<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 11 to 25.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policy-in-india-community-custom-censorship-and-future-of-internet-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/concerns-regarding-dna-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/re-the-human-dna-profiling-bill-2012"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policy-in-india-community-custom-censorship-and-future-of-internet-regulation">
    <title>Free Speech Policy in India: Community, Custom, Censorship, and the Future of Internet Regulation</title>
    <link>https://cis-india.org/internet-governance/blog/policy-in-india-community-custom-censorship-and-future-of-internet-regulation</link>
    <description>
        &lt;b&gt;This note summarises my panel contribution to the conference on Freedom of Expression in a Digital Age at New Delhi on 21 April 2015, which was organised by the Observer Research Foundation (ORF) and the Centre for Internet and Society (CIS) in collaboration with the Internet Policy Observatory of the Center for Global Communication Studies (CGCS) at the Annenberg School for Communication, University of Pennsylvania&lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/free-speech-policy-in-india.pdf" class="internal-link"&gt;&lt;b&gt;Download the Note here&lt;/b&gt;&lt;/a&gt; (PDF, 103 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Preliminary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There has been legitimate happiness among many in India at the Supreme Court’s recent decision in the Shreya Singhal case to strike down section 66A of the Information Technology Act, 2000 ("IT Act") for unconstitutionally fettering the right to free speech on the Internet. The judgment is indeed welcome, and reaffirms the Supreme Court’s proud record of defending the freedom of speech, although it declined to interfere with the government’s stringent powers of website blocking. As the dust settles there are reports the government is re-grouping to introduce fresh law, allegedly stronger to secure easier convictions, to compensate the government’s defeat.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Case Law and Government Policy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India’s constitutional courts have a varied history of negotiating the freedom of speech that justifiably demands study. But, in my opinion, inadequate attention is directed to the government’s history of free speech policy. It is possible to discern from the government’s actions over the last two centuries a relatively consistent narrative of governance that seeks to bend the individual’s right to speech to its will. The defining characteristics of this narrative – the government’s free speech policy – emerge from a study of executive and legislative decisions chiefly in relation to the press, that continue to shape policy regarding the freedom of expression on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s corpus of free speech case law is not uniform nor can it be since, for instance, the foundational issues that attend hate speech are quite different from those that inform contempt of court. So too, Indian free speech policy has been varied, captive to political compulsions and disparate views regarding the interests of the community, governance and nation-building. There has been consistent tension between the individual and the community, as well as the role of the government in enforcing the expectations of the community when thwarted by law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Dichotomy between Modern and Native Law&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To understand free speech policy, it is useful to go back to the early colonial period in India, when Governor-General Warren Hastings established a system of courts in Bengal’s hinterland to begin the long process of displacing traditional law to create a modern legal system. By most accounts, pre-modern Indian law was not prescriptive, Austinian, and uniform. Instead, there were several legal systems and a variety of competing and complementary legal sources that supported different interpretations of law within most legal systems. J. Duncan M. Derrett notes that the colonial expropriation of Indian law was marked by a significant tension caused by the repeatedly-stated objective of preserving some fields of native law to create a dichotomous legal structure. These efforts were assisted by orientalist jurists such as Henry Thomas Colebrook whose interpretation of the dharmasastras heralded a new stage in the evolution of Hindu law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this background, it is not surprising that Elijah Impey, a close associate of Hastings, simultaneously served as the first Chief Justice of the Supreme Court at Fort William while overseeing the Sadr Diwani Adalat, a civil court applying Anglo-Hindu law for Hindus, and the Sadr Faujdari Adalat, a criminal court applying Anglo-Islamic law to all natives. By the mid-nineteenth century, this dual system came under strain in the face of increasing colonial pressure to rationalise the legal system to ensure more effective governance, and native protest at the perceived insensitivity of the colonial government to local customs.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Criminal Law and Free Speech in the Colony&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 1837, Thomas Macaulay wrote the first draft of a new comprehensive criminal law to replace indigenous law and custom with statutory modern law. When it was enacted as the Indian Penal Code in 1860 ("IPC"), it represented the apogee of the new colonial effort to recreate the common law in India. The IPC’s enactment coincided with the growth and spread of both the press and popular protest in India. The statute contained the entire gamut of public-order and community-interest crimes to punish unlawful assembly, rioting, affray, wanton provocation, public nuisance, obscenity, defiling a place of worship, disturbing a religious assembly, wounding religious feelings, and so on. It also criminalised private offences such as causing insult, annoyance, and intimidation. These crimes continue to be invoked in India today to silence individual opinion and free speech, including on the Internet. Section 66A of the IT Act utilised a very similar vocabulary of censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, Macaulay’s IPC did not feature the common law offences of sedition and blasphemy or the peculiar Indian crime of promoting inter-community enmity; these were added later. Sedition was criminalised by section 124A at the insistence of Barnes Peacock and applied successfully against Indian nationalist leaders including Bal Gangadhar Tilak in 1897 and 1909, and Mohandas Gandhi in 1922. In 1898, the IPC was amended again to incorporate section 153A to criminalise the promotion of enmity between different communities by words or deeds. And, in 1927, a more controversial amendment inserted section 295A into the IPC to criminalise blasphemy. All three offences have been recently used in India against writers, bloggers, professors, and ordinary citizens.