<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 31 to 45.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy-highlights-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/files/analysis-of-cloud-act-and-implications-for-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-suresh-ramasubramanian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/interview-with-anne-cavoukian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy-vs-leaked-2014-privacy-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/epw-web-exclusives-oct-27-2012-elonnai-hickok-rethinking-dna-profiling-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/interview-with-jacob-kohnstamm"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/yahoo-october-23-2013-what-india-can-learn-from-snowden-revelations"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/privacy-highlights-in-india">
    <title>2012: Privacy Highlights in India</title>
    <link>https://cis-india.org/internet-governance/privacy-highlights-in-india</link>
    <description>
        &lt;b&gt;In this blog post, Elonnai Hickok summarizes the top privacy moments of 2012 in India. In doing so she lists out the major ones like the Report of Group of Experts on Privacy, the RIM Standoff, the Nira Radia controversy, the Centralized Monitoring System, Unmanned Aerial Vehicles, NATGRID, CCTNS, the growth of CCTVs, the leaked DNA Profiling Bill, and the UID project.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;The Report of Group of Experts on Privacy:&lt;/b&gt; In October 2012 the "Report of Group of Experts on Privacy" was published by a governmental committee chaired by Justice A.P. Shah. The report contains recommendations for comprehensive privacy legislation, including defining nine privacy principles, establishing a regulatory framework consisting of privacy commissioners at the regional and central level, and self regulatory organizations, and analyzing the present challenges to privacy in India.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before the report was published, two draft privacy bills had been leaked to the public, and a concept paper drafted in 2010. The report received mixed reviews from the media, including questions about the relationship between the Right to Information and the Right to Privacy. Before the publishing of the Report, Prime Minister Manmohan Singh recognized that disclosures under the RTI Act could, in some instances, violate individual privacy. In a statement to the public, the Prime Minister stated &lt;i&gt;"citizens&lt;ins cite="mailto:Author" datetime="2012-11-16T15:34"&gt;’&lt;/ins&gt; right to know should definitely be circumscribed if disclosure of information encroaches upon someone's personal privacy.  But where to draw the line is a complicated question"&lt;/i&gt;.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three months before the report was published, the EU had publicly stated that current data protection provisions in India are not sufficient enough, and that India is not considered to be 'data secure'.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; If the recommendations in the report are turned into legislation, among other things, individuals in India will have a right to privacy and a right to redress for violations of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Governmental Interception&lt;/b&gt;: In early 2013 it was revealed that the Ministry of Home Affairs ordered interception of 10,000 phones and 1300 email ids during October 2012 to December 2012.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; Continuing its efforts to access all communications, in May 2012, the Government of India gave service providers a month to develop a method for intercepting calls using VoIP services.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; In February 2012 the Telecom Department proposed a new set of security guidelines that would allow for real time interception of communications and the tracking of the location of users. Among other things, the proposal establishes telecom security assurance and testing labs for the purpose of testing and certifying telecom equipment.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Additionally, in October of 2012, Bharti Airtel refused to wiretap telephones for RAW. The Department of Telecommunications eventually ordered Bharti Airtel to comply with the order, which they did.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; The events around interception in 2012 show that the Indian government is still trying to gain access to as much information as possible. The constant push for real time access by the government is concerning, as many safeguards are missing from the Indian interception regime such as, penalty to security agencies for unauthorized interception and avenues of redress for the individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The RIM Standoff&lt;/b&gt;: Since 2008, the Indian government has been negotiating with RIM access to BlackBerry communications. Over the years, a number of solutions have been proposed by RIM and the GoI, yet a final agreement was never reached. Continuing the negotiations, In October 2012, RIM agreed to set up a server in Mumbai, which would allow security agencies to access Blackberry Messenger services.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; Blackberry also provided a solution that would allow access to Blackberry Internet Services.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; Following this, the Government of India mandated that Telecom Service Providers must incorporate the Blackberry interception solution, or risk being forced to shut their service by December 31, 2012. In compliance with this order, many service providers have set time frames for incorporation of the interception solution including and installed the necessary software.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; It is important to note that the lawful access solutions provided do not extend to the Blackberry Enterprise Server.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; Though it seems that the BlackBerry controversy might be resolved, the solution does not appear to be a long term solution, as BES communications are still not accessible, and the solution is not universal for all international providers. Thus, the Indian government will have to negotiate individually with each provider and service that they currently cannot access communications of.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Nira Radia Controversy:&lt;/b&gt; Continuing the Nira Radia controversy, which began in 2008-2009, in September 2012 the Supreme Court ordered the Income Tax Department to transcribe the 5,831 recorded conversations that were originally intercepted by the department. In January this year, the Supreme Court of India ordered that a "random check" be run through the Radia Tapes to check for instances of possible criminality.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; This case has become an important moment for privacy in India, as it intersects the dilemma between the right to privacy and public interest. Since 2010, Ratan Tata has been claiming that his right to privacy was violated by the publishing of the leaked tapes.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; The Supreme Court’s final decision will be important for drawing another contour of how the right to privacy is shaped in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Centralized Monitoring System&lt;/b&gt;: In 2012 the Telecom Ministry set aside Rs. 400 crore for the Central Monitoring System, which is projected to be finished by August 2014.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; The project, which first began in 2007, is envisioned to allow security agencies to bypass service providers and intercept communications on their own. The system is designed to have regional databases and a central database which will be accessible to law enforcement and security agencies. Privacy concerns related to the project include how the system will incorporate current legal regulations for interception in India, as a system that bypasses service providers essentially means that every communication can be read by law enforcement. Furthermore, it is not clear exactly who, and on what conditions will officials be allowed and authorized to access and use the system. The exact capabilities of the system have also not been identified. For example, will the CMS be able to intercept VoIP calls, will it be able to decrypt messages, and will it employ techniques such as Deep Packet Inspection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Unmanned Aerial Vehicles (UAVs):&lt;/b&gt; Since the late 90’s the Defense Research Development Organisation (DRDO) has been developing UAV’s for military purposes, and before this, India was acquiring UAV’s from Israel.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; Since that time there has been an increase in domestic companies and institutes developing UAVs, and an increase in the procurement of the technology by state police for generic reasons purposes as crowd control, traffic management, and security. For example, in August of 2012 the city of Mumbai used the UAV "Netra", as part of their security protocol during the Raj Thackeray rally to capture and send real time images back to the police. Netra is manufactured by the company Idea Forge.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; The Mumbai police also used the Netra in September 2012 after the Azad Maidan riots, and again on New Year’s Eve to monitor and track crime such as sexual harassment.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt; Similarly, Chennai city police are looking to procure from Anna University a UAV developed by the Madras Institute of Technology. The UAV will be used to assist in traffic monitoring and control.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; The increased procurement and use of UAV’s by state police is concerning as there is no clear legal regulation over the deployment of the vehicles. Thus, they have shifted from being used as a tool by the military, and are being used for monitoring traffic, crowd monitoring, etc. Furthermore, the process for authorization for use of the vehicles is not clear, and it is not clear how the captured information is protected and handled. Though UAV’s are clearly a useful tool for the military, for military purposes, the permitted use of them by other actors should be defined and regulated. The use of UAV’s for generic purposes could place individual privacy at risk, because of the amount of information and the level of detail that the vehicles are able to capture without the knowledge of the individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The National Intelligence Grid (NATGRID):&lt;/b&gt; Plans for the NATGRID project, which was first piloted after the Mumbai attacks, has been continuing forward through 2012 and is envisioned to be operational sometime in 2013. During 2012, a detailed project report was submitted for the project, and in June the government approved Rs. 1,100 crore for purchase of technological equipment.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; NATGRID is a project that envisions networking 21 databases for purposes of crime investigation including tax, health, and travel information. The information will be accessible to 11 security agencies and law enforcement agencies. Though it has been clarified that NATGRID will ensure that privacy is protected, the design of NATGRID is one that could create potential risks – as it brings together large amounts of personal data for easy access by security agencies. In doing so it could potentially eliminate the steps security agencies must take currently to access information – such as submitting a request and obtaining permission for access. Furthermore, it is unclear how current legal protections such as secrecy clauses in banking legislation will be incorporated and upheld by the NATGRID system. Other questions that the project raises include – though currently there are only eleven agencies listed that will have access to NATGRID – will this list expand? Without a policy in place how will this standard and other standards be enforced?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Crime and Criminal Tracking Network &amp;amp; System (CCTNS): &lt;/b&gt;Though the CCTNS project has been in the works since 2009, a call for companies to develop the technology for the system was taken in early 2012, and pilot projects were launched later that year. The CCTNS is being headed by the National Crime Records Bureau, and will allow for the sharing of crime related information on a national level, in real time. In 2012, the system was allocated 2,000 crores by the government, and currently 2,000 police stations and other offices have been connected under the system.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, police in Chhattisgarh,&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; Uttarakhand&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt; and Odisha have all been connected to the CCTNS system.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt; Though it will be beneficial for the police to have access to a networked system, it has not been made clear yet what type of security system the project will adopt to ensure that the information is not compromised or accessed without authorization. It has also not been clarified what information will be placed on the database, and will all records be accessible to any individual accessing the system. Because the project is still in pilot stages it is hard to tell if it could put individual privacy at risk. Hopefully, before the project is realized in its full, many of the details will be clarified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Growth of CCTVs:&lt;/b&gt; Throughout 2012 the use of CCTV’s has continued to grow across India. For example, the Maharashtra government has undertaken a "CCTV surveillance project" in which it is in the process of taking bids for.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt; The state of Karnataka is also planning on installing CCTV cameras in Bangalore and other major cities to help detect incidents of crime.&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt; While the Delhi Transport Department is contemplating installing CCTVs in buses,&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt; and the Indian Rail Authorities have also decided to install CCTVs throughout stations to increase security.&lt;a href="#fn27" name="fr27"&gt;[27]&lt;/a&gt; There still does not exist regulation of the use of CCTV cameras, thus it is unclear who can operate a CCTV camera, which departments of the government can mandate for the installation of CCTVs, if public notice must be given that a CCTV camera is in use, and who can access the footage from a CCTV.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Study on Privacy Perceptions&lt;/b&gt;: In a study that came out in December 2012 by Ponnurangam K, among other things, it was found that 75 per cent of participants never read the privacy policy on a website – including social networking sites, participants also thought that there was a privacy legislation in place in India, and that individuals in India are most concerned about financial privacy.&lt;a href="#fn28" name="fr28"&gt;[28]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The National Counter Terrorism Centre (NCTC):&lt;/b&gt; The NCTC was originally created in response to the Mumbai terror attacks, under the Unlawful Prevention Act, 1967. The NCTC was meant to be realized in 2012, but in March, plans for the Centre were put on hold, because of the controversial nature of the project.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt; The Centre was meant to bring Indian intelligence agencies under one umbrella, and analyze and store information related to terrorism. The proposed body has been highly controversial, as states object to the powers given to the Centre and see it as intruding on their powers and jurisdiction. If passed, the NCTC will have the powers of arrest, search and seizure, and the ability to access information from other intelligence agencies.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Leaked DNA Profiling Bill:&lt;/b&gt; In 2012, a version of the DNA Profiling Bill, originally drafted in 2007, was leaked to the public. The Bill is being piloted by the department of biotechnology, and seeks to establish DNA databases at the regional and central level for forensic purposes, yet the Bill does not establish strong protections for the privacy of DNA samples taken and important technical standards for ensuring that DNA samples are not misused or tampered with.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; What will happen to the Bill in 2013 is yet to be seen, but hopefully it will not be passed without the appropriate safeguards incorporated into its provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Unique Identification Project and the National Population Registrar:&lt;/b&gt; Throughout 2012, the UID has continued to carry out enrollments across the country, and sign MoU's with private sector companies for the adoption of the UID platform. Parallel to the UID project, the NPR project is also being implemented. The NPR seeks to provide every citizen of India with an identity that will be stored in an identity database maintained by the Registrar General and Census Commissioner of India.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; According to the NPR scheme, individuals who had already enrolled with the UID and given their biometrics would not need to re-submit their biometrics with the NPR. Yet, this has not been the case, and instead individuals are now being required to provide their biometrics for enrollment with the UID and the NPR.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy has been raised as a concern of the UID since the start of the project. For both the UID and the NPR now the transaction record will be stored by agencies, and whether it will be possible to track individuals across databases using their NPR or UID  identity?&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. The Report of Group of Experts on Privacy. See &lt;a class="external-link" href="http://bit.ly/VqzKtr"&gt;http://bit.ly/VqzKtr&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Tikku, A., "RTI doesn’t trample upon privacy, says expert panel", Hindustan Times, October 29, 2012, available at &lt;a class="external-link" href="http://bit.ly/TNAzRF"&gt;http://bit.ly/TNAzRF&lt;/a&gt;, last accessed on January 8, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Sen, A. India protests European Union study of data laws. Economic Times. July 9, 2012, available at &lt;a class="external-link" href="http://bit.ly/Y9ahHs"&gt;http://bit.ly/Y9ahHs&lt;/a&gt;, last accessed on January 8, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Harismran, J., Thomas, J. "Home Ministry ordered 10k wire taps in last 90 days, order tapping of 1300 email Ids", The Economic Times, January 3,&lt;sup&gt;&lt;/sup&gt; 2013, available at &lt;a class="external-link" href="http://bit.ly/TKk7yN"&gt;http://bit.ly/TKk7yN&lt;/a&gt;, last accessed on January 7th 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;].The Economic Times, "Provide solution to intercept VoIP within a month: Govt", May 6, 2012, available at &lt;a class="external-link" href="http://bit.ly/VQDQ4k"&gt;http://bit.ly/VQDQ4k&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. The Economic Times, "New policy for real time interception to security agencies", February 1, 2012, available at &lt;a class="external-link" href="http://bit.ly/11DrlvB"&gt;http://bit.ly/11DrlvB&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. The Economic Times, "RAW irked as Airtel keeps its request for phone tapping on hold", October 21, 2012, available at &lt;a class="external-link" href="http://bit.ly/12IujhF"&gt;http://bit.ly/12IujhF&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Reyes, D., "RIM installs BlackBerry server in Mumbai", CrackBerry, February 23, 2012, available at &lt;a class="external-link" href="http://bit.ly/yBQsSo"&gt;http://bit.ly/yBQsSo&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Economic Times, "DoT makes telecom operators fall in line on Blackberry issue", December 30, 2012, available at &lt;a class="external-link" href="http://bit.ly/1169ufn"&gt;http://bit.ly/1169ufn&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Economic Times, "MTNL, BSNL fail to give dates for Blackberry interception", October 29, 2012, available at &lt;a class="external-link" href="http://bit.ly/1169ufp"&gt;http://bit.ly/1169ufp&lt;/a&gt;, last accessed on January 7, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The Economic Times, "Telecom companies agreed to provide real-time intercept facilities for BlackBerry smartphones", December 31, 2012, available at &lt;a class="external-link" href="http://bit.ly/Y9gjYt"&gt;http://bit.ly/Y9gjYt&lt;/a&gt;, last accessed on January 7, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Mahapatra, D., "SC to examine Radia tapes for criminality", Times of India, January 9, &lt;sup&gt;&lt;/sup&gt; 2013, available at &lt;a class="external-link" href="http://bit.ly/VD7eWX"&gt;http://bit.ly/VD7eWX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Times of India, "Ratan Tata softens stand on Radia tapes", August 23, 2012, available at &lt;a class="external-link" href="http://bit.ly/158CZxl"&gt;http://bit.ly/158CZxl&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. The Economic Times, "Govt. to place phone tapping system worth Rs. 400 cr by 2014", March 21, 2012, available at &lt;a class="external-link" href="http://bit.ly/V2P9q6"&gt;http://bit.ly/V2P9q6&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Monsonis, G., "UAVs gaining currency with Indian Armed Forces", Indian Defence Review, October 30, 2012, available at &lt;a class="external-link" href="http://bit.ly/KVYyIr"&gt;http://bit.ly/KVYyIr&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Mumbai Mirror, "Raj Thackeray’s mega rally: Unmanned Aerial Vehicle kept an eye on Azed Maidan", Economic Times, August 22, 2012, available at &lt;a class="external-link" href="http://bit.ly/PYTGAG"&gt;http://bit.ly/PYTGAG&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;].Ali, A. &amp;amp; Narayan. V., "Netra cameras to keep a close watch , over New Year’s Eve hotspots", Times of India, December 31, 2012, available at &lt;a class="external-link" href="http://bit.ly/Z7orxt"&gt;http://bit.ly/Z7orxt&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Venugopal, V., "It flies, it swoops, it records and monitors", The Hindu, December 20, 2012, available at &lt;a class="external-link" href="http://bit.ly/V89sLo"&gt;http://bit.ly/V89sLo&lt;/a&gt;, last accessed January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. The Economic Times, "Cabinet Committee on Security approves Rs. 1,100 crore for NATGRID", June 14, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Mohan, V., "Centre launches pilot project to track criminals", The Times of India, January 5, 2013, available at &lt;a class="external-link" href="http://bit.ly/UPk2fh"&gt;http://bit.ly/UPk2fh&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. The Pioneer, "Civil Lines Police Station gets connected with CCTNS", January 2012, available at &lt;a class="external-link" href="http://bit.ly/VRXKGJ"&gt;http://bit.ly/VRXKGJ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. CIOL Bureau, "CCTNS to be made public through internet: Dehradun DGP", January 4, 2012, available at &lt;a class="external-link" href="http://bit.ly/X4JISx"&gt;http://bit.ly/X4JISx&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. The Hindu, "Odisha to launch CCTNS on January 12", January 7, 2013, available at &lt;a class="external-link" href="http://bit.ly/Vd9Ay1"&gt;http://bit.ly/Vd9Ay1&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Padmakshan, M., "Maharashtra plans to invite new bids for CCTV surveillance project", September 18, 2012, available at &lt;a class="external-link" href="http://bit.ly/VRYrQm"&gt;http://bit.ly/VRYrQm&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Ashoka, R., "Karnataka to install CCTV cameras in Bangalore, major cities", Economic Times. July 26, 2012, available at &lt;a class="external-link" href="http://bit.ly/11Dxt6Z"&gt;http://bit.ly/11Dxt6Z&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Economic Times, "Buses to come with CCTV cameras for safety of women: Delhi government", December 17, 2012, available at &lt;a class="external-link" href="http://bit.ly/158Gtjo"&gt;http://bit.ly/158Gtjo&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. Economic Times, "Railways to step by security apparatus at stations", February 15, 2012, available at &lt;a class="external-link" href="http://bit.ly/11DxSX8"&gt;http://bit.ly/11DxSX8&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Times of India, "Most Indians ignorant about privacy issues on Facebook, Twitter: Study", December 10, 2012, available at &lt;a class="external-link" href="http://bit.ly/X4KVt1"&gt;http://bit.ly/X4KVt1&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Kumar, H., "Does India Need a National Counter Terrorism Center?", The New York Times, India Ink, February 28, 2012, available at &lt;a class="external-link" href="http://nyti.ms/A5VU5P"&gt;http://nyti.ms/A5VU5P&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Times of India. CM to attend National Counter- Terrorism Centre Meet in Delhi. May 4, 2012, available at &lt;a class="external-link" href="http://bit.ly/12IDoH9"&gt;http://bit.ly/12IDoH9&lt;/a&gt;, last accessed on January 8, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Hickok, E., "Rethinking DNA Profiling in India", Economic Political Weekly, October 27, 2012, available at &lt;a class="external-link" href="http://bit.ly/TUrH7j"&gt;http://bit.ly/TUrH7j&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. Department of Information Technology, "National Population Register", available at &lt;a class="external-link" href="http://bit.ly/12rzyOh"&gt;http://bit.ly/12rzyOh&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. Pandit, A., "NPR must even if you have Aadhar number", Times of India, October 31, 2012, available at &lt;a class="external-link" href="http://bit.ly/Y9oXGq"&gt;http://bit.ly/Y9oXGq&lt;/a&gt;, last accessed on January 8, 2013.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy-highlights-in-india'&gt;https://cis-india.org/internet-governance/privacy-highlights-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-02-12T12:39:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications">
    <title>A Comparison of Indian Legislation to Draft International Principles on Surveillance of Communications</title>
    <link>https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications</link>
    <description>
        &lt;b&gt;This blog post is a comparison of the relevant Indian legislations allowing governmental access to communications and the Draft International Principles on Surveillance of Communications. The principles, first drafted in October 2012 and developed subsequently seeks to establish an international standard for surveillance of communications in the context of human rights. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is contributing feedback to the drafting of the principles. The principles are still in draft form and the most recent version along with the preamble to the principles can be accessed at: &lt;a class="external-link" href="http://necessaryandproportionate.net/"&gt;http://necessaryandproportionate.net/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The Principles:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt;&lt;b&gt;Principle - Legality&lt;/b&gt;&lt;b&gt;:&lt;/b&gt;&lt;i&gt; Any limitation to the right to privacy must be prescribed by law. Neither the Executive nor the Judiciary may adopt or implement a measure that interferes with the right to privacy without a previous act by the Legislature that results from a comprehensive and participatory process. Given the rate of technological change, laws enabling limitations on the right to privacy should be subject to periodic review by means of a participatory legislative or regulatory process. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In India there are two predominant legislations with subsequent Rules and Licenses that allow for access to communications by law enforcement and the government. Though the basic power of interception of communications are prescribed by law, the Rules and Licenses build off of these powers and create procedural requirements, and requirements for assistance.&lt;/p&gt;
&lt;li&gt;&lt;b&gt;The Indian Telegraph Act, 1885&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; &lt;i&gt;The Indian Telegraph Amendment Rules 2007: &lt;/i&gt;These&lt;i&gt; &lt;/i&gt;Rules are grounded in section 419A of the Indian Telegraph Act and establish procedures and safeguards for the interception of communications. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;License Agreement for Provision of Unified Access Services After Migration from CMTS (UASL)&lt;/i&gt;: This license is grounded in the Telegraph Act, and details what types of assistance service providers must provide to law enforcement and the government. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;License Agreement for Provision of Internet Services&lt;/i&gt;: This license is grounded in the Telegraph Act, and details what types of assistance service providers must provide to law enforcement and the government. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;The Information Technology Act, 2000&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Procedure and Safeguards for Interception, Monitoring, and Decryption of Information Rules 2009:&lt;/i&gt; These Rules were notified in 2009 and allow authorized governmental agencies to intercept, monitor, and decrypt information generated, transmitted, received, or stored in any computer resource. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Procedure and safeguard for Monitoring and Collecting Traffic Data or Information Rules 2009:&lt;/i&gt; These Rules were notified in 2009 and allow authorized agencies to monitor and collect traffic data or information that is generated, transmitted, received or stored in any computer resource.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2. &lt;/b&gt;&lt;b&gt;Principle - Legitimate Purpose&lt;/b&gt;:&lt;i&gt; Laws should only allow access to communications or communications metadata by authorized public authorities for investigative purposes and in pursuit of a legitimate purpose, consistent with a free and democratic society.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are no specific provisions requiring that access by law enforcement must be for a legitimate purpose and consistent with a free and democratic society. Instead, Indian legislation defines and lays out specific circumstances for which access would be allowed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Below are the circumstances for which access is allowed by each Act, Rule, and License:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;The TA Rules 2007&lt;/b&gt;: Interception is allowed in the following circumstances: &lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;On the occurrence of any public emergency&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;In the interest of the public safety&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;In the interests of the sovereignty and integrity of India&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The security of the state&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Friendly relations with foreign states&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Public order&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Preventing incitement to the commission of an offence&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules&lt;/b&gt;: Interception, monitoring, and decryption of communications is allowed in the following circumstances:&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;In the interest of the sovereignty or integrity of India, &lt;/li&gt;
&lt;li&gt;Defense of India&lt;/li&gt;
&lt;li&gt;Security of the state&lt;/li&gt;
&lt;li&gt;Friendly relations with foreign states&lt;/li&gt;
&lt;li&gt;Public order &lt;/li&gt;
&lt;li&gt;Preventing incitement to the commission of any cognizable offence relating to the above &lt;/li&gt;
&lt;li&gt;For investigation of any offence &lt;/li&gt;
&lt;/ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ITA Monitoring of Traffic Data Rules:&lt;/b&gt; Monitoring of traffic data and collection of information is allowed for the following purposes related to cyber security: &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Forecasting of imminent cyber incidents &lt;/li&gt;
