<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/internet-governance/blog/online-anonymity/search_rss">
  <title>We are anonymous, we are legion</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 981 to 995.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/t-20-mumbai-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/outlook-february-24-2017-is-your-aadhar-biometrics-safe-firms-accused-of-storing-biometrics-and-using-them-illegally"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/idg-cio-february-21-2017-john-ribeiro-linkedin-will-help-people-in-india-train-for-semi-skilled-jobs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-gaps-in-indias-digital-india-project"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-in-governance-in-india-case-studies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/frontline-v-sridhar-march-3-2017-digital-illusions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/mashable-india-february-14-2017-india-aadhaar-uidai-privacy-security-debate"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/biometric-update-february-9-2017-rawlson-king-indian-public-concerned-about-fingerprint-payment-scheme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/ranking-digital-rights-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar">
    <title>Can the Judiciary Upturn the Lok Sabha Speaker’s Decision on Aadhaar?</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar</link>
    <description>
        &lt;b&gt;When ruling on the petition filed by Jairam Ramesh challenging passing the Aadhaar Act as a money Bill, the court has differing precedents to look at.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="https://thewire.in/110795/aadhaar-money-bill-judiciary/"&gt;published in the Wire&lt;/a&gt; on February 21, 2017.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In &lt;a href="http://thewire.in/2016/04/24/the-aadhaar-act-is-not-a-money-bill-31297/" target="_blank" title="an earlier article"&gt;an earlier article&lt;/a&gt;, I had argued that the characterisation of the &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=5&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0ahUKEwj0xo6U_KDSAhVHLo8KHcygCVEQFggvMAQ&amp;amp;url=https%3A%2F%2Fuidai.gov.in%2Fimages%2Fthe_aadhaar_act_2016.pdf&amp;amp;usg=AFQjCNHDmJKdO8jdfGZJKLKRJQpHdf1Frw&amp;amp;sig2=B_YbWncu6eyZHJ1MFTD0NA" rel="external nofollow" target="_blank" title="Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act"&gt;Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act&lt;/a&gt;,  as a money Bill by Sumitra Mahajan, speaker of the Lok Sabha, was  erroneous. Specifically, I had argued that upon perusal of Article 110  (1) of the constitution, the Aadhaar Act does not satisfy the conditions  required of a money Bill. For a legislation to be classified as a money  Bill, it must comprise of ‘only’ provisions dealing with the following  matters: (a) imposition, regulation and abolition of any tax, (b)  borrowing or other financial obligations of the government of India, (c)  custody, withdrawal from or payment into the Consolidated Fund of India  (CFI) or Contingent Fund of India, (d) appropriation of money out of  CFI, (e) expenditure charged on the CFI or (f) receipt or custody or  audit of money into CFI or public account of India; or (g) any matter  incidental to any of the matters specified in sub-clauses (a) to (f).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 110 is modelled on Section 1(2) of the UK’s Parliament Act, 1911, which also defines money Bills as those only dealing with certain enumerated matters. The use of the word ‘only’ was brought up by Ghanshyam Singh Gupta during the constituent assembly debates. He pointed out that the use of the word ‘only’ limits the scope money Bills to only those legislations which did not deal with other matters. His amendment to delete the word ‘only’ was rejected, clearly establishing the intent of the framers of the constitution to keep the ambit of money Bills extremely narrow. G.V. Mavalankar, the first speaker of Lok Sabha, had stated that the word ‘only’ must not be construed so as to give an overly restrictive meaning. For instance, a Bill which deals with taxation could have provisions which deal with the administration of the tax. The finance minister, Arun Jaitley, referred to these words by Mavalankar, justifying the classification of the Aadhaar Act as a money Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Aadhaar Bill does makes references to benefits, subsidies and services funded by the CFI, even a cursory reading of the Bill reveals its main objectives as creating a right to obtain a unique identification number and providing for a statutory apparatus to regulate the entire process. Any reasonable reading of the legislation would be hard pressed to view all provisions in the Aadhaar Act, aside from the one creating a charge on the CFI, as merely administrative provisions incidental to the creation such charge. The mere fact of establishing the Aadhaar number as the identification mechanism for benefits and subsidies funded by the CFI does not give it the character of a money Bill. The Bill merely speaks of facilitating access to unspecified subsidies and benefits rather than their creation and provision being the primary object of the legislation. Erskine May’s seminal textbook, Parliamentary Practice, is instructive in this respect and makes it clear that a legislation which simply makes a charge on the consolidated fund does not becomes a money Bill if otherwise its character is not that of one. Further, the subordinate regulations notified under the Aadhaar Act deal almost entirely with matters to do with enrolment, updation, authentication of the Aadhaar number and related matters such as data security regulations and sharing of information collected, rather than the provision of benefits or subsidies or disbursal of funds otherwise from the CFI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in the context of the petition filed by former Union minister Jairam Ramesh challenging the passage of the law on Aadhaar as a money Bill, the more important question is whether the judiciary has a right to question the speaker’s decision in such a matter. If not, any other questions about whether the legislation is a money Bill will remain merely academic in nature.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Irregularity vs illegality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Article 110 (3) clearly states that with regard to the question whether a legislation is a money Bill or not, the decision of the speaker is final and binding. The question is whether such a clause completely excludes any judicial review. Further, Article 122 prohibits the courts from questioning the validity of any proceedings in parliament on the ground of any alleged irregularity of procedure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the arguments in the court, the attorney general questioned the locus standi of Ramesh. The petition has been made under Article 32 of the constitution and the government argued that no fundamental rights of Ramesh were violated. However, the court has asked Ramesh to make his submission and adjourned the hearing to July. The petition by Ramesh would hinge largely on the powers of the judiciary to question the decision of the speaker of the Lok Sabha.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The powers of privilege that parliamentarians enjoy are integral to the principle of separation of powers. The rationale behind parliamentary privilege is to prevent interference in the lawmakers’ powers to perform essential functions. The ability to speak and vote inside the legislature without the fear of punishment is certainly essential to the role of a lawmaker. However, the extent of this protection lies at the centre of this discussion. During the constituent assembly debates, H.V. Kamath and others had argued for a schedule to exhaustively codify the existing privileges. However, B.R. Ambedkar pointed to the difficulty of doing so and parliamentary privilege on the lines of the British parliamentary practice was retained in the constitution. In the last few decades, a judicial position has emerged that courts could exercise a limited degree of scrutiny over privileges, as they are primarily responsible for interpreting the constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the matter of &lt;a href="https://indiankanoon.org/doc/1757390/" rel="external nofollow" target="_blank" title="Raja Ram Pal vs The Hon’ble Speaker, Lok Sabha"&gt;&lt;i&gt;Raja Ram Pal vs The Hon’ble Speaker, Lok Sabh&lt;/i&gt;a&lt;/a&gt;,  it had been clarified that proceedings of the legislature were immune  from questioning by courts in the case of procedural irregularity but  not in the case of illegality. In this case, the Supreme Court while  dealing with Article 122 stated that it does not oust review by the  judiciary in cases of “gross illegality, irrationality, violation of  constitutional mandate, mala fides, non-compliance with rules of natural  justice and perversity.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1968, the speaker of the Punjab legislative assembly adjourned the  proceedings for a period of two months following rowdy behaviour.  Subsequently, an ordinance preventing such a suspension was promulgated  and the legislature was summoned by the governor to consider some  expedient financial matters. The speaker disagreed with the decision and  after some confusion, the deputy speaker passed a few Bills as money  Bills. While looking into the question of what was protected from  judicial review, the &lt;a href="https://indiankanoon.org/doc/36589/" rel="external nofollow" target="_blank" title="court stated"&gt;court stated&lt;/a&gt; that the protection did not extend to breaches of mandatory provisions  of the constitution, only to directory provisions. By that logic, if  Article 110 (1) is seen as a mandatory provision, a breach of its  provisions could lead to an interpretation that the Supreme Court may  well question an erroneous decision by the speaker of the Lok Sabha to  certify a legislation as a money Bill. The use of the word “shall” in  Article 110 (1), the nature and design of the provision, its overriding  impact on the other constitutional provisions granting the Rajya Sabha  powers are ample evidence of its mandatory nature. Based on the above,  Anup Surendranath has &lt;a href="http://ccgdelhi.org/doc/%28CCG-NLU%29%20Aadhaar%20Money%20Bill.pdf" rel="external nofollow" target="_blank" title="argued"&gt;argued&lt;/a&gt; that  the passage of the Aadhaar Act as a money Bill when it does not satisfy  the constitutional conditions for it does amount to a gross illegality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The judicial precedent in &lt;i&gt;&lt;a href="https://indiankanoon.org/doc/60568976/" rel="external nofollow" target="_blank" title="Mohd. Saeed Siddiqui vs State of Uttar Pradesh"&gt;Mohd. Saeed Siddiqui vs State of Uttar Pradesh&lt;/a&gt;&lt;/i&gt; where the matter of the court’s power to question the decision of a  speaker was considered, though, leans in the other direction. In 2012,  the &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=1&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0ahUKEwiRtov_iKHSAhVLuo8KHYhsClcQFggbMAA&amp;amp;url=http%3A%2F%2Fwww.lawsofindia.org%2Fdownloadfile.php%3Flawid%3D7834%26file%3Duttar_pradesh%2F1981%2F1981UP7.pdf%26pageurl%3D%252Fsingle%252Falpha%252F7.html&amp;amp;usg=AFQjCNGRW8-NChXALunaUbjZRrlM4IvCkA&amp;amp;sig2=rg6YCMf7qRqNw08NnctuhQ" rel="external nofollow" target="_blank" title="Uttar Pradesh Lokayukta and Up-Lokayuktas (Amendment) Act"&gt;Uttar Pradesh Lokayukta and Up-Lokayuktas (Amendment) Act&lt;/a&gt;,  2012 was passed as money Bill by the Uttar Pradesh state legislature.  Subsequently, a writ petition was filed challenging its constitutional  validity. A three-judge bench of the Supreme Court looked into the  application of Article 212. It is the provision corresponding to Article  122, dealing with the power of the courts to inquire into the  proceedings of the state legislature. The court held that Article 212  makes “it clear that the finality of the decision of the Speaker and the  proceedings of the State Legislature being important privilege of the  State Legislature, viz., freedom of speech, debate and proceedings are  not to be inquired by the Courts.” Importantly, ‘proceedings of the  legislature’ were deemed to include within its scope everything done in  transacting parliamentary business, including the passage of the Bill.  While the court did acknowledge the limitations of parliamentary  privilege as established in the &lt;i&gt;Raja Ram Pal&lt;/i&gt; case, it did not adequately take into account the reasoning in it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar Act is a legislation which makes it mandatory of all  residents to enrol for a biometric identification system in order to  avail certain subsidies, benefits and services. It has huge potential  risks for individual privacy and national security and has been the  subject of an extremely high profile Public Interest Litigation. Its  passage as a money Bill, without any oversight from the Rajya Sabha and  an opportunity for substantial debate and discussion, is a fraud on the  Constitution. Whether or not the court chooses to see it that way  remains to be seen.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar'&gt;https://cis-india.org/internet-governance/blog/the-wire-amber-sinha-february-21-2017-can-the-judiciary-upturn-the-lok-sabha-speakers-decision-on-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-27T15:44:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data">
    <title>India To Let Private Companies Access Citizens’ Biometric Data</title>
    <link>https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data</link>
    <description>
        &lt;b&gt;India, home to the world’s largest national biometric registry, plans to begin sharing citizens’ data with the country’s private companies and startups.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Joshua Kopstein was published by &lt;a class="external-link" href="http://www.vocativ.com/404338/india-private-companies-citizens-biometric-data/"&gt;Vocativ&lt;/a&gt; on February 21, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The government-backed program, called  “India Stack,” will allow the second most populous country on Earth to  share nearly all of its 1.3 billion citizens’ fingerprints, iris scans,  and more, potentially creating unprecedented security and privacy risks  in the name of convenience and digital commerce.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India Stack will open up the country’s troves of biometric data to  Indian software developers, health care providers, and any other  business interested in using the government’s identification records in  their apps and services. The Indian government hopes the move will spur  innovation, jumpstarting its effort to create a centralized system of  digital commerce where citizens can purchase goods, apply for health  insurance, or even qualify for a loan using the biometric sensors on  their smartphones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Opponents, however, warn that the sharing scheme opens a Pandora’s  box of security and privacy problems, dramatically increasing the  likelihood of data breaches and abuse.&lt;/p&gt;
&lt;div class="page" style="text-align: justify; " title="Page 2"&gt;
&lt;div class="layoutArea"&gt;
&lt;div class="column"&gt;
&lt;p&gt;“It’s the worst time for privacy policy in the country,” Sunil  Abraham, the executive director of the Bangalore-based Centre for  Internet and Society, &lt;a href="https://www.wsj.com/articles/india-begins-building-on-its-citizens-biometrics-1487509205" target="_blank"&gt;told the Wall Street Journal&lt;/a&gt;. “We are very caught up in technological exuberance. Techno-utopians are ruling the roost.”&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The dangers aren’t just hypothetical. In 2015, an unprecedented breach at the U.S. Office of Personnel Management &lt;a href="https://www.washingtonpost.com/news/the-switch/wp/2015/09/23/opm-now-says-more-than-five-million-fingerprints-compromised-in-breaches/?utm_term=.8dc8ac825cd8" target="_blank"&gt;allowed hackers to steal the fingerprints of 5.6 million federal employees&lt;/a&gt;. Researchers have found that stolen fingerprints can be used to commit fraud and identity theft, and even &lt;a href="http://www.npr.org/sections/alltechconsidered/2016/07/27/487605182/police-use-fingertip-replicas-to-unlock-a-murder-victims-phone" target="_blank"&gt;replicated and used to unlock smartphones and other personal devices&lt;/a&gt;.  Worst of all, unlike passwords and social security numbers, biometric  identifiers like fingerprints can never be changed, meaning that any  breach is virtually guaranteed to have long-term consequences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The India Stack program is the latest in several recent schemes to  push the country toward a fully-digitized and cashless economy. As of  December 2016, the Unique Identification Authority of India had  registered more than 91% of the population into a centralized system  called Aadhaar, which integrates with banks and allows citizens to  complete transactions and access government services using their  fingerprints. The country has also temporarily withdrawn its  higher-denomination bank notes from circulation in an effort to bolster  digital payment systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“While the efforts of the government are commendable, the efficacy of  these programs in the absence of sufficient infrastructure for security  raises various concerns,” the Centre For Internet and Society wrote in &lt;a href="http://cis-india.org/internet-governance/blog/privacy-gaps-in-indias-digital-india-project" target="_blank"&gt;a paper&lt;/a&gt; outlining the privacy risks of India’s digital identity system.  “Increased awareness among citizens and stronger security measures by  the governments are necessary to combat the cogent threats to data  privacy arising out of the increasing rate of cyberattacks.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s program has already gone far beyond other countries’  biometric data collection schemes, which have mostly been limited to  passports and border control. &lt;span&gt;But law  enforcement officials’ smaller, more piecemeal efforts to collect  biometric information have also raised alarm over their potential for  abuse. &lt;/span&gt;Thanks to the cooperation of 16 state DMVs, &lt;a href="http://www.vocativ.com/394147/face-recognition-government-weapon" target="_blank"&gt;one in two Americans currently has their photo registered to a law enforcement face recognition database&lt;/a&gt; – regardless of whether they’ve been charged or even suspected of a  crime. Local police in several U.S. states have also begun collecting &lt;a href="http://www.reuters.com/article/us-crime-identification-iris-idUSTRE76J4A120110720" target="_blank"&gt;iris scans&lt;/a&gt; and &lt;a href="https://www.propublica.org/article/dna-dragnet-in-some-cities-police-go-from-stop-and-frisk-to-stop-and-spit" target="_blank"&gt;DNA swabs&lt;/a&gt; from people randomly stopped on the street, in some cases &lt;a href="http://www.vocativ.com/403313/stop-and-spit-lawsuit/" target="_blank"&gt;specifically targeting African American children&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data'&gt;https://cis-india.org/internet-governance/news/vocativ-joshua-kopstein-india-private-companies-citizens-biometric-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-27T15:09:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/t-20-mumbai-2017">
    <title>T20 Mumbai 2017: Dialogue on the Emerging World Economy</title>
    <link>https://cis-india.org/internet-governance/news/t-20-mumbai-2017</link>
    <description>
        &lt;b&gt;Gateway House, Indian Council on Global Relations organized a dialogue on emerging world economy in Mumbai on 13 and 14 February 2017. Elonnai Hickok participated in the event.&lt;/b&gt;
        &lt;div class="wpb_content_element wpb_text_column" style="text-align: justify; "&gt;
&lt;div class="wpb_wrapper"&gt;
&lt;p style="padding-left: 30px; "&gt;The G20 is the premier multilateral  platform for global economic and financial issues. It has a rotating  presidency, and this year, Germany is the president of the G20. In that  role, it is hosting a number of meetings with government officials (&lt;b&gt;G20&lt;/b&gt;), business leaders (&lt;b&gt;B20&lt;/b&gt;) and experts from think tanks (&lt;b&gt;T20&lt;/b&gt;).&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;The &lt;b&gt;T20 &lt;/b&gt;is an official &lt;b&gt;sub-forum&lt;/b&gt; of the &lt;b&gt;G20 &lt;/b&gt;process, responsible for contributing ideas and research to the G20 on global economic issues.&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;Think-20 (T20) was first initiated by the  Mexican presidency in 2012 and continued by subsequent G20  presidencies. It serves as an “ideas bank” for the G20 by organizing the  analysis of global think tanks and high-level experts on relevant  international economic issues. Think-20 recommendations are synthesized  in policy briefs and presented to G20 working groups, ministerial  committees and leaders summits to help the G20 deliver concrete policy  measures.&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;The &lt;b&gt;Kiel Institute for the World Economy&lt;/b&gt; and &lt;b&gt;German Development Institute&lt;/b&gt; have been appointed by the German government as coordinators for the  think tank activities for the year. The institutes hosted the T20  kick-off meeting on December 1-2, 2016 in Berlin with experts from more  than 80 countries., and are scheduled to host the first-ever T20 Africa  conference on February 1-3, 2017 and eventually the T20 Summit on May  29-31, 2017.&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;Gateway House has hosted T20 meetings  during the 2015 Turkish presidency and during the 2016 Chinese  presidency of the G20. The meetings brought together experts from think  tanks working international economic governance and foreign economic  policy issues, business leaders and relevant government officials from  India and the G20 countries to Mumbai. For Gateway House, the meetings  were the outcome of the focus on geoeconomics and on-going research on  international economic relations and global financial architecture.&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;At G20 2017, Germany has announced  Resilience, Sustainability and Responsibility as its core vision. This  will cover global issues such as financial market regulation, fin-tech,  trade and investment, digitization, healthcare, migration and  agriculture. This meeting in Mumbai is an important indicator of  intellectual partnership between German and Indian think tanks and an  opportunity to bring up new ideas and deliver concrete policy  suggestions that can help Germany achieve its vision for G20 in 2017.&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;For more info &lt;a class="external-link" href="http://www.gatewayhouse.in/t20mumbai/"&gt;click here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/t-20-mumbai-2017'&gt;https://cis-india.org/internet-governance/news/t-20-mumbai-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-02-27T15:04:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/outlook-february-24-2017-is-your-aadhar-biometrics-safe-firms-accused-of-storing-biometrics-and-using-them-illegally">
    <title>Is Your Aadhar Biometrics Safe? Firms Accused Of Storing Biometrics And Using Them Illegally</title>
    <link>https://cis-india.org/internet-governance/news/outlook-february-24-2017-is-your-aadhar-biometrics-safe-firms-accused-of-storing-biometrics-and-using-them-illegally</link>
    <description>
        &lt;b&gt;Fears of Aadhar biometric security have been compounded as the government is sprinting towards the next phase of ‘cashless India’ and digitization&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Pranesh Prakash and Sunil Abraham have been quoted in this article &lt;a class="external-link" href="http://www.outlookindia.com/website/story/is-your-aadhar-biometrics-safe-firms-accused-of-storing-biometrics-and-using-the/298048"&gt;published by Outlook&lt;/a&gt; on February 24, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The biggest fear regarding misuse of Aadhar biometrics and security loopholes are becoming real.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three firms are being probed for attempting unauthorised  authentication and impersonation by using stored Aadhaar biometrics,  reported &lt;i&gt;The Times of India.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper reported that the Unique Identification Authority of India  (UIDAI) has lodged a criminal complaint with the cyber cell of Delhi  Police, saying it is a clear violation of the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The firms are Axis Bank, Suvidhaa Infoserve and eMudhra. They have  been served a “notice for action“ under Aadhaar regulations”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The firms have been accused of storing biometrics and using them illegally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fears of biometric security have been compounded as the  government is sprinting towards the next phase of ‘cashless India’ and  digitization. They are preparing to launch Aadhaar Pay, an initiative  that will supersede the need to use credit cards, debit cards,  smartphones and PINs to make payments or transfer money.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposed system of payments will use a person’s biometric data  and fingerprints to make payments through Aadhaar-linked bank accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Outlook&lt;/i&gt;’s Senior Associate Editor Arindam Mukherjee had in a clairvoyant &lt;a href="http://www.outlookindia.com/magazine/story/no-genie-at-your-fingertips/298449" target="_blank"&gt;article&lt;/a&gt; for the magazine raised the fears of biometrics being manipulated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the &lt;a href="http://www.outlookindia.com/magazine/story/no-genie-at-your-fingertips/298449" target="_blank"&gt;article&lt;/a&gt;, critics of Aadhaar and Aadhaar-based services raised the issue of privacy and security of biometric and personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director with the Centre for Internet and  Society (CIS), ­rec­ently tweeted, “As long as Aadhar-Enabled Payment  Services encourages biometric authorisation of transactions, it is bound  to be a security nightmare, with widespread fraud.” Would you tell a  shopkeeper your debit card’s PIN? No. Then why share your fingerprint? A  fingerprint, in this system, becomes a kind of unchangeable Aadhaar  Enabled Payment System PIN, he asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pointing out a possible danger, Usha Ramanathan, an independent law  resear­c­her who has been following Aadhaar since its inception, says,  “In many ­payments, biometric data is authenticated and then it remains  in the system where there are leakages. Intermediaries then have access  to the data, which is thus made insecure.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the UIDAI, however, once biometric data is provided by  the consumer while making Aadhaar-based payments, it gets encrypted and a  merchant doesn’t get access to that data. The Aadhaar Act also  prohibits any storing of biometric data in local devices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, there are many like CIS executive director Sunil Abraham who  believe it is a mistake to use biometrics for authentication,  especially when payments are concerned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Our concern with Aadhaar Pay is about the biometric component of the  project,” says Abraham. “Biometrics is an identification technology.  Unfortunately, it is being presented as an authentication technology. It  is not a secure authentication technology as biometric data can be  stolen easily. It is also irrevocable; once bio­metric data is stolen,  it cannot be ­re-issued like a smart card.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then there is the problem of availability of fingerprints. In the  case of many people from rural areas and the working class, fingerprints  get affected due to the manual nature of their work. This makes it  difficult for this target group of UIDAI to conduct transactions  properly through Aadhaar Pay. “In Rajasthan, 30 per cent of the  households are not even able to procure ration using fingerprints,” says  Ramanathan.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/outlook-february-24-2017-is-your-aadhar-biometrics-safe-firms-accused-of-storing-biometrics-and-using-them-illegally'&gt;https://cis-india.org/internet-governance/news/outlook-february-24-2017-is-your-aadhar-biometrics-safe-firms-accused-of-storing-biometrics-and-using-them-illegally&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-27T01:56:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/idg-cio-february-21-2017-john-ribeiro-linkedin-will-help-people-in-india-train-for-semi-skilled-jobs">
    <title>LinkedIn will help people in India train for semi-skilled jobs</title>
    <link>https://cis-india.org/internet-governance/news/idg-cio-february-21-2017-john-ribeiro-linkedin-will-help-people-in-india-train-for-semi-skilled-jobs</link>
    <description>
        &lt;b&gt;Microsoft has launched Project Sangam, a cloud service integrated with LinkedIn that will help train and generate employment for middle and low-skilled workers.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by John Ribeiro of IDG News Service was mirrored on &lt;a class="external-link" href="http://www.cio.com/article/3172792/internet/linkedin-will-help-people-in-india-train-for-semi-skilled-jobs.html"&gt;CIO blog&lt;/a&gt; on February 21, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Microsoft has launched Project Sangam, a cloud service integrated  with LinkedIn that will help train and generate employment for middle  and low-skilled workers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The professional network that was  acquired by Microsoft in December has been generally associated with  educated urban professionals but the company is now planning to extend  its reach to semi-skilled people in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Having connected  white-collared professionals around the world with the right job  opportunities and training through LinkedIn Learning, the platform is  now developing a new set of products that extends this service to low-  and semi-skilled workers, said Microsoft CEO Satya Nadella at an event  on digital transformation in Mumbai on Wednesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Project Sangam,  which is in private preview, is “the first project that is now the  coming together of LinkedIn and Microsoft, where we are building this  cloud service with deep integration with LinkedIn, so that we can start  tackling that enormous challenge in front of us of how to provide every  person in India the opportunity to skill themselves for the jobs that  are going to be available.”&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;aside class="smartphone nativo-promo"&gt; &lt;/aside&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;LinkedIn  also plans a placement product for college graduates that will help  students finds jobs regardless of whether they studied at top  universities or not, Nadella added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Microsoft announced earlier in the day its Skype Lite, a version of Skype &lt;a href="http://www.pcworld.com/article/3172789/voice-over-ip/microsoft-seeks-indian-customers-with-exclusive-skype-lite-app.html"&gt;that consumes less data&lt;/a&gt;.  The company is also offering a ‘lite’ version of LinkedIn, reflecting  the need for vendors to factor in low Internet bandwidth, usually  running on low-cost and inadequately featured smartphones, when  designing products for markets in countries like India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;LinkedIn Lite works on 2G links and is four times faster than the original LinkedIn client, Nadella said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  large number of low-skilled and semi-skilled workers that Microsoft is  targeting with its Sangam project still use feature phones, which will  likely be a challenge as Microsoft tries to popularize the service.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;aside class="desktop tablet nativo-promo"&gt; &lt;/aside&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Nadella  has also backed a controversial Indian government sponsored project to  use biometric data collected from over 1 billion people as an  authentication mechanism for a variety of services offered by both the  government and the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The project, called India  Stack, aims to use a biometric system, called Aadhaar, to facilitate the  digital exchange of information. Microsoft said on Tuesday that Skype  Lite would support Aadhaar authentication, pointing out to potential  uses of the technology such as for verifying the identity of a candidate  for a video job interview. Project Sangam too offers authentication  using Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Skype Lite is another example of how India Stack is  driving the company’s innovation agenda, Nadella said in Mumbai. He  announced in Bangalore on Monday that the company's end user products&lt;a href="http://www.networkworld.com/article/3172184/cloud-computing/microsoft-eyes-indian-startups-for-cloud-services.html"&gt; including Windows would be "great participants in the India Stack."&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  Aadhaar project has been criticized by privacy activists for collecting  biometric information such as the fingerprints and iris scans of people  in a central database, which could be misused by both governments and  hackers who might get access to the data.The government has been trying  to extend the use of Aadhaar, initially designed for the distribution of  government benefits and subsidies, to a variety of financial and other  services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"It is indeed shameful that Microsoft is supporting the  centralized surveillance project of the Indian government which has  dramatically increased the fragility of the Indian information society,”  said Sunil Abraham, executive director of Bangalore-based research  organization, the Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"As Indian  citizens we must realize that Microsoft will have our biometrics or our  authentication factors that can be used to frame us in crimes or clean  out our bank accounts," he added.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/idg-cio-february-21-2017-john-ribeiro-linkedin-will-help-people-in-india-train-for-semi-skilled-jobs'&gt;https://cis-india.org/internet-governance/news/idg-cio-february-21-2017-john-ribeiro-linkedin-will-help-people-in-india-train-for-semi-skilled-jobs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2017-02-24T01:51:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-gaps-in-indias-digital-india-project">
    <title>Privacy Gaps in India's Digital India Project</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-gaps-in-indias-digital-india-project</link>
    <description>
        &lt;b&gt;This paper seeks to assess the privacy protections under 15 e-governance schemes: Soil Health Card, Crime and Criminal Tracking Network &amp; Systems (CCTNS), Project Panchdeep, U-Dise, Electronic Health Records, NHRM Smart Card, MyGov, eDistricts, Mobile Seva, Digi Locker, eSign framework for Aadhaar, Passport Seva, PayGov, National Land Records Modernization Programme (NLRMP), and Aadhaar.
