<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2881 to 2895.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/a-methods-workshop-for-researching-future-of-work-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/outlook-february-8-2016-arindam-mukherjee-a-megacorps-basic-instinct"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-april-3-2016-nishant-shah-a-large-byte-of-your-life"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-august-27-2019-a-judicial-overreach-into-matters-of-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/shweta-reddy-september-17-2021-a-guide-to-drafting-privacy-policy-under-personal-data-protection-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dna-dissent"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/a-dialogue-on-zero-rating-and-network-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/torsha-sarkar-november-30-2019-a-deep-dive-into-content-takedown-timeframes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-september-9-2013-zia-haq-a-dangerous-trend"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/compilation-of-research-on-data-protection"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/events/a-methods-workshop-for-researching-future-of-work-in-india">
    <title>A Methods Workshop for Researching Future of Work in India</title>
    <link>https://cis-india.org/internet-governance/events/a-methods-workshop-for-researching-future-of-work-in-india</link>
    <description>
        &lt;b&gt;Centre for Internet &amp; Society and the Department of Management Studies, Indian Institute of Technology (IIT) Delhi is conducting a workshop in New Delhi on March 28, 2018.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Read the event report in pdf format &lt;a href="https://cis-india.org/internet-governance/pdf-methods-workshop-fow" class="internal-link" title="PDF Methods Workshop FOW"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Industry 4.0 is widely understood as the technical integration of cyber physical systems into production and logistics, and the use of IoTs and services in processes, which are designed to bring about significant changes in business models, downstream services and work organisations.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Labour markets are complex and are impacted by wide variety of contextual factors such as policy, informal sectors, and immigration. Technological adoption is increasingly a key factor impacting labour markets. The impact and effect of technological adoption is also complex.Questions such as whether the technology is augmenting the job, automating the job/parts of the job, digitizing the job/part of the job, and if this is resulting in unemployment or a change and re-shuffling in tasks arise. In a similar vein, as pointed out in a 2017 McKinsey Report on labour markets in India, declining labourparticipation also does not necessarily equate to unemployment and could mean instead more people are staying in education etc. International studies have concluded that jobs in developing countries will be more at risk than those in developed countries because of a larger workforce employed in routine jobs, yetit is unclear if these studies have fully accounted for context and local labour market structures.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;With the goal of exploring research questions and methodologies and facilitating the exchange of ideas, prior to commencing research, CIS in collaboration withthe Department of Management at IITD, will organise a roundtable on the 28th of March 2018 from 10am - 4pm at Committee room, 4th floor, Vishwakarma Bhawan,Dept of Management Studies, IIT Delhi . The event will bring experts and relevant stakeholders together to discuss research questions, methodologies, and sources of data necessary for researching the impact of automation on labour markets in developing countries.&lt;/p&gt;
&lt;h3&gt;Questions&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;div id="_mcePaste"&gt;
&lt;ul&gt;
&lt;li&gt;What are the kinds of quantitative and qualitative changes in employment in response to technological adoption that need to be studied? What methods are needed to study these? What data is needed to study these?&lt;/li&gt;
&lt;li&gt;What are the policy processes that are most critical for the research to speak to? Will it be focussed on education? Re-skilling? Market control?&lt;/li&gt;
&lt;li&gt;Who are the key stakeholders needed to engage with to undertake this research with respect to the quantitative, qualitative, and policy oriented research.&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h3&gt;Agenda (Tentative)&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;10:00 a.m. Welcome and Tea&lt;/li&gt;
&lt;li&gt;10:30 a.m. to 11:30 a.m.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Session 1: Exploring Research Questions for the Study of Future of Work&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;11:30 a.m. to 12:30 p.m.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Session 2: Primary Data and the Future of Work: Challenges and Prospects&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;12:30 p.m. to 1:30 p.m.Lunch&lt;/li&gt;
&lt;li&gt;1:30 p.m. to 2:30 p.m.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Session 3: Research Methodologies for the Future of Work&lt;/p&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;2:30 p.m. to 3:30 p.m.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Session 4: Identifying Stakeholders for the studying Future of Work&lt;/p&gt;
&lt;ul&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;3:30 p.m. to 4:00 p.m. Evening High Tea&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/a-methods-workshop-for-researching-future-of-work-in-india'&gt;https://cis-india.org/internet-governance/events/a-methods-workshop-for-researching-future-of-work-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-03-05T18:59:11Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/outlook-february-8-2016-arindam-mukherjee-a-megacorps-basic-instinct">
    <title>A Megacorp’s Basic Instinct </title>
    <link>https://cis-india.org/internet-governance/news/outlook-february-8-2016-arindam-mukherjee-a-megacorps-basic-instinct</link>
    <description>
        &lt;b&gt;Bolstered by academia and civil society, TRAI stands its ground against FB’s Free Basics publicity blitz.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arindam Mukherjee was &lt;a class="external-link" href="http://www.outlookindia.com/article/a-megacorps-basic-instinct/296510"&gt;published in Outlook&lt;/a&gt; on February 8, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Hours before the January 31 deadline for telecom regulator TRAI to give its opinion on Facebook’s controversial and expensive Free Basics pitch—which seeks to give India’s poor “free” access to certain partner websites—the consensus seems to be building up against the soc­ial media giant. “If there is cannibalising of the internet through services like Free Basics, the internet will be split; it will parcel out and slice the internet. Its future is at stake,” says a senior government official on condition of anonymity.&lt;br /&gt;&lt;br /&gt;In a climate where the tech-savvy Modi government is seen to be close to the online trinity of Facebook, Google and Twitter, TRAI’s defiant stance in favour of net neut­rality stands out. There’s a lot at stake. India’s position becomes crucial as few countries in the world have clearly defined laws on net neutrality or have taken a stand on it. For Facebook, there’s a lot more at stake. India is its second-largest user base after the US (it is banned in China), so it is leaving no stone unturned. The massive Rs 300-crore electronic and print media campaign is an indication of that.&lt;br /&gt;&lt;br /&gt;TRAI sources say they are ready for any adverse onslaught and they are under no pressure from the PMO. The view gaining ground in government is that FB is trying to create a walled garden where it controls what people see and surf and what they can access online. While this will be offered to consumers for free—the technical term is differential pricing—the websites part of Free Basics will have to pay for being on the platform. Outlook’s queries to FB remained unanswered at the time of going to press.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At an ‘open house’ meeting to discuss TRAI’s consultation paper on  differential pricing last week, regulator Ram Sevak Sharma stood firm  against the barrage of pro-Free Basics opinions that flowed from FB,  telecom operators and some members of the public. TRAI’s message was  clear: FB’s tactics of moulding public opinion by stealth will not be  acceptable in India. In the past few weeks, there have been bitter  exchan­ges between TRAI and FB over the latter’s responses to a  consultation paper on differential pricing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TRAI’s defiant stand draws from an unp­recedented show of strength by civil society against Free Basics and FB’s intentions. Says former Aadhar man Nandan Nilekani, “Free Basics is certainly against net neutrality. How can a solution be neutral, if it disproportionately benefits a particular web­site or business on the internet? Today, 400 million Indians are online. They came online because of the inherent value the internet offers. How can a walled garden of 100-odd websites provide the same value?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What does Free Basics mean for PM Modi’s Digital India campa­ign? Being a walled garden, thousands of start-ups with­out adequate budgets to pay for such dedicated service will be forced to stay out of it. Similar questions are being raised about government services that are increa­singly coming online. The concern is that all government traffic will have to pass through FB servers. The senior government official quoted above agrees, “In such a scenario, the government will have to approach FB to make its websites accessible on the free service which is neither desirable nor safe.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other fear is what happens to public data if it goes through a service like Free Basics. There is fear that a lot of government and public data will be put through Free Basics once government services start coming online. If Free Basics is for the poor who are also beneficiaries of government services, FB too can access this data. Says Prabir Purkayastha, chairman, Knowledge Commons, “FB says public service will be available through Free Bas­ics but can public service be given through a private initiative? Public data is valuable and can’t be handed over to a private company.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Few again are convinced by FB’s claim that Free Basics aims to make the internet accessible to the poor, with the many services offered through it. “The claim that the poor will get access to the internet is false,” warns Sunil Abraham, executive director, Centre for Internet and Society, Bangalore. “Free Basics gives access to less than 100 of the one billion plus websites on the world wide web. Those in the walled garden will be treated quite differently.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What gives TRAI a shot in the arm is that, for the first time, academia has put its weight behind Free Basics opponents. In a signed statement, several IIT and IISc Bangalore professors have said that Free Basics won’t serve the purpose FB is proposing and is not good for the country. “The problem is the inter­net being provided (via Free Basics) is a shrunken and sanitised version of the real thing. Free Basics is not a good proposal for the long-term development of a healthy and democratic internet setup in India,” says Amitabha Bagchi, IIT Delhi professor and one of the signatories to the memo.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of course, many of the experts &lt;i&gt;Outlook&lt;/i&gt; spoke to say that the  government, and not FB, should be responsible for providing free  internet to the people. Says Parminder Jeet Singh, executive director,  IT for Cha­nge, “The government is sitting on Rs 40,000 crore of USO  funds. It can surely utilise that to provide a free basic data package  to people in India. Basic government services and emergency services  should essentially be free.” Nilekani is also in fav­our of the  gover­nment providing free internet to people. “The internet is a  powerful poverty alleviation tool.... Government can do a direct benefit  transfer for data, a more mar­ket-neutral way of achieving the goal of  getting everyone on the internet,” he told &lt;i&gt;Outlook&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legally, though, there may be issues in stopping FB from introducing its Free Bas­ics platform in India. Says Singh, “Techni­cally, the Indian government may not be able to stop FB from introducing Free Basics in India as it is just a platform. What the government has to do is to stop telcos from collaborating with it for free internet because Indian telcos, not FB, mediate access to the internet.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The demand for the government and TRAI to come clean on net neutrality has reached fever pitch. Experts like Nilekani feel that net neutrality, which does not allow zero rating and differential pricing based on telcos looking at the contents of the subscriber’s data packets, should be enshrined in law through an act of Par­liament, the way countries like the US have done. TRAI has also proposed two models where the internet is provided free initially and charged at a later stage and another where content providers and websites reim­burse the cost of browsing directly to consumers. Both these proposals have not found favour with experts who say that these are unworkable and only the government should disburse free internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In any case, all this is a matter of detail—important, no doubt. The key question is, what happens to Free Basics if TRAI rules in favour of net neutrality and goes against FB? “This is going to be a long-drawn-out battle as FB will certainly challenge this in court,” says the government official. After spending Rs 300 crore on publicity, there is no way it will roll over and die.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/outlook-february-8-2016-arindam-mukherjee-a-megacorps-basic-instinct'&gt;https://cis-india.org/internet-governance/news/outlook-february-8-2016-arindam-mukherjee-a-megacorps-basic-instinct&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Free Basics</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-02-04T13:53:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill">
    <title>A look at two problematic provisions of the draft Anti-trafficking bill</title>
    <link>https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill</link>
    <description>
        &lt;b&gt;This post examines two badly drafted provisions of the new Anti-Trafficking bill that have the potential to severely impinge upon the Freedom of Expression, including through a misunderstanding of intermediary liability. &lt;/b&gt;
        
