<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 13.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/e-accessibility-a-wiki-project"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/what-will-be-the-role-of-ict-in-indias-judical-reform-process"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/accessibility/blog/e-accessibility-a-wiki-project">
    <title>e-Accessibility: A Wiki Project</title>
    <link>https://cis-india.org/accessibility/blog/e-accessibility-a-wiki-project</link>
    <description>
        &lt;b&gt;Envisaged and funded by the National Internet Exchange of India, and executed by the Centre for Internet and Society, a Wiki site pertaining to issues of disability and e-accessibility has recently been launched. &lt;/b&gt;
        
&lt;p&gt;&lt;/p&gt;
&lt;p&gt;Such a project is most timely as India has a
large percentage of disabled persons in its population— estimated to be over seven
per cent as per the Census of 2001.&amp;nbsp; Taken
in figures, this amounts to roughly 70-100 million persons with disabilities in
the territory of India. Out of this number, a mere two per cent of persons with
disabilities residing in urban areas have access to information and assistive
technologies.&lt;/p&gt;
&lt;p&gt;Regrettably, there still remains a
lack of awareness on how information and services can be best delivered to
persons with disabilities. Parents, teachers, government authorities and society
at large remain equally unaware of the options technology today presents to
enable persons with disabilities live independent and productive lives.&amp;nbsp; Therefore, the wiki aims foremost to serve as
a resource for persons with disabilities and their families, NGO’s, as well as
the members of education and legal communities--providing valuable information surrounding
disability and electronic accessibility.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Covered in 125 article wiki project includes a broad collection of
articles pertaining to topics of accessibility for users, developers, organizations,
developments in India, and accessibility for nations.&amp;nbsp;&amp;nbsp; With hopes of expansion, wikipage can be accessed and
edited collaboratively at&lt;a class="external-link" href="http://accessibility.cis-india.org/"&gt; http://accessibility.cis-india.org.&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/e-accessibility-a-wiki-project'&gt;https://cis-india.org/accessibility/blog/e-accessibility-a-wiki-project&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Projects</dc:subject>
    

   <dc:date>2011-08-23T04:51:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/what-will-be-the-role-of-ict-in-indias-judical-reform-process">
    <title>The Role of ICT in Judicial Reform- An Exploration</title>
    <link>https://cis-india.org/internet-governance/blog/what-will-be-the-role-of-ict-in-indias-judical-reform-process</link>
    <description>
        &lt;b&gt;A seminar held this month by the Communications and Manufacturing Association of India (CMAI) explored the role that information and communication technology can assume in the process of India's judicial reform efforts.  The broad consensus among panelists was that “law is not keeping pace with technology”.  However, whether technology will be harnessed to actually facilitate much needed transparency and access to the justice system, or be simply used to improve efficiency within the judicial branch still remains unclear.&lt;/b&gt;
        
&lt;p&gt;	The Indian
judiciary is facing mounting pressures to reform its apparatus.  Even the judiciary itself has come
to recognize, &lt;a class="external-link" href="http://lawcommissionofindia.nic.in/reports/report230.pdf"&gt;on the books&lt;/a&gt;, that change is long overdue.&lt;a class="sdfootnoteanc" name="sdfootnote1anc" href="#sdfootnote1sym"&gt;&lt;/a&gt;
Some &lt;a class="external-link" href="http://www.judicialreforms.org/files/PRS%20study%20on%20pendency%202009.pdf"&gt;estimates&lt;/a&gt; have it that it would require almost three years to clear the current backlog of cases in High Courts&lt;a class="sdfootnoteanc" name="sdfootnote2anc" href="#sdfootnote2sym"&gt;&lt;/a&gt;.
 While technocrats herald that the enormous backlog of cases may
eventually be the death knell for India's judicial branch, reform
efforts must go beyond achieving the speedier delivery of justice
and work towards tackling other inadequacies of the system if “access to
justice for all”(1) is to become a reality.&lt;/p&gt;
&lt;p&gt;	The rural penetration of courts in
India is extremely low, which significantly limits access to justice for
the many citizens living far beyond the district courts of city
centers.  An extremely low
judge to population ratio in India only contributes further to the
already high incidence of pending cases, making delays in justice a
regular occurrence.  Mr. P.K. Malhotra from the Department of Legal
Affairs has noted that increased
litigation within the government has also caused a stark increase in
the number of pending cases&lt;a class="sdfootnoteanc" name="sdfootnote3anc" href="#sdfootnote3sym"&gt;&lt;/a&gt;.
