-officio capacity.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;By 2017, the Aadhaar litigations had provided additional traction to the calls for a dedicated and enforceable data protection framework in India. In its judgement, the Supreme Court &lt;a href="https://main.sci.gov.in/supremecourt/2012/35071/35071_2012_Judgement_24-Aug-2017.pdf"&gt;recognised&lt;/a&gt; the right to privacy as a fundamental right in India and stressed the need for a dedicated data protection law. Around the same time, the Ministry of Electronics and Information Technology (MeitY) constituted a &lt;a href="https://pib.gov.in/newsite/PrintRelease.aspx?relid=169420"&gt;committee of experts&lt;/a&gt; under the chairmanship of Justice BN Srikrishna. The Srikrishna Committee undertook public consultations on a 2017 &lt;a href="https://www.meity.gov.in/writereaddata/files/white_paper_on_data_protection_in_india_171127_final_v2.pdf"&gt;white paper&lt;/a&gt;, which culminated in the nearly comprehensive &lt;a href="https://www.meity.gov.in/writereaddata/files/Personal_Data_Protection_Bill,2018.pdf"&gt;Personal Data Protection Bill, 2018&lt;/a&gt;, and an accompanying &lt;a href="https://www.meity.gov.in/writereaddata/files/Data_Protection_Committee_Report.pdf"&gt;report&lt;/a&gt;. This 2018 Bill outlined a regulatory framework of personal data processing for India and defined data processing entities as fiduciaries, which owe a duty of care to individuals to whom personal data relates. The Bill provided for the setting up of an independent regulator that would, among other things, specify further standards for data protection and administer and enforce the provisions of the Bill.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;MeitY invited public comments on this Bill and tabled a revised version, the Personal Data Protection &lt;a href="http://164.100.47.4/BillsTexts/LSBillTexts/Asintroduced/373_2019_LS_Eng.pdf"&gt;Bill&lt;/a&gt;, 2019 (PDP Bill), in the Lok Sabha in December 2019. Following public pressure calling for detailed discussions on the Bill before its passing, it was referred to a &lt;a href="http://loksabhaph.nic.in/Committee/CommitteeInformation.aspx?comm_code=73&amp;amp;tab=1"&gt;Joint Parliamentary Committee&lt;/a&gt; (JPC) constituted for this purpose. It currently remains under review; the JPC is &lt;a href="https://www.hindustantimes.com/india-news/need-state-level-data-protection-authorities-joint-parliamentary-committee-mp-amar-patnaik-101632679181340.html"&gt;reportedly&lt;/a&gt; expected to table its report in the 2021 Winter Session of Parliament. Though the Bill is likely to undergo another &lt;a href="https://www.hindustantimes.com/india-news/over-100-drafting-changes-proposed-to-jpc-on-data-protection-bill-101631730726756.html"&gt;round of revisions&lt;/a&gt; following the JPC’s review, this is the closest India has come to realising its aspirations of establishing a dedicated and enforceable data protection framework.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This Bill carries forward the choice of a distinct regulatory body, though &lt;a href="https://thewire.in/tech/india-data-protection-authority-needs-constitutional-entrenchment"&gt;questions remain&lt;/a&gt; on the degree of its independence, given the direct control granted to the central government in appointing its members and funding the DPA.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Conceptualising an Independent DPA&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Srikrishna Committee’s 2017 white paper and its 2018 report on the PDP Bill discuss the need for a regulator in the context of &lt;em&gt;enforcement&lt;/em&gt; of its provisions. However, the DPA under the PDP Bill is tasked with extensive powers to frame detailed regulations and codes of conduct to inform the day-to-day obligations of data fiduciaries and processors. To be clear, the standard-setting function for a regulator &lt;a href="https://ssrn.com/abstract=1393647"&gt;entails&lt;/a&gt; laying down the standards based on which regulated entities (i.e. the data fiduciaries) will be held accountable, and the manner in which they may conduct themselves while undertaking the regulated activity (i.e. personal data processing). This is in addition to its administrative and enforcement, and quasi-judicial functions, as outlined below:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Functions of the DPA under the PDP Bill 2019&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;img src="https://cis-india.org/home-images/PDPBill.png/@@images/93bcf598-962a-48f1-b1b1-78933dac5d27.png" alt="null" class="image-inline" title="PDP" /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;At this stage, it is important to note that the choice of regulation via a regulator is distinct from the administration of the Bill by the central or state governments. Creating a distinct regulatory body allows government procedures to be replaced with expert-driven decision-making to ensure sound economic regulation of the sector. At the same time, the independence of the regulatory authority &lt;a href="https://www.oxfordhandbooks.com/view/10.1093/law/9780198704898.001.0001/oxfordhb-9780198704898"&gt;insulates it&lt;/a&gt; from political processes. The third advantage of independent regulatory authorities is the scope for ‘operational flexibility’, which is embodied in the relative autonomy of its employees and its decision-making from government scrutiny.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is also the rationale provided by the Srikrishna Committee in stating their choice to entrust the administration of the data protection law to an independent DPA. The 2017 white paper that preceded the 2018 Srikrishna Committee Report proposed a distinct regulator to provide expert-driven enforcement of laws for the highly specialised data protection sphere. Secondly, the regulator would serve as a single point of contact for entities seeking guidance and will ensure consistency by issuing rules, standards, and guidelines. The Srikrishna Committee Report concretised this idea and proposed a sector-agnostic regulator that is expected to &lt;a href="https://www.meity.gov.in/writereaddata/files/Data_Protection_Committee_Report.pdf"&gt;undertake&lt;/a&gt; expertise-driven standard-setting, enforcement, and adjudication under the Bill.&lt;sup&gt; &lt;/sup&gt; The PDP Bill carries forward this conception of a DPA, which is distinct from the central government.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Conceptualised as such, the DPA has a completely new set of questions to contend with. Specifically, regulatory bodies require additional safeguards to overcome the legitimacy and accountability questions that &lt;a href="https://www.oxfordhandbooks.com/view/10.1093/law/9780198704898.001.0001/oxfordhb-9780198704898"&gt;arise&lt;/a&gt; when law-making is carried out not by elected members of the legislature, but via the unelected executive. The DPA would need to incorporate democratic decision-making processes to overcome the deficit of public participation in an expert-driven body. Thus, the meta-objective of ensuring autonomous, expertise-driven, and legitimate regulation of personal data processing necessitates that the regulator has sufficient independence from political interference, is populated with subject matter experts and competent decision-makers, and further has democratic decision-making procedures.&lt;/p&gt;
&lt;p&gt;Further, the standard-setting role of the regulator does not receive sufficient attention in terms of providing distinct procedural or substantive safeguards either in the legislation or public policy guidance.&lt;/p&gt;
&lt;h3&gt;Reconnaissance under the PDP Bill: How well does it guide the DPA?&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;At this time, the PDP Bill is the primary guidance document that defines the DPA and its overall structure. India also lacks an overarching statute or binding framework that lays down granular guidance on regulation-making by regulatory agencies.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The PDP Bill, in its current iteration, sets out skeletal provisions to guide the DPA in achieving its objectives. Specifically,&amp;nbsp; the Bill provides guidance limited to the following:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Parliamentary scrutiny of regulations:&lt;/em&gt; The DPA must table all its regulations before the Parliament. This is meant to accord &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;legislative scrutiny&lt;/a&gt; to binding legal standards promulgated by unelected officials.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;em&gt;Consistency with the Act:&lt;/em&gt; All regulations should be consistent with the Act and the rules framed under it. This integrates a standard of administrative law to a limited extent within the regulation-making process. &lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;However, India’s past track record &lt;a href="https://prsindia.org/theprsblog/how-well-does-parliament-examine-rules-framed-under-various-laws"&gt;indicates&lt;/a&gt; that regulations, once tabled before the Parliament, are rarely questioned or scrutinised. Judicial review is typically based on ‘thin’ procedural considerations such as whether the regulation is unconstitutional, arbitrary, &lt;em&gt;ultra vires&lt;/em&gt;, or goes beyond the statutory obligations or jurisdiction of the regulator. In any event, judicial review is possible only when an instrument is challenged by a litigant, and, therefore, it may not always be a robust &lt;em&gt;ex-ante&lt;/em&gt; check on the exercise of this power. A third challenge arises where instruments other than regulations are issued by the regulator. These could be circulars, directions, guidelines, and even FAQs, which are &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;rarely bound&lt;/a&gt; by even the minimal procedural mandate of being tabled before the Parliament. To be sure, older regulators including the Reserve Bank of India (RBI) and the Securities and Exchange Board of India (SEBI) also face similar issues, which they have attempted to address through various methods including voluntary public consultations, stakeholder meetings, and publication of minutes of meetings. These are useful tools for the DPA to consider as well.&lt;/p&gt;