&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Central and State governments in India have been increasingly taking steps to fulfill the goal of a ‘Digital India’ by undertaking e-governance schemes. Numerous schemes have been introduced to digitize sectors such as agriculture, health, insurance, education, banking, police enforcement, etc. With the introduction of the e-Kranti program under the National e-Governance Plan, we have witnessed the introduction of forty four Mission Mode Projects.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The digitization process is aimed at reducing the human handling of personal data and enhancing the decision making functions of the government. These schemes are postulated to make digital infrastructure available to every citizen, provide on demand governance and services and digital empowerment.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In every scheme, personal information of citizens are collected in order to avail their welfare benefits. While the efforts of the government are commendable, the efficacy of these programs in the absence of sufficient infrastructure for security raises various concerns. Increased awareness among citizens and stronger security measures by the governments are necessary to combat the cogent threats to data privacy arising out of the increasing rate of cyberattacks.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The schemes identified for the purpose of this paper have been introduced by the following government agencies:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;S.No.&lt;/th&gt;&lt;th&gt;Scheme&lt;/th&gt;&lt;th&gt;Government Agency Involved&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;/td&gt;
&lt;td&gt;SOIL HEALTH CARD&lt;br /&gt;A scheme designed to provide complete soil information to farmers.&lt;/td&gt;
&lt;td&gt;Department of Agriculture Corporation (DACNET)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;/td&gt;
&lt;td&gt;CRIME AND CRIMINAL NETWORK TRACKING &amp;amp; SYSTEMS (CCTNS)&lt;br /&gt;A scheme that seeks to facilitate the functioning of the criminal system through online records, and has proposed data analysis for the purpose of trend setting, crime analysis, disaster and traffic management, etc.&lt;/td&gt;
&lt;td&gt;National Crime Records Bureau (NCRB)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;U-Dise &lt;br /&gt;Serves as the official data repository for educational information.&lt;/td&gt;
&lt;td&gt;Ministry of Human Resource Development (MHRD)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;PROJECT PANCHDEEP &lt;br /&gt;The use of Unified Information System for implementation of health insurance facilities under ESIC (Employee State Insurance &lt;br /&gt;Corporation).&lt;/td&gt;
&lt;td&gt;Ministry of Labour &amp;amp; Employment&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;ELECTRONIC HEALTH RECORDS&lt;br /&gt;A scheme to digitally record all health data of a citizen from birth to death.&lt;/td&gt;
&lt;td&gt;Ministry of Health and Family Welfare (MoHFW)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;NHRM SMART CARD &lt;br /&gt;Under the Rashtriya Swasthya Bima Yojana (RSBY) Scheme, every beneficiary family is issued a biometric enabled smart card for providing health insurance to persons covered under the scheme.&lt;/td&gt;
&lt;td&gt;Ministry of Health and Family Welfare (MoHFW)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;MYGOV&lt;br /&gt;An online platform for government and citizen interaction.&lt;/td&gt;
&lt;td&gt;The Department of Electronics and Information Technology (DeITY)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;EDISTRICTS&lt;br /&gt;Common Service Centres are being established under the scheme to provide multiple services to the citizens at a district level.&lt;/td&gt;
&lt;td&gt;DeITY&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;MOBILE SEVA&lt;br /&gt;A centralized mobile app, used to host various mobile applications.&lt;/td&gt;
&lt;td&gt;DeITY&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;DIGILOCKER &lt;br /&gt;A scheme that provides a secure dedicated personal electronic space for storing the documents.&lt;/td&gt;
&lt;td&gt;DeITY&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11&lt;/td&gt;
&lt;td&gt;eSIGN FRAMEWORK FOR AADHAAR eSign is an online electronic signature service to facilitate an Aadhaar holder to digitally sign a document.&lt;/td&gt;
&lt;td&gt;Ministry of Electronic and Information Technology&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;PAYGOV&lt;br /&gt;A centralized platform for all citizen to government payments.&lt;/td&gt;
&lt;td&gt;DeITY and NSDL Database Management Limited (NDML)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13&lt;/td&gt;
&lt;td&gt;PASSPORT SEVA&lt;br /&gt;An online scheme for passport application and documentation.&lt;/td&gt;
&lt;td&gt;Ministry of External Affairs&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14&lt;/td&gt;
&lt;td&gt;NATIONAL LAND RECORDS MODERNIZATION PROGRAM (NLRMP) &lt;br /&gt;The scheme seeks to modernize land records system through digitization and computerization of land records.&lt;/td&gt;
&lt;td&gt;DeITY and NDML&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15&lt;/td&gt;
&lt;td&gt;AADHAAR&lt;br /&gt;A scheme for unique identification of citizens for the purpose of targeted delivery of welfare benefits.&lt;/td&gt;
&lt;td&gt;Unique Identification Authority of India (UIDAI)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/digital-india-report.pdf"&gt;&lt;b&gt;Read the full paper&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Introduction to Digital India, available at http://www.governancenow.com/ news/regular-story/securing-digital-india&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. GN Bureau, Securing Digital India, Governance Now (June 11, 2016) available at http://www.governancenow.com/news/regular-story/securing-digitalindia&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-gaps-in-indias-digital-india-project'&gt;https://cis-india.org/internet-governance/blog/privacy-gaps-in-indias-digital-india-project&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anisha Gupta and Edited by Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-21T01:55:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-in-governance-in-india-case-studies">
    <title>Big Data in Governance in India: Case Studies</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-in-governance-in-india-case-studies</link>
    <description>
        &lt;b&gt;This research seeks to understand the most effective way of researching Big Data in the Global South. Towards this goal, the research planned for the development of a Global South big data Research Network that identifies the potential opportunities and harms of big data in the Global South and possible policy solutions and interventions. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;This work has been made possible by a grant from the John D. and Catherine T. MacArthur Foundation. The conclusions, opinions, or points of view expressed in the report are those of the authors and do not necessarily represent the views of the John D. and Catherine T. MacArthur Foundation&lt;/i&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The research was for a duration of 12 months and in form of an exploratory study which sought to understand the potential opportunity and harm of big data as well as to identify best practices and relevant policy recommendations. Each case study has been chosen based on the use of big data in the area and the opportunity that is present for policy recommendation and reform. Each case study will seek to answer a similar set of questions to allow for analysis across case studies.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What is Big Data&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Big data has been ascribed a number of definitions and characteristics. Any study of big data must begin with first conceptualizing defining what big data is. Over the past few years, this term has been become a buzzword, used to refer to any number of characteristics of a dataset ranging from size to rate of accumulation to the technology in use.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many commentators have critiqued the term big data as a misnomer and misleading in its emphasis on size. We have done a survey of various definitions and understandings of big data and we document the significant ones below.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Computational Challenges&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The condition of data sets being large and taxing the capacities of main memory, local disk, and remote disk have been seen as problems that big data solves. While this understanding of big data focusses only on one of its features—size, other characteristics posing a computational challenge to existing technologies have also been examined. The (US) National Institute of Science and Technology has defined big data as data which “exceed(s) the capacity or capability of current or conventional methods and systems.” &lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;These challenges are not merely a function of its size. Thomas Davenport provides a cohesive definition of big data in this context. According to him, big data is “data that is too big to fit on a single server, too unstructured to fit into a row-and-column database, or too continuously flowing to fit into a static data warehouse.” &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Characteristics&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The most popular definition of big data was put forth in a report by Meta (now Gartner) in 2001, which looks at it in terms of the three 3V’s—volume&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;, velocity and variety. It is high-volume, high-velocity and/or high-variety information assets that demand cost-effective, innovative forms of information processing that enable enhanced insight, decision making, and process automation.&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aside from volume, velocity and variety, other defining characteristics of big data articulated by different commentators are— exhaustiveness,&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; granularity (fine grained and uniquely indexical),&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;scalability,&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;veracity,&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;value&lt;a href="#fn10" name="fr10"&gt;[10] &lt;/a&gt;and variability.&lt;a href="#fn11" name="fr11"&gt;[11] &lt;/a&gt;It is highly unlikely that any data-sets satisfy all of the above characteristics. Therefore, it is important to determine what permutation and combination of these gamut of attributes lead us to classifying something as big data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Qualitative Attributes&lt;/h3&gt;
&lt;p&gt;Prof. Rob Kitchin has argued that big data is qualitatively different from traditional, small data. Small data has used sampling techniques for collection of data and has been limited in scope, temporality and size, and are “inflexible in their administration and generation.”&lt;a href="#fn12" name="fr12"&gt;[12] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this respect there are two qualitative attributes of big data which distinguish them from traditional data. First, the ability of big data technologies to accommodate unstructured and diverse datasets which hitherto were of no use to data processors is a defining feature. This allows the inclusion of many new forms of data from new and data heavy sources such as social media and digital footprints. The second attribute is the relationality of big data.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This relies on the presence of common fields across datasets which allow for conjoining of different databases. This attribute is usually a feature of not the size but the complexity of data enabling high degree of permutations and interactions within and across data sets.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Patterns and Inferences&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Instead of focussing on the ontological attributes or computational challenges of big data, Kenneth Cukier and Viktor Mayer Schöenberger define big data in terms of what it can achieve.&lt;a href="#fn14" name="fr14"&gt;[14] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;They defined big data as the ability to harness information in novel ways to produce useful insights or goods and services of significant value. Building on this definition, Rohan Samarajiva has categorised big data into non-behavioral big data and behavioral big data. The latter leads to insights about human behavior.&lt;a href="#fn15" name="fr15"&gt;[15] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Samarajiva believes that transaction-generated data (commercial as well as non-commercial) in a networked infrastructure is what constitutes behavioral big data. Scope of Research The initial scope arrived at for this case-study on role of big data in governance in India focussed on the UID Project, the Digital India Programme and the Smart Cities Mission. Digital India is a programme launched by the Government of India to ensure that Government services are made available to citizens electronically by improving online infrastructure and by increasing Internet connectivity or by making the country digitally empowered in the field of technology.&lt;a href="#fn16" name="fr16"&gt;[16] &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The Programme has nine components, two of which focus on e-governance schemes. &lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/big-data-compilation.pdf"&gt;Read More&lt;/a&gt; &lt;/b&gt;[PDF, 1948 Kb]&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Thomas Davenport, Big Data at Work: Dispelling the Myths, Uncovering the opportunities, Harvard Business Review Press, Boston, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. MIT Technology Review, The Big Data Conundrum: How to Define It?, available at https://www. technologyreview.com/s/519851/the-big-data-conundrum-how-to-define-it/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Supra note 1.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. What constitutes as high volume remains an unresolved matter. Intel defined Big Data volumes are emerging in organizations generating a median of 300 terabytes of data a week.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. http://www.gartner.com/it-glossary/big-data/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Viktor Mayer Schöenberger and Kenneth Cukier, Big Data: A Revolution that will transform how we live, work and think” John Murray, London, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Rob Kitchin, The Data Revolution: Big Data, Open Data, Data Infrastructures and their consequences, Sage, London, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Nathan Marz and James Warren, Big Data: Principles and best practices of scalable realtime data systems, Manning Publication, New York, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Bernard Marr, Big Data: the 5 Vs everyone should know, available at https://www.linkedin. com/pulse/20140306073407-64875646-big-data-the-5-vs-everyone-must-know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Eileen McNulty, Understanding Big Data: the 7 Vs, available at http://dataconomy.com/sevenvs-big-data/.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Supra Note 7.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Danah Boyd and Kate Crawford, Critical questions for big data. Information, Communication and Society 15(5): 662–679, available at https://www.researchgate.net/publication/281748849_Critical_questions_for_big_data_Provocations_for_a_cultural_technological_and_scholarly_ phenomenon&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Supra Note 6.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Rohan Samarajiva, What is Big Data, available at http://lirneasia.net/2015/11/what-is-bigdata/.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. http://www.digitalindia.gov.in/content/about-programme&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-in-governance-in-india-case-studies'&gt;https://cis-india.org/internet-governance/blog/big-data-in-governance-in-india-case-studies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Vanya Rakesh and Vidushi Marda and Edited by Elonnai Hickok, Sumandro Chattapadhyay and Sunil Abraham</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    

   <dc:date>2017-02-26T16:24:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips">
    <title>No Genie At Your Fingertips</title>
    <link>https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips</link>
    <description>
        &lt;b&gt;Aadhaar biometrics will now enable cashless shopping sans card and smartphone. A look at the hopes and fears.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Arindam Mukherjee was &lt;a class="external-link" href="http://www.outlookindia.com/magazine/story/no-genie-at-your-fingertips/298449"&gt;published in the Outlook&lt;/a&gt; on February 20, 2017. Pranesh Prakash and Sunil Abraham were quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Soon, you will be able to pay for your groceries and other purchased goods by using just your fingerprints and biometric data. You won’t need debit or credit cards, smartphones or e-wallets. You won’t need to sign or even remember your PIN.&lt;br /&gt;&lt;br /&gt;In a bid to increase digitisation and move to the next phase of ‘cashless India’, the government is preparing to launch Aadhaar Pay, an initiative that will supersede the need to use credit cards, debit cards, smartphones and PINs to make payments or transfer money. The proposed system of payments will use a person’s biometric data and fingerprints to make payments through Aadhaar-linked bank accounts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The initiative, which has been running as a pilot project in fair price shops in Andhra Pradesh, is expected to be launched in a month’s time. According to officials of the Unique Identification Authority of India (UIDAI), the system has been getting a positive response in these trials and is ready for a nationwide launch.&lt;br /&gt;&lt;br /&gt;In Aadhaar Pay, all a person needs to carry to a shop are his fingerprints as merchant establishments will authenticate his or her identity through fingerprints, which will give them access to a person’s Aadhaar data. The only essential requirement for this new mode of payments is that bank acc­ounts have to be linked with the account-­holder’s Aadhaar number.&lt;br /&gt;&lt;br /&gt;Unlike the post-demonetisation limits imposed on ATM and bank account withdrawals, no limits are proposed to be put on Aadhaar Pay transactions as of now. The proposal is to leave the fixing of limits to the discretion of banks. However, the government hopes Aadhaar Pay will be used mostly for small-value transactions rather than large deals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system will work through an app in the merchant establishment’s smartphone—with a fingerprint scanner device—eliminating the requirement of a Point of Sale (POS) terminal, which is required for credit card and debit card transactions. The scanner will be priced at around Rs 2,000, considerably cheaper than POS terminals that cost Rs 8,000-10,000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar Pay is the next step of the government’s successful run of Aadhaar Enabled Payment System (AEPS), under which transactions are made through ‘banking correspondents’, mostly in rural areas. These transactions are done through POS machines and micro-ATMs. Like Aadhaar Pay, AEPS disburses money without a signature or a debit or credit card, and without the need to visit a bank branch. But unlike AEPS, which works through banking correspondents, Aadhaar Pay will be available through merchant establishments much the same way as debit or credit cards work.&lt;br /&gt;&lt;br /&gt;The biggest task before the government to ensure the success of Aadhaar Pay is to develop a network of merchant establishments that will accept Aadhaar Pay just the way they accept credit or debit cards or e-wallet payments like Paytm. To do this, the government said in this year’s budget that banks would be encouraged to put 20 lakh Aadhaar Pay access machines across the country. “We have asked every bank to select 35 merchants for this. These merchants will have a smartphone and a biometric device attachment to carry out Aadhaar Pay transactions,” UIDAI CEO Ajay Bhushan Pandey tells Outlook.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This won’t be easy. Even in case of debit or credit cards, the  biggest limiting factor is the relatively small number of POS terminals  that accept them. According to data from the National Payment  Corporation of India (NPCI), there are only 14 lakh POS terminals in  India, which has over 3.5-4 crore merchant establishments and 80 crore  cards (77 crore debit cards and three crore credit cards). The bulk of  these terminals are in tier I and tier II cities and almost none in tier  III and IV towns. To improve the situation, the government is already  working towards bringing in 10 lakh new terminals by March, most of  which will be put in tier III and tier IV towns, bringing them deeper  within the ambit of the ­digitised, cashless economy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though a starting target of 20 lakh terminals for Aadhaar Pay may  seem quite ambitious, according to the latest data, 111.51 crore adults  have already obtained their Aadhaar numbers and 50 crore bank acc­ounts  (of a total 110 crore savings accounts in the country) of 40 crore  people have been linked to Aadhaar and, according to UIDAI, nearly two  crore people are linking their bank accounts with Aadhaar every month,  brightening up the prospects of Aadhaar Pay. A majority of these numbers  are from rural areas and smaller cities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government and UIDAI aim to roll out Aadhaar Pay primarily in rural areas and tier III and tier IV cities to begin with, as these areas do not have proper debit or credit card coverage and the people living there are not big users of plastic cards or smartphones. “We need to provide a solution for every segment of the ­population,” says Pandey. “We have to take care of the people who cannot use smartphones or other mobile phones and debit or credit cards, and those who cannot remember their PIN for authentication. The only tool with them is their fingerprint. Approximately 30 crore people are not comfortable with cards or phone. We had to get them into the mode of digital payments.”&lt;br /&gt;&lt;br /&gt;Not surprisingly, critics of Aadhaar and Aadhaar-based services have attacked Aadhaar Pay and AEPS on issues of privacy and security of biometric and personal data. Pranesh Prakash, policy director with the Centre for Internet and Society (CIS), ­rec­ently tweeted, “As long as AEPS encourages biometric authorisation of transactions, it is bound to be a security nightmare, with widespread fraud.” Would you tell a shopkeeper your debit card’s PIN? No. Then why share your fingerprint? A fingerprint, in this system, becomes a kind of unchangeable PIN, he asks.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pointing out a possible danger, Usha Ramanathan, an independent law resear­c­her who has been following Aadhaar since its inception, says, “In many ­payments, biometric data is authenticated and then it remains in the system where there are leakages. Intermediaries then have access to the data, which is thus made insecure.”&lt;br /&gt;&lt;br /&gt;According to the UIDAI, however, once biometric data is provided by the consumer while making Aadhaar-based payments, it gets encrypted and a merchant doesn’t get access to that data. The Aadhaar Act also prohibits any storing of biometric data in local devices. And yet, there are many like CIS executive director Sunil Abraham who believe it is a mistake to use biometrics for authentication, especially when payments are concerned. “Our concern with Aadhaar Pay is about the biometric component of the project,” says Abraham. “Biometrics is an identification technology. Unfortunately, it is being presented as an authentication technology. It is not a secure authentication technology as biometric data can be stolen easily. It is also irrevocable; once bio­metric data is stolen, it cannot be ­re-issued like a smart card.”&lt;br /&gt;&lt;br /&gt;Then there is the problem of availability of fingerprints. In the case of many people from rural areas and the working class, fingerprints get affected due to the manual nature of their work. This makes it difficult for this target group of UIDAI to conduct transactions properly through Aadhaar Pay. “In Rajasthan, 30 per cent of the households are not even able to procure ration using fingerprints,” says Ramanathan.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The launch of Aadhar Pay at this time becomes more challenging as there has been a decline in digital payments this January. According to RBI data, digital payments, including transactions made by using credit cards, debit cards, electronic fund transfers, digital wallets and mobile banking transactions, were 10.2 per cent lower by volume and 7 per cent lower by value in January 2017 as compared to December 2016. Also, digital transactions fell from 1,027.7 million (worth Rs 105.4 lakh crore) to 922.9 million (worth Rs 98 lakh crore). This could get worse as the RBI raised the cash withdrawal limits from Rs 24,000 to Rs 50,000 from February 20 and aims to remove all limits by mid-March.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within digital transactions, debit and credit transactions at POS terminals dec­lined 18.6 per cent month-on-month in January, while mobile banking transactions declined by 7.6 per cent, showing that people still prefer to deal in cash. According to NPCI data, however, IMPS transactions rose by 18 per cent in January and UPI-based transactions went up from 2 million transactions (worth Rs 700 crore) in December to 4.2 million transactions (worth Rs 1,666 crore) in January.&lt;br /&gt;&lt;br /&gt;Clearly, considering India’s demography and its problems, when it comes to the security of personal and biometric data, the government and the UIDAI have many issues to clear before Aadhaar Pay can achieve any success. Moreover, there are over 100 crore mobile phones in India today, with even the lowest strata of the population having access to one. Yet mobile-­based payments and m-wallets are yet to hit that critical mass. To make Aadhaar Pay a bigger success than that could be a gigantic task.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips'&gt;https://cis-india.org/internet-governance/news/outlook-arindam-mukherjee-february-20-2017-no-genie-at-your-fingertips&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-16T16:02:31Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/frontline-v-sridhar-march-3-2017-digital-illusions">
    <title>Digital illusions</title>
    <link>https://cis-india.org/internet-governance/news/frontline-v-sridhar-march-3-2017-digital-illusions</link>
    <description>
        &lt;b&gt;The Watal Committee’s report presents the government with an impossible road map to a cashless nirvana. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by V. Sridhar was &lt;a class="external-link" href="http://www.frontline.in/the-nation/digital-illusions/article9541506.ece?homepage=true"&gt;published in Frontline&lt;/a&gt;, Print edition: March 3, 2017&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;MORE than two months after demonetising an overwhelming proportion of the currency in circulation, the Narendra Modi government now appears to have settled on its key objective for setting out on the unprecedented economic adventure. After shifting the goalposts several times—initially it was a means of combating terrorism and fake currency, later it was a war on black money and still later it was to forcibly march the country towards a “cashless” future, which was then modified to a more reasonable “less cash” society—the government now ostensibly has the road map to undertake the hazardous journey to an age when cash will no longer be king.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no better and time-tested means for a government bent on carrying out its whims than to appoint a committee headed by a former bureaucrat to give it the report that would justify what it has already decided to do. In August 2016, months before demonetisation, it constituted the Committee on Digital Payments, chaired by Ratan P. Watal, Principal Adviser, NITI Aayog, and former Secretary, Ministry of Finance. The committee dutifully submitted its report in double quick time on December 9, which was approved by the Finance Ministry on December 27.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The haste with which the committee has gone about its business is evident throughout the report. The committee’s slant is also evident in its approach, especially the reverence with which it welcomes the demonetisation move, even though it was commissioned before November 8, and its recourse to suspect data from private industry and multinational companies even when better quality data were available from official sources such as the Reserve Bank of India (RBI). The report’s lack of rigour, especially in tackling the substantive issues pertaining to monetary policy, was also hindered by the fact that not a single economist of worth, not even a specialist in monetary economics, was present in the committee.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Reckless rush&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;However, to blame the committee alone would be futile. The government, by pursuing an ambitious and reckless push towards “less cash” before setting out a regulatory framework governing digital payments, in effect, placed the cart before the horse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report reveals not just the haste with which the Watal Committee has pursued its mission with evangelical zeal but its utter lack of respect for conceptual issues. Nowhere is this more evident than in its recommendation that the regulatory responsibilities for governing the digital payments system be distanced from the RBI. This not only is out of tune with global practices, but it reveals the committee’s sheer inability to understand the fact that although payments account for just a small fraction of what a banking system does, they impinge on modern banking and monetary policy in crucial ways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a modern economy, currency creation by the central bank through fiat money is not the only means by which money is created. Deposits with banks, for instance, which provide the base for credit creation, are a means by which banks “create” money. From this perspective, a mobile wallet service provider also acts like a bank; even the users’ monies are held only for a brief period until transactions happen.&lt;br /&gt;&lt;br /&gt;Thus, it appears fit and proper that such services are also governed by the central bank. However, the Watal Committee has recommended that they be supervised by an entity that has a measure of independence from the RBI. This suggestion is dangerous because such entities can potentially pose a systemic risk, which is a key responsibility of a central bank. There is also the risk of regulatory capture of the suggested body, the Payments Regulatory Board (PRB), if sections of the payments industry exercise their newly acquired clout.&lt;br /&gt;&lt;br /&gt;The committee’s enthusiastic acceptance of the “go cashless” mantra is also evident in the data it has sourced. A good example of how it cherry-picked data is its use of a highly dubious (or at the very least, utterly misplaced) dataset to make the point that India is far too dependent on cash. It points to data sourced from the International Monetary Fund (IMF) and other sources to claim that India’s cash-GDP (gross domestic product) ratio is 12.04 per cent, much higher than countries such as Brazil, Mexico and South Africa.&lt;br /&gt;&lt;br /&gt;However, this much-abused dataset, quoted widely by advocates of demonetisation, is an inaccurate measure because it only captures the extent of physical currency in circulation and ignores short-term deposits, which are defined as “broad money”. Logically, these deposits must be included because they are virtually on call by depositors and are, therefore, liquid. Secondly, the fact that such deposits have been increasing as a proportion of the currency in circulation, aided by the spread of banking in India, makes them particularly relevant in the Indian context. The committee, in its bid to justify sending the nation on a cashless path, proceeds to evaluate the “high” costs that cash imposes on the Indian economy. It quotes from McKinsey and Visa, both of which may have a vested interest in India’s mission to go cashless, to drive home the point that going digital would result in huge savings. It quotes McKinsey to claim that “transitioning to an electronic platform for government payments itself could save approximately Rs.100,000 crore annually, with the cost of the transition being estimated at Rs.60,000-70,000 crore” and a Visa report that claims a total investment of Rs.60,000 crore over five years towards creating a digital payments ecosystem could reduce the country’s cost of cash from 1.7 per cent of the GDP to 1.3 per cent.