<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 21 to 35.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-on-indea-2.0"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/general-comments-data-protection-bill.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-arindrajit-basu-february-8-2022-notes-for-india-as-the-digital-trade-juggernaut-rolls-on"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/cis-itfc-e-shram-issue-brief-dec-21-pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/guide-to-personal-data-protection-bill.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/fundamental-right-to-privacy-2014-four-years-of-the-puttaswamy-judgment"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/june-july-2021-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/march-may-2021-newsletter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/do-we-really-need-an-app-for-that-examining-the-utility-and-privacy-implications-of-india2019s-digital-vaccine-certificates"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/centre-for-internet-society-ecommerce-amendments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-proposed-amendments-to-the-consumer-protection-e-commerce-rules-2020"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-ministry-and-the-trace-subverting-end-to-end-encryption"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/comments-on-indea-2.0">
    <title>Comments on InDEA 2.0</title>
    <link>https://cis-india.org/internet-governance/comments-on-indea-2.0</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-on-indea-2.0'&gt;https://cis-india.org/internet-governance/comments-on-indea-2.0&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2022-03-22T06:26:39Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study">
    <title>Clause 12 Of The Data Protection Bill And Digital Healthcare: A Case Study</title>
    <link>https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study</link>
    <description>
        &lt;b&gt;In light of the state’s emerging digital healthcare apparatus, how does Clause 12 alter the consent and purpose limitation model?&lt;/b&gt;
        &lt;p&gt;The blog post was &lt;a class="external-link" href="https://www.medianama.com/2022/02/223-data-protection-bill-digital-healthcare-case-study/"&gt;published in Medianama&lt;/a&gt; on February 21, 2022. This is the second in a two-part series by Amber Sinha.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the &lt;a href="https://www.medianama.com/2022/02/223-data-protection-bill-consent-clause-state-function/"&gt;previous post&lt;/a&gt;, I looked at provisions on non-consensual data processing for state functions under the most recent version of recommendations by the Joint Parliamentary Committee on India’s Data Protection Bill (DPB). The true impact of these provisions can only be appreciated in light of ongoing policy developments and real-life implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To appreciate the significance of the dilutions in Clause 12, let us consider the Indian state’s range of schemes promoting digital healthcare. In July 2018, NITI Aayog, a central government policy think tank in India released a strategy and approach paper (Strategy Paper) on the formulation of the National Health Stack which envisions the creation of a federated application programming interface (API)-enabled health information ecosystem. While the Ministry of Health and Family Welfare has focused on the creation of Electronic Health Records (EHR) Standards for India during the last few years and also identified a contractor for the creation of a centralised health information platform (IHIP), this Strategy Paper advocates a completely different approach, which is described as a Personal Health Records (PHR) framework. In 2021, the National Digital Health Mission (NDHM) was launched under which a citizen shall have the option to obtain a digital health ID. A digital health ID is a unique ID and will carry all health records of a person.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;A Stack Model for Big Data Ecosystem in Healthcare&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A stack model as envisaged in the Strategy Paper, consists of several layers of open APIs connected to each other, often tied together by a unique health identifier. The open nature of APIs has the advantage that it allows public and private actors to build solutions on top of it, which are interoperable with all parts of the stack. It is however worth considering both the ‘openness’ and the role that the state plays in it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even though the APIs are themselves open, they are a part of a pre-decided technological paradigm, built by private actors and blessed by the state. Even though innovators can build on it, the options available to them are limited by the information architecture created by the stack model. When such a technological paradigm is created for healthcare reform and health data, the stack model poses additional challenges. By tying the stack model to the unique identity, without appropriate processes in place for access control, siloed information, and encrypted communication, the stack model poses tremendous privacy and security concerns. The broad language under Clause 12 of the DPB needs to be looked at in this context.&lt;/p&gt;
&lt;p&gt;Clause 12 allows non-consensual processing of personal data where it is necessary “for the performance of any function of the state authorised by law” in order to provide a service or benefit from the State. In the previous post, I had highlighted the import of the use of only ‘necessity’ to the exclusion of ‘proportionality’. Now, we need to consider its significance in light of the emerging digital healthcare apparatus being created by the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The National Health Stack and National Digital Health Mission together envision an intricate system of data collection and exchange which in a regulatory vacuum would ensure unfettered access to sensitive healthcare data for both the state and private actors registered with the platforms. The Stack framework relies on repositories where data may be accessed from multiple nodes within the system. Importantly, the Strategy Paper also envisions health data fiduciaries to facilitate consent-driven interaction between entities that generate the health data and entities that want to consume the health records for delivering services to the individual. The cast of characters involve the National Health Authority, health care providers and insurers who access the National Health Electronic Registries, unified data from different programmes such as National Health Resource Repository (NHRR), NIN database, NIC and the Registry of Hospitals in Network of Insurance (ROHINI), private actors such as Swasth, iSpirt who assist the Mission as volunteers. The currency that government and private actors are interested in is data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The promised benefits of healthcare data in an anonymised and aggregate form range from Disease Surveillance to Pharmacovigilance as well as Health Schemes Management Systems and Nutrition Management, benefits which have only been more acutely emphasised during the pandemic. However, the pandemic has also normalised the sharing of sensitive healthcare data with a variety of actors, without much thinking on much-needed data minimisation practises.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The potential misuses of healthcare data include greater state surveillance and control, predatory and discriminatory practices by private actors which rely on Clause 12 to do away with even the pretense of informed consent so long as the processing of data is deemed necessary by the state and its private sector partners to provide any service or benefit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subclause (e) in Clause 12, which was added in the last version of the Bill drafted by MeitY and has been retained by the JPC, allows processing wherever it is necessary for ‘any measures’ to provide medical treatment or health services during an epidemic, outbreak or threat to public health. Yet again, the overly-broad language used here is designed to ensure that any annoyances of informed consent can be easily brushed aside wherever the state intends to take any measures under any scheme related to public health.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Effectively, how does the framework under Clause 12 alter the consent and purpose limitation model? Data protection laws introduce an element of control by tying purpose limitation to consent. Individuals provide consent to specified purposes, and data processors are required to respect that choice. Where there is no consent, the purposes of data processing are sought to be limited by the necessity principle in Clause 12. The state (or authorised parties) must be able to demonstrate necessity to the exercise of state function, and data must only be processed for those purposes which flow out of this necessity. However, unlike the consent model, this provides an opportunity to keep reinventing purposes for different state functions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the absence of a data protection law, data collected by one agency is shared indiscriminately with other agencies and used for multiple purposes beyond the purpose for which it was collected. The consent and purpose limitation model would have addressed this issue. But, by having a low threshold for non-consensual processing under Clause 12, this form of data processing is effectively being legitimised.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study'&gt;https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-03-01T15:07:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/general-comments-data-protection-bill.pdf">
    <title>General Comments on Data Protection Bill</title>
    <link>https://cis-india.org/internet-governance/general-comments-data-protection-bill.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/general-comments-data-protection-bill.pdf'&gt;https://cis-india.org/internet-governance/general-comments-data-protection-bill.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pallavi Bedi and Shweta Mohandas</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2022-02-14T15:55:10Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-arindrajit-basu-february-8-2022-notes-for-india-as-the-digital-trade-juggernaut-rolls-on">
    <title>Notes for India as the digital trade juggernaut rolls on</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-arindrajit-basu-february-8-2022-notes-for-india-as-the-digital-trade-juggernaut-rolls-on</link>
    <description>
        &lt;b&gt;Sitting out trade negotiations could result in the country losing out on opportunities to shape the rules.&lt;/b&gt;
        &lt;p&gt;The article by Arindrajit Basu was &lt;a class="external-link" href="https://www.thehindu.com/opinion/op-ed/notes-for-india-as-the-digital-trade-juggernaut-rolls-on/article38393921.ece"&gt;published in the Hindu&lt;/a&gt; on February 8, 2022&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Despite the cancellation of the Twelfth Ministerial Conference (MC12) of the World Trade Organization (WTO) late last year (scheduled date, November 30, 2021-December 3, 2021) due to COVID-19, digital trade negotiations continue their ambitious march forward. On December 14, Australia, Japan, and Singapore, co-convenors of the plurilateral Joint Statement Initiative (JSI) on e-commerce, welcomed the ‘substantial progress’ made at the talks over the past three years and stated that they expected a convergence on more issues by the end of 2022.&lt;/p&gt;