&lt;p&gt;Apart from these, specific guidance is provided with respect to issuing and approving codes of practice and issuing directions as follows:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Codes of practice: The DPA is required to (i) ensure transparency,&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (ii) consult with other sectoral regulators and stakeholders, and (iii) follow a procedure to be prescribed by the central government prior to the notification of codes of practice under the Bill.&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Directions: The DPA may issue directions to individual, regulated entities or their classes from time to time, provided these entities have been given the opportunity to be heard by the DPA before such directions are issued.&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;However, the meaning of transparency and the process for engaging with sectoral regulators remains unspecified under the Bill. Furthermore, the central government has been provided vast discretion to formulate these procedures, as the Bill does not specify the principles or outcomes sought to be achieved via these procedures. The Bill also does not specify instances where such directions may be issued and in which form.&lt;/p&gt;
&lt;p&gt;Thus, as per its last publicly available iteration, the Bill remains silent on the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The principles that may guide the DPA in its functioning.&lt;/li&gt;
&lt;li&gt;The procedure to be followed for issuing regulations and other subordinate legislation under the Bill.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;The relevant regulatory instruments, other than regulations and codes of practice – such as circulars, guidelines, FAQs, etc. – that may be issued by the DPA.&lt;/li&gt;
&lt;li&gt;The specifics regarding the members and employees within the DPA who are empowered to make these regulations.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;It is unclear whether the JPC will revise the DPA’s structure or recommend statutory guidance for the DPA in executing any of its functions. This is unlikely, given that parent statutes for other regulators typically omit such guidance. As a result, the DPA may be required to make intentional and proactive choices on these matters, much like their regulatory counterparts in India. These are discussed in the section below.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Envisaging a Proactive Role for the DPA&lt;/h3&gt;
&lt;p&gt;As the primary regulatory body in charge of the enforcement of the forthcoming data protection framework, what should be the role of the DPA in setting standards for data protection?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The complexity of the subject matter, and the DPA’s role as the frontline body to define day-to-day operational standards for data protection for the entire digital economy, necessitates that it develop transparent guiding principles and procedures. Furthermore, given that the DPA’s autonomy and capacity are currently unclear, the DPA will need to make deliberate choices regarding how it conducts itself. In this regard, the skeletal nature of the PDP Bill also allows the DPA to determine its own procedures to carry out its tasks effectively.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is not uncommon in India: various regulators have devised frameworks to create benchmarks for themselves. The Airports Economic Regulatory Authority (AERA) is &lt;a href="http://aera.gov.in/aera/upload/uploadfiles/files/AERAACT.pdf"&gt;obligated&lt;/a&gt; to follow a dedicated consultation process as per an explicit transparency mandate under the parent statute. However, the Insolvency and Bankruptcy Board of India (IBBI) has, on its own initiative, &lt;a href="https://ibbi.gov.in/webadmin/pdf/legalframwork/2018/Oct/IBBI(Mechamism%20for%20Issuing%20Regulations)%20Regulations,%202018_2018-10-26%2011:59:43.pdf"&gt;formulated regulations&lt;/a&gt; to guide its regulation-making functions. In other cases, consultation processes have been integrated into the respective framework through judicial intervention: the Telecom Regulatory Authority of India (TRAI) has been mandated to undertake consultations through &lt;a href="https://clpr.org.in/wp-content/uploads/2018/10/Cellular-Operators-v.-TRAI.pdf"&gt;judicial interpretation&lt;/a&gt; of the requirement for transparency under the Telecom Regulatory Authority of India Act, 1997 (TRAI Act).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this regard, we develop a list of considerations that the DPA should look to address while carrying out its standard-setting functions. We also draw on best practices by Indian regulators and abroad, which can help identify feasible solutions for an effective DPA for India.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The choice of regulatory instruments&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The DPA is empowered to issue regulations, codes of practice, and directions under the Bill. At the same time, regulators in India routinely issue other regulatory instruments to assign obligations and clarify them. Some commonly used regulatory instruments are outlined below. The terms used for instruments are not standard across regulators, and the list and description set out below outline the main concepts and not fixed labels for the instruments.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;Overview of regulatory instruments&lt;/em&gt;&lt;/strong&gt;&lt;em&gt; &lt;/em&gt;&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Circulars   and Master Circulars&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Guidelines&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;FAQs&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Directions&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Content&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Circulars are used to prescribe detailed obligations   and prohibitions for regulated entities and can mimic regulations. Master   circulars consolidate circulars on a particular topic periodically.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;These may be administrative or substantive,   depending on the practice of the regulator in question.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Issued in public interest by regulators to   clarify the regulatory framework administered by them. They cannot prescribe   new standards or create obligations.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Issued to provide focused instructions to   individual entities or class of entities in response to an adjudicatory   action or in lieu of a current challenge.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Binding   character&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;They are generally &lt;a href="https://indiankanoon.org/doc/1588871/"&gt;binding&lt;/a&gt; in the &lt;a href="https://indiankanoon.org/doc/1316639/"&gt;same manner&lt;/a&gt; as regulations and rules. However, if they go beyond   the parent Act or existing rules and regulations, they may be &lt;a href="https://indiankanoon.org/doc/15876695/"&gt;struck down&lt;/a&gt; following a judicial review.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;They may or may not be binding depending   upon the language employed or the regulator’s practice.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Unclear whether these are binding and to   what extent. However, crucial clarifications on important concepts sometimes   emerge from FAQs.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Binding in respect of the class of regulated   entities to whom this is issued.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;strong&gt;Parliamentary   scrutiny&lt;/strong&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td colspan="4"&gt;