&lt;br /&gt;&lt;br /&gt;Even while pushing the benefits of going cashless, the committee does admit that the transition to digital payments “cannot be agnostic to the actual costs incurred by the end customers, the reasons for preferring cash, and the factors inhibiting the uptake of existent channels of digital payments”.&lt;br /&gt;&lt;br /&gt;A large part of the Indian economy is its “black” counterpart, estimated at about 60 per cent of the legitimate part of India’s national income. Since a significant portion of the currency in circulation caters to the demand from the shadow economy, apart from the huge segment that is engaged in legitimate but informal economic activity, these estimates miss a significant chunk of the economy and its need for cash. Conceptually, to that extent, they significantly overstate the extent of cash relative to real GDP, including the portion missing from official data.&lt;br /&gt;&lt;br /&gt;The naive assumption that digitalised financial transactions are scale-neutral and costless, painless and efficient lies at the heart of the Watal Committee’s report. This has obvious implications for India’s large informal economy, which the Modi government is pushing, under pain of death, towards formality through digital channels. For instance, basic data on the usage of debit cards show how skewed the demand for cards is in India. In August 2016, cash withdrawals at ATMs accounted for 92.28 per cent of the value of all debit card transactions in the country. Thus, less than 8 per cent of the total value was made at point-of-sale (PoS) terminals.&lt;br /&gt;&lt;br /&gt;This statistic is a clear indication of a divide that mirrors the income and consumption divide in Indian society. When banks issue cards (debit, credit or any other), card payment system companies such as Mastercard and Visa provide an interface with the customer for which the issuer pays a fee, which is, in any case, recovered from customers. According to a recent study by Visa, the penetration of PoS terminals has slowed down significantly since 2012, when the RBI set limits on what the card companies could charge as merchant discount rate (MDR), the amount charged from sellers. This reveals that card companies may have been slowing down penetration in order to bargain for a bigger slice of the transaction fee. Although the rates apply not just to card-based purchases but to cash withdrawals too (and have been waived or lowered in the wake of demonetisation on a purely temporary basis), there is no guarantee that they will not increase once the situation returns to normal. This is aggravated by the fact that the government may have little or no control, or the will, to prevent banks and card issuers from charging higher rates later. This has been demonstrated in the past with, for example, ATM-based withdrawals, for which customers have to pay a fee after a minimum number of transactions.&lt;br /&gt;&lt;br /&gt;The flat fee (as a percentage) is regressive, especially because it punishes smaller sellers. It is in this sense that finance, digital or otherwise, is never scale-neutral. The fact that the immediate victims of demonetisation are small-scale producers and retailers implies that the balance has been tilted against them and in favour of larger producers and retailers after November 8. By skewing the field against small and tiny enterprises, demonetisation has been the vehicle for a massive and unprecedented transfer of incomes and wealth from the poor to the rich.&lt;br /&gt;&lt;br /&gt;There is also a fundamental asymmetry in the use of technology in the financial services industry. ATMs, which have been around for decades, were originally touted as a technology that increases efficiency in the use of cash; you only need to withdraw as much as you need, so there is no motive to hoard cash. But that was not the motive for introducing ATMs; the real reason was that they enabled banks to reduce their workforce to cut costs. As ATMs became more ubiquitous, banks started moving from cost cutting to profit-seeking by levying a fee for every transaction above a minimum threshold. In effect, the gains from technology are boosting the profitability of banks while the wider systemic benefits made possible by the same technology have been sacrificed, as the imposition of fees above a minimum threshold actually drives people to hoard cash.&lt;br /&gt;&lt;br /&gt;A study by Visa in October 2016, titled Accelerating The Growth of Digital Payments in India: A Five-Year Outlook, reveals that a one percentage point reduction in cash in circulation as percentage of GDP would require digital transactions of personal consumption expenditure to multiply ninefold. In other words, Visa suggested that digital transactions as a percentage of personal consumption expenditure would need to increase from 4 per cent to 36 per cent if the cash-GDP ratio has to reduce from 11 per cent to 10 per cent.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Security concerns&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Apart from these weighty economic issues, which are central to the move towards digital financial transactions, there are other critically important issues that the committee has either ignored or swept under the carpet. The question of privacy and security was a central issue at a recent conference on digital payments organised by HasGeek, a platform for software developers, in Bengaluru. Several experts, including some from the payments industry, pointed out the serious security and privacy issues that are being ignored in the rush to go digital. For example, an expert on data security warned that the mindless rush to mobile-based transactions was especially scary because most Android phones are vulnerable because they leak data. In fact, he noted that it may be safer for Android mobile users to perform digital transactions using desktop browsers.&lt;br /&gt;&lt;br /&gt;But what is more scary is the manner in which Aadhaar is being touted by the committee as the magic wand by which the digital era can be ushered in quickly. It recommends that mobile number-based and Aadhaar-based “fully interoperable payments” be prioritised within 60 days and that the National Payments Corporation of India (NPCI) be responsible for ensuring this.&lt;br /&gt;&lt;br /&gt;There has been significant resistance to the idea of an Aadhaar-enabled service for digital transactions, primarily because of security and privacy concerns. Entities such as the Centre for Internet and Society have warned against linking Aadhaar to the financial inclusion project because it violates the Supreme Court stricture against making Aadhaar mandatory. Kiran Jonnalagadda of HasGeek pointed out that the Aadhaar system offered only “single factor authorisation”. He said in a recent tweet that Aadhaar involved only a permanent login ID without “a changeable password”, which, from a systemic point of view, made it open to abuse.&lt;br /&gt;&lt;br /&gt;Longstanding critics of the Aadhaar project have pointed out the launch of such a countrywide programme at a time when a regulatory regime is not even in place, and when India does not have privacy protection laws, is dangerously misplaced. They have pointed to the fact that unlike in the case of a debit or credit card, which can be replaced when its integrity has been compromised, the theft of biometric characteristics of a user implies that they are compromised forever. This is not science fiction but a very real possibility as has been demonstrated across the world.&lt;br /&gt;&lt;br /&gt;There are also serious worries that the high failure rate of biometric verification would hurt the poor, supposedly the main target group of the Aadhaar project; the large-scale denial of services such as access to the public distribution system has already been documented across the country. Extending a failed system to real-time financial transactions, thus, appears to be dangerously misplaced. The fundamental issue is this: can a digital mode of payment effectively provide the same level of trust between the transacting parties that is central to a cash-based transaction? The answer to that depends critically on whether the digital mode provides the same level of convenience, cost, predictability and certainty.&lt;br /&gt;&lt;br /&gt;The Watal Committee has produced a report that the political masters sought. Its lack of appreciation of the economic issues underpinning financial transactions and of the wider economic processes in the Indian economy are obvious. Effectively, it has delivered what the Modi government asked for—an impossible road map to a cashless nirvana for a people already suffering the effects of demonetisation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/frontline-v-sridhar-march-3-2017-digital-illusions'&gt;https://cis-india.org/internet-governance/news/frontline-v-sridhar-march-3-2017-digital-illusions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-16T14:53:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/mashable-india-february-14-2017-india-aadhaar-uidai-privacy-security-debate">
    <title>India's Aadhaar with biometric details of its billion citizens is making experts uncomfortable</title>
    <link>https://cis-india.org/internet-governance/news/mashable-india-february-14-2017-india-aadhaar-uidai-privacy-security-debate</link>
    <description>
        &lt;b&gt;"Indians in general have yet to understand the meaning and essence of privacy," says Member of Parliament, Tathagata Satpathy. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post was published by &lt;a class="external-link" href="http://mashable.com/2017/02/14/india-aadhaar-uidai-privacy-security-debate/#RYHiC8REkmqz"&gt;Mashable India&lt;/a&gt; on February 14, 2017. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;But on Feb. 3, privacy was the hot topic of debate among many in India, thanks to a &lt;a href="https://twitter.com/beastoftraal/status/827387794045571072" target="_blank"&gt;tweet&lt;/a&gt; that showed random people being identified on the street via Aadhaar,  India's ubiquitous database that has biometric information of more than a  billion Indians.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That's how India Stack, the infrastructure built by the Unique  Identification Authority of India (UIDAI), welcomed OnGrid, a privately  owned company that is going to tap on the world's largest biometrics  system, conjuring images of &lt;i&gt;Minority Report&lt;/i&gt; style surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But how did India get here?&lt;/p&gt;
&lt;div class="fb_iframe_widget fb-quote" style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;h2 style="text-align: justify; "&gt;Aadhaar's foundation&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Not long ago, there were more people in India without a birth or school certificate &lt;a href="http://unstats.un.org/unsd/vitalstatkb/Attachment480.aspx?AttachmentType=1" target="_blank"&gt;than those with one&lt;/a&gt; (PDF). They had no means to prove their identity. This also contributed  to what is more popularly known as “leakage” in the government subsidy  fundings. The funds weren’t reaching the right people, in some  instances, and much of it was being siphoned off by middlemen.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nearly a decade ago, the government began scrambling for ways to  tackle these issues. Could technology come to the rescue? The government dialled techies, people like Nandan Nilekani, a founder of India's mammoth IT firm Infosys, for help.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2008, they &lt;a href="https://uidai.gov.in/images/notification_28_jan_2009.pdf" target="_blank"&gt;formulated&lt;/a&gt; Aadhaar, an audacious project "destined" to change the prospects of Indians. It was similar to Social Security number that US residents are assigned, but its implications were further reaching.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the time, the government &lt;a href="http://blogs.wsj.com/indiarealtime/2012/11/28/india-prepares-for-launch-of-worlds-biggest-cash-to-the-poor-program/" target="_blank"&gt;said&lt;/a&gt; it will primarily use this optional program to help the poor who are in  need of services such as grocery and other household items at  subsidized rates.&lt;/p&gt;
&lt;div class="fb_iframe_widget fb-quote" style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Eight years later, Aadhar, which stores identity information such as a  photo, name, address, fingerprints and iris scans of its citizens and  also assigns them with a unique 12-digit number, has become the world's  largest biometrics based identity system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the Indian government, over 1.11 billion people of the  country's roughly 1.3 billion citizens have enrolled themselves in the  biometrics system. About 99 percent of all adults in India have an  Aadhaar card, it &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=157709" target="_blank"&gt;said last month&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Today, the significance of Aadhaar, which on paper remains an  optional program, is undeniable in the country. The government says  Aadhaar has already saved it &lt;a href="http://www.economist.com/news/business/21712160-nearly-all-indias-13bn-citizens-are-now-enrolled-indian-business-prepares-tap" target="_blank"&gt;as much as $5 billion&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But that's not it.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;There's a bit of Aadhaar in everyone's life
&lt;div class="fb_iframe_widget fb-quote"&gt;&lt;span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar (Hindi for foundation) has long moved beyond helping the  poor. The UPI (Unified Payment Interface), another project by the Indian  government that uses Aadhaar, is helping the&lt;a href="http://mashable.com/2016/08/30/india-upi-payments-system/"&gt;&lt;ins&gt; country's much unbanked population to avail financial services&lt;/ins&gt;&lt;/a&gt; for the first time. Nilekani calls it a "&lt;a href="http://indianexpress.com/article/opinion/columns/the-coming-revolution-in-indian-banking-2924534/" target="_blank"&gt;WhatsApp moment&lt;/a&gt;" in the Indian financial sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In December last year, Prime Minister Narendra Modi &lt;a href="http://mashable.com/2016/12/30/bhim-app-india-narendra-modi/"&gt;launched BHIM&lt;/a&gt;,  a UPI-based payments app that aims to get millions of Indians to do  online money transactions for the first time, irrespective of which bank  they had their accounts with. With BHIM, transferring money is as  simple as sending a text message. People can also scan QR codes and pay  merchants for their purchases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This app is destined to replace all cash transactions," Modi said at  the launch event. "BHIM app will revolutionize India and force people  worldwide to take notice," he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next phase, called Aadhaar Enabled Payments System will &lt;a href="http://www.businesstoday.in/current/economy-politics/govt-to-roll-out-aadhar-pay-for-cashless-transactions/story/245059.html" target="_blank"&gt;do away&lt;/a&gt; with smartphones. People will be able to make payments by swiping their  finger on special terminals equipped with fingerprint sensors rather  than swiping cards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last year, the government said people could &lt;a href="http://mashable.com/2017/02/14/india-aadhaar-uidai-privacy-security-debate/mashable.com/2016/09/07/driver-license-india-digilocker-smartphone-app/#s3eNxAzZLjqB"&gt;store their driver license documents in an app called DigiLocker&lt;/a&gt;,  should they want to be relieved from the burden of carrying paper  documents. DigiLocker is a digital cloud service that any citizen in  India can avail using their Aadhaar information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government also plans to &lt;a href="http://mashable.com/2017/02/01/aadhaar-smart-health-card-senior-citizen-india/"&gt;hand out "health cards" to senior citizens&lt;/a&gt;, mapped to their Aadhaar number, which will store their medical records, which doctors will be able to access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Aadhaar is an instrument for good governance. Aadhaar is the mode to  reach the poor without the middlemen,” Ravi Shankar Prasad, India’s IT  minister said in a press conference last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But despite all the ways Aadhaar is making meaningful impact in  millions of lives, some people are very skeptical about it. And for  them, the scale at which Aadhaar operates now is only making things worse.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;A security nightmare&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;There have been multiple reports suggesting bogus and fake entries in Aadhaar database. Instances of animals such as dogs and cows having their own Aadhaar identification numbers have been widely reported. In one instance, even Hindu god Hanuman &lt;a href="http://www.thehindu.com/news/national/lord-hanuman-gets-aadhaar-card/article6401288.ece" target="_blank"&gt;was found to have an Aadhaar card&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem, it appears, is Aadhaar database has never been verified or audited, according to multiple security experts, privacy advocates, lawyers, and politicians who spoke to &lt;i&gt;Mashable India&lt;/i&gt; this month.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/aadhaar.jpg" alt="Aadhaar" class="image-inline" title="Aadhaar" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There are two fundamental flaws in Aadhaar: it is poorly designed,  and it is being poorly verified,” Member of Parliament and privacy  advocate, Rajeev Chandrasekhar told &lt;i&gt;Mashable India&lt;/i&gt;. “Aadhaar  isn’t foolproof, and this has resulted in fake data get into the system.  This in turn opens new gateways for money launderers,” he added.&lt;/p&gt;
&lt;div class="fb_iframe_widget fb-quote" style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Another issue with Aadhaar is, Chandrasekhar explains, there is no  firm legislation to safeguard the privacy and rights of the billion  people who have enrolled into the system. There’s little a person whose  Aadhaar data has been compromised could do. “Citizens who have  voluntarily given their data to Aadhaar authority, as of result of this,  are at risk,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rahul Narayan, a lawyer who is counselling several petitioners  challenging the Aadhaar project, echoed similar sentiments. “There’s no  concrete regulation in place,” he told &lt;i&gt;Mashable India&lt;/i&gt;. “The scope for abuses in Aadhaar is very vast,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But regulation — or its lack thereof — is only one of the many  challenges, experts say. Sunil Abraham, the executive director of  Bangalore-based research organisation the Centre for Internet and  Society (CIS), says the security concerns around Aadhaar are alarming.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Aadhaar is remote, covert, and non-consensual,” he told &lt;i&gt;Mashable India&lt;/i&gt;,  adding the existence of a central database of any kind, but especially  in the context of the Aadhaar, and at the scale it is working is  appalling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham said fingerprint and iris data of a person can be stolen with  little effort — a “gummy bear” which sells for a few cents, can store  one’s fingerprint, while a high resolution camera can capture one’s iris  data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="aadhaar-doesnt-use-basic"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;blockquote class="pullquote microcontent-wrapper" style="text-align: justify; "&gt;
&lt;div class="microcontent-shares"&gt;&lt;/div&gt;
&lt;span class="microcontent"&gt; Aadhaar doesn’t use basic principles of cryptography, and much of its security is not known. &lt;/span&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar is also irrevocable, which strands a person, whose data has  been compromised, with no choice but to get on with life, Abraham said,  adding that these vulnerabilities could have been averted had the  government chosen smart cards instead of biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On top of this, he added, that Aadhaar doesn’t use basic principles  of cryptography, and much of the security defences it uses are not  known.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Had the government open sourced Aadhaar code to the public (a common  practice in the tech community), security analysts could have evaluated  the strengths of Aadhaar. But this too isn’t happening.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At CIS, Sunil and his colleagues have &lt;a href="http://cis-india.org/internet-governance/front-page/blog/privacy/letter-to-finance-committee" target="_blank"&gt;written&lt;/a&gt; over half-a-dozen  open letters to the UIDAI (the authority that governs Aadhaar project)  raising questions and pointing holes in the system. But much of their  feedback has not returned any response, Abraham told &lt;i&gt;Mashable India&lt;/i&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;India Stack: A goldmine for everyone&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As part of its push to make Aadhaar more useful, the UIDAI created  what is called India Stack, an infrastructure through which government  bodies as well as private entities could leverage Aadhaar's database of  individual identities. This is what sparked the initial debate about privacy when India Stack tweeted the controversial photo.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Speaking to &lt;i&gt;Mashable India&lt;/i&gt;, Piyush Peshwani, a founder of  OnGrid, however dismissed the concerns, clarifying that the picture was  for representation purposes only. He said OnGrid is building a trust  platform, through which it aims to make it easier for recruiters to do background check on their potential employees after getting their consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India Stack and OnGrid have since taken down the picture from their  Twitter accounts. "OnGrid, much like other 200 companies working with  UIDAI, can only retrieve information of users after receiving their  prior consent," he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of information from the UIDAI and India Stack is becoming a  real challenge for citizens, many feel. There also appears to be a  conflict of interest between the privately held companies and those who  helped design the framework of Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Rohin Dharmakumar, a Bangalore-based journalist &lt;a href="https://twitter.com/r0h1n/status/827407936980783104" target="_blank"&gt;pointed out&lt;/a&gt;, Peshwani was part of the core team member of Aadhaar project. A lawyer, who requested to be not identified, told &lt;i&gt;Mashable India&lt;/i&gt; that there is a chance that these people could be familiar with  Aadhaar’s roadmap and use the information for business advantage, to say  the least.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most people &lt;i&gt;Mashable India&lt;/i&gt; spoke to are questioning the way these third-party companies are handling Aadhaar data. There is no regulation in place to prevent these companies from storing people’s data or even creating a parallel database of their own — a  view echoed by Abraham, Narayan, and Chandrasekhar.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Not mandatory only on paper&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;But for many, the biggest concern with Aadhaar remains just how  aggressively it is being implemented into various systems. For instance,  in the past one month alone, students in most Indians states who want  to apply for NEET, a national level medical entrance test, were told by  the education board CBSE that they will have to&lt;a href="http://www.ndtv.com/india-news/10-point-guide-to-neet-controversy-1655351" target="_blank"&gt;&lt;ins&gt; provide their Aadhaar number&lt;/ins&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;div class="fb_iframe_widget fb-quote" style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;A few months ago, Aadhaar was also &lt;a href="http://www.hindustantimes.com/mumbai-news/aadhaar-card-will-be-a-must-for-iit-jee-from-2017/story-iRwu40hEKn9ol21h1FGn9K.html" target="_blank"&gt;made mandatory&lt;/a&gt; for students who wanted to appear in JEE, an all India common  engineering entrance examination conducted for admission to various  engineering colleges in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The apex Supreme Court of India recently &lt;a href="http://www.bgr.in/news/supreme-court-asks-centre-to-register-id-details-of-all-mobile-subscribers/" target="_blank"&gt;asked&lt;/a&gt; the central government to register the phone number of all mobile  subscribers in India (there are about one billion of those in India) to  their respective Aadhaar cards. Telecom carriers are already enabling  new connections to get activated by verifying users with Aadhaar  database.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A prominent journalist who focuses on privacy and laws in India  questioned the motive. “When they kickstarted UIDAI, people were told  that this an optional biometrics system. But since then the government  has been rather tight-lipped on why it is aggressively pushing Aadhaar  into so many areas,” he told &lt;i&gt;Mashable India&lt;/i&gt;, requesting not to be identified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="it-is-especially-difficult"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;blockquote class="pullquote microcontent-wrapper" style="text-align: justify; "&gt;
&lt;div class="microcontent-shares"&gt;&lt;/div&gt;
&lt;span class="microcontent"&gt; "It is especially difficult to explain why privacy is necessary for a  society to advance when taken in the context of Aadhaar." &lt;/span&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;“It is especially difficult to explain why privacy is necessary for a  society to advance when taken in the context of Aadhaar. The Aadhaar  card is being offered to people in need, especially the poor, by making  them believe that services and subsidies provided by the government will  be held back from them unless they register,” Satpathy told &lt;i&gt;Mashable India&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The central government said last week Aadhaar number would be  mandatory for availing food grains through the Public Distribution  System under the National Food Security Act. In October last year, the  government &lt;a href="http://timesofindia.indiatimes.com/india/Aadhaar-card-must-for-LPG-subsidy-after-November/articleshow/54680322.cms" target="_blank"&gt;made Aadhaar mandatory&lt;/a&gt; for those who wanted to avail cooking gas at subsidized prices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“No matter how many laws are made about not making Aadhaar mandatory,  ultimately it depends on the last mile person who is offering any  service to inform citizens about their rights,” Satpathy added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“These last-mile service providers are companies who would benefit  from collecting and bartering big data for profit. They would be least  interested to inform citizens about their rights and about the not  mandatory status of Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“As Aadhaar percolates more and is used by more government and  private services, the citizen will start assuming it's a part of their  life. This card is already being misunderstood as if it is essential  like a passport,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“My worry is that this data will be used by government for mass  surveillance, ethnic cleansing and other insidious purposes,” Satpathy  said. “Once you have information about every citizen, the powerful will  not refrain from misusing it and for retention of power. The use of big  data for psycho-profiling is not unknown to the world anymore.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mashable India&lt;/i&gt; reached out to UIDAI on Feb. 8 for comment on  the privacy and security concerns made in this report. At the time of  publication, the authority hadn't responded to our queries.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/mashable-india-february-14-2017-india-aadhaar-uidai-privacy-security-debate'&gt;https://cis-india.org/internet-governance/news/mashable-india-february-14-2017-india-aadhaar-uidai-privacy-security-debate&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-14T14:57:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice">
    <title>Surveillance in India: Policy and Practice</title>
    <link>https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice</link>
    <description>
        &lt;b&gt;The National Institute of Public Finance and Policy organized a brainstorming session on net neutrality on February 8, 2017 and a public seminar on surveillance in India the following day on February 9, 2017 in New Delhi. Pranesh Prakash gave a talk. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Pranesh presented a narrative of the current state of surveillance law, our knowledge of current surveillance practices (including noting where programmes like Natgrid, CMS, etc. fit in), and charted a rough map of reforms needed and outstanding policy research questions.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Pranesh Prakash&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash is a Policy Director at - and was part of the founding team of - the Centre for Internet and Society, a non-profit organisation that engages in research and policy advocacy. He is also the Legal Lead at Creative Commons India and an Affiliated Fellow at the Yale Law School's Information Society Project, and has been on the Executive Committee of the NCUC at ICANN. In 2014, he was selected by Forbes India for its inaugural "30 under 30"​ list of young achievers, and in 2012 he was recognized as an Internet Freedom Fellow by the U.S. government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His research interests converge at the intersections of technology, culture, economics, law, and justice. His current work focuses on interrogating, promoting, and engaging with policymakers on the areas of access to knowledge (primarily copyright reform), 'openness' (including open government data, open standards, free/libre/open source software, and open access), freedom of expression, privacy, digital security, and Internet governance. He is a prominent voice on these issues, with the newspaper Mint calling him “one of the clearest thinkers in this area”, and his research having been quoted in the Indian parliament. He regularly speaks at national and international conferences on these topics. He has a degree in arts and law from the National Law School in Bangalore, and while there he helped found the Indian Journal of Law and Technology, and was part of its editorial board for two years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/workshop-on-net-neutrality"&gt;Click here&lt;/a&gt; to see the agenda for the brainstorming session on net neutrality.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Video &lt;br /&gt; &lt;iframe frameborder="0" height="315" src="https://www.youtube.com/embed/6KfyQ7y6TNE" width="560"&gt;&lt;/iframe&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice'&gt;https://cis-india.org/internet-governance/news/surveillance-in-india-policy-and-practice&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2017-03-15T01:05:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/biometric-update-february-9-2017-rawlson-king-indian-public-concerned-about-fingerprint-payment-scheme">
    <title>Indian public concerned about fingerprint payment scheme</title>
    <link>https://cis-india.org/internet-governance/news/biometric-update-february-9-2017-rawlson-king-indian-public-concerned-about-fingerprint-payment-scheme</link>
    <description>