 While the need for reform can be demonstrated quite clearly on a
practical level, the right to information (RTI) movement has also
provided further impetus for reform on a more fundamental level. Well organized citizens are now &lt;a class="external-link" href="http://www.judicialreforms.org/"&gt;demanding
the right&lt;/a&gt; to a more transparent and accountable judiciary.&lt;/p&gt;
&lt;p&gt;	As e-government initiatives continue
to transform the nature of
India's bureaucracy and enhance the quality of government
services, there is a mood of great optimism that ICT will also come
to play a central role in judicial reform efforts.  Speakers at the
seminar enthusiastically cited innovative practices such as
Singapore's “paperless court” which makes a compelling case for
automation.&amp;nbsp; Notable success in implementing
ICT in the judiciary have also been achieved in Canada,
Australia, and in several countries across Latin America.  This is
not to say, however, that the appropriation of ICT
is uniform in every case.  Variables such as political will and
context, institutional capacity and reform goals all
play a role in shaping the outcome.&amp;nbsp; Plans
could, for example, take more of an operational approach by
prioritizing the improved efficiency and the rationalization of
resources by implementing electronic case
management systems.  Other strategies may be designed and implemented from an access
perspective, seeking to restore faith in the justice system by
increasing transparency and accountability.  This could be done, for
example, by installing video technology in court rooms, or publishing legal
information online.&lt;/p&gt;
&lt;p&gt;	At
the seminar, India's consortium of well-organized and highly
ambitious
technocrats were not shy in suggesting the many ways ICT may be used
to transform the judicial system, and, additionally, the many ways
such an endeavor provides the IT sector with “new opportunities”.&amp;nbsp; Dr M. Veerappa Moily, Union Minister for Law and
Justice, has proposed for India a centrally funded and administered National
Judicial Technology Program.&amp;nbsp; Such a program aims to use ICT in the courtrooms to free the legal system of  “historical inefficiencies".&amp;nbsp; It
is of no doubt that ICT can reduce the
duplicity of the paper world and make courts more green through
electronic case filing and video conferencing.  Online case filing
systems can increase speed in which citizens can have their cases heard, and real time access to
online repositories of legal information drastically expedites
the case cycle.&lt;/p&gt;
&lt;p&gt;	Mr. C P Gurnani, CEO of Tech Mahindra
made the bold assertion that with ICT, India's 300  year case backlog
can be reduced to three years, in a span of only three years (2). Features of this newly envisioned e-justice system
include the use of video hearings to reduce transportation costs,
case filing operation systems, RFID based file tracking, and the
creation of a publicly accessible and easily searchable e-library.   
While others were much less optimistic than Mr. Gurani and recognize
that the use of ICT in the reform process is “no instant coffee”,
the question of whether or not ICT can be a strategically appropriated in the Indian
context still remains.&lt;/p&gt;
&lt;p&gt;	Optimistic accounts of how ICT will increase
access to justice, incorporate the marginalized into the law-making
process, and increase judicial transparency and accountability all sounds uncomfortably techno-utopian.  While ICT should facilitate the reform process, past
experiences have shown that the over zealous use of technology has too-often resulted in less than impressive results (3)&lt;a class="sdfootnoteanc" name="sdfootnote4anc" href="#sdfootnote4sym"&gt;&lt;/a&gt;. To ensure that the reform process in India is not driven mainly by the IT sector, it is important that the use of technology remains complimentary to
a sound national judicial reform strategy.&amp;nbsp; An abundant supply of technical
support with little demand for the reform process from within the judicial branch may spell disappointing results for all stakeholders.  Seeing that
India's first seminar discussing the role of IT in the judiciary has been organized by the IT industry, it is safe to
assume that reform strategies are being crystallized through the gaze
of technocrats rather than the judiciary itself.
Technology has an important role to play, but
India's technocrats may be jumping the gun.&lt;/p&gt;
&lt;p&gt;	Many deep-seated challenges must be
overcome before the use of ICT can be truly transformative.  Often cited
is the level of resistance judicial cultures express towards externally imposed change.  Quite logically, those required to make
change are also those who may have the most
to lose in the short-term by doing so.  Similarly,  it is also
difficult garnering the levels of political support judicial reforms require to be effective.&amp;nbsp; Because the judiciary is such a highly politicized apparatus, efforts to fundamentally transform the system will require the support of a vast number of stakeholders &lt;a class="sdfootnoteanc" name="sdfootnote5anc" href="#sdfootnote5sym"&gt;&lt;/a&gt;.