&lt;li&gt;Monitoring network application with traffic data or information on computer resources &lt;/li&gt;
&lt;li&gt;Identification and determination of viruses or computer contaminant &lt;/li&gt;
&lt;li&gt;Tracking cyber security breaches or cyber security incidents &lt;/li&gt;
&lt;li&gt;Tracking computer resource breaching cyber security or spreading virus’s or computer contaminants &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Identifying or tracking of any person who has breached, or is suspected of having breached or being likely to breach cyber security. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Undertaking forensic of the concerned computer resource as a part of investigation or internal audit of information security practices in the computer resource.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accessing stored information for enforcement of any provisions of the laws relating to cyber security for the time being in force.&lt;/li&gt;
&lt;li&gt;Any other matter relating to cyber security. &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;b&gt;UASL License&lt;/b&gt;: Assistance must be provided to the government for the following reasons and times: &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Reasons defined in the Telegraph Act. &lt;b&gt;(Section 41.20 (xix))&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;National Security. &lt;b&gt;(Section 41.20 (xvii))&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To counteract espionage, subversive act, sabotage, or any other unlawful activity. (Section 41.1)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Trace nuisance, obnoxious or malicious calls, messages or communications transported through his/her equipment. &lt;b&gt;(Section 40.4)&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;In the interests of security. &lt;b&gt;(Section 41.7)&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;For security reasons. &lt;b&gt;(Section 41.20 (iii))&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;b&gt;ISP License: &lt;/b&gt;Assistance must be provided to the government for the following reasons and times:&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;To counteract espionage, subversive act, sabotage, or any other unlawful activity. &lt;b&gt;(Section 34.1)&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;In the interests of security. &lt;b&gt;(Section 34.4)&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;For security reasons. &lt;b&gt;(Section 34.28 (iii))&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Reasons defined in the Telegraph Act. &lt;b&gt;(Section 35.2)&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt;&lt;b&gt;Principle - Necessity&lt;/b&gt;: &lt;i&gt;Laws allowing access to communications or communications metadata by authorized public authorities should limit such access to that which is strictly and demonstrably necessary, in the sense that an overwhelmingly positive justification exists, and justifiable in a democratic society in order for the authority to pursue its legitimate purposes, and which the authority would otherwise be unable to pursue. The onus of establishing this justification, in judicial as well as in legislative processes, is on the government.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; Relevant Indian legislation do not contain provisions mandating that access to communications must be demonstrably necessary, and do not give details of the criteria that authorizing authorities should use to determine if a request is a valid or not. Relevant Indian legislation does require that all directions contain reasons for the direction. Additionally, excluding the ITA &lt;i&gt;Procedure and safeguard for Monitoring and Collecting Traffic Data or Information Rules&lt;/i&gt;, relevant Indian legislation requires that all other means for acquiring the information must be taken into consideration before a direction for access can be granted.&lt;/p&gt;
&lt;p&gt;Below are summaries of the relevant provisions:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;TA Rules 2007&lt;/b&gt;: Any order for interception issued by the competent authority must contain reasons for the direction &lt;b&gt;(Section 2).&lt;/b&gt; While issuing orders for direction, all other means for acquiring the information must be taken into consideration, and directions can only be issued if it is not possible to acquire the information by any other reasonable means &lt;b&gt;(Section 3).&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ITA Interception and Monitoring Rules: &lt;/b&gt;Any direction issued by the competent authority must contain reasons for such direction &lt;b&gt;(Section 7). &lt;/b&gt;The competent authority must consider the possibility of acquiring the necessary information by other means and the direction can be issued only when it is not possible to acquire the information any other reasonable means &lt;b&gt;(Section 8).&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ITA Traffic Monitoring Rules:&lt;/b&gt; Any direction issued by the competent authority must contain reasons for the direction &lt;b&gt;(Section 3(3)).&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;UASL &amp;amp; ISP License: &lt;/b&gt;As laid out in the Telegraph Act and subsequent Rules.&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;4. &lt;/b&gt;&lt;b&gt;&lt;i&gt;Principle - Adequacy&lt;/i&gt;&lt;/b&gt;&lt;i&gt;:&lt;/i&gt; &lt;i&gt;Public authorities should restrain themselves from adopting or implementing any measure of intrusion allowing access to communications or communications metadata that is not appropriate for fulfillment of the legitimate purpose that justified establishing that measure. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are provisions that require direction for access to be specific, but there are no provisions that specifically prohibit government agencies from collecting and accessing information that is not appropriate for fulfillment of the stated purpose of the direction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt;&lt;b&gt;Principle - Competent Authority&lt;/b&gt;: &lt;i&gt;Authorities capable of making determinations relating to communications or communications metadata must be competent and must act with independence and have adequate resources in exercising the functions assigned to them.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation it is required that directions for access to be authorized by "competent authorities". The most common authority for authorizing orders for access is the Secretary to the Government of India in the Ministry of Home Affairs, but authorization can also come from other officials depending on the circumstance. The fact that authorization for access to communications content is not from a judge has been a contested topic, as in many countries a judicial order is the minimum requirement for access to communication content.  It is unclear from the legislation if adequate resources are assigned to the competent authorities.&lt;/p&gt;
&lt;p&gt;Below are summaries of relevant provisions:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The TA Rules 2007&lt;/b&gt;: Under the Telegraph Act the authorizing authorities are:            
&lt;ul&gt;
&lt;li&gt;The Secretary to the Government of India in the Ministry of Home Affairs at the Central Level&lt;/li&gt;
&lt;li&gt;The Secretary to the State Government in charge of the Home Department in the case of the State Government. &lt;/li&gt;
&lt;li&gt;In unavoidable circumstances an order for interception may only be made by an officer not below the rank of a Joint Secretary to the Government of India who has been authorized by the Union Home Secretary or the State Secretary.&lt;/li&gt;
&lt;li&gt;In remote areas or for operational reasons where obtaining prior directions for interception is not feasible the head or the second senior most officer of the authorized security agency at the Central level and the officers authorized in this behalf and not below the rank of Inspector of General Police. &lt;b&gt;(Section 1(2))&lt;/b&gt;. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules: &lt;/b&gt;Under the ITA Rules related to the interception, monitoring, and decryption of communications, the competent authorities for authorizing directions are:            
&lt;ul&gt;
&lt;li&gt;The Secretary in the Ministry of Home Affairs in case of the Central Government.&lt;/li&gt;
&lt;li&gt;The Secretary in charge of the Home Department, in case of a State Government or Union Territory. &lt;/li&gt;
&lt;li&gt;In unavoidable circumstances any officer not below the rank of the Joint Secretary to the Government of India who has been authorized by the competent authority. &lt;/li&gt;
&lt;li&gt;In remote areas or for operational reasons where obtaining prior directions is not feasible, the head or the second senior most officer of the security and law enforcement agency at the Central level or the officer authorized and not below the rank of the inspector General of Police or an officer of equivalent rank at the State or Union territory level. &lt;b&gt;(Section 3)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Monitoring and Collecting Traffic Data Rules:&lt;/b&gt; Under the ITA Rules related to the monitoring and collecting of traffic data, the competent authorities who can issue and authorize directions are:           
&lt;ul&gt;
&lt;li&gt;The Secretary to the Government of Indian in the Department of Information Technology under the Ministry of Communications and Information Technology. &lt;b&gt;(Section 2(d))&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;An employee of an intermediary may complete the following if it is in relation to the services that he is providing including: accessing stored information from computer resource for the purpose of implementing information security practices in the computer resource, determining any security breaches, computer contaminant or computer virus, undertaking forensic of the concerned computer resource as a part of investigation or internal audit. Accessing or analyzing information from a computer resource for the purpose of tracing a computer resource or any person who has contravened or is suspected of having contravened or being likely to contravene any provisions of the Act that is likely to have an adverse impact on the services provided by the intermediary. &lt;b&gt;(Section 9 (2))&lt;/b&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;UASL &amp;amp; ISP License: &lt;/b&gt;As laid out in the Telegraph Act and subsequent Rules.&lt;b&gt; &lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt;&lt;b&gt;Principle - Proportionality&lt;/b&gt;:&lt;i&gt; Public authorities should only order the preservation and access to specifically identified, targeted communications or communications metadata on a case-by-case basis, under a specified legal basis. Competent authorities must ensure that all formal requirements are fulfilled and must determine the validity of each specific attempt to access or receive communications or communications metadata, and that each attempt is proportionate in relation to the specific purposes of the case at hand. Communications and communications metadata are inherently sensitive and their acquisition should be regarded as highly intrusive. As such, requests should &lt;b&gt;at a minimum&lt;/b&gt; establish a) that there is a very high degree of probability that a serious crime has been or will be committed; b) and that evidence of such a crime would be found by accessing the communications or communications metadata sought; c) other less invasive investigative techniques have been exhausted; and d) that a plan to ensure that the information collected will be only that information reasonably related to the crime and that any excess information collected will be promptly destroyed or returned. Neither the scope of information types, the number or type of persons whose information is sought, the amount of data sought, the retention of that data held by the authorities, nor the level of secrecy afforded to the request should go beyond what is demonstrably necessary to achieve a specific investigation. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation&lt;/b&gt;: In relevant Indian legislation there are no comprehensive provisions that ensure proportionality of the surveillance of communications but there are provisions that contribute to ensuring proportionality. These include provisions requiring: time frames for how long law enforcement can retain accessed and collected material, directions to be issued only after there are no other means for acquiring the information, requests to contain reasons for the order, the duration for which an order can remain in force to be limited, and requests to be for specified purpose based on a particular set of premises. All of these provisions are found in the Telegraph Rules issued in 2007 and the ITA &lt;i&gt;Procedures and Safeguards for Interception, Monitoring, and Decryption of Information Rules&lt;/i&gt;. None of these requirements are found in the UASL or ISP licenses, and many are missing from the ITA &lt;i&gt;Safeguards for Monitoring and Collecting Traffic Data or Information Rules&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the above are steps to ensuring proportionality, Indian legislation does not provide details of how the proportionality of requests would be measured as recommended by the principle. For example, it is not required that requests for access demonstrate that evidence of the crime would be found by accessing the communications or communications metadata sought, and that information only related directly to the crime will be collected. Furthermore, Indian legislation does not place restrictions on the amount of data sought, nor the level of secrecy afforded to the request.&lt;/p&gt;
&lt;p&gt;Below is a summary of the relevant provisions:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;TA Rules 2007: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Service providers shall destroy record pertaining to directions for interception of message within two months of discontinuing the interception. &lt;b&gt;(Section 19)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Directions for interception should only be issued only when it is not possible to acquire the information by any other reasonable means. &lt;b&gt;(Section 3)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The interception must be of a message or class of message from and too one particular person that is specified or described in the order or one particular set of premises specified or described in the order. &lt;b&gt;(Section 4)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The direction for interception will remain in force for a period of 60 days, or 180 days if the directions are renewed. &lt;b&gt;(Section 6)&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt; ITA Interception and Monitoring Rules:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any direction issued by the competent authority must contain reasons for such direction. &lt;b&gt;(Section 7)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The competent authority must consider all other possibilities of acquiring the information by other means, and the direction can only be issued when it is not possible to acquire the information by any other reasonable means. &lt;b&gt;(Section 8)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The direction of interception, monitoring, or decryption of any information generated, transmitted, received, or stored in any computer resource etc., as may be specified or described in the direction. &lt;b&gt;(Section 9)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The directions for interception, monitoring, or decryption will remain in force for a period of 60 days, or 180 days if the directions are renewed. &lt;b&gt;(Section 10)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Traffic and Monitoring Rules&lt;/b&gt;:            
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any direction issued by the competent authority must contain reasons for such direction. &lt;b&gt;(Section 3(3))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Every record including electronic records pertaining to such directions for monitoring or collection of traffic data shall be destroyed after the expiry of nine months by the designated officer. Except when the information is needed for an ongoing investigation, the person in charge of a computer resource shall destroy records within a period of six months of discontinuing the monitoring. &lt;b&gt;(Section 8)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt;&lt;b&gt;Principle - Due process&lt;/b&gt;:&lt;i&gt; Due process requires that governments must respect and guarantee an individual’s human rights, that any interference with such rights must be authorized in law, and that the lawful procedure that governs how the government can interfere with those rights is properly enumerated and available to the general public.(9) While criminal investigations and other considerations of public security and safety may warrant limited access to information by public authorities, the granting of such access must be subject to guarantees of procedural fairness. Every request for access should be subject to prior authorization by a competent authority, except when there is imminent risk of danger to human life.(10)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In the relevant Indian legislation the only guarantee for due process is that every request for access must be subject to prior authorization by a competent authority.&lt;/p&gt;
&lt;li&gt;&lt;b&gt; TA Rules 2007:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;All orders for interception must be issued by the Secretary to the Government of India in the Ministry of Home Affairs. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules&lt;/b&gt;:            
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;All orders for interception must be issued by the Secretary to the Government of India in the Ministry of Home Affairs. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Monitoring of Traffic Rules:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The Secretary to the Government of India in the Department of Information Technology under the Ministry of Communications and Information Technology is the competent authority for authorizing orders.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. &lt;/b&gt;&lt;b&gt;Principle - User notification&lt;/b&gt;:&lt;i&gt; Notwithstanding the notification and transparency requirements that governments should bear, service providers should notify a user that a public authority has requested his or her communications or communications metadata with enough time and information about the request so that a user may challenge the request. In specific cases where the public authority wishes to delay the notification of the affected user or in an emergency situation where sufficient time may not be reasonable, the authority should be obliged to demonstrate that such notification would jeopardize the course of investigation to the competent judicial authority reviewing the request. In such cases, it is the responsibility of the public authority to notify the individual affected and the service provider as soon as the risk is lifted or after the conclusion of the investigation, whichever is sooner.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are no provisions that require the government or service providers to notify the user that a public authority has requested his or her communication data.&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9. &lt;/b&gt;&lt;b&gt;Principle - Transparency about use of government surveillance&lt;/b&gt;: &lt;i&gt;The access capabilities of public authorities and the process for access should be prescribed by law and should be transparent to the public. The government and service providers should provide the maximum possible transparency about the access by public authorities without imperiling ongoing investigations and with enough information so that individuals have sufficient knowledge to fully comprehend the scope and nature of the law, and when relevant, challenge it. Service providers must also publish the procedure they apply to deal with data requests from public authorities.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are no requirements that access capabilities of the government and the process for access must be transparent to the public. Nor are service providers required to publish the procedure applied to handle data requests from public authorities.&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10. &lt;/b&gt;&lt;b&gt;&lt;i&gt;Principle - Oversight&lt;/i&gt;&lt;/b&gt;&lt;i&gt;:&lt;/i&gt; &lt;i&gt;An independent oversight mechanism should be established to ensure transparency of lawful access requests. This mechanism should have the authority to access information about public authorities' actions, including, where appropriate, access to secret or classified information, to assess whether public authorities are making legitimate use of their lawful capabilities, and to publish regular reports and data relevant to lawful access. This is in addition to any oversight already provided through another branch of government such as parliament or a judicial authority. This mechanism must provide – at minimum – aggregate information on the number of requests, the number of requests that were rejected, and a specification of the number of requests per service provider and per type of crime. (11)&lt;/i&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are requirements for a review committee to be established.&lt;i&gt; &lt;/i&gt;The review committee must meet on a bi-monthly basis and review directions to ensure that they are in accordance with the prescribed law. Currently, it is unclear from the legislation if the review committees have the authority to access information about public authorities’ actions, and currently the review committee does not publish aggregate information about the number of requests, the number of requests that were rejected, and a specification of the number of requests per service provider and per type of crime. These standards are recommended by the principle.&lt;/p&gt;
&lt;p&gt;The relevant provisions are summarized below:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;TA Rules 2007&lt;/b&gt;:            
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A review committee will be constituted by a state government that consists of a chief secretary, secretary of law, secretary to the state government. The review committee shall meet at least once in two months. If the committee finds that directions are not in accordance with the mandated provisions, then the committee can order the destruction of the directions. &lt;b&gt;(Section 17)&lt;/b&gt;.&lt;b&gt; &lt;/b&gt;Any order issued by the competent authority must contain reasons for such directions and a copy be forwarded to the concerned review committee within a period of seven working days. &lt;b&gt;(Section 2)&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any direction issued by the competent authority must be forwarded to the review committee within a period of seven working days from issuing. The review committee is the same as constituted under rule 419A of the Indian Telegraph Rules, 1951. The review committee must meet bi-monthly and determine whether directions are in accordance with the ITA Act. If the review committee finds that the directions are not in accordance with the Act, it may issue an order for the destruction of the copies of accessed information and set aside the directions. &lt;b&gt;(Section 22)&lt;/b&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Traffic Monitoring Rules: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any direction issued by the competent authority must be forwarded to the review committee within a period of seven working days from issuing. The review committee is the same as constituted under rule 419A of the Indian Telegraph Rules, 1951. The review committee must meet bi-monthly and determine whether directions are in accordance with the ITA Act. If the review committee finds that the directions are not in accordance with the Act, it may issue an order for the destruction of the copies of accessed information and set aside the directions. &lt;b&gt;(Section 7)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11. &lt;/b&gt;&lt;b&gt;Principles - Integrity of communications and systems&lt;/b&gt;: &lt;i&gt;It is the responsibility of service providers to transmit and store communications and communications metadata securely and to a degree that is minimally necessary for operation. It is essential that new communications technologies incorporate security and privacy in the design phases. In order, in part, to ensure the integrity of the service providers’ systems, and in recognition of the fact that compromising security for government purposes almost always compromises security more generally, governments shall not compel service providers to build surveillance or monitoring capability into their systems. Nor shall governments require that these systems be designed to collect or retain particular information purely for law enforcement or surveillance purposes. Moreover, a priori data retention or collection should never be required of service providers and orders for communications and communications metadata preservation must be decided on a case-by-case basis. Finally, present capabilities should be subject to audit by an independent public oversight body.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are a number of security measures that must be put in place but these are predominantly actions that must be taken by service providers, and do not pertain to intelligence agencies. Furthermore, many provisions found in the ITA&lt;i&gt; Procedure and Safeguards for Interception, Monitoring, and Decryption of Information Rules&lt;/i&gt;, and the ISP and UASL licenses include requirements for service providers to provide monitoring facilities and technical assistance, require information to be retained specifically for law enforcement purposes, and require service providers to comply with a-priori data retention mandates. In the ISP and UASL license, service providers are audited and inspected to ensure compliance with requirements listed in the license, but it unclear from the legislation if the access capabilities of government or governmental agencies are audited by an independent public oversight body. This standard is recommended by the principle.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Relevant provisions are summarized below:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;TA Rules 2007&lt;/b&gt;: The service provider must put in place internal checks to ensure that unauthorized interception of messages does not take place. &lt;b&gt;(Section 14)&lt;/b&gt; Service providers are also responsible for actions of their employees. In the case of unauthorized interception or a breach in security, service providers can be held liable for up to three years in prison, fines, and revocation of the service providers licenses depending on the nature and scale of the violation. &lt;b&gt;(Section 20, 20A 21, 23).&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; ITA Interception and Monitoring Rules: &lt;/b&gt;The intermediary or person in charge of the computer resources must put in place adequate and effective internal checks to ensure that unauthorized interception of communications does not take place and extreme secrecy is maintained and utmost care and precaution taken in the matter of interception or monitoring or decryption of information as it affects privacy of citizens and also that it is handled only by the designated officers of the intermediary. &lt;b&gt;(Section 20)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; ITA Traffic Monitoring Rules&lt;/b&gt;: The intermediary or person in charge of the computer resources must put in place adequate and effective internal checks to ensure that unauthorized interception of communications does not take place and extreme secrecy is maintained and utmost care and precaution taken in the matter of interception or monitoring or decryption of information as it affects privacy of citizens and also that it is handled only by the designated officers of the intermediary. &lt;b&gt;(Section 5&amp;amp;6)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;UASL License:&lt;/b&gt; The intermediary or service provider is responsible for ensuring the protection of privacy of communication and to ensure that unauthorized interception of messages does not take place. &lt;b&gt;(Section 39.1, Section 39.2, Section 41.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ISP License:&lt;/b&gt; The ISP has the responsibility of ensuring that unauthorized interception of messages does not take place. &lt;b&gt;(Section 32.1)&lt;/b&gt; The ISP must take all necessary steps to safeguard the privacy and confidentiality of an information about a third party and its business and will do its best endeavor to ensure that no information, except what is necessary is divulged, and no employee of the ISP seeks information other than is necessary for the purpose of providing service to the third party. &lt;b&gt;(Section 32.2&lt;/b&gt;) The ISP must also take necessary steps to ensure that any person acting on its behalf observe confidentiality of customer information. &lt;b&gt;(Section 32.3)&lt;/b&gt;.&lt;/li&gt;
&lt;p&gt;Provisions requiring the provision of facilities, assistance, and retention:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The intermediary must provide all facilities, co-operation for interception, monitoring, and decryption of information mentioned in the direction &lt;b&gt;(Section 13(2))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If a decryption direction or copy is handed to the decryption key holder to whom the decryption direction is addressed by the nodal officer, the decryption key holder must disclose the decryption key or provide the decryption assistance. &lt;b&gt;(Section 17)&lt;/b&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Monitoring of Traffic Rules: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The intermediary must extend all facilities, co-operation and assistance in installation, removal and testing of equipment and also enable online access to the computer resource for monitoring and collecting traffic data or information. &lt;b&gt;(Section 4(7))&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;UASL License: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The service provider cannot employ bulk encryption equipment in its network, and any encryption equipment connected to the licensee’s network for specific requirements must have prior evaluation an approval of the licensor. &lt;b&gt;(Section 39.1)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must provide all tracing facilities to trace nuisance, obnoxious or malicious calls, messages or communications transported through the equipment and network to authorized officers of the government for purposes of national security.&lt;b&gt;(Section 40.4)&lt;/b&gt;.&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suitable monitoring equipment as may be prescribed for each type of system used will be provided by the service provider for monitoring as and when required by the licensor. &lt;b&gt;(Section 41.7)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The designated person of the Central/State Government as conveyed to the Licensor from time to time in addition to the licensor or its nominee shall have the right to monitor the telecommunication traffic in every MSC/Exchange/MGC/MG. The service provider must make arrangements for the monitoring of simultaneous calls by Government security agencies. In case the security agencies intend to locate the equipment at the service provider’s premises for facilitating monitoring, the service provider should extend all support in this regard including space and entry of the authorized security personnel. The interface requirements as well as features and facilities as defined by the licensor should be implemented by the service provider for both data and speech. Presently, the service provider should ensure suitable redundancy in the complete chain of monitoring equipment for trouble free operations of monitoring of at least 210 simultaneous calls for seven security agencies. &lt;b&gt;(Section 41.10)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must also make the following records available: called/calling party mobile/PSTN numbers, Time/date and duration of interception, location of target subscribers, telephone numbers if any call-forwarding feature has been invoked by the target subscriber, data records for even failed attempts, and call data record of roaming subscribers. &lt;b&gt;(Section 41.10)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider shall provide the facility to carry out surveillance of Mobile Terminal activity within a specified area. &lt;b&gt;(Section 41.11)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The complete list of subscribers must be made available by the service provider on their website to authorized intelligence agencies. This list must be updated on a regular basis. Hard copies of the list must also be made available to security agencies when requested. &lt;b&gt;(Section 41.14)&lt;/b&gt;. The database of subscribers must also be made available to the licensor or its representatives. &lt;b&gt;(Section 41.16)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must maintain all commercial records with regard to the communications exchanged on the network. All records must be archived for at least one year. &lt;b&gt;(Section 41.17)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Calling Line Identification must be provided and the network should also support Malicious Call Identification.&lt;b&gt; (Section 41.18)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Information about bulk connections must be forwarded to the VTM Cell of DoT, DDG (Security) DoT, and any other officer authorized by the Licensor from time to time as well as Security Agencies on a monthly basis &lt;b&gt;(Section 41.19)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Subscribers having CLIR should be listed in a password protected website with their complete address and details so that authorized Government agencies can view or download for detection and investigation of misuse. &lt;b&gt;(Section 41.19(iv))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must provide traceable identities of their subscribers. If the subscriber is roaming from another foreign company, the Indian Company must try to obtain traceable identities from the foreign company as part of its roaming agreement. &lt;b&gt;(41.20 (ix))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;On request by the licensor or any other agency authorized by the licensor, the licensee must be able to provide the geographical location (BTS location) of any subscriber at any point of time. &lt;b&gt;(41.20 (x))&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suitable technical devices should be made available at the Indian end to designated security agency/licensor in which a mirror image of the remote access information is available on line for monitoring purposes. &lt;b&gt;(41.20 (xiv))&lt;/b&gt;. &lt;/li&gt;
