<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2851 to 2865.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/ndtv-sukriti-dwivedi-january-13-2018-aadhaar-body-talked-about-virtual-id-7-years-ago-put-it-off-uidai-chief"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/aadhaar-bill-fails-to-incorporate-suggestions-by-the-standing-committee"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/aadhaar-bill-2016-evaluated-against-the-national-privacy-principles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tweet-and-poke"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/global-voices-may-28-2013-eduardo-bertoni-a-technological-solution-to-the-challenges-of-online-defamation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/charlotte-lapsansky-talk"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-february-11-2014-deepa-kurup-a-tale-of-two-internet-campaigns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/street-view-of-private-and-public"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gender-it-february-19-2015-selection-tweets-how-make-crowdmaps-effectual-mapping-violence-against-women"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/ndtv-sukriti-dwivedi-january-13-2018-aadhaar-body-talked-about-virtual-id-7-years-ago-put-it-off-uidai-chief">
    <title>Aadhaar Body Talked About Virtual ID 7 Years Ago, Put It Off: UIDAI Chief</title>
    <link>https://cis-india.org/internet-governance/news/ndtv-sukriti-dwivedi-january-13-2018-aadhaar-body-talked-about-virtual-id-7-years-ago-put-it-off-uidai-chief</link>
    <description>
        &lt;b&gt;"And at that time, it was felt that let us first give Aadhaar number, let us see how it plays out and then, at an appropriate time, this will be introduced," Ajay Bhushan Pandey, the chief executive officer of UIDAI, or the Unique Identification Authority of India said in an interview to NDTV this week. He called it an "extra layer of security" for the 119 crore people issued Aadhaar numbers.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Sukriti Dwivedi was &lt;a class="external-link" href="https://www.ndtv.com/india-news/aadhaar-body-talked-about-virtual-id-7-years-ago-put-it-off-uidai-chief-1799467"&gt;published by NDTV&lt;/a&gt; on January 13, 2018.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Virtual ID, the 16-digit temporary number, announced by UIDAI this week had been suggested way back in 2009-10 when its architects were still designing the system. But the Aadhaar authority, which has called Virtual ID a unique innovation to enhance privacy and security, decided against rolling it out at that time.&lt;/p&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;"And at that time, it was felt that let us first give Aadhaar number, let us see how it plays out and then, at an appropriate time, this will be introduced," Ajay Bhushan Pandey, the chief executive officer of UIDAI, or the Unique Identification Authority of India said in an interview to NDTV this week. He called it an "extra layer of security" for the 119 crore people issued Aadhaar numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;It may be a step forward. But not everyone is as convinced.&lt;/span&gt;&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Cyber security Jiten Jain is one of them. Mr Jain told NDTV that UIDAI should first of all decide if the Aadhaar number was confidential information or not because it had changed its stance on this aspect on more than one occasion.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Like when government departments put out lakhs of Aadhaar number, the government agency had insisted that there was nothing really confidential about the number which could not be misused. Or when The Tribune earlier this month claimed to have found gaps in UIDAI's security system that let the newspaper demographic details of an individual, UIDAI claimed that "the Aadhaar number is not a secret number" anyways.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Also, a point is being made that if hiding an Aadhaar number enhances privacy, then what about the crores of people who have been forced to share their Aadhaar numbers - and a copy of their Aadhaar cards - all these years.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Experts suggest the timing of the announcement may not have been a coincidence. The initiative came against the backdrop of mounting privacy concerns after the newspaper expose. The hearing by a five-judge Constitution Bench of the Supreme Court to decide if the Aadhaar project violates citizens' privacy is to start hearing from next week, January 17.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;Srinivas Kodali, cyber security expert and an Aadhaar researcher, said it was clear that the UIDAI had brought it hurriedly. "They said they will release the codes by March 1. So it clearly looks like they haven't planned this thoroughly," he said.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;There are also concerns about the ability of people living in remote areas to generate the Virtual IDs, in terms of connectivity and literacy. That means a large proportion of people would not be able to generate the Virtual IDs.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;UIDAI chief Mr Pandey said there was nothing to prevent them from continuing to use their Aadhaar number. It is an option, he stressed.&lt;/p&gt;
&lt;div id="_mcePaste" style="text-align: justify; "&gt;&lt;/div&gt;
&lt;p id="_mcePaste" style="text-align: justify; "&gt;This, experts at the Bengaluru-based research group, Centre for Internet and Society, which has long advocated for a token system such as the Virtual ID, said was a problem area.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"And at that time, it was felt that let us first give Aadhaar number, let us see how it plays out and then, at an appropriate time, this will be introduced," Ajay Bhushan Pandey, the chief executive officer of UIDAI, or the Unique Identification Authority of India said in an interview to NDTV this week. He called it an "extra layer of security" for the 119 crore people issued Aadhaar numbers. It may be a step forward. But not everyone is as convinced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber security Jiten Jain is one of them. Mr Jain told NDTV that UIDAI should first of all decide if the Aadhaar number was confidential information or not because it had changed its stance on this aspect on more than one occasion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Like when government departments put out lakhs of Aadhaar number, the government agency had insisted that there was nothing really confidential about the number which could not be misused. Or when The Tribune earlier this month claimed to have found gaps in UIDAI's security system that let the newspaper demographic details of an individual, UIDAI claimed that "the Aadhaar number is not a secret number" anyways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, a point is being made that if hiding an Aadhaar number enhances privacy, then what about the crores of people who have been forced to share their Aadhaar numbers - and a copy of their Aadhaar cards - all these years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts suggest the timing of the announcement may not have been a coincidence. The initiative came against the backdrop of mounting privacy concerns after the newspaper expose. The hearing by a five-judge Constitution Bench of the Supreme Court to decide if the Aadhaar project violates citizens' privacy is to start hearing from next week, January 17.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Srinivas Kodali, cyber security expert and an Aadhaar researcher, said it was clear that the UIDAI had brought it hurriedly. "They said they will release the codes by March 1. So it clearly looks like they haven't planned this thoroughly," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are also concerns about the ability of people living in remote areas to generate the Virtual IDs, in terms of connectivity and literacy. That means a large proportion of people would not be able to generate the Virtual IDs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UIDAI chief Mr Pandey said there was nothing to prevent them from continuing to use their Aadhaar number. It is an option, he stressed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This, experts at the Bengaluru-based research group, Centre for Internet and Society, which has long advocated for a token system such as the Virtual ID, said was a problem area.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Privacy can be protected by design and not by choice," said CIS executive director Sunil Abraham, who believes the biggest flaw with Aadhaar was its design.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Since it is not mandatory most people will just use the Aadhaar number instead of getting into the hassle of generating a VID... This is privacy through hurdles instead of privacy by design. I suggest authorities should generate VIDs for people and ensure that third parties only use VID and not the Aadhaar number," Pranesh Prakash at the CIS' policy director told NDTV.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/ndtv-sukriti-dwivedi-january-13-2018-aadhaar-body-talked-about-virtual-id-7-years-ago-put-it-off-uidai-chief'&gt;https://cis-india.org/internet-governance/news/ndtv-sukriti-dwivedi-january-13-2018-aadhaar-body-talked-about-virtual-id-7-years-ago-put-it-off-uidai-chief&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-01-16T23:42:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/aadhaar-bill-fails-to-incorporate-suggestions-by-the-standing-committee">
    <title>Aadhaar Bill fails to incorporate suggestions by the Standing Committee</title>
    <link>https://cis-india.org/internet-governance/blog/aadhaar-bill-fails-to-incorporate-suggestions-by-the-standing-committee</link>
    <description>
        &lt;b&gt;In 2011, a standing committee report led by Yashwant Sinha had been scathing in its indictments of the Aadhaar BIll introduced by the UPA government. Five years later, the NDA government has introduced a new bill which is a rehash of the same. I look at the concerns raised by the committee report, none of which have been addressed by the new bill.
&lt;/b&gt;
        
&lt;p id="docs-internal-guid-0c1d0148-5959-8221-80f0-984c1f109411" dir="ltr"&gt;The article was published by &lt;a class="external-link" href="http://thewire.in/2016/03/10/aadhaar-bill-fails-to-incorporate-standing-committees-suggestions-24433/"&gt;The Wire&lt;/a&gt;&lt;a class="external-link" href="https://globalvoices.org/2016/02/09/a-good-day-for-the-internet-everywhere-india-bans-differential-data-pricing/"&gt; &lt;/a&gt;on March 10, 2016&lt;/p&gt;
&lt;p dir="ltr"&gt;In December, 2010, the UPA Government introduced the National Identification Authority of India Bill, 2010 in the Parliament. It was subsequently referred to a Standing Committee on Finance by the Speaker of Lok Sabha under Rule 331E of the the Rules of Procedure and Conduct of Business in Lok Sabha. This Committee, headed by BJP leader Yashwant Sinha took evidence from the Minister of Planning and the UIDAI from the government, as well as seeking the view of parties such as the National Human Rights Commission, Indian Banks Association and researchers like Dr Reetika Khera and Dr. Usha Ramanathan. In 2011, having heard from various parties and considering the concerns and apprehensions about the UID scheme, the Committee deemed the bill unacceptable and suggested a re-consideration of the the UID scheme as well as the draft legislation.&lt;/p&gt;
&lt;p dir="ltr"&gt;The Aadhaar programme has so far been implemented under the Unique Identification Authority of India, a Central Government agency created through an executive order. This programme has been shrouded in controversy over issues of privacy and security resulting in a Public Interest Litigation filed by Judge Puttaswamy in the Supreme Court. While the BJP had criticised the project as well as the draft legislation &amp;nbsp;when it was in opposition, once it came to power and particularly, after it launched various welfare schemes like Digital India and Jan Dhan Yojna, it decided to continue with it and use Aadhaar as the identification technology for these projects. In the last year, there have been orders passed by the Supreme Court which prohibited making Aadhaar mandatory for availing services. One of the questions that the government has had to answer both inside and outside the court on the UID project is the lack of a legislative mandate for a project of this size. About five years later, the new BJP led government has come back with a rehash of the same old draft, and no comments made by the standing committee have been taken into account.&lt;/p&gt;
&lt;p dir="ltr"&gt;The Standing Committee on the old bill had taken great exception to the continued collection of data and issuance of Aadhaar numbers, while the Bill was pending in the Parliament. The report said that the implementation of the provisions of the Bill and continuing to incur expenditure from the exchequer was a circumvention of the prerogative powers of the Parliament. However, the project has continued without abeyance since its inception in 2009. I am listing below some of the issues that the Committee identified with the UID project and draft legislation, none of which have been addressed in current Bill.&lt;/p&gt;
&lt;p dir="ltr"&gt;One of the primary arguments made by proponents of Aadhaar has been that it would be useful in providing services to marginalized sections of the society who currently do not have identification cards and consequently, are not able to receive state sponsored services, benefits and subsidies. The report points that the project would not be able to achieve this as no statistical data on the marginalized sections of the society are being used to by UIDAI to provide coverage to them. The introducer systems which was supposed to provide Aadhaar numbers to those without any form of identification, has been used to enroll only 0.03% of the total number of people registered. Further, the &lt;a href="http://uidai.gov.in/UID_PDF/Committees/Biometrics_Standards_Committee_report.pdf"&gt;Biometrics Standards Committee of UIDAI&lt;/a&gt; has itself acknowledged the issues caused due to a high number of manual laborers in India which would lead to sub-optimal fingerprint scans. A &lt;a href="http://www.4gid.com/De-dup-complexity%20unique%20ID%20context.pdf"&gt;report by 4G Identity Solutions&lt;/a&gt; estimates that while in any population, approximately 5% of the people have unreadable fingerprints, in India it could lead to a failure to enroll up to 15% of the population. In this manner, the project could actually end up excluding more people.&lt;/p&gt;
&lt;p dir="ltr"&gt;The Report also pointed to a lack of cost-benefit analysis done before going ahead with scheme of this scale. It makes a reference to the &lt;a href="http://eprints.lse.ac.uk/684/1/identityreport.pdf"&gt;report&lt;/a&gt; by the London School of Economics on the UK Identity Project which was shelved due to a) huge costs involved in the project, b) the complexity of the exercise and unavailability of reliable, safe and tested technology, c) risks to security and safety of registrants, d) security measures at a scale that will result in substantially higher implementation and operational costs and e) extreme dangers to rights of registrants and public interest. The Committee Report insisted that such global experiences remained relevant to the UID project and need to be considered. However, the new Bill has not been drafted with a view to address any of these issues.&lt;/p&gt;
&lt;p dir="ltr"&gt;The Committee comes down heavily on the irregularities in data collection by the UIDAI. They raise doubts about the ability of the Registrars to effectively verify the registrants and a lack of any security audit mechanisms that could identify issues in enrollment. Pointing to the news reports about irregularities in the process being followed by the Registrars appointed by the UIDAI, the Committee deems the MoUs signed between the UIDAI and the Registrars as toothless. The involvement of private parties has been under question already with many questions being raised over the lack of appropriate safeguards in the contracts with the private contractors.&lt;/p&gt;
&lt;span id="docs-internal-guid-0c1d0148-595b-32fa-49d2-8f6a347a4c00"&gt;Perhaps the most significant observation of the Committee was that any scheme that facilitates creation of such a massive database of personal information of the people of the country and its linkage with other databases should be preceded by a comprehensive data protection law. By stating this, the Committee has acknowledged that in the absence of a privacy law which governs the collection, use and storage of the personal data, the UID project will lead to abuse, surveillance and profiling of individuals. It makes a reference to the Privacy Bill which is still at only the draft stage. The current data protection framework in the Section 43A rules under the Information Technology Act, 2000 are woefully inadequate and far too limited in their scope. While there are some protection built into Chapter VI of the new bill, these are nowhere as comprehensive as the ones articulated in the Privacy Bill. Additionally, these protections are subject to broad exceptions which could significantly dilute their impact.&lt;/span&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/aadhaar-bill-fails-to-incorporate-suggestions-by-the-standing-committee'&gt;https://cis-india.org/internet-governance/blog/aadhaar-bill-fails-to-incorporate-suggestions-by-the-standing-committee&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-10T15:58:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/aadhaar-bill-2016-evaluated-against-the-national-privacy-principles">
    <title>Aadhaar Bill 2016 Evaluated against the National Privacy Principles</title>
    <link>https://cis-india.org/internet-governance/aadhaar-bill-2016-evaluated-against-the-national-privacy-principles</link>
    <description>
        &lt;b&gt;In this infographic, we evaluate the privacy provisions of the Aadhaar Bill 2016 against the national privacy principles developed by the Group of Experts on Privacy led by the Former Chief Justice A.P. Shah in 2012. The infographic is based on Vipul Kharbanda’s article 'Analysis of Aadhaar Act in the Context of A.P. Shah Committee Principles,' and is designed by Pooja Saxena, with inputs from Amber Sinha.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the infographic: &lt;a href="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Vs-Privacy-Principles_v.1.0.pdf"&gt;PDF&lt;/a&gt; and &lt;a href="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Vs-Privacy-Principles_v.1.0.png"&gt;PNG&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;License:&lt;/strong&gt; It is shared under Creative Commons &lt;a href="https://creativecommons.org/licenses/by/4.0/"&gt;Attribution 4.0 International&lt;/a&gt; License.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;img src="https://github.com/cis-india/website/raw/master/infographics/CIS_Aadhaar-2016-Vs-Privacy-Principles_v.1.0.png" alt="Aadhaar Bill 2016 Evaluated against the National Privacy Principles" /&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/aadhaar-bill-2016-evaluated-against-the-national-privacy-principles'&gt;https://cis-india.org/internet-governance/aadhaar-bill-2016-evaluated-against-the-national-privacy-principles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pooja Saxena and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Infographic</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-03-21T08:38:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns">
    <title>Aadhaar assurances fail to assuage privacy concerns</title>
    <link>https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns</link>
    <description>
        &lt;b&gt;While Aadhaar may be secure from external attacks, a failsafe system hasn’t been developed to protect it from Edward Snowden-style leakages and hacks.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Anirban Sen was &lt;a class="external-link" href="http://www.livemint.com/Politics/clV1RHlNttIVTJNkQt8WqM/Aadhaar-assurances-fail-to-assuage-privacy-concerns.html"&gt;published by Livemint &lt;/a&gt;on May 5, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;As calls for a privacy and data protection law grow louder with each passing day amid reports of a central government ministry having made up to 130 million Aadhaar numbers public on its website, widespread concerns continue to emerge over loopholes in the security of the unique identification programme, though the man who created the system continues to defend the security and integrity of the system.&lt;br /&gt;&lt;br /&gt;Most worryingly, a consensus is emerging among security and privacy experts, who have argued that while the Aadhaar system may be secure from external attacks, a failsafe system has not been developed to protect it from Edward Snowden-style internal leaks or hacks.&lt;br /&gt;&lt;br /&gt;“(What has been suggested by the Unique Identification Authority of India and Nandan Nilekani) is that there will never be a data breach like what we saw in the US with the National Security Agency, Central Intelligence Agency, or Office of Personnel and Management breaches (data of federal government personnel, including more than 5.6 fingerprints, was leaked), or in Mexico or Turkey, or even in India when the department of defence was breached for cyber-espionage for multiple years without detection,” said Pranesh Prakash, policy director at the Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;“While the system may be secure from external attacks, there is no failsafe system to make it invulnerable to Snowden-style breaches,” he added.&lt;br /&gt;&lt;br /&gt;In an interview, former UIDAI chairman and Infosys Ltd co-founder Nandan Nilekani continued to defend the security of the system and said steps are being taken everyday to enhance the failsafe processes surrounding the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I think the Aadhaar system is extremely well-designed. It’s not an online system that is exposed to the Internet. When enrolment happens, the packet is encrypted at source and sent, so that there can’t be a man-in-the-middle attack. And when the authentication happens, that is also encrypted—not compared to the original data, but to a digital minutiae. The point is that the system is very, very secure. So, if the objection is to centralization, then you should not have clouds. Clouds are also centralized,” said Nilekani. He added that Aadhaar was also safe from internal breaches, an assumption that is being challenged by security experts all across.&lt;br /&gt;&lt;br /&gt;“Within seven years of its launch, the Aadhaar system has made a remarkable leap in terms of its security and privacy and it will keep improving things. Technology does not come through immaculate conception, where one morning some perfect technology is born. It has to evolve. It’s called learning by doing,” added Nilekani. He added that improving the security of the system is an ongoing process and conceded that a data protection and privacy law needs to be in place to supplement the current Aadhaar law.&lt;br /&gt;&lt;br /&gt;“I know the government has sent a notice to everyone. If somebody has done it; they ought not to have done it—there’s a law for that,” said Nilekani when asked about recent instances of Aadhaar numbers being made public by government departments.&lt;br /&gt;&lt;br /&gt;“We should have a data protection and privacy law which is an umbrella law, which looks at all these phenomena and certainly Aadhaar should be part of that. That’s perfectly fine—but people are behaving as if Aadhaar is the only reason why we should have a privacy law,” added Nilekani.&lt;br /&gt;&lt;br /&gt;The last few weeks and months have witnessed a steady stream of negative news surrounding Aadhaar and three main cases are currently being fought in the Supreme Court, including one challenging the government’s decision to make the 12-digit ID mandatory for filing income tax returns as well as for obtaining and retaining a PAN Card.&lt;br /&gt;&lt;br /&gt;Meanwhile, as Mint reported in April, questions are being raised on the Aadhaar biometric authentication failure rate in the rural job guarantee scheme in areas such as Telangana.&lt;br /&gt;&lt;br /&gt;The report of Aadhaar numbers being listed on the government ministry website has caused widespread uproar, although a lawyer pointed out that it is not due to a breach in the Aadhaar system.&lt;br /&gt;&lt;br /&gt;“It’s a misnomer to say this a leak because this was voluntarily, very actively put up there. A leak is when some information being kept securely gets breached somehow and comes out. Now, why is this information up on government websites? This is the problem of our government’s perception of transparency...The fact that the Aadhaar numbers are on the government website is not a flaw of the Aadhaar system, but it is a flaw of the understanding of what needs to be done to demonstrate transparency,” said Rahul Matthan, partner at Trilegal.&lt;br /&gt;&lt;br /&gt;In a column in Mint, Matthan had also pointed out that while Aadhaar has been a transformative project, there remains enough scope of misusing the database.&lt;br /&gt;&lt;br /&gt;“There is a legitimate fear that this identity technology will open us all up to discrimination, prejudice and the risk of identity theft,” Matthan wrote. “Aadhaar has given us the tools to harness data in large volumes. If used wisely, this technology can transform the nation. If not, it can cause us untold harm. We need to be prepared for the impending flood of data—we need to build dams, sluice gates and canals in its path so that we can guide its flow to our benefit.”&lt;br /&gt;&lt;br /&gt;Even as both sides debate the issue of Aadhaar’s security, calls are getting louder to revamp the unique identification database.&lt;br /&gt;&lt;br /&gt;“The point is that the UIDAI knows the device ID of the machine with which the biometric transaction took place along with the time and date, which means that by just using basic data analytics, any one with access to the transaction logs from the UIDAI (which have to be kept for a period of 5 years and 6 months) can have a complete view of a person’s Aadhaar-based interactions that are increasing day by day.”&lt;br /&gt;&lt;br /&gt;“Further, the UIDAI has built up a biometric profile of the entire country. This means that courts can order UIDAI to provide law enforcement agencies the biometrics for an entire state (as the Bombay high court did) to check if they match against the fingerprints recovered from a crime scene. This too is surveillance, since it collects biometrics of all residents in advance rather than just that of criminal suspects,” said Prakash of CIS.&lt;br /&gt;&lt;br /&gt;“The UIDAI could have chosen to derive unique 16 digit numbers from your Aadhaar number and provide a different one to each requesting entity. That would have prevented much of these fears. But the UIDAI did not opt for that more privacy-friendly design,” he added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns'&gt;https://cis-india.org/internet-governance/news/livemint-may-5-2017-anirban-sen-aadhaar-assurances-fail-to-assuage-privacy-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-05-20T06:23:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india">
    <title>Aadhaar Act and its Non-compliance with Data Protection Law in India</title>
    <link>https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india</link>
    <description>
        &lt;b&gt;This post compares the provisions of the Aadhaar Act, 2016, with India's data protection regime as articulated in the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the file: &lt;a href="https://cis-india.org/internet-governance/blog/aadhaar-act-43a-it-rules" class="internal-link"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Amidst all the hue and cry, the Aadhaar Act 2016, which was introduced with the aim of providing statutory backing to the use of Aadhaar, was passed in the Lok Sabha in its original form on March 16, 2016, after rejecting the recommendations made by Rajya Sabha &lt;a name="_ftnref1"&gt;&lt;/a&gt; . Though the Act has been vehemently opposed on several grounds, one of the concerns that has been voiced is regarding privacy and protection of the 	demographic and biometric information collected for the purpose of issuing the Aadhaar number.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In India, for the purpose of data protection, a body corporate is subject to section 43A of the Information Technology Act, 2000 ("&lt;strong&gt;IT Act&lt;/strong&gt; ") and subsequent Rules, i.e. -The Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 	2011 ("&lt;strong&gt;IT Rules&lt;/strong&gt;"). Section 43A of the IT Act, 2000 &lt;a name="_ftnref2"&gt;&lt;/a&gt; holds a body corporate, which is possessing, dealing or handling any sensitive personal data or information, and is negligent in implementing and maintaining reasonable security practices resulting in wrongful loss or wrongful gain to any person, liable to compensate the affected person and pay damages.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Rule 3 of the IT Rules enlists personal information that would amount to Sensitive personal data or information of a person and includes the biometric information. Even the Aadhaar Act states under section 30 that the biometric information collected shall be deemed as "sensitive personal data or information", which shall have the same meaning as assigned to it in clause (iii) of the Explanation to section 43A of the IT Act; this reflects that biometric data collected in the Aadhaar scheme will receive the same level of protection as is provided to other sensitive personal data under Indian law. This implies that, the agencies contracted by the UIDAI (and not the UIDAI itself) to perform functions like collection, authentication, etc. like the 	Registrars, Enrolling Agencies and Requesting Entities, which meet the criteria of being a 'body corporate' as defined in section 43A, &lt;a name="_ftnref3"&gt;&lt;/a&gt; could be held responsible under this provision, as well as the Rules, to ensure security of the data and information of Aadhaar holder and could potentially be held liable for breach of information that results in loss to an individual if it can be proven that they failed to implement reasonable 	security practices and procedures.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In light of the fact that some actors in the Aadhaar scheme could be held accountable and liable under section 43A and associated Rules, this article compares the regulations regarding data security as found in section 43A and IT Rules 2011 with the provisions of Aadhaar Act 2016, and discusses the 	implications of the differences, if any.&lt;/p&gt;
&lt;h3&gt;1. Compensation and Penalty&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 43A:&lt;/strong&gt; Section 43A of the IT Act, 2000 (Amended in 2008) provides for compensation for failure to protect data. It states that a body corporate, which is 	possessing, dealing or handling any sensitive personal data or information, and is negligent in implementing and maintaining reasonable security practices 	resulting in wrongful loss or wrongful gain to any person, is liable to compensate the affected person and pay damages not exceeding five crore rupees.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar&lt;/strong&gt; &lt;strong&gt;Act :&lt;/strong&gt; Chapter VII of the Act provides for offences and penalties, but does not talk about damages to the affected party.&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Section 37 states that intentional disclosure or dissemination of identity information, to any person not authorised under the Aadhaar Act, or in violation of any agreement entered into under the Act, will be punishable with imprisonment up to three years or a fine up to ten thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company). &lt;/li&gt;
&lt;li&gt;Section 38 prescribes penalty with imprisonment up to three years and a fine not less than ten lakh rupees in case any of the acts listed under the provision are performed without authorisation from the UIDAI. &lt;/li&gt;
&lt;li&gt;Section 39 prescribes penalty with imprisonment for a term which may extend to three years and fine which may extend to ten thousand rupees for tampering with data in Central Identities Data Repository. &lt;/li&gt;
&lt;li&gt;Section 40 holds a requesting entity liable for penalty for use of identity information in violation of Section 8 (3) with imprisonment up to three years and/or a fine up to ten thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company). &lt;/li&gt;
&lt;li&gt;Section 41 holds a requesting entity or enrolling agency liable for penalty for violation of Section 8 (3) or Section 3 (2) with imprisonment up to one year and/or a fine up to ten thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company). &lt;/li&gt;
&lt;li&gt;Section 42 provides general penalty for any offence against the Act or regulations made under it, for which no specific penalty is provided, with imprisonment up to one year and/or a fine up to twenty five thousand rupees (in case of an individual), and fine up to one lakh rupees (in case of a company). &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Though the Aadhaar Act prescribes penalty in case of unauthorised access, use or any other act contravening the Regulations, it fails to guarantee protection to the information and does not provide for compensation in case of violation of the provisions.&lt;/p&gt;
&lt;h3&gt;2. Privacy Policy&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 4 requires a body corporate to provide a privacy policy on their website, which is easily accessible, provides for the type and purpose of 	personal, sensitive personal information collected and used, and Reasonable security practices and procedures.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Though in practise the contracting agencies (the body corporates under the Aadhaar ecosystem) may maintain a privacy policy on their website, 	the Aadhaar Act does not require a privacy policy for the UIDAI or other actors.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Implications:&lt;/strong&gt; Because contracting agencies will be covered by the IT Rules if they are 'body corporates', the requirement to maintain a privacy policy will be applicable to them.&lt;/p&gt;