 The low level of technological literacy which exists among India's
judges is also problematic.  Not only will members of the
judiciary be open to new ways of doing business, they will also have
to be diligent in adopting a new skill-set in which they may be more
than a decade behind in acquiring.&lt;br /&gt;&lt;/p&gt;
&lt;p&gt;Other
deep-rooted limitations of India's judicial system are
becoming increasingly apparent today.  Questions surrounding access to justice
remain deeply embedded in the asymmetries of class power, which are often reinforced by the political nature of the judiciary.  Constitutional law
in India also remains unstable, as the principles informing judicial action have become
increasingly less clear (5).  Furthermore, the courts have come to
maintain a disproportionate share of power and influence in the
Indian political sphere (6).&lt;a class="sdfootnoteanc" name="sdfootnote6anc" href="#sdfootnote6sym"&gt;&lt;/a&gt; It is questionable if ICT can work to ameliorate some of these malignancies, or if its use will
only come to reinforce them.&amp;nbsp; If technology is appropriated in a way which serves to make the judicial process more
transparent and accountable, protect the rights of citizens, and
provide greater and more equitable access to justice, it may be safe
to assume that a more tech-savvy judiciary is a positive development for citizens.&amp;nbsp; Publishing legal information online, for example, currently allows for greater
transparency in the law making process and allows dialogue on
important issues of governance and citizenship.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, it is almost unnecessary to
reiterate that such outcomes are not guaranteed.&amp;nbsp; Technology is
often seen as neutral– the evaluative outcome of its
application remains dependent on numerous variable factors.  Most important is whether or not the government provides
a legal framework conducive to the appropriation of ICT in ways which
are considered to further the public interest.  It may be useful to
view the successful appropriation of ICT to judicial reform as a cumulative process, each
step being a precondition to the other.  It is clear to see how basic
infrastructure such as civil courts in rural areas must be in place
before the use of ICT can facilitate access to justice for
individuals who remain peripheral to the legal system. 
Similarly, one would assume that laws would have to first be to
be nondiscriminatory to all members of society before it could it can be widely accepted that more technology will better safeguard our rights and freedoms.&lt;/p&gt;
&lt;p&gt;	Without a legal framework which is considered to be socially just, greater speed of the judicial process, aided by technology, may become a tool which enables the judiciary to act more arbitrarily, more efficiency.&amp;nbsp;&amp;nbsp; This could be troubling for individuals who are already marginalized by certain policies or legal practices.&amp;nbsp; Technology can also make it possible for judges
to insulate themselves from the necessary checks and balances required in the law-making process.&amp;nbsp; While Mr Gurani stated that ICT can help preserve judicial independence, it is questionable if the use of technology is an appropriate strategy to mitigate politicization of the judicial branch.&amp;nbsp; Any
frivolous efforts to spearhead the reform process through the introduction
of ICT without the required commitment of judges and policy makers may be
naïve at best.  At worst, it could serve to reinforce what judicial
bodies believe they do well without critically re-examining the
fundamental roles, norms and principles of the Indian judicial system
itself.&lt;/p&gt;
&lt;p&gt;	Online case-filing services may
unintentionally, due to cost or lack of awareness, erect further
barriers to justice for individuals who traditionally remained
outside of the sphere of access.&amp;nbsp; In the same vein, if ICT is favored for use in criminal rather than civil courts,
technology may simply become a tool used to sentence people, more quickly.&amp;nbsp; This scenario sits quite polemic to visions of technology&amp;nbsp; serving as a tool to empower individuals to better assert their rights and seek justice.
 Foreshadowing the role ICT may play in the future of India's judicial reform process, SPANCO Technologies is currently piloting the use of
video technology in criminal courts.&amp;nbsp; Furthermore, &lt;a class="sdfootnoteanc" name="sdfootnote7anc" href="#sdfootnote7sym"&gt;&lt;/a&gt;India's judiciary has made several attempts to insulate itself from
the provisions of the RTI act, indicating that new laws, and even new technologies, may not be able to change practice.&amp;nbsp; There are also strong doubts looming that the
Gramin Nyayalayas Act will be successful in leveraging the required
financial support needed to construct civil courts in rural
areas.&amp;nbsp; Without the basic building blocks, it is difficult to envision how a National
Judicial Technology Program will be successful in bringing "justice" to all who are awaiting it. &amp;nbsp; Such instances serve as a light warning that technology,
even within a favorable legal framework, may not necessarily spell a more accessible, transparent and accountable justice system.&lt;/p&gt;
&lt;p&gt;A well-functioning judicial system is required to keep up with the
demands of modern democratic society.&amp;nbsp; It is unquestionable that technology can play an influential role in ensuring that the relationship
between citizens and the government is strong and communicative. 