        &lt;b&gt;The Guardian is reporting that a prominent think tank has found that the prospect of using fingerprint authentication for everyday payments is raising privacy concerns among the Indian public.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Rawlson King was published by &lt;a class="external-link" href="https://www.biometricupdate.com/201702/indian-public-concerned-about-fingerprint-payment-scheme"&gt;Biometric Update.com&lt;/a&gt; on February 9, 2017. Sumandro Chattapadhyay was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The &lt;a href="http://cis-india.org/" target="_blank"&gt;Centre for Internet and Society&lt;/a&gt; says that many Indians are concerned about the “privacy implications” of using Aadhaar as a payment scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar is the 12-digit unique identification number issued by the  Indian government to every individual resident of India. The Aadhaar  project aims to provide a single, unique identifier which captures all  the demographic and biometric details of every Indian resident.  Currently, Aadhaar has issued over 900 million Aadhaar numbers.   BiometricUpdate.com &lt;a href="http://www.biometricupdate.com/201610/aadhaar-program-surpasses-one-billion-people-registered"&gt;recently reported&lt;/a&gt; that over one billion people have now been enrolled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government is intent on expanding the use of Aadhaar  beyond the provision of social services to include financial  transactions.  The government’s &lt;a href="http://meity.gov.in/sites/upload_files/dit/files/Digital%20India%20Presentation%20on%20DeitY%20website.pdf" target="_blank"&gt;“Digital India” initiative&lt;/a&gt; aims to create a “cradle-to-grave digital identity” that can enable a  digital economy.  Moving towards a digital economy will allow low income  people to access the banking system.  The use of Aadhaar for most  transactions however would also allow the government to reduce the cash  supply, which would work to eliminate untaxed cash transactions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government took a big step towards reducing the cash supply last  November by removing 500 and 1,000 rupee notes, thereby eliminating 85  percent of the country’s circulating currency.  Indian residents  responded by setting up three million, enabled by fingerprint  verification.  BiometricUpdate.com has reported that banks, including  DCB Bank, &lt;a href="http://www.biometricupdate.com/201604/indian-bank-introduces-aadhaar-based-atm"&gt;have introduced Aadhaar enhanced services&lt;/a&gt;, and that financial service firms including &lt;a href="http://www.biometricupdate.com/201610/yes-bank-offers-aadhaar-enabled-point-of-sales-terminal"&gt;YES Bank&lt;/a&gt; and &lt;a href="http://www.biometricupdate.com/201701/spice-money-launches-aadhaar-enabled-payment-system"&gt;Spice Money&lt;/a&gt; are introducing Aadhaar-enabled payment systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The unveiling of this biometric-based payment ecosystem however is  creating consternation among the general public. Sumandro Chattapadhyay,  a director at the Centre for Internet and Society told the Guardian  that Indian residents are concerned about the “data-sharing  possibilities opened up by Aadhaar.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He noted that Aadhaar “makes it easier for companies not only to  share information on individuals’ consumption and mobility habits, but  also to link this data up with public records like the electoral  register.  Both lead to significant threats to privacy of individuals.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chattapadhyay also told the Guardian that “the law governing use of  the biometric database, fast-tracked through parliament last year, is  flimsy when it comes to the private sector. Since India lacks a general  privacy or data protection law, this leaves corporate use of Aadhaar  services effectively unregulated.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He told the UK newspaper that his greatest fear is that “private  companies could eventually gain access to government-held personal data,  such as income or medical records, while the government could use  company data like phone records to target specific individuals in  political campaigns.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite these fears, the government continues to move ahead with link  Aadhaar with more elements of the financial system.  Recent reports  have stated that &lt;a href="http://www.biometricupdate.com/201701/indian-government-may-allow-citizens-to-use-aadhaar-id-for-income-tax-return"&gt;the Indian government may allow citizens to use Aadhaar to file their income tax returns&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/biometric-update-february-9-2017-rawlson-king-indian-public-concerned-about-fingerprint-payment-scheme'&gt;https://cis-india.org/internet-governance/news/biometric-update-february-9-2017-rawlson-king-indian-public-concerned-about-fingerprint-payment-scheme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-12T15:10:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/ranking-digital-rights-in-india">
    <title>Ranking Digital Rights in India </title>
    <link>https://cis-india.org/internet-governance/blog/ranking-digital-rights-in-india</link>
    <description>
        &lt;b&gt;This report is a study of five Indian telecommunication companies (Tata Communications Ltd., Reliance Communications Limited, Aircel Limited, Vodafone India Private Limited and Reliance Jio Infocomm Limited) and three Indian online service providers (Hike Messenger, Shaadi.com and Rediff.com). The report is an attempt to evaluate the practices and policies of companies which provide internet infrastructure or internet services, and are integral intermediaries to the everyday experience of the internet in India.&lt;/b&gt;
        &lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/ranking-digital-rights-in-india.pdf"&gt;Download &lt;/a&gt;the PDF&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The report draws upon the methodology of Ranking Digital Rights project, which analysed 16 of the world’s major internet companies, including internet services and telecommunications providers based on their commitment towards upholding human rights through their services – in particular towards their commitment to users’ freedom of expression and privacy. The report comprehensively assessed the performance of companies on various indicators related to these human rights, as per information which was made publicly available by these companies or was otherwise in the public domain. This report follows the methodology of the proposed 2017 Ranking Digital Rights index, updated as of October 2016.&lt;a name="_ftnref1"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This report studied Indian companies which have, or have had, a major impact on the use and experience of the Internet in India. The companies range from online social media and micro-blogging platforms to major telecommunications companies providing critical national communications infrastructure. While some of the companies have operations outside of India as well, our study was aimed at how these companies have impacted users in India. This allowed us to study the impact of the specific legal and social context in India upon the behaviour of these firms, and conversely also the impact of these companies on the Indian internet and its users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;VSNL, the company later to be acquired by and merged into TATA Communications, was the first company to provide public Internet connections to India, in 1996. In 2015, India surpassed the United States of America, as the jurisdiction with the worlds second-largest internet user base, with an estimated  338 million users.&lt;a name="_ftnref2"&gt;&lt;/a&gt; With the diminishing costs of wireless broadband internet and the proliferation of cheaper internet-enabled mobile devices, India is expected to house a significant number of the next billion internet users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concomitantly, the internet service industry in India has grown by leaps and bounds, particularly the telecommunications sector, a large part of whose growth can be attributed to the rising use of wireless internet across India. The telecom/ISP industry in India remains concentrated among a few firms. As of early 2016 just three of the last mile ISPs which are studied in this report, are responsible for providing end-user connectivity to close to 40% of mobile internet subscribers in India.&lt;a name="_ftnref3"&gt;&lt;/a&gt; However, the market seems to be highly responsive to new entrants, as can be seem from the example of Reliance Jio, a new telecom provider, which has built its brand specifically around affordable broadband services, and is also one of the companies analysed in this report.&lt;a name="_ftnref4"&gt;&lt;/a&gt; As the gateway service providers of the internet to millions of Indian users, these corporations remain the focal point of most regulatory concerns around the Internet in India, as well as the intermediaries whose policies and actions have the largest impact on internet freedoms and user experiences.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides the telecommunications companies, India has a thriving internet services industry – by some estimates, the Indian e-commerce industry will be worth 119 Billion USD by 2020.&lt;a name="_ftnref5"&gt;&lt;/a&gt; While the major players in the e-commerce industry are shipping and food aggregation services, other companies have emerged which provide social networking services or mass-communication platforms including micro-blogging platforms, matrimonial websites, messaging applications, social video streaming services, etc. While localised services, including major e-commerce websites (Flipkart, Snapdeal), payment gateways (Paytm, Freecharge) and taxi aggregators (Ola), remain the most widely utilized internet services among Indians, the services analysed in this report have been chosen for their potential impact they have upon the user rights analysed in this report – namely freedom of speech and privacy. These services provide important alternative spaces of localised social media and communication, as alternatives to the currently dominant services such as Facebook, Twitter and Google, as well as specialised services used mostly within the Indian social context, such as Shaadi.com, a matrimonial match-making website which is widely used in India. The online service providers in this report have been chosen on the basis of the potential impact that these services may have on online freedoms, based on the information they collect and the communications they make possible.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Legal and regulatory framework&lt;/h2&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Corporate Accountability in India&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the last decade, there has been a major push towards corporate social responsibility (“CSR”) in policy. In 2009, the Securities Exchange Board of India mandated all listed public companies to publish ‘Business Responsibility Reports’ disclosing efforts taken towards, among other things, human rights compliances by the company.&lt;a name="_ftnref6"&gt;&lt;/a&gt; The new Indian Companies Act, 2013 introduced a ‘mandatory’ CSR policy which enjoins certain classes of corporations to maintain a CSR policy and to spend a minimum percentage of their net profits towards activities mentioned in the Act.&lt;a name="_ftnref7"&gt;&lt;/a&gt; However, these provisions do not do much in terms of assessing the impact of corporate activities upon human rights or enforcing human rights compliance.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Privacy and Data Protection in&lt;/strong&gt; &lt;strong&gt;India&lt;/strong&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;There is no explicit right to privacy under the Constitution of India. However, such as right has been judicially recognized as being a component of the fundamental right to life and liberty under Article 21 of the Constitution of India.&lt;a name="_ftnref8"&gt;&lt;/a&gt; However, there have been varying interpretations of the scope of such a right, including who and what it is meant to protect. The precise scope of the right to privacy, or whether a general right to privacy exists at all under the Indian Constitution, is currently being adjudicated by the Supreme Court.&lt;a name="_ftnref9"&gt;&lt;/a&gt; Although the Indian Supreme Court has had the opportunity to adjudicate upon telephonic surveillance conducted by the Government,&lt;a name="_ftnref10"&gt;&lt;/a&gt; there has been no determination of the constitutionality of government interception of online communications, or to carry out bulk surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per Section 69 of the Information Technology Act, the primary legislation dealing with online communications in India, the government is empowered to monitor, surveil and decrypt information, “in the interest of the sovereignty or integrity of India, defense of India, security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of any cognizable offence relating to above or for investigation of any offence.” Moreover, intermediaries, as defined under the act,&lt;a name="_ftnref11"&gt;&lt;/a&gt; are required to provide facilities to enable the government to carry out such monitoring. The specific procedure to be followed during lawful interception of information is given under the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009, (“Interception Rules”)&lt;a name="_ftnref12"&gt;&lt;/a&gt; which provides a detailed procedure for government agencies to issue monitoring directions as well as the obligations of intermediaries to facilitate the same. The Interception Rules require intermediaries who are enlisted for facilitating monitoring of information to maintain strict confidentiality regarding such directions for lawful interception or decryption, as well as to destroy any records of such directions every six (6) months.&lt;a name="_ftnref13"&gt;&lt;/a&gt; Intermediaries are required to designate specific authorities (the designated authority) to receive and handle any of the above government directions and also to maintain records and provide proper facilities to the government agencies.&lt;a name="_ftnref14"&gt;&lt;/a&gt; The designated authority is also responsible for maintaining the security and confidentiality of all information which ‘affects the privacy’ of individuals. Further, the rules prescribe that no person may intercept any online communication or information, except the intermediary for the limited purposes specified in the rules, which include for tracing persons who may have contravened any provision of the IT Act or rules.&lt;a name="_ftnref15"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With respect to decryption, besides the government’s power to order decryption of content as described above, the statutory license between the telecommunications providers and the Department of Telecommunications (“DoT”), prescribes, among other things, that only encryption “up to 40 bit key length in the symmetric algorithms or its equivalent in others” may be utilized by any person, including an intermediary. In the case that any person utilizes encryption stronger than what is prescribed, the decryption key must be stored with the DoT.&lt;a name="_ftnref16"&gt;&lt;/a&gt; At the same time, the license prescribes that ISP’s must not utlilize any hardware or software which makes the network vulnerable to security breaches, placing intermediaries in a difficult position regarding communications privacy.. Moreover, the license (as well as the Unified Access Service License) prohibit the use of bulk encryption by the ISP for their network, effectively proscribing efforts towards user privacy by the ISP’s own initiative.&lt;a name="_ftnref17"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no statute in India generally governing data protection or for the protection of privacy. However, statutory rules address privacy concerns across different sectors, such as banking and healthcare. A more general regulation for data protection was enacted under Section 43A of the Information Technology Act, 2000 (“IT Act”) and the rules made thereunder, in particular, the Information Technology (Reasonable Security Practices and Procedures and sensitive personal data or information) Rules, 2011 (“Rules”).&lt;a name="_ftnref18"&gt;&lt;/a&gt; Section 43A requires body corporates (defined as any company) handling sensitive personal information, (as defined under the IT Act and Rules), to maintain reasonable security practices regarding handling such information, and penalises failure to maintain such practices, in case it causes ‘wrongful loss or wrongful gain to any person.’ The Rules prescribed under Section 43A detail the general obligations of body corporates that handle sensitive personal information more comprehensively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Rules specify that all body corporates which “collects, receives, possess, stores, deals or handle information”, directly from the holder of such information through a lawful contract,&lt;a name="_ftnref19"&gt;&lt;/a&gt; shall provide a privacy policy, which must – (a) be clearly accessible; (b) specify the data collected; (c) specify the purpose for collection and the disclosure of such information and; (d) specify the reasonable security practices for the protection of such data. There are also specific requirements for body corporates which handle sensitive personal information, which includes obtaining consent from the data subject, and permitting data collection for a specified and limited purpose as well as a limited time. The body corporate is also supposed to ensure the data subject is aware of: (a) the fact that the information is being collected; (b) the purpose for which the information is being collected; (c) the intended recipients of the information; and (d) the name and address of he agency that is collecting the information as well as the agency that will retain the information. The rules also require the body corporate to provide an explicit option for users to opt-out of having their personal information collected, which permission can also be withdrawn at any time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the above, the IT (Intermediary Guidelines) Rules, 2011, (“Guidelines) also contain a prescription for providing information to government agencies, although the rules have been enacted under the provisions of the safe-harbour conditions of the IT Act. Rule 3(7) of the Guidelines states that “…When required by lawful order, the intermediary shall provide information or any such assistance to Government Agencies who are lawfully authorised for investigative, protective, cyber security activity. The information or any such assistance shall be provided for the purpose of verification of identity, or for prevention, detection, investigation, prosecution, cyber security incidents and punishment of offences under any law for the time being in force, on a request in writing staling clearly the purpose of seeking such information or any such assistance.” While this regulation outside the scope of the rule-making power under Section 79 of the IT Act, it continues to remain in force, although the extent to which it is utilized to obtain information is unknown.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Content Restriction, Website blocking and Intermediary Liability in India&lt;/strong&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Section 79 of the IT Act contains the safe harbor provision for intermediaries, sheltering them from liability, under specific circumstances, against information, data, or communication links made available by any third party. For the safe harbor to apply, the role of the intermediaries must be limited to (a) providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hosted; or (b) a platform which does not initiate the transmission, modify it or select the receiver of the transmission. Moreover, the safe-harbour does not apply when the ISP has received actual knowledge, or been notified by the appropriate government agency, about potentially unlawful material which the intermediary has control over, fails to act on such knowledge by disabling access to the material.&lt;a name="_ftnref20"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Central Government has further prescribed guidelines under Section 79 of the IT Act, which intermediaries must comply with to have the shelter of the safe harbor provisions.&lt;a name="_ftnref21"&gt;&lt;/a&gt; The guidelines contain prescriptions for all intermediaries to inform their users, through terms of service and user agreements, of information and content which is restricted, including vague prescriptions against content which is “…grossly harmful, harassing, blasphemous defamatory, obscene, pornographic, paedophilic, libellous, invasive of another's privacy, hateful, or racially, ethnically objectionable, disparaging, relating or encouraging money laundering or gambling, or otherwise unlawful in any manner whatever;” or that infringes any proprietary rights (including Intellectual Property rights).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3(4) is particularly important, and provides the procedure to be followed for content removal by intermediaries. This rule provides that any intermediary, who hosts, publishes or stores information belonging to the above specified categories, shall remove such information within 36 hours of receiving ‘actual knowledge’ about such information by any ‘affected person’. Further, any such flagged content must be retained by the intermediary itself for a period of 90 days. The scope of this rule led to frequent misuse of the provision for removal of content. As non-compliance would make the intermediaries liable for potentially illegal conduct, intermediaries were found to be eager to remove any content which was flagged as objectionable by any individual.  However, the scope of the rule received some clarification from the Supreme Court judgement in Shreya Singhal v Union of India.&lt;a name="_ftnref22"&gt;&lt;/a&gt; While the Supreme Court upheld the validity of Section 79 and the Guidelines framed under that section, it interpreted the requirement of ‘actual knowledge’ to mean the knowledge obtained through the order of a court asking the intermediary to remove specific content. Further, the Supreme Court held that any such court order for removal of restriction must conform Article 19(2) of the Constitution of India, detailing permissible restrictions to the freedom of speech and expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the enforcement of the above rules, Rule 11 directs intermediaries to appoint a Grievance Officer to redress any complaints for violation of Rule 3, which must be redressed within one month. However, there is no specific mention of any remedies against wrongful removal of content or mechanisms to address such concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the above, there is a parallel mechanism for imposing liability on intermediaries under the Copyright Act, 1957. According to various High Courts in India, online intermediaries fall under the definition of Section 51(a)(ii),  which includes as an infringer, “…any person who permits for profit any place to be used for the communication of the work to the public where such communication constitutes an infringement of the copyright in the work, unless he was not aware and had no reasonable ground for believing that such communication to the public would be an infringement of copyright.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 52(1) provides for exemptions from liability for infringement. The relevant part of S.52 states –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“(1) The following acts shall not constitute an infringement of copyright, namely:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the transient or incidental storage of a work or performance purely in the technical process of electronic transmission or communication to the public;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) transient or incidental storage of a work or performance for the purpose of providing electronic links, access or integration, where such links, access or integration has not been expressly prohibited by the right holder, unless the person responsible is aware or has reasonable grounds for believing that such storage is of an infringing copy:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that if the person responsible for the storage of the copy has received a written complaint from the owner of copyright in the work, complaining that such transient or incidental storage is an infringement, such person responsible for the storage shall refrain from facilitating such access for a period of twenty-one days or till he receives an order from the competent court refraining from facilitating access and in case no such order is received before the expiry of such period of twenty-one days, he may continue to provide the facility of such access;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Section 52 of the Act provides for safe harbour for certain kinds of online intermediaries, this does not apply where the intermediary has ‘reasonable grounds for believing’ that storage is an infringing copy, similar to language used in 51(a)(ii), which has been broadly interpreted by high  courts.  The procedure for notifying the intermediary for taking down infringing content is given in the Rules prescribed under the Copyright Act, which requires that the holder of the Copyright must give written notice to the intermediary, including details about the description of work for identification, proof of ownership of original work, proof of infringement by work sought to be removed, the location of the work, and details of the person who is responsible for uploading the potentially infringing work.  Upon receipt of such a notice, the intermediary must disable access to such content within 36 hours. Further, intermediaries are required to display reasons for disabling access to anyone trying to access the content. However, the intermediary may restore the content after 21 days if no court order is received to endorse its removal, although this is not a requirement. After this notice period, the intermediary may choose not to respond to further notices from the same complainant about the same content at the same location.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides the safe harbour provisions, which require intermediaries to meet certain conditions to avoid liability for content hosted by them, intermediaries are also required to comply with government blocking orders for removal of content, as per Section 69A of the IT Act. This section specifies that the government may, according to the prescribed procedure, order any intermediary to block access to any information “in the interest of sovereignty and integrity of India, defense of India, security of the State, friendly relations with foreign states or public order or for preventing incitement to the commission of any cognizable offence relating to above.”  Failure to comply by the intermediary results in criminal penalties for the personnel of the intermediary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The procedure for blocking has been prescribed in the Information Technology (Procedure and Safeguards for Blocking for Access of Information by Public) Rules, 2009.&lt;a name="_ftnref23"&gt;&lt;/a&gt; The Rules under Section 69A allow any Central Government or State Government ministry or department to issue blocking requests, which may be made by any person to specific departmental representatives known as ‘nodal officers’, may request the blocking of access to content by any intermediary. The nodal officers forward such requests for blocking of access to the ‘designated officer’, who is an officer of the Central Government not below the rank of the joint secretary, as nominated by the Central Government. The blocking request is then considered by a committee which recommends whether the designated officer should approve such request or not. Once approved, the request is forwarded to the intermediary, who must nominate at least one person to handle all such requests. In case of non-compliance, the designated officer may initiate action under Section 69A against the intermediary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rules contain some safeguards to ensure due process before blocking orders are made. The designated officer is required to make ‘reasonable efforts’ to locate the user or intermediary who has hosted the content and allow for such person or intermediary to appear before the committee to submit their reply and clarifications.  Rule 9 lays down the emergency procedure for blocking in which case the above detailed procedural safeguards such as the committee deliberation or providing a hearing are dispensed with. However, Rule 16 requires the confidentiality of all such requests and actions taken under the rules, which defeats any attempts at the transparency or fairness of the process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, the ISP and Unified Services License (USL) issued by the DoT prescribe further obligations to block content.&lt;a name="_ftnref24"&gt;&lt;/a&gt; Under Clause 38 of the USL, for example, ISP’s must take measures to prevent the “flow of obscene, objectionable, unauthorised or any other content infringing copy-rights, intellectual property right and international &amp;amp; domestic Cyber laws in any form” over their network.  Moreover, as per Clause 7 of the USL, the licensee is obliged to block subscribers as well as content, as identified by the Licensor (DoT).  Failure to comply with license conditions can lead to the cancellation of the telecommunication operators license with the DoT, without which they are not permitted to operate in India.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Findings and Recommendations&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;General&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;strong&gt;Most companies’ policies are only tailored towards minimum compliance with national regulations;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;As detailed in the above sections, companies are mandated by law to comply with certain procedures including data protection and content restriction policies. While compliance with these regulations also varies from company to company, there are barely any instances of companies taking initiative to ensure better privacy procedures than mandated by law, or to go beyond human rights reporting requirements as detailed in corporate social responsibility regulations. For example, Vodafone was the only company in this index to disclose (even in a limited manner) government requests for user information or for content restriction.&lt;/li&gt;
&lt;li&gt;While compliance with regulations is an understandable threshold for companies to maintain, companies should make efforts to at least explain the import of the regulations to their users and explain how their policies are likely to affect their users’ rights.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;strong&gt;Company policies are usually tailored towards regulations in specific regulations;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Jurisdiction is a major issue in regulating internet services. Internet service providers may operate and have users in several jurisdictions, but their policies do not always meet the requirements of each jurisdiction in which they operate, where there services are accessed. Even in cases of large ISPs which operate across jurisdictions, the policies may be tailored to specific jurisdictions. Tata Communications Ltd. for example, specifically references the law of the United States of America in its policies, though the same policies may operate for users in other jurisdictions. This is problematic since most company policies have accession to the terms as a condition of service, which means that restrictions (or protections, as the case may be) on user rights placed in one jurisdiction can be responsible for similar restrictions across the board in several jurisdictions.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;strong&gt;Companies do not seek meaningful consent from their users before subjecting them to their policies;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The study highlights the importance of company policies to users rights. These policies define the relationship between the service provider and the user, including delimiting the rights available to users and their control over the information collected from them (often automatically). However, most companies take very little effort in obtaining meaningful user consent towards their policies, including efforts towards educating users about the import of their policies. In many cases, mere use of the service is mentioned as a sufficient condition for making the policies binding upon the users. Even in other cases, where notice of policies is more prominent, few efforts are made to ensure that users fully understand the scope and effect of the policies.&lt;/li&gt;