&lt;p style="text-align: justify;" class="normal"&gt;On 28 Feb 2018, the Union Cabinet approved                   ‘The Trafficking of Persons (Prevention, Protection                   and Rehabilitation) Bill, 2018’ (‘the bill’) for                   introduction to the Parliament. This comes after a                   series of consultations on an earlier 2016 draft bill,                   that had faced its fair share of &lt;a href="https://scroll.in/article/813268/six-counts-on-which-the-draft-anti-trafficking-bill-fails-short" target="_blank"&gt;criticism&lt;/a&gt;. As per the Press Information Bureau &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=176878" target="_blank"&gt;announcement&lt;/a&gt;, the Ministry of Women and Child                   Development met with various stakeholders including 60                   NGOs and have incorporated many of the suggestions put                   forth. They’ve also stated that ‘the new law will make                   India a leader among South Asian countries to combat                   trafficking.’&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;However, at first glance, there appear to be                   several issues with overbroad or vague language used                   in the drafting of the bill, that stretch it into                   potentially problematic areas. This current post will                   focus on two such provisions that could lead to a                   deleterious effect on the Freedom of Expression. As                   the bill is currently not publicly available, a                   stakeholder’s copy of the draft is being used to                   source these provisions. The relevant sections have                   been reproduced below for convenience. (Emphasis in                   bold is as provided by the author).&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;Section                     39: Buying or Selling of any person&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;39. (l) Whoever buys or sells any person                     for a consideration, shall be punished with rigorous                     imprisonment for a term which shall not be less than                     seven years but may extend to ten years, and shall                     also be liable to fine which shall not be less than                     one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;(2) Whoever solicits or publicises                     electronically, taking or distributing obscene                     photographs or videos or providing materials or                     soliciting or guiding tourists or using agents or                     any other form &lt;strong&gt;which may lead                       to the trafficking of a person shall be punished&lt;/strong&gt; with rigorous imprisonment for a term which shall                     not be less than five years but may extend to ten                     years, and shall also be liable to fine which shall                     not be less than fifty thousand rupees but which may                     extend to one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The grammatical acrobatics of section 39(2)                   aside, this anti-solicitation provision is severely                   problematic in that it mandates punishment even for a                   vaguely defined action or actions that may not                   actually be connected to the trafficking of a person.                   In other words, the provision doesn’t require any of                   the actions to be connected to trafficking in their                   intent or even outcome, but only in &lt;em&gt;potential&lt;/em&gt; &lt;em&gt;connection&lt;/em&gt; to the outcome. At the same time, it says these                   ‘shall’ be punished!&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;This vagary that ignores actual or even                   probabilistic causation flies in the face of standard                   criminal law which requires &lt;em&gt;mens rea&lt;/em&gt; along with &lt;em&gt;actus                     rea&lt;/em&gt;. The excessively wide scope of this badly                   drafted provision leaves it prone to abuse. For                   example, currently the provision allows the following                   interpretation to be included: ‘Whoever publicizes                   electronically, by providing materials in any form,                   which may lead to trafficking of a person shall be                   punished…’. Even the electronic publicizing of an                   academic study on trafficking could fall under the                   provision as it currently reads, if it is argued that                   publishing studies that show the prevalence of                   trafficking ‘may lead to the trafficking of a person’!                   It is not hard to imagine that an academic study that                   shows trafficking numbers at embarrassingly high rates                   could be threatened with this provision. Similarly,                   any of our vast number of self-appointed moral                   guardians could also pull within this provision any                   artistic work that they may personally find offensive                   or ‘obscene’. Simply put, without any burden of                   showing a causal connect, it could be argued that &lt;em&gt;anything&lt;/em&gt; ‘may                   lead’ to the trafficking of a person. Needless to say,                   this paves the way for a severe chilling effect on                   free speech, especially on critical speech around                   trafficking issues.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;Section 41: Offences related to media&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;41. (l) Whoever commits trafficking of a                     person with the aid of media, including, but not                     limited to print, internet, digital or electronic                     media, shall be punished with rigorous imprisonment                     for a term which shall not be less than seven years                     but may extend to ten years and shall also be liable                     to fine which shall not be less than one lakh                     rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;&lt;em&gt;(2) Whoever &lt;strong&gt;distributes,                       or sells or stores&lt;/strong&gt;, in any form in any                     electronic or printed form showing incidence of                     sexual exploitation, sexual assault, or rape for the                     purpose of exploitation or for coercion of the                     victim or his family members, or for unlawful gain &lt;strong&gt;shall be                       punished&lt;/strong&gt; with rigorous imprisonment for a term                     which shall not be less than three years but may                     extend to seven years and shall also be liable to                     fine which shall not be less than one lakh rupees.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The drafters of this bill have perhaps                   overlooked the fact that unlike the physical world,                   the infrastructure of the electronic / digital world                   requires 3rd party intermediaries to handle                   information during most forms of electronic                   activities, whether it is transmission, storage or                   display. As it is not feasible, desirable or even                   practically possible for intermediaries to verify the                   legality of every bit of data that gets transferred or                   stored by the intermediary, ‘safe harbours’ are                   provided in law for intermediaries, protecting them                   from liability of the information being transmitted                   through them. These ensure that entities that act as                   architectural requirements and intermediary platforms                   are able to operate smoothly and without fear. If                   intermediaries are not granted this protection, it                   puts them in the unenviable position of having to                   monitor un-monitorable amounts of data, and face legal                   action for the slip-ups that are bound to happen                   regularly. Furthermore, there are several levels of                   free speech and privacy issues associated with having                   multiple gatekeepers on the expression of speech                   online. A charitable reading of the intent of a                   provision which does not recognise safe harbours for                   3rd party intermediaries, would be that the drafters                   of the bill have simply not realised that users who                   upload and initiate transfer of information online,                   are not the same parties who do the actual                   transmission of the information.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Distribution, selling or storing of                   information online would require the transmission of                   information over intermediaries, as well as the                   temporary storage of such information on intermediary                   platforms. In India, intermediaries engaging with                   transmission or temporary storage of information are                   provided safe harbour&lt;a href="imap://prasad@mail.cis-india.org:143/fetch%3EUID%3E/INBOX%3E176833#_ftn1"&gt;[1]&lt;/a&gt; by Section 79 of the Information Technology Act, 2000                   (‘IT Act’), so long as they:&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;(i) act as a mere ‘conduit’ and do not                   initiate the transmission, select the receiver of the                   transmission, or select or modify the information                   contained in the transmission.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;(ii) exercise due diligence while                   discharging duties under this Act, and observes other                   guidelines that the Central Government may prescribe.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;The Information Technology (Intermediary                   Guidelines) Rules, 2011, list out the nature of the                   due diligence to be followed by intermediaries to                   claim exemption under Section 79 of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Intermediaries will not be granted safe                   harbour if they have conspired, abetted, aided or                   induced commission of the unlawful act, or if they do                   not remove or disable access to information upon                   receiving actual knowledge, or notice from the                   Government, of the information that is transmitted or                   stored by the intermediary being used for unlawful                   purposes.&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;Thus it can be seen that the IT Act already                   provides an in-depth regime for intermediary                   liability, and given its &lt;em&gt;non-obstante &lt;/em&gt;clause                   which states that Section 79 of the IT Act would apply                   “Notwithstanding anything contained in any law for the                   time being in force” ,&amp;nbsp;                   as well as the reiteration of the IT Act’s                   overriding effect via Section 81, which states that                   the provisions of the Act ‘shall have effect                   notwithstanding anything inconsistent therewith                   contained in any other law for the time being in                   force’ (barring the exercise of copyright or patent                   rights), it is generally considered the appropriate                   legal framework for this issue. However, it appears                   that the drafters of the 2018 Anti-trafficking bill                   have not considered this aspect at all, since they                   have not referenced the IT Act in this context in the                   bill, and have additionally added their own &lt;em&gt;non-obstante &lt;/em&gt;clause                   in Section 59 of the bill:&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;59.&lt;em&gt; The provisions                     of this Act, shall be in addition to and not in                     derogation of the provisions of any other law for                     the time being in force and, in case of any                     inconsistency, the provisions of this Act shall have                     overriding effect on the provisions of any such law                     to the extent of the inconsistency.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" class="normal"&gt;So the regime as prescribed by the IT Act                   allows for safe harbours, whereas the regime as                   prescribed by the Anti-Trafficking bill does not allow                   for safe harbours, and both say that they would an                   overriding effect for any conflicting law. This                   legislative bumble could potentially be solved by                   using the settled principle that a special Act                   prevails over a general legislation. This is still a                   little tricky as they are technically both special                   Acts. It could be argued that given the context of the                   Anti-trafficking bill as focusing on trafficking, and                   the context of the IT Act focusing on the interface of                   law and technology, that for the purposes of Section                   41(2) of the Anti-trafficking bill, the IT Act is the                   special legislation. And thus Section 79 of the IT Act                   should make redundant the relevant portion of Section                   41(2) of the Anti-trafficking bill. This reading would                   require the bill to be modified so as to remove the                   redundancy and the conflicting portion of Section                   41(2).&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;[1] In 2016, a division bench of the Delhi High Court held in the case of Myspace Inc vs Super Cassettes Industries Ltd that a safe harbour immunity for intermediaries was necessary as it was not technically feasible to pre-screen content from third parties, and that tasking intermediaries with this responsibility could have a chilling effect on free speech, It held that their responsibility was limited to the extent of acting upon receiving ‘actual knowledge’. Earlier, in determining what ‘actual knowledge’ refers to, in 2015 the Supreme Court of India in the landmark case of Shreya Singhal vs Union of India, required this to be in the form of a notice via a court or government order. Thus under our current law, intermediaries are granted a safe harbour from liability so long as they act upon court or government orders which notify them of content that is required to be taken down.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Clarification (18th August, 2018): A letter sent to the Ministry of Women and Child Development mentioned the Centre for Internet &amp;amp; Society as instituionally endorsing a critique of the The Trafficking of Persons (Prevention, Protection and Rehabilitation) Bill, 2018. We seek to clarify that the Centre for Internet &amp;amp; Society did not endorse the letter to the Ministry.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill'&gt;https://cis-india.org/internet-governance/blog/a-look-at-two-problematic-provisions-of-the-draft-anti-trafficking-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>swaraj</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2018-08-18T09:21:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet">
    <title>A lifetime of five years on the internet</title>
    <link>https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet</link>
    <description>
        &lt;b&gt;Centre for Internet and Society observes its fifth anniversary on Sunday.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Subir Ghosh was &lt;a class="external-link" href="http://www.dnaindia.com/bangalore/1836745/report-a-lifetime-of-five-years-on-the-internet"&gt;published in DNA on May 19, 2013&lt;/a&gt;. Sunil Abraham is quoted in this.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Five years is a long time in the internet space. The past five years, certainly, has been. And so has it been for the Centre for Internet and Society that completes five years here.&lt;br /&gt;&lt;br /&gt;When a group of citizens got together to come under a platform called CIS five years ago, they had wanted to work on policy issues about the internet that had a bearing on society. They, in fact, still do; except that the new media space itself has undergone a metamorphosis. Five years ago social media was just starting off, few people had smart phones, and online speech was not a burning issue.&lt;br /&gt;&lt;br /&gt;Sunil Abraham, executive director of city-based CIS, affirms this, and goes on to assert: “Five years ago, privacy was not a mainstream concern. Today, many different actors and stakeholders are interested in the configuration of the draft Privacy Bill. We first warned the public about the draconian measures in the IT Act during the 2008 amendment. Four years later, many more people are familiar with problematic sections and are adopting various strategies to amend the Act and it’s associated rules.”&lt;br /&gt;&lt;br /&gt;Likewise, five years ago, people dismissed “shared spectrum” as a pipe dream; today “shared spectrum” is mentioned in the National Telecom Policy. CIS usually thinks ahead, and works on a range of issues.&lt;br /&gt;&lt;br /&gt;“For internet adoption in India to grow dramatically from the dismal statistics today, we need to ensure continued access to cheap devices and affordable and ubiquitous broadband,” says Abraham.&lt;br /&gt;&lt;br /&gt;“With Ericsson suing Micromax for Rs100 crore, the mobile wars have come to India. If we have to protect innovation in sub-100 dollar devices, we need to configure our patent and copyright policy carefully.”&lt;br /&gt;&lt;br /&gt;But since CIS works primarily on policy issues, shouldn’t it have been based in Delhi rather than in Bangalore? “We do have a small office in Delhi. But we are headquartered in Bangalore because we need to keep learning from technologists and the technical community,” explains Abraham.&lt;br /&gt;&lt;br /&gt;When an organisation calling itself the Centre for Internet and Society (www.cis-india.org) observes its fifth anniversary, it shouldn’t surprise anyone that many of the activities related to the anniversary celebrations (May 20-23) have precious little to do with the internet, and is more about society itself. And yes, an entire evening is devoted to Kannada. There’s a talk by Chandrashekhara Kambara on ‘Kannada in the modern era,’ and another by UB Pavanaja titled ‘From Palm Leaf to Tablet – Journey of Kannada’.&lt;br /&gt;&lt;br /&gt;“We are looking at the complete eco-system. For instance, during the digitalisation of TV in India, what will happen to the internet? Do TV promoting policies undermine the growth of broadband? On the second day we look at the connection between another older technology - cinema and the Internet.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet'&gt;https://cis-india.org/news/dna-india-may-19-2013-subir-ghosh-a-lifetime-of-five-years-on-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-05-20T09:04:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-april-3-2016-nishant-shah-a-large-byte-of-your-life">