&lt;h3&gt;3. Consent&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5 requires that prior to the collection of sensitive personal data, the body corporate must obtain consent, either in writing or through fax regarding 	the purpose of usage before collection of such information.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act: &lt;/strong&gt; The Act is silent regarding consent being acquired in case of the enrolling agency or registrars. However, section 8 provides that any requesting entity 	will take consent from the individual before collecting his/her Aadhaar information for authentication purposes, though it does not specify the nature (written/through fax).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Implications:&lt;/strong&gt; If the enrolling agency is a body corporate, they will also be required to take consent prior to collecting and processing biometrics. It is possible that since the Aadhaar Act envisages a scheme which is quasi-compulsory in nature, a consent provision was deliberately left out. This 	circumstance would give the enrolling agencies an argument against taking consent, by saying that the Aadhaar Act is a specific legislation which is also later in point of time than the IT Rules, and a deliberate omission of consent coupled with the compulsory nature of the Aadhaar scheme would mean that they are not required to take consent of the individuals before enrolment.&lt;/p&gt;
&lt;h3&gt;4. Collection Limitation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules: &lt;/strong&gt; Rule 5 (2) requires that a body corporate should only collect sensitive personal data if it is connected to a lawful purpose and is considered necessary for that purpose.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Section 3(1) of the Act states that every resident shall be entitled to obtain an aadhaar number by submitting his demographic information and biometric 	information by undergoing the process of enrolment.&lt;/p&gt;
&lt;h3&gt;5. Notice&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules: &lt;/strong&gt; Rule 5(3) requires that while collecting information directly from an individual, the body corporate must provide the following information:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;The fact that information is being collected&lt;/li&gt;
&lt;li&gt;The purpose for which the information is being collected&lt;/li&gt;
&lt;li&gt;The intended recipients of the information&lt;/li&gt;
&lt;li&gt;The name and address of the agency that is collecting the information&lt;/li&gt;
&lt;li&gt;The name and address of the agency that will retain the information&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Section 3 of the Act states that at the time of enrolment and collection of information, the enrolling agency shall notify the individual as to how their 	information will be used; what type of entities the information will be shared with; and that they have a right to see their information and also tell them 	how they can see their information. However, the Act is silent regarding notice of name and address of the agency collecting and retaining the information.&lt;/p&gt;
&lt;h3&gt;6. Retention Limitation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5(4) requires that body corporate must retain sensitive personal data only for as long as it takes to fulfil the stated purpose or otherwise required 	under law.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; The Act is silent regarding this and does not mention the duration for which the personal information of an individual shall be retained by the 	bodies/organisations contracted by UIDAI.&lt;/p&gt;
&lt;h3&gt;7. Purpose Limitation&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5(5) requires that information must be used for the purpose that it was collected for.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act&lt;a name="move447203643"&gt;&lt;/a&gt;&lt;/strong&gt; Section 57 contravenes this and states that the Act will not prevent use of Aadhaar number for other purposes under law by the State or other bodies. 	Section 8 of the Act states that for the purpose of authentication, a requesting entity is required to take consent before collection of Aadhaar 	information and use it only for authentication with the CIDR. Section 29 of the Act states that the core biometric information collected will not be shared 	with anyone for any reason, and must not be used for any purpose other than generation of Aadhaar numbers and authentication. Also, the Identity information available with a requesting entity will not be used for any purpose other than what is specified to the individual, nor will it be shared 	further without the individual's consent.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="move4472036436"&gt;&lt;/a&gt; Act will not prevent use of Aadhaar number for other purposes under law by the State or other bodies.&lt;/p&gt;
&lt;h3&gt;8. Right to Access and Correct&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules :&lt;/strong&gt; Rule 5(6) requires a body corporate to provide individuals with the ability to review the information they have provided and access and correct their 	personal or sensitive personal information.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act :&lt;/strong&gt; The Act provides under section 3 that at the time of enrolment, the individual needs to be informed about the existence of a right to access information, the procedure for making requests for such access, and details of the person or department in-charge to whom such requests can be made. Section 28 of the Act provides that every aadhaar number holder may access his identity information except core biometric information. Section 32 provides that every Aadhaar number holder may obtain his authentication record. Also, if the demographic or biometric information about any Aadhaar number holder changes, is lost or is found to be incorrect, they may request the UIDAI to make changes to their record in the CIDR.&lt;/p&gt;
&lt;h3&gt;9. Right to 'Opt Out' and Withdraw Consent&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5(7) requires that the individual must be provided with the option of 'opting out' of providing data or information sought by the body corporate. 	Also, they must have the right to withdraw consent at any point of time.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; The Aadhaar Act does not provide an opt- out provision and also does not provide an option to withdraw consent at any point of time. Section 7 of the 	Aadhaar Act actually implies that once the Central or State government makes aadhaar authentication mandatory for receiving a benefit then the individual has no other option but to apply for an Aadhaar number. The only concession that is made is that if an Aadhaar number is not assigned to an individual then s/he would be offered some alternative viable means of identification for receiving the benefit.&lt;/p&gt;
&lt;h3&gt;10. Grievance Officer&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 5(9) requires that body corporate must designate a grievance officer for redressal of grievances, details of which must be posted on the body corporate's website and grievances must be addressed within a month of receipt.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act&lt;/strong&gt;: The Aadhaar Act does not provide for any such mechanism for grievance redressal by the registrars, enrolling agencies or the requesting entities. However, since the contracting agencies will also get covered by the IT Rules if they are 'body corporates', the requirement to designate a 	grievance officer would be applicable to them as well due to the IT Rules.&lt;/p&gt;
&lt;h3&gt;11. Disclosure with Consent, Prohibition on Publishing and Further Disclosure&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 6 requires that body corporate must have consent before disclosing sensitive personal data to any third person or party, except in the case with Government agencies for the purpose of verification of identity, prevention, detection, investigation, on receipt of a written request. Also, the body corporate or any person on its behalf shall not publish the sensitive personal information and the third party receiving the sensitive personal information from body corporate or any person on its behalf shall not disclose it further.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Regarding the requesting entities, the Act provides that they shall not disclose the identity information except with the prior consent of the individual 	to whom the information relates. The Act also states that the Authority shall take necessary measures to ensure confidentiality of information against 	disclosures. However, as an exception under section 33, the UIDAI may reveal identity information, authentication records or any information in the CIDR following a court order by a District Judge or higher. The Act also allows disclosure made in the interest of national security following directions by a 	Joint Secretary to the Government of India, or an officer of a higher rank, authorised for this purpose. The Act is silent on the issue of obtaining consent of the individual under these exceptions. Additionally, the Act also states that the Aadhaar number or any core biometric information collected or 	created regarding an individual under the Act shall not be published, displayed or posted publicly, except for the purposes specified by regulations.&lt;/p&gt;
&lt;h3&gt;12. Requirements for Transfer of Sensitive Personal Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules :&lt;/strong&gt; Rule 7 requires that body corporate may transfer sensitive personal data into another jurisdiction only if the country ensures the same level of protection and may be allowed only if it is necessary for the performance of the lawful contract between the body corporate or any person on its behalf and provider 	of information or where such person has consented to data transfer.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act :&lt;/strong&gt; The Act is silent regarding transfer of personal data into another jurisdiction by the any of the contracting bodies like the Registrar, Enrolling agencies or the requesting entities. However, if these agencies satisfy the requirement of being "body corporates" as defined under section 43A, then the above 	requirement regarding transfer of data to another jurisdiction under IT Rules would be applicable to them. However, considering the sensitive nature of the data involved, the lack of a prohibition of transferring data to another jurisdiction under the Aadhaar Act appears to be a serious lacuna.&lt;/p&gt;
&lt;h3&gt;13. Security of Information&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;IT Rules:&lt;/strong&gt; Rule 8 requires that the body corporate must secure information in accordance with the ISO 27001 standard or any other best practices notified by Central 	Government. These practices must be audited annually or when the body corporate undertakes a significant up gradation of its process and computer resource.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Aadhaar Act:&lt;/strong&gt; Section 28 of the Act states that the UIDAI must ensure the security and confidentiality of identity information and authentication records. It also states 	that the Authority shall adopt and implement appropriate technical and organisational security measures, and ensure the same are imposed through agreements/arrangements with its agents, consultants, advisors or other persons. However, it does not mention which standards/measures have to be adopted by all the actors in Aadhaar ecosystem for ensuring the security of information, though it can be argued that if the contractors employed by the UIDAI are body corporate then the standards prescribed under the IT Rules would be applicable to them.&lt;/p&gt;
&lt;h3&gt;Implications of the Differences for Body Corporates in Aadhaar Ecosystem&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;An analysis of the Rules in comparison to the data protection measures under the Aadhaar Act shows that the requirements regarding protection of personal or sensitive personal information differ and are not completely in line with each other. &lt;a name="move446519928"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Though the Aadhaar Act takes into account the provisions regarding consent of the individual, notice, restriction on sharing, etc., the Act is silent regarding many core measures like sharing of information across jurisdictions, taking consent before collection of information, adoption of security 	measures for protection of information, etc. which a body corporate in the Aadhaar ecosystem must adopt to be in compliance with section 43A of the IT Act. It is therefore important that the bodies collecting, handling, sharing the personal information and are governed by the Aadhaar Act, must adhere to section 43A and the IT Rules 2011. However, applicability of Aadhaar Act as well as section 43A and IT Rules 2011 would lead to ambiguity regarding interpretation and implementation of the Law. The differences must be duly taken into account and more clarity is required to make all the bodies under 	this Legislation like the enrolling agencies, Registrars and the Requesting Entities accountable under the correct provisions of Law. However, having two separate legislations governing the data protection standards in the Aadhaar scheme seems to have been overlooked. A harmonized and overarching privacy legislation is critical to avoid unclarity in the applicability of data protection standards and would also address many privacy concerns associated to the scheme.&lt;/p&gt;
&lt;h3&gt;Appendix I&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Rajya Sabha had proposed five amendments to the Aadhaar Act 2016, which are as follows:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;i. Opt-out clause:&lt;/strong&gt; A provision to allow a person to "opt out" of the Aadhaar system, even if already enrolled.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;ii. Voluntary:&lt;/strong&gt; To ensure that if a person chooses not to be part of the Aadhaar system, he/she would be provided "alternate and viable" means of identification for purposes of delivery of government subsidy, benefit or service.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;iii.&lt;/strong&gt; Amendment restricting the use of Aadhaar numbers only for targeting of government benefits or service and not for any other purpose.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;iv.&lt;/strong&gt; Amendment seeking change of the term "national security" to "public emergency or in the interest of public safety" in the provision specifying situations in which disclosure of identity information of an individual to certain law enforcement agencies can be allowed.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;v. Oversight Committee:&lt;/strong&gt; The oversight committee , which would oversee the possible disclosure of information, should include either the Central Vigilance Commissioner or the Comptroller and Auditor-General.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Sources:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;a href="http://indianexpress.com/article/india/india-news-india/rajya-sabha-returns-aadhar-bill-to-lok-sabha-with-oppn-amendments/"&gt; http://indianexpress.com/article/india/india-news-india/rajya-sabha-returns-aadhar-act-to-lok-sabha-with-oppn-amendments/ &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; &lt;a href="http://thewire.in/2016/03/16/three-rajya-sabha-amendments-that-will-shape-the-aadhaar-debate-24993/"&gt; http://thewire.in/2016/03/16/three-rajya-sabha-amendments-that-will-shape-the-aadhaar-debate-24993/&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Appendix II - Section 43A: Compensation for Failure to Protect Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Where a body corporate, possessing, dealing or handling any sensitive personal data or information in a computer resource which it owns, controls or operates, is negligent in implementing and maintaining reasonable security practices and procedures and thereby causes wrongful loss or wrongful gain to any person, such body corporate shall be liable to pay damages by way of compensation to the person so affected.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For the purposes of this section:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;"body corporate" means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities;&lt;/li&gt;
&lt;li&gt;"reasonable security practices and procedures" means security practices and procedures designed to protect such information from unauthorised access, damage, use, modification, disclosure or impairment, as may be specified in an agreement between the parties or as may be specified in any law for the time being in force and in the absence of such agreement or any law, such reasonable security practices and procedures, as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit;&lt;/li&gt;
&lt;li&gt;"sensitive personal data or information" means such personal information as may be prescribed by the Central Government in consultation with such professional bodies or associations as it may deem fit.'.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;The term 'body corporate' has been defined under section 43A as "any company and includes a firm, sole proprietorship or other association of individuals &lt;em&gt;engaged in commercial or professional activities&lt;/em&gt;"&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india'&gt;https://cis-india.org/internet-governance/blog/aadhaar-act-and-its-non-compliance-with-data-protection-law-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-04-18T11:43:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tweet-and-poke">
    <title>A Tweet and a poke from the CEO</title>
    <link>https://cis-india.org/news/tweet-and-poke</link>
    <description>
        &lt;b&gt;The official grapevine has moved online, and Twitter is the new water-cooler.&lt;/b&gt;
        
&lt;p&gt;The office grapevine has moved online, and Twitter is the new water cooler.&amp;nbsp; Social media may be all the rage, and every company may want in, but for the majority of Indian companies grappling with the phenomenon, it is proving too tempestuous a beast to control.&lt;/p&gt;
&lt;p&gt;From India alone, for instance, 18 million unique visitors logged on to Facebook in May, each of them posting multiple status messages that often dealt with their places of work. Ban these practices all you like, experts say, but employees will still find ways to log on to social media. Better, then, to ride the wave rather than risk going down with it.&lt;/p&gt;
&lt;p&gt;Some Indian companies have already begun to learn this the hard way. When Infosys Technologies Ltd announced its IRace (Infosys Role and Career Enchancement) programme in April, changing the company’s hierarchy drastically, disgruntled employees lashed out at their company on blogs and Facebook.&lt;/p&gt;
&lt;p&gt;“The company couldn’t do much then, because they didn’t have a social media policy in place,” says Mahesh Murthy, CEO of Pinstorm Consulting and a social media expert. Murthy mentions another large financial services firm that fired employees for commenting on Orkut about internal incentive programmes.&lt;/p&gt;
&lt;p&gt;The time has arrived, then, for companies to institute social media policies—to define, in a sense, what sort of tweet is appropriate and what will earn a black mark. But Indian firms trying to do just this are emerging with very mixed results.&lt;/p&gt;
&lt;p&gt;There are, on the one hand, the fast adopters. Technology and media companies that were the first to run head-on into social media were also, not surprisingly, the first to put basic guidelines in place.&lt;/p&gt;
&lt;p&gt;Wipro Ltd and HCL Technologies Ltd not only have social media policies, they also promote communication and events for their employees on these media. A couple of months ago, the Spirit of Wipro run was promoted in real-time on Twitter and on its official Facebook page. “Wipro became one of the first companies to hold a Twitter conference, for our joint CEO to discuss our diversity initiatives,” says Rajan Kohli, Wipro’s chief marketing officer.&lt;/p&gt;
&lt;p&gt;Also Read The Future of the Internet (&lt;a class="external-link" href="http://www.livemint.com/articles/keywords.aspx?kw=India%20Internet"&gt;Complete Series&lt;/a&gt;)&lt;/p&gt;
&lt;p&gt;HCL has named digital ambassadors who use their social networks and online personas to share ideas and help the company reach out. In HCL’s annual exercise to articulate the company’s vision, employees communicate with the CEO through Facebook. Infosys has formulated its own social media policy now, and is preparing to roll it out over the next six months.&lt;/p&gt;
&lt;p&gt;The other early adopter has been the media sector. As traditional media houses have started to build digital presences, conglomerates such as HT Media Ltd and Bennet, Coleman and Co. Ltd specify what a journalist’s digital avatar can and cannot say online. (Mint has an extensive social media policy for its employees.) Print journalists typically cannot reveal their employer on their Facebook or Twitter pages, or post original opinions.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;But here’s the catch with such a strategy: The Internet is a hard place to be anonymous. “If you are a well-known writer, even if you don’t identify yourself, people can easily put two and two together,” says Nishant Shah, of the Centre for Internet and Society (CIS). “Policies like that are hard to implement and don’t really make sense.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;To be sure, there are exceptions; Open, the weekly magazine, looks at Facebook and Twitter as channels to direct traffic to its online content. “We have no policy of employees not identifying themselves on social media or associating themselves with the magazine,” says Rajesh Jha, a deputy editor at &lt;em&gt;Open&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Another surprisingly prompt responder to social media trends has been the education sector. While most institutions don’t have restrictive policies for public platforms such as Facebook, Twitter and blogs, some have gone in a different direction and created closed networks. Shah argues that a closed network has the same features—and issues—as open social media.&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;“These are again peer-to-peer platforms, where teachers and students interact with each other, and any communication has a large audience and gets recorded for posterity,” he says. “This makes it as much of a social medium as Facebook or Twitter.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Bangalore’s Christ University has created an institutional repository for every single submission made by students and faculty. Test grades and lesson plans are posted online, and students and teachers communicate through the system. The Indian Institute of Management, Bangalore, has completely digitized its classrooms, so that write-ups on every lesson are available online. Students and teachers co-develop curricula through its platform as well.&lt;/p&gt;
&lt;p&gt;One sector that has been slow to respond to these trends is the outsourcing sector. With annual attrition rates of 50-60%, these firms focus more on turnaround than on investment. Social media websites are typically banned altogether in call centres.&lt;/p&gt;
&lt;p&gt;As social media evolves, ways to leverage it do as well. Large telecom firms such as Bharti Airtel Ltd, Tata Teleservices Ltd and Alcatel-Lucent use Facebook for research and development. Supriya Dhanda, Alcatel-Lucent’s head of human resources, says that her firm encourages “senior leaders...to keep blogs active and use them to promote key messages on strategy, people and operating mechanisms”.&lt;/p&gt;
&lt;p&gt;In the US, a couple of smaller firms have been able to harness social media in innovative ways. Best Buy, an electronics retail chain, aggregates employee activity online, whether on blogs or Twitter, onto a platform called Best Buy Connect. Zappos, which sells shoes and bags online, has a similar Twitter aggregation tool that pulls any tweet mentioning the company. Employees are encouraged to post on the firm’s Facebook and YouTube pages, and its CEO, Tony Hsieh, has at least a million followers on Twitter.&lt;/p&gt;
&lt;p&gt;But Murthy doesn’t necessarily think that Indian firms need to follow in the wake of US firms such as Intel, IBM and CNN, which have clearly defined social media policies. “First, the US is a litigious country and most social media policies there are circumscribed by what corporate lawyers allow employees to say and not say,” he says. “Two, Indian firms can actively use social media as a global marketing tool, especially because it involves no media costs. In the US, firms still look at it largely as a...customer-service function.”&lt;/p&gt;
&lt;blockquote&gt;
&lt;p&gt;Shah adds that India doesn’t have a clearly installed legal privacy framework, unlike the US or Australia. “What is public space and what is private is still largely a subject of interpretation,” Shah says. “So we will evolve our own path.”&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Read the original in Livemint &lt;a class="external-link" href="http://www.livemint.com/2010/12/30212513/A-Tweet-and-a-poke-from-the-CE.html?h=B"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tweet-and-poke'&gt;https://cis-india.org/news/tweet-and-poke&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-02T01:30:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news">
    <title>A trust deficit between advertisers and publishers is leading to fake news</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news</link>
    <description>
        &lt;b&gt;Transparency regulations is need of the hour. And urgently for election and political advertising. What do the ads look like? Who paid for them? Who was the target? How many people saw these advertisements? How many times? Transparency around viral content is also required.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="https://www.hindustantimes.com/analysis/a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news/story-SVNH9ot3KD50XRltbwOyEO.html"&gt;Hindustan Times&lt;/a&gt; on September 24, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Traditionally, we have depended on the private censorship that  intermediaries conduct on their platforms. They enforce, with some  degree of success, their own community guidelines and terms of services  (TOS). Traditionally, these guidelines and TOS have been drafted keeping  in mind US laws since historically most intermediaries, including  non-profits like Wikimedia Foundation were founded in the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Across  the world, this private censorship regime was accepted by governments  when they enacted intermediary liability laws (in India we have Section  79A of the IT Act). These laws gave intermediaries immunity from  liability emerging from third party content about which they have no  “actual knowledge” unless they were informed using takedown notices.  Intermediaries set up offices in countries like India, complied with  some lawful interception requests, and also conducted geo-blocking to  comply with local speech regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For years, the Indian  government has been frustrated since policy reforms that it has pursued  with the US have yielded little fruit. American policy makers keep  citing shortcomings in the Indian justice systems to avoid expediting  the MLAT (Mutual Legal Assistance Treaties) process and the signing of  an executive agreement under the US Clout Act. This agreement would  compel intermediaries to comply with lawful interception and data  requests from Indian law enforcement agencies no matter where the data  was located.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The data localisation requirement in the draft  national data protection law is a result of that frustration. As with  the US, a quickly enacted data localisation policy is absolutely  non-negotiable when it comes to Indian military, intelligence, law  enforcement and e-governance data. For India, it also makes sense in the  cases of health and financial data with exceptions under certain   circumstances. However, it does not make sense for social media  platforms since they, by definition, host international networks of  people. Recently an inter ministerial committee recommended that  “criminal proceedings against Indian heads of social media giants” also  be considered. However, raiding Google’s local servers when a lawful  interception request is turned down or arresting Facebook executives  will result in retaliatory trade actions from the US.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the consequences of online recruitment, disinformation in  elections and fake news to undermine public order are indeed serious,  are there alternatives to such extreme measures for Indian policy  makers? Updating intermediary liability law is one place to begin. These  social media companies increasingly exercise editorial control, albeit  indirectly, via algorithms to claim that they have no “actual  knowledge”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But they are no longer mere conduits or dumb pipes as  they are now publishers who collect payments to promote content.  Germany passed a law called NetzDG in 2017 which requires expedited  compliance with government takedown orders. Unfortunately, this law does  not have sufficient safeguards to prevent overzealous private  censorship. India should not repeat this mistake, especially given what  the Supreme Court said in the Shreya Singhal judgment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Transparency  regulations are imperative. And they are needed urgently for election  and political advertising. What do the ads look like? Who paid for them?  Who was the target? How many people saw these advertisements? How many  times? Transparency around viral content is also required. Anyone should  be able to see all public content that has been shared with more than a  certain percentage of the population over a historical timeline for any  geographic area. This will prevent algorithmic filter bubbles and echo  chambers, and also help public and civil society monitor  unconstitutional and hate speech that violates terms of service of these  platforms. So far the intermediaries have benefitted from surveillance —  watching from above. It is time to subject them to sousveillance —  watched by the citizens from below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data portability mandates and  interoperability mandates will allow competition to enter these monopoly  markets. Artificial intelligence regulations for algorithms that  significantly impact the global networked public sphere could require –  one, a right to an explanation and two, a right to influence automated  decision making that influences the consumers experience on the  platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The real solution lies elsewhere. Google and Facebook  are primarily advertising networks. They have successfully managed to  destroy the business model for real news and replace it with a business  model for fake news by taking away most of the advertising revenues from  traditional and new news media companies. They were able to do this  because there was a trust deficit between advertisers and publishers.  Perhaps this trust deficit could be solved by a commons-based solutions  based on free software, open standards and collective action by all  Indian new media companies.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-sunil-abraham-september-24-2018-a-trust-deficit-between-advertisers-and-publishers-is-leading-to-fake-news&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2018-10-02T06:44:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote">
    <title>A Three-Way Race Draws Delhi’s Young, and Everyone Else, Out to Vote</title>
    <link>https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote</link>
    <description>
        &lt;b&gt;The polling stations were supposed to close at 5:30 p.m. on Wednesday, just after sunset. But with thousands still waiting in the dark to cast their vote in the state assembly elections, the Delhi Election Commission decided to extend the voting until 6:30 p.m. Then to 7:30 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Betwa Sharma was &lt;a class="external-link" href="http://india.blogs.nytimes.com/2013/12/04/a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote/?_r=1"&gt;published in the New York Times&lt;/a&gt; on December 4, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Finally, the Election Commission said it would wait until 9:30 p.m. to close the polls. At the polling station in the New Delhi district, those waiting in line agreed that a relatively warm winter evening was helping to draw people out to vote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though no official data on voter turnout had been released by 9 p.m., it was clear that voters were coming out in unprecedented numbers for this year’s Delhi state elections. Analysts were predicting that this election would break the previous voter turnout record of 61.75 percent in 1993.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike in the past, this year’s contest featured a potential spoiler in the Aam Aadmi, or Common Man, Party. Its leader, the firebrand anticorruption activist Arvind Kejriwal, was battling to dethrone the state’s longtime chief minister, Sheila Dikshit of the Congress Party, and siphon votes from the other establishment choice, the Bharatiya Janata Party, or B.J.P. (Exit polls by the &lt;a href="http://zeenews.india.com/assembly-elections-2013/delhi-polls/delhi-exit-polls-live-bjp-biggest-winner-aap-plays-spoilsport-for-congress_894372.html"&gt;local media&lt;/a&gt; on Wednesday night were showing that the B.J.P. was likely to win the most seats in the state assembly.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The prospect of upending the political status quo brought out young voters like 23-year-old Hina Kousar, although she had to put up a fight with her family to cast her vote for the Aam Aadmi Party. Her mother lectured her on how governments don’t care about people, but that didn’t deter Ms. Kousar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“They have the wrong mentality, and young people should change it,” she said. “My granny is 70 years old and I told her to vote.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many of the youthful voters turned voting into a social activity, both in person and online. At one polling station, most people cast their votes quietly and left, but many of the young voters came with their friends. They talked animatedly about their choices while leaving the polling stations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others called their families to say they had voted. Some clicked photos of each other on their smartphones and posted the images on their Facebook pages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In less than a year, Mr. Kejriwal, 45, and his party has pasted itself quite literally on city’s consciousness with aggressive campaigns and posters of brooms, symbolizing sweeping away the old order. And that’s why he got Ms. Kousar’s vote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The most important thing is that he has promised to remove corruption. The money that is going into Swiss banks is our money. The rising market prices are because of it,” she said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several voters between the ages of 20 to 25 who were interviewed by India Ink said they were backing Mr. Kejriwal, who represented a change from the three-term winner Ms. Dikshit. The B.J.P. had no star state candidate that appealed to them, even though its prime ministerial candidate, Narendra Modi, engaged with students at Delhi University earlier this year and is extremely active on social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides corruption, several young voters, both male and female, said that ensuring women’s safety had to be a priority for any Delhi government.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Another Kejriwal voter, Kavita, a 27-year-old teacher who goes by one name, said that Ms. Dikshit’s government hadn’t effectively improved women’s safety after the gang rape of a physiotherapy student one year ago. “I don’t feel the difference,” she said. “I still feel unsafe on the streets, so let’s see what some new leaders can do to change this.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abhilash Sasidharan, 26, after he cast his vote at a polling booth in New Delhi on Wednesday.Betwa Sharma Abhilash Sasidharan, 26, after he cast his vote at a polling booth in New Delhi on Wednesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another Kejriwal supporter, Abhilash Sasidharan, 27, said a safe environment for women is “absolutely” the most important thing to him, but the software engineer also was moved that Mr. Kejriwal had left his lucrative job as a revenue service officer to join politics.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Kavita.png" alt="Kavita" class="image-inline" title="Kavita" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span class="caption"&gt;Kavita, 27, after she cast her vote at a polling booth in New Delhi on Wednesday.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;“I don’t have the courage to step into dirty politics, but he does and I want to support that,” he said. “Look, Congress has had 15 years, so why not see if someone can do better, and all these parties should feel a threat to do better.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But not all young people are buying Mr. Kejriwal’s promises of sweeping change. Shiv Raj Syal, 20, called them “flowery and too good to believe,” as he cast his vote for Ms. Dikshit. “He is just very new at this and I don’t think it’s wise to hand over the running of a national capital to a party with no experience,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The chief minister had focused on development, the college student said, making Delhi a hub for foreign brands and corporates, and transforming it into an international city.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Abhilash.png" title="Abhilash" height="215" width="161" alt="Abhilash" class="image-inline" /&gt;&lt;/p&gt;