&lt;li&gt;Further, while most companies have committed to informing users of changes to their policies in some form, only Reliance Jio disclosed that it directly informed users of changes to policies, subject to its discretion; while others did not maintain any clear standard for notice to changes to policies. None of the companies provided access to any archives where changes to the company policies could be reviewed.&lt;/li&gt;
&lt;li&gt;It is apparent that most companies do not take much effort in maintaining robust or meaningful terms and conditions or privacy policies, which include an explanation of how the service could potentially affect a user’s privacy or freedom of expression. Nor do most companies attempt to take safeguards for protecting such freedoms beyond complying with regulations. Only Shaadi.com commits to informing users about data protection and how to take reasonable steps for ensuring their online privacy, above and beyond the regulations.&lt;/li&gt;
&lt;li&gt;Finally, a study of TCL’s policy indicates that in some cases, the actions or policies of upstream providers (backbone internet providers such as TCL), can affect users’ experience of the internet without their consent or even notice, since these terms must be complied with by the last-mile provider to whom the users may connect.&lt;/li&gt;
&lt;li&gt;The formalistic manner in which these policies are framed and worded effectively prevents many users from understanding their import upon online freedoms. Companies which are serious about committing to human rights should take steps towards making their policies easily accessible, and to clearly explain the scope of their policies and their impact on users’ online human rights in an easy and understandable manner instead of a formalistic, legal statement which is not accessible to lay users. Companies should also take steps towards educating users about how to protect their online freedoms while utilizing the services of the company.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;strong&gt;Indian regulations hinder transparency and prevent companies from being accountable to their users;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The regulations outlined in Part – I of this report are telling in the broad restrictions they place on company transparency, in particular for disclosing any information about government requests for user information, or government or third party requests for content restriction. The policies are vaguely worded and broad in their confidentiality requirements, which potentially causes a chilling effect around the release of even aggregate or depersonalized information by companies.&lt;/li&gt;
&lt;li&gt;Government regulations often provide the framework around which company policies operate. Regulators must include principles for safeguarding online freedom of expression and privacy as a fundamental part of their regulations. This includes clearly specifying the scope of confidentiality requirements as a response to government requests and to enable some form of transparency and oversight.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Commitment&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;strong&gt;Most companies do not adequately disclose efforts towards assessing their impact on online freedoms or compliance with the same;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Except Vodafone India (through Vodafone plc, its parent company), none of the companies surveyed in this report have disclosed any assessments of the impact of their services on online freedom of speech or privacy. The lack of such disclosures indicates companies’ lack of concern over ensuring transparency in such issues.&lt;/li&gt;
&lt;li&gt;Although no legal framework exists for such assessment, companies must independently assess the impact of their services upon basic online freedoms as the first step towards committing to protecting those freedoms, possibly through a third party such as the Global Network Initiative. The findings from these assessments should, to the extent possible, be made public.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;strong&gt;Some companies have implemented internal policies for training on and to monitor compliance with online freedoms; &lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Some companies have disclosed internal mechanisms which emphasise on protecting online freedoms, for example, through employee training on such issues. These internal policies are an important aspect of accountability for company processes which are generally outside of public oversight. Four of the eight companies surveyed, for example, have whistle-blower policies protecting the internal reporting of violations of ‘ethical conduct’. In addition, some companies, for example Tata Communications and Aircel disclose an internal code of ethics and measures for ensuring compliance with the same. Similarly, Vodafone discloses the existence of a Privacy Management System for training employees on the importance of customer privacy.&lt;/li&gt;
&lt;li&gt;While some companies have robust internal processes for accountability, companies should also specify that these processes explicitly deal with concerns about user privacy or censorship, above and beyond general requirements for ethical conduct.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;strong&gt;Companies do not disclose direct efforts to lobby against regulatory policies which negatively impact online freedoms;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;None of the companies disclosed efforts towards directly lobbying for clearer regulations on government censorship of online privacy. However, the lack of transparency could possibly be attributed to the nature of the public consultancy process by Indian regulators. In fact, where the consultancy process is made public and transparent, companies have shown efforts at engaging with regulators. For example, several of the companies studied in this report have responded to the TRAI’s call for public comments on the network neutrality framework for the Indian internet, including TCL, Airtel, Aircel and Vodafone India.&lt;/li&gt;
&lt;li&gt;The obvious implication for regulators is to improve the public consultancy process and attempt to engage stakeholders in a more transparent manner. Companies should also put regulatory pressure against regulations which stifle free speech or user privacy, if not through legal challenges, through public statements against regulatory overreach or oversight in these areas.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;strong&gt;However, companies are making efforts towards better regulation through industry groups, particularly for privacy and data protection;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Most telecommunication companies surveyed in this report are members of some industry body which advocates in favour of protecting online freedoms. In particular, the companies are members of associations such as the Data Security Council of India or the Internet Service Providers Association of India, which commit to protecting different aspects of users rights. The DSCI, for example, is an influential industry association which lobbies for better regulations for data protection. However, there are few such associations actively committed towards tackling private or governmental censorship online.&lt;/li&gt;
&lt;li&gt;While industry bodies are a growing voice in lobbying efforts towards better regulation, companies should also participate in civil society forums which advocate for protecting online freedoms.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;strong&gt;All companies disclose some forum for grievance redressal, however, none of these specifically address freedom of speech and privacy issues;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;All the companies surveyed have disclosed some forum for grievance redressal. As indicated above, this forum is also a statutory requirement under both the Reasonable Security Practices Rules and the Intermediaries Guidelines Rules under the IT Act. In most cases, however, these policies do not specify whether and to what extent the grievance redressal forum addresses issues of online censorship or privacy concerns, although some companies, such as Vodafone, have specifically designated Privacy Officers. Only Aircel, TCL and RCL disclosed an appellate process or timelines for resolution of complaints. Further, Aircel is the only company in this report which disclosed aggregate data of complaints received and dealt with.&lt;/li&gt;
&lt;li&gt;Companies must take steps towards improving customer protection, particularly in cases involving violations of online freedoms. Grievance redressal by the company is generally the first step towards addressing rights violations and can also prevent future legal problems which the company may face. Further, companies should be transparent in their approach towards resolving customer grievances, and should publish aggregate data including complaints received and resolved, and to the extent possible, classifying the nature of the complaints received.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Freedom of Speech&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;strong&gt;Most companies do not disclose processes or safeguards in case of content restriction requests by private third parties or by the government;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Few of the companies surveyed have any form of checking misuse by government or third parties of blocking procedures prescribed under their terms and conditions. Some policies, such as TCL’s acceptable use policy, specifies that the company shall attempt to contact the owner of the content upon notice of private requests for content restriction, however, this requirement is entirely discretionary.&lt;/li&gt;
&lt;li&gt;Some companies, such are Rediff, have a well-defined procedure for content restriction on intellectual property claims, but not in case of general content restriction measures.&lt;/li&gt;
&lt;li&gt;However, there is evidence that at least some of the companies do provide some notice to users when the information they attempt to access has been removed or blocked by court order. TCL, for example, redirects users to a notice stating that the information has been blocked as per the provisions of a specific law. However, this does not reflect in its policies.&lt;/li&gt;
&lt;li&gt;Companies must have internal procedural safeguards to ensure the authenticity of content restriction claims and their compliance with regulations. Companies must commit to objecting against overbroad requests for restriction. One important step in this regard is to clarify the scope of companies liabilities as intermediaries, for actions taken in good faith.&lt;/li&gt;
&lt;li&gt;Companies must also provide clear and detailed notice to both users attempting to access blocked content as well as to the person whose content has been restricted. Such notice must specify whether the removal was due to a judicial, executive or privacy order, and to the extent possible, should specify the law, regulation or company policy under which the content has been restricted.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;strong&gt;Companies do not disclose internal processes on content restriction or termination of services taken independently of third party requests;&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;None of the companies disclosed their process for removal of content independently of third party requests, for the enforcement of their terms. None of the company policies disclose processes for identification or investigation of any violation of their terms. In fact, many companies, including Rediff, Hike Messenger and Vodafone expressly state that services may be terminated without notice and entirely at the discretion of the service provider.&lt;/li&gt;
&lt;li&gt;Further, none of the companies surveyed disclose their network management principles or make any public commitments against throttling of blocking of specific content or differential pricing, although, some of the telecommunications companies did vouch for some form of network neutrality, in their response to the TRAI’s public consultation on network neutrality regulations. As an outcome of those consultations, regulations now effectively prevent telecoms from discriminatory tariffs based on the nature of content.&lt;a name="_ftnref25"&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Company processes for enforcement of their terms of use must be disclosed. Further, companies should commit to transparency in the enforcement of the terms of use, to the extent possible.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;strong&gt;Company practices on data protection vary widely – most companies show some commitment towards users’ privacy, but fall short on many grounds &lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Despite the existence of a privacy regulation (the Reasonable Security Practices Rules), company practices on data collection vary. Some companies, such as TCL, have robust commitments towards important privacy principles including user consent and collection limitation, however, on the other end of the spectrum, RCL does not have a publicly available privacy policy governing the use of its internet services. In fact, none of the companies have data collection policies which contain the minimum safeguards as expected from such policies, such as compliance with the OECD Privacy Principles, or the National Privacy Principles as laid out in the A.P. Shah Committee Report on Privacy.&lt;a name="_ftnref26"&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Most of the companies surveyed make some form of commitment to notifying users of the collection and use of their data, including specifying the purposes for which information would be used and specifying the third parties with whom such information may be shared, and the option to opt-out of sharing their data with third parties. However, none of the policies explicitly commit to limiting collection of data to that which is necessary for the service. Further, while companies generally specify that data may be shared with ‘third parties’, usually for commercial purposes, theses parties are usually not explicitly mentioned in the policies.&lt;/li&gt;
&lt;li&gt;Some of the companies, including TCL and Reliance Jio also explicitly allow individual participation to access, amend or delete the information companies have stored about them. However, in other cases, users can only delete specific information upon account termination. Moreover, other companies do not specify if they continue to hold user information beyond the period for which services are provided. In fact, none of the companies except Hike Messenger disclose that they limit the storage of information to a specified time period.&lt;/li&gt;
&lt;li&gt;Companies must follow acceptable standards for data protection and user privacy, which, at the very least, require them to commit to collection and use limitations, specify time periods for retaining the data, allowing users to access, amend and delete data and to ensure that data stored is not out-dated or wrong. These policies must clearly specify the third parties with whom information may be shared, and should specify whether and how user consent is to be obtained before sharing of this information.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;strong&gt;Companies’ processes for sharing of user information upon request by private third parties or governments are not transparent&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;With the exception of the Vodafone Transparency Report (undertaken by Vodafone India’s holding company), none of the companies studied attempt to disclose any information about their processes for sharing user information with governments. Even in the case of private third parties, only some companies expressly commit to user notification before sharing of information.&lt;/li&gt;
&lt;li&gt;Companies should be more transparent about third-party requests for user data. While regulations regarding confidentiality could be clearer, companies should at least indicate that governments have requested user data and present this information in aggregate form.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;strong&gt;Some companies disclose specific measures taken to secure information collected through the use of their services, including the use of encryption&lt;/strong&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;While all companies collecting sensitive personal information are requested to comply with the reasonable security standards laid down under the Rules, companies’ disclosures about measures taken to secure data are generally vague. Rediff, for example, merely specifies that it uses the SSL encryption standard for securing financial data and ‘accepted industry standards’ for securing other data and Vodafone discloses that it takes ‘reasonable steps’ to secure data.&lt;/li&gt;
&lt;li&gt;None of the companies surveyed disclose the existence of security audits by independent professionals, or the procedure followed in case of a breach of security. Further none of the companies commit to encrypting communications with or between the users end-to-end.&lt;/li&gt;
&lt;li&gt;Companies should specify the safety standards utilized for the handling, transmission and storage of personal information. They must specify that the security used is in compliance with acceptable industry standards or legally prescribed standards. Further, they should ensure, wherever possible, that end-to-end encryption is used to secure the information of their users.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;RDR Company Reports&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Tata Communications Limited&lt;/strong&gt;&lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;&lt;br /&gt;www.tatacommunications.com&lt;/strong&gt;&lt;strong&gt;&lt;br /&gt;Industry&lt;/strong&gt;&lt;span&gt;: Telecommunications&lt;/span&gt;&lt;strong&gt;&lt;br /&gt;Services&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;&lt;strong&gt;evaluated&lt;/strong&gt;&lt;span&gt;: Tier-1 Internet Backbone Services, VSNL Mail&lt;/span&gt;&lt;strong&gt;&lt;br /&gt;Market&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;&lt;strong&gt;Capitalization&lt;/strong&gt;&lt;span&gt;: INR 194 Billion&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;TATA Communications Ltd. (TCL) is a global telecommunications company, headquartered in Mumbai and Singapore. A part of the TATA group of companies, TCL was founded as Videsh Sanchar Nigam Limited (VSNL), which was the first public-access gateway internet provider in India. VSNL was later acquired by the TATA group, and entirely merged with TATA Communications in 2008. TATA continues to retain the VSNL domain for its personal and enterprise email service.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;According to its latest annual report, TCL provides backbone connectivity to over 240 countries and territories and carries close to 24% of the world’s Internet routes.&lt;/span&gt;&lt;a name="_ftnref27"&gt;&lt;/a&gt;&lt;span&gt; TCL also owns three of the ten submarine cable landing stations in India, responsible for India’s connectivity to the global internet.&lt;/span&gt;&lt;a name="_ftnref28"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;strong&gt;&lt;span&gt;Commitment&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/strong&gt;&lt;span&gt;TCL scores averagely on disclosure of its commitment to human rights on the internet, including on disclosures relating to freedom of expression and privacy. Although TCL maintains a corporate social responsibility policy as well as business responsibility report, which include policy commitments to protecting human rights, (which are mandated by Indian law),&lt;/span&gt;&lt;a name="_ftnref29"&gt;&lt;/a&gt;&lt;span&gt; none of its publicly available policies make a reference to its commitments to freedom of expression of its users.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;The TATA group maintains a code of conduct, applicable to all of its group companies, including TCL.&lt;/span&gt;&lt;a name="_ftnref30"&gt;&lt;/a&gt;&lt;span&gt; The code makes an explicit reference to data security and privacy of TATA’s customers. As per that code, the Managing Director and Group CEO is the Chief Ethics Officer, responsible for the implementation of the Code of Conduct.&lt;/span&gt;&lt;a name="_ftnref31"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;TCL’s internal policies concerning internal implementation of human rights, as well as grievance redressal, are more robust than their public policy commitments to the same. As per in the TATA group code of conduct, which is applicable to its group companies, TCL provides employee training and conducts ethics awareness workshops at frequent intervals, and also takes other initiatives to ensure compliance with the code of conduct, which includes a commitment to customer privacy and data protection.&lt;/span&gt;&lt;a name="_ftnref32"&gt;&lt;/a&gt;&lt;span&gt; Further, TCL has a well articulated whistleblower policy which states the processes to be followed in case any employee observes any unethical conduct within the company, including violations of the TATA code of conduct.&lt;/span&gt;&lt;a name="_ftnref33"&gt;&lt;/a&gt;&lt;span&gt; The whistleblower policy commits to protecting any employee who reports unethical conduct under the policy, but contains no explicit references to freedom of speech or censorship issues, or issues of user privacy. &lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Concerning stakeholder engagement, TCL seems to be somewhat involved in engaging with issues of privacy, but makes no commitments on issues of freedom of expression. TCL is a member of the Data Security Council of India, an industry body which makes public commitments towards user privacy and data security, which includes guiding the Indian IT industry on self-regulation on issues of privacy and data security.&lt;/span&gt;&lt;a name="_ftnref34"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;TCL maintains various grievance redressal forums, evidenced through different policies. For example, their consumer charter provides a general forum for addressing grievances, which include complaints regarding service outages.&lt;/span&gt;&lt;a name="_ftnref35"&gt;&lt;/a&gt;&lt;span&gt; However, this does not refer specifically to complaints about censorship or privacy-related concerns. TCL’s Acceptable Use Policy and privacy policy also guide users to specific grievance redressal forums, for complaints under those policies.&lt;/span&gt;&lt;a name="_ftnref36"&gt;&lt;/a&gt;&lt;span&gt; Besides this, there are recorded instances where TCL has advertised grievance redressal mechanisms relating to cases of private or judicial requests for blocking of content.&lt;/span&gt;&lt;a name="_ftnref37"&gt;&lt;/a&gt;&lt;span&gt; However, TCL does not make any public disclosures about the inputs to or outcomes of its grievance redressal mechanisms.&lt;br /&gt;&lt;/span&gt;&lt;br /&gt;&lt;strong&gt;&lt;span&gt;Freedom of Expression&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;General&lt;/strong&gt;&lt;br /&gt;&lt;span&gt;TCL’s Acceptable Use Policy (“&lt;/span&gt;&lt;strong&gt;AUP&lt;/strong&gt;&lt;span&gt;”) governs the use of TCL services by its customers, which includes downstream providers, which TCL is responsible for interconnection with, as a backbone internet provider.&lt;/span&gt;&lt;a name="_ftnref38"&gt;&lt;/a&gt;&lt;span&gt; VSNL mail maintains its own terms and conditions for users, which are available on its website.&lt;/span&gt;&lt;a name="_ftnref39"&gt;&lt;/a&gt;&lt;span&gt; Both TCL’s AUP and VSNL’s terms and conditions are easily locatable through their websites, are presented in a clear and understandable manner and are available in English.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;TCL does not commit to notifying users of important changes to their terms of use, stating that it may chose to notify its customers of changes to the AUP, either directly, or by posting such modifications on its website. VSNLs policy states that the terms and conditions of the use of the webmail service may change without any notice to users.Although TCL is an Indian company and its terms are applicable to its customers worldwide, the AUP contains several references are to laws and procedures of the United States of America, such as the US PATRIOT Act, ostensibly due to TATA’s heavy presence in the US market coupled with stricter disclosure requirements in that jurisdiction.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Content Restrictions and Termination of Services&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;The AUP does not place any obligations on TCL to ensure a fair judgement before sanctions such as removal of content, termination or suspension for violations of terms of use. Although the AUP identifies categories of content which is prohibited by the service,&lt;/span&gt;&lt;a name="_ftnref40"&gt;&lt;/a&gt;&lt;span&gt; the AUP also  states that TCL may suspend or terminate a users account, for any action they may deem to be inappropriate or abusive, whether or not stated in their policies. The AUP clearly states that TCL may remove of edit content in violation of the AUP or content which is harmful or offensive. Although it states that TCL shall attempt to first contact a user who is suspected of violations, they may suspend or terminate the services of the customer at their sole discretion. There is evidence, although not stated explicitly in its policies, that TCL provides general notice when content is taken down on its network through judicial order. However, there is no disclosure of any requirement to contact the relevant user, in case of takedown of user-generated content in compliance with judicial order.&lt;/span&gt;&lt;a name="_ftnref41"&gt;&lt;/a&gt;&lt;span&gt;Although TCL has voiced its opinion on network neutrality, for example, by issuing public comments to the Telecom Regulatory Authority of India,&lt;/span&gt;&lt;a name="_ftnref42"&gt;&lt;/a&gt;&lt;span&gt; it does not disclose its policies regarding throttling or degrading of content over its network, or its network management principles.As a backbone connection provider, TCL’s major customers include downstream ISP’s who connect through TCL’s network. Therefore, the AUP states that the downstream provider shall ensure that its customers comply with the AUP, failing which TCL may terminate the services of the downstream provider. Further, importantly, TCL treats violations of the AUP by the end-user as violations by the downstream ISP, making them directly liable for the violations of the terms and subject to any actions TCL may take in that regard. The AUP further expressly states that TCL shall co-operate with appropriate law enforcement agencies and other parties investigating claims of illegal or inappropriate conduct, but does not mention whether this involves taking down content or disconnecting users.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span&gt;Technical observations on TCL’s blocking practices in 2015 showed that TCL appeared to be using a proxy server to inspect and modify traffic to certain IP addresses.&lt;/span&gt;&lt;a name="_ftnref43"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;&lt;strong&gt;Privacy&lt;/strong&gt;&lt;/span&gt;&lt;br /&gt;&lt;span&gt;General&lt;/span&gt;&lt;br /&gt;&lt;span&gt;TCL has one privacy policy which covers all services provided by the company with the exception of VSNL mail, which has its own privacy policy.&lt;/span&gt;&lt;a name="_ftnref44"&gt;&lt;/a&gt;&lt;span&gt; The policy is easily accessible and available in English. The policy partially discloses that users are updated of any changes to the policy, however, any notification of the changes is only on the website and not done directly. In addition to the above, TCL also has a separate cookie policy, which contains information about its use of cookies for the collection of user information on its websites. Use of TCL’s services entails acceptance of its privacy policy.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Disclosure of Collection, Use and Sharing of Personal Information&lt;/strong&gt;&lt;br /&gt;&lt;span&gt;TCL, as well as VSNL mail, discloses that it collects users’ personal information, based on the service utilized by them, both as solicited information and as automatically collected information through the use of technologies such as cookies, or through third parties. TCL’s privacy policy states the various purposes to which such personal collection might be used, including for the investigation of fraud or unlawful activity, and for the provision of services, including for marketing. TCL discloses that it may combine this information prior to use. VSNL does not clearly state the purpose for which information may be collected, nor how it is shared.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;TCL discloses that it may share personal information with affiliates, marketing partners, service providers as well as in response to legal processes including court orders or subpoena’s or in any other case which TCL deems necessary or appropriate. Where personal information is shared with third parties, TCL commits to ensure that third parties (which include third party downstream carriers) also have appropriate data protection policies. TCL does not disclose its process for responding to orders for interception or for user information from private parties or from governmental agencies, nor does it provide any specific or aggregate data regarding the same.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;User control over information&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;The policy discloses that TCL explicitly seeks user consent before it transfers data across legal jurisdictions. Although the policy states that TCL may share user information with law enforcement agencies in compliance with legal requests, it does not disclose any process for vetting such requests, nor does it disclose any data (specific or aggregate) about any such requests received.&lt;/span&gt;&lt;a name="_ftnref45"&gt;&lt;/a&gt;&lt;span&gt; With the exception of California, USA, TCL does not permit users to access data about any requests for their personal information which may have been received or granted by TCL to private third parties. Further, in contrast to most companies studied in this index, TCL discloses that it permits users to access, amend or delete information which the company stores about them. VSNL does not disclose that it allows users to access, amend or delete their personal information collected by VSNL.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span&gt;Security&lt;/span&gt;&lt;br /&gt;&lt;span&gt;TCL does not disclose that it uses or permits the use of encryption for any communications transmitted through its network, nor does it provide users any training or disclaimers to consumers on data protection.&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;br /&gt;&lt;strong&gt;Rediff.com India Ltd.&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;span&gt;www.rediff.com&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;span&gt;: Internet Software Services and Media&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Services&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;&lt;strong&gt;evaluated&lt;/strong&gt;&lt;span&gt;: Rediff.com, Rediff Mail, Rediff iShare, Rediff Shopping&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Market&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;&lt;strong&gt;Capitalization&lt;/strong&gt;&lt;span&gt;: USD 6.07 Million&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rediff.com is a company, operating several internet services, including personal and enterprise email services, news services, a media-sharing platform and a shopping platform. It has its headquarters in Mumbai, India. &lt;/span&gt;&lt;span&gt;According to the Alexa Index, Rediff.com is the 47&lt;/span&gt;&lt;sup&gt;th&lt;/sup&gt;&lt;span&gt; most visited website in India, and the 407&lt;/span&gt;&lt;sup&gt;th&lt;/sup&gt;&lt;span&gt; overall. Approximately 87% of its traffic originates from Indian users.