    <title>A Large Byte of Your Life</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-april-3-2016-nishant-shah-a-large-byte-of-your-life</link>
    <description>
        &lt;b&gt;With the digital, memory becomes equated with storage. We commit to storage to free ourselves from remembering.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://indianexpress.com/article/technology/social/a-large-byte-of-your-life/"&gt;published in Indian Express&lt;/a&gt; on April 3, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This is the story of a broken Kindle. A friend sent a message to a WhatsApp group that I belong to that she is mourning the loss of her second-generation Kindle, that she bought in 2012, and since then had been her regular companion. It is not the story of hardware malfunction or a device just giving up. Instead, it is a story of how quickly we forget the old technologies which were once new. The friend, on her Easter holiday, was visiting her sister, who has a six-year-old daughter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This young one, a true digital native, living her life surrounded by smart screens, tablets, phones, and laptops, instinctively loves all digital devices and plays with them. In her wanderings through her aunt’s things, she came across the old Kindle — unsmart, without a touch interface, studded with keys, not connected to any WiFi, and rendered in greyscale. It was an unfamiliar device. But with all the assurance of somebody who can deal with digital devices, she took it in her hands to play with it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much to her dismay, none of the regular modes of operation worked. The old Kindle did not have a touch screen operated lock. It wasn’t responding to scroll, swipe and pinch. It had no voice command functions. As she continued to cajole it to come to life, it only stared at her, a lock on the digital interface, refusing to budge to the learned demands and commands of the new user. After about 20 minutes of trying to wake the Kindle up, she became frustrated with it and banged it harshly on the table, where it cracked, the screen blanked out and that was the end of the story.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Or rather, it is the beginning of one. As my friend registered the loss of her clunky, clumsy, heavy, non-intuitive Kindle, and messages of grief poured in, with the condolence that the new ones are so much better and the assurances that at least all her books are safe on the Amazon cloud, I see in this tale, the quest of newness that the digital always has to offer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If it has missed your attention, the digital is always new. Our phones get discarded every few seasons, even as phone companies release new models every few months. Our operating systems are constantly sending us notifications that they need to be updated. Our apps operate in stealth mode, continuingly adding updates where bugs are fixed and features are added. Most of us wouldn’t know what to do if we were faced with a computer that doesn’t “heal”, “backup” or “restore” itself. If our lives were to be transferred back to dumb phones, or if we had to deal with devices that do not strive to learn and read us, it might lead to some severe anxiety.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The newness that the digital offers is also found in our socially mediated lives. Our digital memories are short-lived — relationships rise and fall in the span of days as location-based dating apps offer an infinite range of options to choose your customised partner; celebrities are made and unmade overnight as clicks lead to viral growth and then disappear to be replaced by the next new thing; communities find droves of subscribers, only to become a den of lurkers where nothing happens; must-have apps find themselves discarded as trends shift and new must-haves crop up overnight. Breathless, bountiful and boundless, the digital keeps us constantly running, just to be in the same place, always the same and yet, always new.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We would be hard pressed to remember that magical moment when we first discovered a digital object. For millennials, the digital is such a natural part of their native learning environments that they do not even register the first encounter or the subsequent shifts as they navigate across the connected world. Increasingly, we tune ourselves to the temporality and the acceleration of the digital, tailoring our memories to what is important, what is now, and what is immediately of use, excluding everything else and dropping it into digital storage, assured in our godlike capacities to archive everything.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This affordance of short digital memories is enabled partly by the fact that we are subject to information overload, but partly also to the fact that our machines can now remember, more accurately and more robustly than the paltry human, prone to error and forgetfulness. With the digital, memory becomes equated with storage, and the more we commit to storage, the more we free ourselves from the task of remembering.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The broken Kindle is a testimony not only to the ways in which we discard old devices but also our older forms of individual and collective memory — quickly doing away with information that is not of the now, that is not urgent, and that does not have immediate use value. My friend’s Kindle got replaced in two days. All her books were re-loaded and she was set to go. However, as she told me in a chat, she is not going to throw away her old broken Kindle. Because she wants to remember it — remember the joy of reading her favourite books on it. She is scared that if she throws it away, she might forget.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-april-3-2016-nishant-shah-a-large-byte-of-your-life'&gt;https://cis-india.org/internet-governance/blog/indian-express-april-3-2016-nishant-shah-a-large-byte-of-your-life&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-06-05T03:35:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-august-27-2019-a-judicial-overreach-into-matters-of-regulation">
    <title>A judicial overreach into matters of regulation</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-august-27-2019-a-judicial-overreach-into-matters-of-regulation</link>
    <description>
        &lt;b&gt;A PIL on Aadhaar sheds light on some problematic trends&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Gurshabad Grover was &lt;a class="external-link" href="https://www.thehindu.com/opinion/op-ed/a-judicial-overreach-into-matters-of-regulation/article29262148.ece"&gt;published in the Hindu&lt;/a&gt; on August 27, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Madras High Court has been hearing a PIL petition since 2018 that initially asked the court to declare the linking of Aadhaar with a government identity proof as mandatory for registering email and social media accounts. The petitioners, victims of online bullying, went to the court because they found that law enforcement agencies were inefficient at investigating cybercrimes, especially when it came to gathering information about pseudonymous accounts on major online platforms. This case brings out some of the most odious trends in policymaking in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first issue is how the courts, as Anuj Bhuwania has argued in the book &lt;em&gt;Courting the People&lt;/em&gt;, have continually expanded the scope of issues considered in PILs. In this case, it is absolutely clear that the court is not pondering about any question of law. In what could be considered as abrogation of the separation of powers provision in the Constitution, the Madras High Court started to deliberate on a policy question with a wide-ranging impact: Should Aadhaar be linked with social media accounts?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After ruling out this possibility, it went on to consider a question that is even further out of its purview: Should platforms like WhatsApp that provide encrypted services allow forms of “traceability” to enable finding the originator of content? In essence, the court is now trying to regulate one particular platform on a very specific technical question, ignoring legal frameworks entirely. It is worrying that the judiciary is finding itself increasingly at ease with deliberations on policy and regulatory measures, and its recent actions remind us that the powers of the court also deserve critical questioning.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Government’s support&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Second, not only are governments failing to assert their own powers of regulation in response to the courts’ actions, they are on the contrary encouraging such PILs. The Attorney General, K.K. Venugopal, who is representing the State of Tamil Nadu in the case, could have argued for the case’s dismissal by referring to the fact that the Ministry of Electronics and Information Technology has already published draft regulations that aim to introduce “traceability” and to increase obligations on social media platforms. Instead, he has largely urged the court to pass regulatory orders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Third, ‘Aadhaar linking’ is becoming increasingly a refrain whenever any matter even loosely related to identification or investigation of crime is brought up. While the Madras High Court has ruled out such linking for social media platforms, other High Courts are still hearing petitions to formulate such rules. The processes that law enforcement agencies use to get information from platforms based in foreign jurisdictions rely on international agreements. Linking Aadhaar with social media accounts will have no bearing on these processes. Hence, the proposed ‘solution’ misses the problem entirely, and comes with its own threats of infringing privacy.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Problems of investigation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;That said, investigating cybercrime is a serious problem for law enforcement agencies. However, the proceedings before the court indicate that the cause of the issues have not been correctly identified. While legal provisions that allow agencies to seek information from online platforms already exist in the Code of Criminal Procedure and the Information Technology Act, getting this information from platforms based in foreign jurisdictions can be a long and cumbersome process. For instance, the hurdles posed by the mutual legal assistance treaty between India and the U.S. effectively mean that it might take months to receive a response to information requests sent to U.S.-based platforms, if a response is received at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To make cybercrime investigation easier, the Indian government has various options. India should push for fairer executive agreements possible under instruments like the United States’ CLOUD Act, for which we need to first bring our surveillance laws in line with international human rights standards through reforms such as judicial oversight. India could use the threat of data localisation as a leverage to negotiate bilateral agreements with other countries to ensure that agencies have recourse to quicker procedures. As a first step, however, Indian courts must wash their hands of such questions. For its part, the Centre must engage in consultative policymaking around these important issues, rather than support ad-hoc regulation through court orders in PILs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;(&lt;/span&gt;&lt;em&gt;Disclosure: The CIS is a recipient of research grants from Facebook.&lt;/em&gt;&lt;span&gt;)&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-august-27-2019-a-judicial-overreach-into-matters-of-regulation'&gt;https://cis-india.org/internet-governance/blog/the-hindu-august-27-2019-a-judicial-overreach-into-matters-of-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>gurshabad</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-08-28T01:28:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/shweta-reddy-september-17-2021-a-guide-to-drafting-privacy-policy-under-personal-data-protection-bill">
    <title>A Guide to Drafting Privacy Policy under the Personal Data Protection Bill, 2019</title>
    <link>https://cis-india.org/internet-governance/blog/shweta-reddy-september-17-2021-a-guide-to-drafting-privacy-policy-under-personal-data-protection-bill</link>
    <description>
        &lt;b&gt;The Personal Data Protection Bill, 2019, (PDP Bill) which is currently being deliberated by the Joint Parliamentary Committee, is likely to be tabled in the Parliament during the winter session of 2021.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;The Bill in its current form, doesn’t have explicit transitory provisions i.e. a defined timeline for the enforcement of the provisions of the Bill post its notification as an enforceable legislation. Since the necessary subject matter expertise may be limited on short notice and out of budget for certain companies, we intend to release a series of guidance documents that will attempt to simplify the operational requirements of the legislation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Certain news reports had earlier suggested that the Joint Parliamentary Committee reviewing the Bill has proposed&amp;nbsp;&lt;a class="external-link" href="https://economictimes.indiatimes.com/news/politics-and-nation/parliamentary-panel-examining-personal-data-protection-bill-recommends-89-changes/articleshow/80138488.cms"&gt;89 new amendments and a new clause&lt;/a&gt;. The nature and content of these amendments so far remain unclear. However, we intend to start the series by addressing some frequently asked questions around meeting the requirements of publishing a privacy notice and shall make the relevant changes post notification of the new Bill. The solutions provided in this guidance document are mostly based on international best practices and any changes in the solutions based on Indian guidelines and the revised PDP Bill will be redlined in the future.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The frequently asked questions and other specific examples on complying with the requirements of publishing a privacy policy have been compiled based on informal discussions with stakeholders, unsolicited queries from smaller organizations and publicly available details from conferences on the impact of the Bill. We intend to conduct extensive empirical analysis of additional queries or difficulties faced by smaller organizations towards achieving compliance post the notification of the new Bill. Regardless, any smaller organizations(NGOs, start-ups etc.) interested in discussing compliance related queries can get in touch with us.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;Click to download the &lt;a href="https://cis-india.org/internet-governance/guide-to-personal-data-protection-bill.pdf" class="internal-link"&gt;full report here&lt;/a&gt;. The report was reviewed by Pallavi Bedi and Amber Sinha.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/shweta-reddy-september-17-2021-a-guide-to-drafting-privacy-policy-under-personal-data-protection-bill'&gt;https://cis-india.org/internet-governance/blog/shweta-reddy-september-17-2021-a-guide-to-drafting-privacy-policy-under-personal-data-protection-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>shwetar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2021-09-20T10:34:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work">
    <title>A Gendered Future of Work</title>
    <link>https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work</link>
    <description>
        &lt;b&gt;This paper aims to contextualise the narrative around digitalisation and automation with reference to women's labour in India. 