&lt;p&gt;Abhilash Sasidharan, 26, after he cast his vote at a polling booth in New Delhi on Wednesday.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Despite the appearance of a robust youth presence at the polls on Wednesday, analysts are waiting on the Election Commission’s numbers before declaring this election cycle the year of the youth vote.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sanjay Kumar, an election analyst from the Center for the Study of Developing Societies in Delhi, said that as of July, only 68 percent of eligible voters between the ages of 18 and 21 had registered to vote, far lower than the 86 percent average of other demographics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;V.S. Sampath, the chief election commissioner in India, said that youth participation in the electoral process had been a priority in recent years, and several efforts including visiting universities and colleges had been made to register them, which had resulted in a “significant increase.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, Mr. Sampath said, 119,000 voters between the ages of 18 and 19 were on the electoral rolls in Delhi, which accounted for 0.93 percent of total Delhi voters, but now the numbers had gone up to 405,000, or 3.4 percent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Election observers have also pointed out that the hype about social media, especially Twitter, becoming a tool for political expression and organization for the youth has not necessarily translated into a surge in voting in that demographic of users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The political debates on social media could translate into votes by the next elections, according to Sunil Abraham from the Centere of Internet and Society in Bangalore, who describes the Internet penetration as “limited,” and social media use even smaller and dominated by the economic elite.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mr. Abraham, however, said social media is influencing the political discourse, not by motivating voters, but by influencing the coverage in mainstream media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Relative to the country’s population, he added, social media users had a “disproportionate influence on discourse.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the young voters who spoke to India Ink said that at least for them, social media did play a role in drawing them into politics this year. Mr. Syal, the Congress voter, for instance, said that he had posted a message on his Facebook wall criticizing some of Mr. Kejriwal’s claims, which drew 50 comments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And Mr. Sasidharan, the Aam Aadmi Party supporter, posted on Facebook a photo of him holding up his finger stained with ink, showing that he voted, immediately after coming out of the polling station. “I hope that it inspires more people to come and vote,” he said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote'&gt;https://cis-india.org/news/nytimes-december-4-2013-betwa-sharma-a-three-way-race-draws-delhis-young-and-everyone-else-out-to-vote&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-12-26T07:03:54Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/global-voices-may-28-2013-eduardo-bertoni-a-technological-solution-to-the-challenges-of-online-defamation">
    <title>A Technological Solution to the Challenges of Online Defamation </title>
    <link>https://cis-india.org/internet-governance/blog/global-voices-may-28-2013-eduardo-bertoni-a-technological-solution-to-the-challenges-of-online-defamation</link>
    <description>
        &lt;b&gt;When people are insulted or humiliated on the Internet and decide to take legal action, their cases often follow a similar trajectory.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This blog post written by Eduardo Bertoni was &lt;a class="external-link" href="http://advocacy.globalvoicesonline.org/2013/05/28/a-technological-solution-to-the-challenges-of-online-defamation/"&gt;published in GlobalVoices&lt;/a&gt; on May 28, 2013. CIS has cross-posted this under the Creative Commons Licence.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Consider this scenario:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A public figure, let’s call her Senator X, enters her name into a search  engine. The results surprise her — some of them make her angry because  they come from Internet sites that she finds offensive. She believes  that her reputation has been damaged by certain content within the  search results and, consequently, that someone should pay for the  personal damages inflicted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Her lawyer recommends appealing to the search engine – the lawyer  believes that the search engine should be held liable for the personal  injury caused by the offensive content, even though the search engine  did not create the content. The Senator is somewhat doubtful about this  approach, as the search engine will also likely serve as a useful tool  for her own self-promotion. After all, not all sites that appear in the  search results are bothersome or offensive. Her lawyer explains that  while results including her name will likely be difficult to find, the  author of the offensive content should also be held liable. At that  point, one option is to request that the search engine block any  offensive sites related to the individual’s name from its searches. Yet  the lawyer knows that this cannot be done without an official petition,  which will require a judge’s intervention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We must go against everyone – authors, search engines – everyone!” the  Senator will likely say. “Come on!” says the lawyer, “let's move  forward.” However, it does not occur to either the Senator or the lawyer  that there may be an alternative approach to that of classic courtroom  litigation. The proposal I make here suggests a change to the standard  approach – a change that requires technology to play an active role in  the solution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Who is liable?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The “going against everyone” approach poses a critical question: Who  is legally liable for content that is available online? Authors of  offensive content are typically seen as primarily liable. But should  intermediaries such as search engines also be held liable for content  created by others?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This last question raises a very specific, procedural question: Which  intermediaries will be the subjects of scrutiny and viewed as liable in  these types of situations? To answer this question, we must distinguish  between intermediaries that provide Internet access (e.g. Internet  service providers) and intermediaries that host content or offer content  search functions. But what exactly is an ‘intermediary’? And how do we  evaluate where an intermediary’s responsibility lies? It is also  important to distinguish those intermediaries which simply connect  individuals to the Internet from those that offer different services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What kind of liability might an intermediary carry?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;This brings us to the second step in the legal analysis of these  situations: How do we determine which model we use in defining the  responsibility of an intermediary? Various models have been debated in  the past. Leading concepts include:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;strict liability&lt;/i&gt;, under which the intermediary must legally respond to all offensive content&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;subjective liability&lt;/i&gt;, under which the intermediary’s response depends on what it has done and what it was or is aware of&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;conditional liability&lt;/i&gt; – a variation on subjective liability –  under which, if an intermediary was notified or advised that it was  promoting or directing users to illegal content and did nothing in  response, it is legally required to respond to the offensive content.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;These three options for determining liability and responses to offensive  online content have been included in certain legislation and have been  used in judicial decisions by judges around the world. But not one of  these three alternatives provides a perfect standard. As a result,  experts continue to search for a definition of liability that will  satisfy those who have a legitimate interest in preventing damages that  result from offensive content online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;How are victims compensated?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Now let’s return to the example presented earlier. Consider the concept  of Senator X’s “satisfaction.” In these types of situations,  “satisfaction” is typically economic — the victim will sue for a certain  amount of money in “damages”, and she can target anyone involved,  including the intermediary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, in the offline world, alternatives have been found for  victims of defamation: For example, the “right to reply” aims to aid  anyone who feels that his or her reputation or honor has been damaged  and allows individuals to explain their point of view.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We must also ask if the right to reply is or is not contradictory to  freedom of expression. It is critical to recognize that freedom of  expression is a human right recognized by international treaties;  technology should be able to achieve a similar solution to issues of  online defamation without putting freedom of expression at risk.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Solving the problem with technology&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an increasingly online world, we have unsuccessfully attempted to  apply traditional judicial solutions to the problems faced by victims  like Senator X. There have been many attempts to apply traditional  standards because lawyers are accustomed to using in them in other  situations. But why not change the approach and use technology to help  “satisfy” the problem?&lt;/p&gt;
&lt;p&gt;The idea of including technology as part of the solution, when it is  also part of the problem, is not new. If we combine the possibilities  that technology offers us today with the older idea of the right to  reply, we could change the broader focus of the discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;My proposal is simple: some intermediaries (like search engines)  should create a tool that allows anyone who feels that he or she is the  victim of defamation and offensive online content to denounce and  criticize the material on the sites where it appears. I believe that for  victims, the ability to say something and to have their voices heard on  the sites where others will come across the information in question  will be much more satisfactory than a trial against the intermediaries,  where the outcome is unknown.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This proposal would also help to limit regulations that impose  liability on intermediaries such as search engines. This is important  because many of the regulations that have been proposed are  technologically impractical. Even when they can be implemented, they  often result in censorship; requirements that force intermediaries to  filter content regularly infringe on rights such as freedom of  expression or access to information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This proposal may not be easy to implement from a technical  standpoint. But I hope it will encourage discussion about the issue,  given that a tool like the one I have proposed, although with different  characteristics, was once part of Google’s search engine (the tool,  “Google Sidewiki” is now discontinued). It should be possible  improve  upon this tool, adapt it, or do something completely new with the  technology it was based on in order to help victims of defamation  clarify their opinions and speak their minds about these issues, instead  of relying on courts to impose censorship requirements on search  engines. This tool could provide much greater satisfaction for victims  and could help prevent the violation of the rights of others online as  well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Critics may argue that people will not read the disclaimers or  statements written by “defamed” individuals and that the impact and  spread of the offensive content will continue unfettered. But this is a  cultural problem that will not be fixed by placing liability on  intermediaries. As I explained before, the consequences of doing so can  be unpredictable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If we continue to rely on traditional regulatory means to solve these  problems, we’ll continue to struggle with the undesirable results they  can produce, chiefly increased controls on information and expression  online. We should instead look to a technological solution as a viable  alternative that cannot and should not be ignored.&lt;i&gt;&lt;br /&gt; &lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Eduardo Bertoni is the Director of the Center for Studies on Freedom of Expression and Access to Information at Palermo University School of Law in Buenos Aires. He served as the Special Rapporteur for Freedom of Expression to the Organization of American States from 2002-2005.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/global-voices-may-28-2013-eduardo-bertoni-a-technological-solution-to-the-challenges-of-online-defamation'&gt;https://cis-india.org/internet-governance/blog/global-voices-may-28-2013-eduardo-bertoni-a-technological-solution-to-the-challenges-of-online-defamation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Eduardo Bertoni</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-02T14:47:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/charlotte-lapsansky-talk">
    <title>A Talk by Charlotte Lapsansky</title>
    <link>https://cis-india.org/events/charlotte-lapsansky-talk</link>
    <description>
        &lt;b&gt;Charlotte Lapsansky will give a lecture on the "Mobile Voices project" at the Centre for Internet and Society, Bangalore on Thursday, 16 September 2010. &lt;/b&gt;
        
&lt;p&gt;Mobile Voices is an academic-community partnership to research and design a platform for low-wage immigrants in LA to publish stories about their lives and their communities directly from their mobile phones. This low-cost, open source, customizable, and easy to deploy multimedia mobile storytelling platform will be designed in collaboration with its users, and will help recent immigrants who lack computer access gain greater participation in the digital public sphere.&lt;/p&gt;
&lt;p&gt;In this talk, Charlotte will describe the Mobile Voices project and discuss key themes that have arisen for the Mobile Voices project team, including participatory technology design, community digital storytelling, and digital inclusion through mobile-phone based platforms. She will then describe the key technological and social issues that have arisen in the process of adapting Mobile Voices for India and the opportunities and challenges this presents.&lt;/p&gt;
&lt;h2&gt;About Charlotte Lapsansky&lt;/h2&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Charlotte_Lecture.jpg/image_preview" alt="Charlotte" class="image-inline image-inline" title="Charlotte" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Charlotte Lapsansky&lt;/strong&gt; is a PhD Candidate and American Association of University Women Dissertation Fellow at the Annenberg School for Communication at the University of Southern California. Charlotte has a background in development communication and mass media campaigns addressing gender and health in India. At Annenberg, her research interests include communication for social change, participatory development communications, community mobilization and strategic campaign planning. For the past two years, she has been a team member for Mobile Voices, a participatory project which has created a Drupal-based digital storytelling platform for first-generation, low-wage migrant workers in Los Angeles, allowing them to create and publish stories about their communities directly from their mobile phones. &amp;nbsp;Currently, Charlotte is collaborating with organizations in India to customize and adapt the mobile voices platform social endeavours in India. &lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;/p&gt;
&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKHrycA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKHsE8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKHsTgA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKH%2BD0A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKIm3UA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKInF4A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKInR8A"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKIomIA"&gt;&lt;/embed&gt;

&lt;embed height="250" width="250" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" src="http://blip.tv/play/AYKI9FQA"&gt;&lt;/embed&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/charlotte-lapsansky-talk'&gt;https://cis-india.org/events/charlotte-lapsansky-talk&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-04-22T07:41:20Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-february-11-2014-deepa-kurup-a-tale-of-two-internet-campaigns">
    <title>A tale of two Internet campaigns </title>
    <link>https://cis-india.org/news/the-hindu-february-11-2014-deepa-kurup-a-tale-of-two-internet-campaigns</link>
    <description>
        &lt;b&gt;Techies supported anti-surveillance campaign, companies backed internet safety. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Deepa Kurup's article was &lt;a class="external-link" href="http://www.thehindu.com/news/cities/bangalore/a-tale-of-two-internet-campaigns/article5678207.ece"&gt;published in the Hindu&lt;/a&gt; on February 11, 2014. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Internet was the subject of two distinctly different global campaigns, both coinciding on Tuesday. While one is backed by rights groups, civil society organisations and advocates of software and Internet freedom in general, another is run and supported by major tech corporations with a view to creating awareness on being safe online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supported by over 5,000 websites globally, including biggies Reddit, Mozilla (makers of Firefox) and the Electronic Frontier Foundation, the ‘Day We Fight Back’ campaign aimed at raising a voice against mass dragnet surveillance by the U.S. government. Despite being a largely U.S.-centric mass campaign attacking the National Security Agency’s spying activities worldwide, groups such as the Free Software Movement of Karnataka (FSMK) and Bangalore-based NGO Centre for Internet and Society have supported it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On Tuesday, GNU/Linux user groups (known as glugs) in several colleges — coordinated by the FSMK — did classroom-to-classroom campaigns talking to students and creating awareness about surveillance. In some engineering colleges, such as the SJBIT, these glugs are even screening documentaries related to online privacy and mass surveillance over the week. Explaining why the FSMK decided to hold a campaign here, Sarath M.S. of the FSMK said: “While the call for action is directed towards lawmakers in U.S., this affects all of us. It has undermined the sovereignty of nations and privacy of individuals. Given this, it is important to build public opinion among the youth against these surveillance systems, and make them understand the political issues underlying products and services that they use regularly.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham of the CIS, an organisation that is listed on the campaign website (&lt;a href="http://www.thedaywefightback.org/"&gt;www.thedaywefightback.org&lt;/a&gt;) as a supporter, says that the global support comes from the fact that people have realised that the idea that the Internet is a democratic medium is not true anymore. “The aftermath of Snowden’s revelations have signalled the end of the Internet as we knew it. This is an attempt by civil society organisations to make a case for the web we want.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Safe Internet Day&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, two big companies announced activities as part of the Safe Internet Day, an annual global campaign that promotes safer use of online tech. To mark the occasion, Microsoft Corp released results of the third annual Microsoft Safe Computing Index that found that 20 per cent Indians have been victims of online phishing attacks and 12 per cent have suffered identity theft.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google India too launched the ‘Good to Know’ campaign on online safety. It announced a partnership with Digital Empowerment Foundation (DEF) and the Voluntary Organisation in the Interest of Consumer Education (VOICE) on this campaign.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-february-11-2014-deepa-kurup-a-tale-of-two-internet-campaigns'&gt;https://cis-india.org/news/the-hindu-february-11-2014-deepa-kurup-a-tale-of-two-internet-campaigns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-03-07T00:19:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules">
    <title>A Study of the Privacy Policies of Indian Service Providers and the 43A Rules</title>
    <link>https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p&gt;Written by Prachi  Arya and Kartik Chawla&lt;br /&gt;Edited by: Vipul Kharbanda, Elonnai Hickok, Anandini Rathore, and Mukta Batra&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/study-of-privacy-policies-indian-service-providers.pdf" class="internal-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Contents&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957920"&gt;Executive Summary&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957921"&gt;Introduction&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957922"&gt;Objective, Methodology, and Scope of the Study&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957923"&gt;Objective of Research&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957924"&gt;Methodology&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957925"&gt;Scope&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957926"&gt;Criteria for selection of companies being studied&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957927"&gt;Overview of Company Privacy Policy and Survey Results&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957928"&gt;Vodafone&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957929"&gt;Tata Teleservices Limited&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957930"&gt;Airtel&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957931"&gt;Aircel&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957932"&gt;Atria Convergence Technologies&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957933"&gt;Observations&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957934"&gt;International Best Practices&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957935"&gt;Australia&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957936"&gt;European Union&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957937"&gt;Recommendations&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957938"&gt;Annexure 1&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957939"&gt;Annexure 2&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.gjdgxs"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957920"&gt;Executive Summary&lt;/a&gt; &lt;a name="h.30j0zll"&gt;&lt;/a&gt; &lt;a name="h.1fob9te"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;India has one of the largest telecom subscriber base in the world, currently estimated at 898 Million users.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; With over 164.8 Million people accessing the internet	&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; in the subcontinent as well, technology has concurrently improved to facilitate 	such access on mobile devices. In fact, the high penetration rate of the internet in the market can be largely attributed to mobile phones, via which over 	80% of the Indian population access the medium.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this is a positive change, concerns now loom over the expansive access that service providers have to the information of their subscribers. For the 	subscriber, a company's commitment to protect user information is most clearly defined via a privacy policy. Data protection in India is broadly governed 	by Rules notified under Section 43A of the Information Technology Act 2000.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Amongst 	other things, the Rules define requirements and safeguards that every Body Corporate is legally required to incorporate into a privacy policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The objective of this research is to understand what standards of protection service providers in India are committing to via organizational privacy 	policies. Furthermore, the research seeks to understand if the standards committed to via organizational privacy policies align with the safeguards 	mandated in the 43A Rules. Towards this, the research reviews the publicly available privacy policies from seven different service providers - Airtel, 	Aircel, Vodafone, MTNL, BSNL, ACT, and Tata Teleservices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The research finds that only Airtel, Vodafone, and Tata Teleservices fully incorporate the safeguards defined in the 43A Rules. Aircel, and ACT incorporate 	a number of such safeguards though not all. On the other hand BSNL minimally incorporates the safeguards, while MTNL does not provide a privacy policy that 	is publicly available.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957921"&gt;&lt;/a&gt; &lt;a name="h.3znysh7"&gt;&lt;/a&gt; Introduction&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The Indian Telecom Services Performance Indicators report by the Telecom Regulatory Authority of India (TRAI)	&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; pegs the total number of internet subscribers in India at 164.81 million and the 	total number of telecom subscribers at 898.02 million, as of March 2013. As mobile phones are adopted more widely, by both rural and urban populations, there is an amalgamation of telecommunications and internet users. Thus, in India, seven out of eight internet users gain access through mobiles phones.	&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this rapid evolution of technology allows greater ease of access to digital communication, it also has led to an increase in the amount of personal 	information that is shared on the internet. Subsequently, a number of privacy concerns have been raised with respect to how service providers handle and 	protect and customer data as companies rely on this data not only to provide products and services, but also as a profitable commodity in and of itself. 	Individuals are thus forced to confront the possible violation of their personal information, which is collected as a &lt;i&gt;quid pro quo &lt;/i&gt;by service 	providers for access to their services and products. In this context, protection of personal information, or data protection, is a core principle of the 	right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, the right to privacy has been developed in a piecemeal manner through judicial intervention, and is recognized, to a limited extent, as falling under the larger ambit of the fundamental rights enshrined under Part III of the Constitution of India, specifically those under Article 21.	&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In contrast, historically in India there has been limited legislative interest 	expressed by the Government and the citizens towards establishing a statutory and comprehensive privacy regime. Following this trend, the Information 	Technology Act, 2000 (IT Act), as amended in 2008, provided for a limited data protection regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, this changed in 2010 when, concerned about India's robust growth in the fields of IT industry and outsourcing business, an 'adequacy assessment' was commissioned by the European Union (EU), at the behest of India, which found that India did not have adequate personal data protection regime.	&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The main Indian legislation on the personal data security is the Information 	Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (Rules), enacted under Section 43A of the 	IT Act, which&lt;b&gt; &lt;/b&gt;extends the civil remedy by way of compensation in case wrongful loss or gain under Section 43A to cases where such loss or 	gain results from inadequate security practices and procedures while dealing with sensitive personal data or information. In 2012, the Justice AP Shah 	group of Experts was set up to review and comment on Privacy,&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; for the purpose of 	making recommendations which the government may consider while formulating the proposed framework for the Privacy Act.&lt;a name="h.2et92p0"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957922"&gt;Objective, Methodology, and Scope of the Study&lt;/a&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957923"&gt;&lt;/a&gt; &lt;a name="h.tyjcwt"&gt;&lt;/a&gt; Objective of Research&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This research aims to analyse the Privacy Policies of the selected Telecommunications (TSP) and Internet Service Providers (ISP) (collectively referred to 	as 'service providers' for the purposes of this research) in the context of the Information Technology (Reasonable Security Practices and Procedures and 	Sensitive Personal Data or Information) Rules ('Rules') in order to gain perspective on the extent to which the privacy policies of different types of 	service providers in India, align with the Rules. Lastly, this research seeks to provide broad recommendations about changes that could be incorporated to 	harmonize the respective policies and to bring them in line with the aforementioned Rules.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957924"&gt;&lt;/a&gt; &lt;a name="h.3dy6vkm"&gt;&lt;/a&gt; Methodology&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policies&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; of seven identified service providers are sought to be 	compared vis-a-vis - the requirements under the Information Technology (Reasonable security practices and procedures and sensitive personal data or 	information) Rules, 2011, (Rules) as notified by way of section 87(2) (ob) read with section 43A of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Specifically, the Privacy Policies of each of the selected companies are compared against a template that is based on of the essential principles of the 	Rules respectively, and consists of a series of yes or no questions which are answered on the basis of the respective Privacy Policy. These responses are 	meant to fulfil the first aim of this research, i.e., provide a perspective into the extent to which these companies follow the Rules and the Principles, 	and thus the extent to which they respect the privacy of their customers. See Annex 1 for the survey template and the interpretation of the 43A Rules for 	the development of the survey.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957925"&gt;&lt;/a&gt; &lt;a name="h.1t3h5sf"&gt;&lt;/a&gt; Scope&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_Toc406957926"&gt;Criteria for selection of companies being studied&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For the purpose of the study the companies selected are limited to service providers - including Telecommunication Service Providers and Internet Service 	Providers. Four broad categories of companies have been selected, namely (i) State Owned Companies, (ii) Multinational Companies, (iii) Joint Venture 	companies where one party is an Indian company and the other party is a foreign based company and (iv) Domestic companies which have a localized user base. 	The companies have been selected on this basis of categorization to better understand if the quality of their respective privacy policies is determined by 	their market reach and user base.