&lt;li&gt;A complete audit trail of the remote access activities pertaining to the network operated in India should be maintained for a period of six months and provided on request to the licensor. &lt;b&gt;(Section 41.20 (xv))&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;For monitoring traffic, the service provider should provide access of their network and other facilities as well as to books of accounts to the security agencies. &lt;b&gt;(Section 41.20 (xx))&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ISP License:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The ISP must ensure that Bulk Encryption is not deployed by ISPs. Individuals/groups /organizations can use encryption up to 40 bit key length without obtaining permission from the licensor. If encryption equipments higher than this limit are deployed, individuals/groups/organizations must obtain prior written permission from the licensor and deposit the decryption key. &lt;b&gt;(Section 2.2(vii))&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP must furnish to the licensor/TRAI on demand documents, accounts, estimates, returns, reports, or other information. &lt;b&gt;(Section 9.1)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP will provide tracing facilities to trace nuisance, obnoxious or malicious calls, messages or communications transported through his equipment and network when such information is necessary for investigations or detection of crimes and in the interest of national security. &lt;b&gt;(Section 33.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP will provide the necessary facilities for continuous monitoring of the system, as required by the licensor or its authorized representatives. &lt;b&gt;(Section 30.1)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP shall provide necessary facilities depending upon the specific situation at the relevant time to the Government to counteract espionage, subversive acts, sabotage or any other unlawful activity. &lt;b&gt;(Section 34.1)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In the interests of security, suitable monitoring equipment as may be prescribed for each type of system used, which will be provided by the licensee. &lt;b&gt;(Section 34.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The designated person of the Central/State Government or its nominee will have the right to monitor the telecommunication traffic. The ISP will make arrangements for monitoring simultaneous calls by Government security agencies. &lt;b&gt;(Section 34.6)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP must install infrastructure in the service area with respect to: Internet telephony services offered by the ISP for processing, routing, directing, managing, authenticating the internet telephony calls including the generation of Call Details Record (CDR), called IP address, called numbers, date , duration, time and charges of internet telephony calls. &lt;b&gt;(Section 34.7)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;ISPs must maintain a log of all users connected and the service that they are using (mail, telnet, http etc.). The ISPs must log every outward login or telnet through their computers. These logs as well as copies of all the packets originating from the Customer Premises Equipment of the ISP must be made available in real time to the Telecom Authority. &lt;b&gt;(Section 34.8)&lt;/b&gt;.&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP should provide the facility to carry out surveillance of Mobile Terminal activity within a specified area. &lt;b&gt;(Section 34.9)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The complete list of subscribers must be made available by the ISP on their website so that intelligence agencies can obtain the subscriber list at any time. &lt;b&gt;(Section 34.12)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The list of Internet leased line customers and sub-costumers must be placed on a password protected website with the following information: Name of customer, IP address allotted, bandwidth provided, address of installation, date of installation, contact person with phone number and email. This information should be accessible to authorized Government agencies.&lt;b&gt; (Section 34.13)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Monitoring of high UDP traffic value and to check for cases where upstream UDP traffic is similar to downstream UDP traffic and monitor such customer monthly with physical verification and personal identity. &lt;b&gt;(Section 34.15)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The licensor will have access to the database relating to the subscribers of the ISP. The ISP must make available at any instant the details of the subscribers using the service. &lt;b&gt;(Section 34.22)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP must maintain all commercial records with regard to the communications exchanged on the network for at least one year and will be destroyed unless directed otherwise. &lt;b&gt;(Section 34.23)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Every international gateway with a route/switch having a capacity of 2Mbps must be equipped with a monitoring Centre at the cost of the ISP. The cost of meeting the requirements of the security agencies, the cost of maintenance of the monitoring equipment and infrastructure must be borne by the ISP. &lt;b&gt;(Section 34.27 (a(i))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Office space of 10 by 10 feet with adequate power supply and air-conditioning must be provided by the ISP free of cost. &lt;b&gt;(Section 34.27 (a(ii))&lt;/b&gt; One local exclusive telephone must be made available by the ISP at the monitoring centre at the cost of the ISP. &lt;b&gt;(Section 34.27 (a(iii))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Each route/switch of the ISP should be connected by the LAN operating at the same speed as the router/switch; the monitoring equipment will be connected to this network. &lt;b&gt;(Section 34.27 (a(v))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP must provide traceable identity of their subscribers. In the case of roaming subscribers the ISP must try to obtain the traceable identity of roaming subscribers from the foreign company. &lt;b&gt;(Section 34.27 (ix))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;On request of the licensor or any other authorized agency, the ISP must be able to provide the geographical location of any subscriber (BTS location of wireless subscriber) at a given point of time. &lt;b&gt;(Section 34.27 (x))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suitable technical devices should be made available to designated security agencies in which a mirror image of the remote access information is available on line for monitoring purposes. &lt;b&gt;(Section 34.27 (xiv))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A complete audit trail of the remote access activities pertaining to the network operated in India should be maintained for a period of six months and provided on request. &lt;b&gt;(Section 34.27 (xv))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;ISPs must provide access of their network and other facilities, as well as books to security agencies. &lt;b&gt;(Section 34.27 (xx))&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12. &lt;/b&gt;&lt;b&gt;Principle - Safeguards for international cooperation&lt;/b&gt;:&lt;i&gt; In response to changes in the flows of information and the technologies and services that are now used to communicate, governments may have to work across borders to fight crime. Mutual legal assistance treaties (MLATs) should ensure that, where the laws of more than one state could apply to communications and communications metadata, the higher/highest of the available standards should be applied to the data. Mutual legal assistance processes and how they are used should also be clearly documented and open to the public. The processes should distinguish between when law enforcement agencies can collaborate for purposes of intelligence as opposed to sharing actual evidence. Moreover, governments cannot use international cooperation as a means to surveil people in ways that would be unlawful under their own laws. States must verify that the data collected or supplied, and the mode of analysis under MLAT, is in fact limited to what is permitted. In the absence of an MLAT, service providers should not respond to requests of the government of a particular country requesting information of users if the requests do not include the same safeguards as providers would require from domestic authorities, and the safeguards do not match these principles. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; India currently has signed 32 MLAT treaties with other countries, each with its own provisions and conditions relating to access to information. The provisions of the Information Technology Act 2000 apply to any contravention of the Act that is committed outside of India, thus the Rules related to interception, monitoring, decryption etc. would apply to any contravention of the Act outside of India. The provisions of the Indian Telegraph Act only apply to communications within India, but the licenses do specify when information held by service providers cannot be transferred across borders.&lt;/p&gt;
&lt;p&gt;Below is a summary of the relevant provisions:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ITA 2000&lt;/b&gt;: The Act will extend to the whole of India, and applies to any offence or contravention committed outside India by any person. &lt;b&gt;(Section 1(2))&lt;/b&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;UASL License:&lt;/b&gt; The service provider cannot transfer any accounting information relating to the subscriber or user information to any person or place outside of India (this does not restrict a statutorily required disclosure of financial nature. &lt;b&gt;(section (41.20 (viii))&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ISP License:&lt;/b&gt; For security reasons, domestic traffic of such entities as identified by the licensor will not be hauled or route to any place outside of India. &lt;b&gt;(Section 34.28 (iii)) &lt;/b&gt;ISPs shall also not transfer accounting information relating to the subscriber or user information to any person or place outside of India (this does not restrict a statutorily required disclosure of financial nature) &lt;b&gt;(Section 34.28 (viii))&lt;/b&gt;&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13. &lt;/b&gt;&lt;b&gt;&lt;i&gt;Principle - Safeguards against illegitimate access&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: To protect individuals against unwarranted attempts to access communications and communications metadata, governments should ensure that those authorities and organizations who initiate, or are complicit in, unnecessary, disproportionate or extra-legal interception or access are subject to sufficient and significant dissuasive penalties, including protection and rewards for whistleblowers, and that individuals affected by such activities are able to access avenues for redress. Any information obtained in a manner that is inconsistent with these principles is inadmissible as evidence in any proceeding, as is any evidence derivative of such information. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; Though relevant Indian legislation does provide penalty for unauthorized interception or access, the penalty applies only to service providers, and does not hold governmental agencies responsible. Currently there are no avenues of redress for the individual, and there are no protections or rewards for whistleblowers. Both of these safeguards are recommended by the principle.&lt;/p&gt;
&lt;p&gt;The relevant provisions are summarized below:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;TA Rules 2007:&lt;/b&gt; The Telegraph Act: The service provider must put in place internal checks to ensure that unauthorized interception of messages does not take place. &lt;b&gt;(Section 14)&lt;/b&gt; Service providers are also responsible for actions of their employees. In the case of unauthorized interception or a breach in security on the part of the service provider, service providers can be held liable with penalty of imprisonment from 1 to 3 years and or a fine of rs.500 – 1000 depending on the exact violation&lt;b&gt;. (Section 20, 20A, 23, and  24 Indian Telegraph Act)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; ITA Interception and Monitoring Rules:&lt;/b&gt; The intermediary must be responsible for the actions of their employees and in the case of violation pertaining to the maintenance of secrecy and confidentiality of intercepted material or unauthorized interception, monitoring, or decrypting of information – the intermediary will be held liable under the relevant provisions of the laws in force. &lt;b&gt;(Section 21)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; ITA Traffic Monitoring Rules:&lt;/b&gt; The intermediary must be responsible for the actions of their employees and in the case of violation pertaining to the maintenance of secrecy and confidentiality of intercepted material or unauthorized interception, monitoring, or decrypting of information – the intermediary will be held liable under the relevant provisions of the laws in force. &lt;b&gt;(Section 6)&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;UASL License: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In order to maintain privacy of voice and data, monitoring must be done in accordance with the 2007 Rules established under the Indian Telegraph Act, 1885. &lt;b&gt;(Section 41.20 (xix))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Any damage arising from the failure of the service provider to provider tracing assistance to the government for purposes of national security is payable by the service provider. &lt;b&gt;(Section 40.4)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ISP License:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In order to maintain the privacy of voice and data, monitoring can only be carried out after authorization by the Union Home Secretary or Home Secretaries of the State/Union Territories. &lt;b&gt;(Section 34.28 (xix))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP indemnifies the licensor against all actions brought against the licensor for breach of privacy or unauthorized interruption of data transmitted by the subscribers. &lt;b&gt;(Section 8.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Any damages that occur from non-compliance on the part of the ISP must be paid by the ISP. &lt;b&gt;(Section 33.4)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14. &lt;/b&gt;&lt;b&gt;&lt;i&gt;Principle - Cost of surveillance&lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;:&lt;/i&gt;&lt;/b&gt;&lt;i&gt; The financial cost of providing access to user data should be borne by the public authority undertaking the investigation. Financial constraints place an institutional check on the overuse of orders, but the payments should not exceed the service provider’s actual costs for reviewing and responding to orders, as such would provide a perverse financial incentive in opposition to user’s rights.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In India, the ISP and the UASL licenses specifically state that the cost of providing facilities must be borne by the service provider. Though the ITA Interception and Monitoring Rules do require intermediaries to provide facilities, it is not clear from the Rules where the burden of the cost will fall. Currently, there are no requirements that the cost of access to user data should be borne by the public authority undertaking the investigation. This standard is recommended by the principle.&lt;/p&gt;
&lt;p&gt;Below are summaries of relevant provisions:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;UASL License&lt;/b&gt;:           
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; Any damage arising from the failure of the service provider to provider tracing assistance to the government for purposes of national security is payable by the service provider. &lt;b&gt;(Section 40.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suitable monitoring equipment as may be prescribed for each type of system used will be provided by the service provider for monitoring as and when required by the licensor. &lt;b&gt;(Section 41.7)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The hardware and software required for the monitoring of calls must be engineered, provided/installed, and maintained by the service provider at the service providers cost. However the respective Government instrumentality must bear the cost of the user end hardware and leased line circuits from the MSC/Exchange/MGC/MG to the monitoring centers to be located as per their choice in their premises. &lt;b&gt;(Section 41.10)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must ensure that the necessary provision (hardware/software) is available in their equipment for doing the Lawful Interception and monitoring from a centralized location. &lt;b&gt;(Section 41.20 (xvi))&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ISP License:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any damages that occur from non-compliance on the part of the ISP must be paid by the ISP. &lt;b&gt;(Section 33.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The hardware at the ISP end and the software required for monitoring of calls must be engineered, provided/installed, and maintained by the ISP. &lt;b&gt;(Section 34.7)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Every international gateway with a route/switch having a capacity of 2Mbps must be equipped with a monitoring Centre at the cost of the ISP. The cost of meeting the requirements of the security agencies, the cost of maintenance of the monitoring equipment and infrastructure must be borne by the ISP. &lt;b&gt;(Section 34.27 (a(i))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Office space of 10 by 10 feet with adequate power supply and air-conditioning must be provided by the ISP free of cost. &lt;b&gt;(Section 34.27 (a(ii))&lt;/b&gt; One local exclusive telephone must be made available by the ISP at the monitoring centre at the cost of the ISP. &lt;b&gt;(Section 34.27 (a(iii))&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications'&gt;https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:40:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011">
    <title>Leaked Privacy Bill: 2014 vs. 2011</title>
    <link>https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has recently received a leaked version of the draft Privacy Bill 2014 that the Department of Personnel and Training, Government of India has drafted.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;After obtaining a copy of the leaked Privacy Bill 2014, we have  replaced the blog "An Analysis of the New Draft Privacy Bill" which was  based off of a report from the Economic Times, with this blog post&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This represents the third leak of potential privacy legislation for India that we know of, with publicly available versions having leaked in &lt;a href="http://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf"&gt;April 2011&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;September 2011&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When compared to the September 2011 Privacy Bill, the text of the 2014 Bill includes a number of changes, additions, and deletions.  Below is an outline of significant changes from the &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy"&gt;September 2011 Privacy Bill&lt;/a&gt; to the 2014 Privacy Bill:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Scope:&lt;/b&gt; The 2014 Bill extends the right to Privacy to all residents of India. This is in contrast to the 2011 Bill, which extended the Right to Privacy to citizens of India.  The 2014 Bill furthermore recognizes the Right to Privacy as a part of Article 21 of the Indian Constitution and extends to the whole of India, whereas the 2011 Bill did not explicitly recognize the Right to Privacy as being a part of Article 21, and excluded Jammu and Kashmir from its purview.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Definitions:&lt;/span&gt;&lt;/b&gt;&lt;span&gt; The 2014 Bill includes a number of new definitions, redefines existing terms, and deletes others.&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Terms that have been added in the 2014 Bill and the definitions&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Personal identifier&lt;/i&gt;:&lt;/b&gt; Any unique alphanumeric sequence of members, letters, and symbols that specifically identifies an individual with a database or a data set.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Legitimate purpose&lt;/i&gt;:&lt;/b&gt; A purpose covered under this Act or any other law for the time being in force, which is certain, unambiguous, and limited in scope for collection of any personal data from a data subject.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Competent authority&lt;/i&gt;&lt;/b&gt; : The authority which is authorized to sanction interception or surveillance, as the case may be, under this Act or rules made there under or any other law for the time being in force.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Notification&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: &lt;/i&gt;Notification issued under this Act and published in the Official Gazette&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Control&lt;/i&gt; :&lt;/b&gt; And all other cognate forms of expressions thereof, means, in relation to personal data, the collection or processing of personal data and shall include the ability to determine the purposes for and the manner in which any personal data is to be collected or processed.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;i&gt;Telecommunications system&lt;/i&gt;:&lt;/b&gt; Any system used for transmission or reception of any communication by wire, radio, visual or other electromagnetic means but shall not include broadcasting services.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Privacy standards&lt;/i&gt;:&lt;/b&gt; The privacy standards or protocols or codes of practice.  developed by industry associations.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Terms that have been re-defined in the 2014 Bill from the 2011 Bill and the 2014 Bill definitions&lt;/b&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Communication data:&lt;/i&gt;&lt;/b&gt;The data held or obtained by a telecommunications service provider in relation to a data subject including the data usage of the telecommunications &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Data subject&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;: Any living individual, whose personal data is controlled by any person&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Interception&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: &lt;/i&gt;In relation to any communication in the course of its transmission through a telecommunication system, any action that results in some or all of the contents of that communication being made available, while being transmitted, to a person other than the sender or the intended recipient of the communication. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Person&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: A&lt;/i&gt;ny natural or legal person and shall include a body corporate, partnership, society, trust, association of persons, Government company, government department, urban  local body, or any other officer, agency or instrumentality of the state. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Sensitive personal data&lt;/i&gt;:&lt;/b&gt; Personal data relating to: (a) physical and mental health including medical history, (b) biometric, bodily or genetic information, (c) criminal convictions (d) password, (e) banking credit and financial data (f) narco analysis or polygraph test data, (g) sexual orientation.  Provided that any information that is freely available or accessible in public domain or to be furnished under the Right to Information Act 2005 or any other law for time being in force shall not be regarded as sensitive personal data for the purposes of this Act.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Individual:&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;a resident of Indian &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Covert surveillance&lt;/i&gt;:&lt;/b&gt; covert Surveillance" means obtaining private information about an individual and his private affairs without his knowledge and includes: (i) directed surveillance which is undertaken for the purposes of specific investigation or specific operation in such a manner as is likely to result in the obtaining of private information about a person whether or not that person was specifically identified in relation to the investigation or operation; (ii) intrusive surveillance which is carried out by an individual or a surveillance device  in relation to anything taking place on a residential premise or in any private vehicle. It also covers use of any device outside the premises or a vehicle wherein it can give information of the same quality and detail as if the device were in the premises or vehicle; (iii) covert human intelligence service which is information obtained by a person who establishes or maintains a personal or other relationship with an individual for the covert purpose of using such a relationship to obtain or to provide access to any personal information about that individual&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Re-identify&lt;/i&gt;&lt;/b&gt;: means the recovery of data from an anonymised data, capable of identifying a data subject whose personal data has been anonymised;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Process&lt;/i&gt;:&lt;/b&gt; “process" and all other cognate forms of expressions thereof, means any operation or set of operations, whether carried out through automatic means or not by any person or organization, that relates to:(a) collation, storage, disclosure, transfer, updating, modification, alteration or use of personal data; or (b) the merging, linking, blocking, degradation or anonymisation of personal data;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Direct marketing&lt;/i&gt;&lt;/b&gt;: Direct Marketing means sending of a commercial communication to any individual &lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt;Data controller&lt;/i&gt;&lt;/b&gt;:  any person who controls, at any point in time, the personal data of a data subject but shall not include any person who merely provides infrastructure for the transfer or storage of personal data to it data controller;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;i&gt; Government&lt;/i&gt;&lt;/b&gt;: the Central Government or as the case may be, the State Government and includes the Union territory Administration, local authority or any agency and instrumentality of the Government;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Terms that have been removed from the 2014 Bill that were in the 2011 Bill and the 2011 definition:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Consent: Includes implied consent&lt;/li&gt;
&lt;li&gt;Maintain: Includes maintain, collect, use, or disseminate.&lt;/li&gt;
&lt;li&gt;Data processor: In relation to personal data means any person (other than the employee of the data controller), who processes the data on behalf of the data controller. &lt;/li&gt;
&lt;li&gt;Local authority: A municipal committee, district board, body of port commissioners, council, board or other authority legally entitled to, or entrusted by the Government with, the control or management of a municipal or local fund. &lt;/li&gt;
&lt;li&gt;Prescribed: Prescribed by rules made under this Act.&lt;/li&gt;
&lt;li&gt;Surveillance: Surveillance undertaken through installation and use of CCTVs and other system which capture images to identify or monitor individuals (this was removed from the larger definition of surveillance.)&lt;/li&gt;
&lt;li&gt;DNA: Cell in the body of an individual, whether collected from a cheek, cell, blood cell, skin cell or other tissue, which allows for identification of such individual when compared with other individual. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Terms that have remained broadly (with some modification) the same between the 2014 Bill and 2011 Bill (as per the 2014 Bill definition):&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Authority: The Data Protection Authority of India &lt;/li&gt;
&lt;li&gt;Appellate tribunal: the Cyber Appellate Tribunal established under Sub-Section (1) of section n48 of the Information Technology Act, 2000.&lt;/li&gt;
&lt;li&gt;Personal data: Any data which relates to a data subject, if that data subject can be identified from that data, either directly or indirectly, in conjunction with other data that the data controller has or is likely to have and includes any expression of opinion about such data subject. &lt;/li&gt;
&lt;li&gt;Member: Member of the Authority &lt;/li&gt;
&lt;li&gt;Disclose: and all other cognate forms of expression thereof, means disclosure, dissemination, broadcast, communication, distribution, transmission, or make available in any manner whatsoever, of personal data. &lt;/li&gt;
&lt;li&gt;Anonymised: The deletion of all data that identifies the data subject or can be used to identify the data subject by linking such data to any other data of the data subject, by the data controller. &lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Exceptions to the Right to Privacy&lt;/b&gt;: According to the 2011 Bill, the exceptions to the Right to Privacy included: &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Sovereignty, integrity and security of India, strategic, scientific or economic interest of the state &lt;/li&gt;
&lt;li&gt;Preventing incitement to the commission of any offence &lt;/li&gt;
&lt;li&gt;Prevention of public disorder or the detection of crime&lt;/li&gt;
&lt;li&gt;Protection of rights and freedoms of others &lt;/li&gt;
&lt;li&gt;In the interest of friendly relations with foreign state&lt;/li&gt;