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Loss of the Right to Offend&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The two amendments of 1898 and 1927, which together proscribed the promotion of inter-community enmity and blasphemy, represent the dismantling of the right to offend in India. But, oddly, they were defended by the colonial government in the interests of native sensibilities. The proceedings of the Imperial Legislative Council reveal several members, including Indians, were enthusiastic about the amendments. For some, the amendments were a necessary corrective action to protect community honour from subversive speech. The 1920s were a period of foment in India as the freedom movement intensified and communal tension mounted. In this environment, it was easy to fuse the colonial interest in strong administration with a nationalist narrative that demanded the retrieval of Indian custom to protect native sensibilities from being offended by individual free speech, a right derived from modern European law. No authoritative jurist could be summoned to prove or refute the claim that native custom privileged community honour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sadly the specific incident which galvanised the amendment of 1927, which established the crime of blasphemy in India, would not appear unfamiliar to a contemporary observer. Mahashay Rajpal, an Arya Samaj activist, published an offensive pamphlet of the Prophet Muhammad titled Rangeela Rasool, for which he was arrested and tried but acquitted in the absence of specific blasphemy provisions. With his speech being found legal, Rajpal was released and given police protection but Ilam Din, a Muslim youth, stabbed him to death. Instead of supporting its criminal law and strengthening its police forces to implement the decisions of its courts, the colonial administration surrendered to the threat of public disorder and enacted section 295A of the IPC.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Protest and Community Honour&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The amendment of 1927 marks an important point of rupture in the history of Indian free speech. It demonstrated the government’s policy intention of overturning the courts to restrict the individual’s right to speech when faced with public protest. In this way, the combination of public disorder and the newly-created crimes of promoting inter-community enmity and blasphemy opened the way for the criminal justice system to be used as a tool by natives to settle their socio-cultural disputes. Both these crimes address group offence; they do not redress individual grievances. In so far as they are designed to endorse group honour, these crimes signify the community’s attempt to suborn modern law and individual rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Almost a century later, the Rangeela Rasool affair has become the depressing template for illegal censorship in India: fringe groups take offence at permissible speech, crowds are marshalled to articulate an imagined grievance, and the government capitulates to the threat of violence. This formula has become so entrenched that governance has grown reflexively suppressive, quick to silence speech even before the perpetrators of lumpen violence can receive affront. This is especially true of online speech, where censorship is driven by the additional anxiety brought by the difficulty of Internet regulation. In this race to be offended the government plays the parochial referee, acting to protect indigenous sensibilities from subversive but legal speech.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Censorious Post-colony&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Independence marked an opportunity to remake Indian governance in a freer image. The Constituent Assembly had resolved not to curb the freedom of speech in Article 19(1)(a) of the Constitution on account of public order. In two cases from opposite ends of the country where right-wing and left-wing speech were punished by local governments on public order grounds, the Supreme Court acted on the Constituent Assembly’s vision and struck down the laws in question. Free speech, it appeared, would survive administrative concerns, thanks to the guarantee of a new constitution and an independent judiciary. Instead Prime Minister Jawaharlal Nehru and his cabinet responded with the First Amendment in 1951, merely a year after the Constitution was enacted, to create three new grounds of censorship, including public order. In 1963, a year before he demitted office, the Sixteenth Amendment added an additional restriction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nehru did not stop at amending the Constitution, he followed shortly after with a concerted attempt to stage-manage the press by de-legitimising certain kinds of permissible speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Justice G. S. Rajadhyaksha, the government constituted the First Press Commission which attacked yellow journalism, seemingly a sincere concern, but included permissible albeit condemnable speech that was directed at communities, indecent or vulgar, and biased. Significantly, the Commission expected the press to only publish speech that conformed to the developmental and social objectives of the government. In other words, Nehru wanted the press to support his vision of India and used the imperative of nation-building to achieve this goal. So, the individual right to offend communities was taken away by law and policy, and speech that dissented from the government’s socio-economic and political agenda was discouraged by policy. Coupled with the new constitutional ground of censorship on account of public order, the career of free speech in independent India began uncertainly.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How to regulate permissible speech?