&lt;/span&gt;&lt;a name="_ftnref46"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span&gt;Commitment&lt;/span&gt;&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;Of the companies studied in this survey, Rediff.com (“&lt;/span&gt;&lt;strong&gt;Rediff&lt;/strong&gt;&lt;span&gt;”) received the lowest scores on commitment indicators. None of Rediff’s publicly available policies, including government mandated filings, disclose efforts towards protecting online freedoms. Rediff also does not disclose that it maintains a whistleblower policy or a company ethics policy. As a major online media and internet services provider in India, Rediff makes no public commitment towards freedom of speech and user privacy, and has not disclosed any efforts at engaging with stakeholders in this regard. Although the terms of use for various services provided by Rediff disclose the existence of a grievance redressal mechanism, it is only within the bounds of Rule 3 of the Intermediary Guidelines Rules, 2011.&lt;/span&gt;&lt;a name="_ftnref47"&gt;&lt;/a&gt;&lt;span&gt; The terms of use do not explicitly make mention of grievances related to online freedoms, nor is any specific or aggregate data about the complaints mechanism released by the company. Rediff does not disclose that it undertakes any impact assessment of how its services may impact online freedoms.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Freedom of expression&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;General&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;Rediff has an umbrella policy covering the use of all services offered by Rediff.com,&lt;/span&gt;&lt;a name="_ftnref48"&gt;&lt;/a&gt;&lt;span&gt; as well as separate policies governing the use of its video sharing platform,&lt;/span&gt;&lt;a name="_ftnref49"&gt;&lt;/a&gt;&lt;span&gt; its blogging platform&lt;/span&gt;&lt;a name="_ftnref50"&gt;&lt;/a&gt;&lt;span&gt; and messaging boards.&lt;/span&gt;&lt;a name="_ftnref51"&gt;&lt;/a&gt;&lt;span&gt; The use of any Rediff services is construed as acceptance of their terms of use. Rediff discloses that it may change any of its terms of use without prior notification to its users. Rediff’s services are accessible through a Rediffmail account, which does not require verification through any government issued license to link online users to their offline identity. The existence of various disparate policies and the manner and format of the policies somewhat decrease their accessibility.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Content Restriction and Termination of Services&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;Rediff’s General Terms of Use specify content which is prohibited on its various services, which is materially similar to the content prohibited under the guidelines issued under the Information Technology Act. Further, Rediff’s messaging board policy lists a number of vague and broad categories which are prohibited and may be restricted on the forums, including “negatively affecting other participants, disrupt the normal flow of the posting.”&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;As per the General Terms of Use, Rediff reserves the right to remove any content posted by users, solely at its own discretion. Rediff’s General Terms of Use do not disclose any process for responding to requests by law enforcement or judicial or other government bodies for the takedown of content. However, the terms of Rediff’s video sharing platform specifies that written substantiation of any complaint from the complaining party is required. Rediff’s process for responding to complaints regarding intellectual property infringement are well detailed in this policy, although it does not substantiate the process for responding to other requests for restriction of content from private parties or law enforcement agencies.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Rediff further reserves the right to terminate the services offered to its users, with or without cause and without notice of the same. Similar to most companies surveyed, Rediff does not disclose its process for responding to requests for restriction of content or services by private parties or by government agencies, nor does it publish specific or aggregate data about restriction of content, the number of requests for takedown received or the number complied with.&lt;/span&gt;&lt;br /&gt;&lt;span&gt; &lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Privacy&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;General&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;Rediff’s performance on privacy indicators is marginally better than those on freedom of expression. A single privacy policy is applicable to all of Rediff’s services, which is easily accessible through its various websites, including on its homepage. Rediff discloses that any material changes of its privacy policy will be notified prominently.&lt;/span&gt;&lt;a name="_ftnref52"&gt;&lt;/a&gt;&lt;span&gt; Use of Rediff’s services entails acceptance of its privacy policy.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Disclosure of Collection, Use and Sharing of Personal Information&lt;/strong&gt;&lt;br /&gt;&lt;span&gt;Rediff specifies that it collects both anonymous and personally identifiable information, automatically as well as what is solicited through their services, including financial information and ‘user preferences and interests’. Rediff does not disclose if any information so collected is combined for any purpose. It also specifies the purpose to which such information may be used, which includes its use ‘to preserve social history as governed by existing law or policy’, or to investigate violations of Rediff’s terms of use. The policy further specifies that Rediff may share information with third parties including law enforcement agencies or in compliance of court orders or legal process. Rediff discloses that it notifies users in case any personal information is being used for commercial purposes, and gives users the option to opt-out of such use. Rediff does not disclose its process for responding to orders for interception or for user information from private parties or from governmental agencies, nor does it provide any specific or aggregate data regarding the same.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;User Control over Information&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;Rediff discloses that its users may chose to correct, update or delete their information stored with Rediff if they chose to discontinue the use of its services. However, unless users specifically chose to do so, Rediff continues to store user information even after termination of their account.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Security&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;Rediff discloses that it encrypts sensitive information (including financial information) through SSL encryption, and uses ‘accepted industry standards’ to protect other personal information submitted by users, although it does not define what these standards are.&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;strong&gt;Vodafone India Limited&lt;br /&gt;&lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;&lt;a href="http://www.vofaone.in/"&gt;www.vodafone.in&lt;br /&gt;&lt;/a&gt;&lt;/strong&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;span&gt;: Telecommunications&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Services&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;&lt;strong&gt;evaluated&lt;/strong&gt;&lt;span&gt;: Broadband and Narrowband mobile internet services&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Vodafone India Limited is a wholly owned subsidiary of the Vodafone Group Plc., the world’s second largest telecommunications provider. As of March 2016, Vodafone India was the second largest telecommunications provider in India, with a market share of 19.71% of internet subscribers (broadband and narrowband).&lt;/span&gt;&lt;a name="_ftnref53"&gt;&lt;/a&gt;&lt;span&gt; Vodafone entered the Indian market after acquiring Hutchison Telecom in 2007.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;This survey has only examined the policies of Vodafone India and those policies of Vodafone plc. which may be applicable specifically to Vodafone India.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Commitment&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;Vodafone India Limited (“&lt;/span&gt;&lt;strong&gt;Vodafone&lt;/strong&gt;&lt;span&gt;”) scores the highest on the commitment indicators of the companies examined in this survey. While the Vodafone Group, (the Group/holding company) examined as part of the global Ranking Digital Rights Index, discloses its compliance with the UN Guiding Principles on Business and Human Rights,&lt;/span&gt;&lt;a name="_ftnref54"&gt;&lt;/a&gt;&lt;span&gt; Vodafone India does not specifically make any such disclosures independently. The companies annual report, corporate responsibility policies or business responsibility reports do not disclose any commitments towards online freedoms. However, Vodafone India does disclose the existence of a Privacy Management Framework, under which employees are provided training regarding data privacy of users.&lt;/span&gt;&lt;a name="_ftnref55"&gt;&lt;/a&gt;&lt;span&gt; Moreover, Vodafone’s public statements disclose the existence of a privacy impact assessment procedure to ensure ‘data minimisation’ and reduce the risk of breach of privacy. Vodafone is also a member of the Data Security Council of India, an industry body which makes public commitments towards user privacy and data security, which includes guiding the Indian IT industry on self-regulation on issues of privacy and data security,&lt;/span&gt;&lt;a name="_ftnref56"&gt;&lt;/a&gt;&lt;span&gt; as well as the Cellular Operators Association of India, another industry organization which also commits to protecting  consumer rights, including consumers right to privacy.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span&gt;Vodafone also discloses a multi-tiered grievance redressal mechanism, which includes an appellate authority  as well as a timeline of 39 days for the resolution of the complaint. However, the mechanism does not specify if grievances related to online freedoms may be reported or resolved.&lt;/span&gt;&lt;a name="_ftnref58"&gt;&lt;/a&gt;&lt;span&gt; In addition, Vodafone has designated a Privacy Officer for redressing concerns under its privacy policy.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Freedom of Expression&lt;/strong&gt;&lt;br /&gt;&lt;strong&gt;General&lt;/strong&gt;&lt;br /&gt;&lt;span&gt;Vodafone scored the lowest on disclosures under this head of the companies surveyed. The terms of use for Vodafone India’s services are not available on their homepage or site-map nor are they presented in a clear or easily accessible manner. They may be accessed through the Vodafone Telecom Consumers Charter, with different terms of use for pre-paid and post-paid customers. There is no policy specific to the use of internet services through the use of the Vodafone network, nor do these policies make reference to the use of internet services by Vodafone users. Vodafone does not disclose that it provides any notification of changes to the policies to its users.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Content Restriction and Termination of Services&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;While the Terms of Use do not specifically refer to online content, Vodafone’s Terms of Use prohibit users from “sending messages” under various categories, which include messages which infringe upon or affect “national or social interest”. Vodafone reserves the right to terminate, suspend or limit the service upon any breach of its Terms of Use or for any reason which Vodafone believes warrants such termination, suspension or limitation. Vodafone does not disclose its process for responding to violations of its terms of use.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Vodafone does not disclose its process for responding to requests for restriction of content or services by private parties or by government agencies, nor does it publish specific or aggregate data about restriction of content, the number of requests for takedown received or the number complied with. Although the Vodafone group internationally publishes a comprehensive law enforcement disclosure report (making it one of few major internet companies to do so), the report does not contain information on orders for blocking or restricting services or content.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Vodafone has made public statements of its commitment to network neutrality and against any kind of blocking or throttling of traffic, although it does not have any policies in place for the same.&lt;/span&gt;&lt;a name="_ftnref59"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;As with all telecommunications companies in India, users must be authenticated by a valid government issued identification in order to use Vodafone’s telecommunication services.&lt;/span&gt;&lt;br /&gt;&lt;span&gt; &lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Privacy&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;General&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;Vodafone India’s privacy policy which is applicable to all users of its services is not as comprehensive as some other policies surveyed. It is accessibly through the Vodafone India website, and available in English. Vodafone merely discloses that the policy may change from time to time and does not disclose that it provides users any notice of these changes.&lt;/span&gt;&lt;a name="_ftnref60"&gt;&lt;/a&gt;&lt;span&gt; Use of Vodafone’s services entails acceptance of its privacy policy.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Collection, Use and Sharing of Personal Information&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;Vodafone’s policy discloses the personal information collected, as well as the purpose and use of such information, and the purpose for which such information may be shared with third parties, including law enforcement agencies. However, Vodafone does not disclose how such information may be collected or for what duration.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Vodafone India’s privacy policy does not disclose its process for responding to government requests for user information, including for monitoring or surveillance. However, the Vodafone law enforcement disclosure report elaborates upon the same, including the principles followed by Vodafone upon requests for user information or for monitoring their network in compliance with legal orders. However, as per the applicable laws in India, Vodafone does not publish any aggregate or specific data about such requests, although it states that the Indian government has made such requests.&lt;/span&gt;&lt;a name="_ftnref61"&gt;&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;User Control over Personal Information&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;Vodafone does not disclose that it allows users to access, amend, correct or delete any information it stores about its users. It does not disclose if user information is automatically deleted after account termination.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Security&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;Vodafone only discloses that it takes ‘reasonable steps’ to secure user information. Vodafone does not disclose that it employs encryption over its network, or if it allows users to encrypt communications over their network. Vodafone also does not disclose that it provides any guidance to users on securing their communications over their network.&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;br /&gt;&lt;strong&gt;Reliance Communications Limited&lt;/strong&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.rcom.co.in/"&gt;&lt;strong&gt;www.rcom.co.in&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;span&gt;: Telecommunications&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Services&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;&lt;strong&gt;evaluated&lt;/strong&gt;&lt;span&gt;: Broadband and Narrowband mobile internet services&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Market&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;&lt;strong&gt;Capitalization&lt;/strong&gt;&lt;span&gt;: INR 118.35 Billion&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Reliance Communications Limited (“&lt;/span&gt;&lt;strong&gt;RCL&lt;/strong&gt;&lt;span&gt;”) is an Indian telecommunication services provider, and a part of the Reliance Anil Dhirubai Ambani group of companies. RCL is the fourth largest telecommunications provider in India, with a market share of 11.20% of Indian internet subscribers.&lt;/span&gt;&lt;a name="_ftnref62"&gt;&lt;/a&gt;&lt;span&gt; Reliance also owns one of ten submarine cable landing stations in India, responsible for India’s connectivity to the global internet.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Commitment&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;RCL does not disclose any policy commitment towards the protection of online freedoms. Although RCL has filed business responsibility reports which include a report on the company’s commitment towards human rights, the same do not make a reference to privacy or freedom of expression of its users either.&lt;/span&gt;&lt;a name="_ftnref63"&gt;&lt;/a&gt;&lt;span&gt; RCL does not disclose that it undertakes any impact assessment of how its services may impact online freedoms.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;span&gt;While RCL does maintain a whistle-blower policy for reporting any unethical conduct within the company, the policy too does not expressly mention that it covers any conduct in violation of user privacy or freedom of expression. RCL is a member of at least three industry bodies which work towards stakeholder engagement on the issues of privacy and consumer protection and welfare, namely, the Data Security Council of India, the Internet Service Providers Association of India and the Association of Unified Telecom Service Providers of India (although none of these bodies expressly mention that they advocate for freedom of expression).&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;RCL maintains a comprehensive manual of practice for the redressing consumer complaints.&lt;/span&gt;&lt;a name="_ftnref64"&gt;&lt;/a&gt;&lt;span&gt; The manual of practice specifies the procedure for grievance redressal as well the timelines within which grievances should be resolved and the appellate authorities which can be approached, however, it does not specify whether complaints regarding privacy or freedom of expression are covered under this policy.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Freedom of Expression&lt;br /&gt;&lt;/strong&gt;&lt;strong&gt;General&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;RCL’s terms of use for its internet services are part of its Telecom Consumer’s Charter,&lt;/span&gt;&lt;a name="_ftnref65"&gt;&lt;/a&gt;&lt;span&gt; its Acceptable Use Policy (“AUP”)&lt;/span&gt;&lt;a name="_ftnref66"&gt;&lt;/a&gt;&lt;span&gt; and its Consumer Application Form,&lt;/span&gt;&lt;a name="_ftnref67"&gt;&lt;/a&gt;&lt;span&gt; which are not easily accessible through the RCL website. The charter contains the terms for its post-paid and pre-paid services as well the terms for broadband internet access. RCL discloses that it may change the terms of use of its services without any prior notification to its users.&lt;br /&gt;&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Content Restriction and Termination of Services&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;RCL’s AUP lists certain categories of content which is not permitted, which includes vague categories such as ‘offensive’, ‘abusive’ or ‘indecent’, which are not clearly defined. In the event that a user fails to comply with its terms of use, RCL discloses that their services may be terminated or suspended. Further, as per the CAF, RCL reserves the right to terminate, suspend or vary its services at its sole discretion and without notice to users. The terms of use also require the subscriber/user to indemnify RCL in case of any costs or damages arising out of breach of the terms by any person with or without the consent of the subscriber.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;RCL discloses that upon receiving any complaints or upon any intimation of violation of its terms of use, RCL shall investigate the same, which may also entail suspension of the services of the user. RCL does not disclose that it provides users any notice of such investigation or reasons for suspension or termination of the services. RCL does not disclose specific or aggregate data regarding restriction of content upon requests by private parties or governmental authorities.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;RCL does not disclose its network practices relating to throttling or prioritization of any content or services on its network. However, RCL has published an opinion to the Telecom Regulatory Authority of India, wherein it supported regulation prohibiting throttling or prioritization of traffic. However, RCL was the network partner for Facebook’s Free Basics platform which was supposed to provide certain services free of cost through the RCL network. The Free Basics initiative was abandoned after the TRAI prescribed regulations prohibiting price discrimination by ISPs.&lt;/span&gt;&lt;a name="_ftnref68"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Privacy&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;RCL scores the lowest on this indicator of the companies surveyed. RCL does not disclose that it has a privacy policy which governs the use of its internet services. RCL’s AUP only discloses that it may access and use personal information which is collected through its services in connection with any investigation of violation of its AUP, and may share such information with third parties for this purpose, as it deems fit. Further, RCL’s terms of use further disclose that it may provide user information to third parties including security agencies, subject to statutory or regulatory factors, without any intimation to the user.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Security&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;RCL does not disclose any information on the security mechanisms in place in its network, including whether communications over the network are encrypted or whether end-to-end encrypted communications are allowed.&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Shaadi.Com&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;www.shaadi.com&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Industry: Internet Marriage Arrangement&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Services evaluated: Online Wedding Service&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Shaadi.com, a subsidiary of the People group, is an online marriage arrangement service launched in 1996.&lt;/span&gt;&lt;a name="_ftnref69"&gt;&lt;/a&gt;&lt;span&gt; While India is its primary market, the service also operates in the USA, UK, Canada, Singapore, Australia and the UAE. As of 2017, it was reported to have a user base of 35 million.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Governance&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;Shaadi.com makes no explicit commitment to freedom of expression and privacy, and does not disclose whether it has any oversight mechanisms in place. The company also does not disclose whether it has any internal mechanisms such as employee training on freedom of expression and privacy issues, or a whistleblower policy. Further, there are no disclosures as to any process of impact assessment for privacy and freedom of expression related concerns. The company does not disclose if it is part of any multi-stakeholder initiatives, or other organizations that engage with freedom of expression and privacy issues, or groups that are impacted by the company’s business. While details of a Grievance Officer are provided in the company’s Privacy Policy, it is not clearly disclosed if the mechanism may be used for freedom of expression or privacy related complaints. The company makes no public report of the complaints that it receives, and provides no clear evidence that it responds to them.&lt;/span&gt;&lt;br /&gt;&lt;span&gt; &lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Freedom Of Expression&lt;br /&gt;&lt;/strong&gt;&lt;span&gt;General&lt;/span&gt;&lt;br /&gt;&lt;span&gt;The Terms of Service are easily locatable on the website, and are available in English. The Terms are presented in an understandable manner, with section headers, but provide no additional guidance such as summaries, tips or graphics to explain the terms. Shaadi.com makes no disclosure about whether it notifies users to changes in the Terms, and how it may do so. Shaadi.com also does not maintain any public archives or change log.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Content Restriction and Termination of Services&lt;br /&gt;&lt;/span&gt;&lt;span&gt;Shaadi.com discloses an indicative list of prohibited activities and content, but states that it may terminate services for any reason. Shaadi.com makes no disclosures about the process it uses to identify violations and enforce rules, or whether any government or private entity receives priority consideration in flagging content. Shaadi.com does not disclose data about the volume and nature of content and accounts it restricts. Shaadi.com makes no disclosures about its process for responding to requests from any third parties to restrict any content or users. The Terms do not disclose the basis under which it may comply with government or private party requests, nor whether any due diligence is conducted before responding to the requests. Shaadi.com makes no commitment to pushback on inappropriate or overbroad requests from the government, or private entities. Shaadi.com discloses that it notifies users via email when restricting their accounts.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Shaadi.com also does not publish any data about the requests it receives, and how it responds to them. This could include, for instance, the number of requests received, the number of requests complied with, the the number of accounts or URLs affected, the types of subject matter associated with the requests, etc. Registration for the service requires a Mobile Number, which may be tied to offline identity.&lt;/span&gt;&lt;br /&gt;&lt;span&gt; &lt;/span&gt;&lt;br /&gt;&lt;strong&gt;Privacy&lt;/strong&gt;&lt;a name="_ftnref70"&gt;&lt;/a&gt;&lt;br /&gt;&lt;span&gt;General&lt;br /&gt;&lt;/span&gt;&lt;span&gt;The Privacy Policy is easily locatable on the website, and is available in English. The Policy is presented in an understandable manner, with section headers, but provides no additional guidance such as summaries, tips or graphics to explain the terms.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Shaadi.com discloses that material changes to the Privacy Policy will be notified by posting a prominent link on the Homepage. Further, if personally identified information is used in a materially different manner from that stated at the time of collection, Shaadi.com commits to notify users by email. However, Shaadi.com does not disclose a time frame within which it notifies users prior to the changes coming into effect. Shaadi.com also does not maintain any public archives or change log.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Collection, Use and Sharing of Personal Information&lt;br /&gt;&lt;/span&gt;&lt;span&gt;Shaadi.com clearly discloses the types of personal and non personal information it may collect, but does not explicitly disclose how it collects the information. There is no commitment to limit collection only to information that is relevant and necessary to accomplish the purpose of the service.&lt;/span&gt;&lt;br /&gt;&lt;span&gt; &lt;/span&gt;&lt;br /&gt;&lt;span&gt;While the Privacy Policy states the terms of sharing information, it makes no type-specific discloses about how different types of user information may be shared or the purpose for which it may be shared. Shaadi.com also does not disclose the types of third parties with which information may be shared. Shaadi.com clearly discloses that it may share user information with government or legal authorities.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;The Privacy Policy discloses the purposes for which the information is collected, but does not disclose if user information is combined from different services. Shaadi.com makes no commitment to limit the use of information to the purpose for which it was collected. Shaadi.com makes no disclosures about how long it retains user information. It does not disclose whether it retains de-identified information, or its process for de-identification.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Shaadi.com does not disclose whether it collects information from third parties through technical means, how it does so, or its policies about use, sharing, retention etc. Shaadi.com does not make any disclosures about its processes for responding to third party requests for user information. The Privacy Policy does not disclose the basis under which it may comply with government or private party requests, nor whether any due diligence is conducted before responding to the requests. Shaadi.com makes no commitment to pushback on inappropriate or overbroad requests from the government, or private entities.&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;&lt;span&gt;Shaadi.com also does not publish any data about the requests it receives, and how it responds to them. This could include, for instance, the number of requests received, the number of requests complied with, the number of accounts affected, the type of authority or legal process through which the request was made, etc.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;User Control over Information&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Shaadi.com does not disclose the time frame within which it may delete user information, if at all, after users terminate their account. Shaadi.com does not disclose whether users can control the collection of information by Shaadi.com. The Policy states that users are allowed to remove both public or private information from the database. However, certain (unspecified) financial information and account related information submitted at the time of registration may not be removed or changed.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shaadi.com does not disclose if users are provided options to control how their information is used for targeted advertising, or if targeted advertising is off by default.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shaadi.com does not disclose whether users may access a copy of their information, or what information may be available. &lt;span&gt;Shaadi.com does not disclose whether it notifies users when their information is sought by government entities or private parties.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Security&lt;br /&gt;&lt;/span&gt;&lt;span&gt;Shaadi.com discloses that it follows generally accepted industry standards to protect personal information. Employees are granted access on a need to know basis. Shaadi.com does not disclose whether it has a security team that audits the service for security risk, or whether it commissions third party audits.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Shaadi.com does not disclose whether it has any process, policy or mechanism in place for researchers to submit security vulnerabilities, and how it would respond to them. Shaadi.com does not explicitly commit to notify the relevant authorities without undue delay in case of a data breach. Shaadi.com does not disclose whether it notifies affected users about breaches, and any steps it may take to minimize impact.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Shaadi.com discloses that sensitive information, such as card numbers, are transmitted using the Secure Socket Layer protocol, but not whether all user communications are encrypted by default. Shaadi.com does not disclose whether it uses advanced authentication methods to prevent unlawful access. Shaadi.com does not disclose whether users can view their recent account activity, or if notifies users about unusual activity and possibly unauthorized access.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Shaadi.com publishes privacy and security tips on its website which provide guidance about risks associated with the service, and how they may be avoided.&lt;/span&gt;&lt;a name="_ftnref71"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike Messenger&lt;br /&gt;&lt;/span&gt;&lt;span&gt;www.get.hike.in&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;span&gt;: Internet Instant Messaging&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Services&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;&lt;strong&gt;evaluated&lt;/strong&gt;&lt;span&gt;: Instant Messaging and VoIP application&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike messenger is an Indian cross platform messaging application for smartphones. Users can exchange text messages, communicate over voice and video calls, and exchange pictures, audio, video and other files. Hike launched in November 2012 and, as of January 2016 Hike became the first Indian internet company to have crossed 100 million users in India. It logs a monthly messaging volume of 40 billion messages.