The paper has been authored by Ambika Tandon and Aayush Rathi, edited by Elonnai Hickok and Rakhi Sehgal. Research assistance has been provided by Divya Kushwaha.&lt;/b&gt;
        
&lt;h3&gt;Abstract&lt;/h3&gt;
&lt;p&gt;Studies around the future of work have predicted technological disruption&amp;nbsp;across industries, leading to a shift in the nature and organisation of work, as well as the substitution of&amp;nbsp;certain kinds of jobs and growth of others. This paper seeks to contextualise this disruption for women workers in India.&amp;nbsp;The paper argues that two aspects of the structuring of the labour market will be pertinent in shaping the&amp;nbsp;future of work: the gendered nature of skilling and skill classification, and occupational segregation along&amp;nbsp;the lines of gender and caste. We will take the case study of the electronics manufacturing sector to flesh&amp;nbsp;out these arguments further. Finally, we bring in a discussion on the platform economy, a key area of&amp;nbsp;discussion under the future of work. We characterise it as both generating employment opportunities,&amp;nbsp;particularly for women, due to the flexible nature of work, and retrenching traditional inequalities built&amp;nbsp;into non-standard employment.&lt;/p&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;The question on the future of work across the global North - and parts of the global South - has recently been raised with regards to technological disruption, as a result of digitisation, and more recently, automation (Leurent et al., 2018). While the former has been successively replacing routine cognitive tasks, the latter, defined as the deployment of cyber-physical systems, will enable the replacement of manual tasks previously being performed using human labour (Leurent et al., 2018). In combination, these are expected to have a twofold effect on: the “structure of employment”, which includes occupational roles and nature of tasks, and “forms of work”, including interpersonal relationships and organization of work (Piasna and Drahokoupil, 2017). Building from historical evidence, the diffusion of digitising or automative technologies can be anticipated to take place differently across economic contexts, with different factors causing varied kinds of technological upgradation across the global North and South. Moreover, occupational analysis projects occupations in the latter to be at a significantly higher risk of being disrupted than the former (WTO, 2017).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, these concerns are somewhat offset by the barriers to technological adoption that exist in lower income countries such as lower wages, and a relatively higher share of non-routine manual jobs (WTO, 2017). 1 With the global North typically being early and quicker adopters of automation technologies, the differential technology levels in countries have been in fact been utilised to understand global inequality (Foster and Rosenzweig, 2010). Consequently, the labour-cost advantage that economies in the global South enjoy may be eroded, leading to what may be understood as re-shoring/back shoring - a reversal of offshoring (ILO, 2017). This may especially be the case in sectors where there has been a failure to capitalise on the labour-cost advantage by evolving supplier networks to complement assembly activities (such as in manufacturing) (Milington, 2017), or production of high-value services (such as in the services sector).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Extensive work over the past three decades has been conducted on the effects of liberalisation and globalisation on employment for women in the global South. This has explored conditional empowerment and exploitation as women are increasingly employed in factories and offices, with different ways of reproducing and challenging patriarchal relations. However, the effects of reshoring and technological disruption have yet to be explored to any degree of granularity for this population, which arguably will be one of the first to face its effects. This can be seen as a consequence of industries that rely on low cost labour being impacted first by re-shoring, such as textile and apparel and electronics manufacturing (Kucera and Tejani, 2014).&lt;/p&gt;
&lt;p&gt;Download the full paper &lt;a href="https://cis-india.org/internet-governance/pdf-gendered-future-of-work" class="internal-link" title="PDF Gendered Future of Work"&gt;here&lt;/a&gt;.&lt;a href="https://cis-india.org/internet-governance/pdf-gendered-future-of-work" class="internal-link" title="PDF Gendered Future of Work"&gt;&amp;nbsp;&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work'&gt;https://cis-india.org/internet-governance/blog/ambika-tandon-and-aayush-rathi-december-19-2018-a-gendered-future-of-work&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Ambika Tandon and Aayush Rathi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Jobs</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2020-07-21T06:29:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dna-dissent">
    <title>A Dissent Note to the Expert Committee for DNA Profiling </title>
    <link>https://cis-india.org/internet-governance/blog/dna-dissent</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has participated in the Expert Committee for DNA Profiling constituted by the Department of Biotechnology in 2012 for the purpose of deliberating on and finalizing the draft Human DNA Profiling Bill and appreciates this opportunity. CIS respectively dissents from the January 2015 draft of the Bill.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Click for &lt;a href="https://cis-india.org/internet-governance/blog/dna-bill-functions.pdf" class="external-link"&gt;DNA Bill Functions&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/dna-list-of-offences.pdf" class="external-link"&gt;DNA List of Offences&lt;/a&gt;, and &lt;a href="https://cis-india.org/internet-governance/blog/cis-note-on-dna-bill.pdf" class="external-link"&gt;CIS Note on DNA Bill&lt;/a&gt;. A modified version was published by &lt;a class="external-link" href="http://bangalore.citizenmatters.in/articles/dna-bill-problems-issues-inputs-from-bangalore"&gt;Citizen Matters Bangalore&lt;/a&gt; on July 28.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Based on the final draft of the Human DNA Profiling Bill that was circulated on the 13th of January 2015 by the committee, the Centre for Internet and Society is issuing this note of dissent on the following grounds:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Centre for Internet and Society has made a number of submissions to the committee regarding different aspects of the Bill including recommendations for the functions of the board, offences for which DNA can be collected, and a general note on the Bill. Though the Centre for Internet and Society recognizes that the present form of the Bill contains stronger language regarding human rights and privacy, we do not find these to be adequate and believe that the core concerns or recommendations submitted to the committee by CIS have not been incorporated into the Bill.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Centre for Internet and Society has foundational objections to the collection of DNA profiles for non-forensic purposes. In the current form the DNA Bill provides for collection of DNA for the following non forensic purposes:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;Section 31(4) provides for the maintenance of indices in the DNA Bank and includes a missing person’s index, an unknown deceased person’s index, a volunteers’ index, and such other DNA indices as may be specified by regulation. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Section 38 defines the permitted uses of DNA profiles and DNA samples including: identifying victims of accidents or disasters or missing persons or for purposes related to civil disputes and other civil matters and other offences or cases listed in Part I of the Schedule or for other purposes as may be specified by regulation.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Section 39 defines the permitted instances of when DNA profiles or DNA samples may be made available and include: for the creation and maintenance of a population statistics Data Bank that is to be used, as prescribed, for the purposes of identification research, protocol development or quality control provided that it does not contain any personally identifiable information and does not violate ethical norms.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Part I of the schedule lists laws, disputes, and offences for which DNA profiles and DNA samples can be used. These include, among others, the Motor Vehicles Act, 1988, parental disputes, issues relating to pedigree, issues relating to assisted reproductive technologies, issues relating to transplantation of human organs, issues relating to immigration and emigration, issues relating to establishment of individual identity, any other civil matter as may be specified by the regulations, medical negligence, unidentified human remains, identification of abandoned or disputed children. &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;While rejecting non-forensic use entirely, we have specific substantive and procedural objections to the provisions relating to forensic profiling in the present version of the Bill. These include:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Over delegation of powers to the board&lt;/strong&gt;: The DNA Board currently has vast powers as delegated by Section 12&amp;nbsp; including:&lt;br /&gt;&lt;em&gt;“authorizing procedures for communication of DNA profiles for civil proceedings and for crime investigation by law enforcement and other agencies, establishing procedure for cooperation in criminal investigation between various investigation agencies within the country and with international agencies, specifying by regulations the list of applicable instances of human DNA profiling and the sources and manner of collection of samples in addition to the lists contained in the Schedule, undertaking any other activity which in the opinion of the Board advances the purposes of this Act.” &lt;/em&gt;&lt;br /&gt;&lt;br /&gt;Section 65 gives the Board the power to make regulations for a number purposes including: &lt;em&gt;“other purposes in addition to identification of victims of accidents, disasters or missing persons or for purposes related to civil disputes and other civil matters and other offences or cases lists in Part I of the Schedule for which records or samples may be used under section 38, other laws, if any, to be included under item (viii) of para B of Part I of the Schedule, other civil matters, if any, to be included under item (vii) of para C of Part I of the Schedule, and authorization of other persons, if any, for collection of non intimate body samples and for performance of non-intimate forensic procedures, under Part III of the Schedule.&lt;/em&gt;&lt;br /&gt;&lt;br /&gt;Ideally these powers would lie with the legislative or judicial branch. Furthermore, the Bill establishes no mechanism for accountability or oversight over the functioning of the Board and section 68 specifically states that &lt;em&gt;“no civil court shall have jurisdiction to entertain any suit or proceeding in respect to any matter which the Board is empowered by or under this Act to determine.” &lt;/em&gt;&lt;br /&gt;&lt;br /&gt;The above represents only a few instances of the overly broad powers that have been given to the Board. Indeed, the Bill gives the Board the power to make regulations for 37 different aspects relating to the collection, storage, use, sharing, analysis, and deletion of DNA samples and DNA profiles. As a result, the Bill establishes a Board that controls the entire ecosystem of DNA collection, analysis, and use in India without strong external oversight or accountability. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Key terms undefined&lt;/strong&gt;: Section 31 (5) states that the “indices maintained in every DNA Data Bank will include information of data based on DNA analysis prepared by a DNA laboratory duly approved by the Board under section 1 of the Act, and of records relating thereto, in accordance with the standards as may be specified by the regulations.”&lt;br /&gt;&lt;br /&gt;The term’ DNA analysis’ is not defined in the Act, yet it is a critical term as any information based on such an analysis and associated records can be included in the DNA Database. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Low standards for sharing of information&lt;/strong&gt;: Section 34 empowers the DNA Data Bank Manager to compare a received DNA profile with the profiles stored in the databank and for the purposes of any investigation or criminal prosecution, communicate the information regarding the received DNA profile to any court, tribunal, law enforcement agencies, or DNA laboratory which the DNA Data Bank Manager considers is concerned with it.&lt;br /&gt;&lt;br /&gt;The decision to share compared profiles and with whom should be made by an independent third party authority, rather than the DNA Bank Manager. Furthermore, this provision isvague and although the intention seems to be that the DNA profiles should be matched and the results communicated only in certain cases, the generic wording could take into its ambit every instance of receipt of a DNA profile. For eg. the regulations envisaged under section 31(4)(g) may prescribe for a DNA Data Bank for medical purposes, but section 34 as it is currently worded may include DNA profiles of patients to be compared and their information released to various agencies by the Data Bank Manager as an unintentional consequence.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;strong&gt;Missing privacy safeguards&lt;/strong&gt;: Though the Bill refers to security and privacy procedures that labs are to follow, these have been left to be developed and implemented by the DNA Board. Thus, except for bare minimum standards and penalties addressing the access, sharing, and use of data – the Bill contains no privacy safeguards. &lt;br /&gt;&lt;br /&gt;In our interactions with the committee we have asked that the Bill be brought in line with the nine national privacy principles established by the Report of the Group of Experts on Privacy submitted to the Planning Commission in 2012. This has not been done.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dna-dissent'&gt;https://cis-india.org/internet-governance/blog/dna-dissent&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-07-21T11:01:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/a-dialogue-on-zero-rating-and-network-neutrality">
    <title>A Dialogue on "Zero Rating" and Network Neutrality</title>
    <link>https://cis-india.org/internet-governance/news/a-dialogue-on-zero-rating-and-network-neutrality</link>
    <description>
        &lt;b&gt;Internet Governance Forum (IGF) 2015 will be held at Jao Pessoa in Brazil from November 10 to 13, 2015. The theme of IGF 2015 is Evolution of Internet Governance: Empowering Sustainable Development. The workshop on Zero Rating and Network Neutrality will be held on November 12, 2015 at IGF 2015. Pranesh Prakash will be speaking at this event.&lt;/b&gt;
        &lt;p&gt;This was published on the IGF website. &lt;a class="external-link" href="http://igf2015.sched.org/event/145714f13d66ae706eab56b2fb5d2548?iframe=no&amp;amp;w=&amp;amp;sidebar=yes&amp;amp;bg=no#.Vj7IlF58hQo"&gt;Read here&lt;/a&gt; the details.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Overview:&lt;br /&gt;The objective of this session is to provide the global Internet  community, and policymakers in particular, with an informed and balanced  dialogue on the complex Internet policy issue of “&lt;a href="https://en.wikipedia.org/wiki/Zero-rating" target="_blank"&gt;zero-rating&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The purpose of the session is to help others, in their respective  countries and locales, in their own analyses of Zero-Rating (ZR). The  session will promote access to expert insight and multistakeholder  community discussion. We encourage remote and in-person participation  and aim for complete diversity across stakeholder groups and  perspectives. As a main session, translation will be available in the  official UN languages.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are many different viewpoints on ZR, with some stakeholders  being completely against the practice to others being fully supportive.  In the open discussion leading up to this session, it has become  apparent that some stakeholder approaches to ZR are more nuanced and  varied than “for or against.” The session will consider the full  spectrum of views.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case where ZR is advanced as a means to drive Internet access  and narrow the digital divide, this session will also explore  alternative approaches, such as the use of community networks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Agenda:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The agenda is currently being developed between organizers and  moderators. Based upon list discussion to date, the session will involve  the following elements:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Introduction and Opening - After a brief introduction by the session  organizers, the lead moderator will ask expert speakers to provide a  brief description of how they view ZR.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Multistakeholder, expert dialogue - A moderated discussion on  zero-rating amongst experts holding different positions and  perspectives. The discussion will be based upon policy questions  contributed from the community.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Community questions and discussion - Remote and in-person  participants will be invited to pose questions to the experts, as well  as to engage in guided discussion on topics raised.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Alternatives - Alternatives to zero-rating as a means to advance  access, such as community networks, will be explained and illustrated.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Contributions from relevant IGF workshops - A handful of workshops at  this year’s IGF will consider zero-rating. Organisers or participants  from these workshops will be invited to contribute a readout to the  session.&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Policy Questions:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Based upon submissions from the community, below are examples of the policy questions that will be addressed during the session:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Please describe ZR as you see it in 90 seconds.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Under what circumstances are there benefits of ZR? What are the  benefits? Under what circumstances are there detriments from ZR? What  are the detriments?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Is all zero-rating bad? Or are there business models of ZR that are  good? Should the bad models be regulated? should the good models be  regulated? How?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Is ZR an anti-competitive business practice, or does ZR enhance competition?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Does a focus on Zero-Rated Internet access in developing countries  divert government attention and investment away from other efforts to  enhance access?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;In those countries which have banned zero rating, what has been the impact?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Does ZR limit or skew end-user behavior? If so, how? Is this effect  different from that of other free offerings over the Internet?&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;