&lt;p&gt;Unlike regulations, these do not have to be   laid before the Parliament.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;Thus, all these instruments, to varying degrees, have &lt;a href="https://www.ncaer.org/news_details.php?nID=1399"&gt;been used&lt;/a&gt; to create binding obligations for regulated entities. The &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;choice of regulatory instrument&lt;/a&gt; is not made systematically. Indeed, even a &lt;a href="https://www.bis.org/bcbs/publ/d321.pdf"&gt;hierarchy of instruments&lt;/a&gt; and their functions are not clearly set out by most regulators. The &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;rationale&lt;/a&gt; for deciding why a circular is issued as against a regulation is also unclear. A study on regulatory performance in India by Burman and Zaveri (2018) has &lt;a href="https://static1.squarespace.com/static/59c0077a9f745650903ac158/t/5cb62147104c7ba2eaf637e4/1555439944606/Burman+V2.pdf"&gt;highlighted&lt;/a&gt; an over-reliance on instruments such as circulars. As per their study, between 2014 and 2016, RBI and SEBI issued 1,016 and 122 circulars, as against 48 and 51 regulations, respectively. These circulars are not bound by the same pre-consultative mandate nor are they mandated to be laid before the Parliament. While circulars may have&amp;nbsp; been intended for routine to routinely used to lay down administrative or procedural requirements, the study narrows its frame of reference to circulars which lay down substantive regulatory requirements. In this instance, it is unclear why parliamentary scrutiny is mandated for regulations alone, and not for instruments like circulars and directions, even though they lay down similarly substantive requirements. Furthermore, there have also been&lt;a href="https://indiacorplaw.in/2014/11/are-sebis-faqs-binding-on-partiessebi.html"&gt; instances&lt;/a&gt; where certain instruments like FAQs have gone beyond their advisory scope to provide new directions or definitions that were not previously shared under binding instruments like regulations or circulars.&lt;/p&gt;
&lt;p&gt;The DPA has been provided specific powers to issue regulations, codes of practice, and directions. However, the rationale for issuing one instead of the other has been &lt;a href="https://www.medianama.com/2020/01/223-pdp-bill-2019-data-protection-authority/"&gt;absent&lt;/a&gt; from the PDP Bill so far. In such a scenario, it is important that the DPA transparently outlines the &lt;em&gt;types&lt;/em&gt; of instruments it wishes to use, whether they are binding or advisory, and the procedure to be followed for issuing each.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Pre-legislative consultative rule-making&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p&gt;Participatory and consultative processes have emerged as core components of democratic rule-making by regulators. Transparent consultative mechanisms could also ameliorate capacity challenges in a new regulator (particularly for technical matters) and help enhance public confidence in the regulator.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In India, several regulators have adopted consultation mechanisms even when there is no specific statutory requirement. &lt;a href="https://www.sebi.gov.in/sebiweb/home/HomeAction.do?doListing=yes&amp;amp;sid=4&amp;amp;smid=35&amp;amp;ssid=38"&gt;SEBI&lt;/a&gt; and &lt;a href="https://ibbi.gov.in/public-comments/comments-on"&gt;IBBI&lt;/a&gt; routinely issue discussion papers and consultation papers. The RBI also issues draft instruments &lt;a href="https://www.rbi.org.in/Scripts/DraftNotificationsGuildelines.aspx"&gt;soliciting comments&lt;/a&gt;. As discussed previously, TRAI and AERA have distinct transparency mandates under which they carry out consultations before issuing regulations. However, these processes are not mandated all forms of subordinate legislation. Taking cognizance of this, the Financial Sector Legislative Reform Committee (FSLRC) has &lt;a href="https://dea.gov.in/sites/default/files/fslrc_report_vol1_1.pdf"&gt;recommended&lt;/a&gt; transparency in the regulation-making process. This was &lt;a href="https://dea.gov.in/sites/default/files/Handbook_GovEnhanc_fslrc_2.pdf"&gt;carried forward&lt;/a&gt; by the Financial Stability and Development Council (FSDC), which recommended that consultation processes should be a prerequisite for all subordinate legislations, including circulars, guidelines, etc. A &lt;a href="https://static1.squarespace.com/static/59c0077a9f745650903ac158/t/5cb62147104c7ba2eaf637e4/1555439944606/Burman+V2.pdf"&gt;study&lt;/a&gt; on regulators’ adherence to these mandates, spanning TRAI, AERA, SEBI, and RBI, demonstrated that this pre-consultation mandate is followed inconsistently, if at all. Predictable consultation practices are therefore critical.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Furthermore, the study stated that it &lt;a href="https://static1.squarespace.com/static/59c0077a9f745650903ac158/t/5cb62147104c7ba2eaf637e4/1555439944606/Burman+V2.pdf"&gt;could not determine&lt;/a&gt; whether the consultation processes yielded meaningful participation, given that regulators are not obligated to disclose how public feedback was integrated into the rule-making process. Subordinate legislations issued in the form of circulars and guidelines also do not typically undergo the same rigorous consultation processes. Thus, an ideal consultation framework would &lt;a href="https://ec.europa.eu/info/sites/default/files/better_regulation_joining_forces_to_make_better_laws_en_0.pdf"&gt;comprise&lt;/a&gt;:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Publication of the draft subordinate legislation along with a detailed explanation of the policy objectives. Further, the regulator should publish the internal or external studies conducted to arrive at the proposed legislation to &lt;a href="https://legalinstruments.oecd.org/public/doc/669/51f6da97-c198-4c93-922f-1a5d80beae86.pdf"&gt;engender&lt;/a&gt; meaningful discussion.&lt;/li&gt;
&lt;li&gt;Permitting sufficient time for the public and interested stakeholders to respond to the draft.&lt;/li&gt;
&lt;li&gt;Publishing all feedback received for the public to assess, and allowing them to respond to the feedback.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;However, beyond specifying the manner of conducting consultations, it will be important for the DPA to determine where they are mandatory and binding, and for which type of subordinate legislations. These are discussed in the next section.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Choice of consultation mandates for distinct regulatory      instruments&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;While the Bill provides for consultation processes for issuing and approving codes of practice, no such mechanism has been set out for other instruments. Nevertheless, specifying consultation mandates for different regulatory instruments is important to ensure that decision-making is consistent and regulation-making remains bound by transparent and accountable processes. As discussed above, regulatory instruments such as circulars and FAQs are not necessarily bound by the same consultation mandates in India. This distinction has been clarified in more sophisticated administrative law frameworks abroad. For instance, under the Administrative Procedures Act in the United States (US), all substantive rules made by regulatory agencies are &lt;a href="https://www.reginfo.gov/public/reginfo/Regmap/regmap.pdf"&gt;bound&lt;/a&gt; by a consultation process, which requires notice of the proposed rule-making and public feedback. This does &lt;a href="https://www.federalregister.gov/uploads/2011/01/the_rulemaking_process.pdf"&gt;not preclude&lt;/a&gt; the regulatory agency from issuing clarifications, guidelines, and supplemental information on the rules issued. These documents do not require the consultation process otherwise required for formal rules. However, they cannot be used to expand the scope of the rules, set new legal standards, or have the effect of amending the rules. Nevertheless, agencies are not precluded from choosing to seek public feedback on such documents.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Similarly, the Information Commissioner’s Office in the United Kingdom (UK) takes into consideration &lt;a href="https://ico.org.uk/about-the-ico/ico-and-stakeholder-consultations/"&gt;public consultations&lt;/a&gt; and &lt;a href="https://ico.org.uk/about-the-ico/ico-and-stakeholder-consultations/ico-call-for-views-on-employment-practices/"&gt;surveys&lt;/a&gt; while issuing toolkits and guidance for regulated entities on how to comply with the data protection framework in the UK.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Here, the DPA may choose to subject strictly binding instruments like regulations and codes of practice to pre-legislative consultation mandates, while softer mechanisms like FAQs may be subject to the publication of a detailed outline of the policy objective or online surveys to invite non-binding, advisory feedback. For each of these, the DPA will nonetheless need to create specific criteria by which it classifies instruments as binding and advisory, and further outline specific pre-legislative mandates for each category.