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy policies of the following service providers have been analyzed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. State Owned Companies&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;BSNL&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Bharat Sanchar Nigam Limited, better 	known as BSNL, is a state-owned telecommunications company that was incorporated by the Indian government in the year 2000, taking over the functions of 	Central Government departments of Telecommunications Services (DTS) and Telecom Operations (DTO). It provides, &lt;i&gt;inter alia&lt;/i&gt;, landline, mobile, and broadband services, and is India's oldest and largest communication services provider.	&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It had a monopoly in India except for Mumbai and New Delhi till 1992.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;MTNL&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Mahanagar Telephone Nigam Limited is a 	state-owned telecommunications company which provides its services in Mumbai and New-Delhi in India, and Mauritius in Africa. It was set up by the Indian 	Government in the year 1986, and just like BSNL, it had a monopoly in the sector till 1992, when it was opened up to other competitors by the Indian government. It provides, &lt;i&gt;inter alia&lt;/i&gt;, Telephone, Mobile, 3G, and Broadband services.	&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Multinational Companies&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Bharti Airtel Ltd:&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt; Bharti Airtel, more 	commonly referred to as Airtel, is the largest provider of mobile telephony and the second largest provider of fixed telephony in India. Its origins lie in 	the Bharti Group founded by Sunil Bharti Mittal in 1983, and the Bharti Telecom Group which was incorporated in 1986. It is a multinational company, providing services in South Asia, Africa, and the Channel Islands. Among other services, it offers fixed line, cellular, and broadband services.	&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The company also owns a submarine cable landing station in Chennai, connecting 	Chennai and Singapore.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Vodafone&lt;/b&gt;&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;b&gt;:&lt;/b&gt; Vodafone is a British 	multinational telecom company. Its origins lie in the establishment of Racal Telecom in 1982 which then became Racal Vodafone in 1984, which was a joint venture between Racal, Vodafone and Hambros Technology Trust. Racal Telecom was demerged from Racal Electronics in 1991, and became the Vodafone group.	&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Vodafone group started its operations in India with its predecessor Hutchison Telecom, which was a joint venture of Hutchison Whampoa and the Max Group, acquiring the cellular license for Mumbai in 1994&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and it bought out Essar's share in the same in the year 2007.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As of today, it has the second largest subscriber base in India. After Airtel,	&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Vodafone is the largest provider of telecommunications and mobile internet 	services in India.&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Joint Ventures&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Tata Teleservices&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt; - Incorporated in 1996, 	Tata Teleservices Limited is an Indian telecommunications and broadband company, the origins of which lie in the Tata Group. A twenty-six percent equity stake was acquired by the Japanese company NTT Docomo in Tata Docomo, a subsidiary of Tata Teleservices, in 2008.	&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Tata Teleservices provides services under three brand names, Tata DoCoMo, Virgin 	Mobile, and T24 Mobile. As a whole, these brands under the head of Tata Teleservices provide cellular and mobile internet services, with the exception of the Tata Sky teleservices brand, which is a joint venture between and Tata Group and Sky.	&lt;sup&gt; &lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Aircel&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Aircel is an Indian mobile 	headquarter, which was started in Tamil Nadu in the year 1999, and has now expanded to Tamil Nadu, Assam, North-east India and Chennai. It was acquired by Maxis Communication Berhard in the year 2006, and is currently a joint venture with Sindya Securities &amp;amp; Investments Pvt. Ltd.	&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Aircel provides telecommunications and mobile internet services in the 	aforementioned regions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. India based Companies/Domestic Companies -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Atria Convergence Technologies (ACT)&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Atria 	Convergence Technologies Pvt. Ltd is an Indian cable television and broadband services company. Funded by the India Value Fund Advisor (IVFA), it is 	centered in Bangalore, but also provides services in Karnataka, Andhra Pradesh, and Madhya Pradesh.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957927"&gt;Overview of Company Privacy Policy and Survey Results&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This section lays out the ways in which each company's privacy policy aligns with the Rules found under section 43A of the Information Technology Act. The 	section is organized based on company and provides both a table with the survey questions and yes/no/partial ratings and summaries of each policy. The 	rationale and supporting documentation for each determination can be found in Annexure 2.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;VODAFONE&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;b&gt;[31]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Criteria&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes/No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of publicly available documents of the body corporate that 					collect personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Type&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt; Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Grievance Officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Purpose of Collection and usage of information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Disclosure of Information &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Reasonable Security practices and procedures&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="h.4d34og8"&gt;&lt;/a&gt; &lt;br clear="all" /&gt; &lt;a name="_Toc406957928"&gt;&lt;/a&gt; &lt;a name="h.2s8eyo1"&gt;&lt;/a&gt; Vodafone&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Vodafone's privacy policy partially incorporates the safeguards found in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vodafone's privacy policy is accessible online, however, it does not include a copy of its policy with a customer application form. The policy merely lists 	the type of information collected with no categorization as to SPD/I. The information collected includes contact information, location based information, 	browsing activity and persistent cookies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no provision for consent or choice within the policy. Disclosure of personal information to third parties extends to Vodafone's group companies, 	companies that provide services to Vodafone, credit reference agencies and directories.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy mentions an email address for grievance redressal. In addition, the policy does not lay down any mechanism for correcting personal information 	that is held with Vodafone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vodafone has a non-exhaustive list of purposes of information usage, though these primarily relate to subscriber services, personnel training, and legal or 	regulatory requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With regard to security practices, Vodafone follows the ISO 27001 Certification as per its 2012 Sustainability Report, however this goes unmentioned under 	its privacy policy&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Tata Teleservices Limited&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;b&gt;[32]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Criteria&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Yes/No&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Clear and Accessible statements of its practices and policies&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Collection of personal or sensitive personal data/information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Type&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Option&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Grievance Officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Purpose of Collection and usage of information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?					&lt;ins cite="mailto:Vipul" datetime="2014-07-01T14:26"&gt; &lt;/ins&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Disclosure of Information &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Reasonable Security practices and procedures&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957929"&gt;&lt;/a&gt; &lt;a name="h.17dp8vu"&gt;&lt;/a&gt; Tata Teleservices Limited&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Tata Teleservices Limited's Privacy Policy fully incorporates the safeguards found in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Tata Teleservices Limited privacy policy is accessible on their website, though when applying for a subscription, the terms and conditions do not 	include the privacy policy. The privacy policy is easy to understand although there are several elements of the 2011 Rules that are unaddressed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy does not make any distinction regarding sensitive personal data or information. As per the policy, TTL collects contact and billing information, 	information about the equipment the subscriber is using, and information and website usage from its customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The purposes of information collection are broadly for managing customer services and providing customized advertising. Information is also collected for 	security issues, illegal acts and acts that are violative of TTL's policy. TTL's directory services use a customer's name, address and phone number, 	however a customer may ask for his/her information to not be published on payment of a fee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the policy, the disclosure of information to third parties is limited to purposes such as identity verification, bill payments, prevention of 	identity theft and the performance of TTL's services. Third parties are meant to follow the guidelines of TTL's privacy policy in the protection of its 	user information. The consent of subscribers is only required when third parties may use personal information for marketing purposes. Consent is precluded 	under the previous conditions. Disclosure of information to governmental agencies and credit bureaus is for complying with legally authorised requests such 	as subpoenas, court orders and the enforcement of certain rights or claims. The policy provides for a grievance officer and in addition, TTL, has a 	separate Appellate Authority to deal with consumer complaints.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TTL does not follow any particular security standard for the protection of subscriber information, however, it establishes other measures such as limited 	access to employees, and encryption and other security controls. Although TTL Maharashtra follows the ISO 27001 ISMS Certification, TTL does not seem to 	follow a security standard for data protection for other regions of its operations.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Airtel&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;b&gt;[33]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Criteria&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Yes/No&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the name and contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Purpose of Collection and usage of information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?					&lt;ins cite="mailto:Vipul" datetime="2014-07-01T14:44"&gt; &lt;/ins&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Disclosure of Information &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Reasonable Security practices and procedures&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.3rdcrjn"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957930"&gt;Airtel&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Airtel's Privacy Policy fully incorporates the safeguards found in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Airtel's privacy policy incorporates a number of the requirements stipulated in the Rules. Airtel's privacy policy is easily accessible on its website and 	is clear and easy to understand. The policy defines sensitive personal information, and states that information collected will be used for specified 	regulatory and business purposes, though it adds that it may be used for other purposes as well. The policy does allow for the withdrawal of consent for 	providing information, in which case, certain services may be withheld. In addition, Airtel has provided for a grievance officer and abides by the 	IS/ISO/IEC 27001 security standards. While Airtel allows for the disclosure of information including sensitive personal information to third parties, its 	policy states that such third parties will follow reasonable security practices in this regard. Concerning disclosure to the government, Airtel shares user 	information only when it is legally authorised by a government agency. Airtel's policy also provides for an opt-out provision. Such choice remains after 	subscription of Airtel's services as well. However, withdrawal of consent gives Airtel the right to withdraw its services as well. In terms of disclosure, 	sharing of user information with third parties is regulated by its Airtel's guidelines on the secrecy of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Airtel lists the purposes for information collection, it states that such collection may not be limited to these purposes alone. In addition, the 	policy states that user's personal information will be deleted, although it does not state when this will happen. Thus, the policy could be more 	transparent and specific on matters of regarding the purpose of collection of information as well as deletion of information.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Aircel&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;b&gt;[34]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Criteria&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes/No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;no&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Purpose of Collection and usage of information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disclosure of Information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Reasonable Security practices and procedures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;ins cite="mailto:Vipul" datetime="2014-07-01T14:58"&gt; &lt;/ins&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.26in1rg"&gt;&lt;/a&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957931"&gt;Aircel&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Aircel's Privacy Policy partially complies with the safeguards in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aircel's privacy policy is accessible online through its website, though it is not included under the terms and conditions of its customer application. The 	privacy policy lists the kinds of information that is collected from subscribers, including relevant contact details, call records, browsing history, 	cookies, web beacons, server log files and location details. The policy does not demarcate information into SPD/I or personal information. Aircel provides 	subscribers with the right to withdraw consent from the provision of information before and after subscribing, while reserving the right to withdraw its 	services in this regard. The policy provides the name and contact details of a grievance officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the privacy policy, the stated purposes for use of subscriber information is limited to customer services, credit requirements, market analyses, legal 	and regulatory requirements, and directory services by Aircel or an authorised third party.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the policy, the provision on disclosure to governmental agencies is vague and does not mention the circumstances under which personal information would 	be disclosed to law enforcement. The policy provides for correction of information of a subscriber in case of error and deletion after the purpose of the 	information is served but does not specify when. Although Aircel follows the ISO 27001 standard, it does not mention this under its policy. It does 	however, provide for accountability in cases of breach or privacy.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Atria Convergence Technologies&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;b&gt;[35]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Criteria&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Yes/No&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;information not available&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Purpose of Collection and usage of information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disclosure of Information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Reasonable Security practices and procedures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957932"&gt;&lt;/a&gt; &lt;a name="h.lnxbz9"&gt;&lt;/a&gt; Atria Convergence Technologies&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Though Atria Convergence Technologies provides a privacy policy on its website, it does not broadly incorporate the safeguards in the Rules under 43A. 	ACT's privacy policy is easily accessible online and is easy to understand as well. The information collected from subscribers is limited to contact 	details along with information on whether a subscriber has transacted with any of ACT's business partners. Though the privacy policies refers to disclosing 	information for the purpose of assisting with investigating, preventing, or take action on illegal behaviour - there is no specific provision concerning 	disclosure to government and regulatory agencies. The policy does not provide information on any security practices and procedures followed. Provisions for 	withdrawal of consent or correction of personal information are absent from the policy as well.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;BSNL: 43A Rules Survey&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Criteria&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes/No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly states that it is collecting SPD/I?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Purpose of Collection and usage of information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disclosure of Information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Reasonable Security practices and procedures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.35nkun2"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;BSNL&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;BSNL's Privacy Policy broadly does not incorporate the safeguards in the Rules under 43A .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;BSNL's privacy is accessible online, though not on the website, and is easy to understand. The policy does not however, categorize SPD/I but defines 	personal information vaguely as information that helps BSNL identify its customers. As per its policy, subscriber information is used for subscriber 	services such as identification, assistance etc., credit-worthiness and marketing communications. The policy does not contain any provision on consent and 	with respect to marketing communications and a customer implicitly agrees to third party usage of personal information. Third parties under the policy are 	those that provide services on behalf of BSNL, which extend mailing and billing services and market research services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per its policy, BSNL may disclose personal information on the basis of legal requirements to credit organisations, BSNL's consultants, government 	agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With respect to access and correction, BSNL reserves the right to modify its privacy policy without notice to its customers. What is presumably a grievance 	officer email address has been provided for queries and corrections on personal information, however no further contact details are given.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.1ksv4uv"&gt;&lt;/a&gt; &lt;b&gt;MTNL&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;MTNL does not provide a publicly available Privacy Policy. &lt;/b&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957933"&gt;&lt;/a&gt; &lt;a name="h.44sinio"&gt;&lt;/a&gt; Observations&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;This section highlights key trends observed across the privacy policies studied in this research by contrasting the applicable Rule against the applicable 	provision in the policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Access and Location of Privacy Policy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; According to Rule 4 of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, a Body 	Corporate must provide a privacy policy on their website. Under Rule 5, all bodies corporate have to convey the purpose(s) for which SPD/I are collected 	prior to the collection and they can, under certain circumstances, move forward with the collection regardless of consent. While this does not entirely 	violate the Notice Principle of the National Privacy Principles, it does not meet the rather higher standards of the Principle, which recommends that 	notice must be provided prior to any form of collection of personal information. In addition, the Rules do not contain provisions regulating bodies 	corporate, regarding changes to their privacy policies.&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : In the survey, it was found that the location and accessibility of a service provider's privacy policy varied. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a. &lt;/b&gt; &lt;b&gt;Privacy Policy on main website:&lt;/b&gt; Airtel, Aircel, and Vodafone provide a privacy policy that is accessible through the main website of each respective company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b. &lt;/b&gt; &lt;b&gt;Privacy Policy not on website&lt;/b&gt; : MTNL does not provide a Privacy Policy on the main website of each of its respective branches across India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c. &lt;/b&gt; &lt;b&gt;Privacy Policy not accessible through main website&lt;/b&gt; : TTL and BSNL have a Privacy Policy, but it is not accessible through the main website. For example, The Privacy Policy found on TTL's website is only accessible through the "terms and services" link on the homepage. Similarly, the BSNL privacy policy can only be found through its portal website.	&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;d. &lt;/b&gt; &lt;b&gt;Privacy Policy not included in Customer Application form&lt;/b&gt; : Almost all of the Service Providers do not include/refer to their Privacy Policy in the Customer Application Form, and some do not display their privacy 	policy or a link to it on its website's homepage. For example, Airtel is the only Service Provider that refers to their privacy policy in the Customer 	Application Form for an Airtel service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;e. &lt;/b&gt; &lt;b&gt;Collection of personal information before Privacy Policy: &lt;/b&gt; In some cases it appears that service providers collect private information before the privacy policy is made accessible to the user. For example, before 	the homepage of ACT's website is shown, a smaller window appears with a form asking for personal information such as name, mobile and email Id. Although 	the submission of this information is not mandatory, there is no link provided to the privacy policy at this level of collection of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Sharing of information with Government&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; Rule 6, specifically the proviso to Rule 6, and the Disclosure of Information Principle respectively govern the disclosure of information to third parties. 	Yet, while the proviso to Rule 6 directly concerns the power of the government to access information with or without consent for investigative purposes, 	the Disclosure of Information Principle only says that disclosure for law enforcement purposes should be in accordance with the laws currently in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : Though all service providers did include statements addressing the potential of sharing information with law enforcement or governmental agencies, how 	this was communicated varied. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a.) &lt;/b&gt; &lt;b&gt;Listing circumstances for disclosure to law enforcement&lt;/b&gt; : The Privacy Policy of ACT states 	&lt;i&gt; "We believe it is necessary to share information in order to investigate, prevent, or take action regarding illegal activities, suspected fraud, situations involving potential threats to the physical safety of any person".		&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; The Privacy Policy of Airtel on the other hand states 	&lt;i&gt; "Government Agencies: We may also share your personal information with Government agencies or other authorized law enforcement agencies (LEAs) mandated 		under law to obtain such information for the purpose of verification of identity or for prevention, detection, investigation including but not limited to cyber incidents, prosecution, and punishment of offences."		&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Lastly, TTL states&lt;i&gt; &lt;/i&gt;" 	&lt;i&gt; To investigate, prevent or take action regarding illegal activities, suspected fraud, situations involving potential threats to the physical safety of 		any person" or "To notify or respond to a responsible governmental entity if we reasonably believe that an emergency involving immediate danger of death or serious physical injury to any person requires or justifies disclosure without delay".		&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b.) &lt;/b&gt; &lt;b&gt;Listing authorities to whom information will be disclosed to&lt;/b&gt; : The privacy policy of&lt;i&gt; &lt;/i&gt;Aircel states 	&lt;i&gt; "There may be times when we need to disclose your personal information to third parties. If we do this, we will only disclose your information to: 		…8. Persons to whom we may be required to pass your information by reason of legal, governmental or regulatory authority including law 		enforcement agencies and emergency services".&lt;a href="#_ftn41" name="_ftnref41"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Similarly&lt;i&gt;, &lt;/i&gt;Vodafone&lt;i&gt; &lt;/i&gt;states 	&lt;i&gt; "There may be times when we need to disclose your personal information to third parties. If we do this, we will only disclose your information to 		persons to whom we may be required to pass your information by reason of legal, governmental or regulatory authority including law enforcement agencies and emergency services and any person or organisation as authorised by laws and regulations applicable in India."		&lt;a href="#_ftn42" name="_ftnref42"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; While BSNL states 	&lt;i&gt; "Apart from the above, BSNL may divulge your personal information to: Government bodies, Regulatory Authorities, and other organizations in accordance 		with the law or as authorised by law…".&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Readability of Privacy Policies&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle&lt;/b&gt; : In subsection (i) of Rule 4 body corporate must provide a privacy policy that is "&lt;i&gt;clear and accessible&lt;/i&gt;". Similarly, the Notice Principle requires that the data controller give a "	&lt;i&gt;simple-to-understand notice of its information practices to all individuals, in clear and concise language&lt;/i&gt;".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : It was found that, particularly with respect to clauses on the collection and disclosure of information, most Privacy Policies use:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Vague terminology: &lt;/b&gt;For example, in the Privacy Policy of ACT, it states as a purpose of collection &lt;i&gt;"conduct research" &lt;/i&gt;while 	for the collection and disclosure of information it states 	&lt;i&gt; ,"The Company may combine information about you that we have, with information we obtain from business partners or other companies. The Company shall have the right to pass on the same to its business associates, franchisees without referring the same to you."		&lt;a href="#_ftn44" name="_ftnref44"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Similarly, with regards to the collection of information, Vodafone's Privacy Policy states that it may collect 	&lt;i&gt; "any other information collected in relation to your use of our products and services".		&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Undefined terminology:&lt;/b&gt; On disclosure of information TTL's privacy policy states disclosure is 	&lt;i&gt; "Subject to applicable legal restrictions, such as those that exist for Customer Proprietary Network Information (CPNI)"		&lt;a href="#_ftn46" name="_ftnref46"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Confusingly, although TTL defines CPNI it does not mention what legal restriction it is referring to, and CPNI is in fact an American term and similar 	legal restrictions could not be found in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Information about security practices&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; The parameter for 'reasonable security practices and procedures' has been detailed comprehensively under Rule 8 of the Rules. The same is also covered in 	detail under the Openness Principle read with Security Principle. While the Security Principle recommends that the data controller protect the information 	they collect through reasonable security safeguards, the Openness Principle recommends that information regarding these should be made available to all 	individuals in clear and plain language.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : With the exception of Airtel, no service provider has comprehensively followed the legal requirements for the purpose of their privacy policy. Thus, 	while most service providers do mention security practices, many do not provide specific or comprehensive details about their security practices and 	procedures for data protection, and instead assure users that 'reasonable security' procedures are in place. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Comprehensive information about security practices in privacy policy&lt;/b&gt;: Airtel and Aircel have provided comprehensive information about 	their security practices in the companies Privacy Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Information about security practice, but not in privacy policy&lt;/b&gt;: Vodafone has specified its security standards only in its latest 	'Sustainability Report' available on its website. In the case of TTL, the specific security standard it follows is available only for its Maharashtra 	branch (TTLM) through its annual report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. &lt;b&gt;Broad reference to security practices&lt;/b&gt;: Many service providers broadly reference security practices, but do not provide specifics. For example, TTL states only &lt;i&gt;"we have implemented appropriate security controls to protect Personal Information when stored or transmitted by TTL&lt;/i&gt;."	&lt;a href="#_ftn47" name="_ftnref47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. &lt;b&gt;No information about security practices: &lt;/b&gt;Some service providers do not mention any details about their security practices and 	procedures, or whether they even follow any security practices and procedures or not. An example of this would be ACT, which does not mention any security 	practices or procedures in its Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Grievance mechanisms&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; Rule 5 of the Rules mandates that applicable bodies corporate must designate a 'Grievance Officer' for redressing grievances of users regarding processing 	of their personal information, and the same is also recommended by the Ninth Principle, i.e., Accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : It was found that adherence with this requirement varied depending on service provider. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;No Grievance Officer:&lt;/b&gt; ACT and MTNL do not provide details of a grievance officer on their websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Grievance Officer, but no process details&lt;/b&gt;: Airtel, TTL, and Vodafone provide details of the Grievance Officer, but no further 	information about the grievance process is provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. &lt;b&gt;Grievance Officer and details of process: &lt;/b&gt;Aircel&lt;b&gt; &lt;/b&gt;provides details of the grievance officer and grievance process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;As a note:&lt;/b&gt; All service providers with the exception of ACT have a general grievance redressal mechanism in place as documented on TRAI's website.	&lt;a href="#_ftn48" name="_ftnref48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It is unclear whether these mechanisms are functional, and furthermore it is 	also unclear if these mechanisms can be used for complaints under the IT Act or the Rules, or complaints on the basis of the Principles. It should be 	further noted that the multiplicity of grievance redressal officers is a cause for concern, as it may lead to confusion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Consent Mechanism &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle&lt;/b&gt; : Rules 5 and 6 of the Rules&lt;a href="#_ftn49" name="_ftnref49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; on Collection and Disclosure of information, 	respectively, require applicable bodies corporate to obtain consent/permission before collecting and disclosing personal information. The Choice and Consent Principle of the National Privacy Principles, as enumerated in the A.P. Shah Report, deals exclusively with choice and consent.	&lt;a href="#_ftn50" name="_ftnref50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Withdrawal of consent is an important facet of the choice and consent principle as evidenced by the Rules&lt;a href="#_ftn51" name="_ftnref51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and the National Privacy Principles	&lt;a href="#_ftn52" name="_ftnref52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation:&lt;/b&gt; Methods of obtaining consent and for what consent was obtained for varied across service providers. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a. &lt;/b&gt; &lt;b&gt;Obtaining consent:&lt;/b&gt; Some service providers give data subjects with the choice of submitting their personal information (with some exceptions such as for legal requirements) 	and obtaining their consent for its collection and processing. For example, the policies of Airtel, Aircel, and TTL are the only ones which provide 	information on the mechanisms used to obtain consent. ACT provides for targeted advertisements based on the personal information of the user. The viewing 	or interaction of the user of such targeted advertisements is however, considered an affirmation to this third party source, that the user is the targeted 	criteria. Thus, there appears to be lack of consent in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b. &lt;/b&gt; &lt;b&gt;No Consent or choice offered:&lt;/b&gt; Some service providers do not mention consent. For example, Vodafone, and BSNL do not make any mention of choice or consent in their respective privacy 	policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c. &lt;/b&gt; &lt;b&gt;Consent for limited circumstances: &lt;/b&gt; Some service providers only provide consent in limited circumstances. For example, ACT mentions consent only in relation to targeted advertising. However, 	this information is potentially misleading, as discussed earlier in the survey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is also a certain degree of assumption in all the policies regarding consent, as noted in the survey. Thus, if you employ the services of the company 	in question, you are implicitly agreeing to their terms even if you have not actually been notified of them. And the vague terminology used by most of the 	policies leaves quite a lot of wiggle room for the companies in question, allowing them to thereby collect more information than the data subject has been 	notified of without obtaining his or her consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Transparency mechanism&lt;/b&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; The Openness Principle specifically recommends transparency in all activities of the data controller.	&lt;a href="#_ftn53" name="_ftnref53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Rules provide a limited transparency mechanism under Rule 8 which require 	bodies corporate to document their security practices and procedures and Rule 4 which requires them to provide such information via a privacy policy. As a 	note, these fall short of the level of 'transparency' espoused by the Openness Principle of the National Privacy Principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation: &lt;/b&gt; All service providers fail in implementing adequate mechanisms for transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. &lt;/b&gt; &lt;b&gt;Scope&lt;/b&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle&lt;/b&gt; : Though the Openness Principle does not directly speak of the scope of the policies in question, it implies that policies regarding all data collection or 	processing should be made publically available. The same is also necessary under Rule 4, which mandates that any body corporate which " 	&lt;i&gt; collects, receives, possess, stores, deals or handle information of provider of information, shall provide a privacy policy for handling of or dealing 		in personal information including sensitive personal data or information and ensure that the same are available for view by such providers of 		information who has provided such information under lawful contract. &lt;/i&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : Though most of the companies mention the scope of their Privacy Policy and include the information collected through the websites, WAP Services, and use 	of the company's products and services, some companies do not do so. For instance, the scope of the policy is given rather vaguely in the Airtel's Policy, 	and the scope of ACT's policy is restricted to the information collected during the usage of their products and services, and not their website. BSNL's 	privacy policy is worrisome as it seems to restrict its scope to the information collected through the website only, but does not at the same time state 	that it does not apply to other methods of data collection and processing.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957934"&gt;&lt;/a&gt; &lt;a name="h.2jxsxqh"&gt;&lt;/a&gt; International Best Practices&lt;/h1&gt;