&lt;p&gt;What are your thoughts,, for example, the following hypothetical:  Imagine that Developer says to Consumer, "Send me your Internet bill at  the end of the month. If you are being charged $Y/MB, and you consume Z  MB of our service, we will send you a check for $Y*Z or simply reduce  your bill with us by that amount.&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;How should regulators / governments address the potential tension  between expanding Internet connectivity and the desire for “pure net  neutrality?”&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Host Country Chair: Mr. Nivaldo Cleto, Owner at Classico Consultoria,  Advisor to the Brazilian Internet Steering Committee of Brazil (&lt;a href="http://icannwiki.com/CGI.br" target="_blank"&gt;CGI.br&lt;/a&gt;) and Board member of the Board of Trade of Sao Paulo (JUCESP), as a Representative of the Union.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moderators:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The role of the moderators is to keep the discussion focused, self-referencing, fluid, friendly, and on time.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Lead/expert moderator: Robert Pepper, VP, Global Technology Policy, Cisco&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Remote moderator: Ginger Paque, Director, Internet Governance Programmes, Diplo&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Floor and Readout moderator: Carolina Rossini, VP, International Policy, Public Knowledge&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Floor and Readout moderator: Vladimir Radunovic, Director, E-diplomacy and Cybersecurity Programmes, Diplo&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Expert speakers: (confirmed as of 29 October 2015)&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Jochai Ben-Avie, Senior Global Policy Manager, Mozilla, USA&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;Eduardo Bertoni, Professor, Universidad de Palermo, Argentina&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Igor Vilas Boas de Freitas, Commissioner, ANATEL, Brazil&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Dušan Caf, Chairman, Electronic Communications Council, Republic of Slovenia&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Silvia Elaluf-Calderwood, Research Fellow, London School of Economics, UK/Peru&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Belinda Exelby, Director, Institutional Relations, GSMA, UK&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;Bob Frankston, Computer Scientist, USA&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Helani Galpaya, CEO, LIRNEasia, Sri Lanka&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Anka Kovacs, Director, Internet Democracy Project, India&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Kevin Martin, VP, Mobile and Global Access Policy, Facebook, USA&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Pranesh Prakash, Policy Director, Center for Internet and Society, India&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Steve Song, Founder, Village Telco, South Africa/Canada&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Dhanaraj Thakur, Research Manager, Alliance for Affordable Internet, USA/West Indies&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Christopher Yoo, Professor of Law, Communication, and Computer &amp;amp; Information Science, University of Pennsylvania, USA&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Plan for online interaction:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This session will include a remote panelist who will be prepared to speak from a remote hub.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both in situ and remote interventions are being carefully coordinated to maximise a diversity of views in the available time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This session will treat online participants on equal footing with in  situ attendees, and will monitor remote attendees specifically to ensure  that their requests to ask questions will be noted. Participant  interventions in the session will consist of questions, at two  structured points in the session. Floor moderators will collect the  questions, and will consult with the panel remote moderator to ensure  that remote questions are considered, as the moderators select for  stakeholder balance and remote representation. Remote participant  questions will be read into the session in English or Spanish by the  remote moderator, to avoid 'transaction cost' (time and possible  connection difficulties).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;‘Feeder’ workshops and/or connections with other sessions:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have identified the following workshops and other sessions as  relevant. Each shall provide a 1-2 minute readout or preview from their  session.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;
&lt;p&gt;Workshop No. 156: Zero-rating and neutrality policies in developing countries&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Workshop No. 79: Zero-rating, Open Internet, and Freedom of Expression&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Workshop No. 21: SIDS Roundtable: “Free Internet” - Bane or Boon?&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Dynamic Coalition Session: Dynamic Coalition on Net Neutrality&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;Access/PROTESTE event on Zero-Rating&lt;/p&gt;
&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Desired results/output:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As explained above, our desired result is to provide the global  Internet community with a well-rounded and insightful dialogue on the  Internet policy issue of zero-rating. The discussion is an output in and  of itself, from which policymakers around the world should benefit. In  accordance with the IGF reporting requirement, a rapporteur shall  produce a neutral report of the session, which will not draw conclusions  on the topic, but rather will summarise the main points discussed.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/a-dialogue-on-zero-rating-and-network-neutrality'&gt;https://cis-india.org/internet-governance/news/a-dialogue-on-zero-rating-and-network-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-11-08T04:21:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/torsha-sarkar-november-30-2019-a-deep-dive-into-content-takedown-timeframes">
    <title>A Deep Dive into Content Takedown Timeframes</title>
    <link>https://cis-india.org/internet-governance/blog/torsha-sarkar-november-30-2019-a-deep-dive-into-content-takedown-timeframes</link>
    <description>
        &lt;b&gt;Since the 1990s, internet usage has seen a massive growth, facilitated in part, by growing importance of intermediaries, that act as gateways to the internet. Intermediaries such as Internet Service Providers (ISPs), web-hosting providers, social-media platforms and search engines provide key services which propel social, economic and political development. However, these developments are also offset by instances of users engaging with the platforms in an unlawful manner. The scale and openness of the internet makes regulating such behaviour challenging, and in turn pose several interrelated policy questions.&lt;/b&gt;
        
&lt;p style="text-align: justify;"&gt;In this report, we will consider one such question by examining the appropriate time frame for an intermediary to respond to a government content removal request. The way legislations around the world choose to frame this answer has wider ramifications on issues of free speech and ease of carrying out operations for intermediaries. Through the course of our research, we found, for instance:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;An one-size-fits-all model for illegal content may not be productive. The issue of regulating liability online contain several nuances, which must be considered for more holistic law-making. If regulation is made with only the tech incumbents in mind, then the ramifications of the same would become incredibly burdensome for the smaller companies in the market. &lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Determining an appropriate turnaround time for an intermediary must also consider the nature and impact of the content in question. For instance, the Impact Assessment on the Proposal for a Regulation of the European Parliament and of the Council on preventing the dissemination of terrorist content online cites research that shows that one-third of all links to Daesh propaganda were disseminated within the first one-hour of its appearance, and three-fourths of these links were shared within four hours of their release. This was the basic rationale for the subsequent enactment of the EU Terrorism Regulation, which proposed an one-hour time-frame for intermediaries to remove terrorist content.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Understanding the impact of specific turnaround times on intermediaries requires the law to introduce in-built transparency reporting mechanisms. Such an exercise, performed periodically, generates useful feedback, which can be, in turn used to improve the system.&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Corrigendum: &lt;/strong&gt;Please note that in the section concerning 'Regulation on Preventing the Dissemination of Terrorist Content Online', the report mentions that the Regulation has been 'passed in 2019'. At the time of writing the report, the Regulation had only been passed in the European Parliament, and as of May 2020, is currently in the process of a trilogue.&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt;Disclosure&lt;/strong&gt;: CIS is a recipient of research grants from Facebook India.&amp;nbsp;&lt;/div&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/a-deep-dive-into-content-takedown-frames"&gt;Click to download the research paper&lt;/a&gt; by Torsha Sarkar (with research assistance from Keying Geng and Merrin Muhammed Ashraf; edited by Elonnai Hickok, Akriti Bopanna, and Gurshabad Grover; inputs from Tanaya Rajwade)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/torsha-sarkar-november-30-2019-a-deep-dive-into-content-takedown-timeframes'&gt;https://cis-india.org/internet-governance/blog/torsha-sarkar-november-30-2019-a-deep-dive-into-content-takedown-timeframes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>torsha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    

   <dc:date>2020-06-26T11:59:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindustan-times-september-9-2013-zia-haq-a-dangerous-trend">
    <title>A dangerous trend: social media adds fire to Muzaffarnagar clashes</title>
    <link>https://cis-india.org/news/hindustan-times-september-9-2013-zia-haq-a-dangerous-trend</link>
    <description>
        &lt;b&gt;As access to the Internet grows, especially in small Indian towns and cities, social media has revealed a darker side as a hatred-mongering tool capable of setting off serious violence. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Zia Haq was &lt;a class="external-link" href="http://www.hindustantimes.com/India-news/UttarPradesh/A-dangerous-trend-social-media-adds-fire-to-Muzaffarnagar-clashes/Article1-1119655.aspx?htsw0023"&gt;published in the Hindustan Times&lt;/a&gt; on September 9, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Malicious content, such as fake YouTube videos and morphed photographs, are usually spread rapidly to trigger rioting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In UP’s Muzzafarnagar, a video clip purportedly showing a Muslim mob lynching two boys, which police now suspect is from neighboring Pakistan or Afghanistan, was used to stir unease, deepening hatred between Muslims and Hindus.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A series of rioting in western UP district has left at least 41 dead. The circulation of the video had led to violence spreading to new areas. The fake video that escalated clashes portends a new trend in India’s discordant politics.&lt;br /&gt;&lt;br /&gt;“From word of mouth, communal polarization, especially by Hindutva organisations, is now moving online. This is a dangerous trend since the Internet is very potent,” said Prof Badri Narayan of the GB Pant Social Science Institute, Allahabad.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Research shows social media sites, including sites like Facebook, Twitter and YouTube, are more persuasive than television ads. Nearly 100 million Indians use the Internet each day, more than Germany’s population. Of this, 40 million have assured broadband, the ones who mostly subscribe to social-media accounts.&lt;br /&gt;&lt;br /&gt;The country also has about 87 million mobile-Internet users, according to Internet and Mobile Association of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UP’s police have blocked the video, invoking sections under 420 (forgery), 153-A (promoting enmity on religious grounds) and 120-B (conspiracy) of the Indian Penal Code, along with section 66 of the Information Technology Act.&lt;br /&gt; &lt;br /&gt;Section 66, however, is the heart of a free-speech debate. Activists say section 66 has been used at the drop of a hat.&lt;br /&gt;&lt;br /&gt;Last November, two Mumbai girls faced arrests for questioning the city’s shutdown for Shiv Sena leader Bal Thackeray’s funeral. The arrests were declared illegal after being roundly criticised, including by the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In this case, the government has a legitimate reason to censor speech. However, this requires the authorities to very focused and action should be targeted, rather than sweeping,” said Sunil Abraham of the Bangalore-based The Centre for Internet and Society.&lt;br /&gt; &lt;br /&gt;The government’s action, Abraham said, tended to be broad-based. He said in such situations, the government could use public-service messaging to present the alternate view.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Legal provisions could be made whereby Twitter users from India, for example, (compulsorily) see the public service message by default when they log in,” Abraham said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-september-9-2013-zia-haq-a-dangerous-trend'&gt;https://cis-india.org/news/hindustan-times-september-9-2013-zia-haq-a-dangerous-trend&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-09-12T10:50:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy">
    <title>A Critique of Consent in Information Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy</link>
    <description>
        &lt;b&gt;The idea of informed consent in privacy law is supposed to ensure the autonomy of an individual in any exercise which involves sharing of the individual's personal information. Consent is usually taken through a document, a privacy notice, signed or otherwise agreed to by the participant.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Notice and Consent as cornerstone of privacy law&lt;/b&gt;&lt;br /&gt;The privacy notice, which is the primary subject of this article, conveys all pertinent information, including risks and benefits to the participant, and in the possession of such knowledge, they can make an informed choice about whether to participate or not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most modern laws and data privacy principles seek to focus on individual control. In this context, the definition by the late Alan Westin, former Professor 	of Public Law &amp;amp; Government Emeritus, Columbia University, which characterises privacy as "the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to other,"	&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; is most apt. The idea of privacy as control is what finds articulation in data protection policies across jurisdictions beginning from the Fair Information Practice Principles (FIPP) from the United States.	&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul Schwarz, the Jefferson E. Peyser Professor at UC Berkeley School of Law and a Director of the Berkeley Center for Law and Technology, called the FIPP the building blocks of modern information privacy law.	&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These principles trace their history to a report called 'Records, Computers and 	Rights of Citizens'&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; prepared by an Advisory Committee appointed by the US Department 	of Health, Education and Welfare in 1973 in response to the increasing automation in data systems containing information about individuals. The Committee's 	mandate was to "explore the impact of computers on record keeping about individuals and, in addition, to inquire into, and make recommendations regarding, 	the use of the Social Security number."&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The most important legacy of this report was 	the articulation of five principles which would not only play a significant role in the privacy laws in US but also inform data protection law in most 	privacy regimes internationally&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; like the OECD Privacy Guidelines, the EU Data 	Protection Principles, the FTC Privacy Principles, APEC Framework or the nine National Privacy Principles articulated by the Justice A P Shah Committee 	Report which are reflected in the Privacy Bill, 2014 in India. Fred Cate, the C. Ben Dutton Professor of Law at the Indiana University Maurer School of 	Law, effectively summarises the import of all of these privacy regimes as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"All of these data protection instruments reflect the same approach: tell individuals what data you wish to collect or use, give them a choice, grant them 	access, secure those data with appropriate technologies and procedures, and be subject to third-party enforcement if you fail to comply with these 	requirements or individuals' expressed preferences"&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This makes the individual empowered and allows them to weigh their own interests in exercising their consent. The allure of this paradigm is that in one 	elegant stroke, it seeks to "ensure that consent is informed and free and thereby also to implement an acceptable tradeoff between privacy and competing 	concerns."&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This system was originally intended to be only one of the multiple ways 	in data processing would be governed, along with other substantive principles such as data quality, however, it soon became the dominant and often the only 	mechanism.