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Framework for issuing regulatory instruments and instructions&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;While the DPA is likely to issue several instruments, the system based on which these instruments will be issued is not yet clear. Without a clearly thought-out framework, different departments within the regulator &lt;a href="https://www.nipfp.org.in/media/medialibrary/2018/08/WP_237_2018_0ciIwuT.pdf"&gt;typically issue&lt;/a&gt; a series of directions, circulars, regulations, and other instruments. This raises questions regarding the consistency between instruments. This also requires stakeholders to go through multiple instruments to find the position of law on a given issue. Older Indian regulators are now facing challenges in adapting their ad hoc system into a framework. For example, the RBI currently issues a series of circulars and guidelines that are periodically consolidated on a subject-matter basis as Master Circulars and Master Directions. These are then updated and published on their website. IBBI also publishes &lt;a href="https://ibbi.gov.in/uploads/publication/e42fddce80e99d28b683a7e21c81110e.pdf"&gt;handbooks&lt;/a&gt; and &lt;a href="https://ibbi.gov.in/publication/information-brochures"&gt;information brochures&lt;/a&gt; that consolidate instruments in an accessible manner.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While these are useful improvements, these practices cannot keep pace with rapid changes in regulatory instructions and are not complete or user-friendly (for example, the subject-matter based consolidation does not allow for filtering regulatory instructions by entity). Other jurisdictions have developed different techniques such as formal codification processes to consolidate regulations issued by government agencies under one &lt;a href="https://www.govinfo.gov/help/cfr"&gt;unified code&lt;/a&gt;, &lt;a href="https://www.oaic.gov.au/privacy/privacy-registers/privacy-codes-register/"&gt;register&lt;/a&gt;, or &lt;a href="https://www.handbook.fca.org.uk/handbook"&gt;handbook&lt;/a&gt;,&amp;nbsp; websites that allow for searches based on different parameters (subject-matter, type of instrument, chronology, entity-based), and &lt;a href="https://www.handbook.fca.org.uk/handbook-guides"&gt;guides&lt;/a&gt; tailored to different types of entities. The DPA, as a new regulator, can learn from this experience and adopt a consistent framework right from the beginning.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Further, an ethos of responsive regulation also requires the DPA to evaluate and revise directions and regulations periodically, in response to market and technology trends. A commitment to periodic evaluation of subordinate legislations entrenched in the rules is critical to reducing the dependence on officials and leadership, which may change. For instance, the &lt;a href="https://www.ibbi.gov.in/webadmin/pdf/whatsnew/2018/Oct/Mechanism%20for%20issuing%20regulations%20October%20after%20Board%20meeting%20final_2018-10-22%2020:42:06.pdf"&gt;IBBI&lt;/a&gt; has set out a mandatory review of regulations issued by it every three years.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Dedicating capacity for drafting subordinate legislations&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;The DPA has been granted the discretion to appoint experts and staff its offices with the personnel it needs. A &lt;a href="https://www2.deloitte.com/content/dam/Deloitte/nl/Documents/risk/deloitte-nl-risk-reports-resources.pdf"&gt;study&lt;/a&gt; of European data protection authorities shows that by the time the General Data Protection Regulation, 2016 became effective, most of the authorities increased the number of employees with some even reporting a 240% increase. The annual spending on the authorities also went up for most countries. While these authorities do not necessarily frame subordinate legislations, they nonetheless create guidance toolkits and codes of practice as part of their supervisory functions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In this regard, the DPA will need to ensure it has dedicated capacity in-house to draft subordinate legislations. Since regulators are generally seen as enforcement authorities, there is inadequate investment in capacity-building for drafting legislations in India.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Moreover, considering the multiplicity of instruments and guidance documents the DPA is expected to issue, it may seek to create templates for these instruments, along with compulsory constituents of different types of instruments. For instance, the Office of the Australian Information Commissioner is required to include a &lt;a href="https://www.oaic.gov.au/privacy/guidance-and-advice/guidelines-for-developing-codes/"&gt;mandatory set of components&lt;/a&gt; while issuing or approving binding industry codes of practice.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Personal Data Protection Bill, 2019 (in the final form recommended by the JPC and accepted by the MeitY) will usher in a new chapter in India’s data protection timeline. While the Bill will finally effectuate a nearly comprehensive data protection framework for India, it will also establish a new regulatory framework that sets up a new regulator, the DPA, to oversee the new data protection law. This DPA will be empowered to regulate entities across sectors and is likely to determine the success of the data protection law in India.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Furthermore, the DPA must not only contend with the complexity of markets and the fast pace of technological change, but it must also address &lt;a href="https://blog.theleapjournal.org/2018/02/a-pragmatic-approach-to-data-protection.html"&gt;anticipated&lt;/a&gt; regulatory capacity deficits, low levels of user literacy, the number and diversity of enities within its regulatory ambit, and the need to secure individual privacy within and outside the digital realm.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Thus, looking ahead, we must account for the questions of governance that the forthcoming DPA is likely to face, as these will directly impact how entities and citizens engage with the DPA. In India, regulatory agencies adopt distinct choices to fulfil their functions. Regulators have also &lt;a href="https://static1.squarespace.com/static/59c0077a9f745650903ac158/t/5cb62147104c7ba2eaf637e4/1555439944606/Burman+V2.pdf"&gt;fared variably&lt;/a&gt; in ensuring transparent and accountable decision-making driven by demonstrable expertise. Even if the final form of the PDP Bill does not address these gaps, the DPA has the opportunity to integrate benchmarks and best practices as discussed above within its own governance framework from the get-go as it takes on its daunting responsibilities under the PDP Bill.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;(&lt;span id="docs-internal-guid-6bf51b9e-7fff-d2ac-d0fb-f42bcdd7f599"&gt;The authors are Research Fellow, Law, Technology and Society Initiative and Project Lead, Regulatory Governance Project respectively at the National Law School of India University, Bangalore. Views are personal.)&lt;/span&gt;&lt;/em&gt;&lt;/p&gt;
&lt;em&gt;
&lt;/em&gt;
&lt;p style="text-align: justify;"&gt;&lt;span id="docs-internal-guid-6bf51b9e-7fff-d2ac-d0fb-f42bcdd7f599"&gt;&lt;em&gt;This post was reviewed by Vipul Kharbanda and Shweta Mohandas&lt;/em&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;References&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;For a discussion on distinct regulatory choices, please see TV Somanathan, &lt;em&gt;The Administrative and Regulatory State&lt;/em&gt; in Sujit Choudhary, Madhav Khosla, et al. (eds), &lt;a href="https://www.oxfordhandbooks.com/view/10.1093/law/9780198704898.001.0001/oxfordhb-9780198704898"&gt;Oxford Handbook of the Indian Constitution&lt;/a&gt; (2016).&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;On best practices for consultative law-making, see generally &lt;em&gt;European Union Better Regulation &lt;/em&gt;&lt;a href="https://ec.europa.eu/info/sites/default/files/better_regulation_joining_forces_to_make_better_laws_en_0.pdf"&gt;&lt;em&gt;Communication&lt;/em&gt;&lt;/a&gt;, &lt;em&gt;Guidelines for Effective Regulatory Consultations &lt;/em&gt;(&lt;a href="https://www.tbs-sct.gc.ca/rtrap-parfa/erc-cer/erc-cer-eng.pdf"&gt;Canada&lt;/a&gt;),&amp;nbsp; and&lt;em&gt; &lt;/em&gt;&lt;a href="https://read.oecd-ilibrary.org/governance/the-governance-of-regulators_9789264209015-en#page81"&gt;&lt;em&gt;OECD&lt;/em&gt;&lt;/a&gt;&lt;em&gt; &lt;/em&gt;&lt;em&gt;Best Practice Principles for Regulatory Policy: The Governance of Regulators&lt;/em&gt;,&lt;em&gt; 2014.&lt;/em&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Personal Data Protection Bill 2019, § 50(3).&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Personal Data Protection Bill 2019, § 50(4).&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Admin/AppData/Local/Temp/211105_Governance%20Choices%20for%20the%20DPA%20(1).docx#_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Personal Data Protection Bill 2019, § 51.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill'&gt;https://cis-india.org/internet-governance/blog/trishi-jindal-and-s-vivek-beyond-the-pdp-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Trishi Jindal and S.Vivek</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2021-11-10T07:32:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/beyond-sharing">
    <title>Beyond Sharing: Towards our Digital Futures</title>
    <link>https://cis-india.org/internet-governance/beyond-sharing</link>
    <description>