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Despite the many restrictions imposed by law on free speech, Indian free speech policy has long been engaged with the question of how to regulate the permissible speech that survives constitutional scrutiny. This was significantly easier in colonial India. In 1799, Governor-General Richard Wellesley, the brother of the famous Duke of Wellington who defeated Napoleon at Waterloo, instituted a pre-censorship system to create what Rajeev Dhavan calls a “press by permission” marked by licensed publications, prior restraint, subsequent censorship, and harsh penalties. A new colonial regime for strict control over the publication of free speech was enacted in the form of the Press and Registration of Books Act, 1867, the preamble of which recognises that “the literature of a country is…an index of…the condition of [its] people”. The 1867 Act was diluted after independence but still remains alive in the form of the Registrar of Newspapers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After surviving Indira Gandhi’s demand for a committed press and the depredations of her regime during the Emergency, India’s press underwent the examination of the Second Press Commission. This was appointed in 1978 under the chairmanship of Justice P. K. Goswami, a year after the Janata government released the famous White Paper on Misuse of Mass Media. When Gandhi returned to power, Justice Goswami resigned and the Commission was reconstituted under Justice K. K. Mathew. In 1982, the Commission’s report endorsed the earlier First Press Commission’s call for conformist speech, but went further by proposing the appointment of a press regulator invested with inspection powers; criminalising attacks on the government; re-interpreting defamation law to encompass democratic criticism of public servants; retaining stringent official secrecy law; and more. It was quickly acted upon by Rajiv Gandhi through his infamous Defamation Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The contours of future Internet regulation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The juggernaut of Indian free speech policy has received temporary setbacks, mostly inflicted by the Supreme Court. Past experience shows us that governments with strong majorities – whether Jawaharlal Nehru’s following independence or Indira Gandhi’s in the 1970s – act on their administrative impulses to impede free speech by government policy. The Internet is a recent and uncontrollable medium of speech that attracts disproportionately heavy regulatory attention. Section 66A of the IT Act may be dead but several other provisions remain to harass and punish online free speech. Far from relaxing its grip on divergent opinions, the government appears poised for more incisive invasions of personal freedoms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I do not believe the contours of future speech regulation on the Internet need to be guessed at, they can be derived from the last two centuries of India’s free speech policy. When section 66A is replaced – and it will be, whether overtly by fresh statutory provisions or stealthily by policy and non-justiciable committees and commissions – it will be through a regime that obeys the mandate of the First Press Commission to discourage dissenting and divergent speech while adopting the regulatory structures of the Second Press Commission to permit a limited inspector raj and forbid attacks on personalities. The interests of the community, howsoever improperly articulated, will seek precedence over individual freedoms and the accompanying threat of violence will give new meaning to Bhimrao Ambedkar’s warning of the “grammar of anarchy”.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policy-in-india-community-custom-censorship-and-future-of-internet-regulation'&gt;https://cis-india.org/internet-governance/blog/policy-in-india-community-custom-censorship-and-future-of-internet-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-08-23T10:12:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance">
    <title>Mastering the Art of Keeping Indians Under Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance</link>
    <description>
        &lt;b&gt;In its first year in office, the National Democratic Alliance government has been notably silent on the large-scale surveillance projects it has inherited. This ended last week amidst reports the government is hastening to complete the Central Monitoring System (CMS) within the year.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://thewire.in/2015/05/30/mastering-the-art-of-keeping-indians-under-surveillance-2756/"&gt;the Wire&lt;/a&gt; on May 30, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a statement to the Rajya Sabha in 2009, Gurudas Kamat, the  erstwhile United Progressive Alliance’s junior communications minister,  said the CMS was a project to enable direct state access to all  communications on mobile phones, landlines, and the Internet in India.  He meant the government was building ‘backdoors’, or capitalising on  existing ones, to enable state authorities to intercept any  communication at will, besides collecting large amounts of metadata,  without having to rely on private communications carriers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not new. Legally sanctioned backdoors have existed in Europe  and the USA since the early 1990s to enable direct state interception of  private communications. But the laws of those countries also subject  state surveillance to a strong regime of state accountability,  individual freedoms, and privacy. This regime may not be completely  robust, as Edward Snowden’s revelations have shown, but at least it  exists on paper. The CMS is not illegal by itself, but it is coloured by  the compromised foundation of Indian surveillance law upon which it is  built.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Surveillance and social control&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS is a technological project. But technology does not exist in  isolation; it is contextualised by law, society, politics, and history.  Surveillance and the CMS must be seen in the same contexts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The great sociologist Max Weber claimed the modern state could not  exist without monopolising violence. It seems clear the state also  entertains the equal desire to monopolise communications technologies.  The state has historically shaped the way in which information is  transmitted, received, and intercepted. From the telegraph and radio to  telephones and the Internet, the state has constantly endeavoured to  control communications technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Law is the vehicle of this control. When the first telegraph line was  laid down in India, its implications for social control were instantly  realised; so the law swiftly responded by creating a state monopoly over  the telegraph. The telegraph played a significant role in thwarting the  Revolt of 1857, even as Indians attempted to destroy the line; so the  state consolidated its control over the technology to obviate future  contests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This controlling impulse was exercised over radio and telephones,  which are also government monopolies, and is expressed through the  state’s surveillance prerogative. On the other hand, because of its open  and decentralised architecture, the Internet presents the single  greatest threat to the state’s communications monopoly and dilutes its  ability to control society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interception in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The power to intercept communications arises with the regulation of  telegraphy. The first two laws governing telegraphs, in 1854 and 1860,  granted the government powers to take possession of telegraphs “on the  occurrence of any public emergency”. In 1876, the third telegraph law  expanded this threshold to include “the interest of public safety”.  