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In recent years however, the emergence of Big Data and the nascent development of the Internet of Things has led many commentators to begin questioning the workability of consent as a principle of privacy.	&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In this article we will look closely at the some of issues with the concept of 	informed consent, and how these notions have become more acute in recent years. Following an analysis of these issues, we will conclude by arguing that 	today consent, as the cornerstone of privacy law, may in fact be thought of as counter-productive and that a rethinking of a principle based approach to 	privacy may be necessary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Problems with Consent&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To a certain extent, there are some cognitive problems that have always existed with the issue of informed consent such as long and difficult to understand 	privacy notices,&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; although, in recent past with these problems have become much 	more aggravated. Fred Cate points out that FIPPs at their inception were broad principles which included both substantive and procedural aspects. However, 	as they were translated into national laws, the emphasis remained on the procedural aspect of notice and consent. From the idea of individual or societal 	welfare as the goals of privacy, the focus had shifted to individual control.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; With data collection occurring with every use of online services, and complex data sets being created, it is humanly impossible to exercise rational 	decision-making about the choice to allow someone to use our personal data. The thrust of Big Data technologies is that the value of data resides not in its primary purposes but in its numerous secondary purposes where data is re-used many times over.	&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In that sense, the very idea of Big Data conflicts with the data minimization 	principle.&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The idea is to retain as much data as possible for secondary uses. Since, these secondary uses are, by their nature, unanticipated, its runs counter to the the very idea of the purpose limitation principle.	&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The notice and consent requirement has simply led to a proliferation of long and 	complex privacy notices which are seldom read and even more rarely understood. We will articulate some issues with privacy notices which have always 	existed, and have only become more exacerbated in the context of Big Data and the Internet of Things.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Failure to read/access privacy notices &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The notice and consent principle relies on the ability of the individual to make an informed choice after reading the privacy notice. The purpose of a 	privacy notice is to act as a public announcement of the internal practices on collection, processing, retention and sharing of information and make the 	user aware of the same.&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, in order to do so the individual must first be 	able to access the privacy notices in an intelligible format and read them. Privacy notices come in various forms, ranging from documents posted as privacy policies on a website, to click through notices in a mobile app, to signs posted in public spaces informing about the presence of CCTV cameras.	&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In order for the principle of notice and consent to work, the privacy notices need to be made available in a language understood by the user. As per 	estimates, about 840 million people (11% of the world population) can speak or understand English. However, most privacy notices online are not available 	in the local language in different regions.&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Further, with the ubiquity of 	smartphones and advent of Internet of Things, constrained interfaces on mobile screens and wearables make the privacy notices extremely difficult to read. 	It must be remembered that privacy notices often run into several pages, and smaller screens effectively ensure that most users do not read through them. Further, connected wearable devices often have "little or no interfaces that readily permit choices."	&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As more and more devices are connected, this problem will only get more 	pronounced. Imagine in a world where refrigerators act as the intermediary disclosing information to your doctor or supermarket, at what point does the 	data subject step in and exercise consent.&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another aspect that needs to be understood is that unlike earlier when data collectors were far and few in between, the user could theoretically make a 	rational choice taking into account the purpose of data collection. However, in the world of Big Data, consent often needs to be provided while the user is 	trying to access services. In that context click through privacy notices such as those required to access online application, are treated simply as an 	impediment that must be crossed in order to get access to services. The fact that the consent need to be given in real time almost always results in 	disregarding what the privacy notices say.&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, some scholars have argued that while individual control over data may be appealing in theory, it merely gives an illusion of enhanced privacy but 	not the reality of meaningful choice.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Research demonstrates that the presence of 	the term 'privacy policy' leads people to the false assumption that if a company has a privacy policy in place, it automatically means presence of 	substantive and responsible limits on how data is handled.&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Joseph Turow, the 	Robert Lewis Shayon Professor of Communication at the Annenberg School for Communication, and his team for example has demonstrated how "[w]hen consumers 	see the term 'privacy policy,' they believe that their personal information will be protected in specific ways; in particular, they assume that a website 	that advertises a privacy policy will not share their personal information."&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In 	reality, however, privacy policies are more likely to serve as liability disclaimers for companies than any kind of guarantee of privacy for consumers. 	Most people tend to ignore privacy policies.&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Cass Sunstein states that our 	cognitive capacity to make choices and take decisions is limited. When faced with an overwhelming number of choices to make, most of us do not read privacy 	notices and resort to default options.&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; The requirement to make choices, sometimes several times in a day, imposes significant burden on the consumers as well the business seeking such consent.	&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Failure to understand privacy notices&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;FTC chairperson Edith Ramirez stated: "In my mind, the question is not whether consumers should be given a say over unexpected uses of their data; rather, 	the question is how to provide simplified notice and choice."&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Privacy notices 	often come in the form of long legal documents much to the detriment of the readers' ability to understand them. These policies are "long, complicated, 	full of jargon and change frequently."&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Kent walker list five problems that 	privacy notices typically suffer from - a) overkill - long and repetitive text in small print, b) irrelevance - describing situations of little concern to 	most consumers, c) opacity - broad terms the reflect the truth that is impossible to track and control all the information collected and stored, d) 	non-comparability - simplification required to achieve comparability will lead to compromising accuracy, and e) inflexibility - failure to keep pace with 	new business models.&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Erik Sherman did a review of twenty three corporate privacy 	notices and mapped them against three indices which give approximate level of education necessary to understand text on a first read. His results show that most of policies can only be understood on the first read by people of a grade level of 15 or above.	&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; FTC Chairperson Timothy Muris summed up the problem with long privacy notices when he said, "Acres of trees died to produce a blizzard of barely comprehensible privacy notices."	&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Margaret Jane Radin, the former Henry King Ransom Professor of Law Emerita at the University of Michigan, provides a good definition of free consent. It 	"involves a knowing understanding of what one is doing in a context in which it is actually&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;possible for or to do otherwise, and an affirmative action in doing something, rather&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;than a merely passive acquiescence in accepting something."&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; There have been various proposals advocating a more succinct and simpler standard for privacy notices,&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or multi-layered notices&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; or representing the information in the form of a table.	&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, studies show only an insignificant improvement in the understanding by consumers when privacy policies are represented in graphic formats like tables and labels.	&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It has also been pointed out that it is impossible to convey complex data 	policies in simple and clear language.&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Failure to anticipate/comprehend the consequences of consent&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today's infinitely complex and labyrinthine data ecosystem is beyond the comprehension of most ordinary users. Despite a growing willingness to share 	information online, most have no understanding of what happens to their data once they have uploaded it - Where it goes? Whom it is held by? Under what 	conditions? For what purpose? Or how might it be used, aggregated, hacked, or leaked in the future? For the most part, the above operations are "invisible, 	managed at distant centers, from behind the scenes, by unmanned powers."&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The perceived opportunities and benefits of Big Data have led to an acceptance of the indiscriminate collection of as much data as possible as well as the 	retention of that data for unspecified future analysis. For many advocates, such practices are absolutely essential if Big Data is to deliver on its 	promises.. Experts have argued that key privacy principles particularly those of collection limitation, data minimization and purpose limitation should not 	be applied to Big Data processing.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As mentioned above, in the case of Big Data, 	the value of the data collected comes often not from its primary purpose but from its secondary uses. Deriving value from datasets involves amalgamating 	diverse datasets and executing speculative and exploratory kinds of analysis in order to discover hidden insights and correlations that might have 	previously gone unnoticed.&lt;a href="#_ftn41" name="_ftnref41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As such organizations are today routinely reprocessing 	data collected from individuals for purposes not directly related to the services they provide to the customer. These secondary uses of data are becoming increasingly valuable sources of revenue for companies as the value of data in and of itself continues to rise.	&lt;a href="#_ftn42" name="_ftnref42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Purpose Limitation&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principle of purpose limitation has served as a key component of data protection for decades. Purposes given for the processing of users' data should 	be given at the time of collection and consent and should be "specified, explicit and legitimate". In practice however, reasons given typically include phrases such as, 'for marketing purposes' or 'to improve the user experience' that are vague and open to interpretation.	&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some commentators whilst conceding the fact that purpose limitation in the era of Big Data may not be possible have instead attempted to emphasise the 	notion of 'compatible use' requirements. In the view of Working Party on the protection of individuals with regard to the processing of person data, for 	example, use of data for a purpose other than that originally stated at the point of collection should be subject to a case-by-case review of whether not 	further processing for different purpose is justifiable - i.e., compatible with the original purpose. Such a review may take into account for example, the 	context in which the data was originally collected, the nature or sensitivity of the data involved, and the existence of relevant safeguards to insure fair 	processing of the data and prevent undue harm to the data subject.&lt;a href="#_ftn44" name="_ftnref44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, Big Data advocates have argued that an assessment of legitimate interest rather than compatibility with the initial purpose is far 	better suited to Big Data processing.&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; They argue that today the notion of purpose 	limitation has become outdated. Whereas previously data was collected largely as a by-product of the purpose for which it was being collected. If for 	example, we opted to use a service the information we provided was for the most part necessary to enable the provision of that service. Today however, the 	utility of data is no longer restricted to the primary purpose for which it is collected but can be used to provide all kinds of secondary services and 	resources, reduce waste, increase efficiency and improve decision-making.&lt;a href="#_ftn46" name="_ftnref46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These 	kinds of positive externalities, Big Data advocates insist, are only made possible by the reprocessing of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately for the notion of consent the nature of these secondary purposes are rarely evident at the time of collection. Instead the true value of the 	data can often only be revealed when it is amalgamated with other diverse datasets and subjected to various forms of analysis to help reveal hidden and 	non-obvious correlations and insights.&lt;a href="#_ftn47" name="_ftnref47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The uncertain and speculative value of 	data therefore means that it is impossible to provide "specific, explicit, and legitimate" details about how a given data set will be used or how it might 	be aggregated in future. Without this crucial information data subjects have no basis upon which they can make an informed decision about whether or not to 	provide consent. Robert Sloan and Richard Warner argue that it is impossible for a privacy notice to contain enough information to enable free consent. 	They argue that current data collection practices are highly complex and that these practices involve collection of information at one stage for one purpose and then retain, analyze, and distribute it for a variety of other purposes in unpredictable ways.	&lt;a href="#_ftn48" name="_ftnref48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Helen Nissenbaum points to the ever changing nature of data flow and the 	cognitive challenges it poses. "Even if, for a given moment, a&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;snapshot of the information flows could be grasped, the realm is in constant flux, with new firms entering the picture, new analytics, and new back end contracts forged: in other words, we are dealing with a recursive capacity that is indefinitely extensible."	&lt;a href="#_ftn49" name="_ftnref49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Scale and Aggregation&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today the quantity of data being generated is expanding at an exponential rate. From smartphones and televisions, trains and airplanes, sensor-equipped 	buildings and even the infrastructures of our cities, data now streams constantly from almost every sector and function of daily life, 'creating countless 	new digital puddles, lakes, tributaries and oceans of information'.&lt;a href="#_ftn50" name="_ftnref50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In 2011 it 	was estimated that the quantity of data produced globally would surpass 1.8 zettabytes , by 2013 that had grown to 4 zettabytes , and with the nascent development of the Internet of Things gathering pace, these trends are set to continue.	&lt;a href="#_ftn51" name="_ftnref51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Big Data by its very nature requires the collection and processing of very large 	and very diverse data sets. Unlike other forms scientific research and analysis which utilize various sampling techniques to identify and target the types 	of data most useful to the research questions, Big Data instead seeks to gather as much data as possible, in order to achieve full resolution of the 	phenomenon being studied, a task made much easier in recent years as a result of the proliferation of internet enabled devices and the growth of the 	Internet of Things. This goal of attaining comprehensive coverage exists in tension however with the key privacy principles of collection limitation and data minimization which seek to limit both the quantity and variety of data collected about an individual to the absolute minimum.	&lt;a href="#_ftn52" name="_ftnref52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dilution of the purpose limitation principle entails that even those who understand privacy notices and are capable of making rational choices about 	it, cannot conceptualize how their data will be aggregated and possibly used or re-used. Seemingly innocuous bits of data revealed at different stages 	could be combined to reveal sensitive information about the individual. Daniel Solove, the John Marshall Harlan Research Professor of Law at the George 	Washington University Law School, in his book, "The Digital Person", calls it the aggregation effect. He argues that the ingenuity of the data mining techniques and the insights and predictions that could be made by it render any cost-benefit analysis that an individual could make ineffectual.	