&lt;h3&gt;&lt;b&gt;Canada&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The privacy regulation regime in Canada is a mixture of the federal regulations and the provincial regulations. Of the former, the Privacy Act is 	applicable to the public sector, while the Personal Information Protection and Electronic Documents Act ('PIPEDA') applies to the private sector. There are 	also federal level sectoral regulations, of which the Telecommunications Act is relevant here. The PIPEDA covers the activities of all businesses and 	federally regulated industries regarding their collection, use, disclosure, safeguarding and provision of access to their customers' personal information. Further, in 2009, the Canadian Radio-television and Telecommunications Commission ('CRTC'), by virtue of the 'Telecom Regulatory Policy CRTC 2009-657'	&lt;a href="#_ftn54" name="_ftnref54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; made ISPs subject to privacy standards higher than the standards given under the PIPEDA, while at the same time allowing them to use Internet Traffic Management Practices ('ITMPs').	&lt;a href="#_ftn55" name="_ftnref55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2009 policy is progressive as it balances the economic needs of Internet Traffic Management Providers vis-à-vis the privacy concerns of consumers. 	The need to identify ITMP's is integral in the protection of online privacy, as ITMP's most commonly employ methods such as deep packet inspection which 	can be used to burrow into personal information of consumers as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recognising that this may not be the current practice, but a possibility in the future, the policy makes certain guidelines for ITMPs. It permits ITMP's 	that block bad traffic such as spam and malicious software. Nearly all other ITMPs however, require the prior notice of 30 days or more before initialising 	the ITMP.&lt;a href="#_ftn56" name="_ftnref56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ITMP's are to be used only for the defined need of the ISP and not beyond this, and must not be used for behavioural advertising. Secondary ISPs in their 	contracts with Primary ISPs must agree to the same duties of the latter, that is the personal information entrusted to them is meant for its purpose alone 	and is not to be disclosed further.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957935"&gt;Australia&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The central privacy regulation in Australia is the Privacy Act, 1988. The Act defines two sets of privacy principles, the Information Privacy Principles which apply to the public sector, and the National Privacy Principles which apply to the private sector.&lt;a href="#_ftn57" name="_ftnref57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These principles govern the following: collection,&lt;a href="#_ftn58" name="_ftnref58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; use and disclosure,&lt;a href="#_ftn59" name="_ftnref59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; data quality,&lt;a href="#_ftn60" name="_ftnref60"&gt;&lt;sup&gt;&lt;sup&gt;[60]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; security,&lt;a href="#_ftn61" name="_ftnref61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; openness,&lt;a href="#_ftn62" name="_ftnref62"&gt;&lt;sup&gt;&lt;sup&gt;[62]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; access and correction,&lt;a href="#_ftn63" name="_ftnref63"&gt;&lt;sup&gt;&lt;sup&gt;[63]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; identifiers,&lt;a href="#_ftn64" name="_ftnref64"&gt;&lt;sup&gt;&lt;sup&gt;[64]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; anonymity,&lt;a href="#_ftn65" name="_ftnref65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; trans-border data flows,&lt;a href="#_ftn66" name="_ftnref66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and sensitive information.	&lt;a href="#_ftn67" name="_ftnref67"&gt;&lt;sup&gt;&lt;sup&gt;[67]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Telecommunications Act, 1997, is also relevant here, as it also governs the use or disclosure of information by telecommunication services providers,	&lt;a href="#_ftn68" name="_ftnref68"&gt;&lt;sup&gt;&lt;sup&gt;[68]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; but such information is only protected by the Telecommunications Act if it comes 	to a person's knowledge or possession in certain circumstances. An example of this is Section 276 of the same, which providers that the information 	protected by that section will be protected only if the person collecting the information is a current or former carrier, carriages service provider or 	telecommunications contractor, in connection with the person's business as such a carrier, provider or contractor; or if the person is an employee of a 	carrier, carriage service provider, telecommunications contractor, because the person is employed by the carrier or provider in connection with its 	business as such a carrier, provider or contractor.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957936"&gt;European Union&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The most important source of law in the European Union ('EU') regarding Data Privacy in general is the Data Protection Directive ('Directive').	&lt;a href="#_ftn69" name="_ftnref69"&gt;&lt;sup&gt;&lt;sup&gt;[69]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive has a broad ambit, covering all forms of personal data collection and processing, and mandating that such collection or processing follow the Data Protection Principles it sets out.&lt;a href="#_ftn70" name="_ftnref70"&gt;&lt;sup&gt;&lt;sup&gt;[70]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive differentiates between Personal Data and Sensitive Personal Data,	&lt;a href="#_ftn71" name="_ftnref71"&gt;&lt;sup&gt;&lt;sup&gt;[71]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; with the collection and processing of the latter being subject to more stringent 	rules. The telecommunications service providers and internet service providers are included in the definition of 'Controller' as set out in the Directive, and are hence subject to the regulations enforced by the member states of the EU under the same.	&lt;a href="#_ftn72" name="_ftnref72"&gt;&lt;sup&gt;&lt;sup&gt;[72]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive will soon be superseded by the General Data Protection directive, which is scheduled to come into force in late 2014, with a two-year transition period after that.	&lt;a href="#_ftn73" name="_ftnref73"&gt;&lt;sup&gt;&lt;sup&gt;[73]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the above, ISPs are also subject to the Directive on Privacy and Electronic Communications&lt;a href="#_ftn74" name="_ftnref74"&gt;&lt;sup&gt;&lt;sup&gt;[74]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and the Data Retention Directive.	&lt;a href="#_ftn75" name="_ftnref75"&gt;&lt;sup&gt;&lt;sup&gt;[75]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive on Privacy and Electronic Communications ('E-Privacy Directive') 	sets out rules regarding processing security, confidentiality of communications, data retention, unsolicited communications, cookies, and a system of 	penalties set up by the member states under the title of 'Control'. The E-Privacy Directive supplements the original Data Privacy Directive, and replaces a 	1997 Telecommunications Privacy directive. The Data Retention Directive does not directly concern the collection and processing of data by a service 	provider, but only concerns itself with the retention of collected data. It was an amendment to the E-Privacy Directive, which required the member states 	to store the telecommunications data of their citizens for six to twenty-four months, and give police and security agencies access to details such as IP 	addresses and time of use of e-mails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The established practices considered above have the following principles, relevant to the study at hand, in common:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Notice&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Collection Limitation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Use Limitation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Access and Corrections&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Security&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Data Quality and Accuracy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Consent&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. Transparency&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And the following principles are common between two of the three regimes discussed above:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. The PIPEDA and the Privacy Act both mention rules regarding Disclosure of collecting information, but the Data Protection Directive does not directly 	govern disclosure of collected information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. The Principles of Accountability is covered by the Data Protection Directive and the PIPEDA, but is not directly dealt with by the Privacy Act&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. The PIPEDA and the Data Protection Directive directly mention the principle of Enforcement, but it is not directly covered by the Privacy Act.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957937"&gt;&lt;/a&gt; &lt;a name="h.z337ya"&gt;&lt;/a&gt; Recommendations&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;Broadly, service providers across India could take cognizance of the following recommendations to ensure alignment with the Rules found under section 43A 	and to maximize the amount of protection afforded to customer data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. &lt;b&gt;Access and location of privacy policy:&lt;/b&gt; Service providers should ensure that the privacy policy is easily accessible through the main 	page of the company's website. Furthermore, the Privacy Policy should be accessible to users prior to the collection of personal information. All 'User 	Agreement' forms should include a written Privacy Policy or a reference to the Privacy Policy on the service provider's website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;b&gt;Scope of privacy policy:&lt;/b&gt; The privacy policy should address all practices and services offered by the service provider. If a service 	requires a different or additional privacy policy, a link to the same should be included in the privacy policy on the main website of the service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;b&gt;Defining consent&lt;/b&gt;: The Privacy Policy should clearly define what constitutes 'consent'. If the form of consent changes for different 	types of service, this should be clearly indicated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. &lt;b&gt;Clear language:&lt;/b&gt; The language in the Privacy Policy should be clear and specific, leaving no doubt or ambiguity with regards to the 	provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. &lt;b&gt;Transparent security practices:&lt;/b&gt; The Privacy Policy should include comprehensive information about a company's security practices should 	be included in the Privacy Policy. Information pertaining to audits of these procedures should be made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. &lt;b&gt;Defined and specified third parties:&lt;/b&gt; The Privacy Policy should define 'third party' as it pertains to the company's practices and 	specify which third parties information will be shared with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. &lt;b&gt;Comprehensive grievance mechanism: &lt;/b&gt;The Privacy Policy should include relevant details for users to easily use established grievance 	mechanisms. This includes contact details of the grievance officers, procedure of submitting a grievance, expected response of the grievance officer 	(recognition of the grievance, time period for resolution etc.), and method of appealing decision of the grievance officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. &lt;b&gt;Specify laws governing disclosure to governmental agencies and law enforcement:&lt;/b&gt; The Privacy Policy should specify under what laws and 	service providers are required disclose personal information to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. &lt;b&gt;Inclusion of data retention practices:&lt;/b&gt; The Privacy Policy should include provisions defining the retention practices of the company.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957938"&gt;&lt;/a&gt; &lt;a name="h.3j2qqm3"&gt;&lt;/a&gt; Annexure 1&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.1y810tw"&gt;&lt;/a&gt; Explanation and Interpretation of Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 	2011&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 43A under the Information Technology Act 2000 addresses the protection of sensitive personal data or information and the implementation of an 	information security management system, and the Rules framed under section 43A attempt establish a holistic data security regime for the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following section is a description of the requirements found under section 43A and subsequent Rules with respect to information that must be included 	in the privacy policy of a 'body corporate' and procedures that must be followed by 'body corporate' with respect to the publishing and notice of a privacy 	policy. This section also includes an explanation of how each relevant provision has been interpreted for the purpose of this research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Relevant provisions that pertain to the privacy policy of body corporate &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 3:&lt;/b&gt; This section defines the term 'Sensitive Personal Data or Information', setting out the six types of information that are considered 'sensitive personal 	data' including:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Password - Defined under the Rules as "a secret word or phrase or code or passphrase or secret key, or encryption or decryption keys that one uses to 	gain admittance or access to information"&lt;a href="#_ftn76" name="_ftnref76"&gt;&lt;sup&gt;&lt;sup&gt;[76]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Financial information - "such as Bank account or credit card or debit card or other payment instrument details"	&lt;a href="#_ftn77" name="_ftnref77"&gt;&lt;sup&gt;&lt;sup&gt;[77]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iii. Physical, physiological and mental health condition&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iv. Sexual orientation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;v. Medical records and history&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;vi. Biometric information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The two other broad categories of Sensitive Personal Data or Information that are included in the Rule are - any related details provided to the body corporate, and any information received by the body corporate in relation to the categories listed above.	&lt;a href="#_ftn78" name="_ftnref78"&gt;&lt;sup&gt;&lt;sup&gt;[78]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proviso to this section excludes any information available in the public domain or which may be provided under the Right to Information Act, 2005 from 	the ambit of SPD/I.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Rules, Sensitive Personal Data is considered to be a subset of Personal Information - which has been defined by Section 2 (1) (i) as " 	&lt;i&gt; any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be 		available with a body corporate, is capable of identifying such person &lt;/i&gt; "&lt;a href="#_ftn79" name="_ftnref79"&gt;&lt;sup&gt;&lt;sup&gt;[79]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation:&lt;/b&gt; While the Rules are clearly limited to personal and sensitive personal data or information, the use of these terms throughout the Rules is not consistent. 	For example, some provisions under the Rules ambiguously use the term 'information' in place of the terms 'personal information' and/or 'sensitive personal 	information'.&lt;a href="#_ftn80" name="_ftnref80"&gt;&lt;sup&gt;&lt;sup&gt;[80]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; While 'information' has been defined non-exhaustively as any 'data, 	message, text, images, sound, voice, codes, computer programs, software and databases or micro film or computer generated microfiche' in the Act, this definition appears to be overbroad and cannot be applied in that form for the purpose of provisions on privacy policy.	&lt;a href="#_ftn81" name="_ftnref81"&gt;&lt;sup&gt;&lt;sup&gt;[81]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Hence, 'information', when used in the Rules, is construed to mean 'personal 	information' including 'sensitive personal information' for the purpose of this survey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per Rule 3, information in the public domain isn't classified as sensitive personal data. This exception may require a relook considering that 	'providers' of information' may not want their data to be disclosed beyond its initial disclosure, or in certain cases, they may not even know of its 	existence in the public domain. Since the notice of collection, purpose and use of information is limited to SPD alone under Rule 5, information in the 	public domain should be seen together with whether the provider of information has provided the latter directly or to service provider that requires the 	information. If the source is the information provider directly, it need not be classified as SPD.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On a positive note, the addition of the term "in combination with other information available or likely to be available", gives recognition to the 	phenomenon of convergence of data. Parts of information that seem of negligible importance, when combined, provide a fuller personal profile of an 	individual, the recognition of this, in effect, gives a far wider scope to personal information under the Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the specific context of Privacy Policies, the Rules do not stipulate whether the mandated privacy policy has to explicitly mention SPD/I that is 	collected or used.{This is mentioned under Rule 4(ii) and (iii)} Since Rules do require that a privacy policy must be clear, it is construed that the 	privacy policy should explicitly recognize the type of PI and SPD/I being collected by the company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 4:&lt;/b&gt; This rule mandates that a "&lt;i&gt;body corporate that collects, receives possess, stores, deals or handles information of the provider of information&lt;/i&gt;". 	For the purposes of this research, this entity will be referred to as a 'data controller'. According to Rule 4, every data controller must provide a 	privacy policy on its website for handling of or dealing in personal information including sensitive personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following details have to be included in the privacy policy -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"(i) Clear and easily accessible statements of its practices and policies;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Type of personal or sensitive personal data or information collected under rule 3;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Purpose of collection and usage of such information;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Disclosure of information including sensitive personal data or information as provided in rule 6;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Reasonable security practices and procedures as provided under rule 8."&lt;a href="#_ftn82" name="_ftnref82"&gt;&lt;sup&gt;&lt;sup&gt;[82]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; : The Rules do not provide an adequate understanding of the terms 'clear' and 'accessible', and the terms 'practices' and 'policies' are not defined. For 	the purpose of this research, 'practices' will be construed to mean the privacy policy of the company. It is deemed to be clear and accessible if it is 	available either directly or through a link on the main website of the body corporate. To meet the standards set by this Rule, the policy or policies 	should disclose information about the company's services, products and websites, whenever personal information is collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 5:&lt;/b&gt; This Rule establishes limits for collection of information. It states that prior informed consent has to be obtained by means of letter, fax or email from 	the user regarding the purpose of usage for the sensitive personal information sought to be collected. It limits the purpose for collection of SPD/I to 	collection for a lawful purpose connected with a function or activity of the body corporate or any person on its behalf and only if it is considered necessary for that purpose. Thus, the information collected can only be used for the stated purpose for which it has been collected.	&lt;a href="#_ftn83" name="_ftnref83"&gt;&lt;sup&gt;&lt;sup&gt;[83]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, Rule 5 (3) provides that consent has to be obtained and knowledge provided to a person from whom personal information is being directly collected 	- which for service providers - is understood to be through the customer application form. This rule will be deemed to have been complied with when the 	following information is provided -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. The fact that the information is being collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. The purpose of such collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Intended recipients of the collected information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. Names and addresses of the agency or agencies collecting and retaining information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, it provides that the user has to be given the option of not providing information prior to its collection. In case the user chooses this option 	or subsequently withdraws consent the body corporate has the option to withhold its services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This section also provides under Section 5 (2) (a) that the type of information that this Rule concerns itself with can only be collected for a lawful 	purpose connected with a function or activity of the body corporate or any person on its behalf and if it is considered necessary for that purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also requires that a Grievance Officer be instated to redress the grievance "	&lt;i&gt;expeditiously but within one month from the date of receipt of grievance.&lt;/i&gt;" The Grievance Redressal process has been discussed in more detail 	later.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation:&lt;/b&gt; Even though Rule 5 incorporates various major data protection principles and mandates the establishment of a Grievance Redressal Mechanism, neither Rule 5 	nor Rule 4 (3) makes a reference to the other. [Rule 4(3) uses the term "such information", and the fact that it follows Rule 4(2) which clearly refers to 	personal information as well as SPD/I, means that Rule 4(3) also refers to the same]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prima facie&lt;/i&gt; , the scope of Rule 5 is limited to collection of SPD/I. However, Rule 4 (3) ostensibly covers the broad ambit of 'information' which includes SPD/I. Construing these two provisions together using the 'Harmonious Construction' principle	&lt;a href="#_ftn84" name="_ftnref84"&gt;&lt;sup&gt;&lt;sup&gt;[84]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Rule 5 could be interpreted to cover personal information for privacy policies 	under Rule 4.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, Rule 5(3) doesn't expand on the reasonable steps to be taken for intimating the information provider on the extent of disclosure and purpose 	of collection. This appears as a rather large loophole considering the wide interpretation that can be given to 'reasonable' practices of service 	providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 6:&lt;/b&gt; This rule lays down the conditions and procedure for disclosure of information.&lt;a href="#_ftn85" name="_ftnref85"&gt;&lt;sup&gt;&lt;sup&gt;[85]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Under it, the following conditions apply before any disclosure of information by the 'body corporate' to any third party -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. The body corporate is required to obtain prior permission from the provider of the information, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Permission to disclose has to be agreed on in the contract between the company and the data subject, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Disclosure is necessary for the compliance of a legal obligation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An exception is made in case the disclosure is made to an authorized and legally mandated Government agency upon request for the purposes of verification 	of identity, for prevention, detection, and investigation of incidents, specifically including cyber incidents, prosecution, and punishment of offences, in 	which case no consent from the data subject will be required. Thus, the company does not need user consent to disclose information to authorized law 	enforcement or intelligence agencies when presented with an authorized request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The guidelines for disclosure limit themselves to SPD under Rule 6 leaving a vacuum with respect to information that doesn't fall within the definition of 	SPD/I. However, Rule 4 (iv)'s applies to 'information including SPD'. Reading the two together, in accordance with the 'Harmonious Construction' principle, 	the scope of SPD/I in Rule 6 is construed to extend to the same personal information and SPD/I as is covered by Rule 4 (iv), for the limited purpose of the 	privacy policies under Rule 4.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 7&lt;/b&gt; : This Rule requires that when the data controller transfers SPD/I to another body corporate or person, such a third party must adhere to the same 	standards of data protection that the body corporate collecting the information in the first instance follows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; : Although the privacy policy is not required to provide details of the transfer of information, the fourth sub-section of Rule 4, which concerns itself 	with the obligation of the body corporate to provide a policy for privacy including information about the disclosure of information to its consumers, 	incorporates this Rule as it deals with disclosure of information to third parties. Thus, the Policy of the body corporate must include details of the way 	the data is handled or dealt by the third party, which is shared by the body corporate in question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 8:&lt;/b&gt; This Rule details the criteria for reasonable security practices and procedures.&lt;a href="#_ftn86" name="_ftnref86"&gt;&lt;sup&gt;&lt;sup&gt;[86]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It provides that not only must the body corporate have implemented standard security practices and procedures, but it should also have documented the 	information security program and policies containing appropriate "&lt;i&gt;managerial, technical, operational and physical security control measures&lt;/i&gt;". The 	Rule specifically uses the example of IS/ISO/IEC 27001 as an international standard that would fulfill the requirements under this provision. The security 	standards or codes of best practices adopted by the company are required to be certified/audited by a Government approved independent auditor annually and 	after modification or alteration of the existing practice and procedure. Sub-section (1) of the Rule also gives the body corporate the option of creating 	its own security procedures and practices for dealing with managerial, technical, operational, and physical security control, and have comprehensive 	documentation of their information security programme and information security policies. These norms should be as strict as the type of information 	collected and processed requires. In the event of a breach, the body corporate can be called to demonstrate that these norms were suitably implemented by 	it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; : It is unclear whether the empanelled IT security auditing organizations recognized by CERT-In discussed later are qualified for the purpose of this Rule, 	but from publicly available information the Data Security Council of India and CERT-In's empanelled Security Auditors seem to be the agencies given this 	task&lt;a href="#_ftn87" name="_ftnref87"&gt;&lt;sup&gt;&lt;sup&gt;[87]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. With regards to the Privacy Policy or Policies of a company, it is only 	necessary that the company include as many details as possible regarding the steps taken to ensure the security and confidentiality of the collected 	information in the Privacy Policy and Policies, and notify them to the consumer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Relevant Policies:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Empanelled Information Technology Security Auditors&lt;/b&gt; - CERT-In has created a panel of 'IT Security Auditors' for auditing networks &amp;amp; applications of various organizations of the Government, critical infrastructure organizations and private organizations including bodies corporate.&lt;a href="#_ftn88" name="_ftnref88"&gt;&lt;sup&gt;&lt;sup&gt;[88]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The empanelled IT security auditing organization is required to,	&lt;i&gt;inter alia&lt;/i&gt;, conduct a " 	&lt;i&gt; Review of Auditee's existing IT Security Policy and controls for their adequacy as per the best practices vis-à-vis the IT Security frameworks 		outlined in standards such as COBIT, COSO, ITIL, BS7799 / ISO17799, ISO27001, ISO15150, etc." &lt;/i&gt; &lt;a href="#_ftn89" name="_ftnref89"&gt;&lt;sup&gt;&lt;sup&gt;[89]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and conduct and document various assessments and tests. Some typical reviews and tests that include privacy reviews are - Information Security Testing, 	Internet Technology Security Testing and Wireless Security Testing.