&lt;li&gt;Any other purpose specifically mentioned in the Act. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill reflects almost all of the exceptions defined in the 2011 Bill, but removes ‘detection of crime’ from the list of exceptions. The 2014 Bill also qualifies that the application of each exception must be adequate, relevant, and not excessive to the objective it aims to achieve and must be imposed on the manner prescribed – whereas the 2011 Bill stated only that the application of exceptions to the Right to Privacy cannot be disproportionate to the purpose sought to be achieved.&lt;/p&gt;
&lt;p id="content" style="text-align: justify; "&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Acts not to be considered deprivations of privacy:  The 2011 Bill lists five instances that  will not be considered a deprivation of privacy  - namely&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;For journalistic purposes unless it is proven that there is a reasonable expectation of privacy, &lt;/li&gt;
&lt;li&gt;Processing data for personal or household purposes,&lt;/li&gt;
&lt;li&gt;Installation of surveillance equipment for the security of private premises, &lt;/li&gt;
&lt;li&gt;Disclosure of information via the Right to Information Act 2005,&lt;/li&gt;
&lt;li&gt;And any other activity exempted under the Act.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 limits these instances to:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The processing of data purely for personal or household purposes, &lt;/li&gt;
&lt;li&gt;Disclosure of information under the Right to Information Act 2005,&lt;/li&gt;
&lt;li&gt;And any other action specifically exempted under the Act.&lt;/li&gt;
&lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Privacy Principles:  Unlike the 2011 Bill, the 2014 Bill defines nine specific privacy principles: notice, choice and consent, collection limitation, purposes limitation, access and correction, disclosure of information, security, openness, and accountability. The Privacy Principles will apply to all existing and evolving practices. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Provisions for Personal Data: Both the 2011 Bill and the 2014 Bill have provisions that apply to the processing of personal and sensitive personal data. The 2011 Bill includes provisions addressing the:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Collection of personal data, &lt;/li&gt;
&lt;li&gt;Processing of personal data, &lt;/li&gt;
&lt;li&gt;Data quality, &lt;/li&gt;
&lt;li&gt;Provisions relating to sensitive personal data, &lt;/li&gt;
&lt;li&gt;Retention of personal data,&lt;/li&gt;
&lt;li&gt;Sharing (disclosure) of personal data, &lt;/li&gt;
&lt;li&gt;Security of personal data, &lt;/li&gt;
&lt;li&gt;Notification of breach of security, &lt;/li&gt;
&lt;li&gt;Access to personal data by data subject,&lt;/li&gt;
&lt;li&gt;Updation of personal data by data subject&lt;/li&gt;
&lt;li&gt;Mandatory processing of data,&lt;/li&gt;
&lt;li&gt;Trans border flows of personal data.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Of these, the 2014 Bill broadly (though not verbatim) reflects the 2011 Bill provisions relating to the:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Collection of personal data,&lt;/li&gt;
&lt;li&gt;Processing of personal data, &lt;/li&gt;
&lt;li&gt;Access to personal data,&lt;/li&gt;
&lt;li&gt;Updating personal data&lt;/li&gt;
&lt;li&gt;Retention of personal data&lt;/li&gt;
&lt;li&gt;Data quality, &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill has further includes provisions addressing:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Openness and accountability, &lt;/li&gt;
&lt;li&gt;Choice, &lt;/li&gt;
&lt;li&gt;Consent,&lt;/li&gt;
&lt;li&gt;Exceptions for personal identifiers. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill has made changes to the provisions addressing:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Provisions relating to sensitive personal data, &lt;/li&gt;
&lt;li&gt;Sharing (disclosure of personal data), &lt;/li&gt;
&lt;li&gt;Notification of breach of security, &lt;/li&gt;
&lt;li&gt;Mandatory processing of data &lt;/li&gt;
&lt;li&gt;Security of personal data&lt;/li&gt;
&lt;li&gt;Trans border flows of personal data. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The changes that have been made have been mapped out below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Provisions Relating to Sensitive Personal Data:&lt;/b&gt; The 2011Bill and 2014 Bill both require authorization by the Authority for the collection and processing of sensitive personal data. At the same time, both Bills include a list of circumstances under which authorization for the collection and processing of sensitive personal data is not required. On the whole, this list is the same between the 2011 Bill and 2014 Bill, but the 2014 Bill adds the following circumstances on which authorization is not needed for the collection and processing of sensitive personal data:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;For purposes related to the insurance policy of the individual if the data relates to the physical or mental health or medical history of the individual and is collected and processed by an insurance company.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Collected or processed by the Government Intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill also allows the Authority to specify additional regulations for sensitive personal data, and requires that any additional transaction sought to be performed with the sensitive personal information requires fresh consent to first be obtained. The 2014 Bill carves out another exception for Government agencies, allowing disclosure of sensitive personal data without consent to Government agencies mandated under law for the purposes of verification of identity, or for prevention, detection, investigation including cyber incidents, prosecution, and punishment of offences.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notification of Breach of Security&lt;/b&gt;: The provisions relating to the notification of breach of security in the 2014 Bill differ from the 2011 Bill. Specifically, the 2014 Bill removes the requirement that data controllers must publish information about a data breach in two national news papers. Thus, in the 2014 Bill, data controllers must only inform the data protection authority and affected individuals of the breach. &lt;br /&gt;&lt;b&gt;&lt;br /&gt;Notice&lt;/b&gt;: The 2014 Bill changes the structure of the notice mechanism – where in the 2011 Bill, prior to the processing of data, data controllers had to take all reasonable steps to ensure that the data subject was aware of the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; &lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The documented purposes for which such personal data is being collected&lt;/li&gt;
&lt;li&gt;Whether providing of personal data by the data subject is voluntary or mandatory under law or in order to avail of any product or service&lt;/li&gt;
&lt;li&gt;The consequences of the failure to provide the personal data &lt;/li&gt;
&lt;li&gt;The recipient or category of recipients of the personal data &lt;/li&gt;
&lt;li&gt;The name and address of the data controller and all persons who are or will be processing information on behalf of the data controller &lt;/li&gt;
&lt;li&gt;If such personal data is intended to be transferred out of the country, details of such transfer. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;In contrast the 2014 Bill provides that before personal data is collected, the data controller must give notice of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;What data is being collected and&lt;/li&gt;
&lt;li&gt;The legitimate purpose for the collection.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;If the purpose for which the data was collected has changed the data controller will then be obligated to provide the data subject with notice of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The use to which the personal data will be put&lt;/li&gt;
&lt;li&gt;Whether or not the personal data will be disclosed to a third party and if so the identity of such person &lt;/li&gt;
&lt;li&gt;If the personal data being collected is intended to be transferred outside India  and the reasons for doing so, how the transfer helps in achieving the legitimate purpose and whether the country to which such data is transferred has suitable legislation to provide for adequate protection and privacy of the data. &lt;/li&gt;
&lt;li&gt;The security and safeguards established by the data controller in relation to the personal data &lt;/li&gt;
&lt;li&gt;The processes available to a data subject to access and correct  his personal data&lt;/li&gt;
&lt;li&gt;The recourse open to a data subject, if he has any complaints in respect of collection or processing of the personal data and the procedure relating thereto&lt;/li&gt;
&lt;li&gt;The name, address, and contact particulars of the data controller and all persons who will be processing the personal data on behalf of the data controller. &lt;/li&gt;
&lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Disclosure of personal data&lt;/b&gt;: Though titled as ‘sharing of personal data’ both the 2011 Bill and 2014 Bill require consent for the disclosure of personal information, but list exceptional circumstances on which consent is not needed. In the 2011 bill, the relevant provision permits disclosure of personal data without consent only if (i) the sharing was a part of the documented purpose, (ii) the sharing is for any purpose relating to the exceptions to the right to privacy or (iii) the Data Protection Authority has authorized the sharing.  In contrast, the 2014 Bill permits disclosure of personal data without consent if (i) such disclosure is part of the legitimate purpose (ii) such disclosure is for achieving any of the objectives of section 5 (iii) the Authority has by order authorized such disclosure (iv) the disclosure is required under any law for the time being in force (v) the disclosure is made to the Government Intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.  As a safeguard, the 2014 Bill requires that any person to whom  personal information is disclosed, whether a resident or not, must adhere to all provisions of the Act. Furthermore, the disclosure of personal data must be limited to the extent which is necessary to achieve the purpose for which the disclosure is sought and no person can make public any personal data that is in its control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Transborder flow of information&lt;/b&gt;: Though both the 2011 Bill and the 2014 Bill require any country that data is transferred to must have equivalent or stronger data protection standards in place, the 2014 Bill carves out an exception for law enforcement and intelligence agencies and the transfer of any personal data outside the territory of India, in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mandatory Processing of Data&lt;/b&gt;: Both the 2011 Bill and 2014 Bill have provisions that address the mandatory processing of data. These provisions are similar, but the 2014 Bill includes a requirement that data controllers must anonymize personal data that is collected without prior consent from the data subject within a reasonable time frame after collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security of Personal Data:&lt;/b&gt; The provision relating to the security of personal information in the 2014 Bill has been changed from the 2011 Bill by expanding the list and type of breaches that must be prevented, but removing requirements that data controllers must ensure all contractual arrangements with data processors specifically ensure that the data is maintained with the same level of  security.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Conditions on which provisions do not apply:&lt;/b&gt; Both the 2011Bill and 2014 Bill define conditions on which the provisions of updating personal data, access, notification of breach of security, retention of personal data, data quality, consent, choice, notice, and right to privacy  will not apply to personal data.  Though the 2011 Bill and 2014 Bill reflect the same conditions, the 2014 Bill  carves out an exception for Government Intelligence Agencies  - stating that the provisions of  updating personal data, access to data by the data subject, notification about breach of security, retention of personal data, data quality, processing of personal data, consent, choice, notice, collection from an individual will not apply to data collected or processed in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy Officers&lt;/b&gt;: Unlike the 2011 Bill, the 2014 Bill defines the role of the privacy officer that must be established by every data controller for the purpose of overseeing the security of personal data and implementation of the provisions of the Act.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Power of Authority to Exempt: &lt;/b&gt; Both the 2011 Bill and 2014 Bill contain provisions that enable the Authority to waive the applicability of specific provisions of the Act. The circumstances on which this can be done are based on the exceptions to the Right to Privacy in both the 2011 and 2014 Bill. To this extent, the 2014 Bill differs slightly from the 2011 Bill, by removing the power of the Authority to exempt for the ‘detection of crime’ and ‘any other legitimate purpose mentioned in this Act’ .&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The Data Protection Authority:&lt;/b&gt; The 2011 Bill and 2014 Bill both establish Data Protection Authorities, but the 2014 Bill further clarifies certain aspects of the functioning of the Authority and expands the functions and the powers of the Authority.  For example, new functions of the Authority include:&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Auditing any or all personal data controlled by the data controller to assess whether it is being maintained in accordance with the Act, &lt;/li&gt;
&lt;li&gt; Suggesting international instruments relevant to the administration of the Act,&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Encouraging industry associations to evolve privacy standards for self regulations, adjudicating on disputes arising between data controllers or between individuals and data controllers.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Bill also expands the powers of the Data Protection Authority – importantly giving him the power to receive, investigate complaints about alleged violations of privacy and issue appropriate orders or directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, the 2014 Bill carves out an exception for Government Intelligence Agencies and Law Enforcement agencies – preventing the Authority from conducting investigations, issuing appropriate orders or directions, and adjudicating complaints in respect to actions taken by the Government Intelligences Agencies and Law Enforcement,  if for the objectives of  (a) sovereignty, integrity or security of India; or(b) strategic, scientific or economic interest of India; or(c) preventing incitement to the commission of any offence, or (d) prevention of public disorder, or(e) the investigation of any crime; or (f) protection of rights and freedoms of others; or (g) friendly relations with foreign states; or (h) any other legitimate purpose mentioned in this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This power is instead vested with a court of competent jurisdiction.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The National Data Controller Registry&lt;/b&gt;: The 2014 Bill removes the National Data Controller Registry and requirements for data controllers to register themselves and oversight of the Registry by the Data Protection Authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Direct Marketing: &lt;/b&gt;Both the 2011 and 2014 Bills contain provisions regulating the use of personal information for direct marketing purposes. Though the provisions are broadly the same, the 2011 Bill envisions that no person will undertake direct marketing unless he/she is registered in the ‘National Data Registry’  and one of the stated purposes is direct marketing. As the 2014 Bill removes the National Data Registry, the 2014 Bill now requires that any person undertaking direct marketing must have on record where he/she has obtained personal data from.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Interception of Communications&lt;/b&gt;: Though maintaining some of the safeguards defined in the 2011 Bill for interception,  2014 Bill changes  the interception regime envisioned in the 2011 Bill by carving out a wide exception for organizations monitoring the electronic mail of employees,  removing provisions requiring the interception take place only for the minimum period of time required for achieving the purposes, and removing provisions excluding the use of intercepted communications as evidence in a court of law. Similar to the 2011 Bill, the 2014 Bill specifies that the principles of notice, choice and consent, access and correction, and openness will not apply to the interception of communications.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Video Recording Equipment in public places&lt;/b&gt;: Unlike the 2011 Bill, which addressed only the use of CCTV’s, the 2014 Bill addresses the installation and use of video recording equipment in public places. Though both the 2011 Bill and 2014 Bill both prevent the use of recording equipment and CCTVs for the purpose of identifying an individual, monitoring his personal particulars, or revealing personal, or otherwise adversely affecting his right to privacy - the 2014 Bill requires that the use of recording equipment must be in accordance with procedures, for a legitimate purpose, and proportionate to the objective for which the equipment was installed. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The 2014 Bill makes a broad exception to these safeguards for law enforcement agencies and government intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific, or economic interest of India.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Privacy Standards and Self Regulation&lt;/b&gt;: The 2014 Bill establishes a specific mechanism of self regulation where industry associations will develop privacy standards and adhere to them.  For this purpose, an industry ombudsman should be appointed. The standards must be in conformity with the National Privacy Principles and the provisions of the Privacy Bill. The developed standards will be submitted to the Authority and the Authority may frame regulations based on the standards. If an industry association has not developed privacy standards, the Authority may frame regulations for a specific sector.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Settlement of Disputes and Appellate Tribunal:&lt;/b&gt; The 2014 Bill makes significant change to the process for settling disputes from the 2011 Bill. In the 2014 Bill an Alternative Dispute Mechanism is established where disputes between individuals and data controllers are first addressed by the Privacy Officer of each Data Controller or the industry level Ombudsman. If individuals are not satisfied with the decision of the Ombudsman they may take the complaint to the Authority. Individuals can also take the complaint directly to the Authority if they wish.  If an individual is aggrieved with the decision of the Authority, by a privacy officer or ombudsman through the Alternative Dispute Resolution mechanism, or by the adjudicating officer of the Authority, they may approach the Appellate Tribunal. Any order from the Appellate Tribunal can be appealed at a high court. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;In the 2011 Bill disputes between the data controller and an individual can be taken directly to the Appellate Tribunal and orders from the Authority can be appealed at the Tribunal. There is not further path for appeal to an order of the tribunal.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Offences and Penalties:&lt;/b&gt; The 2014 Bill changes the structure of the offences and penalties section by breaking the two into separate sections - one addressing offences and one addressing penalties while the 2011 Bill addressed offences and penalties in the same section. &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Offences&lt;/b&gt;: The 2014 Bill penalizes every offence with imprisonment and a fine and empowers a police officer not below the rank of Deputy Superintendent of Police to investigate any offence, limits the courts ability to take cognizance of an offence to only those brought by the Authority, requires that the Court be no lower than a Chief Metropolitan Magistrate or a Chief Judicial Magistrate, and permits courts to compound offences. The 2014 Bill further specifies that any offence that is punishable with three years in prison and above is cognizable, and offences punishable with three years in prison are bailable. . Under the 2014 Bill offences are defined as:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Unauthorized interception of communications &lt;/li&gt;
&lt;li&gt;Disclosure of intercepted communications &lt;/li&gt;
&lt;li&gt;Undertaking unauthorized Covert Surveillance &lt;/li&gt;
&lt;li&gt;Unauthorized use of disclosure of communication data &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The offences defined under the Act are reflected in the 2011 Bill, but the time in prison and fine is higher in the 2014 Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Penalties&lt;/b&gt;: The 2014 Bill provides a list of penalties including:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Penalty for obtaining personal data on false pretext&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Penalty for violation of conditions of license pertaining to maintenance of secrecy and confidentiality by telecommunications service providers &lt;/li&gt;
&lt;li&gt;Penalty for disclosure of other personal information &lt;/li&gt;
&lt;li&gt;Penalties for contravention of directions of the Authority &lt;/li&gt;
&lt;li&gt;Penalties for data theft &lt;/li&gt;
&lt;li&gt;Penalties for unauthorised collection, processing, and disclosure of personal data&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Penalties for unauthorized use of personal data for direction marketing. These penalties reflect the penalties in the 2011 bill, but prescribe higher fines&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Adjudicating Officer&lt;/b&gt;: Unlike the 2011 Bill that did not have in place an adjudicating officer, the 2014 Bill specifies that the Chairperson of the Authority will appoint a Member of the Authority not  below the Rank of Director of the Government of India to be an adjudicating officer. The adjudicating officer will have the power to impose a penalty and will have the same powers as vested in a civil court under the Code of Civil Procedure. Every proceeding before the adjudicating officer will be considered a judicial processing. When adjudicating the officer must take into consideration the amount of disproportionate gain or unfair advantage, the amount of loss caused, the respective nature of the default&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Civil Remedies and compensation&lt;/b&gt;: Both the 2011 and 2014 Bill contain provisions that permit an individual to pursue a civil remedy, but the 2014 Bill limits these instances to - if loss or damage has been suffered or an adverse determination is made about an individual due to negligence on complying with the Act, and provides for the possibility that the contravening parties will have to provide a public notice of the offense. &lt;br /&gt;&lt;br /&gt;The 2014 Bill removes provisions specifying that individuals that have suffered loss due to a contravention by the data controller of the Act are entitled to compensation.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Exceptions for intelligence agencies&lt;/b&gt;:  Unlike the 2011 Bill, the 2014 Bill includes an exception for Government Intelligence Agencies and Law Enforcement Agencies – stating that the Authority will not have the power to conduct investigations, issue appropriate orders and directions or otherwise adjudicate complaints in respect of action taken by the Government intelligence agencies and Law  Enforcement agencies for achieving any of the objectives that reflect the defined exceptions to privacy.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;&lt;ol&gt; &lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society welcomes many of the changes that are reflected in the Privacy Bill 2014, but are cautious about the wide exceptions that have been carved out for law enforcement and intelligence agencies in the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the Report of Group of Expert s on Privacy was developed for the purpose of informing a privacy framework for India. As such the Centre for Internet and Society will be analyzing in upcoming posts the draft Privacy Bill 2014 and the recommendations in the Report of the Group of Experts on Privacy.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011'&gt;https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-01T10:52:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/files/analysis-of-cloud-act-and-implications-for-india">
    <title>Analysis of CLOUD Act and Implications for India</title>
    <link>https://cis-india.org/internet-governance/files/analysis-of-cloud-act-and-implications-for-india</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/files/analysis-of-cloud-act-and-implications-for-india'&gt;https://cis-india.org/internet-governance/files/analysis-of-cloud-act-and-implications-for-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-08-22T14:53:50Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid">
    <title>SCOSTA and UID Comparison not Valid, says Finance Committee</title>
    <link>https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid</link>
    <description>
        &lt;b&gt;The Standing Committee on Finance Branch, Lok Sabha Secretariat has responded to the suggestions offered by CIS on the National Identification Authority of India, Bill 2010 and has requested it to mail its views by 14 October 2011.&lt;/b&gt;
        
&lt;p&gt;On January 6, 2011, CIS had sent an &lt;a href="https://cis-india.org/internet-governance/blog/blog/privacy/letter-to-finance-committee" class="external-link"&gt;open letter to the Parliamentary Finance Committee&lt;/a&gt; demonstrating how the Aadhaar biometric standard is weaker than the SCOSTA standard. The text of the reply is reproduced below.&lt;/p&gt;
&lt;p&gt;Sir,&lt;/p&gt;
&lt;p&gt;This is in response to one of the views/suggestions offered by CIS on the National Identification Authority of India Bill, 2010.&lt;/p&gt;
&lt;h3&gt;CIS View /Suggestion:&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;"Though the Aadhaar biometrics are useful for the de-duplication and identification of individuals, the Smart Card Operating System for Transport Application [(SCOSTA), developed by the National Informatics Centre in India)] standard is a more secure, structurally sound, and cost-effective approach to authentication of identity for India. Therefore, the Aadhaar biometric based authentication process should be replaced with a SCOSTA standard based authentication process."&lt;/p&gt;
&lt;p&gt;In this regard, do you agree with the following view? If not, please justify.&lt;/p&gt;
&lt;p&gt;"Comparison between SCOSTA and the UID project are not valid since SCOSTA is fundamentally a standard for smart card based authentication and does not work for the objectives of the unique id project.&lt;/p&gt;
&lt;p&gt;The UID project follows a different approach and has multiple objectives — providing identity to residents of India, ensuring inclusion of poor and marginalized residents in order to enable access to benefits and services, eliminating the fakes, duplicates and ghost identities prevalent in other databases and provide a platform for authentication in a cost effective and accessible manner.&lt;/p&gt;
&lt;p&gt;UIDAI is not issuing cards or smart cards. Cards can be issued by agencies that are providing services. UID authentication does not exclude smart cards — service providers can still choose to issue smart&amp;nbsp;cards to their beneficiaries or customers if they want to."&lt;/p&gt;
&lt;p&gt;You are requested to email your view by 14 October, 2011 positively.&lt;/p&gt;
&lt;p&gt;Standing Committee on Finance Branch&lt;br /&gt;Lok Sabha Secretariat&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid'&gt;https://cis-india.org/internet-governance/blog/scosta-uid-comparison-invalid&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-22T16:37:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-suresh-ramasubramanian">
    <title>An Interview with Suresh Ramasubramanian </title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-suresh-ramasubramanian</link>
    <description>
        &lt;b&gt;Suresh Ramasubramanian is the ICS Quality Representative - IBM SmartCloud at IBM. We from the Centre for Internet and Society conducted an interview on cybersecurity and issues in the Cloud. &lt;/b&gt;