&lt;h3&gt;Holding out&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;But  therein lies the rub: even though JSI members account for over 90% of  global trade, and the initiative welcomes newer entrants, over half of  WTO members (largely from the developing world) continue to opt out of  these negotiations. They fear being arm-twisted into accepting global  rules that could etiolate domestic policymaking and economic growth.  India and South Africa have led the resistance and been the JSI’s most  vocal critics. India has thus far resisted pressures from the developed  world to jump onto the JSI bandwagon, largely through coherent legal  argumentation against the JSI and a long-term developmental vision. Yet,  given the increasingly fragmented global trading landscape and the  rising importance of the global digital economy, can India tailor its  engagement with the WTO to better accommodate its economic and  geopolitical interests?&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Global rules on digital trade&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  WTO emerged in a largely analogue world in 1994. It was only at the  Second Ministerial Conference (1998) that members agreed on core rules  for e-commerce regulation. A temporary moratorium was imposed on customs  duties relating to the electronic transmission of goods and services.  This moratorium has been renewed continuously, to consistent opposition  from India and South Africa. They argue that the moratorium imposes  significant costs on developing countries as they are unable to benefit  from the revenue customs duties would bring.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  members also agreed to set up a work programme on e-commerce across  four issue areas at the General Council: goods, services, intellectual  property, and development. Frustrated by a lack of progress in the two  decades that followed, 70 members brokered the JSI in December 2017 to  initiate exploratory work on the trade-related aspects of e-commerce.  Several countries, including developing countries, signed up in 2019  despite holding contrary views to most JSI members on key issues.  Surprise entrants, China and Indonesia, argued that they sought to shape  the rules from within the initiative rather than sitting on the  sidelines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India  and South Africa have rightly pointed out that the JSI contravenes the  WTO’s consensus-based framework, where every member has a voice and vote  regardless of economic standing. Unlike the General Council Work  Programme, which India and South Africa have attempted to revitalise in  the past year, the JSI does not include all WTO members. For the process  to be legally valid, the initiative must either build consensus or  negotiate a plurilateral agreement outside the aegis of the WTO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India  and South Africa’s positioning strikes a chord at the heart of the  global trading regime: how to balance the sovereign right of states to  shape domestic policy with international obligations that would enable  them to reap the benefits of a global trading system.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;A contested regime&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There  are several issues upon which the developed and developing worlds  disagree. One such issue concerns international rules relating to the  free flow of data across borders. Several countries, both within and  outside the JSI, have imposed data localisation mandates that compel  corporations to store and process data within territorial borders. This  is a key policy priority for India. Several payment card companies,  including Mastercard and American Express, were prohibited from issuing  new cards for failure to comply with a 2018 financial data localisation  directive from the Reserve Bank of India. The Joint Parliamentary  Committee (JPC) on data protection has recommended stringent  localisation measures for sensitive personal data and critical personal  data in India’s data protection legislation. However, for nations and  industries in the developed world looking to access new digital markets,  these restrictions impose unnecessary compliance costs, thus arguably  hampering innovation and supposedly amounting to unfair protectionism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There  is a similar disagreement regarding domestic laws that mandate the  disclosure of source codes. Developed countries believe that this  hampers innovation, whereas developing countries believe it is essential  for algorithmic transparency and fairness — which was another key  recommendation of the JPC report in December 2021.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;India’s choices&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India’s  global position is reinforced through narrative building by political  and industrial leaders alike. Data sovereignty is championed as a means  of resisting ‘data colonialism’, the exploitative economic practices and  intensive lobbying of Silicon Valley companies. Policymaking for  India’s digital economy is at a critical juncture. Surveillance reform,  personal data protection, algorithmic governance, and non-personal data  regulation must be galvanised through evidenced insights,and work for  individuals, communities, and aspiring local businesses — not just  established larger players.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hastily  signing trading obligations could reduce the space available to frame  appropriate policy. But sitting out trade negotiations will mean that  the digital trade juggernaut will continue unchecked, through  mega-regional trading agreements such as the Regional Comprehensive  Economic Partnership (RCEP) and the Comprehensive and Progressive  Agreement for Trans-Pacific Partnership (CPTPP). India could risk  becoming an unwitting standard-taker in an already fragmented trading  regime and lose out on opportunities to shape these rules instead.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Alternatives  exist; negotiations need not mean compromise. For example, exceptions  to digital trade rules, such as ‘legitimate public policy objective’ or  ‘essential security interests’, could be negotiated to preserve  policymaking where needed while still acquiescing to the larger  agreement. Further, any outcome need not be an all-or-nothing  arrangement. Taking a cue from the Digital Economy Partnership Agreement  (DEPA) between Singapore, Chile, and New Zealand, India can push for a  framework where countries can pick and choose modules with which they  wish to comply. These combinations can be amassed incrementally as  emerging economies such as India work through domestic regulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite  its failings, the WTO plays a critical role in global governance and is  vital to India’s strategic interests. Negotiating without surrendering  domestic policy-making holds the key to India’s digital future.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Arindrajit Basu is Research Lead at the Centre for Internet and Society, India. The views expressed are personal. The author would like to thank The Clean Copy for edits on a draft of this article.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-arindrajit-basu-february-8-2022-notes-for-india-as-the-digital-trade-juggernaut-rolls-on'&gt;https://cis-india.org/internet-governance/blog/the-hindu-arindrajit-basu-february-8-2022-notes-for-india-as-the-digital-trade-juggernaut-rolls-on&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>basu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digitalisation</dc:subject>
    
    
        <dc:subject>Digital Knowledge</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>E-Commerce</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    

   <dc:date>2022-02-09T15:04:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/cis-itfc-e-shram-issue-brief-dec-21-pdf">
    <title>CIS-ITfC-e-Shram-issue-brief-Dec-21 pdf</title>
    <link>https://cis-india.org/raw/cis-itfc-e-shram-issue-brief-dec-21-pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/cis-itfc-e-shram-issue-brief-dec-21-pdf'&gt;https://cis-india.org/raw/cis-itfc-e-shram-issue-brief-dec-21-pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2021-12-10T11:01:03Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/guide-to-personal-data-protection-bill.pdf">
    <title>A Guide to Personal Data Protection Bill, 2019 Compliance - Privacy Policy</title>
    <link>https://cis-india.org/internet-governance/guide-to-personal-data-protection-bill.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/guide-to-personal-data-protection-bill.pdf'&gt;https://cis-india.org/internet-governance/guide-to-personal-data-protection-bill.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>shweta</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2021-09-17T14:37:52Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf">
    <title>Facial Recognition Technology in India</title>
    <link>https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf'&gt;https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Pallavi Bedi, Aman Nair and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facial Recognition</dc:subject>
    

   <dc:date>2021-09-02T16:17:44Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india">
    <title>Facial Recognition Technology in India </title>
    <link>https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india</link>
    <description>
        &lt;b&gt;The Human Rights, Big Data and Technology Project, University of Essex, UK and the Centre for Internet &amp; Society (CIS) have jointly published a research paper on facial recognition technology. Authors, Elonnai Hickok, Pallavi Bedi, Aman Nair and Amber Sinha, examine technological tools such as CCTV and FRT which are increasingly being deployed by the government.&lt;/b&gt;
        &lt;h3&gt;Executive Summary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Over the past two decades there has been a sustained effort at digitising India’s governance structure in order to foster development and innovation. The field of law enforcement and safety has seen significant change in that direction, with technological tools such as Closed Circuit Television (CCTV) and Facial Recognition Technology (FRT) increasingly being deployed by the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet for all its increased use, there is still a lack of a coherent legal and regulatory framework governing FRT in India. Towards informing such a framework, this paper seeks to document present uses of FRT in India, specifically by  law enforcement agencies and central and state governments, understand the applicability of existing legal frameworks to the use of FRT, and define key areas that need to be addressed when using the technology in India. We also briefly look at how the coverage of FRT has increased beyond law enforcement; it now covers educational institutions, employment purposes, and it is now being used for providing Covid-19 vaccines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We begin by examining use cases of FRT systems by various divisions of central and state governments. In doing so, it becomes apparent that there is a lack of uniform standards or guidelines at either the state or central level - leading to different FRT systems having differing standards of applicability and scope of use.  And while the use of such systems seems to be growing at a rapid rate, questions around their legality persist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unclear whether the use of FRT is compliant with the fundamental right to privacy as affirmed by the Supreme Court in 2017 in &lt;i&gt;Puttaswamy&lt;/i&gt;. While the right to privacy is not an absolute right, for the state to curtail this right, the restrictions will have to comply with a three-fold requirement— first, being the need for explicit legislative mandate in instances where the government looks to curtail the right. However, the FRT systems we have analysed do not have such a mandate and are often the result of administrative or executive decisions with no legislative blessing or judicial oversight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We further locate the use of FRT technology within the country’s wider legislative, judicial and constitutional frameworks governing surveillance. We also briefly articulate comparative perspectives on the use of  FRT in other jurisdictions. We further analyse the impact of the proposed Personal Data Protection Bill on the deployment of FRT. Finally, we propose a set of recommendations to develop a path forward for the technology’s use which include the need for a comprehensive legal and regulatory framework that governs the use of FRT. Such a framework must take into consideration the necessity of use, proportionality, consent, security, retention, redressal mechanisms, purpose limitation, and other such principles. Since the use of FRT in India is also at a nascent stage, it is imperative that there is greater public research and dialogue into its development and use to ensure that any harms that may arise in the field are mitigated.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click to download the entire &lt;a href="https://cis-india.org/internet-governance/facial-recognition-technology-in-india.pdf" class="external-link"&gt;research paper here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india'&gt;https://cis-india.org/internet-governance/blog/hrbdt-and-cis-august-31-2021-facial-recognition-technology-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Pallavi Bedi, Aman Nair and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facial Recognition</dc:subject>
    