        &lt;b&gt;The battle is not about file sharing and a petty film producer wanting to rake in the box office earnings. It is about the law’s incapacity to deal with post-analogue practices and processes.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.downtoearth.org.in/content/beyond-sharing-towards-our-digital-futures"&gt;Down to Earth published Nishant Shah's Op-ed on May 31, 2012&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Unless you have been hiding under an analogue rock, wearing a tin-foil hat and staying away from electricity, chances are you have heard about the recent court order that bans access to a massive number of file-sharing websites from India. A John Doe order by the Madras High Court, following a complaint by the producers of the movie 3, has meant Internet Service Providers across the country have had to deny access to a number of websites that have been listed as providing free access to copyrighted material. In an attempt to ensure box-office collections for their movie, whose claim to fame, ironically, is the viral ‘Kolaveri Di’ song that had captured the country’s pulse last year, the producers have now denied access to something that is the basic function of anybody immersed in Web 2.0 environments–sharing of information.&lt;/p&gt;
&lt;p&gt;Much has been written about this ban. The battlelines are clearly drawn and from both sides we have strong arguments being made for and against piracy. Various media and culture industry people are supporting this ban, recounting losses that they have made because of people accessing pirated material online. Hacker and civil liberties groups are decrying this heavy censorship, providing numerous instances of how piracy has actually helped cultural productions gain more fame and money than they would have otherwise. There are yet others, who, while they respect the rights of the right-holders to protect themselves against copyright infringement, are furious that this blanket ban also disallows them to access material which was under a public license and material that they had produced and shared through these networks. &amp;nbsp; &amp;nbsp;&lt;/p&gt;
&lt;p&gt;International Hacker groups like Anonymous are mobilising people in large numbers to come to the streets as a sign of protest against such draconian measures.&lt;/p&gt;
&lt;p&gt;Most of these debates eventually are at loggerheads, with each side becoming louder and shriller, their positions attaining cult-like devotion and faith. In this cacophony there are some other points which get missed out. This issuance of the John Doe order has betrayed some startling flaws in how the Internet is governed in India and the alarming implications it has to the future of free, open and inclusive information societies.&lt;/p&gt;
&lt;p&gt;One thing that this court order has made excruciatingly clear is how the Internet is not the utopian space of exchange, collaboration, crowd sourcing and sharing it was meant to be. Despite the government’s own investments in building digital infrastructure, and its rhetoric of becoming more accountable, transparent and accessible by granting digital access to the citizens, it is obvious that this is still a space that is looked at with great suspicion.&lt;/p&gt;
&lt;p&gt;It comes as a shock to many of us that a high court issued an order which does not only impinge on freedom of speech and expression, but also fails to understand the nature of the Internet. In all reality, this ban is a farce. Everybody who has been used to the shared cultures of the online world, has found proxy servers and Internet anonymisers which allow them to hide their identity and continue with their everyday practice online. The cool kids are already doing this anyway. All we have is a stark realisation that the state might be investing heavily in digital technologies but it still has not been able to get out of the centralised broadcast ways of thinking about it.&lt;/p&gt;
&lt;p&gt;All sharing is not piracy. Some of it is just actually sharing. All debates seem to centre only around the copyrighted material being accessed through the file sharing websites. It is a concern which is legitimate. What about all the material that is in the public domain, in the commons and available for free? The user generated content, content which might not have direct economic value but is valuable to the people who created and shared it, is also now inaccessible. In order to protect some people from piracy we have also violated the rights of many more to share. And that is a distinction that is worth preserving, as we increasingly move into becoming an information society.&lt;/p&gt;
&lt;p&gt;In the Web 2.0 world, we are all producers of data. We not only leave traces but also put out material of cultural significance–from videos of dancing babies to knowledge that we want to share–through these peer-2-peer networks. A sudden collapse of this infrastructure almost seems to show how it is only the money-making material that is important to the state and not the other.&lt;/p&gt;
&lt;p&gt;There is not going to be a clear, correct position in this case against file-sharing. The legal technicalities will always be hollow in the face of ideologies of openness and inclusion. The moral indignation will always be countered by facts and numbers. But in the middle of all the fights and discussions, it is also good to pay attention to what is at stake. This battle is not merely about file sharing, though there is nothing “mere” about file sharing. This battle is not about a petty film producer wanting to rake in the box office earnings. This battle is about the law’s incapacity to deal with post-analogue practices and processes.&lt;/p&gt;
&lt;p&gt;The way we resolve these differences is going to determine the future of what it means to be public, open, free, and inclusive. Those of us who are fighting to get the word out, are not doing it only because the access to our favourite cultural products has become cumbersome, but because scared that this might well be the beginning of the end of all that we had dreamt of our digital futures.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/beyond-sharing'&gt;https://cis-india.org/internet-governance/beyond-sharing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-01T04:39:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable">
    <title>Beyond Scale: How to make your digital development program sustainable</title>
    <link>https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable</link>
    <description>
        &lt;b&gt;A dissemination workshop was organized by BBC Media Action, with support from the Digital Impact Alliance and the Bill &amp; Melinda Gates Foundation on February 21, 2018 in Bangalore. Sunil Abraham participated in the workshop.&lt;/b&gt;
        &lt;h3&gt;Agenda&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;9.00 to 9.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Registration and coffee&lt;/p&gt;
&lt;p&gt;&lt;b&gt;9.50 to 10.05&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Introduction to ‘&lt;i&gt;Beyond Scale’&lt;/i&gt;, Kate Willson, CEO, Digital Impact Alliance&lt;/p&gt;
&lt;p&gt;&lt;b&gt;10.15 to 11.15&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;‘Surviving the Valley of Death’, panel discussion with:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Rahul Mullick, ICT lead, Bill &amp;amp; Melinda Gates Foundation, India, &lt;/li&gt;
&lt;li&gt;Nehal Sanghavi, Senior Advisor for Innovation and Partnership, USAID, India&lt;/li&gt;
&lt;li&gt;Kate Wilson, CEO, Digital Impact Alliance&lt;/li&gt;
&lt;li&gt;Priyanka Dutt, Country Director, BBC Media Action&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span&gt;Moderated by Sara Chamberlain, Digital Director, BBC Media Action&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.15 to 11.30 &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Tea/coffee break&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.30 to 11.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Introduction to the table workshop sessions&lt;/p&gt;
&lt;p&gt;&lt;b&gt;11.45 to 1.00&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each table works to identify solutions to some of the digital development sector’s most pressing challenges in the areas of organizational change management, regulatory compliance, legal protection and risk, public sector adoption, private sector business models, solution design, technical architecture for scale, partnerships and human capacity.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1 PM to 2.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2.00 to 2.30&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Each table finalizes its presentation.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.00 to 4.15&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Presentations, Q&amp;amp;A and discussion of each table’s group work&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.15 &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Tea/coffee will be served at the tables&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.30 to 4.45&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Introduction to the ‘Expert Bar’&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.45 to 6.00 &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There will be one or more ‘experts’ in specific focus areas of the guide seated at each table. Participants are free to visit the tables that interest them to discuss their challenges and share their own expertise.  &lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;6.00 – 9.00&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Networking reception with open bar and snacks&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable'&gt;https://cis-india.org/internet-governance/news/beyond-scale-how-to-make-your-digital-development-program-sustainable&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    