        &lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;You have done a lot of work around cybersecurity and issues in the Cloud. Could you please tell us of your experience in these areas and the challenges facing them?&lt;/b&gt;&lt;br /&gt;a. I have been involved in antispam activism from the late 1990s and have worked in ISP / messaging provider antispam teams since 2001. Since 2005, I expanded my focus to include general cyber security and privacy, having written white papers on spam and botnets for the OECD, ITU and UNDP/APDIP. More recently, have become a M3AAWG special advisor for capacity building and outreach in India.&lt;br /&gt;&lt;br /&gt;In fact capacity building and outreach has been the focus of my career for a long time now. I have been putting relevant stakeholders from ISPs, government and civil society in India in touch with their counterparts around the world, and, at a small level, enabling an international exchange of ideas and information around antispam and security.&lt;br /&gt;&lt;br /&gt;This was a challenge over a decade back when I was a newbie to antispam and it still is. People in India and other emerging economies, with some notable exceptions, are not part of the international communities that have grown in the area of cyber security and privacy.&lt;br /&gt;&lt;br /&gt;There is a prevalent lack of knowledge in this area, which combined with gaps in local law and its enforcement. There is a tendency on the part of online criminals to target emerging and fast growing economies as a rich source of potential victims for various forms of online crime, and sometimes as a safe haven against prosecution.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;In a recent public statement Google said "Cloud users have no legitimate expectation of privacy. Do you agree with this statement?&lt;/b&gt;&lt;br /&gt;a. Let us put it this way. All email received by a cloud or other Internet service provider for its customers is automatically processed and data mined in one form or the other. At one level, this can be done for spam filtering and other security measures that are essential to maintain the security and stability of the service, and to protect users from being targeted by spam, malware and potential account compromises.&lt;br /&gt;&lt;br /&gt;The actual intent of automated data mining and processing should be transparently provided to customers of a service, with a clearly defined privacy policy, and the deployment of such processing, and the “end use” to which data mined from this processing is put, are key to agreeing or disagreeing with such a statement.&lt;br /&gt;&lt;br /&gt;It goes without saying that such processing must stay within the letter, scope and spirit of a company’s privacy policy, and must actually be structured to be respectful of user privacy.&lt;br /&gt;&lt;br /&gt;Especially where mined data is used to provide user advertising or for any other commercial purpose (such as being aggregated and resold), strict adherence to a well written privacy policy and periodic review of this policy and its implementation to examine its compliance to laws in all countries that the company operates in are essential.&lt;br /&gt;&lt;br /&gt;There is way too much noise in the media for me to usefully add any more to this issue and so I will restrict myself to the purely general comments above.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;What ways can be privacy of an individual be compromised on the cloud? What can be done to prevent such instances of compromise?&lt;/b&gt;&lt;br /&gt;a. All the recent headlines about companies mining their own users’ data, and yet more headlines about different countries deploying nationwide or even international lawful intercept and wiretap programs, aside, the single largest threat to individual privacy on the cloud is, and has been for years before the word “cloud” came into general use, the constant targeting of online users by online criminals with a variety of threats including scams, phish campaigns and data / account credential stealing malware.&lt;br /&gt;&lt;br /&gt;Poor device security is another threat – one that becomes even more of a serious problem when the long talked about “internet of things” seems set to become reality, with cars, baby monitors, even Bluetooth enabled toilets, and more dangerously, critical national infrastructure such as power plants and water utilities becoming accessible over the Internet but still running software that is basically insecure and architected with assumptions that date back to an era when there was no conception or need to connect these to the Internet.&lt;br /&gt;&lt;br /&gt;Someone in Bluetooth range with the appropriate android application being able to automatically flush your toilet and even download a list of the dates and times when you last used it is personally embarrassing. Having your bank account broken into because your computer got infected with a virus is even more damaging. Someone able to access a dam’s control panel over the internet and remotely trigger the dam’s gates to open can cause far more catastrophic damage.&lt;br /&gt;&lt;br /&gt;The line between security and privacy, between normal business practice and unacceptable, even illegal behaviour, is sometimes quite thin and in a grey area that may be leveraged to the hilt for commercial and/or national security interests. However, scams, malware, exploits of insecure systems and similar threats are well on the wrong side of the “criminal” spectrum, and are a clear and present danger that cause far more than an embarrassing or personally damaging loss of privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;How is the jurisdiction of the data on the cloud determined?&lt;/b&gt;&lt;br /&gt;This is a surprisingly thorny question. Normally, a company is based in a particular country and has an end user agreement / terms of service that makes its customers / users accept that country’s jurisdiction.&lt;br /&gt;&lt;br /&gt;However, a cloud based provider that does business around the world may, in practice, have to comply to some extent at least, with that country’s local laws – at any rate, in respect to its users who are citizens of that country. And any cloud product sold to a local business or individual by a salesman from the vendor’s branch in the country would possibly fall under a contract executed in the country and therefore, subject to local law.&lt;br /&gt;&lt;br /&gt;The level of compliance for data retention and disclosure in response to legal processes will possibly vary from country to country – ranging from flat refusals to cooperate (especially where any law enforcement request for data are for something that is quite legal in the country the cloud provider is based in) to actual compliance.&lt;br /&gt;&lt;br /&gt;In practice this may also depend on what is at stake for the cloud vendor in complying or refusing to comply with local laws – regardless of what the terms of use policies or contract assert about jurisdiction. The number of users the cloud vendor has in the country, the extent of its local presence in the country, how vulnerable its resident employees and executives are to legal sanctions or punishment.&lt;br /&gt;&lt;br /&gt;In the past, it has been observed that a practical balance [which may be based on business economics as much as it is based on a privacy assessment] may be struck by certain cloud vendors with a global presence, based on the critical mass of users it stands to gain or lose by complying with local law, and the risks it faces if it complies, or conversely, does not comply with local laws – so the decision may be to fight lawsuits or prosecutions on charges of breaking local data privacy laws or not complying with local law enforcement requests for handover of user data in court, or worst case, pulling out of the country altogether.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Currently, big cloud owners are US corps, yet US courts do not extend the same privacy rights to non US citizens. Is it possible for countries to use the cloud and still protect citizen data from being accessed by foreign governments? Do you think a "National Cloud" is a practical solution?&lt;/b&gt;&lt;br /&gt;a. The “cloud” in this context is just “the internet”, and keeping local data local and within local jurisdiction is possible in theory at any rate. Peering can be used to keep local traffic local instead of having it do a roundtrip through a foreign country and back [where it might or might not be subject to another country’s intercept activities, no comment on that].&lt;br /&gt;&lt;br /&gt;A national cloud demands local infrastructure including bandwidth, datacenters etc. that meet the international standards of most global cloud providers. It then requires cloud based sites that provide an equivalent level of service, functionality and quality to that provided by an international cloud vendor. And then after that, it has to have usable privacy policies and the country needs to have a privacy law and a sizeable amount of practical regulation to bolster the law, a well-defined path for reporting and redress of data breaches. There are a whole lot of other technical and process issues before having a national cloud becomes a reality, and even more before such a reality makes a palpable positive difference to user privacy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;What audit mechanisms of security and standards exist for Cloud Service Providers and Cloud Data Providers?&lt;/b&gt;&lt;br /&gt;a. Plenty – some specific to the country and the industry sector / kind of data the cloud handles. The Cloud Security Alliance has been working for quite a while on CloudAudit, a framework developed as part of a cross industry effort to unify and automate Assertion, Assessment and Assurance of their infrastructure and service.&lt;br /&gt;&lt;br /&gt;Different standards bodies and government agencies have all come out with their own sets of standards and best practices in this area (this article has a reasonable list - &lt;a class="external-link" href="http://www.esecurityplanet.com/network-security/cloud-security-standards-what-youshould-know.html"&gt;http://www.esecurityplanet.com/network-security/cloud-security-standards-what-youshould-know.html&lt;/a&gt;). Some standards you absolutely have to comply with for legal reasons.&lt;br /&gt;&lt;br /&gt;Compliance reasons aside, a judicious mix of standards, and considerable amounts of adaptation in your process to make those standards work for you and play well together.&lt;br /&gt;&lt;br /&gt;The standards all exist – what varies considerably, and is a major cause of data privacy breaches, are incomplete or ham handed implementations of existing standards, any attempt at “checkbox compliance” to simply implement a set of steps that lead to a required certification, and a lack of continuing initiative to keep the data privacy and securitymomentum going once these standards have been “achieved”, till it is time for the next audit at any rate.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;What do you see as the big challenges for privacy in the cloud in the coming years?&lt;/b&gt;&lt;br /&gt;a. Not very much more than the exact same challenges for privacy in the cloud over the past decade or more. The only difference is that any threat that existed before has always amplified itself because the complexity of systems and the level of technology and computing power available to implement security, and to attempt to breach security, is exponentially higher than ever before – and set to increase as we go further down the line.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Do you think encryption the answer to the private and public institutions snooping?&lt;/b&gt;&lt;br /&gt;a. Encryption of data at rest and in transit is a key recommendation of any data privacy standard and cloud / enterprise security policy. Companies and users are strongly encouraged to deploy and use strong cryptography for personal protection. But to call it “the answer” is sort of like the tale of the blind men and the elephant.&lt;br /&gt;&lt;br /&gt;There are multiple ways to circumvent encryption – social engineering to trick people into revealing data (which can be mitigated to some extent, or detected if it is tried on a large cross section of your userbase – it is something that security teams do have to watch for), or just plain coercion, which is much tougher to defend against.&lt;br /&gt;&lt;br /&gt;As a very popular &lt;a class="external-link" href="http://xkcd.com/538/"&gt;XKCD&lt;/a&gt; cartoon that has been shared around social media and has been cited in multiple security papers says -&lt;br /&gt;&lt;br /&gt;“A crypto nerd’s imagination”&lt;br /&gt;&lt;br /&gt;“His laptop’s encrypted. Let us build a million dollar cluster to crack it”&lt;br /&gt;“No good! It is 4096 bit RSA”&lt;br /&gt;“Blast, our evil plan is foiled”&lt;br /&gt;&lt;br /&gt;“What would actually happen”&lt;br /&gt;“His laptop’s encrypted. Drug him and hit him with this $5 wrench till he tells us the password”&lt;br /&gt;“Got it”&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Spam is now consistently used to get people to divulge their personal data or otherwise compromise a persons financial information and perpetuate illegal activity. Can spam be regulated? If so, how?&lt;/b&gt;&lt;br /&gt;a. Spam has been regulated in several countries around the world. The USA has had laws against spam since 2003. So has Australia. Several other countries have laws that specifically target spam or use other statutes in their books to deal with crime (fraud, the sale of counterfeit goods, theft..) that happens to be carried out through the medium of spam.&lt;br /&gt;&lt;br /&gt;The problems here are the usual problems that plague international enforcement of any law at all. Spammers (and worse online criminals including those that actively employ malware) tend to pick jurisdictions to operate in where there are no existing laws on their activities, and generally take the precaution not to target residents of the country that they live in. Others send spam but attempt to, in several cases successfully, skate around loopholes in their country’s antispam laws.&lt;br /&gt;&lt;br /&gt;Still others fully exploit the anonymity that the Internet provides, with privately registered domain names, anonymizing proxy servers (when they are not using botnets of compromised machines), as well as a string of shell companies and complex international routing of revenue from their spam campaigns, to quickly take money offshore to a more permissible jurisdiction.&lt;br /&gt;&lt;br /&gt;Their other advantage is that law enforcement and regulatory bodies are generally short staffed and heavily tasked, so that even a spammer who operates in the open may continue his activities for a very long time before someone manages to prosecute him.&lt;br /&gt;&lt;br /&gt;Some antispam laws allow recipients of spam to sue the spammer in small claims courts – which, like regulatory action, has also previously led to judgements being handed out against spammers and their being fined or possibly imprisoned in case their spam has criminal aspects to it, attracting local computer crime laws rather than being mere violations of civil antispam laws.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;There has been a lot of talk about the use of malware like FinFisher and its ability to compromise national security and individual security. Do you think regulation is needed for this type of malware - and if so what type - export  controls? privacy regulation? Use control?&lt;/b&gt;&lt;br /&gt;a. Malware used by nation states as a part of their surveillance activities is a problem. It is further a problem if such malware is used by nation states that are not even nominally democratic and that have long standing records of human rights violations.&lt;br /&gt;&lt;br /&gt;Regulating or embargoing their sale is not going to help in such cases. One problem is that export controls on such software are not going to be particularly easy and countries that are on software export blacklists routinely manage to find newer and more creative ways to attempt to get around these and try to purchase embargoed software and computing equipment of all kinds.&lt;br /&gt;&lt;br /&gt;Another problem is that such software is not produced just by legitimate vendors of lawful intercept gear. Criminals who write malware that is capable of, say, stealing personal data such as bank account credentials are perfectly capable of writing such software, and there is a thriving underground economy in the sale of malware and of “take” from malware such as personal data, credit cards and bank accounts where any rogue nation state can easily acquire products with an equivalent functionality.&lt;br /&gt;&lt;br /&gt;This is going to apply even if legitimate vendors of such products are subject to strict regulations governing their sale and national laws exist regulating the use of such products. So while there is no reason not to regulate / provide judicial and regulatory oversight of their sale and intended use, it should not be seen as any kind of a solution to this problem.&lt;br /&gt;&lt;br /&gt;User education in privacy and access to secure computing resources is probably going to be the bedrock of any initiative that looks to protect user privacy – a final backstop to any technical / legal or other measure that is taken to protect them.&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-suresh-ramasubramanian'&gt;https://cis-india.org/internet-governance/blog/interview-with-suresh-ramasubramanian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-06T09:37:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi">
    <title>A Privacy Meeting with the Federal Trade Commission in New Delhi</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi</link>
    <description>
        &lt;b&gt;On September 20, the Centre for Internet and Society held a roundtable meeting with Betsy Broder, Counsel for International Consumer Protection, and Sarah Schroeder, Attorney, Bureau of Consumer Protection, Federal Trade Commission (FTC), United States. The meeting took place at the Imperial, Janpath, New Delhi and discussed both the U.S framework to privacy and potential frameworks and challenges to privacy in India.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;As a note, thoughts shared during the meeting represented personal perspectives, and did not constitute the official position of the Federal Trade Commission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When explaining the U.S regulatory framework for privacy the FTC attorneys highlighted that the United States does not have comprehensive privacy legislation, like in Europe,  but instead has  sectoral laws that address different aspects of privacy. For example, the Fair Credit Reporting Act maintains confidentiality of consumer credit report information, the Gramm Leach Bliley Act imposes privacy and security requirements for financial institutions, HIPAA applies to patient health information,  and the Children’s Online Privacy Protection Act prevents the collection and posting of personal information from minors.  It was discussed that the sectoral model followed by the United States allows for a nuanced balance to be struck between privacy protection and the market.  It was noted, however, that some have critiqued the U.S. regulatory framework for lacking clear principles that apply to the commercial world and lay out strong privacy protections for the individual. In light of this, the White House is developing a Privacy Bill of Rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Federal Trade Commission is an independent agency in the United States Government with responsibility for enforcing both consumer protection and competition laws. It is composed of five commissioners, and a staff of roughly 1,000, which includes attorneys and economists. The FTC is primarily a law enforcement agency, but also undertakes policy development through workshops and reports, Consumer education is another key function of the agency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the consumer protection side, Congress has directed the FTC to enforce the Federal Trade Commission Act, as well as some more specific statutes, such as those that protect consumers from unwanted telemarketing laws, and the protection of children on line.  Its main objectives are to protect consumer interests, and prevent fraud and unfair and deceptive business practices. The FTC carries out its privacy work through its consumer protection mission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When understanding the FTC’s role in relation to privacy, it is important to understand that the FTC’s jurisdiction applies only to certain industries as defined by Congress. Thus, for example, the FTC does not have jurisdiction over banks or telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most critical part of the FTC’s activities is its law enforcement function.  The FTC can investigate an organization if the staff believes that the entity may be involved in conduct that contravenes the FTC Act’s prohibition on unfair or deceptive practices, or another specific privacy law. The FTC has brought a number of privacy-related cases against major companies including Facebook, Google, ChoicePoint, and Twitter.  Many of these cases address new challenges brought about by rapidly changing technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The vast majority of the FTC’s actions have been settled with consent judgments.  When the statute that the FTC enforces allows for the imposition of a civil penalty, the FTC sets the penalty at a level that ensures that it is fair and provides a deterrent, but will not impose a hardship on the company.  As a civil enforcement agency, the FTC cannot seek criminal sanctions. While enforcement is the cornerstone of the FTC’s approach to privacy, the agency also supports self-regulation, where appropriate.  In this system the FTC does not pre-approve an organization’s practices or define principles that all companies should abide by as it is felt that every organization is unique and has different needs and abilities, and assigning specific technical standards may stifle innovation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the meeting it was also discussed how US privacy laws may apply to overseas companies where they are providing services for US consumers or working on behalf of US companies.  For example, under the Gramm Leach Bliley Act the FTC has created the Safeguards Rule, which speaks to how financial data by financial institutions must be handled and protected.  This Rule applies to companies overseas if the company is performing work for US companies or US consumers.  In other words, a US company cannot avoid compliance by outsourcing its work to an off shore organization.    Discussions during the meeting also focused on consent and the key role that context, accessibility, and timing play in ensuring individuals have the ability to provide informed consent.  Some of the attendees suggested that this  practice  could be greatly improved in India. For example, currently in India there are companies that only provide consumers access to the company privacy policy after an individual has consented and signed up to the service.  When asked about the challenges to privacy that exist in India, many shared that, culturally, there is a different understanding of privacy in India than in many western countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other thoughts included that the Indian government is currently imagining privacy regulation as being either fluid and purely self regulatory or being enforced through strict legal provisions.  Instead, the government needs to begin to expand the possibilities for a regulatory framework for privacy in India in such a way that allows for strong legal enforcement, and flexible standards.  The right to be forgotten was also discussed and it was mentioned that California has proposed a law that will allow individuals to request deletion of information.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi'&gt;https://cis-india.org/internet-governance/blog/privacy-meeting-with-ftc-new-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-03T10:25:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights">
    <title>Security and Surveillance – Optimizing Security while Safeguarding Human Rights</title>
    <link>https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) on December 19, 2014 held a talk on “Security and Surveillance – Optimizing Security while Safeguarding Human Rights.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The talk focused on a project that is being undertaken by CIS in collaboration with Privacy International, UK. Initiated in 2014, the project seeks to study the regulatory side of surveillance and related technologies in the Indian context. The main objective of the project is to initiate dialogue on surveillance and security in India, government regulation, and the processes that go into the same. The talk saw enthusiastic participation from civil society members, policy advisors on technology, and engineering students.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the event it was highlighted that requirements of judicial authorization, transparency and proportionality are currently lacking in the legal regime for surveillance in India and at the same time India has a strong system of ‘security’ that service providers must adhere to – which works towards enhancing cyber security in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Discussions played out with regard to how most of the nine intelligence agencies that are authorized to intercept information in India are outside the ambit of parliamentary oversight, the RTI and the CAG, making them virtually unaccountable to the Indian public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another conversation focused on the sharing of information between various intelligence agencies within the country, and the fact that this area is virtually unregulated. The discussion then steered to cyber-security in general, emerging technologies used by the Government of India for surveillance, cooperative agreements for surveillance technologies that India has with other countries, the export and import of such technologies from India, and most importantly, the role of service providers in the surveillance debate, and the regulations they are subject to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A common theme seemed to be emerging from the discussion was that the agencies responsible for regulating information interception and surveillance in the country are shockingly unaccountable to the Indian public. As an active civil society member noted today - &lt;i&gt;“There is no oversight/monitoring of the agencies themselves, so there’s no way anyone would even know of how many instances of surveillance or unauthorized interception have actually occurred.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The talk successfully concluded with inputs from members of the audience, and a broad consensus on the fact that the Government of India would have to adhere to stronger regulatory standards, harmonized surveillance standards, stronger export and import certification standards, etc., in order to make surveillance in India more transparent and accountable. As was stated at the talk, &lt;i&gt;“We don’t have a problem with the concept of surveillance per se, - it has more to do with its problematic implementation”.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights'&gt;https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-02-13T02:41:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf">
    <title>Export and Import of Security Technologies in India: Q&amp;A</title>
    <link>https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf'&gt;https://cis-india.org/internet-governance/blog/export-and-import-of-security-technologies-in-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T02:41:05Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/interview-with-anne-cavoukian">
    <title>An Interview with Dr. Ann Cavoukian, Information and Privacy Commissioner, Ontario, Canada</title>
    <link>https://cis-india.org/internet-governance/interview-with-anne-cavoukian</link>
    <description>
        &lt;b&gt;Elonnai Hickok interviewed Dr. Ann Cavoukian, Information and Privacy Commissioner, Ontario, Canada. The full interview is reproduced below.&lt;/b&gt;
        
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;When Canada weighed a broad privacy legislation against sectoral legislation, was the decision close?&amp;nbsp; What were the most decisive factors?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Canada’s legislative privacy regime consists of both broad and sectoral privacy legislation.&lt;br /&gt;&lt;br /&gt;Broadly, the use of personal information in Canadian commercial activities is regulated by federal legislation under the &lt;em&gt;&lt;a class="external-link" href="http://www.priv.gc.ca/leg_c/leg_c_p_e.cfm"&gt;Personal Information Protection and Electronic Documents Act (PIPEDA)&lt;/a&gt;&lt;/em&gt;, or by provincial legislation that is “substantially similar” to PIPEDA, or by provincial legislation that is “substantially similar” to &lt;em&gt;PIPEDA&lt;/em&gt;.&lt;br /&gt;&lt;br /&gt;Sectorally, a prime example is the protection of personal health information under Ontario's &lt;em&gt;&lt;a class="external-link" href="http://www.e-laws.gov.on.ca/html/statutes/english/elaws_statutes_04p03_e.htm"&gt;Personal Health Information Protection Act, 2004 (PHIPA)&lt;/a&gt;&lt;/em&gt;.&lt;br /&gt;&lt;br /&gt;Regarding the decisive factors surrounding Parliament's passing of a broad private sector privacy statute, you may know that oversight of PIPEDA falls within the jurisdiction of the &lt;a class="external-link" href="http://www.priv.gc.ca/leg_c/leg_c_p_e.cfm"&gt;Office of the Privacy Commissioner of Canada (OPC)&lt;/a&gt;. Accordingly, you may wish to focus your contact with the OPC regarding your question.&amp;nbsp; In addition, &lt;a class="external-link" href="http://www.ic.gc.ca/ic_wp-pa.htm"&gt;Industry Canada&lt;/a&gt; may have some helpful resources regarding the federal government’s decision to enact &lt;em&gt;PIPEDA&lt;/em&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Do you see the different perceptions and cultural understandings of privacy as something to be addressed through legislation?&amp;nbsp; If not, do you think it should be addressed at all?&amp;nbsp; How? &lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;In an era marked by the widespread use of new information technologies, globalization, and the international flow of personal information, the establishment of global privacy standards is required to effectively protect personal privacy. Fortunately, an international community of data protection commissioners is hard at work contributing to the establishment of a set of global privacy principles. At the annual International Data Protection Commissioners Conference in 2005, Dr. Ann Cavoukian, Information and Privacy Commissioner of Ontario, chaired a Working Group of Data Protection Commissioners that led to the &lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/gps.pdf"&gt;Creation of a Global Privacy Standard&lt;/a&gt;. Such a principled but flexible approach can also be seen, for example, in the landmark &lt;a class="external-link" href="http://www.privacybydesign.ca/content/uploads/2010/11/pbd-resolution.pdf"&gt;&lt;em&gt;Privacy by Design&lt;/em&gt; (PbD) resolution&lt;/a&gt; adopted unanimously, in 2010, by the international Privacy Authorities and Regulators at the International Conference of Data Protection and Privacy Commissioners in Jerusalem.&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The resolution recognizes &lt;em&gt;&lt;a class="external-link" href="http://privacybydesign.ca/about/principles/"&gt;PbD&lt;/a&gt;&lt;/em&gt; as an “essential component of fundamental privacy protection” – an International Standard, and urges its adoption in regulations and legislation around the world. Governments that employ this internationally recognized standard will be able to both protect privacy and address local and national priorities.&lt;a name="fr2" href="#fn2"&gt;[2]&lt;br /&gt;&lt;br /&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;How does the Canadian model implement self-regulation of privacy standards? How is that balanced against legal enforcement of privacy legislation?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;In Canada, as elsewhere, private sector privacy regulation recognizes the dual purposes of protecting the individual's right to privacy, on the one hand, and recognizing the commercial need for access to personal information, on the other.&lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt;&lt;em&gt;&lt;br /&gt;&lt;br /&gt;PIPEDA&lt;/em&gt; furthers these two purposes by tying a set of flexible, technology-neutral privacy principles to a statutory framework of rules governing the collection, use, and disclosure of personal information.&lt;br /&gt;&lt;br /&gt;In particular, Part I of PIPEDA provides the overarching statutory framework, while Schedule I, which was borrowed from the Canadian Standards Association’s Model Code for the Protection of Personal Information, provides flexible, technology-neutral privacy principles.&amp;nbsp; To accomplish the dual purposes that animate PIPEDA and its Schedule, Canada’s Federal Court of Appeal has directed that the interpretation and application of this regulatory framework should be guided by "flexibility, common sense and pragmatism."&lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Such an approach allows organizations to address their own goals and priorities within a privacy protective framework.&amp;nbsp; Moreover, by incorporating the flexible principles of PbD, organizations can "go beyond mere legal compliance with notice, choice, access, security and enforcement requirements."&amp;nbsp; Instead, they can be empowered to design their own responsive approaches to risk management and privacy-related innovation, within the context of the relevant regulatory framework.&amp;nbsp; This approach allows organizations to develop doubly-enabling, positive-sum solutions that are win/win in nature and appropriate given the size and nature of the organization, the personal information it manages, and the range of risks, opportunities, and solutions available.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Does Canada favor private forms of redress or agency/state enforcement to prevent and remedy privacy violations?&amp;nbsp; In what circumstances is one more effective than the other?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Canadian privacy legislation includes both state enforcement and private forms of redress; neither is necessarily favoured.&lt;br /&gt;&lt;br /&gt;For example, under &lt;em&gt;PHIPA&lt;/em&gt;, the Attorney General may impose fines of up to $50,000 for individuals and $250,000 for corporations who are found to be in breach of &lt;em&gt;PHIPA&lt;/em&gt;. Further, our office has broad powers of investigation and can directly order a custodian to comply with its obligations.&amp;nbsp; An individual affected by a Commissioner’s final &lt;em&gt;PHIPA &lt;/em&gt;order may commence a proceeding in the Ontario Superior Court for damages for actual harm suffered.&lt;br /&gt;&lt;br /&gt;Another example is under &lt;em&gt;PIPEDA&lt;/em&gt; where contravention can result in fines of up to $100,000 depending upon the type and severity of the matter. Further, the federal privacy Commissioner has powers to investigate and report findings with respect to privacy complaints.&amp;nbsp; Following the release of the Commissioner’s report, a complainant may apply to the Federal Court to seek remedies that include damages and an order requiring an organization to correct its practices.&lt;br /&gt;&lt;br /&gt;Generally, fines and other penalties imposed on individuals and corporations by the government are effective in deterring certain actions and protecting the public from a variety of harmful practices.&amp;nbsp; On the other hand, a private right of action may be effective when a particular individual is harmed by an individual or corporation and is seeking damages to compensate or redress that particular harm.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;What types of privacy violations are the most common? How have these been addressed?&lt;br /&gt;&lt;/strong&gt;&lt;br /&gt;The most common types of privacy violations are inadvertent disclosures or privacy breaches of personal information, including personal health information.&amp;nbsp; In particular, these violations usually stem from the improper retention, transfer and disclosure of personal information.&lt;br /&gt;&lt;br /&gt;Privacy breaches are addressed in a variety of ways, depending on the type and amount of information disclosed.