These are vague phrases and their interpretation was deliberately left  to the government’s discretion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This unclear formulation was replicated in the Indian Telegraph Act  of 1885, the fourth law on the subject, which is currently in force  today. The 1885 law included a specific power to wiretap. Incredibly,  this colonial surveillance provision survived untouched for 87 years  even as countries across the world balanced their surveillance powers  with democratic safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Constitution requires all deprivations of free speech to  conform to any of nine grounds listed in Article 19(2). Public  emergencies and public safety are not listed. So Indira Gandhi amended  the wiretapping provision in 1972 to insert five grounds copied from  Article 19(2). However, the original unclear language on public  emergencies and public safety remained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indira Gandhi’s amendment was ironic because one year earlier she had  overseen the enactment of the Defence and Internal Security of India  Act, 1971 (DISA), which gave the government fresh powers to wiretap.  These powers were not subject to even the minimal protections of the  Telegraph Act. When the Emergency was imposed in 1975, Gandhi’s  government bypassed her earlier amendment and, through the DISA Rules,  instituted the most intensive period of surveillance in Indian history.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although DISA was repealed, the tradition of having parallel  surveillance powers for fictitious emergencies continues to flourish.  Wiretapping powers are also found in the Maharashtra Control of  Organised Crime Act, 1999 which has been copied by Karnataka, Andhra  Pradesh, Arunachal Pradesh, and Gujarat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Procedural weaknesses&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, the Telegraph Act with its 1972 amendment continued to  weather criticism through the 1980s. The wiretapping power was largely  exercised free of procedural safeguards such as the requirements to  exhaust other less intrusive means of investigation, minimise  information collection, limit the sharing of information, ensure  accountability, and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This changed in 1996 when the Supreme Court, on a challenge brought  by PUCL, ordered the government to create a minimally fair procedure.  The government fell in line in 1999, and a new rule, 419A, was put into  the Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike the United States, where a wiretap can only be ordered by a  judge when she decides the state has legally made its case for the  requested interception, an Indian wiretap is sanctioned by a bureaucrat  or police officer. Unlike the United Kingdom, which also grants  wiretapping powers to bureaucrats but subjects them to two additional  safeguards including an independent auditor and a judicial tribunal, an  Indian wiretap is only reviewed by a committee of the original  bureaucrat’s colleagues. Unlike most of the world which restricts this  power to grave crime or serious security needs, an Indian wiretap can  even be obtained by the income tax department.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 419A certainly creates procedure, but it lacks crucial  safeguards that impugn its credibility. Worse, the contours of rule 419A  were copied in 2009 to create flawed procedures to intercept the  content of Internet communications and collect metadata. Unlike rule  419A, these new rules issued under sections 69(2) and 69B(3) of the  Information Technology Act 2000 have not been constitutionally  scrutinised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Three steps to tap&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite its monopoly, the state does not own the infrastructure of  telephones. It is dependent on telecommunications carriers to physically  perform the wiretap. Indian wiretaps take place in three steps: a  bureaucrat authorises the wiretap; a law enforcement officer serves the  authorisation on a carrier; and, the carrier performs the tap and  returns the information to the law enforcement officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are many moving parts in this process, and so there are leaks.  Some leaks are cynically motivated such as Amar Singh’s lewd  conversations in 2011. But others serve a public purpose: Niira Radia’s  conversations were allegedly leaked by a whistleblower to reveal serious  governmental culpability. Ironically, leaks have created accountability  where the law has failed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS will prevent leaks by installing servers on the transmission  infrastructure of carriers to divert communications to regional  monitoring centres. Regional centres, in turn, will relay communications  to a centralised monitoring centre where they will be analysed, mined,  and stored. Carriers will no longer perform wiretaps; and, since this  obviates their costs of compliance, they are willing participants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its annual report of 2012, the Centre for the Development of  Telematics (C-DOT), a state-owned R&amp;amp;D centre tasked with designing  and creating the CMS, claimed the system would intercept 3G video, ILD,  SMS, and ISDN PRI communications made through landlines or mobile phones  – both GSM and CDMA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are unclear reports of an expansion to intercept Internet data,  such as emails and browsing details, as well as instant messaging  services; but these remain unconfirmed. There is also a potential  overlap with another secretive Internet surveillance programme being  developed by the Defence R&amp;amp;D Organisation called NETRA, no details  of which are public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Culmination of surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its present state, Indian surveillance law is unable to bear the  weight of the CMS project, and must be vastly strengthened to protect  privacy and accountability before the state is given direct access to  communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there is a larger way to understand the CMS in the context of  Indian surveillance. Christopher Bayly, the noted colonial historian,  writes that when the British set about establishing a surveillance  apparatus in colonised India, they came up against an established system  of indigenous intelligence gathering. Colonial rule was at its most  vulnerable at this point of intersection between foreign surveillance  and indigenous knowledge, and the meeting of the two was riven by  suspicion. So the colonial state simply co-opted the interface by  creating institutions to acquire local knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS is also an attempt to co-opt the interface between government  and the purveyors of communications; because if the state cannot  control communications, it cannot control society. Seen in this light,  the CMS represents the natural culmination of the progression of Indian  surveillance. No challenge against it that does not question the  construction of the modern Indian state will be successful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance'&gt;https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-23T12:26:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india">