However, it is important to ask under what conditions may it be beneficial to implement technology’s
use.  Inferring from last week’s
seminar, proposals and rationale behind potential reforms were made
from an economic perspective; how ICT can be used to see that cases
are filed and judgments are delivered more quickly to improve efficiency and rationalize resources.&amp;nbsp; Whether 
technology will be appropriated to facilitate a more equitable
justice system is unknown, but it is certain that such will require a coherent national reform strategy with long-term political backing.&amp;nbsp; Short-shorted technological fixes may improve India's judicial efficiency in the short term, but may, however, overshadow opportunities to bring about a more transparent and accountable system in the long-term.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Notes&lt;/p&gt;
&lt;p&gt;1. This was a notion emphasized often throughout the seminar.&lt;/p&gt;
&lt;p&gt;2. Where these estimates were drawn is unknown.&lt;/p&gt;
&lt;p&gt;3. For a concise account of how the use of ICT may be misappropriated in the judicial reform process, see E-Justice: Towards a Strategic Use of ICT in Judicial Reform by Waleed H. Malik&lt;/p&gt;
&lt;p&gt;4. For an interesting account of India's judicial system, see "The Rise of Judicial Sovereignty" by Pratap Bhanu Mehta in "The State of India's Democracy", Oxford University Press, 2009.&lt;/p&gt;
&lt;p&gt;5. Pratap Bhanu Mehta.&lt;/p&gt;
&lt;p&gt;6. Ibid.&lt;/p&gt;
&lt;h1 class="western"&gt;&lt;/h1&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/what-will-be-the-role-of-ict-in-indias-judical-reform-process'&gt;https://cis-india.org/internet-governance/blog/what-will-be-the-role-of-ict-in-indias-judical-reform-process&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>e-governance</dc:subject>
    

   <dc:date>2011-08-02T07:17:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online">
    <title>Does the Safe-Harbor Program Adequately Address Third Parties Online?</title>
    <link>https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online</link>
    <description>
        &lt;b&gt;While many citizens outside of the US and EU benefit from the data privacy provisions the Safe Harbor Program, it remains unclear how successfully the program can govern privacy practices when third-parties continue to gain more rights over personal data.  Using Facebook as a site of analysis, I will attempt to shed light on the deficiencies of the framework for addressing the complexity of data flows in the online ecosystem. &lt;/b&gt;
        
&lt;p&gt;To date, the EU-US Safe Harbor Program leads in governing
the complex and multi-directional flows of personal information online. &amp;nbsp;&amp;nbsp;As commerce began to thrive in the online
context, the European Union was faced with the challenge of ensuring that personal
information exchanged through online services were granted
levels of protect on par with provisions set out in EU privacy law.&amp;nbsp; This was important, notably as the piecemeal
and sectoral approach to privacy legislation in the United states was deemed incompatible
with the EU approach.&amp;nbsp; While the Safe
Harbor program did not aim to protect the privacy of citizens outside of the
European Union per say, the program has in practice set minimum standards for
online data privacy due to the international success of American online
services.&lt;/p&gt;

&lt;p&gt;While many citizens outside of the US and EU benefit from
the Safe Harbor Program, it remains unclear how successful the program will be in an
online ecosystem where third-parties are being granted increasingly more rights
over the data they receive from first parties.&amp;nbsp;
Using Facebook as a site of analysis, I will attempt to shed light on
the deficiencies of the framework for addressing the complexity of data flows
in the online ecosystem.&amp;nbsp; First, I will argue
that the safe harbor program does not do enough to ensure that participants are
held reasonably responsible third party privacy practices.&amp;nbsp; Second, I will argue that the information
asymmetries created between first party sites, citizens, and governance bodies
vis-à-vis third parties obscures the application of the Safe Harbor Model.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The EU-US
Safe-Harbor Agreement&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In 1995, and based on earlier &lt;a href="http://www.oecd.org/document/18/0,3343,en_2649_34255_1815186_1_1_1_1,00.html"&gt;OECD
guidelines&lt;/a&gt;, the EU Data Directive on the “protection of individuals with
regard to the processing of personal data and the free movement of such data”
was passed&lt;a name="_ednref1" href="#_edn1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [1].&amp;nbsp; The original purpose of the EU Privacy
Directive was not only to increase privacy protection within the European
Union, but to also promote trade liberalization and a single integrated market
in the EU.&amp;nbsp; After the Data Directive was
passed, each member state of the EU incorporated the principles of
the directive into national laws accordingly.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While the Directive was successful in harmonizing data
privacy in the European Union, it also embodied extraterritorial
provisions, giving in reach&lt;a name="_ednref2" href="#_edn2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; beyond the EU.&amp;nbsp; Article 25 of the Directive states that the
EU commission may ban data transfers to third countries that do not ensure “an
adequate level of protect’ of data privacy rights&lt;a name="_ednref3" href="#_edn3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [2].&amp;nbsp; Also, Article 26 of the Directive, expanding
on Article 25, states that personal data cannot be &lt;em&gt;transferred &lt;/em&gt;to a country that “does not ensure an adequate level of
protection” if the data controller does not enter into a contract that adduces
adequate privacy safeguards&lt;a name="_ednref4" href="#_edn4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [3].