&lt;a href="#_ftn53" name="_ftnref53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Failure to opt-out&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The traditional choice against the collection of personal data that users have had access to, at least in theory, is the option to 'opt-out' of certain 	services. This draws from the free market theory that individuals exercise their free will when they use services and always have the option of opting out, 	thus, arguing against regulation but relying on the collective wisdom of the market to weed out harms. The notion that the provision of data should be a 	matter of personal choice on the part of the individual and that the individual can, if they chose decide to 'opt-out' of data collection, for example by 	ceasing use of a particular service, is an important component of privacy and data protection frameworks. The proliferation of internet-enabled devices, 	their integration into the built environment and the real-time nature of data collection and analysis however are beginning to undermine this concept. For 	many critics of Big Data, the ubiquity of data collection points as well as the compulsory provision of data as a prerequisite for the access and use of many key online services, is making opting-out of data collection not only impractical but in some cases impossible.	&lt;a href="#_ftn54" name="_ftnref54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whilst sceptics may object that individuals are still free to stop using services that require data. As online connectivity becomes increasingly important to participation in modern life, the choice to withdraw completely is becoming less of a genuine choice.	&lt;a href="#_ftn55" name="_ftnref55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Information flows not only from the individuals it is about but also from what 	other people say about them. Financial transactions made online or via debit/credit cards can be analysed to derive further information about the 	individual. If opting-out makes you look anti-social, criminal, or unethical, the claims that we are exercising free will seems murky and leads one to 	wonder whether we are dealing with coercive technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another issue with the consent and opt-out paradigm is the binary nature of the choice. This binary nature of consent makes a mockery of the notion that 	consent can function as an effective tool of personal data management. What it effectively means is that one can either agree with the long privacy 	notices, or choose to abandon the desired service. "This binary choice is not what the privacy architects envisioned four decades ago when they imagined 	empowered individuals making informed decisions about the processing of their personal data. In practice, it certainly is not the optimal mechanism to ensure that either information privacy or the free flow of information is being protected."	&lt;a href="#_ftn56" name="_ftnref56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Conclusion: 'Notice and Consent' is counter-productive&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There continues to be an unwillingness amongst many privacy advocates to concede that the concept of consent is fundamentally broken, as Simon Davies, a 	privacy advocate based in London, comments 'to do so could be seen as giving ground to the data vultures', and risks further weakening an already 	dangerously fragile privacy framework.&lt;a href="#_ftn57" name="_ftnref57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Nevertheless, as we begin to transition 	into an era of ubiquitous data collection, evidence is becoming stronger that consent is not simply ineffective, but may in some instances might be 	counter-productive to the goals of privacy and data protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As already noted, the notion that privacy agreements produce anything like truly informed consent has long since been discredited; given this fact, one may 	ask for whose benefit such agreements are created? One may justifiably argue that far from being for the benefit and protection of users, privacy agreement 	may in fact be fundamentally to the benefit of data brokers, who having gained the consent of users can act with near impunity in their use of the data 	collected. Thus, an overly narrow focus on the necessity of consent at the point of collection, risks diverting our attention from the arguably more important issue of how our data is stored, analysed and distributed by data brokers following its collection.	&lt;a href="#_ftn58" name="_ftnref58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, given the often complicated and cumbersome processes involved in gathering consent from users, some have raised concerns that the mechanisms 	put in place to garner consent could themselves morph into surveillance mechanisms. Davies, for example cites the case of the EU Cookie Directive, which 	required websites to gain consent for the collection of cookies. Davies observes how, 'a proper audit and compliance element in the system could require 	the processing of even more data than the original unregulated web traffic. Even if it was possible for consumers to use some kind of gateway intermediary 	to manage the consent requests, the resulting data collection would be overwhelming''. Thus in many instances there exists a fundamental tension between the requirement placed on companies to gather consent and the equally important principle of data minimization.	&lt;a href="#_ftn59" name="_ftnref59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the above issues with notice and informed consent in the context of information privacy, and the fact that it is counterproductive to the larger 	goals of privacy law, it is important to revisit the principle or rights based approach to data protection, and consider a paradigm shift where one moves 	to a risk based approach that takes into account the actual threats of sharing data rather than relying on what has proved to be an ineffectual system of 	individual control. We will be dealing with some of these issues in a follow up to this article.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Alan Westin, Privacy and Freedom, Atheneum, New York, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; FTC Fair Information Practice Principles (FIPP) available at			&lt;a href="https://www.it.cornell.edu/policies/infoprivacy/principles.cfm"&gt;https://www.it.cornell.edu/policies/infoprivacy/principles.cfm&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Paul M. Schwartz, "Privacy and Democracy in Cyberspace," 52 Vanderbilt Law Review 1607, 1614 (1999).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; US Secretary's Advisory Committee on Automated Personal Data Systems, Records, Computers and the Rights of Citizens, available at			&lt;a href="http://www.justice.gov/opcl/docs/rec-com-rights.pdf"&gt;http://www.justice.gov/opcl/docs/rec-com-rights.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="https://epic.org/privacy/ppsc1977report/c13.htm"&gt;https://epic.org/privacy/ppsc1977report/c13.htm&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Marc Rotenberg, "Fair Information Practices and the Architecture of Privacy: What Larry Doesn't Get," available at 			&lt;a href="https://journals.law.stanford.edu/sites/default/files/stanford-technology-law-review/online/rotenberg-fair-info-practices.pdf"&gt; https://journals.law.stanford.edu/sites/default/files/stanford-technology-law-review/online/rotenberg-fair-info-practices.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Fred Cate, The Failure of Information Practice Principles, available at			&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1156972"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1156972&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Robert Sloan and Richard Warner, Beyong Notice and Choice: Privacy, Norms and Consent, 2014, available at 			&lt;a href="https://www.suffolk.edu/documents/jhtl_publications/SloanWarner.pdf"&gt; https://www.suffolk.edu/documents/jhtl_publications/SloanWarner.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Fred Cate, Viktor Schoenberger, Notice and Consent in a world of Big Data, available at			&lt;a href="http://idpl.oxfordjournals.org/content/3/2/67.abstract"&gt;http://idpl.oxfordjournals.org/content/3/2/67.abstract&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Daniel Solove, Privacy self-management and consent dilemma, 2013 available at 			&lt;a href="http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications"&gt; http://scholarship.law.gwu.edu/cgi/viewcontent.cgi?article=2093&amp;amp;context=faculty_publications &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ben Campbell, Informed consent in developing countries: Myth or Reality, available at 			&lt;a href="https://www.dartmouth.edu/~ethics/docs/Campbell_informedconsent.pdf"&gt; https://www.dartmouth.edu/~ethics/docs/Campbell_informedconsent.pdf &lt;/a&gt; ;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Viktor Mayer Schoenberger and Kenneth Cukier, Big Data: A Revolution that will transform how we live, work and think" John Murray, London, 2013 at 			153.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Data Minimization principle requires organizations to limit the collection of personal data to the minimum extent necessary to obtain their 			legitimate purpose and to delete data no longer required.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Omer Tene and Jules Polonetsky, "Big Data for All: Privacy and User Control in the Age of Analytics," SSRN Scholarly Paper, available at			&lt;a href="http://papers.ssrn.com/abstract=2149364"&gt;http://papers.ssrn.com/abstract=2149364&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Florian Schaub, R. Balebako et al, "A Design Space for effective privacy notices" available at 			&lt;a href="https://www.usenix.org/system/files/conference/soups2015/soups15-paper-schaub.pdf"&gt; https://www.usenix.org/system/files/conference/soups2015/soups15-paper-schaub.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Daniel Solove, The Digital Person: Technology and Privacy in the Information Age, NYU Press, 2006.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.ethnologue.com/statistics/size"&gt;http://www.ethnologue.com/statistics/size&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Opening Remarks of FTC Chairperson Edith Ramirez Privacy and the IoT: Navigating Policy Issues International Consumer Electronics Show Las Vegas, 			Nevada January 6, 2015 available at 			&lt;a href="https://www.ftc.gov/system/files/documents/public_statements/617191/150106cesspeech.pdf"&gt; https://www.ftc.gov/system/files/documents/public_statements/617191/150106cesspeech.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/"&gt; http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Chris Jay Hoofnagle &amp;amp; Jennifer King, Research Report: What Californians Understand&lt;/p&gt;
&lt;p&gt;About Privacy Online, available at &lt;a href="http://ssrn.com/abstract=1262130"&gt;http://ssrn.com/abstract=1262130&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Joseph Turrow, Michael Hennesy, Nora Draper, The Tradeoff Fallacy, available at 			&lt;a href="https://www.asc.upenn.edu/sites/default/files/TradeoffFallacy_1.pdf"&gt; https://www.asc.upenn.edu/sites/default/files/TradeoffFallacy_1.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Saul Hansell, "Compressed Data: The Big Yahoo Privacy Storm That Wasn't," New York Times, May 13, 2002 available at 			&lt;a href="http://www.nytimes.com/2002/05/13/business/compressed-data-the-big-yahoo-privacy-storm-that-wasn-t.html?_r=0"&gt; http://www.nytimes.com/2002/05/13/business/compressed-data-the-big-yahoo-privacy-storm-that-wasn-t.html?_r=0 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; Cass Sunstein, Choosing not to choose: Understanding the Value of Choice, Oxford University Press, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For example, Acxiom, processes more than 50 trillion data transactions a year. 			&lt;a href="http://www.nytimes.com/2012/06/17/technology/acxiom-the-quiet-giant-of-consumer-database-marketing.html?pagewanted=all&amp;amp;_r=0"&gt; http://www.nytimes.com/2012/06/17/technology/acxiom-the-quiet-giant-of-consumer-database-marketing.html?pagewanted=all&amp;amp;_r=0 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Opening Remarks of FTC Chairperson Edith Ramirez Privacy and the IoT: Navigating Policy Issues International Consumer Electronics Show Las Vegas, 			Nevada January 6, 2015 available at 			&lt;a href="https://www.ftc.gov/system/files/documents/public_statements/617191/150106cesspeech.pdf"&gt; https://www.ftc.gov/system/files/documents/public_statements/617191/150106cesspeech.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; L. F. Cranor. Necessary but not sufficient: Standardized mechanisms for privacy notice and choice. Journal on Telecommunications and High Technology Law, 10:273, 2012, available at			&lt;a href="http://jthtl.org/content/articles/V10I2/JTHTLv10i2_Cranor.PDF"&gt;http://jthtl.org/content/articles/V10I2/JTHTLv10i2_Cranor.PDF&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Kent Walker, The Costs of Privacy, 2001 available at 			&lt;a href="https://www.questia.com/library/journal/1G1-84436409/the-costs-of-privacy"&gt; https://www.questia.com/library/journal/1G1-84436409/the-costs-of-privacy &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Erik Sherman, "Privacy Policies are great - for Phds", CBS News, available at			&lt;a href="http://www.cbsnews.com/news/privacy-policies-are-great-for-phds/"&gt;http://www.cbsnews.com/news/privacy-policies-are-great-for-phds/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Timothy J. Muris, Protecting Consumers' Privacy: 2002 and Beyond, available at			&lt;a href="http://www.ftc.gov/speeches/muris/privisp1002.htm"&gt;http://www.ftc.gov/speeches/muris/privisp1002.htm&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Margaret Jane Radin, Humans, Computers, and Binding Commitment, 1999 available at			&lt;a href="http://www.repository.law.indiana.edu/ilj/vol75/iss4/1/"&gt;http://www.repository.law.indiana.edu/ilj/vol75/iss4/1/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Annie I. Anton et al., Financial Privacy Policies and the Need for Standardization, 2004 available at			&lt;a href="https://ssl.lu.usi.ch/entityws/Allegati/pdf_pub1430.pdf"&gt;https://ssl.lu.usi.ch/entityws/Allegati/pdf_pub1430.pdf&lt;/a&gt;; Florian Schaub, R. 			Balebako et al, "A Design Space for effective privacy notices" available at 			&lt;a href="https://www.usenix.org/system/files/conference/soups2015/soups15-paper-schaub.pdf"&gt; https://www.usenix.org/system/files/conference/soups2015/soups15-paper-schaub.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Center for Information Policy Leadership, Hunton &amp;amp; Williams LLP, "Ten Steps To Develop A Multi-Layered Privacy Notice" available at 			&lt;a href="https://www.informationpolicycentre.com/files/Uploads/Documents/Centre/Ten_Steps_whitepaper.pdf"&gt; https://www.informationpolicycentre.com/files/Uploads/Documents/Centre/Ten_Steps_whitepaper.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Allen Levy and Manoj Hastak, Consumer Comprehension of Financial Privacy Notices, Interagency Notice Project, available at			&lt;a href="https://www.sec.gov/comments/s7-09-07/s70907-21-levy.pdf"&gt;https://www.sec.gov/comments/s7-09-07/s70907-21-levy.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Patrick Gage Kelly et al., Standardizing Privacy Notices: An Online Study of the Nutrition Label Approach available at 			&lt;a href="https://www.ftc.gov/sites/default/files/documents/public_comments/privacy-roundtables-comment-project-no.p095416-544506-00037/544506-00037.pdf"&gt; https://www.ftc.gov/sites/default/files/documents/public_comments/privacy-roundtables-comment-project-no.p095416-544506-00037/544506-00037.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Howard Latin, "Good" Warnings, Bad Products, and Cognitive Limitations, 41 UCLA Law Review available at 			&lt;a href="https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&amp;amp;crawlid=1&amp;amp;srctype=smi&amp;amp;srcid=3B15&amp;amp;doctype=cite&amp;amp;docid=41+UCLA+L.+Rev.+1193&amp;amp;key=1c15e064a97759f3f03fb51db62a79a5"&gt; https://litigation-essentials.lexisnexis.com/webcd/app?action=DocumentDisplay&amp;amp;crawlid=1&amp;amp;srctype=smi&amp;amp;srcid=3B15&amp;amp;doctype=cite&amp;amp;docid=41+UCLA+L.+Rev.+1193&amp;amp;key=1c15e064a97759f3f03fb51db62a79a5 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Jonathan Obar, Big Data and the Phantom Public: Walter Lippmann and the fallacy of data privacy self management, Big Data and Society, 2015, available at&lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239188"&gt; &lt;/a&gt; &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239188"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2239188&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Viktor Mayer Schoenberger and Kenneth Cukier, Big Data: A Revolution that will transform how we live, work and think" John Murray, London, 2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 15.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 40.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Article 29 Working Party, (2013) Opinion 03/2013 on Purpose Limitation, Article 29, available at: 			&lt;a href="http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp203_en.pdf"&gt; http://ec.europa.eu/justice/data-protection/article-29/documentation/opinion-recommendation/files/2013/wp203_en.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It remains unclear however whose interest would be accounted, existing EU legislation would allow commercial/data broker/third party interests to 			trump those of the user, effectively allowing re-processing of personal data irrespective of whether that processing would be in the interest of 			the user.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 40.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Robert Sloan and Richard Warner, Beyong Notice and Choice: Privacy, Norms and Consent, 2014, available at 			&lt;a href="https://www.suffolk.edu/documents/jhtl_publications/SloanWarner.pdf"&gt; https://www.suffolk.edu/documents/jhtl_publications/SloanWarner.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Helen Nissenbaum, A Contextual Approach to Privacy Online, available at			&lt;a href="http://www.amacad.org/publications/daedalus/11_fall_nissenbaum.pdf"&gt;http://www.amacad.org/publications/daedalus/11_fall_nissenbaum.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; D Bollier, The Promise and Peril of Big Data. The Aspen Institute, 2010, available at: 			&lt;a href="http://www.aspeninstitute.org/sites/default/files/content/docs/pubs/The_Promise_and_Peril_of_Big_Data.pdf"&gt; http://www.aspeninstitute.org/sites/default/files/content/docs/pubs/The_Promise_and_Peril_of_Big_Data.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Meeker, M. &amp;amp; Yu, L. Internet Trends, Kleiner Perkins Caulfield Byers, (2013),			&lt;a href="http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013"&gt;http://www.slideshare.net/kleinerperkins/kpcb-internet-trends-2013&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 40.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 17.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Janet Vertasi, My Experiment Opting Out of Big Data Made Me Look Like a Criminal, 2014, available at			&lt;a href="http://time.com/83200/privacy-internet-big-data-opt-out/"&gt;http://time.com/83200/privacy-internet-big-data-opt-out/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://www.techpolicy.com/NoticeConsent-inWorldBigData.aspx"&gt;http://www.techpolicy.com/NoticeConsent-inWorldBigData.aspx&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Simon Davies, Why the idea of consent for data processing is becoming meaningless and dangerous, available at 			&lt;a href="http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/"&gt; http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; Note 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Simon Davies, Why the idea of consent for data processing is becoming meaningless and dangerous, available at 			&lt;a href="http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/"&gt; http://www.privacysurgeon.org/blog/incision/why-the-idea-of-consent-for-data-processing-is-becoming-meaningless-and-dangerous/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy'&gt;https://cis-india.org/internet-governance/blog/a-critique-of-consent-in-information-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha and Scott Mason</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-18T02:20:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu">