    <title>The Four Parts of Privacy in India</title>
    <link>https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india</link>
    <description>
        &lt;b&gt;Privacy enjoys an abundance of meanings. It is claimed in diverse situations every day by everyone against other people, society and the state.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Traditionally traced to classical liberalism’s public/private divide, there are now several theoretical conceptions of privacy that collaborate and sometimes contend. Indian privacy law is evolving in response to four types of privacy claims: against the press, against state surveillance, for decisional autonomy, and in relation to personal information. The Indian Supreme Court has selectively borrowed competing foreign privacy norms, primarily American, to create an unconvincing pastiche of privacy law in India. These developments are undermined by a lack of theoretical clarity and the continuing tension between individual freedoms and communitarian values.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was published in &lt;i&gt;Economic &amp;amp; Political Weekly&lt;/i&gt;, 50(22), 30 May 2015. &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/four-parts-of-privacy.pdf" class="internal-link"&gt;Download the full article here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india'&gt;https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-23T13:04:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence">
    <title>Anvar v. Basheer and the New (Old) Law of Electronic Evidence</title>
    <link>https://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence</link>
    <description>
        &lt;b&gt;The Supreme Court of India revised the law on electronic evidence. The judgment will have an impact on the manner in which wiretap tapes are brought before a court. &lt;/b&gt;
        &lt;p&gt;Read the original &lt;a class="external-link" href="http://notacoda.net/2014/09/25/anvar-v-basheer-and-the-new-old-law-of-electronic-evidence/"&gt;published by Law and Policy in India&lt;/a&gt; on September 25, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;The case&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On 18 September 2014, the Supreme Court of India delivered its judgment in the case of &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=1&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0CBwQFjAA&amp;amp;url=http%3A%2F%2Fjudis.nic.in%2Fsupremecourt%2Fimgs1.aspx%3Ffilename%3D41931&amp;amp;ei=D6sjVOaeL8njuQSM7YDYAQ&amp;amp;usg=AFQjCNGzIq7qaNntgpFmwprehVy3D__AAA&amp;amp;bvm=bv.76247554,d.c2E" target="_blank"&gt;&lt;i&gt;Anvar&lt;/i&gt; v. &lt;i&gt;P. K. Basheer&lt;/i&gt;&lt;/a&gt; (Civil Appeal 4226 of 2012) to declare new law in respect of the evidentiary admissibility of the contents of electronic records. In doing so, Justice Kurian Joseph, speaking for a bench that included Chief Justice Rajendra M. Lodha and Justice Rohinton F. Nariman, overruled an earlier Supreme Court judgment in the 1995 case of &lt;a href="http://indiankanoon.org/doc/1769219/" target="_blank"&gt;&lt;i&gt;State (NCT of Delhi)&lt;/i&gt; v. &lt;i&gt;Navjot Sandhu alias Afsan Guru&lt;/i&gt;&lt;/a&gt;(2005) 11 SCC 600, popularly known as the Parliament Attacks case, and re-interpreted the application of sections 63, 65, and 65B of the &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/index.php?Title=Indian%20Evidence%20Act,%201872" target="_blank"&gt;Indian Evidence Act, 1872&lt;/a&gt; (“Evidence Act”). To appreciate the implications of this judgment, a little background may be required.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The hearsay rule&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Evidence Act was drafted to codify principles of evidence in the common law. Traditionally, a fundamental rule of evidence is that oral evidence may be adduced to prove all facts, except documents, provided always that the oral evidence is direct. Oral evidence that is not direct is challenged by the hearsay rule and, unless it is saved by one of the exceptions to the hearsay rule, is inadmissible. In India, this principle is stated in &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/59.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Proof%20of%20facts%20by%20oral%20evidence" target="_blank"&gt;sections 59&lt;/a&gt; and &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/60.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Oral%20evidence%20must%20be%20direct" target="_blank"&gt;60&lt;/a&gt; of the Evidence Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The hearsay rule is both fundamental and complex; a proper examination would require a lengthy excursus, but a simple explanation should suffice. In the landmark House of Lords decision in &lt;i&gt;R&lt;/i&gt; v. &lt;i&gt;Sharp&lt;/i&gt; [1988] 1 All ER 65, Lord Havers – the controversial prosecutor who went on to become the Lord Chancellor – described hearsay as “&lt;i&gt;Any assertion other than one made by a person while giving oral evidence in the proceedings is inadmissible as evidence of any fact or opinion asserted.&lt;/i&gt;” This definition was applied by courts across the common law world. &lt;a href="http://www.legislation.gov.uk/ukpga/2003/44/section/114" target="_blank"&gt;Section 114&lt;/a&gt; of the United Kingdom’s (UK) Criminal Justice Act, 2003, which modernised British criminal procedure, uses simpler language: “&lt;i&gt;a statement not made in oral evidence in the proceedings.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hearsay evidence is anything said outside a court by a person absent from a trial, but which is offered by a third person during the trial as evidence. The law excludes hearsay evidence because it is difficult or impossible to determine its truth and accuracy, which is usually achieved through cross examination. Since the person who made the statement and the person to whom it was said cannot be cross examined, a third person’s account of it is excluded. There are a few exceptions to this rule which need no explanation here; they may be left to another post.&lt;/p&gt;