&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In light of the increased occurrence of cross-border
information flows, the Data Directive itself was not effective enough to ensure that
privacy principles were enforced outside of the EU.&amp;nbsp; Articles 25 and 26 of the Directive had essentially deemed all cross-border data-flows to the US in contravention of EU privacy law.&amp;nbsp; Therefor, the EU-US Safe-Harbor was established by the
EU Council and the US Department of Commerce as a way of mending the variant
levels of privacy protection set out in these jurisdictions, while also promoting
online commerce.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Social Networking
Sites and the Safe-Harbor Principles&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The case of social networking sites exemplifies the ease
with which data is transferred, processed, and stored between jurisdictionas.&amp;nbsp; While many of the top social networking sites
are registered American entities, they continue to attract users not only from
the EU, but also internationally.&amp;nbsp; In agreement
to the EU law, many social networking sites, including LinkedIn, Facebook,
Myspace, and Bebo, now adhere to the principles of the program.&amp;nbsp; The enforcement of the Safe Harbor takes
place in the United States in accordance with U.S. law and relies, to a great
degree, on enforcement by the private sector.&amp;nbsp;
TRUSTe, an independent certification program and dispute mechanism, has become the most popular governance mechanism for the safe harbor program
among social networking sites.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Drawing broadly on the principles embodied within the EU
Data Directive and the OECD Guidelines, the seven principles of the Safe-Harbor
were developed.&amp;nbsp; These principles include
Notice, Choice, Onward Transfer, Access and Accuracy, Security, Data Integrity
and Enforcement.&amp;nbsp;&amp;nbsp; The principle of “Notice”
sets out that organizations must inform individuals about the purposes for
which it collects and uses information about them, how to contact the
organization with any inquiries or complaints, the types of third parties to
which it disclosures the information, and the choices and means the organization
offers individuals for limiting its use and disclosure.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;“Choice” ensures that individuals have the opportunity to
choose to opt out whether their personal information is disclosed to a third
party, and to ensure that information is not used for purposes incompatible with the purposes for
which it was originally collected.&amp;nbsp; The
“Onward Transfer” principle ensures that third parties receiving information
subscribes to the Safe Harbor principles, is subject to the Directive, or
enters into a written agreement which requires that the third party provide at
least the same level of privacy protection as is requires by the relevant
principles.&lt;/p&gt;
&lt;p&gt;The principles of “Security” and “Data Integrity” seek to
ensure that reasonable precautions are taken to protect the loss or misuse of
data, and that information is not used in a manner which is incompatible with
the purposes for it is has been collected—minimizing the risk that personal
information would be misused or abused.&amp;nbsp;&amp;nbsp;&amp;nbsp;
Individuals are also granted the right, through the access principle, to
view the personal information about them that an organization holds, and to
ensure that it is up-to-date and accurate.&amp;nbsp;
The “Enforcement” principle works to ensure that an effective mechanism
for assuring compliance with the principles, and that there are consequences
for the organization when the principles are not followed.&lt;/p&gt;
&lt;p&gt;The principles of the program are rather quite clear and
enforceable in the first party context, despite some prevailing ambiguities.&amp;nbsp; The privacy policies of most social
networking services have become increasingly clear and straightforward since
their inception.&amp;nbsp; Facebook, for example,
has revamped its &lt;a href="http://www.facebook.com/privacy/explanation.php"&gt;privacy
regime&lt;/a&gt; several times, and gives explicit notice to users how their
information is being used.&amp;nbsp; The privacy
policy also explains the relationship between third parties and your personal information—including
how it may be used by advertisers, search engines, and fellow members.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;With respect to third party advertisers, principles of
“choice” are clearly granted by most social networking services.&amp;nbsp; For example, the &lt;a href="http://www.networkadvertising.org/"&gt;Network Advertising Initiative&lt;/a&gt;, a
self-regulatory initiative of the online advertising industry, clearly lists
its member websites and allows individuals to opt out of any targeted
advertising conducted by its members.&amp;nbsp; In
Facebook’s description of “cookies” in their privacy policy, a direct link to NAI’s
opt out features is given, allowing individuals to make somewhat informed
choices about their participation in such programs.&amp;nbsp; This point is, of course, in light of the
fact that most users do not read or understand the privacy policies provided by
social networking sites&lt;a name="_ednref5" href="#_edn5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [4].