&lt;a href="#_ftn90" name="_ftnref90"&gt;&lt;sup&gt;&lt;sup&gt;[90]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For this 	purpose CERT-In maintains a list of IT Security Auditing Organizations&lt;a href="#_ftn91" name="_ftnref91"&gt;&lt;sup&gt;&lt;sup&gt;[91]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.4i7ojhp"&gt;&lt;/a&gt; &lt;b&gt;Criteria for analysis of company policies based on the 43A Rules &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Clear and Accessible statements of its practices and policies&lt;a href="#_ftn92" name="_ftnref92"&gt;&lt;sup&gt;&lt;sup&gt;[92]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects personal 	information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iii. Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Type and acknowledgment of personal or sensitive personal data/information collected	&lt;a href="#_ftn93" name="_ftnref93"&gt;&lt;sup&gt;&lt;sup&gt;[93]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy explicitly states that personal and sensitive personal information will be collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Option to not provide information and withdrawal of consent&lt;a href="#_ftn94" name="_ftnref94"&gt;&lt;sup&gt;&lt;sup&gt;[94]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Existence of Grievance Officer -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the privacy policy provides details of the grievance redressal mechanism?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iii. Whether the privacy policy provides the names and contact information of the grievance officer?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Purpose of Collection and usage of information -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Disclosure of Information -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether personal information is shared with third parties (except authorized government agencies/LEA/IA) only with user consent?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the policy specifies that personal information is disclosed to Government agencies/LEA/IA only when legally mandated as per the circumstances 	laid out in 43A?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Reasonable Security practices and procedures -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to secure 	information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br clear="all" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.2xcytpi"&gt;&lt;/a&gt; &lt;a name="h.3whwml4"&gt;&lt;/a&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957939"&gt;Annexure 2&lt;/a&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.2bn6wsx"&gt;&lt;/a&gt; Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules) 2011 and Company SURVEY&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Bharti Airtel Ltd.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel's Privacy Policy&lt;a href="#_ftn95" name="_ftnref95"&gt;&lt;sup&gt;&lt;sup&gt;[95]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; is available through the 	main page of the website and it is mentioned in the Airtel Terms and Conditions and is applicable for Airtel's websites as well as its services and 	products, such as its telecommunications services. It was determined that the policy can be comprehended by individuals without legal knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type and acknowledgement of personal or sensitive personal data/information collected: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Rationale: &lt;/b&gt;Airtel's Privacy Policy indicates that sensitive personal and personal information will be collected, defines sensitive personal information&lt;a href="#_ftn96" name="_ftnref96"&gt;&lt;sup&gt;&lt;sup&gt;[96]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and specifies specific types of personal&lt;a href="#_ftn97" name="_ftnref97"&gt;&lt;sup&gt;&lt;sup&gt;[97]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and sensitive personal information	&lt;a href="#_ftn98" name="_ftnref98"&gt;&lt;sup&gt;&lt;sup&gt;[98]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that will be collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide data or information and subsequent withdrawal of consent: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. &lt;b&gt;Rationale: &lt;/b&gt;The Airtel Privacy Policy states that individuals have the right to choose not to provide consent or information and have 	the right to withdraw consent. The policy notes that if consent/information is not provided, Airtel reserves the right to not provide or to withdraw the 	services.&lt;a href="#_ftn99" name="_ftnref99"&gt;&lt;sup&gt;&lt;sup&gt;[99]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel provides for the contact details of nodal officers&lt;a href="#_ftn100" name="_ftnref100"&gt;&lt;sup&gt;&lt;sup&gt;[100]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and appellate authorities	&lt;a href="#_ftn101" name="_ftnref101"&gt;&lt;sup&gt;&lt;sup&gt;[101]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; on its website.&lt;b&gt; &lt;/b&gt;Additionally the website provides for the 	'Office of the Ombudsperson'&lt;a href="#_ftn102" name="_ftnref102"&gt;&lt;sup&gt;&lt;sup&gt;[102]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which is an independent forum for employees and 	external stakeholders&lt;a href="#_ftn103" name="_ftnref103"&gt;&lt;sup&gt;&lt;sup&gt;[103]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; of the company to raise concerns and complaints about 	improper practices which are in breach of the Bharti Code of Conduct. Additionally, details of the Airtel Grievance Redressal Officers can also be found in 	the TRAI website.&lt;a href="#_ftn104" name="_ftnref104"&gt;&lt;sup&gt;&lt;sup&gt;[104]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Comprehensive disclosure of purpose of collection and usage of information: Partial &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Airtel's Privacy Policy indicates eight purposes&lt;a href="#_ftn105" name="_ftnref105"&gt;&lt;sup&gt;&lt;sup&gt;[105]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that information will be 	collected and used for, but notes that the use and collection is not limited to the defined purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information&lt;a href="#_ftn106" name="_ftnref106"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[106]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel has a dedicated section explaining the company's practices around the disclosure and sharing of collected information, including ways in which consent will be collected for the sharing of personal information&lt;a href="#_ftn107" name="_ftnref107"&gt;&lt;sup&gt;&lt;sup&gt;[107]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, how collected personal information may be collected internally	&lt;a href="#_ftn108" name="_ftnref108"&gt;&lt;sup&gt;&lt;sup&gt;[108]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the disclosure of information to third parties and that the third party will 	be held accountable for protecting the information through contract&lt;a href="#_ftn109" name="_ftnref109"&gt;&lt;sup&gt;&lt;sup&gt;[109]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the 	possible transfer of personal information and its purposes&lt;a href="#_ftn110" name="_ftnref110"&gt;&lt;sup&gt;&lt;sup&gt;[110]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and the circumstances under which information will be disclosed to governmental agencies (which reflect the circumstances defined by the Rules.)	&lt;a href="#_ftn111" name="_ftnref111"&gt;&lt;sup&gt;&lt;sup&gt;[111]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Existence of reasonable security practices and procedures&lt;/b&gt; &lt;a href="#_ftn112" name="_ftnref112"&gt;&lt;sup&gt;&lt;sup&gt;[112]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;b&gt;: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel's privacy policy has a dedicated section that explains the company's security practices and procedures in place. The policy notes that Airtel's practices and procedures are IS/ISO/IEC 27001 compliant	&lt;a href="#_ftn113" name="_ftnref113"&gt;&lt;sup&gt;&lt;sup&gt;[113]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, that access is restricted to a need to know basis and that employees are 	bound by codes of confidentiality&lt;a href="#_ftn114" name="_ftnref114"&gt;&lt;sup&gt;&lt;sup&gt;[114]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and that Airtel works to ensure that third 	parties also have strong security procedures in place.&lt;a href="#_ftn115" name="_ftnref115"&gt;&lt;sup&gt;&lt;sup&gt;[115]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The policy also provides details on the retention&lt;a href="#_ftn116" name="_ftnref116"&gt;&lt;sup&gt;&lt;sup&gt;[116]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and destruction	&lt;a href="#_ftn117" name="_ftnref117"&gt;&lt;sup&gt;&lt;sup&gt;[117]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; procedures for personal information, and notes that reasonable steps are 	taken to protect against hacking and virus attacks.&lt;a href="#_ftn118" name="_ftnref118"&gt;&lt;sup&gt;&lt;sup&gt;[118]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Tata Telecommunication Services (DoCoMo and Virgin Mobile)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies&lt;/b&gt; : Partial&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale&lt;/b&gt;: Though Tata DoCoMo has a comprehensive Data Privacy Policy	&lt;a href="#_ftn119" name="_ftnref119"&gt;&lt;sup&gt;&lt;sup&gt;[119]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that is applicable to Tata Teleservices Limited's ("&lt;b&gt;TTL&lt;/b&gt;") 	products and services and the TTL website, it is not accessible to the user through the main website. In the Frequently Asked Questions Section of TTL, it is clarified under what circumstances information that you provide is not covered by the TTL privacy policy.	&lt;a href="#_ftn120" name="_ftnref120"&gt;&lt;sup&gt;&lt;sup&gt;[120]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type of personal or sensitive personal data/information collected: Partial &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rational: &lt;/b&gt;TTL defines personal information&lt;a href="#_ftn121" name="_ftnref121"&gt;&lt;sup&gt;&lt;sup&gt;[121]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; but only 	provides general examples of types of personal information&lt;a href="#_ftn122" name="_ftnref122"&gt;&lt;sup&gt;&lt;sup&gt;[122]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (and not sensitive 	personal) collected, rather than a comprehensive list. The definitions and examples of information collected are clarified in the FAQs and the Privacy 	Policy, rather than in the Privacy Policy alone. As a strength, the Privacy Policy clarifies the ways in which TTL will collect information from the user - including the fact that they receive information from third parties like credit agencies.	&lt;a href="#_ftn123" name="_ftnref123"&gt;&lt;sup&gt;&lt;sup&gt;[123]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent: N/A&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;The TTL Privacy Policy does not address the right of the individual to provide consent/information and to withdraw 	information/consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; TTL has various methods to lodge complaints and provides for an appellate authority.	&lt;a href="#_ftn124" name="_ftnref124"&gt;&lt;sup&gt;&lt;sup&gt;[124]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Additionally, details of the Grievance Redressal Officers are provided via 	the TRAI website.&lt;a href="#_ftn125" name="_ftnref125"&gt;&lt;sup&gt;&lt;sup&gt;[125]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; In its' Privacy Policy, TTL describes the way in which collected information is used.	&lt;a href="#_ftn126" name="_ftnref126"&gt;&lt;sup&gt;&lt;sup&gt;[126]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The TTL FAQs further clarify the use of cookies by the company, the use of 	provided information for advertising purposes, &lt;a href="#_ftn127" name="_ftnref127"&gt;&lt;sup&gt;&lt;sup&gt;[127]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and the use of aggregate and 	anonymized data.&lt;a href="#_ftn128" name="_ftnref128"&gt;&lt;sup&gt;&lt;sup&gt;[128]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;In the Privacy Policy and the FAQs page, TTL is transparent about the circumstances on which they will share/disclose 	personal information with third parties&lt;a href="#_ftn129" name="_ftnref129"&gt;&lt;sup&gt;&lt;sup&gt;[129]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, with law enforcement/governmental agencies&lt;a href="#_ftn130" name="_ftnref130"&gt;&lt;sup&gt;&lt;sup&gt;[130]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and with other TTL companies.	&lt;a href="#_ftn131" name="_ftnref131"&gt;&lt;sup&gt;&lt;sup&gt;[131]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Interestingly, the TTL FAQ's clarify to the customer that their personal information might be processed in different jurisdictions, and thus would be accessible by law enforcement in that jurisdiction.	&lt;a href="#_ftn132" name="_ftnref132"&gt;&lt;sup&gt;&lt;sup&gt;[132]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;TTL's Privacy Policy broadly references that security practices are in place to protect user information, but the policy does not make reference to a specific security standard, or provide detail as to what these practices and procedures are.	&lt;a href="#_ftn133" name="_ftnref133"&gt;&lt;sup&gt;&lt;sup&gt;[133]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Although TTL's Privacy Policy does not make mention of any specific security 	standard, Tata Teleservices (Maharashtra) Limited claims to have been awarded with ISO 27001 ISMS (Information Security Management Systems) Certification 	in May 2011, and completed its first Surveillance Audit in June 2012&lt;a href="#_ftn134" name="_ftnref134"&gt;&lt;sup&gt;&lt;sup&gt;[134]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. 	Information on IT security standards adopted by other circles could not be found on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Vodafone &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Vodafone's Privacy Policy&lt;a href="#_ftn135" name="_ftnref135"&gt;&lt;sup&gt;&lt;sup&gt;[135]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; is easily accessible from its website from a link at the bottom, directly from the home page and from all other pages of the website.	&lt;a href="#_ftn136" name="_ftnref136"&gt;&lt;sup&gt;&lt;sup&gt;[136]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Collection of personal or sensitive personal data/information: No &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Type -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Personal Information - The amount of details given by the Privacy Policy with regards to the personal information being collected is insufficient, as it 	does not include a number of relevant facts, and uses is vague language - such as '&lt;i&gt;amongst other things&lt;/i&gt;', implying that information other than 	that which is notified is being collected.&lt;a href="#_ftn137" name="_ftnref137"&gt;&lt;sup&gt;&lt;sup&gt;[137]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Sensitive Personal Data or Information - The Privacy Policy does not mention the categories or types of SPD/I, as defined under Rule 3, being collected 	by the service provider explicitly, only gives a general overview of the information that is collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt; The privacy policy does not mention the consent of data subject anywhere, nor does it mention his or her right to withdraw 	it at any point of time. It also does not mention whether or not the provision of services by Vodafone is contingent on the provision of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Privacy Policy explicitly mentions and gives the email address of a grievance redressal officer, though further details 	about the other offices are given in a separate section of the website.&lt;a href="#_ftn138" name="_ftnref138"&gt;&lt;sup&gt;&lt;sup&gt;[138]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy gives an exhaustive list of purposes for which the collected information can be used by Vodafone,	&lt;a href="#_ftn139" name="_ftnref139"&gt;&lt;sup&gt;&lt;sup&gt;[139]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; but at the same time the framing of the opening sentence and the usage of the 	term 'may include' could imply that it can be used for other purposes as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy mentions that Vodafone might share the collected information with certain third parties and the terms and conditions which would apply 	to such a third party.&lt;a href="#_ftn140" name="_ftnref140"&gt;&lt;sup&gt;&lt;sup&gt;[140]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The phrasing does not imply that there are other 	conditions that have not been mentioned in the policy, under which the information would be shared with a third party. At the same time, the Privacy Policy 	does not explicitly say that the third party will necessarily follow the privacy and data security procedures and rules laid down in the Privacy Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy mentions in reasonably clear detail the security practices and procedures followed by Vodafone, and also mentions the circumstances in which the data subject should take care to protect his or her own information, wherein Vodafone will not be liable.	&lt;a href="#_ftn141" name="_ftnref141"&gt;&lt;sup&gt;&lt;sup&gt;[141]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Although Vodafone India's Privacy Policy does not specify what their IT Security standard is, its 2012/2013 Sustainability Report available through its international website	&lt;a href="#_ftn142" name="_ftnref142"&gt;&lt;sup&gt;&lt;sup&gt;[142]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; states that it follows industry practices in line with the ISO 27001 standard 	and its core data centre in India follows this standard&lt;a href="#_ftn143" name="_ftnref143"&gt;&lt;sup&gt;&lt;sup&gt;[143]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Aircel&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy is accessible from every page of the Aircel website, with a link at the bottom of each page after the specific circle has been chosen. 	It is reasonably free of legalese and is intelligible.&lt;a href="#_ftn144" name="_ftnref144"&gt;&lt;sup&gt;&lt;sup&gt;[144]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type of personal or sensitive personal data/information collected: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Type -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Personal Information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the Privacy Policy, the repeated usage of the term 'may' creates some doubt about the actual extent of the data collected, and leaves the Privacy Policy 	quite unclear in this regard. At the same time, the Privacy Policy does include a fairly comprehensive list of personal information that could be 	collected. &lt;a href="#_ftn145" name="_ftnref145"&gt;&lt;sup&gt;&lt;sup&gt;[145]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The wording in the Privacy Policy thus requires further 	clarification and specification in order to make a determination on whether or not it provides complete details on the personal information that will be 	collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Sensitive Personal Data or Information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy does not mention SPDI explicitly, which adds to the lack of concrete details as noted earlier.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent - Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale&lt;/b&gt; : The Privacy Policy mentions that users do have the right to refuse to provide or the withdrawal of consent to collect personal information. In such cases, Aircel can respectively refuse or discontinue the provision of its services.	&lt;a href="#_ftn146" name="_ftnref146"&gt;&lt;sup&gt;&lt;sup&gt;[146]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though not directly mentioned in the Privacy Policy, a separate, easily noticeable link at the bottom of each webpage links to the Customer Grievance section. There are different officers in charge of each node, called the Nodal Officers.	&lt;a href="#_ftn147" name="_ftnref147"&gt;&lt;sup&gt;&lt;sup&gt;[147]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Partial &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;The usage of the term 'may' in the section of the Privacy Policy regarding the purpose of collection and usage of 	information again leaves it ambiguous in this regard, implying that it can just as easily be used for purposes that have not been notified to the data 	subject.&lt;a href="#_ftn148" name="_ftnref148"&gt;&lt;sup&gt;&lt;sup&gt;[148]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Though&lt;b&gt; &lt;/b&gt;the Privacy Policy does not specify all the circumstances under which Aircel would share the collected information with a third party, it specifies the terms and conditions that would apply in the cases that it does.	&lt;a href="#_ftn149" name="_ftnref149"&gt;&lt;sup&gt;&lt;sup&gt;[149]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy gives a reasonable amount of detail about the steps taken by Aircel to ensure the security of the information collected by it, but leaves 	certain holes uncovered.&lt;a href="#_ftn150" name="_ftnref150"&gt;&lt;sup&gt;&lt;sup&gt;[150]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Atria Convergence Technologies Private Limited (ACT)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Policy is intelligible, and is easily accessible from all the webpages of the company's website from a link at the 	bottom of all pages.&lt;a href="#_ftn151" name="_ftnref151"&gt;&lt;sup&gt;&lt;sup&gt;[151]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type of personal or sensitive personal data/information collected: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Type -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Personal Information - Yes -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy mentions the different types of Personal Information which will be collected by ACT if the customer registers with the Company.	&lt;a href="#_ftn152" name="_ftnref152"&gt;&lt;sup&gt;&lt;sup&gt;[152]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Sensitive Personal Data or Information -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The categories of SPD/I collected by ACT are not specifically mentioned in the policy, though they are mentioned as part of the general declarations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale&lt;/b&gt;: The option of the data subject not providing or withdrawing consent has not been mentioned in the Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; No Grievance Officer has been mentioned in the Privacy Policy or on the ACT website, nor has any other grievance redressal 	process been specified.&lt;a href="#_ftn153" name="_ftnref153"&gt;&lt;sup&gt;&lt;sup&gt;[153]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Policy mentions the various ways ACT might use the information it collects, though the use of the term 'general' is a 	cause for concern.&lt;a href="#_ftn154" name="_ftnref154"&gt;&lt;sup&gt;&lt;sup&gt;[154]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The list of purposes for collection given in the Privacy 	Policy is a very general list.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Policy mentions the circumstances in which ACT might share the collected information with a third party, and also 	mentions that such parties will either be subject to confidentiality agreements, or that the data subject will be notified before his or her information 	becomes subject to a different privacy policy. It also mentions the exception to above, that being when the information is shared for investigative 	purposes.&lt;a href="#_ftn155" name="_ftnref155"&gt;&lt;sup&gt;&lt;sup&gt;[155]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; At the same time, the intended recipients of the information are not 	mentioned, and the name and address of agency/agencies collecting and retaining information is not mentioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; - The security practices and procedures followed by ACT to protect the information of its customers are not mentioned in the Policy, which is a critical weak point, keeping in mind the requirements of the Rules.	&lt;a href="#_ftn156" name="_ftnref156"&gt;&lt;sup&gt;&lt;sup&gt;[156]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; . Telecom Regulatory Authority of India, Press Release 143/2012,(&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/PressRealease/Document/PR-TSD-May12.pdf"&gt; http://www.trai.gov.in/WriteReadData/PressRealease/Document/PR-TSD-May12.pdf &lt;/a&gt; &amp;gt;)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; . The Indian Telecom Service Performance Indicators, January-March 2013, Telecom Regulatory Authority of India,. (&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf"&gt; http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf &lt;/a&gt; &amp;gt;)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; . 'India is now world's third largest Internet user after U.S., China', (The Hindu, 24 August 2013) &amp;lt; 			&lt;a href="http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece"&gt; http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; . In addition, the Unified Access License Framework which allows for a single license for multiple services such as telecom, the internet and 			television, provides certain security guidelines. As per the model UIL Agreements, privacy of communications is to be maintained and network 			security practices and audits are mandated along with penalties for contravention in addition to what is prescribed under the Information 			Technology Act,2000. For internet services, the Agreement stipulates the keeping an Internet Protocol Detail Record (IPDR) and copies of packets from customer premises equipment (CPE). Accessed at &amp;lt;			&lt;a href="http://www.dot.gov.in/sites/default/files/Unified%20Licence.pdf"&gt;http://www.dot.gov.in/sites/default/files/Unified%20Licence.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; . See &amp;gt;&amp;gt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf"&gt; http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; . 'India is now world's third largest Internet user after U.S., China', (The Hindu, 24 August 2013) &amp;lt; 			&lt;a href="http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece"&gt; http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece &lt;/a&gt; &amp;gt; Accessed..&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; . Starting with &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of UP &lt;/i&gt;1963 AIR SC 1295&lt;i&gt;, &lt;/i&gt;the&lt;i&gt; &lt;/i&gt;right to privacy has been further confirmed 			and commented on in other cases, like &lt;i&gt;Govind v.State of M.P&lt;/i&gt; (1975) 2 SCC 148: 1975 SCC (Cri) 468. A full history of the development of the 			Right to Privacy can be found in B.D. Agarwala, &lt;i&gt;Right to Privacy: A Case-By-Case Development&lt;/i&gt;, (1996) 3 SCC (Jour) 9, available at 			http://www.ebc-india.com/lawyer/articles/96v3a2.htm.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; . White Paper on EU Adequacy Assessment of India, 3, ("&lt;i&gt;Based on an overall &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; analysis against the identifiable principles under Article 25, the 2010 Report concludes that India does not at present provide adequate 				protection to personal data in relation to any sector or to the whole of its private sector or to the whole of its public sector. &lt;/i&gt; ") available at &amp;lt; 			&lt;a href="https://www.dsci.in/sites/default/files/WhitePaper%20EU_Adequacy%20Assessment%20of%20India.pdf"&gt; https://www.dsci.in/sites/default/files/WhitePaper%20EU_Adequacy%20Assessment%20of%20India.pdf &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; . Planning Commission&lt;i&gt;, Report of the Group of Experts on Privacy&lt;/i&gt;, 2012, (&amp;lt;			&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/a&gt;&amp;gt;)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; . Though a company's Privacy Policy was the main document analysed for this research, when applicable a company's Terms of Service wavas also 			reviewed.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; . BSNL and MTNL are government companies as defined under section 617, Indian Companies Act, 1956, incorporated under the Indian Companies Act, 			1956. Under section 43 A (i) of the Act, a 'body corporate' has been broadly defined as "any company…sole proprietorship or other association 			of individuals engaged in commercial or professional activities". Therefore, for the purpose of this survey, BSNL and MTNL are recognized as bodies 			corporate.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; . Documents Reviewed&lt;i&gt;:&lt;/i&gt; http://portal.bsnl.in/portal/privacypolicy.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; . A full list of its services are available here: &amp;lt;			&lt;a href="http://bsnl.co.in/opencms/bsnl/BSNL/services/"&gt;http://bsnl.co.in/opencms/bsnl/BSNL/services/&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; . The MTNL website does not provide access to a privacy policy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; . A full list of its services are available here &amp;lt;&amp;lt;http://mtnldelhi.in&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; . Documents Reviewed: &lt;a href="http://www.airtel.in/forme/privacy-policy"&gt;http://www.airtel.in/forme/privacy-policy&lt;/a&gt; ,			&lt;a href="http://www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp"&gt;http://www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp&lt;/a&gt;, 			&lt;a href="http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp"&gt; http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp &lt;/a&gt; , 			&lt;a href="http://www.airtel.in/about-bharti/about-bharti-airtel/ombuds-office"&gt; http://www.airtel.in/about-bharti/about-bharti-airtel/ombuds-office &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; . A full list of services provided by Bharti Airtel is available here: &amp;lt;&lt;a href="http://www.airtel.in"&gt;www.airtel.in&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; . http://submarinenetworks.com/stations/asia/india/chennai-bharti&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; . Documents Reviewed: 			&lt;a href="http://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement.html"&gt; http://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement.html &lt;/a&gt; &lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker&lt;/a&gt; , 			&lt;a href="http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html"&gt; http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; . See &amp;lt; 			&lt;a href="http://historyofbusiness.blogspot.in/2013/11/history-of-vodafone.html."&gt; http://historyofbusiness.blogspot.in/2013/11/history-of-vodafone.html. &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; . &lt;i&gt;Vodafone International Holdings v Union of India&lt;/i&gt;, WP 1325/2010, Bombay High Court&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; . 'Vodafone to Buy Additional Essar India Stake for $5 Billion',(&lt;i&gt;Bloomberg&lt;/i&gt;, March 31, 2011) &amp;lt; 			&lt;a href="http://www.bloomberg.com/news/2011-03-31/essar-exercises-option-to-sell-5-billion-stake-in-vodafone-essar-venture.html"&gt; http://www.bloomberg.com/news/2011-03-31/essar-exercises-option-to-sell-5-billion-stake-in-vodafone-essar-venture.html &lt;/a&gt; &amp;gt;Accessed 26 May 2014&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; . See &amp;lt;&lt;a href="https://www.vodafone.in/pages/aboutus.aspx?cid=ker."&gt;https://www.vodafone.in/pages/aboutus.aspx?cid=ker.&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; . Vodafone, &lt;i&gt;supra&lt;/i&gt; note 13.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; . Documents Reviewed:&lt;a href="http://www.tatadocomo.com/downloads/data-privacy-policy.pdf"&gt;http://www.tatadocomo.com/downloads/data-privacy-policy.pdf&lt;/a&gt;,			&lt;a href="http://www.tatateleservices.com/t-customercare.aspx"&gt;http://www.tatateleservices.com/t-customercare.aspx&lt;/a&gt;, 			&lt;a href="http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf"&gt; http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; . 'Japan's Docomo acquires 26% stake in Tata Tele'(The Hindu Business Line, November 13 2008) &amp;lt; 			&lt;a href="http://www.thehindubusinessline.in/bline/2008/11/13/stories/2008111352410100.htm"&gt; http://www.thehindubusinessline.in/bline/2008/11/13/stories/2008111352410100.htm &lt;/a&gt; .&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; . Further details are available at: &amp;lt;			&lt;a href="http://www.tatateleservices.com/t-aboutus-ttsl-organization.aspx"&gt;http://www.tatateleservices.com/t-aboutus-ttsl-organization.aspx&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; . Documents Reviewed&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061"&gt; http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061 &lt;/a&gt; , 			&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=customercare_consumergrievance_page"&gt; http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=customercare_consumergrievance_page &lt;/a&gt; , 			&lt;a href="http://www.aircel.com/AircelWar/ShowProperty/UCMRepository/Contribution%20Folders/Global/PDF/Manual_Customer_Grievan.pdf"&gt; http://www.aircel.com/AircelWar/ShowProperty/UCMRepository/Contribution%20Folders/Global/PDF/Manual_Customer_Grievan.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; . See &amp;lt; 			&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/ap?_nfpb=true&amp;amp;_pageLabel=aboutus_book."&gt; http://www.aircel.com/AircelWar/appmanager/aircel/ap?_nfpb=true&amp;amp;_pageLabel=aboutus_book. &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; . Documents Reviewed: &lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; . https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; . &lt;a href="http://www.tatadocomo.com/downloads/data-privacy-policy.pdf"&gt;http://www.tatadocomo.com/downloads/data-privacy-policy.