&lt;h3&gt;Hearsay in documents&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The hearsay rule is straightforward in relation to oral evidence but a little less so in relation to documents. As mentioned earlier, oral evidence cannot prove the contents of documents. This is because it would disturb the hearsay rule (since the document is absent, the truth or accuracy of the oral evidence cannot be compared to the document). In order to prove the contents of a document, &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/61.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Proof%20of%20contents%20of%20documents" target="_blank"&gt;either primary or secondary evidence&lt;/a&gt; must be offered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Primary evidence of the contents of a document is the document itself [&lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/62.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Primary%20evidence" target="_blank"&gt;section 62&lt;/a&gt; of the Evidence Act]. The process of compelling the production of a document in court is called ‘discovery’. Upon discovery, a document speaks for itself. Secondary evidence of the contents of a document is, amongst other things, certified copies of that document, copies made by mechanical processes that insure accuracy, and oral accounts of the contents by someone who has seen that document. &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/63.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Secondary%20evidence" target="_blank"&gt;Section 63&lt;/a&gt; of the Evidence Act lists the secondary evidence that may prove the contents of a document.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secondary evidence of documentary content is an attempt at reconciling the hearsay rule with the difficulties of securing the discovery of documents. There are many situations where the original document simply cannot be produced for a variety of reasons. &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/65.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Cases%20in%20which%20secondary%20evidence%20relating%20to%20documents%20may%20be%20given" target="_blank"&gt;Section 65&lt;/a&gt; of the Evidence Act lists the situations in which the original document need not be produced; instead, the secondary evidence listed in section 63 can be used to prove its content. These situations arise when the original document (i) is in hostile possession; (ii) has been stipulated to by the prejudiced party; (iii) is lost or destroyed; (iv) cannot be easily moved, i.e. physically brought to the court; (v) is a public document of the state; (vi) can be proved by certified copies when the law narrowly permits; and (vii) is a collection of several documents.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Electronic documents&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As documents came to be digitised, the hearsay rule faced several new challenges. While the law had mostly anticipated primary evidence (i.e. the original document itself) and had created special conditions for secondary evidence, increasing digitisation meant that more and more documents were electronically stored. As a result, the adduction of secondary evidence of documents increased. In the &lt;i&gt;Anvar&lt;/i&gt; case, the Supreme Court noted that “&lt;i&gt;there is a revolution in the way that evidence is produced before the court&lt;/i&gt;”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India before 2000, electronically stored information was treated as a document and secondary evidence of these electronic ‘documents’ was adduced through printed reproductions or transcripts, the authenticity of which was certified by a competent signatory. The signatory would identify her signature in court and be open to cross examination. This simple procedure met the conditions of both sections 63 and 65 of the Evidence Act. In this manner, Indian courts simply adapted a law drafted over one century earlier in Victorian England. However, as the pace and proliferation of technology expanded, and as the creation and storage of electronic information grew more complex, the law had to change more substantially.&lt;/p&gt;
&lt;h3&gt;New provisions for electronic records&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To bridge the widening gap between law and technology, Parliament enacted the &lt;a href="http://www.vakilno1.com/bareacts/informationtechnologyact/informationtechnologyact.html" target="_blank"&gt;Information Technology Act, 2000&lt;/a&gt; (“IT Act”) [official pdf &lt;a href="http://www.dot.gov.in/sites/default/files/itbill2000_0.pdf" target="_blank"&gt;here&lt;/a&gt;] that, amongst other things, created new definitions of “data”, “electronic record”, and “computer”. According to section 2(1)(t) of the IT Act, an electronic record is “&lt;i&gt;data, record or data generated, image or sound stored, received or sent in an electronic form or micro film or computer generated micro fiche&lt;/i&gt;” (sic).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The IT Act amended &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/59.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Proof%20of%20facts%20by%20oral%20evidence" target="_blank"&gt;section 59&lt;/a&gt; of the Evidence Act to exclude electronic records from the probative force of oral evidence in the same manner as it excluded documents. This is the re-application of the documentary hearsay rule to electronic records. But, instead of submitting electronic records to the test of secondary evidence – which, for documents, is contained in sections 63 and 65, it inserted two new evidentiary rules for electronic records in the Evidence Act: &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/65a.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Special%20provisions%20as%20to%20evidence%20relating%20to%20electronic%20record" target="_blank"&gt;section 65A&lt;/a&gt; and &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/65b.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Admissibility%20of%20electronic%20records" target="_blank"&gt;section 65B&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 65A of the Evidence Act creates special law for electronic evidence:&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;&lt;b&gt;&lt;i&gt;65A. Special provisions as to evidence relating to electronic record. –&lt;/i&gt;&lt;/b&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;The contents of electronic records may be proved in accordance with the provisions of section 65B.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 65A of the Evidence Act performs the same function for electronic records that &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/61.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Proof%20of%20contents%20of%20documents" target="_blank"&gt;section 61&lt;/a&gt; does for documentary evidence: it creates a separate procedure, distinct from the simple procedure for oral evidence, to ensure that the adduction of electronic records obeys the hearsay rule. It also secures other interests, such as the authenticity of the technology and the sanctity of the information retrieval procedure. But section 65A is further distinguished because it is a special law that stands apart from the documentary evidence procedure in sections 63 and 65.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/65b.