It is also important to note that Google—a major player in the online
advertising business, does not grant users of Buzz and Orkut the same “opt-out”
options as sites such as Facebook and Bebo.&lt;/p&gt;
&lt;p&gt;Under the auspices of the US Federal Trade Commission, the
Safe Harbor Program has also successfully investigated and settled several
privacy-related breaches which have taken place on social networking sites.&amp;nbsp; Of the most famous cases is &lt;a href="http://www.beaconclasssettlement.com/"&gt;Lane et al. v. Facebook et al.&lt;/a&gt;,
which was a class action suit brought against Facebook’s Beacon Advertising
program.&amp;nbsp; The US Federal Trade Commission
was quick to insight an investigation of the program after many privacy groups
and individuals became critical of its questionable advertising practices.&amp;nbsp; The Beacon program was designed to allow
Facebook users to share information with their friends about actions taken on
affiliated, third party sites.&amp;nbsp; This had included,
for example, the movie rentals a user had made through the Blockbuster website.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Plaintiffs filed a suit, alleging that Facebook and its
affiliates did not give users adequate notice and choice about Beacon and the
collection and use of users’ personal information. &amp;nbsp;&amp;nbsp;&amp;nbsp;The Beacon program was ultimately found to
be in breach of US law, including the &lt;a href="http://epic.org/privacy/vppa/"&gt;Video
Privacy Protection Act&lt;/a&gt;, which bans the disclosure of personally identifiable
rental information.&amp;nbsp; Facebook has
announced the settlement of the lawsuit, not bringing individual settlements,
but a marked end to the program and the development of a 9.5 million dollar &lt;a href="http://www.p2pnet.net/story/37119"&gt;Facebook Privacy Fund&lt;/a&gt; dedicated to
privacy and data-related issues.&amp;nbsp; Other privacy
related investigations of social networking sites launched by the FTC under the
Safe Harbor Program include Facebook’s &lt;a href="http://www.eff.org/deeplinks/2009/12/facebooks-new-privacy-changes-good-bad-and-ugly"&gt;privacy
changes&lt;/a&gt; in late 2009, and the Google’s recently released &lt;a href="http://www.networkworld.com/news/2010/032910-lawmakers-ask-for-ftc-investigation.html"&gt;Buzz
application&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Despite the headway the Safe Harbor is making, many privacy
related questions remain ambiguous with respect to the responsibilities social networking
sites through the program.&amp;nbsp; For example,
Bebo &lt;a href="http://www.bebo.com/Privacy2.jsp"&gt;reserves the right&lt;/a&gt; to
supplement a social profile with addition information collected from publicly
available information and information from other companies.&amp;nbsp; Bebo’s does adhere to the “notice principle”—as
it makes know to users how their information will be used through their privacy
policy. However, it remains unclear if appropriate disclosures are given by Bebo
as required by Safe Harbor Framework, notably as the sources of “publicly
available information” as a concept remains broad and obscured in the privacy policy.&amp;nbsp; It is also unclear whether or not Bebo users
are able to, under the “Choice” principle, refuse to having their profiles from
being supplemented by other information sources.&amp;nbsp; Also, under the “access
principle”, do individuals have the right to review all information held about them as “Bebo
users”?&amp;nbsp; The right to review information
held by a social networking site is an important one that should be upheld.&amp;nbsp; This is most notable as supplementary information
from outside social networking services is employed &amp;nbsp;to profile individual users in ways which may
work to categorize individuals in undesirable ways.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;The Third Party Problem&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Cooperation between social networking sites and the Safe
Harbor has improved, and most of these sites now have privacy policies which
explicitly address the principles of the Program.&amp;nbsp;&amp;nbsp; It should also be noted that public interest
groups, such as Epic, the Center for Digital Democracy, and The Electronic
Frontier Foundation, have played a key role in ensuring that data privacy
breaches are brought to the attention of the FTC under the program.&amp;nbsp; While the program has somewhat adequately
addressed the privacy practices of first party participants, the number of
third parties on social networking sites calls into question the
comprehensiveness and effectiveness of the Safe Harbor program.&amp;nbsp; Facebook itself as a first party site may adhere
to the Safe Harbor Program.&amp;nbsp; However, its
growing number third party platform members may not always adhere to best practices
in the field, nor can Facebook or the Safe Harbor Program guarantee that they
do so.&lt;/p&gt;
&lt;p&gt;The Safe Harbor Program does require that all participants
take certain security measures when transferring data to a third party.&amp;nbsp; Third parties must either subscribe to the
safe harbor principles, or be subject to the EU Data Directive.&amp;nbsp; Alternatively, an organization can may also
enter into a written agreement with a third party requiring that they provide
at least the same level of privacy protection as is required by program
principles.&amp;nbsp; Therefore, third parties of
participating program sites are, de facto, bound by the safe harbor principles by
the way of entering into agreement with a first party participant of the