   <dc:date>2018-02-26T14:23:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf">
    <title>Beyond Public Squares, Dumb Conduits, and Gatekeepers: The Need for a New Legal Metaphor for Social Media</title>
    <link>https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf'&gt;https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-05-31T10:19:33Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-beyond-public-squares-dumb-conduits-and-gatekeepers">
    <title>Beyond Public Squares, Dumb Conduits, and Gatekeepers: The Need for a New Legal Metaphor for Social Media</title>
    <link>https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-beyond-public-squares-dumb-conduits-and-gatekeepers</link>
    <description>
        &lt;b&gt;In the past few years, social networking sites have come to play a central role in intermediating the public’s access to and deliberation of information critical to a thriving democracy. In stark contrast to early utopian visions which imagined that the internet would create a more informed public, facilitate citizen-led engagement, and democratize media, what we see now is the growing association of social media platforms with political polarization and the entrenchment of racism, homophobia, and xenophobia.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;There is a dire need to think of regulatory strategies that look beyond the ‘dumb conduit’ metaphors that justify safe harbor protection to social networking sites. Alongside, it is also important to critically analyze the outcomes of regulatory steps such that they do not adversely impact free speech and privacy. By surveying the potential analogies of company towns, common carriers, and editorial functions, this essay provides a blueprint for how we may envision differentiated intermediary liability rules to govern social networking sites in a responsive manner.&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Only months after Donald Trump’s 2016 election victory — a feat mired in controversy over alleged Russian interference using social media, specifically Facebook — Mark Zuckerberg remarked that his company has grown to serve a role more akin to government, rather than a corporation. Zuckerberg argued that Facebook was responsible for creating guidelines and rules that governed the exchange of ideas of over two billion people online. Another way to look at the same argument is to acknowledge that, today, a quarter of the world’s population (and of India) are subject to the laws of Facebook’s terms and conditions and privacy policies, and public discourse around the globe is shaped within the constraints and conditions they create. Social media platforms, like Facebook, wield hitherto unimaginable power to catalyze public opinions, causing a particular narrative to gather steam — that Big Tech can pose an existential threat to democracy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;This, of course, is in absolute contrast to the early utopian visions which imagined that the internet would create a more informed public, facilitate citizen-led engagement, and democratize media. Instead, what we see now is the growing association of social media platforms with political polarization and the entrenchment of racism, homophobia, and xenophobia. The regulation of social networking sites has emerged as one of the most important and complex policy problems of this time. In this essay, I will explore the inefficacy of the existing regulatory framework, and provide a blueprint for how to think of appropriate regulatory metaphors to revisit it.&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="https://itforchange.net/digital-new-deal/2020/11/01/beyond-public-squares-dumb-conduits-and-gatekeepers-the-need-for-a-new-legal-metaphor-for-social-media/"&gt; Click on to read the article&lt;/a&gt; published by IT for Change&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/files/beyond-public-squares-dumb-conduits-and-gatekeepers.pdf" class="external-link"&gt;Download the PDF&lt;/a&gt; (34,328 Kb) to read the full article, pages 126 - 138.&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-beyond-public-squares-dumb-conduits-and-gatekeepers'&gt;https://cis-india.org/internet-governance/blog/it-for-change-amber-sinha-beyond-public-squares-dumb-conduits-and-gatekeepers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2021-05-31T10:23:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/beyond-clicktivism">
    <title>Beyond Clicktivism </title>
    <link>https://cis-india.org/news/beyond-clicktivism</link>
    <description>
        &lt;b&gt;Moral support Hazare has in plenty. Count the missed calls, writes Debarshi Dasgupta in this article published in the Outlook on April 18, 2011.&lt;/b&gt;
        
&lt;p&gt;Want to commit sedition against the government?” “Join Dandi March-II.” “A Mahatma&amp;nbsp;announces a fast-unto-death.” These were some of the clarion calls that organisers of the protest against corruption led by Anna Hazare were making online. And people from all classes responded in massive numbers. Possibly fed up with the scale of the CWG and 2G scams and exasperated by the petty and mundane corruption they encounter daily.&lt;/p&gt;
&lt;p&gt;Anna Hazare and Jantar Mantar were among the top 10 global trending topics on Twitter on April 7 afternoon. “Earthquake named Anna Hazare lashes on corrupted Indian Politicians, epicenter India, it measures 1.22 Billion Richter Hearts,” said one. A disengaged youngster tweeted: “OK, enough of ignorance...time to read up on Anna Hazare.” On the ‘India Against Corruption’ page on Facebook, people from across the country left posts either announcing their local programme to support Hazare or asking for advice to organise one. Leaflets urged people to give a missed call on a Mumbai landline expressing support. With 6,00,000 missed calls, the organisers were urging more to call in to take that number to over 25 lakh.&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Sunil Abraham, executive director of the Bangalore-based Centre for Internet and Society, said the organisers of this social media campaign had adopted a “funnel approach”, in which they get people involved gradually. “Clicking on the ‘Like’ function on Facebook to making a call—they are increasing the action, incrementally getting people to become proper activists from being armchair slacktivists.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?271256"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/beyond-clicktivism'&gt;https://cis-india.org/news/beyond-clicktivism&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-20T04:33:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy">
    <title>Beyond Anonymous: Shit people say on Internet piracy</title>
    <link>https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy</link>
    <description>
        &lt;b&gt;This post is a series of provocations around piracy, censorship and the state of Internet in India. Like all good tasting things, these observations need to be taken with a pinch of salt. But it is the hope of the author that this serves as a response to otherwise very persistent voices that have been demonizing file-sharing online.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/beyond-anonymous-shit-people-say-on-internet-piracy-335588.html"&gt;Firstpost published Nishant Shah's column along with the video that CIS and ALF had made on 'shit people say about piracy' as a lead story on June 7, 2012&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;9 June is going to be a big day in India, for all concerned with internet regulation, censorship and the current attacks on file-sharing.&lt;/p&gt;
&lt;p&gt;The International Hacker group Anonymous – a group that has become iconic with its members wearing Guy Fawkes mask as they mobilise protest and hacker attacks on what they see as tyrannical regimes – has called for marched protests in 16 Indian cities, to demand a free and open Internet.&lt;/p&gt;
&lt;p&gt;They have already started launching Denial of Service attacks and taking down websites owned by the Indian government to express their displeasure about the recent regulation of the internet. Whether or not their guerrilla tactics are efficient and effective, in the right or not, is something that has been discussed quite popularly.&lt;/p&gt;
&lt;p&gt;There are hordes of people who think of them as the NewAge Mutant Ninja Hackers, who are protecting our digital worlds from being clamped down. There are others who paint them as the Big Bad Wolf who huffed and puffed and will blow our houses away.&lt;/p&gt;
&lt;p&gt;You might be sympathetic, suspicious or scared of the emergence of such a ‘crowd vigilante’, sporting the slogan that has spawned Internet memes galore – Y U No Wake up? – But there is no doubt that the rise of such a collective signals how discourse around piracy, rights, and openness is no longer in the domain of the uber-geek and the academic researcher.&lt;/p&gt;