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=Admissibility%20of%20electronic%20records" target="_blank"&gt;Section 65B&lt;/a&gt; of the Evidence Act details this special procedure for adducing electronic records in evidence. Sub-section (2) lists the technological conditions upon which a duplicate copy (including a print-out) of an original electronic record may be used: (i) at the time of the creation of the electronic record, the computer that produced it must have been in regular use; (ii) the kind of information contained in the electronic record must have been regularly and ordinarily fed in to the computer; (iii) the computer was operating properly; and, (iv) the duplicate copy must be a reproduction of the original electronic record.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sub-section (4) of section 65B of the Evidence Act lists additional non-technical qualifying conditions to establish the authenticity of electronic evidence. This provision requires the production of a certificate by a senior person who was responsible for the computer on which the electronic record was created, or is stored. The certificate must uniquely identify the original electronic record, describe the manner of its creation, describe the device that created it, and certify compliance with the technological conditions of sub-section (2) of section 65B.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Non-use of the special provisions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;However, the special law and procedure created by sections 65A and 65B of the Evidence Act for electronic evidence were not used. Disappointingly, the cause of this non-use does not involve the law at all. India’s lower judiciary – the third tier of courts, where trials are undertaken – is vastly inept and technologically unsound. With exceptions, trial judges simply do not know the technology the IT Act comprehends. It is easier to carry on treating electronically stored information as documentary evidence. The reasons for this are systemic in India and, I suspect, endemic to poor developing countries. India’s justice system is decrepit and poorly funded. As long as the judicial system is not modernised, India’s trial judges will remain clueless about electronic evidence and the means of ensuring its authenticity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By bypassing the special law on electronic records, Indian courts have continued to apply the provisions of sections 63 and 65 of the Evidence Act, which pertain to documents, to electronically stored information. Simply put, the courts have basically ignored sections 65A and 65B of the Evidence Act. Curiously, this state of affairs was blessed by the Supreme Court in Navjot Sandhu (the Parliament Attacks case), which was a particularly high-profile appeal from an emotive terrorism trial. On the question of the defence’s challenge to the authenticity and accuracy of certain call data records (CDRs) that the prosecution relied on, which were purported to be reproductions of the original electronically stored records, a Division Bench of Justice P. Venkatarama Reddi and Justice P. P. Naolekar held:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;According to Section 63, secondary evidence means and includes, among other things, “copies made from the original by mechanical processes which in themselves ensure the accuracy of the copy, and copies compared with such copies”. Section 65 enables secondary evidence of the contents of a document to be adduced if the original is of such a nature as not to be easily movable. It is not in dispute that the information contained in the call records is stored in huge servers which cannot be easily moved and produced in the court. That is what the High Court has also observed at para 276. Hence, printouts taken from the computers/servers by mechanical process and certified by a responsible official of the service-providing company can be led into evidence through a witness who can identify the signatures of the certifying officer or otherwise speak to the facts based on his personal knowledge.&lt;/i&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Flawed justice and political expediency in wiretap cases&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court’s finding in Navjot Sandhu (quoted above) raised uncomfortable questions about the integrity of prosecution evidence, especially in trials related to national security or in high-profile cases of political importance. The state’s investigation of the Parliament Attacks was shoddy with respect to the interception of telephone calls. The Supreme Court’s judgment notes in prs. 148, 153, and 154 that the law and procedure of wiretaps was violated in several ways.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Evidence Act mandates a special procedure for electronic records precisely because printed copies of such information are vulnerable to manipulation and abuse. This is what the veteran defence counsel, Mr. Shanti Bhushan, pointed out in &lt;i&gt;Navjot Sandhu&lt;/i&gt; [see pr. 148] where there were discrepancies in the CDRs led in evidence by the prosecution. Despite these infirmities, which should have disqualified the evidence until the state demonstrated the absence of &lt;i&gt;mala fide&lt;/i&gt; conduct, the Supreme Court stepped in to certify the secondary evidence itself, even though it is not competent to do so. The court did not compare the printed CDRs to the original electronic record. Essentially, the court allowed hearsay evidence. This is exactly the sort of situation that section 65B of the Evidence Act intended to avoid by requiring an impartial certificate under sub-section (4) that also speaks to compliance with the technical requirements of sub-section (2).&lt;/p&gt;
&lt;p&gt;When the lack of a proper certificate regarding the authenticity and integrity of the evidence was pointed out, this is what the Supreme Court said in pr. 150:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;Irrespective of the compliance of the requirements of Section 65B, which is a provision dealing with admissibility of electronic records, there is no bar to adducing secondary evidence under the other provisions of the Evidence Act, namely, Sections 63 and 65. It may be that the certificate containing the details in sub-section (4) of Section 65B is not filed in the instant case, but that does not mean that secondary evidence cannot be given even if the law permits such evidence to be given in the circumstances mentioned in the relevant provisions, namely, Sections 63 and 65.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the years that followed, printed versions of CDRs were admitted in evidence if they were certified by an officer of the telephone company under sections 63 and 65 of the Evidence Act. The special procedure of section 65B was ignored. This has led to confusion and counter-claims. For instance, the 2011 case of &lt;a href="http://indiankanoon.org/doc/1082001/" target="_blank"&gt;&lt;i&gt;Amar Singh&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;&lt;/a&gt; (2011) 7 SCC 69 saw all the parties, including the state and the telephone company, dispute the authenticity of the printed transcripts of the CDRs, as well as the authorisation itself. Currently, in the case of &lt;i&gt;Ratan Tata&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; Writ Petition (Civil) 398 of 2010, a compact disc (CD) containing intercepted telephone calls was introduced in the Supreme Court without following any of the procedure contained in the Evidence Act.&lt;/p&gt;