program. &amp;nbsp;This is the approach taken by
most social networking sites and their third parties.&lt;/p&gt;
&lt;p&gt;It is important to note, however, that third parties are not
governed directly by the regulatory bodies, such as the FTC.&amp;nbsp; The safe harbor website also &lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018476.asp"&gt;explicitly notes&lt;/a&gt;
that the program does not apply to third parties.&amp;nbsp; Therefore, as per these provisions, Facebook must
adhere to the principles of the program, while its third party platform members
(such as social gaming companies), only must do so indirectly as per a separate
contract with Facebook.&amp;nbsp; The
effectiveness of this indirect mode of governing of third party privacy
practices is questionable for numerous reasons.&lt;/p&gt;
&lt;p&gt;Firstly, while Facebook does take steps to ensure that
third parties use information from Facebook in a manner which is consistent to
the safe harbor principles, the company explicitly &lt;a href="http://www.facebook.com/policy.php"&gt;waives any guarantee&lt;/a&gt; that third
parties will “follow their rules”. &amp;nbsp;&amp;nbsp;Prior to allowing third parties to access any
information about users, Facebook requires third parties to &lt;a href="http://www.facebook.com/terms.php"&gt;agree to terms&lt;/a&gt; that limit their
use of information, and also use technical measures to ensure that they only
obtain authorized information.&amp;nbsp;&amp;nbsp; Facebook
also warns users to “always review the policies of third party applications and
websites to make sure you are comfortable with the ways in which they use
information”.&amp;nbsp; Not only are users
required to read the privacy policies of every third party application, but are
also expected to report applications which may be in violation of privacy
principles.&amp;nbsp; In this sense, Facebook not
only waives responsibility for third party privacy breaches, but also places further
regulatory onus upon the user.&lt;/p&gt;
&lt;p&gt;As the program guidelines express, the safe harbor relies to
a great degree on enforcement by the private sector.&amp;nbsp; However, it is likely that a self-regulatory
framework may lead the industry into a state of regulatory malaise.&amp;nbsp; Under the safe harbor program, Facebook must
ensure that the privacy practices of third parties are adequate.&amp;nbsp; However, at the same time, the company may
simultaneously waiver their responsibility for third party compliance with safe
harbor principles.&amp;nbsp; Therefore, it remains
questionable as to where responsibility for third parties exactly lies.&amp;nbsp; When third parties are not directly
answerable to the governing bodies of safe harbor program, and when first parties
can to waive responsibility for their practices, from where does the incentive to
effectively regulate third parties to come from?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;While Facbeook may in fact take reasonable legal and technical
measures to ensure third party compliance, the room for potential dissonance
between speech and deed&amp;nbsp; is worrisome.&amp;nbsp; Facebook is required to ensure that third
parties provide “&lt;a href="http://www.export.gov/safeharbor/eu/eg_main_018476.asp"&gt;at least the same
level of privacy protection&lt;/a&gt;” as they do.&amp;nbsp;
However, in practice, this has yet to become the case.&amp;nbsp; A quick survey of twelve of the most popular
Platform Applications in the gaming category showed&lt;a name="_ednref6" href="#_edn6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;
that third parties are not granting their users the “same level of privacy
protection”[5].&amp;nbsp; For example, section 9.2.3
of Facebooks “&lt;a href="http://www.facebook.com/terms.php"&gt;Rights and
Responsibilities&lt;/a&gt;” for Developers/Operators of applications/sites states
that they must “have a privacy policy or otherwise make it clear to users what
user data you are going to use and how you will use, display, or share that
data”.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;However, out of the 12 gaming applications surveyed, four
companies failed to make privacy policies available to users &lt;em&gt;before&lt;/em&gt; they granted the application
access to the personal information, including that of their friends&lt;a name="_ednref7" href="#_edn7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [6].&amp;nbsp; After searching for the privacy policies on
the websites of each of the four social gaming companies, two completely failed
to post privacy policies on their central websites. &amp;nbsp;&amp;nbsp;This practice is in direct breach of the
contract made between these companies and Facebook, as mentioned above.&amp;nbsp; In addition to many applications failing to clearly
post privacy policies, many of provisions set out in these policies were
questionable vis-à-vis safe harbor principles.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For example Zynga, makes of popular games Mafia Wars and
Farmville, reserve the right to “maintain copies of your content
indefinitely”.&amp;nbsp; This practice remains contrary
to Safe Harbor principles which states that information should not be kept for
longer than required to run a service.&amp;nbsp;
Electronic Arts also maintains similar provisions for data retention in
its privacy policy.&amp;nbsp;&amp;nbsp; Such practices are
rather worrisome also in light of the fact that both companies also reserve the
right to collect information on users from other sources to supplement profiles
held.&amp;nbsp; This includes (but is not limited