&lt;p&gt;These are concepts with very material realities that affect our everyday functioning and require not only better policies but also a more nuanced public discourse. Today, I look at some of the most ludicrous things that have been said about file-sharing, around the world, wondering why this idea of sharing has evoked such startling responses from different quarters.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;File sharing and depression&lt;/strong&gt;: There has always been a concern about the physical well-being of internet users. From Internet addiction rehabilitation clinics in China to online support groups for internet addicts (I swear I am not making this up!), from doctors worried about posture and eye-sight to mothers concerned about violent video games, we thought we had heard it all.&lt;/p&gt;
&lt;p&gt;And then came the extraordinary study that suggested that file sharing might lead to depression. Or rather, if you are an avid file-sharer on the internet, you are prone to attacks of depression. This had the twitter world abuzz, where people were trying to make sense of this ‘scientific’ study that connected spending long hours on the interwebz with mental illness. A trending tweet just about summed up the situation, when it said, “File sharers are depressed only because of what is done to them when they share”.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;File sharing and jobs&lt;/strong&gt;: There was a time when the Music and Film Industry Associations (MAFIA) around the world used to protest file sharing by painting a romanticised picture of the independent starving artists, from whose mouths, we stole morsels, as we shared their work without paying for it. But that argument collapsed in the days of Napster (remember that?) and it has been proven over and over again, that the artist almost always benefits from their work being shared.&lt;/p&gt;
&lt;p&gt;However, lately, research from respectable universities (expensively funded by respectable interested parties) have started hitting the real you, rather than the imagined artist. Every torrent being downloaded on the web is correlated with a lost job, because these companies can no longer afford to hire as many people as they used to, because of the growing losses. And then it goes into complicated mumbo-jumbo about how that one torrent that sits merrily on your computer, actually affects all the jobs to kingdom come and will be responsible for your children’s unemployment.&lt;/p&gt;
&lt;p&gt;They remain silent about the jobs lost because of the funding that went into buying supporting this research.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;I am not a Pirate&lt;/strong&gt;: And lest you go away with the idea that the rest of the junta does not gaff, here are some of the gems that have come our way while working with people in the field. It is common, for instance, for people to take a moral stance on piracy, radiating a holier-than-thou ethical persona, without realising that recording that last IPL match to watch later on your tablet is also an act of piracy.&lt;/p&gt;
&lt;p&gt;Then there are those who only consume material pirated by others, happily ignoring the fact that the ring-tone that they copied from their friend is also an act of piracy. Ditto, people who claim “I am not a pirate”, meaning that they haven’t yet figured out the bittorrent system and hence go to the local corner shop to buy pirated DVDs of the latest releases. In their heads, they have paid somebody for the material and hence it must be alright.&lt;/p&gt;
&lt;p&gt;Piracy is not a one-point source process. It is a networked ecosystem, and I am still to find that one person who has never shared anything and make a video of them saying “I am not a pirate”. But that is probably just wishful thinking.&lt;/p&gt;
&lt;p&gt;There are many more such instances which make your mind boggle and your eyes goggle and you wonder if you heard it right for the first time. Do share your favourite ones if you can. In the meantime you might also want to look at the &lt;a class="external-link" href="http://youtu.be/xYjqe_n3sv8"&gt;new meme video ‘Sh!t People say about Piracy’&lt;/a&gt; that captures some of these responses in their absurdity.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;iframe src="http://www.youtube.com/embed/xYjqe_n3sv8" frameborder="0" height="315" width="320"&gt;&lt;/iframe&gt;
&lt;p&gt;(Video by The Centre for Internet and Society , and the Alternative Law Forum)&lt;/p&gt;
&lt;p&gt;Follow the video on &lt;a class="external-link" href="http://www.youtube.com/watch?v=xYjqe_n3sv8&amp;amp;feature=youtu.be"&gt;YouTube&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy'&gt;https://cis-india.org/internet-governance/shit-people-say-on-internet-piracy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-06-13T14:01:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion">
    <title>Beyond Access as Inclusion</title>
    <link>https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion</link>
    <description>
        &lt;b&gt;On 13 September, the day before the fifth Internet Governance Forum opens, CIS is coorganising in Vilnius a meeting on Internet governance and human rights. One of the main aims of this meeting is to call attention to the crucial, yet in Internet governance often neglected, indivisibility of rights. In this blog post, Anja Kovacs uses this lens to illustrate how it can broaden as well reinvigorate our understanding of what remains one of the most pressing issues in Internet governance in developing countries to this day: that of access to the Internet.&lt;/b&gt;
        
&lt;p align="JUSTIFY"&gt;One of the most attractive characteristics of the
Internet – and perhaps also one of the most debated ones – is its
empowering, democratising potential. In expositions in favour of
access to the Internet for all, this potential certainly often plays
a central role: as the Internet can help us to make our societies
more open, more inclusive, and more democratic, everybody should be
able to reap the fruits of this technology, it is argued. In other
words, in debates on access to the Internet, most of us take as our
&lt;em&gt;starting point&lt;/em&gt; the desirability of such access, for the above
reasons. But how justified is such a stance? Is an Internet-induced
democratic transformation of our societies what is actually happening
on the ground?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;I would like to move away, in this blog post, from
the more traditional approaches to the issue of access, where debates
mostly veer towards issues of infrastructure (spectrum, backbones,
last mile connectivity, …) or, under the banner of “diversity”,
towards the needs of specific, disadvantaged communities (especially
linguistic minorities and the disabled). To remind us more sharply of
the issues at stake and of the wide range of human rights that need
our active attention to make our dreams a reality, I would like to
take a step back and to ask two fundamental questions regarding
access: why might access be important? And what do we actually have
access to?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Let me start, then, by exploring the first question:
why, actually, is Internet access important? In his canonical work on
the information age, and especially in the first volume on the rise
of the network society, Manuel Castells (2000) has perhaps provided
the most elaborate and erudite description of the ways in which new
technologies are restructuring our societies and our lives. We are
all all too familiar with the many and deep-seated ways in which the
Internet changes the manner in which we learn, play, court, pay, do
business, maintain relationships, dream, campaign. And yet, the exact
nature of the divide created by the unequal distribution of technical
infrastructure and access, despite being so very real, receives
relatively little attention: this divide is not simply one of
opportunities, it is crucially one of power. If in traditional
Marxist analysis the problem was that the oppressed did not have
access to the means of production, today, one could well argue, the
problem is that they do not have access to the means of communication
and information.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Indeed, the Internet is not something that is simply
happening to us: there are people who are responsible for these new
evolutions. And so it becomes important to ask: who is shaping the
Internet? Who is creating this new world? Let us, by way of example,
consider some figures relating to Internet use in India. So often
hailed as the emerging IT superpower of the world, there are, by the
end of 2009, according to official government figures, in this
country of 1 billion 250 million people slightly more than 15 million
Internet connections. Of these, only slightly more than half, or
almost 8 million, are broadband connections – the rest are still
dial-up ones (TRAI 2010). The number of Internet users is of course
higher – one survey estimates that there are between 52 million and
71 million Internet users in urban areas, where the bulk of users is
still located (IAMAI 2010). But while this is a considerable number,
it remains a fraction of the population in a country so big. What
these figures put in stark relief, then, is that the poor and
marginalised are not so much excluded from the information society
(in fact, many have to bear the consequences of new evolutions made
possible by it in rather excruciating fashion), but rather, that they
are fundamentally excluded from shaping the critical ways in which
our societies are being transformed.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;To have at least the possibility to access the