&lt;/span&gt;&lt;a name="_ftnref72"&gt;&lt;/a&gt;&lt;span&gt; Hike’s parent Bharti SoftBank is a joint venture between Bharti Enterprises and SoftBank, a Japanese telecom firm.&lt;/span&gt;&lt;a name="_ftnref73"&gt;&lt;/a&gt;&lt;span&gt; As of August 2016, hike was valued at $1.4 billion.&lt;/span&gt;&lt;a name="_ftnref74"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Governance&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Hike makes no explicit commitment to freedom of expression and privacy, and does not disclose whether it has any oversight mechanisms in place. Hike also does not disclose whether it has any internal mechanisms such as employee training on freedom of expression and privacy issues, or a whistleblower policy. Further, there are no disclosures as to any process of impact assessment for privacy and freedom of expression related concerns. Hike does not disclose if it is part of any multi stakeholder initiatives, or other organizations that engage with freedom of expression and privacy issues, or groups that are impacted by Hike’s business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike’s Terms of Use provide contact details for submitting queries and complaints about the usage of the application. It notes that the complaints will be addressed in the manner prescribed by the Information Technology Act, 2000 and rules framed thereunder. The Terms do not disclose if the mechanism may be used for freedom of expression or privacy related issues. Hike makes no public report of the complaints that it receives, and provides no clear evidence that it responds to them.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Freedom Of Expression&lt;/strong&gt;&lt;a name="_ftnref75"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;General&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Terms of Service are easily locatable on the website, and are available in English. The terms are presented in an understandable manner, with section headers, and often provide examples to explain the terms. &lt;span&gt;Hike may make changes to the Terms at its discretion without any prior notice to the users. Hike does not disclose whether users are notified after changes have been made, or whether it maintains a public archive or change log.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Though the Terms disclose a range of content and activities prohibited by the service, Hike may delete content, for any reason at its sole discretion. Further, Hike may terminate or suspend the use of the Application at anytime without notice to the user.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Content Restriction and Termination of Services&lt;br /&gt;&lt;/span&gt;&lt;span&gt;Hike makes no disclosures about the process it uses to identify violations and enforce its rules, or whether any government or private entity receives priority consideration in flagging content. Hike does not disclose data about the volume and nature of content and accounts it restricts.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike makes no disclosures about its process for responding to requests from any third parties to restrict any content or users. The Terms do not disclose the basis under which it may comply with government or private party requests, nor whether any due diligence is conducted before responding to the requests. Hike makes no commitment to pushback on inappropriate or overbroad requests from the government, or private entities.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike also does not publish any data about the requests it receives, and how it responds to them. This could include, for instance, the number of requests received, the number of requests complied with, the the number of accounts, etc.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Identity Policy&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mobile Numbers would be required to sign up for the service, which could potentially be connected to offline identity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Privacy&lt;/strong&gt;&lt;a name="_ftnref76"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;General&lt;br /&gt;&lt;/span&gt;&lt;span&gt;The Privacy Policy is easily locatable on the website, and are available in English. The terms are presented in an understandable manner, with section headers, and often provide examples to explain the terms.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike discloses that changes to the Privacy Policy will be posted on Hike website, and does not commit to directly notifying users of changes. Users are advised to review the website from time to time to remain aware of the terms. Hike does not disclose a time frame within which it may notify changes prior to them coming into effect. Hike also does not disclose whether it maintains a public archive or change log.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Collection, Use and Sharing of Information&lt;br /&gt;&lt;/span&gt;&lt;span&gt;Hike clearly discloses the types of user information it collects. However, Hike makes no explicit commitment to limit collection only to information that is relevant and necessary to accomplish the purpose of the service.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike discloses that user information may be shared for a variety of purposes, but does not disclose the type, or names of third parties that may be given access to the information. Hike discloses that it may share user information with government entities and legal authorities.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Privacy Policy states the purposes for which user information is collected and shared, but makes no commitment to limit the use of information to the purpose for which it was collected.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike discloses that undelivered messages are stored with Hike’s servers till they are delivered, or for 30 days, whichever is earlier. Messages or files sent through the service also reside on Hike’s servers for a short (unspecified) period of time till the delivery of the messages or files is complete. Hike does not disclose the duration for which it retains information such as profile pictures and status updates. Hike does not disclose whether it retains de-identified information, or its process for de-identification. Hike discloses that, subject to any applicable data retention laws, it does not retain user information beyond 30 days from deletion of the account.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike does not disclose whether it collects information from third parties through technical means, and how it does so, or its policies about use, sharing, retention etc.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike does not make any disclosures about its processes for responding to third party requests for user information. The Privacy Policy does not disclose the basis under which it may comply with government or private party requests, nor whether any due diligence is conducted before responding to the requests. Hike makes no commitment to pushback on inappropriate or overbroad requests from the government, or private entities.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike also does not publish any data about the requests it receives, and how it responds to them. This could include, for instance, the number of requests received, the number of requests complied with, the number of accounts affected, the type of authority or legal process through which the request was made, etc.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike does not disclose whether it notifies users when their information is sought by government entities or private parties.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;User Control over Information&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hike discloses that the user may chose to not submit certain user information, but also notes that this may hinder use of the application. Hike makes no disclosure about whether users may request deletion of their user information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike discloses that users may opt out or opt in for specific services or products which may allow user information to be used for marketing or advertising purposes. Hike does not disclose if targeted advertising is on by default.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike does not disclose whether users may obtain a copy of their user information.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;&lt;span&gt; &lt;/span&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Security&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hike discloses that it has security practices and procedures to limit employee access to user information on a need to know basis only. Hike does not disclose whether it has a security team that audits the service for security risk, or whether it commissions third party audits. Hike does not disclose whether it has any process, policy or mechanism in place for researchers to submit security vulnerabilities, and how it would respond to them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike does not explicitly commit to notify the relevant authorities without undue delay in case of a data breach, but discloses that it may attempt to notify the user electronically. However, company does not the types of steps it would take to minimize impact of a data breach.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike does not disclose if transmission of user information is encrypted by default, or whether it uses advanced authentication methods to prevent unlawful access. Hike does not disclose whether users can view their recent account activity, or if notifies users about unusual activity and possibly unauthorized access.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Hike does not publish and materials that educate users about cyber risks relevant to their service.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel&lt;br /&gt;&lt;/span&gt;&lt;span&gt;www.aircel.com&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;span&gt;: Telecommunications&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Services&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;&lt;strong&gt;evaluated&lt;/strong&gt;&lt;span&gt;: Broadband and Narrowband Mobile Internet Services&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Aircel group is a joint venture between Maxis Communications Berhad of Malaysia and Sindya Securities &amp;amp; Investments Private Limited. It is a GSM mobile service provider with a subscriber base of 65.1 million users. The company commenced operations in 1999 and has since become a pan India operator providing a host of mobile voice and data telecommunications services.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Governance&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aircel’s Terms and Conditions state that it is a duty of all service providers to assure that the privacy of their subscribers (not affecting national security) shall be scrupulously guarded. However, the company makes no similar commitment to freedom of expression.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel also does not disclose whether it has any oversight mechanisms in place. However, Aircel does disclose that it has established a Whistleblower Policy and an Ethics Hotline.  Further, the Privacy Policy states that employees are expected to follow a Code of Conduct and Confidentiality Policies in their handling of user information. There are no disclosures as to any process of impact assessment for privacy and freedom of expression related concerns. Aircel does not disclose if it is part of any multi stakeholder initiatives, or any other organizations that engage with freedom of expression and privacy issues, or groups that are impacted by Aircel’s business.&lt;/span&gt;&lt;a name="_ftnref77"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel has a process for receiving complaints on its website under the section of Customer Grievance. However, it is not clearly disclosed whether this process may be applicable for freedom of expression and privacy related issues. Though Aircel does disclose information such as the number of complaints received and redressed, the number of appeals filed, it makes no disclosure if any complaints were specifically related to freedom of expression and privacy.&lt;/span&gt;&lt;a name="_ftnref78"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Freedom Of Expression&lt;br /&gt;&lt;/span&gt;&lt;span&gt;General&lt;br /&gt;&lt;/span&gt;&lt;span&gt;The Terms and Conditions are not easily locatable, and are found as part of a larger document titled Telecom Consumers Charter, which is itself posted as an inconspicuous link on the Customer Grievance page. The Terms are provided only in English, but it is likely that Aircel has a large Hindi speaking user base. The Terms are presented in an understandable manner, with section headers, but provide no additional guidance such as summaries, tips or graphics to explain the terms.&lt;/span&gt;&lt;a name="_ftnref79"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel discloses that it may make changes to the Terms without notice to users, or with written notice addressed to the last provided address, at its sole discretion. Aircel does not disclose if it maintains a public archive or change log.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Content Restriction and Termination of Services&lt;br /&gt;&lt;/span&gt;&lt;span&gt;The Terms prohibit certain activities, but Aircel discloses that it may terminate services for a user at its sole discretion for any reason, including a violation of its Terms.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aircel makes no disclosures about its process it uses to identify violations and enforce its rules, or whether any government or private entity receives priority consideration in flagging content. Aircel does not disclose data about the volume and nature of content and accounts it restricts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel makes no disclosures about its process for responding to requests from third parties to restrict content or users. The Terms do not disclose the basis under which Aircel may comply with government or private party requests, nor whether any due diligence is conducted before responding to the requests. Aircel makes no commitment to pushback on inappropriate or overbroad requests from the government, or private entities. Aircel does not disclose if it notifies users when they try to access content that has been restricted, and the terms expressly waive users’ right to notice if their services are suspended/terminated.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel does not disclose its policy on network management, or whether it prioritizes, blocks, or delays certain types of traffic, applications, protocols, or content for reasons beyond assuring quality of service and reliability. Notably, in its comments to the Telecom Regulatory Authority of India on the issue of regulation of Over-The-Top Services, it argued for the right of Telecom Service Providers to negotiate commercial agreements with OTT providers, as well as the right to employ non price differentiation and network management practices.&lt;/span&gt;&lt;a name="_ftnref80"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel discloses that it may terminate its services in wholly or in part, at its sole discretion, and for any reasons, including directions from the government. Aircel does not disclose its process for responding to requests for network shutdowns, or the legal authority that makes the requests, nor does it commit to push back on such requests. The terms waive the users’ right to notice when services are suspended. Aircel also provides no data about the number of request received or complied with.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel discloses that it requires government approved identification in order to perform verifications.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Privacy&lt;/strong&gt;&lt;a name="_ftnref81"&gt;&lt;/a&gt;&lt;br /&gt;&lt;span&gt;General&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Privacy Policy is easily locatable on the website, and is available in English. It is likely that Aircel has a large Hindi and vernacular speaking user base. However, the website does not provide any other language versions of the Privacy Policy.  The Policy is presented in an understandable manner, with section headers, but provides no additional guidance such as summaries, tips or graphics to explain the terms.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Privacy Policy states that changes will be reflected on the website, and makes no disclosure about whether it will directly notify users. Aircel does not disclose a time frame within which it may notify users prior to the changes coming into effect. Aircel also does not maintain any public archives or change log.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Collection, Use and Sharing of Information&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though Aircel discloses the types of user information it may collect, it does not explicitly disclose how it collects the information. Aircel makes no commitment to limit collection only to information that is relevant and necessary to accomplish the purpose of the service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;While the Privacy Policy states the terms of sharing information, it makes no type-specific disclosures about how different types of user information may be shared. Further, while Aircel broadly discloses the type of third parties with which it may share information, it does not provide a specific list of names. Aircel clearly discloses that it may share user information with government or legal authorities.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Privacy Policy broadly states the purposes for which the information is collected, but does not disclose in more specific terms the purposes for which various types of user information may be collected. Aircel also does not disclose if user information is combined from different services. Aircel makes no commitment to limit the use of information to the purpose for which it was collected.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel makes no disclosures about how long it retains user information, and the Privacy Policy states that it may retain information for as long as it requires. Aircel does not disclose whether it retains de-identified information, or its process for de-identification. Aircel does not disclose the time frame within which it may delete user information, if at all, after users terminate their account.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel does not disclose whether it collects information from third parties through technical means, how it does so, or its policies about use, sharing, retention etc. Aircel does not make any disclosures about its processes for responding to third party requests for user information. The Privacy Policy does not disclose the basis under which it may comply with government or private party requests, nor whether any due diligence is conducted before responding to the requests. Aircel makes no commitment to pushback on inappropriate or overbroad requests from the government, or private entities.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel also does not publish any data about the requests it receives, and how it responds to them. This could include, for instance, the number of requests received, the number of requests complied with, the number of accounts affected, the type of authority or legal process through which the request was made, etc.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel does not disclose whether it notifies users when their information is sought by government entities or private parties.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;User Control over Information&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aircel does not disclose whether users can control the collection of information by Aircel. The Privacy Policy discloses that if information is not provided, or consent for usage is withdrawn, Aircel reserves the right to discontinue the service for which the information is sought. Aircel does not disclose if users can request the deletion of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel discloses that users can opt in or opt out of receiving telemarketing communications, and discloses that they must be specifically opted in for.  However, Aircel does not disclose any options with respect to the usage of use information for such purposes. Users may only choose to opt in or opt out of receiving commercial communications, and have no control over whether user information is used in the first place.&lt;/span&gt;&lt;a name="_ftnref82"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel does not disclose whether users may access a copy of their information, or what information may be available.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Security&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aircel discloses that it has adopted measures to protect information from unauthorized access and to ensure that personal information is accessible to employees or partners employees strictly on a need to know basis. Aircel discloses that its employees are bound by a Code of Conduct and Confidentiality Policies. Aircel does not disclose whether it has a security team that audits the service for security risk, or whether it commissions third party audits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel does not disclose whether it has any process, policy or mechanism in place for researchers to submit security vulnerabilities, or how it would respond to them.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel does not explicitly commit to notify the relevant authorities without undue delay in case of a data breach. Aircel does not disclose whether it notifies affected users about breaches, or any steps it may take to minimize impact.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel discloses that highly confidential information such as passwords and credit card numbers are transmitted using the Secure Socket Layer protocol. However, Aircel does not disclose if all user communications are encrypted by default. Aircel also does not disclose whether it uses advanced authentication methods to prevent unlawful access. Aircel does not disclose whether users can view their recent account activity, or if it notifies users about unusual activity and possibly unauthorized access.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Aircel publishes information about Security Awareness and Alerts that details various threats on the internet, and how they may be countered.&lt;/span&gt;&lt;a name="_ftnref83"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Reliance Jio&lt;br /&gt;&lt;/span&gt;&lt;span&gt;www.jio.com&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Industry&lt;/strong&gt;&lt;span&gt;: Telecommunications&lt;br /&gt;&lt;/span&gt;&lt;strong&gt;Services&lt;/strong&gt;&lt;span&gt; &lt;/span&gt;&lt;strong&gt;evaluated&lt;/strong&gt;&lt;span&gt;: Broadband and Narrowband mobile internet services&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Reliance Jio Infocomm Ltd. is a wholly owned subsidiary of Reliance Industries Ltd., and provides wireless 4G LTE service network across all 22 telecom circles in India. It does not offer 2G/3G based services, making it India’s only 100% VoLTE network. Jio began a massive rollout of its service in September 2016, as was reported to have reached 5 million subscribers in its first week.&lt;/span&gt;&lt;a name="_ftnref84"&gt;&lt;/a&gt;&lt;span&gt; As of October 25, 2016, Jio is reported to have reached 24 million subscribers.&lt;/span&gt;&lt;a name="_ftnref85"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Governance&lt;br /&gt;&lt;/span&gt;&lt;span&gt;Jio does not score well in the Governance metrics. It makes no explicit commitment to freedom of expression and privacy, and does not disclose whether it has any oversight mechanisms in place. The company also does not disclose whether it has any internal mechanisms in place such as employee training on freedom of expression and privacy issues, or a whistleblower policy. Further, there are no disclosures as to any process of impact assessment for privacy and freedom of expression related concerns. The company does not disclose if it is part of any multi-stakeholder initiatives, or other organizations that engage with freedom of expression and privacy issues, or groups that are impacted by the company’s business.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio’s website discloses a process for grievance redressal, along with the contact details of for their Grievance Officer.  The Regulatory Policy also lays down a Web Based Complaint Monitoring System for customer care. However, neither mechanism clearly discloses that the process may be for freedom of expression and privacy issues. In fact, the Grievance Redressal process under the Terms and Conditions process seems primarily meant for copyright owners alleging infringement. Jio makes no public report of the complaints it receives, and provides no clear evidence that it responds to them.&lt;/span&gt;&lt;a name="_ftnref86"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Freedom Of Expression&lt;/strong&gt;&lt;a name="_ftnref87"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;General&lt;br /&gt;&lt;/span&gt;&lt;span&gt;The Terms of Service are easily locatable on the website, and are available in English. It is likely that Jio has a large Hindi and vernacular speaking user base. However, the website does not have any other language versions of the Terms of Service.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Terms are presented in an understandable manner, with section headers, but provide no additional guidance such as summaries, tips or graphics to explain the terms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio discloses that changes to the Terms of Service may be communicated through a written notice to the last address given by the Customer, or through a public notice in print media. However, this may be at Jio’s sole discretion. Further, Jio does not disclose a time frame within which it notifies users prior to the changes coming into effect. Jio also does not maintain any public archives or change log.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Terms of Service disclose a range of proscribed activities, and states that any violation of the Terms may be grounds to suspend or terminate services. However, Jio makes no disclosures about its process of identifying violations and enforcing rules, or whether any government or private entity receives priority consideration in flagging content. There are no clear examples provided to help users understand the provisions.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio does not disclose data about the volume and nature of content and accounts it restricts.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Content Restriction and Termination of Services&lt;br /&gt;&lt;/span&gt;&lt;span&gt;Jio makes no disclosures about its process for responding to requests from third parties to restrict content or users. The Terms do not disclose the basis under which it may comply with government or private party requests, nor whether any due diligence is conducted before responding to requests. Jio makes no commitment to pushback on inappropriate or overbroad requests from the government, or private entities. Jio does not disclose if it notifies users when they try to access content that has been restricted, or if it notifies users when their account has been restricted.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio also does not publish any data about the requests it receives, and how it responds to them. This could include, for instance, the number of requests received, the number of requests complied with, the the number of accounts or URLs affected, the types of subject matter associated with the requests, etc.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio does not disclose its policy on network management, or whether it prioritizes, blocks, or delays certain types of traffic, applications, protocols, or content for reasons beyond assuring quality of service and reliability.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio makes no disclosures about its policy on network shutdowns, or why it may shut down service to a particular area or group of users. Jio does not disclose its process for responding to such requests, or the legal authority that makes the requests, or whether it notifies users directly when it restricts access to the service. It also provides no data about the number of request received or complied with.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio requires that users verify their identity with government issued identification such as Passport, Driver’s License or Aadhaar.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Privacy&lt;/strong&gt;&lt;a name="_ftnref88"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;General&lt;br /&gt;&lt;/span&gt;&lt;span&gt;The Privacy Policy is easily locatable on the website, and is available in English. It is likely that Jio has a large Hindi and vernacular speaking user base. However, the website does not have any other language versions of the Privacy Policy&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy is presented in an understandable manner, with section headers, but provides no additional guidance such as summaries, tips or graphics to explain the terms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio commits to make all efforts to communicate significant changes to the policy, but does not disclose its process for doing so. The policy recommends that users periodically review the website for any changes. Jio does not disclose a time frame within which it notifies users prior to the changes coming into effect. Jio also does not maintain any public archives or change log.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Collection, Use and Sharing of Information&lt;br /&gt;&lt;/span&gt;&lt;span&gt;Jio clearly discloses the types of personal and non personal information it may collect, but does not explicitly disclose how it collects the information. There is no commitment to limit collection only to information that is relevant and necessary to accomplish the purpose of the service.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio commits to not sell or rent user information to third parties, but discloses that it may use and share non personal information at its discretion.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jio discloses the broad circumstances in which it may share personal information with third parties and the types of entities it may disclose such information to. The policy states that such partners operate under contract and strict confidentiality and security restrictions. However, it does not specifically disclose the names of third parties it shares information with. Jio clearly discloses that it may share user information with government or legal authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio discloses that it may share user information with third party websites or applications at the behest of the user (for instance, when logging into services with a Jio account). It discloses that Jio will provide notice to the user, and obtain consent regarding the details of the information that will be shared. In such a situation, the third party’s privacy policy would be applicable to the information shared.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Privacy Policy broadly states the purposes for which the information is collected, but does not disclose if user information is combined from different services. In detailing the types of third parties that Jio may share user information with, Jio also discloses the respective purposes for sharing. However, Jio makes no commitment to limit the use of information to the purpose for which it was collected.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio does not disclose whether it collects information from third parties through technical means, and how it does so, or its policies about use, sharing, retention etc.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio does not make any disclosures about its processes for responding to third party requests for user information. The Privacy Policy does not disclose the basis under which it may comply with government or private party requests, nor whether any due diligence is conducted before responding to the requests. Jio makes no commitment to pushback on inappropriate or overbroad requests from the government, or private entities.