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; . http://www.airtel.in/forme/privacy-policy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; .http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; . &lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; . In 2012, the Minister of State for Communications &amp;amp; Information Technology informed the Rajya Sabha that "			&lt;i&gt;(a)ny change in the privacy policy is not within the purview of amended Information Technology Act, 2000&lt;/i&gt;",, while discussing changes to 			Google's privacy policy. Even though the Minister noted that the EU has reported its dissatisfaction with the changed policy, finding that the policy "			&lt;i&gt;makes it impossible to understand which purposes, personal data, recipients or access rights are relevant to the use of a specific service&lt;/i&gt; ", he argued that the Act and Rules therein merely stipulate the publication of a privacy policy which provide "			&lt;i&gt;information to the end users as to how their personal information is collected, for which it is collected, processed and secure&lt;/i&gt;". Further, 			when asked how changes to privacy policy affect end users the Minister shifted the responsibility on end users, stating that " 			&lt;i&gt; (t)he end users… need to fully understand the privacy policy of Google, the consequences of sharing their personal information and their 				privacy rights before they start using online services &lt;/i&gt; ".( &amp;lt; 			&lt;a href="http://rsdebate.nic.in/bitstream/123456789/609109/2/PQ_225_30032012_U1929_p129_p130.pdf#search=%22google%22"&gt; http://rsdebate.nic.in/bitstream/123456789/609109/2/PQ_225_30032012_U1929_p129_p130.pdf#search=%22google%22 &lt;/a&gt; &amp;gt;).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; . Available at &lt;a href="http://portal.bsnl.in/portal/privacypolicy.htm"&gt;http://portal.bsnl.in/portal/privacypolicy.htm&lt;/a&gt;, the privacy policy was 			found through a search engine and not through a link from the website. An RTI request was submitted to BSNL for a copy of its privacy policy as 			applicable to all its products, services and websites. BSNL responded by submitting a copy of this privacy policy even though the text of the 			policy does not clarify the scope.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; . See, &amp;lt;&lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.airtel.in/forme/privacy-policy"&gt;http://www.airtel.in/forme/privacy-policy&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.tataindicom.com/Download/data-privacy-policy.pdf"&gt;www.tataindicom.com/Download/data-privacy-policy.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; . See &amp;lt;&amp;lt;www.aircel.com/AircelWar/appmanager/aircel/delhi?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; . See &amp;lt;&lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; . See&amp;lt;&amp;lt; http://portal.bsnl.in/portal/privacypolicy.htm&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; . See &amp;lt;&lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.tataindicom.com/Download/data-privacy-policy.pdf"&gt;http://www.tataindicom.com/Download/data-privacy-policy.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; . Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; . The complaint center details are available here: &amp;lt;			&lt;a href="http://www.tccms.gov.in/Queries.aspx?cid=1"&gt;http://www.tccms.gov.in/Queries.aspx?cid=1&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; . Rules 5 and 6&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; . Principle 2, Principle 3, Personal Information Protection and Electronic Documents Act 2000. Available at: &amp;lt;&amp;lt;			&lt;a href="http://laws-lois.justice.gc.ca/eng/acts/P-8.6/index.html"&gt;http://laws-lois.justice.gc.ca/eng/acts/P-8.6/index.html&lt;/a&gt;&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; . Rule 5(7),&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; . Principle 2&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; . P. 21&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; . Telecom Regulatory Policy CRTC 2009-657, Review of the Internet traffic management practices of Internet service providers &amp;lt;&amp;lt;			&lt;a href="http://www.crtc.gc.ca/eng/archive/2009/2009-657.htm"&gt;www.crtc.gc.ca/eng/archive/2009/2009-657.htm&lt;/a&gt;&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; . Alex Cameron,&lt;i&gt;CRTC Imposes Super-PIPEDA Privacy Protections for Personal Information Collected by ISPs, &lt;/i&gt;Privacy and Information 			Protection Bulletin, Fasken Martineau, &amp;lt;&amp;lt; 			&lt;a href="http://www.fasken.com/files/Publication/4317fd62-0827-4d1d-b836-5b932b3b21db/Presentation/PublicationAttachment/bafbf01e-365c-47f8-86a5-5cf7d7e43787/Bulletin_-_November_2009_-_Cameron.pdf"&gt; http://www.fasken.com/files/Publication/4317fd62-0827-4d1d-b836-5b932b3b21db/Presentation/PublicationAttachment/bafbf01e-365c-47f8-86a5-5cf7d7e43787/Bulletin_-_November_2009_-_Cameron.pdf &lt;/a&gt; . &amp;gt;&amp;gt; Accessed 21 May 2014&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; . Bram D. Abramson, Grant Buchanan, Hank Intven, &lt;i&gt;CRTC Shapes Canadian "Net Neutrality" Rules, &lt;/i&gt;McCarthy Tetrault. &amp;lt;			&lt;a href="http://www.mccarthy.ca/article_detail.aspx?id=4720"&gt;http://www.mccarthy.ca/article_detail.aspx?id=4720&lt;/a&gt; &amp;gt; Accessed 21 May 2014&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; . The Privacy Act, 1988, Part III, &lt;i&gt;available at &amp;lt;&amp;lt;&lt;/i&gt; http://www.comlaw.gov.au/Series/C2004A03712.&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, note 28, Schedule 3, 1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 3.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 4.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 5.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 6.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 8.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 9.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; . Telecommunications Act, Part 13 (Information or a document protected under Part 13 could relate to many forms of communications, including fixed 			and mobile telephone services, internet browsing, email and voice over internet telephone services. For telephone-based communications, this would 			include subscriber information, the telephone numbers of the parties involved, the time of the call and its duration. In relation to internet-based 			applications, the information protected under Part 13 would include the Internet Protocol (IP) address used for the session, and the start and 			finish time of each session.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; . Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the 			processing of personal data and on the free movement of such data, &lt;i&gt;available at&lt;/i&gt; http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, article 3.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, article 8.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, article 2, (d). (" 			&lt;i&gt; (d) 'controller' shall mean the natural or legal person, public authority, agency or any other body which alone or jointly with others 				determines the purposes and means of the processing of personal data; where the purposes and means of processing are determined by national or 				Community laws or regulations, the controller or the specific criteria for his nomination may be designated by national or Community law; &lt;/i&gt; ")&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; . European Commission-IP-12/46, 25 January 2012, &amp;lt;			&lt;a href="http://europa.eu/rapid/press-release_IP-12-46_en.htm?locale=en."&gt;http://europa.eu/rapid/press-release_IP-12-46_en.htm?locale=en.&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; . Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection 			of privacy in the electronic communications sector.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a href="#_ftnref75" name="_ftn75"&gt;[75]&lt;/a&gt; . Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection 			with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a href="#_ftnref76" name="_ftn76"&gt;[76]&lt;/a&gt; . Rule 2 (h)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a href="#_ftnref77" name="_ftn77"&gt;[77]&lt;/a&gt; . Rule 3 (ii)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a href="#_ftnref78" name="_ftn78"&gt;[78]&lt;/a&gt; . Rule 3 (vii) and (viii)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a href="#_ftnref79" name="_ftn79"&gt;[79]&lt;/a&gt; . Rule 2 (i)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a href="#_ftnref80" name="_ftn80"&gt;[80]&lt;/a&gt; . Rule 4(iii), (iv)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a href="#_ftnref81" name="_ftn81"&gt;[81]&lt;/a&gt; . Section 2(v) of the Act defines 'information'&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a href="#_ftnref82" name="_ftn82"&gt;[82]&lt;/a&gt; . Rule 4 (1).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p&gt;&lt;a href="#_ftnref83" name="_ftn83"&gt;[83]&lt;/a&gt; . Rule 5 (5)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a href="#_ftnref84" name="_ftn84"&gt;[84]&lt;/a&gt; . Defined by Venkatarama Aiyar, J as: "The rule of construction is well settled that when there are in an enactment two provisions which cannot be reconciled with each other, they should be so interpreted that, if possible, effect could be given to both" in			&lt;i&gt;Venkataramana Devaru v. State of Mysore,&lt;/i&gt; AIR 1958 SC 255, p. 268: G. P. Singh, Principles of Statutory Interpretation, 1th ed. 2010, 			Lexisnexis Butterworths Wadhwa Nagpur. The principle was applied to interpret statutory Rules in A. N. Sehgal v. Raje Ram Sheoram, AIR 1991 SC 			1406.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p&gt;&lt;a href="#_ftnref85" name="_ftn85"&gt;[85]&lt;/a&gt; . Rule 6&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a href="#_ftnref86" name="_ftn86"&gt;[86]&lt;/a&gt; . Rule 8&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a href="#_ftnref87" name="_ftn87"&gt;[87]&lt;/a&gt; . 52&lt;sup&gt;nd&lt;/sup&gt; Report, Standing Committee on Information Technology, 24, available at &amp;lt; 			&lt;a href="http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf.%20"&gt; http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf. &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a href="#_ftnref88" name="_ftn88"&gt;[88]&lt;/a&gt; . Panel Of Information Security Auditing Organisations, CERT-IN &amp;lt;			&lt;a href="http://www.cert-in.org.in/PDF/background.pdf"&gt;http://www.cert-in.org.in/PDF/background.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a href="#_ftnref89" name="_ftn89"&gt;[89]&lt;/a&gt; . Section 1, Guidelines for applying to CERT-In for Empanelment of IT Security Audition Organisation, &amp;lt;			&lt;a href="http://www.cert-in.org.in/PDF/InfoSecAuditorsEmpGuidelines.pdf"&gt;http://www.cert-in.org.in/PDF/InfoSecAuditorsEmpGuidelines.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a href="#_ftnref90" name="_ftn90"&gt;[90]&lt;/a&gt; . Section 2.0, Guidelines for auditee organizations, Version 2.0, IT Security&lt;/p&gt;
&lt;p&gt;Auditing Assignment, http://www.cert-in.org.in/PDF/guideline_auditee.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a href="#_ftnref91" name="_ftn91"&gt;[91]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.cert-in.org.in/PDF/Empanel_org.pdf"&gt;http://www.cert-in.org.in/PDF/Empanel_org.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a href="#_ftnref92" name="_ftn92"&gt;[92]&lt;/a&gt; . Rule 4&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a href="#_ftnref93" name="_ftn93"&gt;[93]&lt;/a&gt; . Rule 4&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a href="#_ftnref94" name="_ftn94"&gt;[94]&lt;/a&gt; . Rule 5 (7)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn95"&gt;
&lt;p&gt;&lt;a href="#_ftnref95" name="_ftn95"&gt;[95]&lt;/a&gt; . See &amp;lt;&amp;lt; &lt;a href="http://www.airtel.in/forme/privacy-policy"&gt;http://www.airtel.in/forme/privacy-policy&lt;/a&gt;&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn96"&gt;
&lt;p&gt;&lt;a href="#_ftnref96" name="_ftn96"&gt;[96]&lt;/a&gt; &lt;i&gt; . 'Information that can be used by itself to uniquely identify, contact or locate a person, or can be used with information available from 				other sources to uniquely identify an individual. For the purpose of this policy, sensitive personal data or information has been considered as 				a part of personal information.' &lt;/i&gt; Accessed at &amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn97"&gt;
&lt;p&gt;&lt;a href="#_ftnref97" name="_ftn97"&gt;[97]&lt;/a&gt; . Subscriber's name, father's name, mother's name, spouse's name, date of birth, current and previous addresses, telephone number, mobile phone 			number, email address, occupation and information contained in the documents used as proof of identity and proof of address. Information related to 			your utilization of our services which may include your call details, your browsing history on our website, location details and additional 			information provided by you while using our services. We may keep a log of the activities performed by you on our network and websites by using 			various internet techniques such as web cookies, web beacons, server log files, etc.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn98"&gt;
&lt;p&gt;&lt;a href="#_ftnref98" name="_ftn98"&gt;[98]&lt;/a&gt; . Password&lt;b&gt;, &lt;/b&gt;Financial information -details of Bank account, credit card, debit card, or other payment instrument detail			&lt;b&gt;s, &lt;/b&gt;Physical, physiological and mental health condition&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn99"&gt;
&lt;p&gt;&lt;a href="#_ftnref99" name="_ftn99"&gt;[99]&lt;/a&gt; . Airtel states that if a customer does not provide information or consent for usage of personal information or subsequently withdraws consent, 			Airtel reserves the right to not provide the services or to withdraw the services for which the said information was sought, Avaliable at: &amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn100"&gt;
&lt;p&gt;&lt;a href="#_ftnref100" name="_ftn100"&gt;[100]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp"&gt;www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn101"&gt;
&lt;p&gt;&lt;a href="#_ftnref101" name="_ftn101"&gt;[101]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp"&gt; http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn102"&gt;
&lt;p&gt;&lt;a href="#_ftnref102" name="_ftn102"&gt;[102]&lt;/a&gt; . See &amp;lt;&amp;lt; http://www.airtel.in/about-bharti/about-bharti-airtel/ombuds-office&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn103"&gt;
&lt;p&gt;&lt;a href="#_ftnref103" name="_ftn103"&gt;[103]&lt;/a&gt; . Stakeholders are defined as: employee, associate, strategic partner, vendor&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn104"&gt;
&lt;p&gt;&lt;a href="#_ftnref104" name="_ftn104"&gt;[104]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072331247805566Bharti_Airtel_CC_AA-23072013.pdf"&gt; http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072331247805566Bharti_Airtel_CC_AA-23072013.pdf &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn105"&gt;
&lt;p&gt;&lt;a href="#_ftnref105" name="_ftn105"&gt;[105]&lt;/a&gt; . Verification of customer's identity; Complete transactions effectively and bill for products and service; Respond to customer requests for 			service or assistance; Perform market analysis, market research, business and operational analysis; Provide, maintain and improve Airtel products 			and services; Anticipate and resolve issues and concerns with Airtel products and services; Promote and market Airtel products and services which 			it may consider of interest and benefit to customers; and, Ensure adherence to legal and regulatory requirements for prevention and detection of 			frauds and crimes.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn106"&gt;
&lt;p&gt;&lt;a href="#_ftnref106" name="_ftn106"&gt;[106]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/disclosure+and+transfer?contentIDR=745792ad-d6af-4684-85d4-d85773e77356&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/disclosure+and+transfer?contentIDR=745792ad-d6af-4684-85d4-d85773e77356&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn107"&gt;
&lt;p&gt;&lt;a href="#_ftnref107" name="_ftn107"&gt;[107]&lt;/a&gt; . "Airtel may obtain a customer's consent for sharing personal information in several ways, such as in writing, online, through "click-through" 			agreements; orally, including through interactive voice response; or when a customer's consent is part of the terms and conditions pursuant to 			which Airtel provides a service."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn108"&gt;
&lt;p&gt;&lt;a href="#_ftnref108" name="_ftn108"&gt;[108]&lt;/a&gt; . Airtel and its employees may utilize some or all available personal information for internal assessments, measures, operations and related 			activities…"&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn109"&gt;
&lt;p&gt;&lt;a href="#_ftnref109" name="_ftn109"&gt;[109]&lt;/a&gt; . Airtel may at its discretion employ, contract or include third parties external to itself for strategic, tactical and operational purposes. Such 			agencies though external to Airtel, will always be entities which are covered by contractual agreements. These agreements in turn include Airtel's 			guidelines to the management, treatment and secrecy of personal information&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn110"&gt;
&lt;p&gt;&lt;a href="#_ftnref110" name="_ftn110"&gt;[110]&lt;/a&gt; . Airtel may transfer subscriber's personal information or other information collected, stored, processed by it to any other entity or organization 			located in India or outside India only in case it is necessary for providing services to a subscriber or if the subscriber has consented (at the 			time of collection of information) to the same. This may also include sharing of aggregated information with them in order for them to understand 			Airtel's environment and consequently, provide the subscriber with better services. While sharing personal information with third parties, adequate 			measures shall be taken to ensure that reasonable security practices are followed at the third party."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn111"&gt;
&lt;p&gt;&lt;a href="#_ftnref111" name="_ftn111"&gt;[111]&lt;/a&gt; . Airtel may share subscribers' personal information with Government agencies or other authorized law enforcement agencies (LEAs) mandated under 			law to obtain such information for the purpose of verification of identity or for prevention, detection, investigation including but not limited to 			cyber incidents, prosecution, and punishment of offences.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn112"&gt;
&lt;p&gt;&lt;a href="#_ftnref112" name="_ftn112"&gt;[112]&lt;/a&gt; . See&amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/security+practices+and+procedures?contentIDR=9346516c-c1a1-4bd7-bce0-6945236dceaa&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/security+practices+and+procedures?contentIDR=9346516c-c1a1-4bd7-bce0-6945236dceaa&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn113"&gt;
&lt;p&gt;&lt;a href="#_ftnref113" name="_ftn113"&gt;[113]&lt;/a&gt; . Airtel adopts reasonable security practices and procedures, in line with international standard IS/ISO/IEC 27001, to include, technical, 			operational, managerial and physical security controls in order to protect a customer's personal information from unauthorized access, or 			disclosure while it is under our control.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn114"&gt;
&lt;p&gt;&lt;a href="#_ftnref114" name="_ftn114"&gt;[114]&lt;/a&gt; . Airtel's security practices and procedures limit access to personal information on need-only basis. Further, its employees are bound by Code of 			Conduct and Confidentiality Policies which obligate them to protect the confidentiality of personal information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn115"&gt;
&lt;p&gt;&lt;a href="#_ftnref115" name="_ftn115"&gt;[115]&lt;/a&gt; . Airtel takes adequate steps to ensure that its third parties adopt reasonable level of security practices and procedures to ensure security of 			personal information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn116"&gt;
&lt;p&gt;&lt;a href="#_ftnref116" name="_ftn116"&gt;[116]&lt;/a&gt; . Airtel may retain a subscriber's personal information for as long as required to provide him/her with services or if otherwise required under any 			law.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn117"&gt;
&lt;p&gt;&lt;a href="#_ftnref117" name="_ftn117"&gt;[117]&lt;/a&gt; . When Airtel disposes of its customers' personal information, it uses reasonable procedures to erase it or render it unreadable (for example, 			shredding documents and wiping electronic media)."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn118"&gt;
&lt;p&gt;&lt;a href="#_ftnref118" name="_ftn118"&gt;[118]&lt;/a&gt; . Airtel maintains the security of its internet connections, however for reasons outside of its control, security risks may still arise. Any 			personal information transmitted to Airtel or from its online products or services will therefore be at a customer's own risk. It observes 			reasonable security measures to protect a customer's personal information against hacking and virus dissemination.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn119"&gt;
&lt;p&gt;&lt;a href="#_ftnref119" name="_ftn119"&gt;[119]&lt;/a&gt; . See &amp;lt;&amp;lt;http://www.tatadocomo.com/downloads/data-privacy-policy.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn120"&gt;
&lt;p&gt;&lt;a href="#_ftnref120" name="_ftn120"&gt;[120]&lt;/a&gt; . Information that customers provide to non-TTL companies is not covered by TTL's Policy. For example: When customers download applications or make 			an online purchase from a non-TTL company while using TTL's Internet or wireless services, the information collected by the non-TTL company is not 			subject to this Policy. When you navigate to a non-TTL company from TTL websites or applications (by clicking on a link or an advertisement, for 			example), information collected by the non-TTL company is governed by its privacy policy and not TTL's Privacy Policy. If one uses public forums - 			such as social networking services, Internet bulletin boards, chat rooms, or blogs on TTL or non-TTL websites, any Personal Information disclosed 			publicly can be read, collected, or used by others. Once one chooses to reveal Personal Information on such a site, the information is publicly 			available, and TTL cannot prevent distribution and use of that information by other parties. Information on a wireless Customer 's location, usage 			and numbers dialed, which is roaming on the network of a non-TTL company will be subject to the privacy policy of the non-TTL company, and not 			TTL's Policy.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn121"&gt;
&lt;p&gt;&lt;a href="#_ftnref121" name="_ftn121"&gt;[121]&lt;/a&gt; . "Personal Information" is any information that relates to a natural person which, either directly or indirectly, in combination with other 			information available or likely to be available with a body corporate, is capable of identifying such person.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn122"&gt;
&lt;p&gt;&lt;a href="#_ftnref122" name="_ftn122"&gt;[122]&lt;/a&gt; . Personal Information - Some general examples -TTL may collect Confidential Data in different forms such as Personal and other Information based 			on a customer's use of its products and services. Some examples include, Contact Information that allows us to communicate with you -- including 			your name, address, telephone number, and e-mail address; Billing information-- including payment data, credit history, credit card number, 			security codes, and service history.Equipment, Performance, TTL Website Usage, Viewing and other Technical Information about use of TTL's network, 			services, products or websites.&lt;/p&gt;
&lt;p&gt;Technical &amp;amp; Usage Information is clarified in the FAQ's as information&lt;b&gt; &lt;/b&gt;related to the services provided, use of TTL's network, 			services, products or websites. Examples of the Technical &amp;amp; Usage Information collected include: &lt;b&gt;Equipment Information &lt;/b&gt;that identifies the equipment used on TTL's network, such as equipment type, IDs, serial numbers, settings, configuration, and software.			&lt;b&gt;Performance Information &lt;/b&gt;about the operation of the equipment, services and applications used on TTL's network, such as IP 			addresses, URLs, data transmission rates and latencies, location information, security characteristics, and information about the amount of bandwidth and other network resources used in connection with uploading, downloading or streaming data to and from the Internet.			&lt;b&gt;TTL Website Usage Information &lt;/b&gt;about the use of TTL websites, including the pages visited, the length of time spent, the links or 			advertisements followed and the search terms entered on TTL sites, and the websites visited immediately before and immediately after visiting one of TTL's sites.TTL also may collect similar information about a customer's use of its applications on wireless devices.			&lt;b&gt;Viewing Information &lt;/b&gt;about the programs watched and recorded and similar choices under Value added TTL services and products.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn123"&gt;
&lt;p&gt;&lt;a href="#_ftnref123" name="_ftn123"&gt;[123]&lt;/a&gt; . Ways in which TTL collects information: On the purchase or interaction about a TTL product or service provided; Automatically collected when one 			visits TTL's websites or use its products and services; Other sources, such as credit agencies.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn124"&gt;
&lt;p&gt;&lt;a href="#_ftnref124" name="_ftn124"&gt;[124]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.tatateleservices.com/t-customercare.aspx"&gt;http://www.tatateleservices.com/t-customercare.aspx&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn125"&gt;
&lt;p&gt;&lt;a href="#_ftnref125" name="_ftn125"&gt;[125]&lt;/a&gt; .See&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341218463621Tata_CC_AA_1-23072013.pdf"&gt; http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341218463621Tata_CC_AA_1-23072013.pdf &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn126"&gt;
&lt;p&gt;&lt;a href="#_ftnref126" name="_ftn126"&gt;[126]&lt;/a&gt; . To provide the best customer experience possible; Provide the services a customer purchases, respond to customer questions; Communicate with 			customers regarding service updates, offers, and promotions; Deliver customized content and advertising that may be of interest to customers; 			Address network integrity and security issues; Investigate, prevent or take action regarding illegal activities, violations of TTL's Terms of 			Service or Acceptable Use Policies&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn127"&gt;
&lt;p&gt;&lt;a href="#_ftnref127" name="_ftn127"&gt;[127]&lt;/a&gt; . &lt;b&gt;Site functionality &lt;/b&gt;-Cookies and other tracking tools are used to help TTL analyze, manage and improve websites and storing 			customer preferences. &lt;b&gt;Advertising &lt;/b&gt;TTL and its advertising partners, including Yahoo! and other advertising networks, use anonymous 			information gathered through cookies and other similar technologies, as well as other information TTL or its advertising networks may have, to help 			tailor the ads a customer sees on its sites.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn128"&gt;
&lt;p&gt;&lt;a href="#_ftnref128" name="_ftn128"&gt;[128]&lt;/a&gt; . TTL collects some Information on an anonymous basis. TTL also may anonymize the Personal Information it collects about customers. It may obtain 			aggregate data by combining anonymous data that meet certain criteria into groups.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn129"&gt;
&lt;p&gt;&lt;a href="#_ftnref129" name="_ftn129"&gt;[129]&lt;/a&gt; . In Other Circumstances: TTL may provide Personal Information to non-TTL companies or other third parties for purposes such as: To assist with 			identity verification, and to prevent fraud and identity theft; Enforcing its agreements and property rights; Obtaining payment for products and 			services that appear on customers' TTL billing statements, including the transfer or sale of delinquent accounts to third parties for collection; 			and to comply to legal and regulatory requirements. TTL shares customer Personal Information only with non-TTL companies that perform services on 			its behalf, and only as necessary for them to perform those services. TTL requires those non-TTL companies to protect any Personal Information they 			may receive in a manner consistent with this policy. TTL does not provide Personal Information to non-TTL companies for the marketing of their own 			products and services without a customer's consent. TTL may share aggregate or anonymous Information in various formats with trusted non-TTL 			entities, and may work with those entities to do research and provide products and services.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn130"&gt;
&lt;p&gt;&lt;a href="#_ftnref130" name="_ftn130"&gt;[130]&lt;/a&gt; . TTL provides Personal Information to non-TTL companies or other third parties (for example, to government agencies, credit bureaus and collection 			agencies) without consent for certain purposes, such as: To comply with court orders, subpoenas, lawful discovery requests and other legal or 			regulatory requirements, and to enforce our legal rights or defend against legal claims, To obtain payment for products and services that appear on 			customer TTL billing statements, including the transfer or sale of delinquent accounts to third parties for collection; To enforce its agreements, 			and protect our rights or property; To assist with identity verification, and to prevent fraud and identity theft; To prevent unlawful use of TTL's 			services and to assist in repairing network outages; To provide information regarding the caller's location to a public safety entity when a call 			is made to police/investigation agencies, and to notify the public of wide-spread emergencies; To notify or respond to a responsible governmental 			entity if we reasonably believe that an emergency involving immediate danger of death or serious physical injury to any person requires or 			justifies disclosure without delay; To display name and telephone number on a Caller ID device;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn131"&gt;
&lt;p&gt;&lt;a href="#_ftnref131" name="_ftn131"&gt;[131]&lt;/a&gt; . Subject to applicable legal restrictions, such as those that exist for Customer Proprietary Network Information (CPNI), the TTL companies may 			share your Personal Information with each other to make sure your experience is as seamless as possible, and you have the benefit of what TTL has 			to offer.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn132"&gt;
&lt;p&gt;&lt;a href="#_ftnref132" name="_ftn132"&gt;[132]&lt;/a&gt; . Customers and Users should be aware that TTL affiliates and non-TTL companies that perform services on behalf of TTL may be located outside the 			country where customers access TTL's services. As a result, when customer Personal Information is shared with or processed by such entities, it may 			be accessible to government authorities according to the laws of those jurisdictions.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn133"&gt;
&lt;p&gt;&lt;a href="#_ftnref133" name="_ftn133"&gt;[133]&lt;/a&gt; . TTL has implemented appropriate security controls to protect Personal Information when stored or transmitted by TTL. It has established 			electronic and administrative safeguards designed to secure the information it collects, to prevent unauthorized access to or disclosure of that 			information and to ensure it is used appropriately. Some examples of those safeguards include: All TTL employees are subject to the internal Code 			of Business Conduct. The TTL Code requires all employees to follow the laws, rules, regulations, court and/or commission orders that apply to TTL's 			business such as legal requirements and company policies on the privacy of communications and the security and privacy of Customer records. 			Employees who fail to meet the standards embodied in the Code of Business Conduct are subject to disciplinary action, up to and including 			dismissal. TTL has implemented technology and security features and strict policy guidelines to safeguard the privacy of customer Personal 			Information. TTL has implemented encryption or other appropriate security controls to protect Personal Information when stored or transmitted by 			it; TTL limits access to Personal Information to those employees, contractors, and agents who need access to such information to operate, develop, 			or improve its services and products; TTL requires caller/online authentication before providing Account Information so that only the customer or 			someone who knows the customer's account Information will be able to access or change the information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn134"&gt;
&lt;p&gt;&lt;a href="#_ftnref134" name="_ftn134"&gt;[134]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf"&gt; http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn135"&gt;
&lt;p&gt;&lt;a href="#_ftnref135" name="_ftn135"&gt;[135]&lt;/a&gt; . See &amp;lt;&amp;lt; &lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker&lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn136"&gt;
&lt;p&gt;&lt;a href="#_ftnref136" name="_ftn136"&gt;[136]&lt;/a&gt; . "We have created this Privacy Policy to help you understand how we collect, use and protect your information when you visit our web and WAP sites 			and use our products and services."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn137"&gt;
&lt;p&gt;&lt;a href="#_ftnref137" name="_ftn137"&gt;[137]&lt;/a&gt; . Vodafone may hold information relating to customers that have been provided (such as on an application or registration form) or that it may has 			obtained from another source (such as its suppliers or from marketing organisations and credit agencies).&lt;/p&gt;
&lt;p&gt;This information may include, amongst other things, a customer's name, address, telephone numbers, information on how a customer uses Vodafone's 			products and services (such as the type, date, time, location and duration of calls or messages, the numbers called and how much a customer spends, 			and information on his/her browsing activity when visiting one of Vodafone's group companies' websites), the location of a customer's mobile phone 			from time to time, lifestyle information and any other information collected in relation to his/her use of Vodafone's products and services 			("information").&lt;/p&gt;
&lt;p&gt;It may use cookies and other interactive techniques such as web beacons to collect non-personal information about how a customer interacts with its 			website, and web-related products and services.&lt;/p&gt;
&lt;p&gt;It may use a persistent cookie to record details such as a unique user identity and general registration details on your PC. Vodafone states that 			most browser technology (such as Internet Explorer, Netscape etc) allows one to choose whether to accept cookies or not - a customer can either 			refuse all cookies or set their browser to alert them each time that a website tries to set a cookie.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn138"&gt;