&amp;nbsp; For example, under &lt;em&gt;PHIPA&lt;/em&gt;, if health information is stolen, lost, or accessed by unauthorized persons, the health information custodian must notify the affected individual at the first reasonable opportunity and should take immediate steps to contain the breach.&amp;nbsp; Further, the Commissioner may order the health information custodian to take corrective action such as requiring the custodian to implement a certain procedure when handling personal health information or conduct privacy training.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;What forms of privacy education has Canada pursued?&amp;nbsp; What audiences have been targeted? Which efforts have been the most successful and why?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Canadian institutions and organizations have pursued a wide variety of privacy education initiatives including programs that award professional designations (e.g. &lt;a class="external-link" href="https://www.privacyassociation.org/certification/"&gt;IAPP&lt;/a&gt;, &lt;a class="external-link" href="http://capapa.org/"&gt;CAPAPA&lt;/a&gt;, &lt;a class="external-link" href="http://www.ipsi.utoronto.ca/"&gt;University of Toronto Identity, Privacy and Security Initiative&lt;/a&gt;, &lt;a class="external-link" href="http://www.extension.ualberta.ca/study/government-studies/iapp/"&gt;University of Alberta Program&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;Our Office has led a wide variety of educational initiatives to spread the word about privacy protection and freedom of information under our Ontario legislation. We have focused on a variety of audiences from the general public to individuals who deal with privacy and access to information issues as part of their daily professional role.&lt;br /&gt;&lt;br /&gt;Initiatives include frequent contact between our Information Officers and the public, and dozens of marketing materials geared to providing guidance (e.g. “&lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/circle-care.pdf"&gt;Circle of Care: Sharing of Personal Health Information for Health-Care purposes&lt;/a&gt;”, “&lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/hprivbreach-e.pdf"&gt;What to do When Faced With a Privacy Breach: Guidelines for the Health Sector&lt;/a&gt;”). Our Office has developed Educational Resource Guides (&lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Educational-Material/Educational-Material-Summary/?id=183"&gt;Grade 5&lt;/a&gt;, &lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Educational-Material/Educational-Material-Summary/?id=184"&gt;Grade 10&lt;/a&gt;, &lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Educational-Material/Educational-Material-Summary/?id=1110"&gt;Grades 11/12&lt;/a&gt;), which have been added to the formal Ontario curriculum to help teachers educate about privacy protection. Commissioner Cavoukian participates in extensive presentations and speeches at numerous conferences and events. As well, representatives from our Office reach out into the community to educate about our offerings and role (hospitals, conference, community events etc.). In addition, to educate Ontarians about privacy protection, the IPC also allots significant resources to many marketing initiatives including a &lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Newsletters/Newsletters-Summary/?id=1100"&gt;quarterly e-newsletter&lt;/a&gt;, video production, and social media outreach. Most recently, we circulated an &lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/IPC-Corporate/IPC-Corporate-Summary/?id=482"&gt;online tool kit &lt;/a&gt;(available via USB as well), to assist new Freedom of Information and Protection of Privacy Co-ordinators in the public sector. Most of our resources are available in English and French.&lt;br /&gt;&lt;br /&gt;Without a doubt, the IPC’s most successful educational effort thus far is in the area of PbD, now an international standard. This Ontario-made solution was created by Commissioner Cavoukian who has led the IPC in partnering with global stalwarts such as IBM, Intel, and Nokia to advance Privacy by Design, and to foster innovation in many fields, including &lt;a class="external-link" href="http://www.privacybydesign.ca/content/uploads/2011/02/pbd-olg-facial-recog.pdf"&gt;biometrics&lt;/a&gt;, the &lt;a class="external-link" href="http://www.privacybydesign.ca/content/uploads/2011/02/pbd-ont-smartgrid-casestudy.pdf"&gt;Smart Grid&lt;/a&gt; and even &lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/AVAwhite6.pdf"&gt;Targeted Advertising&lt;/a&gt;. &lt;em&gt;Privacy by Design&lt;/em&gt; knows no boundaries and makes sense for everyone — especially businesses. Not only is it cheaper to build in privacy before a breach occurs, it is also a compelling way to win the trust of clients and build a successful brand.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;What [have] proven to be [the main] challenges or obstacles to protecting privacy in Canada?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;The most common obstacle to protecting privacy is that key stakeholders hold on to misconceptions about privacy.&amp;nbsp; &lt;br /&gt;Misconception #1 – Privacy is dead or obsolete.&amp;nbsp; &lt;br /&gt;Misconception #2 – Privacy stops us from performing our job.&lt;br /&gt;Misconception #3 – With the massive growth of online social media, you cannot have both widespread connectivity and privacy.&lt;br /&gt;&lt;br /&gt;Not only do these misconceptions contradict each other, they are both dead wrong!&lt;br /&gt;&lt;br /&gt;Privacy is alive and well and more relevant than ever. Consider, for example, that the same technologies that serve to threaten privacy may also be enlisted to support it.&amp;nbsp; Properly understood, privacy is becoming increasingly critical to achieving success in the new economy.&amp;nbsp; In this environment, PbD offers a principled, flexible, and technology-neutral vehicle for engaging with privacy issues, and for resolving them in ways that support multiple outcomes in a full functionality, positive-sum, win-win scenario.&lt;br /&gt;&lt;br /&gt;It does so by ensuring that privacy is built in right up front, directly into the design specifications and architecture of new systems and processes.&amp;nbsp; &lt;em&gt;&lt;br /&gt;&lt;br /&gt;PbD&lt;/em&gt; seeks to accommodate all legitimate interests and objectives in a positive-sum “win-win” manner, not through a dated, zero-sum approach, where unnecessary trade-offs are made. PbD avoids the pretense of false dichotomies or unnecessary trade-offs, such as privacy vs. security, demonstrating that it is possible to have both. For more on PbD, go to &lt;a class="external-link" href="http://www.privacybydesign.ca/"&gt;www.privacybydesign.ca&lt;br /&gt;&lt;br /&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Dr. Ann Cavoukian, Ph.D., Information and Privacy Commissioner, Ontario, Canada&lt;/h3&gt;
&lt;p&gt;Dr. Ann Cavoukian is recognized as one of the leading privacy experts in the world. Noted for her seminal work on Privacy Enhancing Technologies (PETs) in 1995, her concept of Privacy by Design seeks to proactively embed privacy into the design specifications of information technology and accountable business practices, thereby achieving the strongest protection possible. In October, 2010, regulators from around the world gathered at the annual assembly of International Data Protection and Privacy Commissioners in Jerusalem, Israel, and unanimously passed a landmark Resolution recognizing &lt;em&gt;Privacy by Design&lt;/em&gt; as an essential component of fundamental privacy protection. This was followed by the U.S. Federal Trade Commission’s inclusion of &lt;em&gt;Privacy by Design&lt;/em&gt; as one of its three recommended practices for protecting online privacy – a major validation of its significance.&lt;/p&gt;
&lt;p&gt;An avowed believer in the role that technology can play in the protection of privacy, Dr. Cavoukian’s leadership has seen her office develop a number of tools and procedures to ensure that privacy is strongly protected, not only in Canada, but around the world. She has been involved in numerous international committees focused on privacy, security, technology and business, and endeavours to focus on strengthening consumer confidence and trust in emerging technology applications.&lt;/p&gt;
&lt;p&gt;Dr. Cavoukian serves as the Chair of the Identity, Privacy and Security Institute at the University of Toronto, Canada. She is also a member of several Boards including, the European Biometrics Forum, Future of Privacy Forum, RIM Council, and has been conferred a Distinguished Fellow of the Ponemon Institute. Dr. Cavoukian was honoured with the prestigious &lt;em&gt;Kristian Beckman Award&lt;/em&gt; in 2011 for her pioneering work on &lt;em&gt;Privacy by Design&lt;/em&gt; and privacy protection in modern international environments. In the same year, Dr. Cavoukian was also named by&lt;em&gt; Intelligent Utility &lt;/em&gt;Magazine as one of the Top 11 Movers and Shakers for the Global Smart Grid industry, received the SC Canada Privacy Professional of the Year Award and was honoured by the University of Alberta Information Access and Protection of Privacy Program for her positive contribution to the field of privacy. Most recently in November 2011, Dr. Cavoukian was ranked by Women of Influence Inc. as one of the top 25 Women of Influence recognizing her contribution to the Canadian and global economy.&amp;nbsp; This award follows her recognition in 2007 by the Women’s Executive Network as one of the Top 100 Most Powerful Women in Canada.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;].Information and Privacy Commissioner/Ontario, Landmark Resolution passed to preserve the Future of Privacy, &lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/2010-10-29-Resolution-e_1.pdf"&gt;http://www.ipc.on.ca/images/Resources/2010-10-29-Resolution-e_1.pdf&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;].For a discussion of how governments might employ an PbD approach to privacy regulation, see Commissioner Cavoukian’s White Paper, Privacy by Design in Law, Policy, and Practice available at:&lt;br /&gt;&lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Discussion-Papers/Discussion-Papers-Summary/?id=1095"&gt;http://www.ipc.on.ca/english/Resources/Discussion-Papers/Discussion-Papers-Summary/?id=1095&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;].See the Personal Information Protection and Electronic Documents Act, S.C. 2000, c. 5 (Can.), &lt;a class="external-link" href="http://www.canlii.org/en/ca/laws/stat/sc-2000-c-5/latest/sc-2000-c-5.html"&gt;http://www.canlii.org/en/ca/laws/stat/sc-2000-c-5/latest/sc-2000-c-5.html&lt;/a&gt;.&lt;br /&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;].&lt;em&gt;Englander v. Telus Communications Inc.&lt;/em&gt;, 2004 FCA 387, Locus Para. 38-46.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/interview-with-anne-cavoukian'&gt;https://cis-india.org/internet-governance/interview-with-anne-cavoukian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-12-03T01:26:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy-vs-leaked-2014-privacy-bill">
    <title>Report of the Group of Experts on Privacy vs. The Leaked 2014 Privacy Bill</title>
    <link>https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy-vs-leaked-2014-privacy-bill</link>
    <description>
        &lt;b&gt;Following our previous post comparing the leaked 2014 Privacy Bill with the leaked 2011 Privacy Bill, this post will compare the recommendations provided in the Report of the Group of Experts on Privacy by the Justice AP Shah Committee to the text of the leaked 2014 Privacy Bill. Below is an analysis of recommendations from the Report that are incorporated in the text of the Bill, and recommendations in the Report that are not incorporated in the text of the Bill. &lt;/b&gt;
        &lt;h2&gt;Recommendations in the Report of the Group of Experts on Privacy that are Incorporated in the 2014 Privacy Bill&lt;/h2&gt;
&lt;h3&gt;Constitutional Right to Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy recommends that any privacy legislation for India specify the constitutional basis of a right to privacy. The 2014 Privacy Bill has done this, locating the Right to Privacy in Article 21 of the Constitution of India.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Nine National Privacy Principles&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy recommends that nine National Privacy Principles be adopted and applied to harmonize existing legislation and practices. The 2014 Privacy Bill also adopts nine National Privacy Principles. Though these principles differ slightly from the National Privacy Principles recommended in the Report, they are broadly the same, and importantly will apply to all existing and evolving practices, regulations and legislations of the Government that have or will have an impact on the privacy of any individual. Presently, the 2014 Privacy Bill locates the nine National Privacy Principles in an Annex to the Bill, but also incorporates the principles in more detail in sections relating to personal data.  An analysis of the principles as compared in the Report and the Bill is below:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Notice&lt;/b&gt;: The principle of notice as recommended by the Report of the Group of Experts on Privacy&lt;b&gt; &lt;/b&gt;differs from the principle of notice in the 2014 Privacy Bill.  According to the notice principle in the Report, a data controller shall give sample to understand notice of its information practices to all individuals, in clear and concise language, before any personal information is collected from them. Such notices should include: (during collection) What personal information is being collected; Purposes for which personal information is being collected; Uses of collected personal information; Whether or not personal information may be disclosed to third persons;  Security safeguards established by the data controller in relation to the personal information; Processes available to data subjects to access and correct their own personal information;  Contact details of the privacy officers and SRO ombudsmen for filing complaints. (Other Notices) Data breaches must be notified to affected individuals and the commissioner when applicable. Individuals must be notified of any legal access to their personal information after the purposes of the access have been met. Individuals must be notified of changes in the data controller’s privacy policy. Any other information deemed necessary by the appropriate authority in the interest of the privacy of data subjects. &lt;br /&gt;&lt;br /&gt;In contrast, the 2014 Privacy Bill requires that all the data controllers provide adequate and appropriate notice of their information practices in a form that is easily understood by all intended recipients. In addition to this principle as listed in an annex, the Bill requires that on initial collection data controllers provide notice of what personal data is being collected and the legitimate purpose for which the personal data is being collected. If the purpose for which the personal data changes, data controllers must provide data subjects with a further notice that would include the use to which the personal data shall be put, whether or not the personal data will be disclosed to at third person and, if so, the identity of such person if the personal data being collected is intended to be transferred outside India  and the reasons for doing so; how such transfer helps in achieving the legitimate purpose; and whether the country to which such data is transferred has suitable legislation to provide for adequate protection and privacy of the data; the security and safeguards established by the data controller in relation to the personal data; the processes available to a data subject to access and correct his personal data; the recourse open to a data subject, if he has any complaints in respect of collection or processing of the personal data and the procedure relating thereto; the name, address and contact particulars of the data controller and all persons who will be processing the personal data on behalf of the data controller. Additionally, if a breach of data takes place data controllers must inform the affected data subject that lost or stolen; accessed or acquired by any person not authorized to do so; damaged, deleted or destroyed; processed, re-identified or disclosed in an unauthorized manner.&lt;br /&gt;&lt;br /&gt;Though the 2014 Privacy Bill requires a more comprehensive notice to be issued if the purpose for the use of personal data changes, it does not specify (as recommended by the Group of Experts on Privacy) that notice of changes to a data controller’s privacy policy be issued.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Choice and Consent&lt;/b&gt;: The principle of choice and consent in the 2014 Privacy Bill is similar to the principle in the Report of the Group of Experts on privacy in that it requires that all data subjects be provided with a choice to provide or not to provide personal data and that data subject will have the option of withdrawing consent at any time. Though not a part of the specific principle on ‘choice and consent’ listed in the annex the 2014 Privacy Bill also contains provisions that address mandatory collection of information which require, as recommended by the Report of the Group of Experts, that the information is anonymoized. Furthermore, the 2014 Privacy Bill provides individuals an opt-in or opt-out choice with respect to the provision of personal data. &lt;br /&gt;&lt;br /&gt;Different from as recommended in the principle in the Report of the Group of Experts on Privacy, the 2014 Privacy Bill does not specify that in exception cases when it is not possible to provide a service with choice and consent, then choice and consent will not be required.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Collection Limitation:&lt;/b&gt; The principle of collection limitation as recommended in the Report of the Group of Experts on Privacy and the principle of collection limitation in the Annex of the 2014 Privacy Bill are similar in that both require that only data that is necessary to achieve an identified purpose be collected. As recommended in the Report of the Group of Experts on Privacy, the 2014 Privacy Bill also requires that notice be provided prior to collection and content taken. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Purpose Limitation&lt;/b&gt;: Though the principle of Purpose Limitation are similar in the Report of the Group of Experts on Privacy and the 2014 Privacy Bill as they both require personal data to be used only for the purposes for which it was collected and that the data must be destroyed after the purposes have been served, the 2014 Privacy Bill does not specify that information collected by a data controller must be adequate and relevant for the purposes for which they are processed. The 2014 Privacy Bill also incorporates elements from the principle of Purpose Limitation as defined by the Report of the Group of Experts in other parts of the Bill. For example, the 2014 Bill requires that notice be provided to the individual if there is a change in purpose for the use of the personal information, and designates a section on retention of personal data. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;Access and Correction&lt;/b&gt;: The principle of Access and Correction in the 2014 Privacy Bill reflects the principle of Access and Correction in the Report of the Group of Experts (though not verbatim). Importantly, the 2014 Privacy Bill incorporates the recommendation from the Report of the Group of Experts on Privacy that prohibits access to personal data if it will affect the privacy rights of another individual. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Disclosure of Information: &lt;/b&gt;The principle of ‘Disclosure of Information’ in the Privacy Bill 2014 is similar to the principle of ‘Disclosure of Information’ as recommended in the Report of the Group of Experts on Privacy (though not verbatim).  As recommended this principle requires that personal data be disclosed to third parties only if informed consent has been taken from the individual and the third party is bound the adhere to all relevant and applicable privacy principles.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Security:&lt;/b&gt; The principle of security in the 2014 Privacy Bill reflects the principle of Security recommended in the Report of the Group of Experts on Privacy and requires that personal data be secured through reasonable security safeguards against unauthorized access, destruction, use, modification, de-anonymization or unauthorized disclosure.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Openness:&lt;/b&gt; The principle of Openness in the 2014 Privacy Protection Bill is similar to the principle of Openness recommended in the Report of the Group of Experts on Privacy in that it requires data controllers to make available to all individuals in an intelligible form, using clear and plain language, the practices, procedures, and policies, and systems that are in place to ensure compliance with the privacy principles. The principle in the 2014 Privacy Bill differs from the recommendation in the Report of the Group of Experts on Privacy in that it does not require data controllers to take necessary steps to implement practices, policies, and procedures in a manner proportional to the scale, scope, and sensitivity to the data they collect. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Accountability:&lt;/b&gt; The principle of Accountability in the 2014 Privacy Bill is similar to the principle of Accountability as recommended in the Report of the Group of Experts as both require that the data controller is accountable for compliance with the national Privacy Principles. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Application to interception and access, video and audio recording, personal identifiers, bodily and genetic material&lt;/b&gt;: The Privacy Bill 2014 incorporates the recommendations from the Report of the Group of Experts on Privacy and specifies the way in which the National Privacy Principles will apply to the interception and access of communications, video and audio recording, and personal identifiers. But the 2014 Privacy Bill does not specify the application of the National Privacy Principles to bodily and genetic material (though this information is included in the definition of sensitive personal information).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With respect to the installation and operation of video recording equipment in a public space, the 2014 Privacy Bill requires that video recording equipment may only be used in accordance with a prescribed procedure and for a legitimate purpose that is proportionate to the objective for which it was installed. Furthermore, individuals cannot use video recording equipment for the purpose of identifying an individual, monitoring his personal particulars, or revealing in public his personal information. The provisions in the Bill that speak to storage, processing, retention, security, and disclosure of personal data apply to the installation and use of video recording equipment. As a note the 2014 Privacy Bill carves out an exception for law enforcement and government intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India. &lt;br /&gt;&lt;br /&gt;With respect to the application of the National Privacy Principles to the interception of communications, the 2014 Privacy Bill lays down a regime for the interception of communications and specifies that the principles of notice, choice, consent, access and correction, and openness will apply to the interception of communications when authorised. &lt;br /&gt;&lt;br /&gt;With respect to Personal Identifiers, the 2014 Privacy Bill notes that the principles of notice, choice, and consent will not apply to the collection of personal identifiers by the government. Additionally, the government will not be obliged to use any personal identifier only for the limited purpose for which the personal identifier was collected, provided that the use is in conformance with the other National Privacy Principles.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Additional Protection for Sensitive Personal Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The &lt;b&gt;Report of the Group of Experts on Privacy&lt;/b&gt; broadly recommends that sensitive personal data be afforded additional protection and existing definitions of sensitive personal data should be harmonised. The &lt;b&gt;2014 Privacy Bill&lt;/b&gt; incorporates these recommendations by defining sensitive personal data as data relating to physical and mental health including medical history, biometric, bodily or genetic information; criminal convictions;  password, banking credit and financial data; narco analysis or polygraph test data, sexual orientation. The 2014 Privacy Bill also requires authorization from the Data Protection Authority for the collection and processing of sensitive personal data and defines circumstances of when this authorization would not be required including:  collection or processing of such data is authorized by any other law for the time being in force; such data has already been made public as a result of steps taken by the data subject; collection and processing of such data is made in connection with any legal proceedings by an order of the competent court; such data relating to physical or mental health or medical history of an individual is collected and processed by a medical professional, if such collection and processing is necessary for medical care and health of that individual; such data relating to biometrics, bodily or genetic material, physical or mental health, prior criminal convictions or financial credit history is processed by the employer of an individual for the purpose of and in connection with the employment of that individual; such data relating to physical or mental health or medical history is collected an processed by an insurance company, if such processing is necessary for the purpose of and in connection with the insurance policy of that individual; such data relating to criminal conviction, biometrics and genetic is processed and collected by law enforcement agencies; such data regarding credit, banking and financial details of an individual is processed by a specific user under the Credit Information Companies (Regulation) Act, 2005; such data is processed by schools or other education institutions in connection with imparting of education to an individual;  such data is collected or processed by the government Intelligence agencies in the interest of the sovereignty, integrity, security or the strategic, scientific or economic interest of India,  the authority has, by a general or specified order permitted the processing of such data for specific purpose and is limited to the extent of such permission. The 2014 Privacy Bill also prohibits additional transactions from being performed using sensitive personal information unless free consent was obtained for such transaction.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy Officers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy recommends that Privacy Officers be established at the organizational level for overseeing the processing of personal data and compliance with the Act. This recommendation has been incorporated in the 2014 Privacy Bill, which establishes Privacy Officers at the organizational level.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Co-regulatory Framework&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy recommends that a system of co-regulation be established, where industry levels self regulatory organizations develop privacy norms, which are in turn approved and enforced by the Privacy Commissioner. The 2014 Privacy Bill puts in place a similar co-regulatory framework where industry level self regulatory organizations can develop norms which will be turned into regulations and enforced by the Data Protection Authority. If a sector does not develop norms, the Data Protection Authority can develop norms for the specific sector.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Recommendations in the Report that are not in the Bill&lt;/h2&gt;
&lt;h3&gt;Scope&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy recommends that the scope of any privacy framework extends to all individuals, all data processed in India, and all data originating from India.  The 2014 Privacy Bill differs from these recommendations by extending the right to privacy to all residents of India, while remaining silent on whether or not the scope of the legislation extends to all data processed in India and all data originating in India. Despite this, the 2014 Bill does specify that any organization that processes or deals with data of an Indian resident, but does not have a place of business within India, must establish a ‘representative resident’ in India who will be responsible for compliance with the Act.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Exceptions&lt;/h3&gt;
&lt;p&gt;The Report of the Group of Experts recommends the following as exceptions to the right to privacy:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;National security&lt;/li&gt;
&lt;li&gt;Public order&lt;/li&gt;
&lt;li&gt;Disclosure in the public interest &lt;/li&gt;
&lt;li&gt;Prevention, detection, investigation, and prosecution of criminal offenses &lt;/li&gt;
&lt;li&gt;Protection of the individual and rights and freedoms of others &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;The Report further clarifies that any exception must be qualified and measured against the principles of proportionality, legality, and necessary in a democratic state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Bill 2014 reflects only the exception of  “protection of the individual rights and freedoms of others”. The exceptions as defined in the 2014 Bill are:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Sovereignty, integrity or security of India or&lt;/li&gt;
&lt;li&gt;Strategic, scientific or economic interest of India; or&lt;/li&gt;
&lt;li&gt;Preventing incitement to the commission of any offence; or&lt;/li&gt;
&lt;li&gt;Prevention of public disorder; or&lt;/li&gt;
&lt;li&gt;The investigation of any crime; or&lt;/li&gt;
&lt;li&gt;Protection of rights and freedoms others; or&lt;/li&gt;
&lt;li&gt;Friendly relations with foreign states; or&lt;/li&gt;