   <dc:date>2021-09-02T16:21:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/fundamental-right-to-privacy-2014-four-years-of-the-puttaswamy-judgment">
    <title>Fundamental Right to Privacy — Four Years of the Puttaswamy Judgment</title>
    <link>https://cis-india.org/internet-governance/fundamental-right-to-privacy-2014-four-years-of-the-puttaswamy-judgment</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;h1 id="docs-internal-guid-2282897d-7fff-7e83-1241-2ef1e8034b59" dir="ltr"&gt;&lt;br /&gt;&lt;/h1&gt;
&lt;h1 id="docs-internal-guid-2282897d-7fff-7e83-1241-2ef1e8034b59" dir="ltr"&gt;Background&lt;/h1&gt;
&lt;p dir="ltr"&gt;On 24 August 2017, in a nine-judge bench decision, the Indian Supreme Court located a fundamental right to privacy within the Indian Constitutional jurisprudence. Previously, the right to privacy has had a dubious existence in India’s judicial history, and it has been suggested that privacy is inherently a Western concept. However, essays by Ashna Ashesh, Vidushi Marda, and Bhairav Acharya — cited in the Puttaswamy judgment — dispelled this notion, by attempting to locate the constructs of privacy in Classical Hindu [&lt;a href="https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law"&gt;link&lt;/a&gt;], and Islamic Laws [&lt;a href="https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"&gt;link&lt;/a&gt;]; and Acharya’s article in the Economic and Political Weekly, which highlighted the need for privacy jurisprudence to reflect theoretical clarity, and be sensitive to unique Indian contexts [&lt;a href="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india"&gt;link&lt;/a&gt;].&lt;/p&gt;
&lt;p dir="ltr"&gt;Through the six opinions in the Puttaswamy judgment, the Supreme Court discussed various aspects of the right to privacy, reading into it the constitutional values of dignity and liberty. In Amber Sinha’s three-part essay, he dissected these components of the right, discussing the sources, structure and scope of the right in detail. [&lt;a href="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis"&gt;link&lt;/a&gt;] Further, a visual guide prepared by Amber Sinha, and Pooja Saxena provides a rich story of privacy in independent India, as well as a visualisation of the various types of privacy the court located within the broader constitutional right. [&lt;a href="https://cis-india.org/internet-governance/files/amber-sinha-and-pooja-saxena-the-fundamental-right-to-privacy-a-visual-guide/view"&gt;link&lt;/a&gt;]&lt;/p&gt;
&lt;h1 dir="ltr"&gt;Privacy, Public Places and Surveillance&amp;nbsp;&lt;/h1&gt;
&lt;p&gt;“Privacy attaches to the person and not to the place where it is associated.” - Justice Chandrachud, Puttaswamy&lt;/p&gt;
&lt;p dir="ltr"&gt;The right to privacy initially focused on protecting “private” spaces. These included spaces such as the home, from state interference. This drew from the belief that “a person’s home is their castle”. However, this idea of privacy is not limited simply to a person’s home. Privacy rests in ‘person’ and not in ‘places’. Therefore, even outside one’s home, other spaces could also acquire the character of private spaces, and even public spaces can afford a degree of privacy.&lt;/p&gt;
&lt;p dir="ltr"&gt;In a paper for the Centre for Development Informatics, Aayush Rathi and Ambika Tandon discussed the wholesale implementation of CCTVs in New Delhi. They deconstructed the narrative that equates greater surveillance with greater safety, more so in the case of women’s safety. Borrowing from feminist approaches to surveillance and privacy, they focussed on lived experiencess of surveillance with a focus on women living in informal settlements in New Delhi to argue that the ‘gaze of CCTV’ is intersectionally mediated and cast upon those already marginalized. [&lt;a href="https://cis-india.org/internet-governance/files/development-informatics"&gt;link&lt;/a&gt;]&lt;/p&gt;
&lt;p dir="ltr"&gt;Similarly, in a three part blog series for AI Policy Exchange, Arindrajit Basu and Siddharth Sonkar explain Automated Facial Recognition Systems (AFRS) while defining key privacy related legal and policy questions underpinning the adoption of AFRS. They go on to answer these questions by interrogating the existing data privacy laws in light of the mosaic theory of privacy, noting the dangers of ‘data-veillance’ and the need to recognize necessary safeguards. [&lt;a href="https://aipolicyexchange.org/2019/12/26/decrypting-automated-facial-recognition-systems-afrs-and-delineating-related-privacy-concerns/"&gt;link&lt;/a&gt;]&lt;/p&gt;
&lt;h1 dir="ltr"&gt;Biometrics&amp;nbsp;&lt;/h1&gt;
&lt;p dir="ltr"&gt;“The integrity of the body and the sanctity of the mind can exist on the foundation that each individual possesses an inalienable ability and right to preserve a private space in which the human personality can develop.” - Justice Chandrachud, Puttaswamy&lt;/p&gt;
&lt;p dir="ltr"&gt;Biometrics was central to the Puttaswamy judgment, as it was the collection of biometric data by the government to build the Aadhaar system that triggered this case, and the urgent need to commit the State to guarding residents’ fundamental right to privacy.&lt;/p&gt;
&lt;div&gt;Following the Puttaswamy&amp;nbsp; judgement, the Supreme Court tested the Aadhaar program against the proportionality principle it had previously established, which required every privacy-infringing measure introduced by the State to be justified by the tests of&amp;nbsp; legitimate state aim, suitability, necessity, and proportional result. Shruti Trikanad explores how the test was interpreted, in comparison to similar applications for biometric identity systems in Kenya, Jamaica, and Mauritius. [&lt;a href="https://digitalid.design/judicial-trends-pt2.html"&gt;link&lt;/a&gt;]&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Using the principles established by the Puttaswamy judgment, Vrinda Bhandari, Shruti Trikand, and Amber Sinha created a framework to evaluate the governance and legitimacy of biometric digital identity systems. Through three kinds of checks — Rule of Law tests, Rights based tests, and Risks based tests — this scheme is a ready guide for evaluation of Digital ID. [&lt;a href="https://digitalid.design/evaluation-framework-02.html"&gt;link&lt;/a&gt;]&lt;/div&gt;
&lt;h1 dir="ltr"&gt;Privacy of information&lt;/h1&gt;
&lt;p dir="ltr"&gt;“Informational privacy is a facet of the right to privacy.” - Justice Chandrachud, Puttaswamy&lt;/p&gt;
&lt;p dir="ltr"&gt;In the age of Big Data, the collection and analysis of personal data has tremendous economic value. However, these economic interests should not be pursued at the expense of personal privacy. Similarly, modern technology provides excessive opportunities for governments to monitor and survey the lives of citizens. Informed consent and meaningful choice while sharing information is central to the idea of informational privacy.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;Based on publicly available submissions, press statements, and other media reports, Arindrajit Basu and Amber Sinha track the political evolution of the data protection ecosystem in India, in EPW Engage. They discuss how this has, and will continue to impact legislative and policy developments. [&lt;a href="https://www.epw.in/engage/article/politics-indias-data-protection-ecosystem"&gt;link&lt;/a&gt;]&lt;/p&gt;
&lt;div&gt;The Personal Data Protection (PDP) Bill forms an important part of the conversation about India’s informational privacy regime, and once notified, will have significant impact on the way data protection is regulated. Explore the Bill, through a privacy-by-design lens, with focus on its notice and consent communication, its visual interface design and interaction with users, and the role and accountability of design in its interpretation. This was created by Saumyaa Naidu, Akash Sheshadri, Shweta Mohandas, and Pranav MB.&amp;nbsp; [&lt;a href="https://cis-india.org/internet-governance/blog/the-pdp-bill-2019-through-the-lens-of-privacy-by-design"&gt;link&lt;/a&gt;]&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Further, in anticipation of the PDP Bill, Shweta Reddy wrote about the minimum compliance measures that Indian organizations should take, to reduce probability of a crisis during the implementation phase, as was seen in the case of European organizations and the GDPR. [&lt;a href="https://iapp.org/news/a/preparing-for-indias-new-data-protection-framework/"&gt;link&lt;/a&gt;]&lt;/div&gt;
&lt;h1 dir="ltr"&gt;Pandemic and privacy&lt;/h1&gt;
&lt;p dir="ltr"&gt;Given the outbreak of the Covid-19 pandemic, and the eager techno-solutionism displayed by the government in adopting invasive and potentially unconstitutional technologies during these times, the principles elucidated in Puttaswamy are now more important than ever in upholding our rights. As Lord Atkin had stated in his famous dissent in the case of Liversidge v Anderson: “amid the clash of arms, the laws are not silent,” it is important to ensure that any potential solutions to the problems created by the pandemic are circumscribed by the constitution.&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;In an essay for the Economic &amp;amp; Political Weekly (EPW), Amber Sinha, Pallavi Bedi and Aman Nair interrogate the techno-solutionist response underpinning the shifts towards the digital in the governance agenda of the Indian State in the last two decades. They focus on the government's vaccination efforts during the pandemic to ground their arguments highlighting the issues of accessibility and privacy. [&lt;a href="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-july-17-2021-amber-sinha-pallavi-bedi-aman-nair-techno-solutionist-responses-to-covid-19"&gt;link&lt;/a&gt;]&lt;/p&gt;
&lt;p dir="ltr"&gt;Writing for the Deccan Herald, Aman Nair and Pallavi Bedi note how pandemic technology infringes upon data privacy, resulting in surveillance and exclusion. They suggest that the trade-off between privacy and pandemic technologies is unjustified given India’s digital divide that makes digital-driven approaches inefficient. [&lt;a href="https://cis-india.org/internet-governance/blog/deccan-herald-aman-nair-and-pallavi-bedi-june-13-2021-pandemic-technology-takes-its-toll-on-data-privacy"&gt;link&lt;/a&gt;]&lt;/p&gt;
&lt;p dir="ltr"&gt;The practical implications of such techno-solutionism can be troubling. In this blog-post, for instance, Pallavi Bedi writes about the privacy concerns haunting the Co-Win platform noting the lack of privacy policies governing the app, lack of clarity vis-a-vis data sharing between different apps such as Co-Win and Aarogya Setu and how it would violate user consent if it is used to develop digital health IDS. [&lt;a href="https://cis-india.org/internet-governance/blog/an-analysis-of-the-covid-vaccine-intelligence-network-co-win-platform"&gt;link&lt;/a&gt;] In another blog post, Divyank Katira compares the benefits of Digital Vaccine Certificates with regular paper-based ones while focussing on the privacy implications of their use with recommendations on how to make the technology more privacy-respecting. [&lt;a href="https://cis-india.org/internet-governance/blog/do-we-really-need-an-app-for-that-examining-the-utility-and-privacy-implications-of-india2019s-digital-vaccine-certificates"&gt;link&lt;/a&gt;]&lt;/p&gt;
&lt;p dir="ltr"&gt;Moving beyond the concerns raised by the adoption of digital measures by the government, Vipul Kharbanda examines other measures, such as releasing the names of COVID positive patients, putting up notices/posters or barricades around the houses of patients. He analyzes these measures against the existing privacy jurisprudence, including that laid down by the Puttaswamy judgment [&lt;a href="https://cis-india.org/internet-governance/blog/government2019s-covid-19-responses-in-the-context-of-privacy-part-i"&gt;link&lt;/a&gt;], [&lt;a href="https://cis-india.org/internet-governance/blog/government-covid-19-responses-in-the-context-of-privacy-part-ii"&gt;link&lt;/a&gt;].&lt;/p&gt;
Finally, during this pandemic, governments across the world have employed aggressive technological measures to trace individuals and enforce quarantine, costing individuals their privacy in exchange for potential benefit to the collective public health. Mira Swaminathan and Shubhika Saluja document the lateral surveillance this had encouraged, with people keeping a close watch on their neighbours’ behaviours.&amp;nbsp; [&lt;a href="https://cis-india.org/internet-governance/blog/essay-watching-corona-or-neighbours-introducing-2018lateral-surveillance2019-during-covid201919"&gt;link&lt;/a&gt;]