    <title>A Critical Look at the Visual Representation of Cybersecurity</title>
    <link>https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and design collective Design Beku came together on the 15th of November for a workshop on Illustrations and Visual Representations of Cybersecurity. Images in the public sphere such as visuals in the media, Wikipedia commons, and stock images - play a vital role in the public’s perception of cybercrime and cybersecurity. &lt;/b&gt;
        
&lt;ul&gt;
&lt;li&gt;Edited by Karan Saini / Illustrations by - Paul Anthony George, and Roshan Shakeel&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Download the &lt;a class="external-link" href="https://cis-india.org/internet-governance/files/critical-look-at-visual-representation-of-cybersecurity/"&gt;file here&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;The existing imagery comprises of largely stereotypical images of silhouettes of men in hoodies, binary codes, locks, shields; all in dark tones of blue and green. The workshop aimed at identifying the concerns with these existing images and ideating on creating visuals that capture the nuanced concepts within cybersecurity as well as to contextualise them for the Global South. It began with a discussion on the various concepts within cybersecurity including disinformation, surveillance in the name of security, security researchers, regulation of big technology companies, gender and cybersecurity, etc. This was followed by a mapping of different visual elements in the existing cybersecurity imagery to infer the biases in them. Further, an ideation session was conducted to create alternate visualisations that counter these biases. A detailed report of the workshop can be read &lt;a href="https://cis-india.org/internet-governance/workshop-on-cyber-security-illustrations"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants began by discussing the concerning impacts of present visualisations – there is a lack of representation and context of the global south. Misrepresentation of cybersecurity leads people to be susceptible to disinformation, treats cybercrime as an abstract concept that does not have a direct impact, and oversimplifies the problem and its solutions. The ecosystem in which this imagery exists also presented a larger issue. A majority of the images are created as clickbait alongside media articles. Media houses thus benefit from the oversimplification and mystification of cybersecurity in such images.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Through the mapping of existing images present online, several concerns were identified. The vague elements and unclear representation add to the mystification of cybersecurity as a concept. In present depictions, the use of technological devices and objects, leads to the lack of a human element, distancing the threat from any real impact to people using these devices. The metaphor of a physical threat is often used to depict cybersecurity using elements such as a lock and key. Recurring use of these elements gives a false idea of what is being secured or breached and how. Representations rely on tropes regarding the identity of hackers, and fail to capture the vulnerability of the system. The imagery gives the impression that systems which are breached are immensely secure to begin with and are compromised&amp;nbsp; only as a result of sophisticated attacks carried out by malicious actors. The identity of hackers is commonly associated with cyber attacks and breaches, and the existing imagery reinforces this. Visuals showing a masked man or a silhouette of a man in dark background are the usual markers of a malicious hacker in conventional cybersecurity imagery. While there is a lack of representation of women in stock cybersecurity images, another trope found was that of a cheerful woman coder. There were also images of faceless women with laptops&lt;a name="_ftnref1" href="#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The reductive nature of these images point to deeper concerns around gender representation in cybersecurity.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The participants examined what the implications of such visual representation would be, and why there is a need to change the imagery. How can visual depictions be more representative? Can they avoid subscribing to a homogenised idea of an Indian context – specific without being reductive? Can better depiction broaden understanding of cybercrime and emphasize the proximity of those threats? With technology, concepts are often understood through metaphors – how data is explained impacts how people perceive it. Visual imagery can play a critical role in demystifying concepts when done well; illustrations can change the discourse. They must begin to incorporate intersecting aspects of gender, privacy, susceptibility of vulnerable populations, generational and cultural gaps, as well as&amp;nbsp; manifestations of the described crimes to make technological laypersons more aware of the threat.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Potential new imagery would need to address aspects such as disinformation, the importance of privacy and who has a right to it, change representation of hackers, depict the cybersecurity community, explain specific concepts to both – the general user and to the people part of cybersecurity efforts in the country, the implications of cybercrime on vulnerable populations, and more in an attempt to deconstruct and disseminate what cybersecurity looks like today.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The ideation session involved rethinking specific concepts such as disinformation, and ethical hacking to create alternate imagery. For instance, disinformation was visually imagined as a distortion of an already distorted message being perceived by the viewer. In order to bring attention to the impact of devices, a phone was thought of as a central object to which different concepts of cybersecurity can be connected.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;img src="https://cis-india.org/home-images/FakeNewsCascade.jpg" alt="null" class="image-inline" title="Fake News Cascade" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘Fake News Cascade’ by Paul Anthony George&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/FakeNews.jpg" alt="null" class="image-inline" title="Fake News" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘Fake News’ by Paul Anthony George&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Disinformation1.jpg" alt="null" class="image-inline" title="Disinformation 1" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Disinformation2.jpg" alt="null" class="image-inline" title="Disinformation 2" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘Disinformation/ Fake News’&amp;nbsp; by Roshan Shakeel; The sketch is about questioning the validity of what we see online, and that every message we see is constructed in some form or the other by someone else.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;img src="https://cis-india.org/home-images/Disinformation3.jpg" alt="null" class="image-inline" title="Disinformation 3" /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘Disinformation/ Fake News’&amp;nbsp; by Roshan Shakeel; &lt;/em&gt;The sketch visualizes how the source of information ('the original') gets distorted after a certain point.&lt;/p&gt;
&lt;p&gt;For ethical hacking, a visualisation depicting a day in the life of an ethical hacker was thought of to normalize hacking and to focus on their contribution in security research.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/ADayinLife.jpg" alt="null" class="image-inline" title="A Day in Life" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;‘A Day in the Life of an Indian Hacker’ by Paul Anthony George&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;&lt;img src="https://cis-india.org/home-images/SurveillanceinthenameofSecurity.jpg" alt="null" class="image-inline" title="Surveillance in the name of Security" /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;'Surveillance in the Name of Security' by&lt;/em&gt; &lt;em&gt;Roshan Shakeel&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Resources on ethical hacking (HackerOne)&lt;a name="_ftnref2" href="#_ftn2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; and hacker culture (2600.com)&lt;a name="_ftnref3" href="#_ftn3"&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/a&gt; were also consulted as part of the exercise to gather references on the work done by hackers. This allowed a deeper understanding of how the hacker community depicts itself.&amp;nbsp; Check Point Research&lt;a name="_ftnref4" href="#_ftn4"&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/a&gt; and Kerala Police Cyberdome&lt;a name="_ftnref5" href="#_ftn5"&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/a&gt; were also examined for further insight into cybersecurity.&amp;nbsp; With regard to gender representation, sources that use visual techniques to communicate concerns and advocacy campaigns were also referred to. The Gendering Surveillance&lt;a name="_ftnref6" href="#_ftn6"&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/a&gt; initiative by the Internet Democracy project&lt;a name="_ftnref7" href="#_ftn7"&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/a&gt;, which looks at how surveillance harms and restricts women, also offered insights on the use of illustrations supporting the case studies. Another reference was the "Visualising Women's Rights in the Arab World"&lt;a name="_ftnref8" href="#_ftn8"&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/a&gt; project by the Tactical Technology Collective&lt;a name="_ftnref9" href="#_ftn10"&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/a&gt;. The project aims to “strengthen the use of visual techniques by women's rights advocates in the Arab world, and to build a network of women with these skills”.&lt;a name="_ftnref10" href="#_ftn10"&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;More visual explainers and animations&lt;a name="_ftnref11" href="#_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; from the Tactical Technology Collective were noted for their broader engagement with digital security and privacy. A video by the Internet Democracy Project that explains the Internet through &lt;em&gt;rangoli&lt;/em&gt;&lt;a name="_ftnref12" href="#_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, was observed specifically for setting the concept in Indian context through the use of aesthetics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The workshop concluded with a discussion of potential visual iterations – imagery of cybersecurity that is not technology-oriented but focussed on the behavioural implications of access to such technology, illustrated public service announcements enhancing the profile of cybersecurity researchers or the everyday hacker. The impact of the discussion itself can indicate the relevance of such an effort. Artists and designers can be encouraged to create a body of imagery that shifts discourse and perception, to begin visualising for advocacy, demystify and stop the abstraction of cybercrime that can lead to a false sense of security, incorporate unique aspects of the debate within the Indian context, and generate new dialogue and understanding of cybersecurity. A potential step forward from this workshop would be to engage with the design community at large along with the domain experts to create more effective imagery for cybersecurity.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.hackerone.com/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://2600.com/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://research.checkpoint.com/about-us/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.cyberdome.kerala.gov.in/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://genderingsurveillance.internetdemocracy.in/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://internetdemocracy.in/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://visualrights.tacticaltech.org/index.html&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://tacticaltech.org/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://visualrights.tacticaltech.org/content/about-website.html&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://tacticaltech.org/projects/survival-in-the-digital-age-ono-robot-2012/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://internetdemocracy.in/2018/08/dots-and-connections/&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; https://www.independent.co.uk/life-style/gadgets-and-tech/features/women-in-tech-its-time-to-drop-the-old-stereotypes-7608794.html&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu'&gt;https://cis-india.org/internet-governance/blog/paromita-bathija-padmini-ray-murray-and-saumyaa-naidu&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Paromita Bathija, Padmini Ray Murray, and Saumyaa Naidu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-08-21T08:00:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/compilation-of-research-on-data-protection">
    <title>A Compilation of Research on the PDP Bill</title>
    <link>https://cis-india.org/internet-governance/blog/compilation-of-research-on-data-protection</link>
    <description>
        &lt;b&gt;The most recent step in India’s initiative to create an effective and comprehensive Data Protection regime was the call for comments to the Personal Data Protection Bill, 2019, which closed last month. Leading up to the comments, CIS has published numerous research pieces with the goal of providing a comprehensive overview of how this legislation would place India within the global scheme, and how the local situation has developed, as well as analysing its impacts on citizens’ rights.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In addition to general and clause-by-clause comments and recommendations, we
 have compiled an annotated version of the Personal Data Protection 
Bill, which lays out our &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019"&gt;commentary&lt;/a&gt; in an easy-to-follow format.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/pdp-bill-compilation-post-image/" alt="null" width="100%" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Below, you can find our other recent research on Data Protection:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Pallavi Bedi has put together a &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/divergence-between-the-general-data-protection-regulation-and-the-personal-data-protection-bill-2019"&gt;note&lt;/a&gt; on the Divergence between EU’s General Data Protection Regulation (GDPR) and the Personal Data Protection Bill.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;In addition, Pallavi has also &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/comparison-of-the-personal-data-protection-bill-with-the-general-data-protection-regulation-and-the-california-consumer-protection-act-2"&gt;contrasted&lt;/a&gt; the Personal Data Protection Bill with the GDPR and California Consumer Protection Act, in the contexts of jurisdiction and scope, rights of the data principal, obligations of data fiduciaries, exemptions, data protection authority, and breach of personal data. &lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;On IAPP’s blog &lt;em&gt;Privacy Perspectives&lt;/em&gt;, D. Shweta Reddy has &lt;a class="external-link" href="https://iapp.org/news/a/grade-sheet-for-indias-adequacy-status/"&gt;assessed&lt;/a&gt; whether the Personal Data Protection Bill 2019 is sufficient for India to receive adequacy status from the EU.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;Along with Justin Sherman, Arindrajit Basu has &lt;a class="external-link" href="https://www.lawfareblog.com/key-global-takeaways-indias-revised-personal-data-protection-bill"&gt;outlined&lt;/a&gt; the key global takeaways from the Personal Data Protection Bill 2019 on &lt;em&gt;Lawfare&lt;/em&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;On &lt;em&gt;The Diplomat&lt;/em&gt;, Arindrajit has also &lt;a class="external-link" href="https://thediplomat.com/2020/01/the-retreat-of-the-data-localization-brigade-india-indonesia-and-vietnam/"&gt;traced&lt;/a&gt; the narrowing localization provisions in India, as well as Vietnam and Indonesia, and studied the actors and geopolitical tussle that has shaped these provisions.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;Through a string of publicly available submissions, press statements, and other media reports, Arindrajit and Amber Sinha have &lt;a class="external-link" href="https://www.epw.in/engage/article/politics-indias-data-protection-ecosystem"&gt;tracked&lt;/a&gt; the political evolution of the data protection ecosystem in India, and how this has, and will continue to impact legislative and policy developments on &lt;em&gt;EPW Engage&lt;/em&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;Gurshabad Grover and Tanaya Rajwade have &lt;a class="external-link" href="https://thewire.in/tech/indias-privacy-bill-regulates-social-media-platforms"&gt;written&lt;/a&gt; on &lt;em&gt;The Wire&lt;/em&gt; about how the Personal Data Protection Bill regulates social media.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;Amber was also a guest on &lt;em&gt;Suno India’s &lt;a class="external-link" href="https://www.sunoindia.in/cyber-democracy/personal-data-protection-bill-what-does-it-mean-for-your-right-to-privacy/"&gt;Cyber Democracy podcast&lt;/a&gt;&lt;/em&gt;, with Srinivas Kodali, to discuss how the latest version of the Personal Data Protection Bill will impact the right to privacy.
&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/compilation-of-research-on-data-protection'&gt;https://cis-india.org/internet-governance/blog/compilation-of-research-on-data-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>internet governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2020-03-05T08:04:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