&lt;li&gt;Any other legitimate purpose mentioned in this Act.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Instead of qualifying these exceptions with the principles of proportionality, legality, and necessary in a democratic state – as recommended in the Report of Group of Experts on Privacy, the 2014 Privacy Bill qualifies that any restriction must be adequate and not excessive to the objectives it aims to achieve.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Constitution of Infringement of Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy specifies that the publication of personal data for artistic and journalistic purposes in the public interest, disclosure under the Right to Information Act, 2005, and the use of personal data for household purposes should not constitute an infringement of privacy. In contrast the 2014 Privacy Bill specifies that the processing of personal data by an individual purely for his personal or household use, the disclosure of information under the provisions of the Right to information Act, 2005, and any other action specifically exempted under the Act will not constitute an infringement of privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Data Protection Authority&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy recommends the establishment of Privacy Commissioners (and places emphasis on Privacy Commissioner rather than Data Protection Authority) at the Central and Regional level. The Privacy Commissioner should  be of a rank no lower than a retired Supreme Court Judge at the Central level and a retired High Court Judge at the regional level. The privacy commissioner should have the power to receive and investigate class action complaints and investigative powers of the commissioner should include the power to examine and call for documents, examine witnesses, and take a case to court if necessary. The Commissioner should be able to investigate data controllers on receiving complaints or suo moto, and can order privacy impact assessments. Organizations should not be able to appeal fines levied by the Privacy Commissioner, but individuals can appeal a decision of the Privacy Commissioner to the court. The Commissioner should also have broad oversight with respect to interception/access, audio &amp;amp; video recordings, use of personal identifiers, and the use of bodily or genetic material. The Privacy Commissioner will also have the responsibility of approving codes of conduct developed by the industry level SRO’s.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Differing from the recommendations in the Report of the Group of Experts on Privacy, the 2014 Privacy Bill establishes a Data Protection Authority (as opposed to a Privacy Commissioner) at the Central level. Instead of creating regional Data Protection Authorities, the 2014 Privacy Bill allows for the Central Government to decide where other offices of the Data Protection Authority will be located. Furthermore, the 2014 Privacy Bill does not specify a qualification for the Data Protection Authority and instead establishes a selection committee to choose and appoint a Data Protection Authority. This committee is comprised of a Cabinet Secretary, Secretary to the Department of Personnel and Training, Secretary to the Department of Electronics and Information Technology, and two experts of eminence from relevant fields that will be nominated by the Central Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2014 Privacy Bill does not specify that fines ordered by the Data Protection Authority will be binding for organizations, but does allow individuals to appeal decisions of the Data Protection Authority to the Appellate Tribunal. Differing from the recommendations in the Report of the Group of Experts on Privacy,  the 2014 Privacy Bill gives the Data Protection Authority the power to call upon any data controller at any time to furnish in writing information or explanation relating to its affairs,  and receive and investigate complaints about alleged violations of privacy of individuals in respect of matters covered under this Act, conduct investigations and issue appropriate orders or directions to the parties concerned. Furthermore, the 2014 Privacy Bill does not specify that the Data Protection Authority will carry out privacy impact assessments, but the Authority can conduct audits of any or all personal data controlled by a data controller, can investigate data breaches, investigate in complaint received, and adjudicate on a dispute arising between data controllers or data subjects and data controllers.  Unlike the recommendations in the Report of the Group of Experts on Privacy, it does not seem that the Data Protection Authority will play an overseeing role with respect to interception, the use of video recording equipment, personal identifiers, and the use of bodily and genetic material.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Tribunal and System of Complaints&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Differing from the recommendation in the Report of the Group of Experts on Privacy, which specified that a Tribunal should not be established as under the Information Technology Act as there is the risk that the institutions will not have the capacity to rule on a broad right to privacy, the 2014 Privacy Bill does establish a Tribunal under the Information Technology Act. The Report of the Group of Experts on Privacy also recommended that complaints be taken to the district level, high level, and Supreme Court – whereas the 2014 Privacy Bill allows individuals to appeal decisions from the Tribunal only to a High Court. Similar to the recommendations of the Report of the Group of Experts, the 2014 Privacy Bill has in place Alternative Dispute Resolution mechanisms at the level of the industry self regulatory organization.  The 2014 Privacy Bill also specifies that individuals can seek civil remedies and leaves the issuance of compensation for privacy harm to be from a Court. Unlike the recommendations in the Report of the Group of Experts on Privacy, the 2014 Privacy Bill does not specify that the Data Protection Authority will be able to take a case to the court.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Penalties and Offenses&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy did not provide specific recommendations for types of offences and penalties, but did suggest that offenses similar to those spelled out in the UK Data Protection Act and Australian Privacy Act be adopted – namely non-compliance with the privacy principles, unlawful collection, processing, sharing/disclosure, access, and use of personal data, and obstruction of the privacy commissioner. The 2014 Privacy Bill does create offenses for the unlawful collection, processing, sharing/disclosure, access, and use of personal data, but does not create offenses for obstruction of the privacy commissioner or broad non-compliance with the privacy principles.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society welcomes the similarities between the recommendations in the Report of the Group of Experts on Privacy and the leaked 2014 Privacy Bill, but would recommend that on areas where there are differences, particularly in the scope of the Privacy Bill and the powers and functions of the Data Protection Authority, the 2014 Bill be brought in line with the recommendations from the Report of the Group of Experts on Privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the upcoming post, we will be comparing the text of the leaked 2014 Privacy Bill to international best practices and standards.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;References&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011/" class="external-link"&gt;Leaked Privacy Bill: 2014 vs. 2011 &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy-vs-leaked-2014-privacy-bill'&gt;https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy-vs-leaked-2014-privacy-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-14T06:10:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/epw-web-exclusives-oct-27-2012-elonnai-hickok-rethinking-dna-profiling-india">
    <title>Rethinking DNA Profiling in India</title>
    <link>https://cis-india.org/internet-governance/blog/epw-web-exclusives-oct-27-2012-elonnai-hickok-rethinking-dna-profiling-india</link>
    <description>
        &lt;b&gt;DNA profile databases can be useful tools in solving crime, but given that the DNA profile of a person can reveal very personal information about the individual, including medical history, family history and so on, a more comprehensive legislation regulating the collection, use, analysis and storage of DNA samples needs included in the draft Human DNA Profiling Bill.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok's article was &lt;a class="external-link" href="http://www.epw.in/web-exclusives/rethinking-dna-profiling-india.html"&gt;published in Economic &amp;amp; Political Weekly&lt;/a&gt;, Vol - XLVII No. 43, October 27, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;DNA evidence was first accepted by the courts in India in 1985,&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; and in 2005 the Criminal Code of Procedure was amended to allow for medical practitioners, after authorisation from a police officer who is not below the rank of sub-inspector, to examine a person arrested on the charge of committing an offence and with reasonable grounds that an examination of the individual will bring to light evidence regarding the offence. This can include&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"the examination of blood, blood stains, semen, swabs in case of sexual offences, sputum and sweat, hair samples, and finger nail clippings, by the use of modern and scientific techniques including DNA profiling and such other tests which the registered medical practitioner thinks necessary in a particular case."&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this provision establishes that authorisation is needed for collection of DNA samples, defines who can collect samples, creates permitted circumstances for collection, and lists material that can be collected, among other things, it does not address how the collected DNA evidence should be handled, and what will happen to the evidence after it is collected and analysed. These gaps in the provision indicate the need for a more comprehensive legislation regulating the collection, use, analysis and storage of DNA samples, including for crime-related purposes in India.&lt;/p&gt;
&lt;p&gt;The initiative to draft a Bill regulating the use of DNA samples for crime-related reasons began in 2003, when the Department of Biotechnology (DoB) established a committee known as the DNA Profiling Advisory Committee to make recommendations for the drafting of the DNA profiling Bill 2006, which eventually became the Human DNA Profiling Bill 2007.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; The 2007 draft Bill was prepared by the DoB along with the Centre for DNA Fingerprinting and Diagnostics (CDFD).&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CDFD is an autonomous institution supported by the DoB. In addition to the CDFD, there are multiple Central Forensic Science Laboratories in India under the control of the Ministry of Home Affairs and the Central Bureau of Investigation,&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;, along with a number of private labs &lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; which analyse DNA samples for crime-related purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2007, the draft Human DNA Profiling Bill was made public, but was never introduced in Parliament. In February 2012, a new version of the Bill was leaked. If passed, the Bill will establish state-level DNA databases which will feed into a national-level DNA database, and proposes to regulate the use of DNA for the purposes of&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"enhancing protection of people in the society and the administration of justice."&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bill will also establish a DNA Profiling Board responsible for 24 functions, including specifying the list of instances for human DNA profiling and the sources of collection, enumerating guidelines for storage and destruction of biological samples, and laying down standards and procedures for establishment and functioning of DNA laboratories and DNA Data Banks.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; The lack of harmonisation and clear policy indicates that there is a need in India for standardising the collection and use of DNA samples. Although DNA evidence can be useful for solving crimes, the current 2012 draft Bill is missing critical safeguards and technical standards essential to preventing the misuse of DNA and protecting individual rights.&lt;/p&gt;
&lt;p&gt;Concerns that have been raised with regards to the Bill are both intrinsic, including problems with effectiveness of achieving the set objectives, and extrinsic, including concerns with the fundamental principles of the Bill. For example, the use of DNA material as evidence and the subsequent creation of a DNA database can be useful for solving crimes when the database contains DNA profiles from&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; from DNA samples&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; only from crime scenes, and is restricted to DNA profiles from individuals who might be repeat offenders. If a wide range of DNA profiles are added to the database, the effectiveness of the database decreases, and the likelihood of a false match increases as the ability to correctly identify a criminal depends on the number of crime scene DNA profiles on the database, and the number of false matches that occur is proportional to the number of comparisons made (more comparisons = more false matches).&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; This inverse relationship between the effectiveness of the DNA database and the size of the database was found in the UK when it was proven that the expansion of the UK DNA database did not help to solve more crimes, despite millions of profiles being added to the database.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The current scope of the draft 2012 Bill is not limited to crimes for which samples can be taken and placed in the database. Instead the Bill creates indexes within every databank including: &lt;i&gt;crime scene indexes, suspects index, offender’s index, missing persons index, unknown deceased persons’ index, volunteers’ index, and such other DNA indices as may be specified by regulations made by the Board&lt;/i&gt;.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; How independent each of these indices are, is unclear. For example, the Bill does not specify when a profile is searched for in the database – if all indices are searched, or if only the relevant indices are searched, and the Bill requires that when a DNA profile is added to the databank, it must be compared with all the existing profiles.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; The Bill also lists a range of offences for which DNA profiling will be applicable and DNA samples collected, and used for the identification of the perpetrator including, unnatural offences, individual identification, issues relating to assisted reproductive technologies, adultery, outraging the modesty of women etc.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; Though the Bill is not incorrect in its list of offences where DNA profiling could be applicable, it is unclear if DNA profiles from all the listed offenses will be stored on the database. If it is the case that the DNA profiles will be stored, it would make the scope of the database too broad.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike other types of identifiers, such as fingerprints, DNA can reveal very personal information about an individual, including medical history, family history and location.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; Thus, having a DNA database with a broad scope and adding more DNA profiles onto a database, increases the potential for misuse of information stored on the database, because there is more opportunity for profiling, tracking of individuals, and access to private data. In its current form, the Bill protects against such misuse to a certain extent by limiting the information that will be stored with a DNA profile and in the indices,&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt; but the Bill does not make it clear if the DNA profiles of individuals convicted for a crime will be stored and searched independently from other profiles. Additionally, though the Bill limits the use of DNA profiles and DNA samples to identification of perpetrators,&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; it allows for DNA profiles/DNA samples and related information related to be shared for &lt;i&gt;creation and maintenance of a population statistics database that is to be used, as prescribed, for the purpose of identification research, protocol development, or quality control provided that it does not contain any personally identifiable information and does not violate ethical norms&lt;/i&gt;.”&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An indication of the possibility of how a DNA database could be misused in India can be seen in the CDFD’s stated objectives, where it lists "to create DNA marker databases of different caste populations of India."&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; CDFD appears to be collecting this data by requiring caste and origin of state to be filled in on the identification form that is submitted with any DNA sample.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; Though an argument could be made that this information could be used for research purposes, there appears to be no framework over the use of this information and this objective. Is the information stored along with the DNA sample? Is it used in criminal cases? Is it revealed during court cases or at other points of time?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, in the Report of the Working Group for the Eleventh Five Year Plan, it lists the following as a possible use of DNA profiling technology:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"Human population analysis with a view to elicit profiling of different caste populations of India to use them in forensic DNA fingerprinting and develop DNA databases."&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This objective is based on the assumption that caste is an immutable genetic trait and seems to ignore the fact that individuals change their caste and that caste is not uniformly passed on in marriage. Furthermore, using caste for forensic purposes and to develop DNA databases could far too easily be abused and result in the profiling of individuals, and identification errors. For example, in 2011 the UK police, in an attempt to catch the night stalker Delroy Grant, used DNA to (incorrectly) predict that he originated from the Winward Islands. The police then used mass DNA screenings of black men. The police initially eliminated Delroy Grant as a suspect because another Delroy Grant was on the DNA database, and the real Delroy Grant was eventually caught when the police pursued more traditional forms of investigation.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other uses for DNA databases and DNA samples in India have been envisioned over the years. For example, in 2010 the state of Tamil Nadu sought to amend the Prisoners Identification Act 1920 to allow for the establishment of a prisoners’ DNA database – which would require that any prisoner’s DNA be collected and stored.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt; In another example, the home page of BioAxis DNA Research Centre (P) Limited, a private DNA laboratory offering forensic services states,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"&lt;i&gt;In a country like India which is densely populated there is huge requirement for these type of databases which may help in stopping different types of fraud like Ration card fraud, Voter ID Card fraud, Driving license fraud etc. The database may help the Indian police to differentiate the criminals and non criminals&lt;/i&gt;."&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt; Not only is this statement incorrect in stating that a DNA database will differentiate between criminals and non-criminals, but DNA evidence is not useful in stopping ration card fraud etc. as it would require that DNA be extracted and authenticated for every instance of service. In 2012, the Department of Forensic Medicine and Toxicology at AFMC Pune proposed to establish a DNA data bank containing profiles of armed forces personnel.&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt; And in Uttar Pradesh, the government ordered mandatory sampling for DNA fingerprinting of dead bodies.&lt;a href="#fn27" name="fr27"&gt;[27]&lt;/a&gt; These examples raise important questions about the scope of use, collection and storage of DNA profiles in databases that the Bill is silent on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The assumption in the Bill that DNA evidence is infallible is another point of contention. The preamble of the Bill states that, &lt;i&gt;"DNA analysis of body substances is a powerful technology that makes it possible to determine whether the source of origin of one body substance is identical to that of another, and further to establish the biological relationship, if any, between two individuals, living or dead with any doubt."&lt;/i&gt;&lt;a href="#fn28" name="fr28"&gt;[28]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This statement ignores the possibility of false matches, cross-contamination, and laboratory error&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt; as DNA evidence is only as infallible as the humans collecting, analysing, and marshalling the evidence. These mistakes are not purely speculative, as cases that have relied on DNA as evidence in India demonstrate that the reliability of DNA evidence is questionable due to collection, analysis, and chain of custody errors. For example, in the Aarushi murder case the forensic expert who testified failed to remember which samples were collected at the scene of the crime&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt; in the French diplomat rape case, the DNA report came out with both negative and positive results;&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; and in the Abhishek rape case the DNA sample had to be reanalysed after initial analysis did not prove conclusive.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; Yet the Bill does not mandate a set of best practices that could help in minimising these errors, such as defining what profiling system will be used nationally, and defining specific security measures that must be taken by DNA laboratories – all of which are currently left to be determined by the DNA board.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The assumption in the preamble that DNA can establish if a relationship exists between two individuals without a doubt is also misleading as it implies that the use of DNA samples and the creation of a database will increase the conviction rate, when in actuality the exact number of accurate convictions resulting purely from DNA evidence is unknown, as is the number of innocent people who are falsely accused of a crime based on DNA evidence in India. This misconception is reflected on the website of the Department of Biotechnology’s information page for CDFD where it states:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"…The DNA fingerprinting service, given the fact that it has been shown to bring about dramatic increase in the conviction rate, will continue to be in much demand. With the crime burden on the society increasing, more and more requests for DNA fingerprinting are naturally anticipated. For example, starting from just a few cases of DNA fingerprinting per month, CDFD is now handling similar number of cases every day."&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the claim that the DNA fingerprinting service has shown a dramatic increase in the conviction rate, is not supported by evidence in this article, according to the CDFD 2010-2011 annual report, the centre analysed DNA from 57 cases of deceased persons, 40 maternity/paternity cases, four rape and murder cases, eight sexual assault cases, and three kidney transplantation cases.&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt; This is in comparison to the 2006 – 2007 annual report, which quoted 83 paternity/maternity dispute cases, 68 identification of deceased, 11 cases of sexual assault, eight cases of murder, and two cases of wildlife poaching.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt; From the numbers quoted in the CDFD annual report, it appears that paternity/maternity cases and identification of the deceased are the most frequent types of cases using DNA evidence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other concerns with the Bill include access controls to the database and rights of the individual. For example, the Bill does not require that a court order be issued for access to a DNA profile, and instead leaves it in the hand of the DNA bank manager to determine if communication of information relating to a match to a court, tribunal, law enforcement agency, or DNA laboratory is appropriate.&lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the Data Bank Manager is empowered to grant access to any information on the database to any person or class of persons that he/she considers appropriate for the purposes of proper operation and maintenance or for training purposes.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt; The low standards for access that are found in the Bill are worrisome as the possibility for tampering of evidence and analysis is increased.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bill is also missing important provisions that would be necessary to protect the rights of the individual. For example, individuals are not permitted a private cause of action for the unlawful collection, use, or retention of DNA, and individuals do not have the right to access their own information stored on the database.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt; These are significant gaps in the proposed legislation as it restricts the rights of the individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In conclusion, India could benefit from having a legislation regulating, standardising, and harmonising the use, collection, analysis, and retention of DNA samples for crime-related purposes. The current 2012 draft of the Bill is a step in the right direction, and an improvement from the 2007 DNA Profiling Bill. The 2012 draft draws upon best practices from the US and Canada, but could also benefit from drawing upon best practices from countries like Scotland. Safeguards missing from the current draft that would strengthen the Bill include: limiting the scope of the DNA database to include only samples from a crime scene for serious crimes and not minor offenses, requiring the destruction of DNA samples once a DNA profile is created, clearly defining when a court order is needed to collect DNA samples, defining when consent is required and is not required from the individual for a DNA sample to be taken, and ensuring that the individual has a right of appeal.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Law Commission of India. Review of the Indian Evidence Act 1872. Pg. 43 Available at:&lt;span&gt; &lt;a href="http://lawcommissionofindia.nic.in/reports/185thReport-PartII.pdf"&gt;http://lawcommissionofindia.nic.in/reports/185thReport-PartII.pdf&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012.&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Section 53. The Criminal Code of Procedure, 1973. Available at: &lt;span&gt;&lt;a href="http://www.vakilno1.com/bareacts/crpc/s53.htm"&gt;http://www.vakilno1.com/bareacts/crpc/s53.htm&lt;/a&gt;&lt;/span&gt;. Last accessed October 9th 2012.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Department of Biotechnology. Ministry of Science &amp;amp; Technology GOI. Annual Report 2009 – 2010. pg. 189. Available at: &lt;span&gt;&lt;a href="http://dbtindia.nic.in/annualreports/DBT-An-Re-2009-10.pdf"&gt;http://dbtindia.nic.in/annualreports/DBT-An-Re-2009-10.pdf&lt;/a&gt;&lt;/span&gt;. Last Accessed October 9th 2012.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Chhibber, M. Govt Crawling on DNA Profiling Bill, CBI urges it to hurry, cites China. The Indian Express. July 12 2010. Available at: &lt;span&gt;&lt;a href="http://www.indianexpress.com/news/govt-crawling-on-dna-profiling-bill-cbi-urges-it-to-hurry-cites-china/645247/0"&gt;http://www.indianexpress.com/news/govt-crawling-on-dna-profiling-bill-cbi-urges-it-to-hurry-cites-china/645247/0&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Perspective Plan for Indian Forensics. Final report 2010. Table 64.1 -64.3 pg. 264-267. Available at: &lt;span&gt;&lt;a href="http://mha.nic.in/pdfs/IFS%282010%29-FinalRpt.pdf"&gt;http://mha.nic.in/pdfs/IFS%282010%29-FinalRpt.pdf&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012. And CBI Manual. Chapter 27. Available at: &lt;span&gt;&lt;a href="http://mha.nic.in/pdfs/IFS%282010%29-FinalRpt.pdf"&gt;http://mha.nic.in/pdfs/IFS%282010%29-FinalRpt.pdf&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012.&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. For example: International Forensic Sciences, DNA Labs India (DLI), Truth Labs and Bio-Axis DNA Research Centre (P) Limited.&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Draft Human DNA Profiling Bill 2012. Introduction.&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Id. section 12(a-z)&lt;br /&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Id. Definition l. “DNA Profile” means results of analysis of a DNA sample with respect to human identification.&lt;br /&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Id. Definition m. “DNA sample” means biological specimen of any nature  that is utilized to conduct CAN analysis, collected in such manner as  specified in Part II of the Schedule.&lt;br /&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The UK DNA database and the European Court of Human Rights: Lessons  India can learn from UK mistakes. PowerPoint Presentation. Dr. Helen  Wallace, Genewatch UK. September 2012.&lt;br /&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Hope, C. Crimes solved by DNA evidence fall despite millions being added  to database. The Telegraph. November 12th 2008. Available at: &lt;span&gt;&lt;a href="http://www.telegraph.co.uk/news/uknews/law-and-order/3418649/Crimes-solved-by-DNA-evidence-fall-despite-millions-being-added-to-database.html"&gt;http://www.telegraph.co.uk/news/uknews/law-and-order/3418649/Crimes-solved-by-DNA-evidence-fall-despite-millions-being-added-to-database.html&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012&lt;br /&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Draft Human DNA Profiling Bill 2012. Section 32 (4(a-g))&lt;br /&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Id. Section 35&lt;br /&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Id. Schedule: List of applicable instances of Human DNA Profiling and Sources of Collection of Samples for DNA Test.&lt;br /&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Gruber J. Forensic DNA Databases. Council for Responsible Genetics. September 2012. Powerpoint presentation.&lt;br /&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Draft Human DNA Profiling Bill 2012. Section 32 (5)-
  
  
    &lt;span class="" id="text-1"&gt;
      &lt;a class="link-wiki-add" title="Click to add a new page" href="https://cis-india.org/internet-governance/blog/epw-web-exclusives-oct-27-2012-elonnai-hickok-rethinking-dna-profiling-india/@@wickedadd?Title=6)(a)-(b&amp;amp;section=text"&gt;
      6)(a)-(b&lt;sup&gt;[+]&lt;/sup&gt;&lt;/a&gt;
    &lt;/span&gt;
  