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/fundamental-right-to-privacy-2014-four-years-of-the-puttaswamy-judgment'&gt;https://cis-india.org/internet-governance/fundamental-right-to-privacy-2014-four-years-of-the-puttaswamy-judgment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Newsletter</dc:subject>
    

   <dc:date>2021-08-24T04:55:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/june-july-2021-newsletter">
    <title>June and July Newsletter</title>
    <link>https://cis-india.org/about/newsletters/june-july-2021-newsletter</link>
    <description>
        &lt;b&gt;The newsletter presents the work done in the months of June and July 2021.&lt;/b&gt;
        &lt;h3&gt;Announcements&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We are pleased to announce the launch of a &lt;strong&gt;seminar series&lt;/strong&gt; to showcase research around digital rights and technology policy, with a focus on the Global South. The CIS seminar series will be a venue for researchers to share works-in-progress, exchange ideas, identify avenues for collaboration, and curate research. It will also seek to mitigate the impact of Covid-19 on research exchange, and foster collaborations among researchers and academics from diverse geographies. For more details on the first session, &lt;strong&gt;on Information Disorders&lt;/strong&gt;, and to register, click here: [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/5rYRQ0U6yOrzlX_5e9iqnD_UB7xRMkmO8EVgecX5S9vDUhOLzn5WpJ0OxgmH2vkh7APoOqCGaRVN7fbP4hfGnUPT63lb2O87rMGdk4RE4xpKcYzABQ2MhfjmOr_3FkIJtbxITjKFXrZRVlI-An9WPxyiN-QtsOJjpxV0baaFxLqDmy_TnlrW_FLKnXYXkTNBbxlIifakqN_m9fPpBaaaMJF_KetoeIUtNQIoHYTtcIQhNoelJ8-I28gyVM1-9w61Ew"&gt;link&lt;/a&gt;]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We are also hiring for two full time remote positions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Research Associate: Access to Knowledge Programme: Apply by &lt;strong&gt;August 13&lt;/strong&gt; [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/tn9z7DynIuxWFSSRGmZ50s_HYg65AwLX75HcYf9qBiEJsrkj6teE0WzDGHWCezRU7S0d4Li9WxClerez9wuhwJFHRpki4ynQYqrFoAh7dKnqJKulAW_7VyZIrgxsBri_sYFlGanbqT0IW-9HdYDbVbqyjvgAUl06_OlaHwOMDzO833kR5cT3BwaLUSDOhZqfFvwVNZav-DBH1q9Kr9bWXdtPe_g_wDm-PW3lMxudyF7SKkCLrGceKAec1QiU"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Communication Designer: Apply by &lt;strong&gt;August 20&lt;/strong&gt; [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/lskNSP_MjDCNYOT2PmiuZiGB29gga3crwxuXyJYEF8rdPYDDerNnNYnnCV-GG8rdnyqkxU4eJofgQXU1-iS2IPRRGRRtBXXEaUSVB3mioQNSRwwIecWmm2TIFkfi2fAL7grkxRKKKAX2PG87TiWk8hdmOUqcqtEX9dqbsudTQ3xgmZOio5BOC4GL6mxMzN_9Q5_YzOzZxSZzpT7SMm1J_HASTKNuUktcaESwbMV7PO5sPic41ymaDT8"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Cybersecurity, Privacy, and Emerging Technology&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Following the MCA notification &lt;strong&gt;mandating disclosures of crypto currency&lt;/strong&gt; holdings by companies, Aryan Gupta, in an issue brief, discusses the policy landscape in the United States of America, United Kingdom, and Japan with particular emphasis upon &lt;strong&gt;definition, accounting practices, and taxation, with respect to crypto currencies.&lt;/strong&gt; [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/IapPj_hXCzk7v6Hf21yy36-Sz8hRKHv8zkjWHYoTB7Tu5pnKDAw25QMx5zjerDAadU3BAHF2npDH_q9m81nhsGEbEBQqfWIksFuU7FqAIoREOxap2dkrtGy-X49B1okL_K-zz4zOgG1nyg6ct03r-xSZw_C94Cc8MzubQ2tzmsZjEYGRlxHywlK8a7988SepnX7wbWd2aDt6rhgDNxSBU6AJh3DeygvFctc-wWW9F-Q5e81ADlC9Xei9IoYdHlJrbvOMikdM2WlvJLzb0vnVlDJqd_7x4B7_XdshOYFQ4YRljV4O"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;We submitted comments in response to the Supreme Court E-committee’s draft vision document of &lt;strong&gt;phase III of the E-courts project&lt;/strong&gt;. Aman Nair, Arinjay Vyas, Pallavi Bedi and Garima Saxena submitted their general comments and recommendations, and comparatively analysed the &lt;strong&gt;integration of digital technology into the judiciary in both South Asia and Africa&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/a-ADiN4WA0-BN9-GzZs_TH-rDZ6m1ii-4HzEzLfXdwVXmGyrIYBcuU7EMPd865oDaqEYSihJoqjxTyuC4usIwryJorATCH47YWEUlUAXce8b2TudJcdAsWryfDvls0WhJFQ9TTw4Bt5ZPfdDmToylNX9ECLuOvO851uSycsDHetWiQhQXaDELUcbQKXBZEbhxtFos2ugg4PHwLXNhwM9iKMb1Q-4OuONy6YcnpFcB3fVUeLvWVp4aBEngQVUnvfLfeVdMvGWNoDk"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Google’s new Privacy Sandbox platform promises to &lt;strong&gt;preserve anonymity when serving tailored advertising&lt;/strong&gt;. But does this new framework help users in any way? Maria Jawed’s analysis reveals that Google’s gambit to &lt;strong&gt;reorient the ad-tech ecosystem under the garb of privacy&lt;/strong&gt;, ultimately ends up undermining it. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/pwRhJ3bFqQSxSMBZ-qNYKO59aoQ95F8ro9x-8vBy2QDQiBpNFb-qLH4I8Ph-o65OT_bJnNcMoJzFBig6nxqFFcT7qtvR0b6bakvkH4pQRJalgbpLCylKEblBaFkiAudZPamJaz7XIeQ3mMQNQcnk9jxhjGW4yu6YFB8-h_G4nYcZg9lJCj35EZMG-bdl79YR6VEUb9jVxmNFoDXuTiUBCHjeSqP8yqPgHS40nzZgSqD7JMoGiSPT6G7K1xwQUBQLKzlCjKGGoaioxOOWS7qw8BrAQtuKIc4xxRvos-IkyJUA0g1W8wUqjNK7NvYR"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Pandemic technology is taking a toll on data privacy, especially in the absence of any legal framework; these tools are being used for purposes beyond managing the pandemic. In an article published in the &lt;i&gt;Deccan Herald&lt;/i&gt;, Aman Nair and Pallavi Bedi argue that &lt;strong&gt;India’s digital response to the pandemic&lt;/strong&gt; has stoked concerns that surveillance could pose threats to the privacy of the personal data collected. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/Aye_SwuSiE165Jg5KCM8Xlu9VfO971hqjgMyX4Gv278-mjdbOrJ-pT_WYUbbFG0344IvZPu_ZqcvDp0hcVjfGVaWGAhKvBZDinhfhGSD7VvAE53bWwBah-W8vKt_3F0VP70pUKqESr5WztG-fPEOtB94MghogG528WknuMCtyA29jFZg7JvA2Qy1mR4MHAwQq2tJjvzyA_woJHqaQ2zW9at0DVmsSszAoApTe76XUE-ZoPMUtpNXT464bp-CYx1vY0jeFHyECbR6gHkoBNl-h4pwjkz2i9yOaOntXmNuf1kTX2ARhZpiMNjSmnYMf_5K_vEoGzQK0w1N6CuYG9dHLX2l"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In a piece for &lt;i&gt;The Wire&lt;/i&gt;, Aman Nair analyses &lt;strong&gt;Tether, a lesser known crypto currency&lt;/strong&gt; that is at the heart of a $3 trillion market. Issued by Tether Limited, Tether forms the foundation for modern day crypto trading and could potentially be one of the &lt;strong&gt;biggest schemes in financial history&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/YKCj-XnMRae1xKW-I5Vc2QZ531_WbOyKyzDAaHwXjqatVsRL9KTiy0LW50cP7Thc5zIV1vTZpRlnJuXzfYGNyOH92MtVSacioSMhehA-8TpG62qt1HMjOndXVcukp5TrJ_Z4jhyr_B0qg7hItuk5fJ9-Kw1Hh-SiRjvYGdVX_ZD2dY8NxTfKn4f7GnqP2bzHT3HWNO9yPzA6KfVPSawYFVLyyIf46leO7oJ5SIKyT4MawaPTtu9FDH5nfhMMgdm9YIFYIkuc12ZF8vargG4gMd608s5mt8kg1hpub4d3pi3o"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;India has 500 million internet users — over a third of its total population — making it the country with the &lt;strong&gt;second largest number of internet users&lt;/strong&gt; after China. With this comes several kinds of digital threats that an average digital consumer in India must regularly contend with. Pranav M.B. attempts to identify the &lt;strong&gt;existing state of digital safety in India&lt;/strong&gt;, with a report that maps digital threats in the country. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/7DnN6eodtvhnJdNwrTh3BU4_wJCm2_Ct9eG7-nmis2QkS4qgiiX4--Qa0TTqxqJqUNHmn3xnedwSoNGVRd0smQAgaFGQ1PLpfwVhmYPO4vaXGiF0dkcRjZTHk1W5mCRTZ4CpIx2zKt4yn1WKAy3dIBxa-xnoEQMUY4YrZRqeQr1M_JwHV3KmHWG2J1CgmXUdY13h6bQ9QEDL16a5G-eN6zH8ttyLM2kXF30BnXgkAL11Sl_vZs9AdeR_UoDQJKObf3BEoq8"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Since last year, there have been regular questions around the &lt;strong&gt;anti-competitive practices&lt;/strong&gt; of digital platforms. After 46 US states filed an antitrust case against Facebook along with the Federal Trade Commission (FTC) in December 2020, Kamesh Shekar analyzed these developments in a blog post. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/svyv1CoITzbqrsIl54oOKHsVb5xbZsOjr-IIfJndIFs4FbasMTa8xPr308vsVz_owTEDCl52kc-B-8gqND7dedFPmINs25UkG8kwkeYNcktOKUUty9Zms5UqyAXnyBUFkrbccLYTL8X7DtYXy9UCoLj6i9kGiUgJyNR_ePM-32LsWT2dzMRvY3MLjtyTTeWzqv1kPYcud-kpCxX9zMid4KJZIY7fJSLCsCPiXvrcc5RjQ6wO8SxOlNzRwDLztrG9MlWjBAOom4m32Hc3Az86wUcL5h_dTnpcqiHVCjudMiD2Wz9hKAcXbBF-mMlrTS61GXYC3B9PEMLilqy1XdCSLA"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Recently, the Indian government mandated &lt;strong&gt;online messaging providers to enable identification of originators of messages on their platforms&lt;/strong&gt;. In an academic paper for the &lt;i&gt;NUJS Law Review&lt;/i&gt;, Gurshabad Grover, Tanaya Rajwade and Divyank Katira conduct a legal and constitutional analysis of this ‘traceability’ requirement, how it can be implemented, and how these methods come with serious costs to usability, security, and privacy. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/7VVDI4qoefdH1M0wYht5ypELl3sgVp1Sbz2TM_DsnX0l0o2wb-2Jq0wob7as43ltZn6ZssVx21Kb6WNIz16SwxuNYxLMwFaVL7Yqu-8eX3FzktAgtzePud71Rw38aDqYPUcb7aIzIkcrEgohiTTqr4KBZglu-g5Vc21w3pwXDKyjSXh_jk_8EIqLlZ2GF5ItEZspJwQGD9VzftHVEmz5AdqcK0Zcar_OOU9nGP8JrckN9xehbcAxzJ9V7lbKaLa6fVq_xbwLO2UqdClq7XIpCoUf9EgkKQ"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The National Digital Health Mission: Health Data Management Policy seeks to establish a digital health ecosystem by creating a &lt;strong&gt;unique health identity&lt;/strong&gt; (UHID) for every Indian citizen. Pallavi Bedi points out that hasty implementation of the policy without adequate safeguards not only risks the &lt;strong&gt;privacy and security of medical data&lt;/strong&gt;, but also undermines trust in the system leading to low uptake. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/I2XtCVqE0YUtaHHNBuG2SqhPciFDA8vAFssL8OFfrAIIw4IF4i0pC5aKw-bZofPUZI2o59tp6OVhScUGULq-yqLWvlZRi8AvmUhsS6gOvkWJJnC3Jpjyu5u2I2wysy-Q4Kt4TAOMgvcyr49ledwzRKHEo0lsRhQdFZ4VJMq10oyuB5bMF0vIWCJ3VqXUrb41hRJI5OUhxzXiGZmznPSy0p-gua0i5SvyeIn-uZTQjOFvdP5He9mT3HSsaw"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In our comments to the proposed amendments to the &lt;strong&gt;Consumer Protection (E-Commerce) Rules, 2020&lt;/strong&gt;, our analysis focuses on eight points: Definitions and Registration, Compliance, Data Protection and Surveillance, Flash Sales, Unfair Trade Practices, Jurisdictional Issues with Competition Law, Compliance with International Trade Law and Liabilities of Marketplace E-commerce Entities. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/KsxrVD9CtofFFSJKNnNl4rbZSQJxomJbHYtB6gaF-CJrz6NTc3iLI__BZ3Af7DRwDzklM6bD3o3OU8Z9g2llAOWtrNsQdWfxmaky4BZfyHArp59Ciryun36-inqvCvTtCz4MfM_SxYe7DWZQjbigMwPTuyM1nTjfuZZESbCU0kHL5uxK09aQvMmYUfBPfBjrUuCPSnz1q_SHSOh38kHHRw6JdIuOl-FX_Fu_pSAFCPpBCjmoqiyRpWbgQQw3C8dbSnJ9sMWXbopXwWS99f4vPqMGK6Tn7w6tWJqmQa8hA3wAQsH8wJgl315nOQ"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Freedom of Expression, Intermediary Liability and Information Disorders&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The recent “Infodemic” clearly shows that &lt;strong&gt;disinformation costs people’s lives&lt;/strong&gt;. CIS, and the Global Disinformation Index have published a report that examines &lt;strong&gt;the risk of disinformation on digital news platforms in India&lt;/strong&gt;, creating an index that is intended to serve donors and stakeholders with a neutral assessment of news sites that they can utilise to defund disinformation. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/oAbyvMS6qTJApmJnnokcclFKfhiXT90qwxve7vAzjNgoVJE7zL3znp9z-jVBaY_A_UghvzrqrbzPyQ8MWgNOqFX_zmz-LXX_QXxpTHcJCq0iQbudFAskKA4MQbW9ipPMHHkvCZ4sjD9YJ-f76ZHCOVs8aTp09SRza6UxxFqz2Lf-wyXOBkjjnSojLEnIzg_6Xyg-MV80GnR0MyptpLT6Ox44jMpuKSDNkziRqXdVFv2UiHFPUq5_kQFItEunUPazzjbXiO6aT6InqGhlHTpBpFR1ojSmP1YOtTCl7efQ-b_jHIbk-BBXDoDE4JF-TskvA8NvEln98dD-0ADQRopsvLp9XWDGiQ"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Torsha Sarkar, Gurshabad Grover, Raghav Ahooja, Pallavi Bedi and Divyank Katira examine the legality and constitutionality of the &lt;strong&gt;Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021&lt;/strong&gt;, highlighting potential benefits and harms that may arise from the rules, and making recommendations to retain the rules within constitutional bounds, and retain consistency with human rights based approaches to content regulation. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/xeCVOWx8opFVXsJsk8tGp7BqtYUkK2zovJDarS6GLbKTR6VL0JLLSA-ap81tloriYQLLg6Cv1HxAws110HUv2UUabdK0aCbOvdeL2AtTWGD4zL7LEsC1gAIHyvP5DCYWo8flbZwKL0UNrMa-Bp8mmAOPTNTaHHyHjt6SyvidPNrc2nvjuwWNDsgPITp_PBAYDBmfwu02GfVr14URroyiEeqExwha0b0RlSPhrunshSDIXND6-AaBkVuGJ8VdnE-bMD7FHdAa559EsTcyhmnPiIYanR9fmV6UQHb7Q65yD7jENV3-lbzRCkAjki09Qvia1nxacxBIWHb-w3_PlbB7GkJXbl8_qVZHEWhyzTnAxVoGA-je-7W-x-eFOetThpo"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The passage of the &lt;strong&gt;Intermediary Liability Rules, 2021&lt;/strong&gt;, has also formalized the legal requirement for the utilization of automated tools in content moderation. In a blog-post for the &lt;i&gt;KU Leuven’s Centre for IT and IP (CITIP) Blog&lt;/i&gt;, Shweta Mohandas and Torsha Sarkar analyze the requirement in light of concerns of freedom of expression of Internet users. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/kfCCqzfLNuv79Hdeo_EA2wt5o0LRgortN3TKK_wup26r0wlpxdBW0C-m_IDPDssS9Ie8vuBmq3TrK6Bo0jfGRs1qD89TEU2wzVysBv9kAjUiosw2pXQiNir2ylQAnNBxnwyCe_qibQIf9UOGjlvP8d8iB1XZ1QPqQUl_yHKFDrPUme0OS2EUpis_rSoVy1ZOfH-GGHo7iNYRMcqqjbmCKtfZjmLvWY86v2Zk2EjLPXr8OA"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Our comments to the &lt;strong&gt;Cinematograph (Amendment) Bill, 2021&lt;/strong&gt;, authored by Tanvi Apte, Anubha Sinha, and Torsha Sarkar, examine the &lt;strong&gt;constitutionality and legality of the Bill&lt;/strong&gt; and whether the proposed amendments are compatible with established constitutional principles, precedents, previous policy positions and existing law. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/Ao1Sghs95JSFnpzMq8bTUYQ0z1F6uZOfg6M2Stt2ceVvCf4b0iB_3f-Yx7uywoASrATvOSS6uPYTVbP8x_JLqoD9QfvjD5soYvlNJBd87FuNyxqAb4wQ8cjOuN7B44pRo65xvX9K29eBGFp7fgv-AD_ok80j4SXnAZ6LrYClxPiHC48fiisVOW7McLfsFpLtUsns1u6MIG_7FMAKNY0GHFxa5xs3lM21mrhkEcC6I7sbimtF0jmOkid5nzYbcOrtQ5ZsvrdxSRllmmOy"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Tanvi Apte and Torsha Sarkar, in a submission to the &lt;strong&gt;Facebook Oversight Board&lt;/strong&gt; in Case 2021-008-FB-FBR: Brazil, Health Misinformation and Lockdowns, answer questions set out by the Board which concerned a post made by a Brazilian sub-national health official, and raised questions on &lt;strong&gt;health misinformation and enforcement of Facebook's community standards&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/h-QObkDu8td1bmkfzIEHJlAmS10MohQnXiyqHQKNEnQkEpvkdTxLkKV3yJO7CcTJGDcS0kRQVTDEE8KNbb-551uGYLiaV3wFoxJ9tGnvMBaqvtPgYgxZbnAMOowSxN7gQJTqSOZwzMVQtSbr449f6KC0Bb208ApIh2a8OX_HCRwn2BYpoTvqUfeyFZyp2qoyW5LbeAe9P-JTlFrDaB7oFBXvTHvlJfTRrT6ZeLlkQqA_RqMOga71-sxDIxBo0vvn-9r28DcTePg3p659lJ0CWQMCXiz4tY1p3cLrJgKl3K3fjignnvexZpNwk91paBQ_Bia2DDUxc1Vxmvci1p3AASg3FtYqL5l1"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In an essay for the &lt;i&gt;Indian Journal of Law and Technology (IJLT)&lt;/i&gt;, Torsha Sarkar analyzes issues rising out of the recent &lt;strong&gt;litigation between Trump and Twitter&lt;/strong&gt;. Torsha examines intermediary liability issues under American law, and draws parallel for India, in light of the ongoing litigation around the suspension of advocate Sanjay Hegde’s Twitter account. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/JxA_S2DzStQUHeEVzf9_Df15_QnK0WHgMEjaaCqNjLmfXPAS4teU_fvrDtG9R4OwwOzWYiAXWPE3QFaxOZvJ5VCHuwincnLyGpYpWME0K5x8CJwyW0vUhC-stExhsSV_5pLmEtfaVyzcGRaXsJ4jGnLWnrADSdYzpPjUTPAb6hKDDL5BBjLjzvRt14_y3_9RNos99UKlpOCv9UFR6gC6cmOQmqte1UICPRw54oI7TUMC8TfPow-JZGmeA8lmMtODPi5dPN91euSX0g"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Copyright &amp;amp; Access to Knowledge&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The Indian Parliamentary Standing Committee on Commerce’s report weighs on several aspects of the &lt;strong&gt;Indian IPR system and issues of protection and enforcement&lt;/strong&gt;. In a blog post, Anubha Sinha summarily notes the observations and recommendations of the Committee on the Copyright Act, 1957 which stand to impact &lt;strong&gt;access to knowledge&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/20Alo2_Tse_JJBXG7sp9tp3Jf_qIUy2ksAvhoVH4heonMxDYRQK4nweCNF8LP29mpKvznQC8vljEX7TCv-Wb6SQREV5ph4uYOVIgz4wf36MaGTw8T5dkCxjqttA5V1tzNxdpfKi1WqQJKSFJ3o9Eog0uVFhHd3wXaYwiukkD3WHoDeYkOSZR_DYTGlm6nebmtCjaRRhTqwGMPYkZsKxM2td9xO2GBfP-J5R8llhxsrl1MvaUyiRBLIASh1l_KNpvCtlix-3Hot2VozymMTWyPG15W6s"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The 41st edition of the Standing Committee on Copyright and Related Rights (SCCR) organized by the World Intellectual Property Organization (WIPO) was held from 28 June to 1 July. Anubha Sinha participated in the event as a speaker and delivered statements on the &lt;strong&gt;Protection of Broadcasting Organisations&lt;/strong&gt; [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/VysBbmMrMfJH2U5C8TeeVWtBq8wqBadivgBYyh26sNYegYdfaR4Tg_G6v1FqMgyVD6KAm3Z1tKWm256qR0VlPwGircBtmecePp2_-24cYoFWCoDH5v_5MuytzvKUIHkSlZ4cXN9CtUZ9t-92oeqAe5qm_CDhT0Xu7G5OZKn1_9s56JlL7E9FiWa0U5l2PYeonXi9H026DNWNaOPHQ8nvvYlmvIcTkwvKWQ"&gt;link&lt;/a&gt;], and on &lt;strong&gt;Limitations and Exceptions&lt;/strong&gt; [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/TBrEeBXDldm7nDPpsENoKMft-G03I54LhjmedXzSkg1RPImWfwqhCZ7bwXpwsXbIuVvOLd7G0RtA7PgCDKqHKcYjWzHr1K8Dd8oSUYIasd8N_tlEiMedkl8eTmoz5Cm_cLV8NlYLzIbsrHCxZhhPUApqXJprQ39qHf89pyRS2Zcw1HUYW8d-rVWobmlbW4MVr0EvBz0gbWpz3NLbh9W71pVK1VN9j-ge--ine3yx-uSoyel8qUGs0mPqw0NXp0nEUnIP32r3qHvdjzEbz4Ynagm2ww"&gt;link&lt;/a&gt;]. Readers can access the notes from Day 1 [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/W_H8QjZ4FUv92dhzAdWKRTS508l6DEy7YOb8mnsf-ZzcQeMZe8TCW3XG5Fs7j1BO678zXMJn5jZiXL2eI4ZVNjrE6Sz8XcQs5fJ4z1EZSQTr-vMsaJsroyckdwmtQnOepz5KMLPZl4OnPm6ERcnJGBCVp6v7PZgpxVBGp5PR9Fo4e_TncX2qm_q_aB_e9s3I2vp8PReJJVYoEl53xIqWKkBqXlWk2RbqOQ"&gt;link&lt;/a&gt;], Day 2 [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/DRaLcVvuB-VfY7fjrVtjA5hPHTFt2KwIt2hsH4mjuuYlzJLCv5r9O3R5-4Rg72Bhvw3kMYaowZuZorJN8DXJjhf5NABvf519ig4SyCsIUri4mXWjDA1lmCHY_Oe1WfTq_VLVxwOb4XYp8VVnKIIcgAg1kseXVSENaugyRZI3otS_IUn_zNwEkw2PdFEojqryYcf5kiEADKQ5sRuVH8WB9pncRKgCvpOfFA"&gt;link&lt;/a&gt;], and Days 3 &amp;amp; 4 [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/dTkOebRyoXNDfdFetpwM6-mmRSpH7gwM1RL-SJmGMrbF25H9Y4-lo-nQ8HINcrM1eUmX9nqvpmoL26wsIsbAhOJ3MQygMDJpTQc-RNGk07WOUyH4GFUuejBJzsRBkQn44CEDxkcSQBzyLQHGjKakTPDRFszrjnLqD3e9jXfs77ie7wKRazrFjyssNPscxSg8xmrcfv89klVCo-Ts6ApD6nuRi3t0nndX2DAQ_hw_WlYLCgfmyw"&gt;link&lt;/a&gt;].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The CIS Access to Knowledge team published a comparative analysis of two prominent Wikimedia initiatives, &lt;strong&gt;Wikipedia Asian Month&lt;/strong&gt; and &lt;strong&gt;Project Tiger&lt;/strong&gt;, to understand prevailing challenges and opportunities, and strategies to address the same. Nitesh Gill in a two-part report outlines the research questions and methods of this study [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/HZI5YNgRhNViR9DS-ewrTbGX-5PkynXGEMDr5kfCauCk2OYuygd2I3Da7Tp1kyhG1Oboc0MxIelbvOqpVQHHq0JVRgbyEVMPZiTWPhQENwnv_pfOR8KYHZzzLKv7Tc-iFk6qBgCCDSbnwjmA7sfiC3FDHFvqzbEGlMMUIg1XvcRNu6fFBWe2S1W5lsdZD00dY0r-w8o3IkzCSbKwHqJMld7CQvl48lpzGHtKFreKT_MiB33iis0Fehz-nrz7DlT-k2GLTpwScqX4DcHrLjWb7A"&gt;link&lt;/a&gt;], and then presents some of the observations and learnings [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/bdLNf3_CCDaXpSzzhYF_2ThcU-LuTFb6k6HDcZ_4myjIWm-GlwXcDVQweGpaYjKKt4NmMol-HxoPucMx6w3-HC4QUmPULVJ882x8AMHaRehpgFh9t8cYPB6VPyjXNgcbzjSfOQXE6GpUDhrGYYg6KTmuH6t7F1qlOcoc_qlglL4vz5yCBL8Ri03yfZZVcfheY5Ly5lUb3WSZMpsO1u6n6KaRC_YFemwGu0sWsWgjW-XPRSNAyxHKeGLlUS7eN7wNvx-iLCLb2-VhEtN64QZHaxUd724J8Fg5"&gt;link&lt;/a&gt;].&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Labour and Social Justice&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;In a flagship report on &lt;strong&gt;domestic and care workers on digital platforms&lt;/strong&gt;, Aayush Rathi and Ambika Tandon argue that digital platforms are complicit in discriminating against workers on the basis of their identities, and that domestic workers continue to remain in precarious positions without any legal recognition or support. This work was jointly authored between the Centre for Internet and Society and the Domestic Workers’ Rights Union. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/sm3NIXtD7ClOE3mjbw6fg2ZvZB0TI3dh6rnb4vb6Hv0Ev_VwikRY-XOESwuw3-Gfglvi7OHT5l-PthXPf2rn3UDbiRRE3jaRzidnzl5uPs6ZqdtktRRVINgR3CCtZ-grN_QKqZN9KefjfMYgB7klWARTLAkZbSsKmoyrLiIZ0XMVXkYWu_F1do2eH73g_cTDDyKJiQiq9wWsbLzwjsEWoZ1uR0H2wqUp1ZOfkEyfkTbU0YojEnLVenrB-X7HDp812pjRMqHbw1qAskYpol6w_Tca"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ongoing pandemic has raised very valid questions of &lt;strong&gt;access and infrastructure in India&lt;/strong&gt;, especially during a time when the Internet and digital technologies are essential, and in many ways the ‘new normal’. P.P. Sneha and Anasuya Sengupta write in &lt;i&gt;Seminar Magazine&lt;/i&gt;, outlining some key &lt;strong&gt;challenges in digitalisation and representation of non-dominant/marginalised languages&lt;/strong&gt; on the Internet, through reflections on two recent projects related to languages and the Internet. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/iWhSEkwBqINHVVX-zy-cEtFRkWyCSoGeumeW2KNYU8gylOUgjNWiIceMev9vAcoTdrNvCoBtuZKcHSmrG3oEZ5Wypr7VRmrecPMNbuxUDoIF4FJGIlzAPeQ8dpdyeeHeQqANiU3oUN2xKTpRQ5Tin8PUoWRfMm5YXh_iougUbkun-Tq6NSjRkmvbiWXeZyphO9R44QWTrxDm2wWOdlCh2reGxocxbpNMzDPlGmxnA18sMsFi73SksnR9lQh76ylSM2iIYr3ptZk61DznsmUdfr0BK-GQL7HcD4M"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;With the onset of the national lockdown on 24th March 2020 in response to the outbreak of COVID-19, the fate of millions of migrant workers was left uncertain. In addition, lack of enumeration and registration of migrant workers became a major obstacle for all state governments and the Central Government to channelize relief and welfare measures. Ankan Barman compiled a report to &lt;strong&gt;qualitatively assess health conditions of migrant workers and access to welfare&lt;/strong&gt; during the first COVID-19 lockdown, in three host-states, Tamil Nadu, Maharashtra and Haryana. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/hU5-1FD3nbo69KurjQmXES36QSFtRZSHr4FuCzsscEMQOUOZD523Cc-iKliMQQWvm7AFZQ2JJtrcPhNeqoAS7ASS2X0_c9D3D_yvS9IuqLpt_xHpSUdVxnh85ZSVlSr07zj4mucQogJy6c2ZHw6zgQAmLQGkcl4xr__txUaycSpVKrqmHcBb3RBw2YkBTvxRfFnll2FcPmmfFYhGf1_SGM1baLyoZscYZ96h-AB1tHzg4Lao2KfFIhJ-RxHtC67r1nytTWNCRy8pY4QWmx2g-kBw0EAD4vl94LmPX10tdqmvBreDz3xxfN4o9h0OHfEzZARXb2dQFnHltqvRjPq5msyzW69oXuZZsDs0pcS6yYA"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Between July to November 2019, Indian Federation of App-based Transport Workers (IFAT) and International Transport Workers’ Federation (ITF) conducted 2,128 surveys across six major cities: Bengaluru, Chennai, Delhi NCR, Hyderabad, Jaipur, and Lucknow, to determine the occupational health and safety of app-based transport workers. Findings from the survey have been compiled as a report which &lt;strong&gt;reveals the complete absence of social security and protection of workers in a digital platform economy.&lt;/strong&gt; [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/J4FjrBD647MV8lneM-mPFxr7IWwYeETEgk17OI3lDkqNVRmfoRqhmAs1CqZXDQx-MyEntGeO7vOMUu6lslvGQbMg4Pp6Gvpz7GaUrXiOXti7YGBNPHMzLCP3BsDeYstDOYNs6Rry3eMUvPI-mV1kh6aNGWf_WlBXjwoevFZdwmt660vTJbRaUGuI1Cc45TFmp3ur5qDJNg3vaTXElkuEvo7Dz9rPcEHOTDNy-k2LW3cX9mOB_QNC5yt4sy0CCWvf-2yHAYa_2j6pVmVx2PwbbSrfMfSdK0-WL1PSZpcAHlqcRVU05C5Js__byzmLjmWUKO-kMbw"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/june-july-2021-newsletter'&gt;https://cis-india.org/about/newsletters/june-july-2021-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2021-08-10T15:57:16Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/march-may-2021-newsletter">
    <title>March - May Newsletter</title>