&lt;p&gt;&lt;a href="#_ftnref138" name="_ftn138"&gt;[138]&lt;/a&gt; . In case of any concerns the privacy officer can be contacted at &lt;a href="mailto:privacyofficer@vodafone.com"&gt;privacyofficer@vodafone.com&lt;/a&gt;. 			Additionally details of the Grievance Redressal Officers is provided via the TRAI website. (TRAI website: 			&lt;a href="http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341567851124Vodafone_CC_AA-23072013.pdf"&gt; http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341567851124Vodafone_CC_AA-23072013.pdf &lt;/a&gt; _&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn139"&gt;
&lt;p&gt;&lt;a href="#_ftnref139" name="_ftn139"&gt;[139]&lt;/a&gt; . The information that Vodafone collects from customers is held in accordance with applicable laws and regulations in India. It may be used by us 			for a number of purposes connected with its business operations and functions, which include:&lt;/p&gt;
&lt;p&gt;2.1 Processing customer orders or applications;&lt;/p&gt;
&lt;p&gt;2.2 Carrying out credit checking and scoring (unless Vodafone have agreed otherwise);&lt;/p&gt;
&lt;p&gt;2.3 Providing the customer with products and/or services requested (including the presentation or elimination of calling or connected line 			identification) or administering his/her account;&lt;/p&gt;
&lt;p&gt;2.4 Billing&lt;/p&gt;
&lt;p&gt;2.5 Settling accounts with those who provide related services to Vodafone;&lt;/p&gt;
&lt;p&gt;2.6 Dealing with requests, enquiries or complaints and other customer care related activities; and all other general administrative and business 			purposes;&lt;/p&gt;
&lt;p&gt;2.7 Carrying out market and product analysis and marketing Vodafone and its group companies' products and services generally;&lt;/p&gt;
&lt;p&gt;2.8 Contacting a customer (including by post, email, fax, short text message (SMS), pager or telephone) about Vodafone and its group companies' 			products and services and the products and services of carefully selected third parties which it think may be of interest to customers (unless a 			customer asks us in writing not to). Electronic marketing messages may not include a marketing facility.&lt;/p&gt;
&lt;p&gt;2.9 Registering customer details and allocating or offering rewards, discounts or other benefits and fulfilling any requests that a customer may 			have in respect of our and our group companies' schemes.&lt;/p&gt;
&lt;p&gt;2.10 inclusion in any telephone or similar directory or directory enquiry service provided or operated by us or by a third party (subject to any 			objection or preference a customer may have indicated to us in writing);&lt;/p&gt;
&lt;p&gt;2.11 carrying out any activity in connection with a legal, governmental or regulatory requirement on Vodafone or in connection with legal 			proceedings, crime or fraud prevention, detection or prosecution;&lt;/p&gt;
&lt;p&gt;2.12 carrying out activities connected with the running of Vodafone's business such as personnel training, quality control, network monitoring, 			testing and maintenance of computer and other systems and in connection with the transfer of any part of Vodafone's business with respect to a 			customer or a potential customer.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn140"&gt;
&lt;p&gt;&lt;a href="#_ftnref140" name="_ftn140"&gt;[140]&lt;/a&gt; . In the need for disclosure to third parties, the personal information will only be disclosed to the third parties below:&lt;/p&gt;
&lt;p&gt;3.1 Vodafone's group companies who may in India use and disclose your information for the same purposes as us;&lt;/p&gt;
&lt;p&gt;3.2 those who provide to Vodafone or its group companies products or services that support the services that we provide, such as our dealers and 			suppliers;&lt;/p&gt;
&lt;p&gt;3.3 credit reference agencies (unless Vodafone has agreed otherwise) who may share your information with other organisations and who may keep a 			record of the searches Vodafone makes against a customer's name;&lt;/p&gt;
&lt;p&gt;3.4 if someone else pays a customer's bill, such as a customer's employer, that person;&lt;/p&gt;
&lt;p&gt;3.5 those providing telephone and similar directories or directory enquiry services&lt;/p&gt;
&lt;p&gt;3.6 anyone Vodafone transfers business to in respect of which a person is a customer or a potential customer;&lt;/p&gt;
&lt;p&gt;3.7 anyone who assists Vodafone in protecting the operation of the Vodafone India networks and systems, including the use of monitoring and 			detection in order to identify potential threats, such as hacking and virus dissemination and other security vulnerabilities;&lt;/p&gt;
&lt;p&gt;3.8 persons to whom Vodafone may be required to pass customer information by reason of legal, governmental or regulatory authority including law 			enforcement agencies and emergency services;&lt;/p&gt;
&lt;p&gt;3.9 any person or organisation as authorised by laws and regulations applicable in India.&lt;/p&gt;
&lt;p&gt;If a customer has opted in to receiving marketing material from Vodafone, it may also provide customer's personal information to carefully selected 			third parties who we reasonably believe provide products or services that may be of interest to customers and who have contracted with Vodafone 			India to keep the information confidential, or who are subject to obligations to protect your personal information.&lt;/p&gt;
&lt;p&gt;To opt-out of receiving Vodafone marketing materials,customers can send a 'Do Not Disturb' message to Vodafone. If a customer wishes to use 			Vodafone products or services abroad, his/her information may be transferred outside India to that country. Vodafone's websites and those of its 			group companies may also be based on servers located outside of India.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn141"&gt;
&lt;p&gt;&lt;a href="#_ftnref141" name="_ftn141"&gt;[141]&lt;/a&gt; . Vodafone takes reasonable steps to ensure that the personal information it collects, uses or discloses is accurate, complete, up-to-date and 			stored in a secure environment protected from unauthorized access, modification or disclosure.&lt;/p&gt;
&lt;p&gt;Vodafone makes every effort to maintain the security of our internet connections; however for reasons outside of our control, security risks may 			still arise. Any personal information transmitted to it or from its online products or services will be at a customer's own risk, however, it will 			use its best efforts to ensure that any such information remains secure. Vodafone cannot protect any information that a customer makes available to 			the general public - for example, on message boards or in chat rooms.&lt;/p&gt;
&lt;p&gt;Vodafone may use cookies and other interactive techniques such as web beacons to collect non-personal information about how a customer interacts.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn142"&gt;
&lt;p&gt;&lt;a href="#_ftnref142" name="_ftn142"&gt;[142]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.vodafone.com"&gt;http://www.vodafone.com&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn143"&gt;
&lt;p&gt;&lt;a href="#_ftnref143" name="_ftn143"&gt;[143]&lt;/a&gt; . See &amp;lt; 			&lt;a href="http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html"&gt; http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn144"&gt;
&lt;p&gt;&lt;a href="#_ftnref144" name="_ftn144"&gt;[144]&lt;/a&gt; . 			&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061"&gt; http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061 &lt;/a&gt; (Scope - This Privacy Policy has been created to help customer's understand how Aircel collects, uses and protects customer information when one 			visits its web and WAP sites and use its products and services.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn145"&gt;
&lt;p&gt;&lt;a href="#_ftnref145" name="_ftn145"&gt;[145]&lt;/a&gt; . This information may include, amongst other things, customer's name, father's name, mother's name, spouse's name, date of birth, address, 			telephone numbers, mobile phone number, email address, occupation and information contained in the documents used as proof of identity and proof of 			address. Aircel may also hold information related to utilization of its services. This may include customer call records, browsing history while 			surfing Aircel's website, location details and additional information provided by customer while using our services.&lt;/p&gt;
&lt;p&gt;Aircel may keep a log of the activities performed by a customer on its websites by using various internet techniques such as web cookies, web 			beacons, server log files, etc.&lt;/p&gt;
&lt;p&gt;Aircel may use cookies and other interactive techniques such as web beacons to collect non-personal information about how customers interact with 			Aircel's website, and web-related products and services&lt;/p&gt;
&lt;p&gt;Aircel may use a persistent cookie to record details such as a unique user identity and general registration details on customer's Personal 			Computers.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn146"&gt;
&lt;p&gt;&lt;a href="#_ftnref146" name="_ftn146"&gt;[146]&lt;/a&gt; . In case a customer does not provide information or consent for usage of personal information or later on withdraw consent for usage of the 			personal information so collected, Aircel reserves the right to discontinue the services for which the said information was sought.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn147"&gt;
&lt;p&gt;&lt;a href="#_ftnref147" name="_ftn147"&gt;[147]&lt;/a&gt; . In case of any feedback or concern regarding protection of personal information, customers can contact Aircel's &lt;b&gt;Circle Care ID.&lt;/b&gt; Alternatively, one may also direct your privacy-related feedback or concerns to the &lt;b&gt;Circle Nodal Officer.&lt;/b&gt; (e.g. - Delhi Circle 			Nodal details are as mentioned below):&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Name: Moushumi De&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; Contact Number: 9716199209&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; E-mail: &lt;/b&gt; &lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061"&gt; &lt;b&gt;nodalofficer.delhi@aircel.co.in&lt;/b&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Further it provides for a general customer grievance redressal mechanism&lt;/p&gt;
&lt;p&gt;Additionally details of the Grievance Redressal Officers is provided via the TRAI website.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; To resolve all concerns, Aircel has established a 2-tier complaint handling mechanism.&lt;/b&gt; &lt;b&gt;Level I: Our Customer Touch Points&lt;/b&gt; As an Aircel customer you have the convenience to contact at Customer Interface Points via email, post or telephone.			&lt;b&gt;Level II - Appellate Authority&lt;/b&gt;Despite the best efforts put by Aircel's executive, if a customer is still not satisfied with the 			resolution provided then he/she may submit his/her concern to the Appellate Authority of the circle. Comments - However this information 			contradicts the mechanism provided under Aircel's Manual of Practice for handling Consumer Complaints which provides for a 3&lt;b&gt;-&lt;/b&gt;tier 			complaint handling mechanism.&lt;/p&gt;
&lt;p&gt;[According to the DoT - The 			&lt;b&gt; earlier three-tier complaint redressal mechanism - Call center, Nodal Center and Appellate Authority, has been replaced by a two-tier &lt;/b&gt; one by doing away with the level of Nodal Officer. This is because the Complaint Centres are essentially registration and response centres and do 			not deal with the resolution of complaints. They only facilitate registration of consumer complaint and the level at which a problem is resolved 			within a company depends upon the complexity of the issue involved.]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn148"&gt;
&lt;p&gt;&lt;a href="#_ftnref148" name="_ftn148"&gt;[148]&lt;/a&gt; . It may be used by us for a number of purposes connected with our business operations and functions, which include:&lt;/p&gt;
&lt;p&gt;1. Processing customer orders or applications.&lt;/p&gt;
&lt;p&gt;2. Carrying out credit checking and scoring (unless agreed otherwise).&lt;/p&gt;
&lt;p&gt;3. Providing customers with products and/or services requested (including the presentation or elimination of calling or connected line 			identification) or administering a customer's account.&lt;/p&gt;
&lt;p&gt;4. Billing (unless there exists another agreed method).&lt;/p&gt;
&lt;p&gt;5. Settling accounts with those who provide related services to Aircel.&lt;/p&gt;
&lt;p&gt;6. Dealing with requests, enquiries or complaints and other customer care related activities; and all other general administrative and business 			purposes.&lt;/p&gt;
&lt;p&gt;7. Carrying out market and product analysis and marketing our and our group companies' products and services generally.&lt;/p&gt;
&lt;p&gt;8. Contacting customers (including by post, email, fax, short text message (SMS), pager or telephone) about Aircel and its group companies' 			products and services and the products and services of carefully selected third parties which it think may be of interest to a customer (unless a 			customer says 'no' in writing). Electronic messages need not have an unsubscribe facility.&lt;/p&gt;
&lt;p&gt;9. Registering customer details and allocating or offering rewards, discounts or other benefits and fulfilling any requests that customers may have 			in respect of Aircel and its group companies' loyalty or reward programmes and other similar schemes.&lt;/p&gt;
&lt;p&gt;10. Inclusion in any telephone or similar directory or directory enquiry service provided or operated by Aircel or by a third party (subject to any 			objection or preference a customer may have indicated in writing).&lt;/p&gt;
&lt;p&gt;11. Carrying out any activity in connection with a legal, governmental or regulatory requirement on Aircel or in connection with legal proceedings, 			crime or fraud prevention, detection or prosecution.&lt;/p&gt;
&lt;p&gt;12. Carrying out activities connected with the running of business such as personnel training, quality control, network monitoring, testing and 			maintenance of computer and other systems and in connection with the transfer of any part of Aircel's business with respect to a customer or 			potential customer. Aircel may use cookies and other interactive techniques such as web beacons to collect non-personal information about how 			customers interact with our website, and web-related products and services, to:&lt;/p&gt;
&lt;p&gt;● Understand what a customer likes and uses about Aircel's website.&lt;/p&gt;
&lt;p&gt;● Provide a more enjoyable, customised service and experience&lt;/p&gt;
&lt;p&gt;Aircel may use a persistent cookie to record details such as a unique user identity and general registration details on your Personal Computer.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn149"&gt;
&lt;p&gt;&lt;a href="#_ftnref149" name="_ftn149"&gt;[149]&lt;/a&gt; . Where Aircel needs to disclose your information to third parties, such third parties will be:&lt;/p&gt;
&lt;p&gt;1. Group companies who may use and disclose your information for the same purposes as us.&lt;/p&gt;
&lt;p&gt;2. Those who provide to Aircel or its group companies products or services that support the services that we provide, such as our dealers and 			suppliers.&lt;/p&gt;
&lt;p&gt;3. Credit reference agencies (unless we have agreed otherwise) who may share your information with other organisations and who may keep a record of 			the searches Aircel make against your name.&lt;/p&gt;
&lt;p&gt;4. If someone else pays a customer's bill, such as an employer.&lt;/p&gt;
&lt;p&gt;5. Those providing telephone and similar directories or directory enquiry services.&lt;/p&gt;
&lt;p&gt;6. Anyone Aircel transfers its business to in respect of which you are a customer or a potential customer.&lt;/p&gt;
&lt;p&gt;7. Anyone who assists Aircel in protecting the operation of the Aircel networks and systems, including the use of monitoring and detection in order 			to identify potential threats, such as hacking and virus dissemination and other security vulnerabilities.&lt;/p&gt;
&lt;p&gt;8. Persons to whom Aircel may be required to pass customer information by reason of legal, governmental or regulatory authority including law 			enforcement agencies and emergency services. If a customer has opted in to receiving marketing material from Aircel, it may also provide personal 			information to carefully selected third parties who it reasonably believes to provide products or services that may be of interest to customers and 			who have contracted with Aircel to keep the information confidential, or who are subject to obligations to protect customer personal information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn150"&gt;
&lt;p&gt;&lt;a href="#_ftnref150" name="_ftn150"&gt;[150]&lt;/a&gt; . We adopt reasonable security practices and procedures to include, technical, operational, managerial and physical security control measures in 			order to protect your personal information from unauthorized access, or disclosure while it is under our control.Our security practices and 			procedures limit access to personal information on need to know basis. Further, our employees, to the extent they may have limited access to your 			personal information on need to know basis, are bound by Code of Conduct and Confidentiality Policies which obligate them to protect the 			confidentiality of personal informationWe take adequate steps to ensure that our third parties adopt reasonable level of security practices and 			procedures to ensure security of personal information&lt;/p&gt;
&lt;p&gt;We may retain your personal information for as long as required to provide you with services or if otherwise required under any law. We, however 			assure you that Aircel does not disclose your personal information to unaffiliated third parties (parties outside Aircel corporate network and its 			Strategic and Business Partners) which could lead to invasion of your privacy&lt;/p&gt;
&lt;p&gt;When we dispose off your personal information, we use reasonable procedures to erase it or render it unreadable (for example, shredding documents 			and wiping electronic media).&lt;/p&gt;
&lt;p&gt;We will take reasonable steps to ensure that the personal information we collect, use or disclose is accurate, complete, up-to-date and stored in a 			secure environment protected from unauthorised access, modification or disclosure. We use a variety of security technologies and procedures to help 			protect your personal information from unauthorized access, use, or disclosure. For example, we store the personal information you provide on 			computer systems with limited access, which are located in controlled facilities. When we transmit highly confidential information (such as a 			credit card number or password) over the Internet, we protect it through the use of encryption, such as the Secure Socket Layer (SSL) protocol. If 			a password is used to help protect your accounts and personal information, it is your responsibility to keep your password confidential. Do not 			share this information with anyone. If you are sharing a computer with anyone you should always log out before leaving a site or service to protect 			access to your information from subsequent users.&lt;/p&gt;
&lt;p&gt;We make every effort to maintain the security of our internet connections; however for reasons outside of our control, security risks may still 			arise. Any personal information transmitted to us or from our online products or services will therefore be your own risk, however we will use our 			best efforts to ensure that any such information remains secure.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn151"&gt;
&lt;p&gt;&lt;a href="#_ftnref151" name="_ftn151"&gt;[151]&lt;/a&gt; . http://www.acttv.in/index.php/privacy-policy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn152"&gt;
&lt;p&gt;&lt;a href="#_ftnref152" name="_ftn152"&gt;[152]&lt;/a&gt; . "When you register, we ask for information such as your name, email address, birth date, gender, zip code, occupation, industry, and personal 			interests.&lt;/p&gt;
&lt;p&gt;The Company collects information about your transactions with us and with some of our business partners, including information about your use of 			products and services that we offer."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn153"&gt;
&lt;p&gt;&lt;a href="#_ftnref153" name="_ftn153"&gt;[153]&lt;/a&gt; . Not provided for on the TRAI website as ACT is not a telecom.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn154"&gt;
&lt;p&gt;&lt;a href="#_ftnref154" name="_ftn154"&gt;[154]&lt;/a&gt; . The Company can use information for the following general purposes: to customize the advertising and content you see, fulfill your requests for 			products and services, improve our services, contact you, conduct research, and provide anonymous reporting for internal and external clients.&lt;/p&gt;
&lt;p&gt;The Company collects personal information when you register with the Company, when you use the Company products or services, when you visit the 			Company pages or the pages of certain partners of the Company. The Company may combine information about you that we have, with information we 			obtain from business partners or other companies. The Company shall have the right to pass on the same to its business associates, franchisees 			without referring the same to you.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn155"&gt;
&lt;p&gt;&lt;a href="#_ftnref155" name="_ftn155"&gt;[155]&lt;/a&gt; . Aircel provide the information to trusted partners who work on behalf of or with the Company under confidentiality agreements. These companies 			may use customer personal information to help the Company communicate about offers from the Company and marketing partners.&lt;/p&gt;
&lt;p&gt;Aircel believe it is necessary to share information in order to investigate, prevent, or take action regarding illegal activities, suspected fraud, 			situations involving potential threats to the physical safety of any person, violations of the Company's terms of use, or as otherwise required by 			law.&lt;/p&gt;
&lt;p&gt;Aircel transfer information about a customer if the Company is acquired by or merged with another company under a different management. In this 			event, the Company will notify a customer before information about a customer is transferred and becomes subject to a different privacy policy.&lt;/p&gt;
&lt;p&gt;The Company plans to display targeted advertisements based on personal information. Advertisers (including ad serving companies) may assume that 			people who interact with, view, or click on targeted ads meet the targeting criteria - for example, women ages 18-24 from a particular geographic 			area.&lt;/p&gt;
&lt;p&gt;The Company will not provide any personal information to the advertiser when customers interact with or view a targeted ad. However, by interacting 			with or viewing an ad a customer consents to the possibility that the advertiser will make the assumption that he/she meets the targeting criteria 			used to display the ad.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn156"&gt;
&lt;p&gt;&lt;a href="#_ftnref156" name="_ftn156"&gt;[156]&lt;/a&gt; . Rule 8.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules'&gt;https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-01-13T02:37:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/street-view-of-private-and-public">
    <title>A Street View of Private and the Public</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/street-view-of-private-and-public</link>
    <description>
        &lt;b&gt;Prashant Iyengar on how in the eyes of the law, the internet giant is like the homeless in India. This article was published by Tehelka on June 4, 2011.&lt;/b&gt;
        
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Since last Thursday, Internet-search giant Google has been busy 
collecting images of roads in Bengaluru in order to launch its popular 
StreetView service for the city. It is a feature that allows users of 
Google Maps to virtually navigate and explore cities through a 
360-degree, street-level imagery. To achieve this, Google drives 
vehicles with cameras mounted on them through each street and 
neighbourhood in a city, systematically capturing everything in their 
path, including buildings, roads, traffic, animals and human subjects.&lt;/p&gt;
&lt;p&gt;Intrinsically, the idea is exciting for its ability to enable distant 
users to sample street life in cities and neighbourhoods that they may 
have never physically visited. Or, even for the exhilaration it permits 
of viewing familiar spaces virtually.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/bottom.jpg/image_preview" alt="Bottom" class="image-inline" title="Bottom" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;However, this technology has also raised interesting privacy concerns in countries where it has previously been launched. In April 2008, shortly after the service was first launched in the US, Google was sued by a couple who objected to the pictures of their home being publicly displayed. This suit was settled out-of-court two years later. Google had, meanwhile, made changes to their service, permitting users to "opt out" of the service, rendering similar suits unnecessary. Google has faced similar concerns in other jurisdictions, including Europe and Japan, and has successfully fended them off by adapting its service by voluntarily blurring faces of all individuals captured during the process and vesting more agency in the hands of users to take down information that offends them.&lt;/p&gt;
&lt;p&gt;Putting aside the privacy debate over StreetView in other jurisdictions momentarily, I want to raise two questions about India and the Indian law in the context of StreetView: first, does Indian privacy law – that evanescent sub-topic of tort and constitutional law – contain anything useful or even informative which we can bring to bear on this discussion? And, do the specificities of the Indian street life merit a different approach to the privacy question?&lt;/p&gt;
&lt;p&gt;On the first question, the legal right to privacy in India has been, for the most part, a child of the higher judiciary. However, despite a fairly substantial volume of case law that has accumulated by now that references "privacy", one cannot suppress a sense that the concept lacks, even today, a definitive articulation. The individual’s privacy in India today is an uneven concept – stronger in some situations and non-existent in others. It is a contingent, rather tame concept of a general right to privacy that we have, from which it is not possible to mount a confident attack against Google.&lt;/p&gt;
&lt;p&gt;Given this state of indeterminacy about one’s right to privacy, a case for the extension of this right in public spaces seems even more far-fetched. Indeed, in specific cases, courts have dealt damaging blows to the emergence of such a concept. For instance, in a tort case from colonial times, it was held that a window overlooking a public street would not infringe the privacy of the neighbours across the street. Likewise, in a case involving sex workers, the Supreme Court held that they were not entitled to move freely in a public place due to the very subversive nature of the professions they practiced in private – signalling that the private seeps into the public only as a limiting or negative concept.&lt;/p&gt;
&lt;p&gt;Against this context Google’s extension of its opt-out privacy principles to India is commendable, because they are not warranted by the current state of law in the country. Indeed, it may even result in a "wagging the dog" of privacy jurisprudence in India by seeding the notion of a limited "right to public anonymity", which is currently indeterminate in the Indian law. That individuals have no “legitimate expectation of privacy in a public place” is axiomatic in most other common-law jurisdictions and is one of the hidden legal ballasts that supports Google’s StreetView service. However, there has not yet been an occasion for the Supreme Court to pronounce on this question. It is very likely that the court will defer to international precedent on the matter. However, until this eventuality, the legal position on the question must be regarded as unsettled.&lt;/p&gt;
&lt;p&gt;Turning briefly to the second question regarding the specificities of the Indian situation, India is home to one of the largest populations of urban homeless persons. To them the street, generally, and pavements and bridges, more specifically, are "home" regardless of their tenuous legal title to these claims. To casually dismiss their claims is to crudely conflate privacy with property, which is insensitive to the tragedies of urban life in India. In his insightful essay on filth and the public sphere, Sudipta Kaviraj makes the fascinating point that "for the poor, homeless and other destitute people" of India, "public means not-private spaces, from which they could not be excluded by somebody’s right to property.&lt;/p&gt;
&lt;p&gt;It comprises assets which are owned by some general institution like the government or city municipality which does not exercise fierce vigilance over its properties as individual owners do, and which allows through default, indifference and a strangely lazy generosity, its owned things to be despoiled by those with out other means. Public space is a matter not of collective pride but of desperate uses that can range from free riding to vandalizing.&lt;/p&gt;
&lt;p&gt;I would add here that this notion of public space is shared not just by the homeless but Google as well, which has taken advantage of the lazy generosity of the Bengaluru traffic police to appropriate images of the city for its purposes. Like the homeless, Google is willing to cede to competing private interests, if they are asserted strongly enough. (This makes Google StreetView, despite its origins in Mountain View in California, characteristically Indian!) In the past, Google has required users to submit documentary proof of their titles before their claims to opt out are honoured. In the context of the homeless particularly, honouring privacy in India may require a different approach. Fortunately for Google, the homeless are not likely to fiercely assert this right.&lt;/p&gt;
&lt;p&gt;To conclude, I will like to clarify that I write to praise Google not to bury him, since Google is an honourable man. Over the past several decades, technology – from wire tapping to DNA tests to paternity tests – has been the site and discursive nucleus that has facilitated an efflorosence of privacy jurisprudence in the country. Two decades ago we did not have Facebook, Google, unsolicited calls and spam, and, correspondingly, neither did we have a sharp notion of our privacy. One awaits with optimism the kinds of changes in privacy jurisprudence that might emerge from StreetView.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Prashant Iyengar is a lawyer and consultant on privacy issues with the Centre for Internet and Society, Bengaluru.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;He can be contacted at prashantiyengar@gmail.com.&lt;/p&gt;
&lt;p&gt;Read the original published in Tehelka &lt;a class="external-link" href="http://www.tehelka.com/story_main49.asp?filename=Ws040611PRIVACY.asp#"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/street-view-of-private-and-public'&gt;https://cis-india.org/internet-governance/blog/privacy/street-view-of-private-and-public&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-21T09:34:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection">
    <title>A Series of Op-eds on Data Protection</title>
    <link>https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection</link>
    <description>
        &lt;b&gt;I wrote a short series of three op-eds for Asia Times this week.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The first article "&lt;a class="external-link" href="http://www.atimes.com/user-consent-key-data-protection-india/"&gt;User consent is the key to data protection in India&lt;/a&gt;" examines the debate around consent and the arguments made to discard it. I question the premise of big data exceptionalism, particularly in the absence of any mature governance models which address use regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the second article "Robust economic argument for a sound Indian data protection law", I examine the substance of the argument of 'innovation' as a legitimate competing interest with respect to privacy, and questionthe economic arguments made in support of innovation enabled by unregulated access to data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the third article "&lt;a class="external-link" href="http://www.atimes.com/indias-data-protection-needs-graded-enforcement-mechanism/"&gt;India’s data protection law needs graded enforcement mechanism&lt;/a&gt;", I look at the two competing arms of regulation - enforcement and compliance, and how a balance of two is need in India,with an empowered regulator and drawing from the principles from responsive regulation theory.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection'&gt;https://cis-india.org/internet-governance/blog/a-series-of-op-eds-on-data-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-02-19T02:08:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gender-it-february-19-2015-selection-tweets-how-make-crowdmaps-effectual-mapping-violence-against-women">
    <title>A Selection of Tweets on How to Make Crowdmaps Effectual for Mapping Violence against Women</title>
    <link>https://cis-india.org/internet-governance/blog/gender-it-february-19-2015-selection-tweets-how-make-crowdmaps-effectual-mapping-violence-against-women</link>
    <description>
        &lt;b&gt;This is a collection of tweets by Rohini Lakshane on making crowdmaps more effective for mapping gender violence. The compilation of tweets has been republished by GenderIT.org.&lt;/b&gt;
        &lt;div class="storify"&gt;&lt;iframe class="s-header-ext s-header-iframe_rohinil-rohini-s-week-pinthecreep" frameborder="no" id="header-54dc4dbcfefa03f5059dcdb7" scrolling="no" width="100%"&gt;&lt;/iframe&gt;&lt;iframe frameborder="no" height="750" scrolling="no" src="http://storify.com/rohinil/rohini-s-week-pinthecreep/embed?border=false" width="100%"&gt;&lt;/iframe&gt;&lt;/div&gt;

&lt;div id="footer"&gt;
&lt;div class="section clearfix"&gt;
&lt;div id="clearme"&gt;&lt;/div&gt;
 &lt;/div&gt;
  &lt;/div&gt;
&lt;div id="_mcePaste"&gt;&lt;a class="u-url profile" href="https://twitter.com/pinthecreep"&gt;&lt;span class="full-name"&gt;&lt;span class="p-name customisable-highlight"&gt; &lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
&lt;div class="content e-entry-content"&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;br /&gt;For more see the &lt;a class="external-link" href="http://www.genderit.org/feminist-talk/selection-tweets-how-make-crowdmaps-effectual-mapping-violence-against-women"&gt;original published on the website of Gender IT.org&lt;/a&gt; on February 19, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gender-it-february-19-2015-selection-tweets-how-make-crowdmaps-effectual-mapping-violence-against-women'&gt;https://cis-india.org/internet-governance/blog/gender-it-february-19-2015-selection-tweets-how-make-crowdmaps-effectual-mapping-violence-against-women&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rohini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-03-12T00:42:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