. Indices will only contain DNA identification records and analysis prepared by the laboratory and approved by the DNA Board, while profiles in the offenders index will contain only the identity of the person, and other profiles will contain only the case reference number.&lt;br /&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Id. Section 39&lt;br /&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Id. Section 40(c)&lt;br /&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. CDFD. Annual Report 2010-2011. Pg19. Available at: &lt;span&gt;&lt;a href="http://www.cdfd.org.in/images/AR_2010_11.pdf"&gt;http://www.cdfd.org.in/images/AR_2010_11.pdf&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012.&lt;br /&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Caste and origin of state is a field of information that is required to  be completed when an ‘identification form’ is sent to the CDFD along  with a DNA sample for analysis. Form available at: &lt;a href="http://www.cdfd.org.in/servicespages/dnafingerprinting.html" title="http://www.cdfd.org.in/servicespages/dnafingerprinting.html"&gt;http://www.cdfd.org.in/servicespages/dnafingerprinting.html&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. Report of the Working Group for the Eleventh Five Year Plan (2007 –  2012). October 2006. Pg. 152. Section: R&amp;amp;D Relating Services.  Available at: &lt;span&gt;&lt;a href="http://planningcommission.nic.in/aboutus/committee/wrkgrp11/wg11_subdbt.pdf"&gt;http://planningcommission.nic.in/aboutus/committee/wrkgrp11/wg11_subdbt.pdf&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012&lt;br /&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Evans. M. Night Stalker: police blunders delayed arrest of Delroy Grant. March 24th 2011. The Telegraph. Available at: &lt;span&gt;&lt;a href="http://www.telegraph.co.uk/news/uknews/crime/8397585/Night-Stalker-police-blunders-delayed-arrest-of-Delroy-Grant.html"&gt;http://www.telegraph.co.uk/news/uknews/crime/8397585/Night-Stalker-police-blunders-delayed-arrest-of-Delroy-Grant.html&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Narayan, P. A prisoner DNA database: Tamil Nadu shows the way. May 17th 2012. Available at: &lt;span&gt;&lt;a href="http://timesofindia.indiatimes.com/india/A-prisoner-DNA-database-Tamil-Nadu-shows-the-way/iplarticleshow/5938522.cms"&gt;http://timesofindia.indiatimes.com/india/A-prisoner-DNA-database-Tamil-Nadu-shows-the-way/iplarticleshow/5938522.cms&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012.&lt;br /&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. BioAxis DNA Research Centre (P) Limited. Website Available at: &lt;span&gt;&lt;a href="http://www.dnares.in/dna-databank-database-of-india.php"&gt;http://www.dnares.in/dna-databank-database-of-india.php&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Times of India. AFMC to open DNA profiling centre today. February 2012. Available at:&lt;span&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2012-02-08/pune/31037108_1_dna-profile-dna-fingerprinting-data-bank"&gt;http://articles.timesofindia.indiatimes.com/2012-02-08/pune/31037108_1_dna-profile-dna-fingerprinting-data-bank&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. Siddiqui, P. UP makes DNA sampling mandatory with postmortem. Times of  India. September 4th 2012. Available  at:http://articles.timesofindia.indiatimes.com/2012-09-04/lucknow/33581061_1_dead-bodies-postmortem-house-postmortem-report.  Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Draft DNA Human Profiling Bill 2012. Introduction&lt;br /&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Council for Responsible Genetics. Overview and Concerns Regarding the  Indian Draft DNA Profiling Bill. September 2012. Pg. 2. Available at: &lt;span&gt;&lt;a href="https://cis-india.org/internet-governance/indian-draft-dna-profiling-act.pdf/view"&gt;http://cis-india.org/internet-governance/indian-draft-dna-profiling-act.pdf/view&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012.&lt;br /&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. DNA. Aarushi case: Expert forgets samples collected from murder spot. August 28th 2012. Available at: &lt;span&gt;&lt;a href="http://www.dnaindia.com/india/report_aarushi-case-expert-forgets-samples-collected-from-murder-spot_1733957"&gt;http://www.dnaindia.com/india/report_aarushi-case-expert-forgets-samples-collected-from-murder-spot_1733957&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. India Today. Daughter rape case: French diplomat’s DNA test is inconclusive. July 7th 2012. Available at: &lt;span&gt;&lt;a href="http://indiatoday.intoday.in/story/french-diplomat-father-rapes-daughter-dna-test-bangalore/1/204270.html"&gt;http://indiatoday.intoday.in/story/french-diplomat-father-rapes-daughter-dna-test-bangalore/1/204270.html&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. The Times of India. DNA tests indicate Abhishek raped woman. May 30th 2006. Available at: &lt;span&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2006-05-30/india/27826225_1_abhishek-kasliwal-dna-fingerprinting-dna-tests"&gt;http://articles.timesofindia.indiatimes.com/2006-05-30/india/27826225_1_abhishek-kasliwal-dna-fingerprinting-dna-tests&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. Draft Human DNA Profiling Bill 2012. Section 18-27.&lt;br /&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. Department of Biotechnology. DNA Fingerprinting &amp;amp; Diagnostics, Hyderabad. Available at: &lt;span&gt;&lt;a href="http://dbtindia.nic.in/uniquepage.asp?id_pk=124"&gt;http://dbtindia.nic.in/uniquepage.asp?id_pk=124&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10 2012.&lt;br /&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. CDFD Annual Report 2010 – 2011.Pg.19. Available at: &lt;span&gt;&lt;a href="http://www.cdfd.org.in/images/AR_2010_11.pdf"&gt;http://www.cdfd.org.in/images/AR_2010_11.pdf&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. CDFD Annual Report 2006-2007.Pg. 13. Available at: &lt;span&gt;&lt;a href="http://www.cdfd.org.in/images/AR_2006_07.pdf"&gt;http://www.cdfd.org.in/images/AR_2006_07.pdf&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. Draft Human DNA Profiling Bill 2012. Section 35&lt;br /&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Id. Section 41.&lt;br /&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;].Council for Responsible Genetics. Overview and Concerns Regarding the  Indian Draft DNA Profiling Bill. September 2012. Pg. 9 Available at: &lt;span&gt;&lt;a href="https://cis-india.org/internet-governance/indian-draft-dna-profiling-act.pdf/view"&gt;http://cis-india.org/internet-governance/indian-draft-dna-profiling-act.pdf/view&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/epw-web-exclusives-oct-27-2012-elonnai-hickok-rethinking-dna-profiling-india'&gt;https://cis-india.org/internet-governance/blog/epw-web-exclusives-oct-27-2012-elonnai-hickok-rethinking-dna-profiling-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-29T08:00:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee">
    <title>Open Letter to Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee  </title>
    <link>https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee</link>
    <description>
        &lt;b&gt;An open letter was sent to the Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee on the proposed EU Regulation. The letter was apart of an initiative that Privacy International and a number of other NGO's are undertaking.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;Dear Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee&lt;/b&gt;,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On behalf of The Centre for Internet and Society, Bangalore, India,  we are writing to express our support of the European Commission’s proposed General Data Protection Regulation (COM (2012) 11).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legal framework established under the 1995 Data Protection Directive (95/46/EC) in Europe has positively influenced many existing privacy regimes worldwide, serving as a model legal framework in jurisdictions that are in the process of developing privacy regimes, including India. The positive impact of the Data Protection Directive shows the potential of the Regulation to become a global model for the protection of personal data. The Regulation seeks to address new scenarios that have arisen in the context of rapidly changing technologies and practices, increasing its potential for positively influencing privacy rights for individuals globally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India is currently in the process of considering the enactment of privacy legislation, in part with the aim of ensuring adequate safeguards to enable and enhance information flows into India from countries around the world, including Europe. At the same time, India is seeking  Data Secure Status from the EU, on the basis of its current regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that the EU framework for data protection has a major influence on the current and emerging privacy regime in India. India is only one country of many that are in the beginning stages of developing a comprehensive privacy regime. Thus, we ask that you keep in mind how the Regulation will impact the rights of individual in countries outside of Europe, particularly in countries that are in the process of developing privacy regimes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We ask that you take into consideration the four following points that we believe need to be addressed in the Regulation to help ensure adequate protection of the rights of individuals in the European Union and around the world.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Strengthen the principle of purpose limitation: &lt;/b&gt;The Regulation should incorporate a strong purpose limitation principle that strictly limits present and future uses of personal data to the purposes for which it was originally collected. Currently, Article 6(4) allows for the further processing of data when the processing is &lt;i&gt;“not compatible with the one for which the personal data have been collected”. &lt;/i&gt;Though the provision establishes legal requirements, one of which must be before information can be used for a further purpose, this is has proven insufficient in the existing Directive. The current provision in the Regulation dilutes the principle of purpose limitation as well as weakening an individual’s ability to make informed decisions about their personal data.&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Define principles for interpretation of broad terms: &lt;/b&gt;The Regulation should create principles for interpreting broad terms such as “legitimate interest” and “public interest”. These vague terms are used throughout the Regulation, and create the potential for loopholes or abuse. Because these terms can be interpreted in many different ways, it is important to create a set of principles to guide their interpretation  by data protection authorities and courts to avoid inconsistent application and enforcement of the Regulation.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Clarify the scope of the Regulation:&lt;/b&gt; The Regulation should clearly describe the jurisdictional scope and reach of its provisions. Currently Article 3(1) states that the Regulation will apply to the processing of data “in the context of the activities of an establishment of a controller or a processor in the Union”.  The flow of information on the online environment coupled with trends such as cloud computing, outsourcing, and cross border business creates a scenario where defining what constitutes “context of the activities of an establishment”, is difficult and could lead to situations where personal data is not protected, as the collection, use, or storage of it does not necessarily fall within the “context of the activities”. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Address access by foreign alliance bodies&lt;/b&gt;: In light of growing demands by law enforcement for access, use, and transfer of personal information for investigative purposes across jurisdictions– the Regulation should define the circumstances in which personal data protected by its provisions can be accessed and used by foreign intelligence bodies, and the procedure by which to do so. The Regulation should address challenges such as access by foreign intelligence bodies to data stored on the cloud and data that has passed through/is stored on foreign networks/servers. &lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee'&gt;https://cis-india.org/internet-governance/blog/open-letter-members-european-parliament-civil-liberties-justice-home-affairs-committee&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-23T05:00:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/interview-with-jacob-kohnstamm">
    <title>An Interview with Jacob Kohnstamm, Dutch Data Protection Authority and Chairman of the Article 29 Working Party</title>
    <link>https://cis-india.org/internet-governance/blog/interview-with-jacob-kohnstamm</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society interviewed Jacob Kohnstamm, Dutch Data Protection Authority and Chairman of the Article 29 Working Party.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;What activities and functions does your office undertake?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The activities and functions of the Dutch data protection authority can roughly be divided in 4 different categories: supervisory activities, giving advise on draft legislation, raising awareness and international tasks. &lt;br /&gt;&lt;br /&gt;The Dutch DPA supervises the legislation applicable in the Netherlands with regard to the use of personal data. The most important law is the Dutch Data Protection Act, but the Dutch DPA also supervises for example the Acts governing data processing by police and justice as well as parts of the Telecoms Act. &lt;br /&gt;&lt;br /&gt;The supervisory activities mainly consist of investigating, ex officio, violations of the law, with the focus on violations that are serious, structural and impact a large amount of people. Where necessary, the Dutch DPA can use its sanctioning powers, including imposing a conditional fine, to enforce the law. The Dutch DPA can also decide to examine sector-wide codes of conduct that are submitted to it and provide its views in the form of a formal opinion. &lt;br /&gt;&lt;br /&gt;In addition to investigations, the Dutch DPA advises the government, and sometimes the parliament, on draft legislation related to the processing of personal data. Following the Data Protection Act, the government is obliged to submit both primary and secondary legislation related to data processing to the DPA for advice. &lt;br /&gt;&lt;br /&gt;As regards awareness-raising, next to publishing the results of the investigations, its views on codes of conduct and its advice on legislation, the Dutch DPA also issues guidelines, on its own initiative, explaining legal norms. Via its websites, the Dutch DPA provides more information to both data subjects and controllers on how data can and cannot be processed. Specifically for data subjects, self-empowerment tools – including standard letters to exercise their rights – are made available. Furthermore, they can contact the Dutch DPA daily via a telephone hotline.&lt;br /&gt;&lt;br /&gt;Last but not least, the Dutch DPA participates in several International and European fora, including the Article 29 Working Party of which I am the Chair, the European and the International Conference of data protection and privacy commissioners, of whose Executive Committee I am also the Chair.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What powers does your office have? in your opinion are these sufficient? Which powers have been most useful? If there is a lack, what do you feel is needed?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Dutch DPA has a broad range investigative powers, including the power to order the controller to hand over all relevant information and entering the premises of the controller unannounced. All organisations subjected to the supervision of the Dutch DPA are obligated to cooperate. &lt;br /&gt;&lt;br /&gt;The Dutch DPA also has a considerable range of sanctioning powers, it can for example order the suspension or termination of certain processing operations and can also impose a conditional fine. Currently a bill is before Parliament to provide the Dutch DPA with fining powers as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Especially when the bill providing the Dutch DPA with fining powers will be passed, I feel the powers are sufficient, giving us all the necessary enforcement tools to ensure compliance with the law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How is your office funded?&lt;/h3&gt;
&lt;p&gt;The Dutch DPA is funded through the government who, together with the parliament, each year determines the budget for the next year. The budget is drafted on the basis of a proposal from the Dutch DPA.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What is the organizational structure of your office and the responsibilities of the key executives?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Dutch DPA consists of a college of commissioners and the supporting Secretariat, itself consisting of 6 departments and headed by the Director. The Dutch DPA has 2 supervision departments, one for the private and one for the public sector, a legal department, a communications department, an international department and a department providing the operational support.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;If India creates a  framework of co-regulation, how would you suggest the overseeing body be structured?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Considering the many differences between India and the Netherlands - and Europe - this is a very hard question to answer. But whatever construction is chosen in India, it is of utmost importance to guarantee the independence of the supervisory authorit(y)(ies), who shall be provided with sufficient and scalable powers to be able to sanction violations.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What legal challenges has your office faced?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The biggest legal challenge we face at the moment is the new European legal framework currently being discussed. It is as yet uncertain whether and when this will enter into force, but it is clear that it will bring new challenges for our office.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What are the main differences between your offices?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Generally, I think that the differences between my office and the UK and Canadian offices mostly stem from our different legal and cultural backgrounds, especially the difference between the common law and codified law systems. &lt;br /&gt;&lt;br /&gt;In addition, the norms and powers differ per supervisory authority. The Dutch DPA for example can enter a building without prior notice, while the ICO, if I understand correctly, can only enter with the consent of the supervised organisation. &lt;br /&gt;&lt;br /&gt;I however prefer to look at the similarities and possibilities to overcome our differences, because I think that we all feel that providing a high level of data protection and ensuring user control are all of our main priorities.&lt;br /&gt;&lt;br /&gt;Naturally, I am very curious to hear from Chrisopher and Chantal as well.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What are the most recent privacy developments for each of your respective offices?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The technological developments of the past decades and the increasing use of smartphones and tablets, have also made privacy developments necessary and have obliged us, as data protection authorities, to consider the rules and norms in this new environment.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What would you broadly recommend for a privacy legislation for India?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In my view the privacy legislation in India should in any case contain the basic principles of the protection of personal data, applicable to both the public and the private sector. Naturally with some exceptions for law enforcement purposes. &lt;br /&gt;&lt;br /&gt;Furthermore, the Indian law should protect the imported data of citizens from other parts of the world as well, including the EU. &lt;br /&gt;&lt;br /&gt;And as mentioned in my answer to question 5, it is of utmost importance that the Indian legislation guarantees the establishment of (a) completely independent supervisory authorit(y)(ies), provided with sufficient sanctioning powers, to supervise compliance with the legislation also of the government, including police and justice.&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/interview-with-jacob-kohnstamm'&gt;https://cis-india.org/internet-governance/blog/interview-with-jacob-kohnstamm&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-25T04:50:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/yahoo-october-23-2013-what-india-can-learn-from-snowden-revelations">
    <title>What India can Learn from the Snowden Revelations</title>
    <link>https://cis-india.org/internet-governance/blog/yahoo-october-23-2013-what-india-can-learn-from-snowden-revelations</link>
    <description>
        &lt;b&gt;Big Brother is watching, across cyberspace and international borders. Meanwhile, the Indian government has few safeguards in theory and fewer in practice. There’s no telling how prevalent or extensive Indian surveillance really is.&lt;/b&gt;
        &lt;p&gt;The title of the article was changed in the&lt;a class="external-link" href="http://in.news.yahoo.com/why-india-needs-a-snowden-of-its-own-054956734.html"&gt; version published by Yahoo&lt;/a&gt; on October 23, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Since the ‘&lt;a href="http://www.theguardian.com/world/edward-snowden" target="_blank"&gt;Snowden revelations&lt;/a&gt;’, which uncovered the United States government’s massive global &lt;span class="cs4-ndcor yshortcuts" id="lw_1382621265093_3"&gt;surveillance&lt;/span&gt; through the &lt;a href="http://en.wikipedia.org/wiki/PRISM_%28surveillance_program%29" target="_blank"&gt;PRISM&lt;/a&gt; program, there have been reactions aplenty to their impact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Snowden revelations highlighted the issue of human rights in the context of the existing cross-border and jurisdictional nightmare: the data of foreign citizens surveilled and harvested by agencies such as the National Security Agency through programs such as PRISM are not subject to protection found in the laws of the country. Thus, the US government has the right to access and use the data, but has no responsibility in terms of how the data will be used or respecting the rights of the people from whom the data was harvested.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Snowden revelations demonstrated that the biggest global surveillance efforts are now being conducted by democratically elected governments – institutions of the people, by the people, for the people – that are increasingly becoming suspicious of all people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Adding irony to this worrying trend, Snowden sought asylum from many of the most repressive regimes: this dynamic speaks to the state of society today. The Snowden revelations also demonstrate how government surveillance is shifting from targeted surveillance, warranted for a specific reason and towards a specified individual, to blanket surveillance where security agencies monitor and filter massive amounts of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is happening with few checks and balances for cross-border and  domestic surveillance in place, and even fewer forms of redress for the  individual. This is true for many governments, including &lt;span class="cs4-visible yshortcuts" id="lw_1382621265093_1"&gt;India&lt;/span&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;India’s reaction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;After the first news of the Snowden revelations, the Indian Supreme Court &lt;a href="http://www.medianama.com/2013/06/223-supreme-court-to-hear-pil-against-nsa-surveillance-of-indian-data-report/" target="_blank"&gt;agreed&lt;/a&gt; to hear a Public Interest Litigation requesting that foreign companies  that shared the information with US security agencies be held  accountable for the disclosure. In response to the PIL, the Supreme  Court stated it did not have jurisdiction over the US government.&lt;br /&gt;&lt;br /&gt;The  response of the Supreme Court of India demonstrates the potency of  jurisdiction in today’s global information economy in the context of  governmental surveillance. Despite being upset at the actions of  America’s National Security Agency (NSA), there is little direct legal  action that any &lt;span class="cs4-ndcor yshortcuts" id="lw_1382621265093_7"&gt;government&lt;/span&gt; or individual can take against the US government or companies incorporated there.&lt;br /&gt;&lt;br /&gt;In  the PIL, the demand that companies be held responsible is interesting  and representative of a global debate, as it implies that in the context  of governmental surveillance, companies have a responsibility to  actively evaluate and reject or accept governmental surveillance  requests. Although I do not disagree with this as a principle, in  reality, this evaluation is a difficult step for companies to take. &lt;br /&gt;&lt;br /&gt;For  example, in India, under Section 69 of the Information Technology Act,  2000, service providers are penalized with up to seven years in prison  for non-compliance with a governmental request for surveillance. The  incentives for companies to actually reject governmental requests are  minimal, but one factor that could possibly push companies to become  more pronounced in their resistance to installing backdoors for the  government and complying with governmental surveillance requests is  market pressure from consumers.&lt;br /&gt;&lt;br /&gt;To a certain extent, this has  already started to happen. Companies such as Facebook, Yahoo and Google  have created ‘transparency reports’ that provide – at different  granularities – information about governmental requests and the  company’s compliance or rejection of the same. &lt;br /&gt;&lt;br /&gt;In India, P. Rajeev, Member of Parliament from Kerala, has started a &lt;a href="http://www.change.org/petitions/google-facebook-microsoft-yahoo-reveal-information-on-data-of-indian-citizens-given-to-us-security-agencies-2" target="_blank"&gt;petition&lt;/a&gt; asking that the companies disclose information on &lt;span class="cs4-ndcor yshortcuts" id="lw_1382621265093_8"&gt;Indian data&lt;/span&gt; given to US security agencies. Although transparency by complying  companies does not translate directly into regulation of surveillance,  it allows the customer to make informed choices and decide whether a  company’s level of compliance with governmental requests will impact  his/her use of that service.&lt;br /&gt;&lt;br /&gt;The PIL also called for the establishment of Indian servers to protect the privacy of Indian data. This solution has been &lt;a href="http://articles.economictimes.indiatimes.com/2013-08-14/news/41409701_1_traffic-originating-and-terminating-servers-mocit" target="_blank"&gt;voiced by many&lt;/a&gt;,  including government officials. Though the creation of domestic servers  would ensure that the US government does not have direct and unfettered  access to Indian data, as it would require that foreign governments  access Indian information through a formal &lt;a href="http://mha.nic.in/Policy_Planing_Division" target="_blank"&gt;Mutual Legal Assistance Treaty&lt;/a&gt; process, it does not necessarily enhance the privacy of Indian data. &lt;br /&gt;&lt;br /&gt;As  a note, India has MLAT treaties with 34 countries. If domestic servers  were established, the information would be subject to Indian laws and  regulations.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Snooping&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Snowden Revelations are not the first instance to spark a discussion on domestic servers by the Government of India. &lt;br /&gt;&lt;br /&gt;For  example, in the back-and-forth between the Indian government and the  Canadian company RIM, now BlackBerry, the company eventually &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/telecom/BlackBerry-sets-up-server-in-Mumbai-to-aid-interception/articleshow/11969224.cms" target="_blank"&gt;set up servers in Mumbai&lt;/a&gt; and provided a lawful interception solution that satisfied the Indian  government. The Indian government made similar demands from &lt;a href="http://news.cnet.com/8301-1009_3-20015418-83.html" target="_blank"&gt;Skype and Google&lt;/a&gt;. In these instances, the domestic servers were meant to facilitate greater surveillance by Indian law enforcement agencies.&lt;br /&gt;&lt;br /&gt;Currently  in India there are a number of ways in which the government can legally  track data online and offline. For example, the interception of  telephonic communications is regulated by the Indian Telegraph Act,  1885, and relies on an order from the Secretary to the Ministry of Home  Affairs. Interception, decryption, and monitoring of digital  communications are governed by Section 69 of the Information Technology  Act, 2000 and again rely on the order of the executive. &lt;br /&gt;&lt;br /&gt;The  collection and monitoring of traffic data is governed by Section 69B of  the Information Technology Act and relies on the order of the Secretary  to the government of India in the Department of Information Technology.  Access to stored data, on the other hand, is regulated by Section 91 of  the Code of Criminal Procedure and permits access on the authorization  of an officer in charge of a police station.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The gaps in the Indian &lt;span class="cs4-ndcor yshortcuts" id="lw_1382621265093_4"&gt;surveillance&lt;/span&gt; regime are many and begin with a lack of enforcement and harmonization of existing safeguards and protocols. Presently, &lt;span class="cs4-visible yshortcuts" id="lw_1382621265093_2"&gt;India&lt;/span&gt; is in the process of realizing a privacy legislation. &lt;br /&gt;&lt;br /&gt;In 2012, a committee chaired by Justice AP Shah (of which the Center for Internet and Society was a member) wrote &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf" target="_blank"&gt;The Report of the Group of Experts on Privacy&lt;/a&gt;,  which laid out nine national privacy principles meant to be applied to  different legislation and sectors – including Indian provisions on  surveillance.&lt;br /&gt;&lt;br /&gt;The creation of domestic servers is just one  example of how the Indian government has been seeking greater access to  information flowing within its borders. New requirements for Indian  service providers and the creation of projects that go beyond the legal  limits of governmental surveillance in India enable greater access to  details about an individual on a real-time and blanket basis.&lt;br /&gt;&lt;br /&gt;For example, telecoms in India are now required to include &lt;a href="http://www.firstpost.com/tech/exclusive-location-tracking-of-every-indian-mobile-user-by-2014-876109.html/2" target="_blank"&gt;user location data&lt;/a&gt; as part of the ‘call detail record’ and be able to &lt;a href="http://www.medianama.com/2012/08/223-indian-government-revises-location-accuracy-guidelines-says-telcos-should-bear-the-cost/" target="_blank"&gt;provide&lt;/a&gt; the same to law enforcement agencies on request under &lt;a href="http://www.cca.ap.nic.in/i_agreement.pdf" target="_blank"&gt;provisions&lt;/a&gt; in the Unified Access Service and Internet Service Provider Licenses. &lt;br /&gt;&lt;br /&gt;At the same time, the Government of India is in the process of putting in place a &lt;a href="http://en.wikipedia.org/wiki/Central_Monitoring_System" target="_blank"&gt;Central Monitoring System&lt;/a&gt; that would provide Indian security agencies the ability to directly intercept communications, bypassing the service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if the Central Monitoring System were to adhere to the legal  safeguards and procedures defined under the Indian Telegraph Act and  Information Technology Act, the system can only do so partially, as both  provisions create a clear chain of custody that the government and  service providers must follow – that is, the service provider was  included as an integral component of the interception process.&lt;br /&gt;&lt;br /&gt;If  the Indian government implements the Central Monitoring System, it  could remove governmental surveillance completely from the public eye.  Bypassing the service provider allows the government to fully determine  how much the public knows about surveillance. It also removes the market  and any pressure that consumers could exert from insight provided by  companies on the surveillance requests that they are facing.&lt;br /&gt;&lt;br /&gt;Though  the Indian government could (and should) be transparent about the  amount and type of surveillance it is undertaking, currently there is no  legal requirement for the government of India to disclose this  information, and security agencies are exempt from the Right to  Information Act. Thus, unless India has a Snowden somewhere in the  apparatus, the Indian public cannot hope to get an idea of how prevalent  or extensive Indian surveillance really is.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Policy vacuum&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For any &lt;span class="cs4-ndcor yshortcuts" id="lw_1382621265093_5"&gt;government&lt;/span&gt;,  the surveillance of its citizens, to some degree, might be necessary.  But the Snowden revelations demonstrate that there is a vacuum when it  comes to surveillance policy and practices. This vacuum has permitted  draconian measures of surveillance to take place and created an  environment of mistrust between citizens and governments across the  globe. &lt;br /&gt;&lt;br /&gt;When governments undertake surveillance, it is critical  that the purpose, necessity and legality of monitoring, and the use of  the material collected are built into the regime to ensure it does not  violate the human rights of the people surveilled, foreign or domestic.&lt;br /&gt;&lt;br /&gt;In 2013, the &lt;a href="https://en.necessaryandproportionate.org/text" target="_blank"&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt; were drafted, in part, to address this vacuum. The principles seek to  explain how international human rights law applies to surveillance of  communications in the current digital and technological environment.  They define safeguards to ensure that human rights are protected and  upheld when governments undertake surveillance of communications. &lt;br /&gt;&lt;br /&gt;When  the Indian surveillance regime is measured against these principles, it  appears to miss a number of them, and does not fully meet several  others. In the context of surveillance projects like the Central  Monitoring System, and in order to avoid an Indian version of the PRISM  program, India should take into consideration the safeguards defined in  the principles and strengthen its surveillance regime to ensure not only  the protection of human rights in the context of surveillance, but to  also establish trust in its surveillance regime and practices with other  countries.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Elonnai Hickok is the Program Manager for Internet Governance at the  Centre for Internet and Society, and leads its research on privacy.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/yahoo-october-23-2013-what-india-can-learn-from-snowden-revelations'&gt;https://cis-india.org/internet-governance/blog/yahoo-october-23-2013-what-india-can-learn-from-snowden-revelations&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-25T07:29:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