Internet is, then, of central significance in this context for the
possibility of participation it signals in the restructuring of our
societies at the community, national and global level, and this in
two ways: in the creation of visions of where our societies should be
going, and in the actual shaping of the architecture of our societies
in the information age.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;If we agree that access attains great significance
in this sense, then a second question poses itself, and that is: in
practice, what exactly are we getting access to? This query should be
of concern to all of us. With the increasing corporatisation of the
Internet and the seemingly growing urges of governments on all
continents to survey and control their citizens, new challenges are
thrown up of how to nurture the growth of open, inclusive, democratic
societies, that all of us are required to take an interest in.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Yet it is in the case of poor and marginalised
people that the challenges are most pronounced.&amp;nbsp; Efforts to
include them in the information society are disproportionately
legitimised on the basis of the contribution these can make to
improving their livelihoods. Initiatives, often using mobile
technology, that allow farmers to get immediate information about the
market prices of the produce they are intending to sell, are perhaps
the most well-known and oft-cited examples in this category. Other
efforts aim to improve the information flow from the government to
citizens: India has set up an ambitious network of Common Service
Centres, for example, that aim to greatly facilitate the access of
citizens to particular government services, such as obtaining birth
or caste certificates – and going by first indications, this also
seems to be succeeding in practice. Only rarely, however, do
initiatives to “include” the poor in the information society
address them as holistic beings who do not only have economic lives,
but political, emotional, creative and intellectual existences as
well.&amp;nbsp; This is not to say that economic issues are not of
importance. But by highlighting only this aspect of poor people's
lives, we promote a highly impoverished understanding of their
existences.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;The focus on a limited aspect of the poor's identity
- important as that aspect may be - has a function, however: it makes
it possible to hide from view the extremely restrictive terms on
which poor people are currently being integrated into the information
society. Even initiatives such as the Common Service Centres are in
fact based on a public-private-partnership model that explicitly aims
to “align [..] social and commercial goals” (DIT 2006: 1), and in
effect subordinates government service design to the requirements of
the CSC business model (Singh 2008). The point is not simply that we
need strong privacy and data protection policies in such a context –
although we clearly do. There is a larger issue here, which is that
efforts to include the poor in the information society, in the
present circumstances, really seem to simply integrate them more
closely into a capitalist system over which they have little control,
or to submit them to ever greater levels of government and corporate
surveillance. Their own capacity to give shape to the system in which
they are “included”, despite the oft-heralded capacities of the
Internet to allow greater democratic participation and to turn
everybody into a producer and distributor, as well as a consumer,
remains extremely limited.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Such tendencies have not gone unnoticed. For
example, unlike in many other parts of the world, social movements in
India fighting against dams, special economic zones or mining
operations in forest areas - all initiatives that lead to large-scale
displacement – have not embraced technology as enthusiastically as
one might have expected. There are various reasons for this. Within
Indian nationalism, there have always been strands deeply critical of
technology, with Gandhi perhaps their most illustrious proponent. But
for many activists, technology often also already comes with an
ideological baggage: an application such as Twitter, for example, in
so many of its aspects is clearly manufactured by others, for others,
drawing on value sets that activists often in many ways are reluctant
to embrace. And such connotations only gain greater validity because
of the intimate connections that exist in India between the IT boom
and neoliberalism: technology has great responsibility for many of
the trends and practices these activists are fighting against. While
the Internet might have made possible many new publics, most
movements do not – as movements – recognise these publics as
their own (Kovacs, forthcoming).&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;To some extent, these are of course questions of the
extent of access that people are granted. But they also raise the
important issue of the value structure of the Internet. Efforts at
inclusion always take for granted a standard that is already set. But
what if the needs and desires of the many billions that still need to
be included are not served by the Internet &lt;em&gt;as it exists&lt;/em&gt;? What
if, for it to really work for them, they need to be able to make the
Internet a different place than the one we know today? While it is
obvious that different people will give different answers in
different parts of the world, such debates are complicated
tremendously by the fact that it is no longer sufficient to reach a
national consensus on the issues under discussion, as was the case in
earlier eras. The global nature of the Internet's infrastructure
requires that the possibility of differing opinions, too, needs to be
facilitated at the global level. What are the consequences of this
for the development of democracy?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;For access to the Internet to be substantively
meaningful from a human rights perspective in the information age, it
is crucial, then, that at a minimum, the openness of the Internet is
ensured at all levels. Of course, openness can be considered a value
in itself. But perhaps more importantly, at the moment, it is the
only way in which the possibility of a variety of answers to the
pressing question of what shape our societies should take in the
information age can emerge. Open standards and the portability of
data, for example, are crucial if societies are to continue to decide
on the role corporations should play in their public life, rather
than having corporations &lt;em&gt;de facto&lt;/em&gt; rule the roost. Similarly,
under no circumstances should anyone be cut off from the Internet, if
people are to participate in the public life of the societies of
which they are members. And these are not just concerns for
developing countries: if recent incidents from France to Australia
are anything to go by, new possibilities facilitated by the Internet
have, at least at the level of governments, formed the impetus for a
clear shift to the right of the political spectrum in many developed
countries. In the developed world, too, the questions of access and
what it allows for are thus issues that should concern all. In the
information age, human rights will only be respected if such respect
is already inscribed in the very architecture of its central
infrastructure itself.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&lt;strong&gt;List of References&lt;/strong&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Castells, Manuel (2000). &lt;em&gt;The Rise of the Network
Society, 2&lt;sup&gt;nd&lt;/sup&gt; edition&lt;/em&gt;. Oxford: Blackwell.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Department of Information Technology (DIT) (2006).
&lt;em&gt;Guidelines for the Implementation of Common Services Centers
(CSCs) Scheme in States&lt;/em&gt;. New Delhi: Department of Information
Technology, Government of India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Internet and Mobile Association of India (IAMAI)
(2010). &lt;em&gt;I-Cube 2009-2010: Internet in India&lt;/em&gt;. Mumbai: Internet
and Mobile Association of India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Kovacs, Anja (forthcoming). &lt;em&gt;Inquilab 2.0?
Reflections on Online Activism in India&lt;/em&gt; (working title).
Bangalore: Centre for Internet and Society.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Singh, Parminder Jeet (2008). &lt;em&gt;Recommendations for a
Meaningful and Successful e-Governance in India&lt;/em&gt;. IT for Change Policy
Brief, IT for Change, Bangalore.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Telecom Regulatory Auhority of India (TRAI) (2010).
&lt;em&gt;The Indian Telecom Services Performance Indicators,
October-December 2009&lt;/em&gt;. New Delhi: Telecom Regulatory Auhority of
India.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion'&gt;https://cis-india.org/internet-governance/blog/beyond-access-as-inclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>anja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Digital Access</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>human rights</dc:subject>
    

   <dc:date>2011-08-02T07:29:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