    <link>https://cis-india.org/about/newsletters/march-may-2021-newsletter</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h3&gt;Cybersecurity, and Emerging Technology&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;strong&gt;Doctrinal clarity&lt;/strong&gt; and &lt;strong&gt;institutional coherence&lt;/strong&gt; are essential for a robust cybersecurity posture. Arindrajit Basu and Pranesh Prakash analyze this in an opinion piece in &lt;em&gt;The Hindu&lt;/em&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/mkAIQo7C4IZmt9JYL5DoADKYnQqxm9fka-gdBSvoA81rsg6GEgy07tjzn0qNQvz4PxT4dYB5ZeNQ1Bbi1ubYUR0z6z8dy3e5FK9grxNzzgZSO0IUwVPm8behwp6dBjhS3_xc9_d4Bz234TH-U0qMpqF9sJzKUGtQ7MZi0hnzsUaVhsA2VGsqoSC3xrrr1cD9ZX8AlcPmIR3uj5moIhV9EfHcU2EHOQqhu6OCGcfuUBS-tgGe1iBvbOikAjEWMJin4Q61Rd8p31vaLtqTwVe2uw"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;U.S. and Indian decisions about &lt;strong&gt;Huawei&lt;/strong&gt; have implications not just for their separate relations with China, but the &lt;strong&gt;U.S.-India bilateral&lt;/strong&gt; as well. Arindrajit Basu and Justin Sherman co-authored an article in &lt;em&gt;The Diplomat&lt;/em&gt; examining Huawei’s role in India [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/M0GGHsg5EtZWdtPNqwbeCiMiN7elnvi6aLYTpAVn0gw7se-z20XDgj6jfb79INZxyFmGtDXDcD0pf_RfRo3K_RyXEav9HKy_gV1G8nDVPhoN8Kp2G9-NLUeUCXxW6WYbiyyWDZdKwxzd4PsyoxybVKoJ9XH7JhsVFDPhN0ySqc8Mi6MD0zq8q_CRT9dDkdCC2queRjZdcOr4eoC8YPjU-LVpaxJGge0rOaPrYmM3oe__OoIjvA"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;In an article for &lt;em&gt;The Wire&lt;/em&gt;, Aman Nair points out that India might miss out on &lt;strong&gt;NFT (non-fungible tokens)&lt;/strong&gt; which is set to become a mainstay in the modern digital zeitgeist. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/wKv_Gt32QSHdLE3-ykqX_8DMhA2QohVdjXJn-C65rBN_0nsI9LCIhp3WrANkb-8cDzw1rSkKGrJ0gyPwV_p9aqBIOu3ioMRLjQmVdwMwcVH6nVHELvDJiebOfI5HgW0DS2jvjYUGiFNuBE4y5k7D6hcdEnmRXZ0cGaM-VT0qPJcw28gDhe7eJcg_rmvGhHbJBm_h0VnZfNJyjqZ8CFoiIU0z3QaGDqk16_gOlCYYR98VTEehLBYUs8ymz6Fggw"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Arindrajit Basu and Andre Barrinha co-wrote for the &lt;em&gt;EU Cyber Direct&lt;/em&gt;, &lt;strong&gt;on outer space diplomacy in the 1960s&lt;/strong&gt; and why cyber (security) diplomacy isn’t quite progressing as well or as fast. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/Ud7YZJn5YKOmIROHOUMyLVB-69aNwlb-FParRXYStS_vdQ3SDwErMwxNQlu8iFNnUlSI5lejtsIHgERXyVY3xzTjRGyNP9_sR-uAyfxusTZlSMU3qNs5OPlSJfRErWBEkj_TiT2y1QQwZH8brbn6P8H4S1rDBX1QFICDOe5HjYF2GOdrgzwA1vaeJB6YrFcn2BUNmpsDD4f0mKwcYkCVVFCYgOtbj1-59CoswRfSqgA"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Arindrajit Basu, Irene Poetranto and Justin Lau co-wrote an article for &lt;em&gt;Carnegie Endowment for International Peace&lt;/em&gt; which captures some &lt;strong&gt;concerns with the United Nations OEWG process&lt;/strong&gt; dealing with cyber norms and the absence of discussion at the forum on key issues. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/G-0Ok05_UomEqWTkmsuUXGq9V-i2zMa0ul5zzkfLKC8Rj5rCGsl12lrJl7tfGzORBxTOYoVPoLUlHF_KaD2z05TyeW3cQDqaxvlhUDxfr2Z9n64Lbe1_p8FYKFvLXrsNVAoEbxsCbOncqzkKgVebcxHe_HF5Murx9aVk6Ps9ik34I4Sj3y26-_Nj98iLwMPZO0rs8hYNZbvsjcUbyGxm6G5xlfjakhy-UsjioXEGdz7zQdV6O_FCG1BoP1Rvm8fPxvdK1JEbGkedHgwk9ENn9na2J6I"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In an article for the &lt;em&gt;Observer Research Foundation&lt;/em&gt;, Arindrajit Basu writes about how India must avoid getting its &lt;strong&gt;data policy&lt;/strong&gt; caught up in tired existing machinations and instead forge &lt;strong&gt;a new path that prioritizes Indian strategic interests&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/eZHdtXVJIePupyeXaX8RUlkusvtOgHe4VHCDeiVpkTS0P4ji1lGib5cqvQX0nGf5iIx6vb52mwWtd9Z5G5z71_dGvd89c5xn2JyZ-f9cdOWTAsHKRwxo_Tk2Kp7Dfb4JEi4r2Sd5r3dHPc3YmRMYLseDLnESCpmxnPkbX5y1sMitN5OUu4x1ydiYZxfB3FKVZjnnXSCAmB2yPWS7pL4cGcVWpJ1PqBoqPAvvs_Ofqyg58K7inxfax-5tIPk5wyLsEARP92qYgPo"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Aman Nair, Arinjay Vyas, Pallavi Bedi, and Garima Saxena authored a &lt;strong&gt;response to the Supreme Court E-committee’s draft vision document of phase III of the E-courts project&lt;/strong&gt;.  This response recommends consideration be given to the digital and  gender divide, and lack of clarity in the document on several  data-related aspects. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/eLr3hXFonL5hfAUH5ux5zoQcTrY2PxRDO9kflkNqtcUObBbYWm-vqp7v4Ex0g_o7YtCokB315adj-1k_QwDebJ1k9G626m1MGuTYmlfKdwSVl7mYsfna4Dy96z8Eb7iJ7gtcZZF8s5JQCGN1ux3PiYvgDrxbs3MeXeZizpIZsm9OsPvCGzvC5HbxkhfdFG2B6853ajax3xofJRcucZ2Jc1AFEg5iAVrwiopY0SFIb99XHRESaUFEP9KYNs2bC1nAXaAW4AU7OPG_"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Privacy&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The proposed &lt;i&gt;Personal Data Protection Bill, 2019&lt;/i&gt; is being deliberated by the Joint Parliamentary Committee and is expected to be tabled in the Monsoon Session of Parliament. Pallavi Bedi and Amber Sinha co-authored a white paper to examine the &lt;strong&gt;personal data implications on welfare delivery models in India&lt;/strong&gt; and to suggest ways to operationalise key provisions. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/_Gjo4q_RVbTa0sA8X1FOhYiB4McMtr_8JgcG33Uf9nXIX9VsXvDxzVvYABfOz-DyVN14iCoyotGqfkjezyNjJFt4RsiYkw6m0UFNhGd9NYLj3fkrn8IfKwI3YJtO9-FrkgMxcCOTc1PdedlPXPGO2cafHCYUaLhHNMXIepnX2L2KC-mG_-l0Fjx5m-GvmP6GcXg1eyOyNZjrCL8eFWzyCT9XVDv8afLm2D3F0l-28tz-MwSJRRqc4vIjV0PCykM6NXQ"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Shweta Mohandas authored an article for &lt;i&gt;Rajiv Gandhi National University of Law Student Research Review (RSRR)&lt;/i&gt;&lt;span&gt;. In this article, which forms a part of RSRR’s ‘&lt;/span&gt;&lt;i&gt;Excerpts from Experts Blog Series&lt;/i&gt;&lt;span&gt;,’ Shweta examines whether &lt;/span&gt;&lt;strong&gt;Indian data protection legislation can act as a check on growing workplace surveillance&lt;/strong&gt;&lt;span&gt;. [&lt;/span&gt;&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/5X-z4Ay91QvhUYmdHomWwzdgLp7eCubPpwLyaH1H0MWiyiQfU9PIIQSg2Nshk2mfLJYrb65hiGIj3xyuffXiDnOu9lbwfFsrQCL6D5DnQ9HkvOoZHcq3_Kgf9NVKSAX7tv-aqy00L3jjJtbWbvfaqwnagmdUVSLEP9E7S6s-UTBvO-KCO82DhWELF0Od6dhVrbr0WvVi980IX67IkCiSNaKwpuNwSXuYS9bgD0s"&gt;link&lt;/a&gt;&lt;span&gt;]&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Aman Nair and Arindrajit Basu examine the changes in the context of &lt;strong&gt;data sharing between WhatsApp and Facebook as being an anticompetitive action in violation of the Indian Competition Act, 2002&lt;/strong&gt;&lt;span&gt;. Having previously &lt;/span&gt;&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/u35U0gu1I7Y81i6OYu20wN7zgiA4FxKWowVPgk7Gmafn69IJLoZapqrfCSWui33Sh0ntbkPajjtW_p35C3qMoCP5xcrC2dHSO3DX9MZ7uFNbJZ-p_NRBv5bOZ_1jKeH2KYBYohqWlZ83VVG3CDvNl1AK_4xmNrr9L578OragYyJQo2U93bxHbLw1fnLc1CPWqkfZvcmydFo1HGyNBeFpRqiTVn6ytQjyAiUw2Gisx7itlxVHmb_QCuSd0T8nD47U4UBH_i_dg6PN5R4PcjU"&gt;examined&lt;/a&gt;&lt;span&gt; the implications of WhatsApp’s changes to its privacy policy in 2021, this issue brief is the second output of the series examining the effects of the changes. [&lt;/span&gt;&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/jOUH-SfgRCjdp9DORlyEL16nnyJ_ogGha0d2DdYJGcRnBOiZt6F3SuhZzZYX8t1umpAtId1_80WNiW3Y6CgGDA-TYQ2hORCBWeOvvoPphGzr0DfCy_6tD8QQMzgb3mCm1GXECkmJM_kTL9kfRrj8GVpe3DHJ7_jX3pKBQx9HHWKqkgftY_8wTG6zCG4J8HZC-1Hv66BsR1didil6DVh-HtetydLcMzlikdBj4bvxTjzFRAoLvsyeBH9PaoDRJuUXTYR5-8BcE8ITu2TyiOyc_ME2kuDJ3DJiE4PDeNHutpTJyuc7lqwp-g"&gt;link&lt;/a&gt;&lt;span&gt;]&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In a blog-post, Pallavi Bedi provides recommendations for the &lt;strong&gt;Covid vaccine intelligence network (Co-Win) platform&lt;/strong&gt;&lt;span&gt;. She says that as a first step it is essential that Co-Win has a separate dedicated privacy policy which conforms to the internationally accepted privacy principles and enumerated in the Personal Data Protection Bill. [&lt;/span&gt;&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/o19mW5Vyy3giilmnC_ef5khZu85qA-A3uDr687psJN0UhAkPY43mYt7Jaw7cXwy0NJK7ky9IvnklXsGPIME4bYH2cCVK_NeXEhZK-N6RRRSSDFUG33BpdaFtUD3cqIxrsEV_-ILCXF4SDN3IBmJFKeJDBFZA4bLuUWEzsAhBQbnFcbGuITTNq74cViuBSO-p09OT9-AtzOUgce0Brhta6YmU5iSmpMGW2XWhWTw3ueesRR_8fjDkF7XoLDGCMmkdjvAeyfbCIee0z-30EbUN5sbLzCCHVUHmuYVPzqtLeV8"&gt;link&lt;/a&gt;&lt;span&gt;]&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Freedom of Expression, and Intermediary Liability&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;In February, the Advertising Standards Council of India (ASCI) had issued draft rules for &lt;strong&gt;regulation of digital influencers&lt;/strong&gt;, with an aim to &lt;em&gt;“understand the peculiarities of [online] advertisements and the way consumers view them,”&lt;/em&gt; as well as to ensure that: &lt;em&gt;“consumers  must be able to distinguish when something is being promoted with an  intention to influence their opinion or behaviour for an immediate or  eventual commercial gain.”&lt;/em&gt; Torsha Sarkar and Shweta Mohandas respond with comments and recommendations to the rules. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/nP6_NZer0OIQv_bMG6p9Vzx-uTdYi17sYHl0xdFjMYzEzv9xmTvSG73K8_7sq4J6NPdQ5sNA5eaQvAwMHBrYkAt2mGFF9SLlrCSfNZ3K6rpRyst36jbtHpdD3_Pc9ukKdBW3_lhiGpISLi7H2TBa0BumRk2JV3PFdUBH6R3kk0ywJuvcHeJJWxAsnyydYY2s2_iRpo5Sc0MvHbC8vlDCoI6mtuL0_PC6B2eL0G8wZqbtwYYM2hNO-DfobKXJV16nfGC8GxASmN2FmH07pif0Cn5xSXoeadfmwb-Fox-B03UAn-0THELMM1beVubJWnOAOrPXoA5JIZ7CQe5x3g"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Copyright, and Access to Knowledge&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt; Anubha Sinha explains what the draft national science, technology and innovation policy means for &lt;strong&gt;open access to scientific literature&lt;/strong&gt; for Indians. This article was published in &lt;em&gt;The Wire Science&lt;/em&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/CJjg4ihUvxLz1chJKcO03n5_Ydr9rvEDH_kFGYPs7_aijAvgsioqcqvZU0n41Ly6CNagHY1Upc0-3eCPsdo3GxXWC6baFyPSXImgs7tRy-Tio7TdRDS1qHU9i5YghNVjsoIunFozlrsutZGnXjXNF6Ce04lDrZ0g0dOdBIDt-InCeubeq35RnbIj3Qb2jdf2vwlkcAeyC925K6WeyzPM7sGUAVmMH1wKu9pmN-bgHJfNRodxOWODiF_o5vmu6g25UP6IdunHwUKorudI_0RopdHXBA"&gt;link&lt;/a&gt;] &lt;/li&gt;
&lt;li&gt; In an article published in &lt;em&gt;Info Justice&lt;/em&gt;, Anubha Sinha provides a summary of the progress of the &lt;strong&gt;copyright infringement suit against Sci-Hub and LibGen&lt;/strong&gt; in India. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/Jg1NJZxuFnR-Srq0Tz1RS3XZZ17cL4JxJFlOY2g12wpoHPIxsc-lW18hjUe7sg309BNiO1i0V_yLGaQsQiAzILlWe2zd3ctx4dTTFvyFbs_Ds1w3W91GNEdoWszaryWzeKs-ZSDZYR1IPZa4ZGXpOrd21RiKK6InuJVXGZRN6WJzmgdBr4ZWre9-NP3AxduZDFnzXrjfCho6iDPhS7CuR8ZW4bFCwkmvCr70-yTDLLkT2DUmkB-caRfvMxukUyr1fjilhp-3vJwEt1gHi0HP-kpyx3wac8mjFxSCbsVg-5AiRMti"&gt;link&lt;/a&gt;] &lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Digital Cultures, and Social Justice&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;In a research paper, Noopur Raval  offers critical historical insights from the fields of international  development, anthropology, and postcolonial history to caution against  both the possible harms of &lt;strong&gt;gender disaggregated datafication&lt;/strong&gt;, as well as the consequences of &lt;strong&gt;non-participatory datafication of women&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/WmB3X2tO_c8hEDCY-QCDD1tTPBIEB7Gt4bFRLY7mNCB3X5sRuV6npbW4eIX8ta-lGod2fia1v8ZTxZurtXczkJQbBg5ckgKRSG3eYKfG9ntQ5qRKVkq12g9YEmZ1eP1raJjh5p5aHQ-0MhUsQafyvBQpzVEdDK9ZJecvYAq3GyD42aSWkS0iQ17sS9WCDchDhFQn20CS7MAEmZm6rM0yymmNBqTHRR7GuKxP3edQqiMTblOufA4mhx62YuIgqn_mRv5uOPqxevVBmTtlTTyMmZihFccK"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Kaarika Das, a research scholar at  NIEPA and Sravya C, a researcher in the Humanizing Automation project at  IIIT Bangalore published &lt;strong&gt;a study on migrants in India's Gig Economy&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/H6Jr3Xykf4-nxghqRxErQtEVs4TH-l3S2LVhiXIisAPDyUCm6fiWyLGCI_V9jrofmSaX7B1sFEjjVvhsqbNcHpKz6_ztX9o6ZMp-BRrke6HgLScE3FYxJKKFhtGyp_w_xUwJu1jybdsltHMKm1oNjRgYm4Z_hbpUTmJlK72raCD6jC7VjvTmuJmIGZLFa1J18o0IoImVO8VLqbV_lUigTVBNQWqZsgl_TyjYf3a6H8oLBlG4fo3jIXAsU5S2aySLzNO9u46C1Zv5g-D3wc6jChAhrMcOtcp2NNeEOJRw_n-nzYNrfVNwwLKdIOY"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Sameet Panda and Vipul Kumar wrote a blog for &lt;em&gt;Privacy International&lt;/em&gt; pointing the &lt;strong&gt;failures in the digitisation of India’s food security programme&lt;/strong&gt; in light of the &lt;strong&gt;exclusion of married women of Odisha&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/czsORnDtqHr4eMfKxD9huAqfK9BfJ_oZWslVsCoG63dJQwSqFhMbQzBgtolMXmsnvl3TuEaSJXOIWWc6z-EcMaMSfZwAZR6Tixu7KVE3u343x0qCePCh6k_Mbyo1ckxpCdq6R4M2f8b-8PdxHsW1OzgIALcgF63n63DmmmP3krIGfTsWj-kO03xSa6lho6qrFDnEQeDW6zuMc8mHf-o34ogIveNxvYoa_gtPEag390DefdFa5not77SmRSLeLd-oAFxkcQ_jrSEiEnyjD9UNdb0COOFbk8KlrD2y7SBM27_5U_oRY1tHFTDIpBT3z4k"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Shreya Ghosh, a research scholar at  the Centre for Political Studies, Jawaharlal Nehru University, New Delhi  authored an article in &lt;em&gt;EPW&lt;/em&gt; on &lt;strong&gt;access to welfare and health for women during the initial phase of the pandemic&lt;/strong&gt;. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/WrUVPoWi-5LlI7z8_qy9HVtjyDoIgjSdclz7-wdA1OV2tG7GWSuUQ-F31hf1TpaGumhcxYeQJE9vqj1LRYpoKJfaHyCQHx_Dnt8PcNB2eEvQAbtHEdjAZLIu6Pno55XvtCJ33EBRdNRU-tu0Tt8j_lXT_nSChepY18OpIu69PUGNBI7Lsp6pkOo4LXhtUKdImoitU_-lBg1-paVePznLYRWL7bhk5rm_OrIsJPZuKbEnew8kXTwbDvjUgZbD"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Ambika Tandon and Aayush Rathi in a research paper, &lt;strong&gt;“Fault lines at the Front lines”&lt;/strong&gt; analyze the &lt;strong&gt;changing employment conditions for domestic workers&lt;/strong&gt; in the growing platform economies of South and Southeast Asia. By  analyzing different platform designs and comparing regulations in &lt;strong&gt;India, Indonesia, Pakistan and Vietnam&lt;/strong&gt;, the authors present a thorough picture of the situation for domestic workers in the new economy. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/kPMoaM42DpjpGxHbzGnAXycfRBu9fPzVJ6jQoyePUjDKKV9KMz8HDo8M3h5fDoOFAynoCq8ARyzHdBIkACBBy8eWHRWjcbXslejcnZZIn2LP-BsWh_Sr4FMl2AWDTQktt8tlZAZ2PcTfL_KE1sYJD1d4522v3eLvu_QUX8LCXvuznSIusIe7e_vFu3MNdylOuSIK_-L61Uin8gAEZ-eO4DDwYaE42Uc0"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;In a blog post published by &lt;em&gt;Ethical Source&lt;/em&gt;, Ambika Tandon throws light on &lt;strong&gt;artificial intelligence and allied technologies&lt;/strong&gt; that form part of &lt;strong&gt;Industry 4.0&lt;/strong&gt; in the future of work. [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/Hrd-w4fWPa8ThFlmr-Zw_-LR96KsoFTBchzDQ8QwDJALcjcwz1fCn49RAws3-xmNATUZIYUaSQT4nJxodQvSgrzlzKXEOdj64Sx8aRvtkyPaolpAml7hSDcczWdPJPaZISxUxCl9S1DHnfujOulrLkdqgEf1xPsWSQk_TQZJU4dOE7Vnqm_pmCnFVs_WLo4yQ2P00Td3VYd78HikHsyLC3yqju4"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;li&gt;Ambika Tandon and Aayush Rathi authored a chapter titled &lt;strong&gt;“Care in the Platform Economy: Interrogating the Digital Organisation of Domestic Work in India”&lt;/strong&gt; in a book titled &lt;em&gt;“The Gig Economy: Workers and Media in the Age of Convergence.”&lt;/em&gt; [&lt;a href="https://4jok2.r.ag.d.sendibm3.com/mk/cl/f/-vxAl0-OSphrFabwlh8Ir2yhdE_cYeWryiSavWFOByLbxWzlndVfgl1K0awHZjD1J6LmUbu2OaoCgNKL3Dcozv_hQ9WEi1MeQdSRmT1kKProU_9fJexLKPbw80T69AfzXMtjpfX_6zYPpWohxsh1xxOwK86Vs5S_x73hOG7hhuQxFfy4VF4co0Ls2jX-Wi7-L4pf-SBVBekVFuObAI6dOsUwWyywiSYldGbFbxxPfyVegmZuKMtD4bBycNBw_B__X1IogiPK5fj0851hxFM4eo5Wl2s0dZY37-UhpKL4xS0gLZI9UozMux7JbmzM4jpZT1AAGGCNlYb4DM3_Alf0YHI1KQ"&gt;link&lt;/a&gt;]&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/march-may-2021-newsletter'&gt;https://cis-india.org/about/newsletters/march-may-2021-newsletter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2021-08-08T15:45:45Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/do-we-really-need-an-app-for-that-examining-the-utility-and-privacy-implications-of-india2019s-digital-vaccine-certificates">
    <title>Do We Really Need an App for That? Examining the Utility and Privacy Implications of India’s Digital Vaccine Certificates</title>
    <link>https://cis-india.org/internet-governance/blog/do-we-really-need-an-app-for-that-examining-the-utility-and-privacy-implications-of-india2019s-digital-vaccine-certificates</link>
    <description>
        &lt;b&gt;We examine the purported benefits of digital vaccine certificates over regular paper-based ones and analyse the privacy implications of their use.&lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;This blogpost was edited by Gurshabad Grover, Yesha Tshering Paul, and Amber Sinha.&lt;br /&gt;It was originally published on &lt;a href="https://digitalid.design/vaccine-certificates.html"&gt;Digital Identities: Design and Uses&lt;/a&gt; and is cross-posted here.&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;In an experiment to streamline its COVID-19 immunisation drive, India has adopted a centralised vaccine administration system called CoWIN (or COVID Vaccine Intelligence Network). In addition to facilitating registration for both online and walk-in vaccine appointments, the system also allows for the &lt;a href="https://verify.cowin.gov.in/" target="_blank"&gt;digital verification&lt;/a&gt; of vaccine certificates, which it issues to people who have received a dose. This development aligns with a global trend, as many countries have adopted or are in the process of adopting “vaccine passports” to facilitate safe movement of people while resuming commercial activity.
    &lt;br /&gt;&lt;br /&gt;Some places, such as the &lt;a href="https://www.schengenvisainfo.com/news/all-your-questions-on-eus-covid-19-vaccine-certificate-answered/" target="_blank"&gt;EU&lt;/a&gt;, have constrained the scope of use of their vaccine certificates to international travel. The Indian government, however, has so far &lt;a href="https://www.livemint.com/opinion/columns/vaccination-certificates-need-a-framework-to-govern-their-use-11618160385602.html" target="_blank"&gt;skirted&lt;/a&gt; important questions around where and when this technology should be used. By allowing &lt;a href="https://verify.cowin.gov.in/" target="_blank"&gt;anyone&lt;/a&gt; to use the online CoWIN portal to scan and verify certificates, and even providing a way for the private-sector to incorporate this functionality into their applications, the government has opened up the possibility of these digital certificates being used, and even mandated, for domestic everyday use such as going to a grocery shop, a crowded venue, or a workplace.
    &lt;br /&gt;&lt;br /&gt;In this blog post, we examine the purported benefits of digital vaccine certificates over regular paper-based ones, analyse the privacy implications of their use, and present recommendations to make them more privacy respecting. We hope that such an analysis can help inform policy on appropriate use of this technology and improve its privacy properties in cases where its use is warranted.
    &lt;br /&gt;&lt;br /&gt;We also note that while this post only examines the merits of a technological solution put out by the government, it is more important to &lt;a href="https://www.accessnow.org/cms/assets/uploads/2021/04/Covid-Vaccine-Passports-Threaten-Human-Rights.pdf" target="_blank"&gt;consider&lt;/a&gt; the effects that placing restrictions on the movement of unvaccinated people has on their civil liberties in the face of a vaccine rollout that is inequitable along many lines, including &lt;a href="https://thewire.in/gender/women-falling-behind-in-indias-covid-19-vaccination-drive" target="_blank"&gt;gender&lt;/a&gt;, &lt;a href="https://www.thehindu.com/sci-tech/science/will-25-covid-19-vaccines-for-private-hospitals-aggravate-inequity/article34799098.ece" target="_blank"&gt;caste-class&lt;/a&gt;, and &lt;a href="https://scroll.in/article/994871/tech-savvy-indians-drive-to-villages-for-covid-19-vaccinations-those-without-smartphones-lose-out" target="_blank"&gt;access to technology&lt;/a&gt;.&lt;/p&gt;
&lt;h4&gt;How do digital vaccine certificates work?&lt;/h4&gt;
&lt;p&gt;Every vaccine recipient in the country is required to be registered on the CoWIN platform using one of &lt;a href="https://www.cowin.gov.in/faq" target="_blank"&gt;seven&lt;/a&gt; existing identity documents. [1] &lt;a name="ref1"&gt;&lt;/a&gt; Once a vaccine is administered, CoWIN generates a vaccine certificate which the recipient can access on the CoWIN website. The certificate is a single page document that contains the recipient’s personal information — their name, age, gender, identity document details, unique health ID, a reference ID — and some details about the vaccine given.&lt;a name="ref2"&gt;&lt;/a&gt; [2] It also includes a “secure QR code” and a link to CoWIN’s verification &lt;a href="https://verify.cowin.gov.in/" target="_blank"&gt;portal&lt;/a&gt;.
  &lt;br /&gt;&lt;br /&gt;The verification portal allows for the verification of a certificate by scanning the attached QR code. Upon completion, the portal displays a success message along with some of the information printed on the certificate.
  &lt;br /&gt;&lt;br /&gt;Verification is done using a cryptographic mechanism known as &lt;a href="https://en.wikipedia.org/wiki/Digital_signature" target="_blank"&gt;digital signatures&lt;/a&gt;, which are encoded into the QR code attached to a vaccine certificate. This mechanism allows “offline verification”, which means that the CoWIN verification portal or any private sector app attempting to verify a certificate does not need to contact the CoWIN servers to establish its authenticity. It instead uses a “public key” issued by CoWIN beforehand to verify the digital signature attached to the certificate.
  &lt;br /&gt;&lt;br /&gt;The benefit of this convoluted design is that it protects user privacy. Performing verification offline and not contacting the CoWIN servers, precludes CoWIN from gleaning sensitive metadata about usage of the vaccine certificate. This means that CoWIN does not learn about where and when an individual uses their vaccine certificate, and who is verifying it. This closes off a potential avenue for mass surveillance. [3] However, given how certificate revocation checks are being implemented (detailed in the privacy implications section below), CoWIN ends up learning this information anyway.&lt;/p&gt;
&lt;h4&gt;Where is digital verification useful?&lt;/h4&gt;
&lt;p&gt;The primary argument for the adoption of digital verification of vaccine certificates over visual examination of regular paper-based ones is security. In the face of vaccine hesitancy, there are concerns that people may forge vaccine certificates to get around any restrictions that may be put in place on the movement of unvaccinated people. The use of digital signatures serves to allay these fears.
&lt;br /&gt;&lt;br /&gt;In its current form, however, digital verification of vaccine certificates is no more secure than visually inspecting paper-based ones. While the “secure QR code” attached to digital certificates can be used to verify the authenticity of the certificate itself, the CoWIN verification portal does not provide any mechanism nor does it instruct verifiers to authenticate the identity of the person presenting the certificate. This means that unless an accompanying identity document is also checked, an individual can simply present someone else’s certificate.
&lt;br /&gt;&lt;br /&gt;There are no simple solutions to this limitation; adding a requirement to inspect identity documents in addition to digital verification of the vaccine certificate would not be a strong enough security measure to prevent the use of duplicate vaccine certificates. People who are motivated enough to forge a vaccine certificate, can also duplicate one of the seven ID documents which can be used to register on CoWIN, some of which are simple paper-based documents. [4] Requiring even stronger identity checks, such as the use of Aadhaar-based biometrics, would make digital verification of vaccine certificates more secure. However, this would be a wildly disproportionate incursion on user privacy — allowing for the mass collection of metadata like when and where a certificate is used — something that digital vaccine certificates were explicitly designed to prevent. Additionally, in Russia, people were &lt;a href="https://www.washingtonpost.com/world/europe/moscow-fake-vaccine-coronavirus/2021/06/26/0881e1e4-cf98-11eb-a224-bd59bd22197c_story.html" target="_blank"&gt;found&lt;/a&gt; issuing fake certificates by discarding real vaccine doses instead of administering them. No technological solution can prevent such fraud.
&lt;br /&gt;&lt;br /&gt;As such, the utility of digital certificates is limited to uses such as international travel, where border control agencies already have strong identity checks in place for travellers. Any everyday usage of the digital verification functionality on vaccine certificates would not present any benefit over visually examining a piece of paper or a screen.&lt;/p&gt;
&lt;h4&gt;Privacy implications of digital certificates&lt;/h4&gt;
&lt;p&gt;In addition to providing little security utility over manual inspection of certificates, digital certificates also present privacy issues, these are listed below along with recommendations to mitigate them:
&lt;br /&gt;&lt;br /&gt;&lt;em&gt;(i) The verification portal leaks sensitive metadata to CoWIN’s servers:&lt;/em&gt; An analysis of network requests made by the CoWin verification portal reveals that it conducts a ‘revocation check’ each time a certificate is verified. This check was also found in the source &lt;a href="https://github.com/egovernments/DIVOC/blob/e667697b47a50a552b8d0a8c89a950180217b945/interfaces/vaccination-api.yaml#L385" target="_blank"&gt;code&lt;/a&gt;, which is made openly available&lt;a name="ref5"&gt;&lt;/a&gt;.
[5]&lt;/p&gt;
&lt;p&gt;Revocation checks are an important security consideration while using digital signatures. They allow the issuing authority (CoWIN, in this case) to revoke a certificate in case the account associated with it is lost or stolen, or if a certificate requires correction. However, the way they have been implemented here presents a significant privacy issue. Sending certificate details to the server on every verification attempt allows it to learn about where and when an individual is using their vaccine certificate.
&lt;br /&gt;&lt;br /&gt;We note that the revocation check performed by the CoWIN portal does not necessarily mean that it is storing this information. Nevertheless, sending certificate information to the server directly contradicts claims of an “offline verification” process, which is the basis of the design of these digital certificates.