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio also does not publish any data about the requests it receives, and how it responds to them. This could include, for instance, the number of requests received, the number of requests complied with, the number of accounts affected, the type of authority or legal process through which the request was made, etc.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio does not disclose whether it notifies users when their information is sought by government entities or private parties.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;User Control over Information&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jio makes no disclosures about how long it retains user information. It does not disclose whether it retains de-identified information, or its process for de-identification. Jio does not disclose the time frame within which it may delete user information, if at all, after users terminate their account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio does not disclose whether users can control the collection of information by Jio. The Privacy Policy does allow requests for access, correction or deletion of user information, but also notes that deletion of certain (unspecified) information may lead to termination of the service. However, deletion of information would be subject to any applicable data retention laws, law enforcement requests, or judicial proceedings. Further, the request may be rejected if there is extreme technical difficulty in implementing it, or may risk the privacy of others.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Though the Privacy Policy allows for access requests, it does not disclose what user information may be obtained, or whether it may be made available in a structured data format. Jio does not disclose if targeted advertising is on by default, or whether users can control how their information is used for these purposes.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio discloses that it has adopted measures to protect information from unauthorized access and to ensure that personal information is accessible to employees or partners employees strictly on a need to know basis. Jio does not disclose whether it has a security team that audits the service for security risk, or whether it commissions third party audits.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio discloses that it has reasonable security practices and procedures in place in line with international standard IS/ISO/IEC 27001, to protect data and information. Jio does not disclose whether it has any process, policy or mechanism in place for researchers to submit security vulnerabilities, and how it would respond to them.  Jio does not explicitly commit to notify the relevant authorities without undue delay in case of a data breach. Jio does not disclose whether it notifies affected users about breaches, and any steps it may take to minimize impact.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio does not disclose if transmission of user information is encrypted by default, or whether it uses advanced authentication methods to prevent unlawful access. Jio does not disclose whether users can view their recent account activity, or if notifies users about unusual activity and possibly unauthorized access.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Jio does not publish and materials that educate users about cyber risks relevant to their service.&lt;/span&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt;&lt;span&gt; For more information about the detailed methodology followed, please see - https://rankingdigitalrights.org/wp-content/uploads/2016/07/RDR-revised-methodology-clean-version.pdf.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; Internet Users Per 100 People, World Bank, available at http://data.worldbank.org/indicator/IT.NET.USER.P2.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; Telecommunications Indicator Report, Telecom Regulatory Authority of India, available at  http://www.trai.gov.in/WriteReadData/PIRReport/Documents/Indicator_Reports.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; The upstaging of extant telecos did, however, lead to allegations of anti-competitive practices by both Jio as well as existing telecos such as Vodafone and Airtel. See http://thewire.in/64966/telecom-regulator-calls-time-out-as-reliance-jio-coai-battle-turns-anti-consumer/.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; Get Ready for India’s Internet Boom, Morgan Stanley, available at http://www.morganstanley.com/ideas/rise-of-internet-in-india.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; Circular on Business Responsibility Reports, Securites Exchange Board of India, (August 13, 2012), available at  http://www.sebi.gov.in/cms/sebi_data/attachdocs/1344915990072.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; FAQ on Corporate Social Responsibility, Ministry of Coporate Affairs, available at https://www.mca.gov.in/Ministry/pdf/FAQ_CSR.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; Govind vs. State of Madhya Pradesh, (1975) 2 SCC 148;  R. Rajagopal vs. State of Tamil Nadu&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1994) 6 S.C.C. 632; PUCL v. Union of India, AIR 1997 SC 568; Distt. Registrar &amp;amp; Collector vs Canara Bank, AIR 2005 SC 186.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; Justice K.S. Puttaswamy (Retd.) &amp;amp; Another Versus Union of India &amp;amp; Others, available at&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt; PUCL v Union of India, AIR 1997 SC 568.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; According to Section 2(w) of the IT Act, “Intermediary” with respect to any particular electronic records, means “…any person who on behalf of another person receives, stores or transmits that record or provides any service with respect to that record and includes telecom service providers, network service providers, internet service providers, web hosting service providers, search engines, online payment sites, online-auction sites, online market places and cyber cafes.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; See http://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; Rule 23, Interception Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; Rule 19 &amp;amp; 20, Interception Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Rule 24, Interception Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt; See http://tikona.in/sites/default/files/pdf_using_mpdf/1-ISP%20Agreement%20Document.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn17"&gt;&lt;/a&gt; Pranesh Prakash and Jarpreet Grewal, How India Regulates Encryption, Centre for Internet and Society, (October 30, 2015) available at  &lt;a href="http://cis-india.org/internet-governance/blog/how-india-regulates-encryption"&gt;http://cis-india.org/internet-governance/blog/how-india-regulates-encryption&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn18"&gt;&lt;/a&gt; See http://www.wipo.int/edocs/lexdocs/laws/en/in/in098en.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn19"&gt;&lt;/a&gt; As clarified in a Central Governemnt Press Note, this does not apply to corporates collecting data from other corporations, but only those handling data directly from natural persons, See http://meity.gov.in/sites/upload_files/dit/files/PressNote_25811.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn20"&gt;&lt;/a&gt; Section 79 – ‘Exemption from liability of intermediary in certain cases - (1) Notwithstanding anything contained in any law for the time being in force but subject to the provisions of sub-sections (2) and (3), an intermediary shall not be liable for any third party information, data, or communication link hosted by him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The provisions of sub-section (1) shall apply if-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the function of the intermediary is limited to providing access to a communication&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;system over which information made available by third parties is transmitted or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;temporarily stored; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the intermediary does not-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) initiate the transmission,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) select the receiver of the transmission, and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) select or modify the information contained in the transmission&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) the intermediary observes due diligence while discharging his duties under this Act&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;and also observes such other guidelines as the Central Government may prescribe in&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;this behalf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The provisions of sub-section (1) shall not apply if-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the intermediary has conspired or abetted or aided or induced whether by threats or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;promise or otherwise in the commission of the unlawful act (ITAA 2008)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) upon receiving actual knowledge, or on being notified by the appropriate Government or its agency that any information, data or communication link residing in orconnected to a computer resource controlled by the intermediary is being used to&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;commit the unlawful act, the intermediary fails to expeditiously remove or disable&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;access to that material on that resource without vitiating the evidence in any manner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Explanation:- For the purpose of this section, the expression "third party information" means&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;any information dealt with by an intermediary in his capacity as an intermediary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn21"&gt;&lt;/a&gt; Information Technology (Intermediaries guidelines) Rules, 2011, available at http://dispur.nic.in/itact/it-intermediaries-guidelines-rules-2011.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn22"&gt;&lt;/a&gt; AIR 2015 SC 1523.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn23"&gt;&lt;/a&gt; See http://cis-india.org/internet-governance/resources/information-technology-procedure-and-safeguards-for-blocking-for-access-of-information-by-public-rules-2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn24"&gt;&lt;/a&gt; License Agreement For Unified License, available at  http://www.dot.gov.in/sites/default/files/Amended%20UL%20Agreement_0_1.pdf?download=1.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn25"&gt;&lt;/a&gt; http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Regulation_Data_Service.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn26"&gt;&lt;/a&gt; OECD Privacy Principles, available at  http://oecdprivacy.org/; Report of the Group of Experts on Privacy, Planning Commission of India, available at http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn27"&gt;&lt;/a&gt; TATA Communications Annual Report 2016, available at https://www.tatacommunications.com/sites/default/files/FIN-AnnualReport2015-16-AR-20160711.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn28"&gt;&lt;/a&gt; Submarine Cable Networks Data, available at http://www.submarinenetworks.com/stations/asia/india.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn29"&gt;&lt;/a&gt; National Voluntary Guidelines on Social, Environmental and Economic Responsibilities of Business, Ministry of Corporate Affairs, Government of India; SEBI Amendment to Listing Agreement, (August 13, 2012) available at &lt;a href="http://www.sebi.gov.in/cms/sebi_data/attachdocs/1344915990072.pdf"&gt;http://www.sebi.gov.in/cms/sebi_data/attachdocs/1344915990072.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn30"&gt;&lt;/a&gt; Employee Code of Conduct, TATA Group, available at http://www.tata.com/pdf/tcoc-booklet-2015.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn31"&gt;&lt;/a&gt; TATA Communications Busines Responsibility Policies, available at http://www.tatacommunications.com/sites/default/files/Business_Responsibility_Policies.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn32"&gt;&lt;/a&gt; Supra Note 4 , at page 18.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn33"&gt;&lt;/a&gt; TATA Communications Whistleblower Policy, available at https://www.tatacommunications.com/sites/default/files/Whistleblower%20Policy%20-%20Designed%20Version.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn34"&gt;&lt;/a&gt; Kamlesh Bajaj, DSCI: A self-regulatory organization, available at https://www.dsci.in/sites/default/files/DSCI%20Privacy%20SRO.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn35"&gt;&lt;/a&gt; Customer Charter, TATA Communications, available at https://www.tatacommunications.com/legal/customer-charter.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn36"&gt;&lt;/a&gt; AUP Violations Grievances Portal, available at &lt;a href="http://www.tatacommunications.com/reporting-aup-violations"&gt;http://www.tatacommunications.com/reporting-aup-violations&lt;/a&gt;; Privacy Policy, TATA Communications, available at https://www.tatacommunications.com/policies/privacy-policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn37"&gt;&lt;/a&gt; Shamnad Basheer, Busting a Baloney: Merely Viewing Blocked Websites Will Not Land You in Jail, Spicy IP, (August 23, 2016), available at http://spicyip.com/2016/08/busting-a-baloney-merely-viewing-blocked-websites-will-not-land-you-in-jail.html.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn38"&gt;&lt;/a&gt; Acceptable Use Policy, TATA Communications, available at https://www.tatacommunications.com/policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn39"&gt;&lt;/a&gt; See http://login.vsnl.com/terms_n_conditions.html.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn40"&gt;&lt;/a&gt; This includes inappropriate content, which may be threatening, hateful or abusive content; content that infringes any intellectual property right; transfer of viruses or harmful content, fraudulent content (such as credit card fraud) and spam or unsolicited email.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn41"&gt;&lt;/a&gt; Basheer, Supra note 11.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn42"&gt;&lt;/a&gt; Response to Consultation Paper on Regulatory Framework for Over-the-top (OTT) Services, TATA Communications, available at  http://trai.gov.in/Comments/Service-Providers/TCL.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn43"&gt;&lt;/a&gt; Kaustabh Srikanth, Technical Observations about Recent Internet Censorship in India, Huffington Post, (January 6, 2015) available at  http://www.huffingtonpost.in/kaustubh-srikanth/technical-observations-about-recent-internet-censorship-in-india/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn44"&gt;&lt;/a&gt; See &lt;a href="https://www.tatacommunications.com/policies/privacy-policy"&gt;https://www.tatacommunications.com/policies/privacy-policy&lt;/a&gt;; &lt;a href="http://login.vsnl.com/privacy_policy.html"&gt;http://login.vsnl.com/privacy_policy.html&lt;/a&gt; (VSNL); However, there are other documents available on the TCL website purpoting to be the Privacy Policy. Since the policies are not dated, it is not entirely clear which is applicable.  (See  http://www.tatacommunications.com/downloads/Privacy-Policy-for-TCL-and-Indian-Subs.pdf).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn45"&gt;&lt;/a&gt; The disclosure of governmental requests may be affected by laws which require such information to remain confidential, as explained in detail in Section I of this report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn46"&gt;&lt;/a&gt; See  http://www.alexa.com/siteinfo/rediff.com.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn47"&gt;&lt;/a&gt; See  http://www.rediff.com/terms.html.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn48"&gt;&lt;/a&gt; Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn49"&gt;&lt;/a&gt; See  http://ishare.rediff.com/templates/tc.html.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn50"&gt;&lt;/a&gt; See  http://blogs.rediff.com/terms/.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn51"&gt;&lt;/a&gt; See  http://www.rediff.com/news/disclaim.htm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn52"&gt;&lt;/a&gt; See  http://blogs.rediff.com/terms/.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn53"&gt;&lt;/a&gt; Performance Indicator Report, Telecom Regulatory Authority of India,  (August, 2016) available at (http://www.trai.gov.in/WriteReadData/PIRReport/Documents/Indicator_Report_05_August_2016.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn54"&gt;&lt;/a&gt; See  https://www.vodafone.com/content/sustainabilityreport/2015/index/operating-responsibly/human-rights.html.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn55"&gt;&lt;/a&gt; Vodafone Sustainability Report, See http://static.globalreporting.org/report-pdfs/2015/ffaa6e1f645aa009c2af71ab9505b6b0.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn56"&gt;&lt;/a&gt; Amit Pradhan, CISO, on Data Privacy at Vodafone, DSCI Blog, (July 15, 2015), available at https://blogs.dsci.in/interview-amit-pradhan-vodafone-india-on-privacy/.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn57"&gt;&lt;/a&gt; See http://www.coai.com/about-us/members/core-members.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn58"&gt;&lt;/a&gt; Process for registration of a complaint, Vodafone India Telecom Consumers’ Charter, available at https://www.vodafone.in/documents/pdfs/IndiaCitizensCharter.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn59"&gt;&lt;/a&gt; Vodafone India: We are Pro Ne Neutrality, Gadgets Now, (May 20, 2015), available at &lt;a href="http://www.gadgetsnow.com/tech-news/vodafone-wont-toe-zero-rating-plan-of-airtel/articleshow/47349710.cms"&gt;http://www.gadgetsnow.com/tech-news/vodafone-wont-toe-zero-rating-plan-of-airtel/articleshow/47349710.cms&lt;/a&gt;; Vodafone Response to TRAI Consultation Paper on Regulatory Framework for Over-the-Top (OTT) services, Vodafone India, (March 27, 2015) available at  http://trai.gov.in/Comments/Service-Providers/Vodafone.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn60"&gt;&lt;/a&gt; See http://www.vodafone.in/privacy-policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn61"&gt;&lt;/a&gt; Vodafone Law Enforcement Disclosure Report, available at  https://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement.html.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn62"&gt;&lt;/a&gt; Performance Indicator Report, Telecom Regulatory Authority of India,  (August, 2016) available at (http://www.trai.gov.in/WriteReadData/PIRReport/Documents/Indicator_Report_05_August_2016.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn63"&gt;&lt;/a&gt; Business Responsibility Reports, Reliance Communications Ltd., available at  http://www.rcom.co.in/Rcom/aboutus/ir/pdf/Business-Responsibility-Report-2015-16.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn64"&gt;&lt;/a&gt; Manual of Practice, Reliance Communications Ltd., available at http://www.rcom.co.in/Rcom/personal/customercare/pdf/Manual_of_Practice.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn65"&gt;&lt;/a&gt; See  http://www.rcom.co.in/Rcom/personal/home/pdf/1716-Telecom-Consumer-Charter_TRAI-180412.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn66"&gt;&lt;/a&gt; See  http://www.rcom.co.in/Rcom/personal/pdf/AUP.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn67"&gt;&lt;/a&gt; See  http://myservices.relianceada.com/ImplNewServiceAction.do#.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn68"&gt;&lt;/a&gt; Prohibition Of Discriminatory Tariffs For Data Services Regulations, Telecom Regulatory Authority of India, February 8, 2016), available at http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Regulation_Data_Service.pdf.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn69"&gt;&lt;/a&gt; Shaadi.com Terms of Use/Service Agreement, available at http://www.shaadi.com/shaadi-info/index/terms (Last visited on November 10, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn70"&gt;&lt;/a&gt; Shaadi.com Privacy Policy, available at http://www.shaadi.com/shaadi-info/index/privacy (Last visited on November 10, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn71"&gt;&lt;/a&gt; Shaadi.com Privacy Tips, available at http://www.shaadi.com/customer-relations/faq/privacy-tips (Last visited on November 10, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn72"&gt;&lt;/a&gt; https://blog.hike.in/hike-unveils-its-incredible-new-workplace-3068f070af08#.zagtgq5lk&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn73"&gt;&lt;/a&gt; http://economictimes.indiatimes.com/small-biz/money/hike-messaging-app-raises-175-million-from-tencent-foxconn-and-others-joins-unicorn-club/articleshow/53730336.cms&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn74"&gt;&lt;/a&gt; https://medium.com/@kavinbm/175-million-tencent-foxconn-d9cc8686821f#.7w6yljaii&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn75"&gt;&lt;/a&gt; &lt;strong&gt;[75]&lt;/strong&gt; Hike Terms of Use, available at http://get.hike.in/terms.html (Last visited on November 10, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn76"&gt;&lt;/a&gt; Hike Privacy Policy, available at http://get.hike.in/terms.html (Last visited on November 10, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn77"&gt;&lt;/a&gt; Aircel Whistle Blower Policy, available at http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P35400442051324996434644 (Last visited on November 10, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn78"&gt;&lt;/a&gt; Aircel Whistle Blower Policy, available at http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P35400442051324996434644 (Last visited on November 10, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn79"&gt;&lt;/a&gt; Aircel Whistle Blower Policy, available at http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P35400442051324996434644 (Last visited on November 10, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn80"&gt;&lt;/a&gt; Aircel Whistle Blower Policy, available at http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P35400442051324996434644 (Last visited on November 10, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn81"&gt;&lt;/a&gt; Aircel Whistle Blower Policy, available at http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P35400442051324996434644 (Last visited on November 10, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn82"&gt;&lt;/a&gt; Aircel National Customer Preference Registry, available at http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=customercare_ndnc_page (Last visited on November 10, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn83"&gt;&lt;/a&gt; Aircel National Customer Preference Registry, available at http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=customercare_ndnc_page (Last visited on November 10, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn84"&gt;&lt;/a&gt; http://www.counterpointresearch.com/reliancejio/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn85"&gt;&lt;/a&gt; http://economictimes.indiatimes.com/tech/internet/gujarat-andhra-top-circles-for-jio-subscribers-cross-24mn-mark/articleshow/55040351.cms&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn86"&gt;&lt;/a&gt; Jio Terms and Conditions, available at https://www.jio.com/en-in/terms-conditions (Last visited on November 10, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn87"&gt;&lt;/a&gt; Jio Terms and Conditions, available at https://www.jio.com/en-in/terms-conditions (Last visited on November 10, 2016).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn88"&gt;&lt;/a&gt; Jio Terms and Conditions, available at https://www.jio.com/en-in/terms-conditions (Last visited on November 10, 2016).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/ranking-digital-rights-in-india'&gt;https://cis-india.org/internet-governance/blog/ranking-digital-rights-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Divij Joshi and Aditya Chawla</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-02-12T07:22:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian">
    <title>Vidhi Doshi - Fingerprint Payments Prompt Privacy Fears in India (The Guardian)</title>
    <link>https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian</link>
    <description>
        &lt;b&gt;This article by Vidhi Doshi on the use of Aadhaar-based payments by private companies in India was published by The Guardian on February 09, 2017. Sumandro Chattapadhyay is quoted in the article.&lt;/b&gt;
        
&lt;p&gt;Originally published by &lt;a href="https://www.theguardian.com/sustainable-business/2017/feb/09/fingerprint-payments-privacy-fears-india-banknotes"&gt;The Guardian&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;For two years, Indian officials have been trawling the country, from city slums to unelectrified villages, zapping eyeballs, scanning fingerprints and taking photographs.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Last month, Indian shoppers started to see the results. With the launch of a government-backed fingerprint payment system, tied to India’s growing biometric data bank, registered citizens can – in theory at least – now pay for things with the touch of a finger.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;India’s extraordinary biometric database, named Aadhaar after a Hindi word for ‘foundation’, is the biggest of its kind in the world. It was initially sold to the public as a welfare delivery mechanism that would ensure the country’s 1.25bn citizens were each receiving the right quantity of subsidised rice or cooking fuel, while weeding out fraudsters.&lt;/p&gt;
&lt;p&gt;But now this pool of more than a billion people’s biometric data is being used by banks, credit checking firms and other private companies to identify customers, raising questions about privacy and security.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As one of his flagship policies, prime minister Narendra Modi pledged to create a “digital India” in which the country’s cash-centric economy would switch to credit and debit cards, squeezing the parallel economy of untaxed cash transactions and giving more citizens access to digital financial services.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In a surprise television announcement last November, Modi announced the demonetisation of 500 and 1,000 rupee notes (around £6 and £12), wiping out 85% of the country’s circulating currency overnight.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Two days later, when the banks reopened, long queues snaked around almost every branch, with millions lining up to open bank accounts for the first time. Many used their 12-digit Aadhaar number, linked to their biometric profile, to sign up. Within three weeks, 3m bank accounts had been opened using fingerprint verification, according to estimates.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The moment marked a radical change for India’s banking system, under which applicants were traditionally required to file photocopies of passports or voter IDs. Banks could take weeks, sometimes months, to verify them. Now applicants’ encrypted biometric data can be sent to the Unique Identification Authority of India (UIDAI), a government agency, to be matched against their Aadhaar data, re-encrypted and sent back to the bank.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Despite technical teething problems, the system is designed to allow very fast authorisation. “All this happens in a matter or two or three seconds,” explains Ajay Bhushan Pandey, UIDAI’s director general.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For Pandey, the benefits are clear: paper documents are easy to forge and hard to verify, especially in India where until recently thousands of people still used handwritten passports. Not so biometric data.&lt;/p&gt;
&lt;h4&gt;Privacy fears&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Pandey emphasises that private banks and companies aren’t able to access the entire Aadhaar database, only to use the government interface, which allows them to verify identities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Nonetheless, many Indians are worried about the privacy implications. Sumandro Chattapadhyay, a director at the Centre for Internet and Society thinktank, is one of them.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;For starters, says Chattapadhyay, the law governing use of the biometric database, fast-tracked through parliament last year, is flimsy when it comes to the private sector. Since India lacks a general privacy or data protection law, this leaves corporate use of Aadhaar services effectively unregulated, he says.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This is particularly worrying, says Chattapadhyay, because of the data-sharing possibilities opened up by Aadhaar. It makes it easier for companies not only to share information on individuals’ consumption and mobility habits, but also to link this data up with public records like the electoral register, he says. “Both lead to significant threats to privacy of individuals.”&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Chattapadhyay’s fear is that private companies could eventually gain access to government-held personal data, such as income or medical records, while the government could use company data like phone records to target specific individuals in political campaigns.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Already companies are linking Aadhaar numbers with collected metadata. Credit-checking startup CreditVidya, for example, identifies clients using their biometric ID in combination with their internet browsing history and other data, to assign credit scores for users who have no record of loan repayments. Banks then store this processed metadata, for example whether or not someone’s Facebook name is consistent with the name on their bank account.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Its founder Abhishek Agarwal admits there are risks for users: “[I]f someone managed to hack the bank’s security system, as well as the Aadhaar database, they could potentially be able to link your Facebook or LinkedIn data with your biometric information.” But he says this would be hard to do.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Pandey insists the companies are carefully vetted before they can use Aadhaar authentication. But, like Agarwal, he acknowledges the system can never be 100% secure: ““I wouldn’t say it is impossible to break the system, but it is very, very difficult.”&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian'&gt;https://cis-india.org/internet-governance/news/vidhi-doshi-fingerprint-payments-prompt-privacy-fears-in-india-the-guardian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vidhi Doshi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Demonetisation</dc:subject>
    
    
        <dc:subject>Digital Payment</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2017-02-13T09:21:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime">
    <title>Survey on Data Protection Regime</title>
    <link>https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime</link>
    <description>
        &lt;b&gt;We request you to take part in this survey aimed at understanding how various organisations view the changes in the Data Protection Regime in the European Union. Recently the General Data Protection Regulation (EU) 2016/679 was passed, which shall replace the present Data Protection Directive DPD 95/46/EC. This step is likely to impact the way of working for many organisations. We are grateful for your voluntary contribution to our research, and all information shared by you will be used for the purpose of research only. Questions that personally identify you are not mandatory and will be kept strictly confidential. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;The survey form below can also be accessed &lt;a href="https://goo.gl/forms/61d4W0kPQ8SqNaMO2" target="_blank"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;iframe src="https://docs.google.com/forms/d/e/1FAIpQLSepvhTUkkc7s3jFDfJZ90wFJAIuVexrbVSO5icV4kW0-1uyNA/viewform?embedded=true" frameborder="0" marginwidth="0" marginheight="0" height="800" width="600"&gt;Loading...&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime'&gt;https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditi Chaturvedi and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>General Data Protection Regulation</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2017-02-10T10:47:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