to) newspapers and Internet sources such as blogs, instant messaging services, and
other games.&amp;nbsp;&amp;nbsp; It is also notable to
mention that only one of the twelve social gaming companies surveyed directly
participates in the safe harbor program.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In addition to the difficulties of ensuring that safe harbor
principles are adhered to by third parties, the information asymmetries which
exist between first party sites, citizens, and governance bodies vis-à-vis
third parties complicate this model.&amp;nbsp; Foremost,
it is clear that Facebook, despite its resources, cannot keep tabs on the
practices of all of their applications.&amp;nbsp;&amp;nbsp;
This puts into question if industry self-regulation can really guarantee
that privacy is respected by third parties in this context.&amp;nbsp; Furthermore, the lack of knowledge or
understanding held by citizens about how third parties user their information
is particularly problematic when a system relies so heavily on users to report
suspected privacy breaches.&amp;nbsp; The same is
likely to be true for governments, too.&amp;nbsp; As
one legal scholar, promoting a more laisse-fair approach to third party
regulation, notes—multiple and invisible third party relationships presents
challenges to traditional forms of legal regulation&lt;a name="_ednref8" href="#_edn8"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt; [7].&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In an “open “social ecosystem, the sheer volume of data
flows between users of social networking sites and third party players appears
to have become increasingly difficult to effectively regulate.&amp;nbsp; While the safe harbor program has been
successful in establishing best practices and minimum standards for data
privacy, it is also clear that governance bodies, and public interest groups,
have focused most attention on large industry players such as Facebook.&amp;nbsp; This has left smaller third party players on
social networking sites in the shadows of any substantive regulatory concern.&amp;nbsp; &amp;nbsp;&amp;nbsp;If
one this has become clear, it is the fact that governments may no longer be
able to effectively govern the flows of data in the burgeoning context of “open
data”.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As I have demonstrated, it remains questionable whether or
not Facebook can regulate third parties data collection practices
effectively.&amp;nbsp; Imposing more stringent
responsibilities on safe harbor participants could be a positive step.&amp;nbsp; It is reasonable to assume that it would be
undue to impose liability on social networking sites for the data breaches of
third parties.&amp;nbsp; However, it is not
unreasonable to require sites like Facebook go beyond setting “minimum
standards” for data privacy, towards taking a more active enforcement, if even
through TRUSTe or another regulatory body.&amp;nbsp;
If the safe harbor is to be effective, it cannot allow program participants
to simply wave the liability for third party privacy practices.&amp;nbsp; The indemnity granted to third parties on social
networking sites may deem the safe harbor program more effective in sustaining
the non-liability of third parties, rather than protecting the data privacy of
citizens.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;hr align="left" size="1" width="33%" /&gt;

&lt;/div&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn1" href="#_ednref1"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[1] Official Directive 95/46/EC&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn2" href="#_ednref2"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn3" href="#_ednref3"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[2] 95/46/EC&lt;/p&gt;
&lt;p class="discreet"&gt;[3] Ibid&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn4" href="#_ednref4"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;a name="_edn5" href="#_ednref5"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/a&gt;[4] See Acquisit,
A. a. (n.d.). Imagined Communities: Awareness, Information Sharing, and Privacy
on Facebook. &lt;em&gt;PET 2006&lt;/em&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn6" href="#_ednref6"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[5] Of the Privacy Policy browsed include, Zynga, Rock
You!, Crowdstar, Mind Jolt, Electronic Arts, Pop Cap Games, Slash Key, Playdom,
Meteor Games, Broken Bulb Studios, Wooga, and American Global Network.&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="_edn7" href="#_ednref7"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;span class="MsoEndnoteReference"&gt;&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;[6] By adding an application, users are also sharing with
third parties the information of their friends if they do not specifically &amp;nbsp;opt out of this practice.&lt;/p&gt;
&lt;p class="discreet"&gt;[7]See&lt;strong&gt;
&lt;/strong&gt;&amp;nbsp;Milina, S. (2003).
Let the Market Do its Job: Advocating an Integrated Laissez-Faire Approach to
Online Profiling. &lt;em&gt;Cardozo Arts and Entertainment Law Journal&lt;/em&gt; .&lt;/p&gt;
&lt;pre&gt;&lt;/pre&gt;
&lt;div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;&amp;nbsp;&lt;/h2&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online'&gt;https://cis-india.org/internet-governance/blog/does-the-safe-harbor-program-adequately-address-third-parties-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rebecca</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    

   <dc:date>2011-08-02T07:19:34Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