&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Recommendations:&lt;/strong&gt; Implementing privacy-respecting revocation checks such as Certificate Revocation Lists, [6] or Range Queries [7] would mitigate this issue. However, these solutions are either complex or present bandwidth and storage tradeoffs for the verifier.
&lt;br /&gt;&lt;br /&gt;&lt;em&gt;(ii) Oversharing of personally identifiable information:&lt;/em&gt; CoWIN’s vaccine certificates include more personally identifiable information (name, age, gender, identity document details and unique health ID) than is required for the purpose of verifying the certificate. An examination of the vaccine certificates available to us revealed that while the Aadhaar number is appropriately masked, other personal identifiers such as passport number and unique health ID were not masked. Additionally, the inclusion of demographic details, such as age and gender, provides little security benefit by limiting the pool of duplicate certificates that can be used and are not required in light of the security analysis above.
&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Recommendation:&lt;/strong&gt; Personal identifiers (such as passport number and unique health ID) should be appropriately masked and demographic details (age, gender) can be removed.
&lt;br /&gt;&lt;br /&gt;The minimal set of data required for identity-linked usage for digital verification, as described above, is a full name and masked ID document details. All other personally identifying information can be removed. In case of paper-based certificates, which is suggested for domestic usage, only the details about vaccine validity would suffice and no personal information is required.
&lt;br /&gt;&lt;br /&gt;&lt;em&gt;(iii) Making information available digitally increases the likelihood of collection:&lt;/em&gt; All of the personal information printed on the certificate is also encoded into the QR code. This is &lt;a href="https://www.bbc.com/news/uk-scotland-57208607" target="_blank"&gt;necessary&lt;/a&gt; because the digital signature verification process also verifies the integrity of this information (i.e. it wasn’t modified). A side effect of this is that the personal information is made readily available in digital form to verifiers when it is scanned, making it easy for them to store. This is especially likely in private sector apps who may be interested in collecting demographic information and personal identifiers to track customer behaviour.
&lt;br /&gt;&lt;br /&gt;&lt;strong&gt;Recommendation:&lt;/strong&gt; Removing extraneous information from the certificate, as suggested above, mitigates this risk as well.&lt;/p&gt;
&lt;h4&gt;Conclusion&lt;/h4&gt;
&lt;p&gt;Our analysis reveals that without incorporating strong, privacy-invasive identity checks, digital verification of vaccine certificates does not provide any security benefit over manually inspecting a piece of paper. The utility of digital verification is limited to purposes that already conduct strong identity checks.
&lt;br /&gt;&lt;br /&gt;In addition to their limited applicability, in their current form, these digital certificates also generate a trail of data and metadata, giving both government and industry an opportunity to infringe upon the privacy of the individuals using them.
&lt;br /&gt;&lt;br /&gt;Keeping this in mind, the adoption of this technology should be discouraged for everyday use.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;References&lt;/h4&gt;
&lt;p&gt;[1] Exceptions &lt;a href="https://web.archive.org/web/20210511045921/https://www.mohfw.gov.in/pdf/SOPforCOVID19VaccinationofPersonswithoutPrescribedIdentityCards.pdf" target="_blank"&gt;exist&lt;/a&gt; for people without state-issued identity documents.&lt;/p&gt;
&lt;p&gt;[2] This information was gathered by inspecting three vaccine certificates linked to the author’s CoWIN account, which they were authorised to view, and may not be fully accurate.&lt;/p&gt;
&lt;p&gt;[3] This design is similar to Aadhaar’s “&lt;a href="https://resident.uidai.gov.in/offline-kyc" target="_blank"&gt;offline KYC&lt;/a&gt;” process.&lt;/p&gt;
&lt;p&gt;[4] “Aadhaar Card: UIDAI says downloaded versions on ordinary paper, mAadhaar perfectly valid”, &lt;em&gt;Zee Business&lt;/em&gt;, April 29 2019, &lt;em&gt;https://www.zeebiz.com/india/news-aadhaar-card-uidai-says-downloaded-versions-on-ordinary-paper-maadhaar-perfectly-valid-96790&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;[5] This check was also verified to be present in the reference &lt;a href="https://github.com/egovernments/DIVOC/blob/261a61093b89990fe34698f9ba17367d4cb74c34/public_app/src/components/CertificateStatus/index.js#L125" target="_blank"&gt;code&lt;/a&gt; made available for private-sector applications incorporating this functionality, suggesting that private sector apps will also be affected by this.&lt;/p&gt;
&lt;p&gt;[6] &lt;a href="https://en.wikipedia.org/wiki/Certificate_revocation_list" target="_blank"&gt;Certificate Revocation Lists&lt;/a&gt; allow the server to provide a list of revoked certificates to the verifier, instead of the verifier querying the server each time. This, however, can place heavy bandwidth and storage requirements on the verifying app as this list can potentially grow long.&lt;/p&gt;
&lt;p&gt;[7] Range Queries are described in this &lt;a href="https://www.ics.uci.edu/~gts/paps/st06.pdf" target="_blank"&gt;paper&lt;/a&gt;. In this method, the verifier requests revocation status from the server by specifying a range of certificate identifiers within which the certificate being verified lies. If there are any revoked certificates within this range, the server will send their identifiers to the verifier, who can then check if the certificate in question is on the list. For this to work, the range selected must be sufficiently large to include enough potential candidates to keep the server from guessing which one is in use.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/do-we-really-need-an-app-for-that-examining-the-utility-and-privacy-implications-of-india2019s-digital-vaccine-certificates'&gt;https://cis-india.org/internet-governance/blog/do-we-really-need-an-app-for-that-examining-the-utility-and-privacy-implications-of-india2019s-digital-vaccine-certificates&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Covid19</dc:subject>
    
    
        <dc:subject>Appropriate Use of Digital ID</dc:subject>
    

   <dc:date>2021-08-03T05:13:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/centre-for-internet-society-ecommerce-amendments">
    <title>Centre for Internet&amp;Society ecommerce amendments</title>
    <link>https://cis-india.org/internet-governance/centre-for-internet-society-ecommerce-amendments</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/centre-for-internet-society-ecommerce-amendments'&gt;https://cis-india.org/internet-governance/centre-for-internet-society-ecommerce-amendments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>aman</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2021-07-27T14:36:57Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-proposed-amendments-to-the-consumer-protection-e-commerce-rules-2020">
    <title>Comments on proposed amendments to the Consumer Protection (E-Commerce) Rules, 2020</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-proposed-amendments-to-the-consumer-protection-e-commerce-rules-2020</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The Consumer Protection (E-commerce) Rules, 2020 were first introduced in an attempt to ensure that consumers were granted adequate protections and to prevent the adoption of unfair trade practices by E-commerce entities. The amendments have proposed several rules which will protect the consumer with a restriction on misleading advertisements and appointment of grievance officers based in India. However, while on this path, the proposed rules have created hurdles in the operations of e-commerce, reducing the ease of business and increasing the costs of operations especially for smaller players; which could eventually pass on to the consumers.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In our submission to the Ministry of Consumer Affairs, we focussed our analysis on eight points: Definitions and Registration, Compliance, Data Protection and Surveillance, Flash Sales, Unfair Trade Practices, Jurisdictional Issues with Competition Law, Compliance with International Trade Law and Liabilities of Marketplace E-commerce Entities.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A snapshot of our recommendations and analysis is listed out below. To read our full submission, please click&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/centre-for-internet-society-ecommerce-amendments"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Definitions and Registrations&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The registration of entities with the DPIIT must be made as smooth as possible especially considering the wide definition of E-commerce entities in the rules, which may include smaller businesses as well. In particular, we suggested doing away with physical office visits.&amp;nbsp;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Compliance&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;As a general observation, compliance obligations should be differentiated based on the size of the entity and the volume of transactions rather than adopting a ‘one size fits all’ approach which may harm smaller businesses, especially those that are just starting up. Before these rules come into force, further consultations with small and medium-sized business enterprises would be vital in ensuring that the regulation is in line with their needs and does not hamper their growth. Excessive compliance requirements may end up playing into the hands of the largest players as they would have larger financial coffers and institutional mechanisms to comply with these obligations.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;There is some confusion in the law as to whether the Chief Compliance officer mentioned in the amended rules is the same as the “nodal person of contact or an alternate senior designated functionary who is resident of India” under Rule 5(1).&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The safe harbour should therefore refer to due diligence by the CCO and not the e-commerce entity itself. The requirement for the compliance officer to be an Indian citizen who is a resident and a senior officer or managerial employee may place an undue burden on small E-commerce players not located in India.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;span style="text-align: justify;"&gt;Data Protection and Surveillance&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In the absence of a Personal Data protection bill these rules do not adequately protect consumers’ personal data and reduce the powers given to the Central Government to access data or conduct surveillance&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Flash Sales&amp;nbsp;&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Conventional flash sales should be defined. Clear distinction must be made between conventional flash sales and fraudulent flash sales. The definition should not be limited to interception of business “using technological means”, which limits the scope of the fraudulent flash sales. Further parameters must be provided for when a flash sale will be considered a fraudulent flash sale.&amp;nbsp;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Unfair Trade Practices&amp;nbsp;&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The rules place restrictions on marketplace E-commerce entities from selling their own goods or services or from listing related enterprises as sellers on their platforms. No such restriction applies to brick and mortar stores, and this blanket ban must be rethought.&amp;nbsp;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&amp;nbsp;Jurisdictional Issues with Competition Law&amp;nbsp;&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;This rule brings the issue of ‘abuse of dominant power’ under the fora of the Consumer Protection Authority or the Consumer Disputes Redressal Commissions.&amp;nbsp; Overlapping jurisdiction of this nature could introduce regulatory delays into the dispute resolution process and&amp;nbsp; can be a source of tension for the parties and regulatory authorities. The intention behind importing a competition law concept such as “abuse of dominant position” in the consumer protection regulations may be understandable, such a step might be effective in jurisdictions which have a common regulatory authority for both competition law as well as consumer protection issues, such as Australia, Finland, Ireland, Netherlands. However, in a country such as India which has completely separate regulatory mechanisms for competition and consumer law issues, such a provision may lead to logistical difficulties.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Compliance with International Trade Law&amp;nbsp;&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A robust framework on ranking with transparent disclosure of parameters for the same would also go a long way towards addressing concerns with discrimination and national treatment under WTO law. Further, the obligation to provide domestic alternatives should be clarified and amended to ensure that it does not cause uncertainty and open India up to a national treatment challenge&amp;nbsp; at the WTO.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Liabilities of Marketplace E-commerce Entities&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Fallback liability is an essential component of consumers’ protection in the E-commerce space. However, as currently envisioned there is a lack of clarity surrounding the extent to which fallback liability is applicable on E-commerce entities as well as exemptions to this liability. We have recommended alternate approaches adopted in other jurisdictions, which include&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: lower-alpha;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Liability through negligence&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: lower-alpha;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Liability as an exemption to safe harbour&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-proposed-amendments-to-the-consumer-protection-e-commerce-rules-2020'&gt;https://cis-india.org/internet-governance/blog/comments-on-proposed-amendments-to-the-consumer-protection-e-commerce-rules-2020&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vipul Kharbanda, Rajat Misra, Arindrajit Basu and Aman Nair</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>E-Commerce</dc:subject>
    
    
        <dc:subject>Consumer Rights</dc:subject>
    

   <dc:date>2021-07-27T14:45:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-ministry-and-the-trace-subverting-end-to-end-encryption">
    <title>The Ministry And The Trace: Subverting End-To-End Encryption</title>
    <link>https://cis-india.org/internet-governance/blog/the-ministry-and-the-trace-subverting-end-to-end-encryption</link>
    <description>
        &lt;b&gt;A legal and technical analysis of the 'traceability' rule and its impact on messaging privacy.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The paper was published in the &lt;a class="external-link" href="http://nujslawreview.org/2021/07/09/the-ministry-and-the-trace-subverting-end-to-end-encryption/"&gt;NUJS Law Review Volume 14 Issue 2 (2021)&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Abstract&lt;/h2&gt;
&lt;div class="justify"&gt;
&lt;div class="pbs-main-wrapper"&gt;
&lt;p&gt;End-to-end
 encrypted messaging allows individuals to hold confidential 
conversations free from the interference of states and private 
corporations. To aid surveillance and prosecution of crimes, the Indian 
Government has mandated online messaging providers to enable 
identification of originators of messages that traverse their platforms.
 This paper establishes how the different ways in which this 
‘traceability’ mandate can be implemented (dropping end-to-end 
encryption, hashing messages, and attaching originator information to 
messages) come with serious costs to usability, security and privacy. 
Through a legal and constitutional analysis, we contend that 
traceability exceeds the scope of delegated legislation under the 
Information Technology Act, and is at odds with the fundamental right to
 privacy.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Click here to read the &lt;a class="external-link" href="http://nujslawreview.org/2021/07/09/the-ministry-and-the-trace-subverting-end-to-end-encryption/"&gt;full paper&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-ministry-and-the-trace-subverting-end-to-end-encryption'&gt;https://cis-india.org/internet-governance/blog/the-ministry-and-the-trace-subverting-end-to-end-encryption&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Gurshabad Grover, Tanaya Rajwade and Divyank Katira</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cryptography</dc:subject>
    
    
        <dc:subject>Intermediary Liability</dc:subject>
    
    
        <dc:subject>Constitutional Law</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Messaging</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    

   <dc:date>2021-07-12T08:18:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