&lt;h3&gt;Returning sanity to electronic record evidence, but at a price&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2007, the United States District Court for Maryland handed down a landmark decision in &lt;a href="https://www.google.co.in/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=1&amp;amp;cad=rja&amp;amp;uact=8&amp;amp;ved=0CB4QFjAA&amp;amp;url=http%3A%2F%2Fwww.mdd.uscourts.gov%2Fopinions%2Fopinions%2Florraine%2520v.%2520markel%2520-%2520esiadmissibility%2520opinion.pdf&amp;amp;ei=LrEjVLTKEdLiuQTGvYHgAw&amp;amp;usg=AFQjCNEGlYKs3f11PxzwjmFccTUynlIVzA&amp;amp;bvm=bv.76247554,d.c2E" target="_blank"&gt;&lt;i&gt;Lorraine&lt;/i&gt; v. &lt;i&gt;Markel American Insurance Company&lt;/i&gt;&lt;/a&gt;241 FRD 534 (D. Md. 2007) that clarified the rules regarding the discovery of electronically stored information. In American federal courts, the law of evidence is set out in the &lt;a href="http://www.law.cornell.edu/rules/fre" target="_blank"&gt;Federal Rules of Evidence&lt;/a&gt;. &lt;i&gt;Lorraine&lt;/i&gt; held when electronically stored information is offered as evidence, the following tests need to be affirmed for it to be admissible: (i) is the information relevant; (ii) is it authentic; (iii) is it hearsay; (iv) is it original or, if it is a duplicate, is there admissible secondary evidence to support it; and (v) does its probative value survive the test of unfair prejudice?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a small way, &lt;i&gt;Anvar&lt;/i&gt; does for India what &lt;i&gt;Lorraine&lt;/i&gt; did for US federal courts. In &lt;i&gt;Anvar&lt;/i&gt;, the Supreme Court unequivocally returned Indian electronic evidence law to the special procedure created under section 65B of the Evidence Act. It did this by applying the maxim &lt;i&gt;generalia specialibus non derogant&lt;/i&gt; (“the general does not detract from the specific”), which is a restatement of the principle &lt;i&gt;lex specialis derogat legi generali&lt;/i&gt; (“special law repeals general law”). The Supreme Court held that the provisions of sections 65A and 65B of the Evidence Act created special law that overrides the general law of documentary evidence [see pr. 19]:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Proof of electronic record is a special provision introduced by the IT Act amending various provisions under the Evidence Act. The very caption of Section 65Aof the Evidence Act, read with Sections 59 and 65B is sufficient to hold that the special provisions on evidence relating to electronic record shall be governed by the procedure prescribed under Section 65B ofthe Evidence Act. That is a complete code in itself. Being a special law, the general law under Sections 63 and 65 has to yield.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By doing so, it disqualified oral evidence offered to attest secondary documentary evidence [see pr. 17]:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The Evidence Act does not contemplate or permit the proof of an electronic record by oral evidence if requirements under Section 65B of the Evidence Act are not complied with, as the law now stands in India.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scope for oral evidence is offered later. Once electronic evidence is properly adduced according to section 65B of the Evidence Act, along with the certificate of sub-section (4), the other party may challenge the genuineness of the original electronic record. If the original electronic record is challenged, &lt;a href="http://www.advocatekhoj.com/library/bareacts/indianevidence/22a.php?Title=Indian%20Evidence%20Act,%201872&amp;amp;STitle=When%20oral%20admission%20as%20to%20contents%20of%20electronic%20records%20are%20relevant" target="_blank"&gt;section 22A&lt;/a&gt; of the Evidence Act permits oral evidence as to its genuineness only. Note that section 22A disqualifies oral evidence as to the contents of the electronic record, only the genuineness of the record may be discussed. In this regard, relevant oral evidence as to the genuineness of the record can be offered by the Examiner of Electronic Evidence, an expert witness under section 45A of the Evidence Act who is appointed under section 79A of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While &lt;i&gt;Anvar&lt;/i&gt; is welcome for straightening out the messy evidentiary practice regarding electronically stored information that &lt;i&gt;Navjot Sandhu&lt;/i&gt;had endorsed, it will extract a price from transparency and open government. The portion of &lt;i&gt;Navjot Sandhu&lt;/i&gt; that was overruled dealt with wiretaps. In India, the wiretap empowerment is contained in &lt;a href="http://indiankanoon.org/doc/1445510/" target="_blank"&gt;section 5(2)&lt;/a&gt;of the &lt;a href="http://indiankanoon.org/doc/357830/" target="_blank"&gt;Indian Telegraph Act, 1885&lt;/a&gt; (“Telegraph Act”). The Telegraph Act is an inherited colonial law. Section 5(2) of the Telegraph Act was almost exactly duplicated thirteen years later by &lt;a href="http://indiankanoon.org/doc/72724899/" target="_blank"&gt;section 26&lt;/a&gt; of the Indian Post Office Act, 1898. When the latter was referred to a Select Committee, P. Ananda Charlu – a prominent lawyer, Indian nationalist leader, and one of the original founders of the Indian National Congress in 1885 – criticised its lack of transparency, saying: “&lt;i&gt;a strong and just government must not shrink from daylight&lt;/i&gt;”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Wiretap leaks have become an important means of discovering governmental abuse of power, corruption, and illegality. For instance, the massive fraud enacted by under-selling 2G spectrum by A. Raja, the former telecom minister, supposedly India’s most expensive corruption scandal, caught the public’s imagination only after taped wiretapped conversations were leaked. Some of these conversations were recorded on to a CD and brought to the Supreme Court’s attention. There is no way that a whistle blower, or a person in possession of electronic evidence, can obtain the certification required by section 65B(4) of the Evidence Act without the state coming to know about it and, presumably, attempting to stop its publication.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Anvar&lt;/i&gt; neatly ties up electronic evidence, but it will probably discourage public interest disclosure of inquity.&lt;/p&gt;
&lt;h2&gt;Video&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="360" src="http://www.youtube.com/embed/n6V6BfdRorw?feature=player_embedded" width="400"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence'&gt;https://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-04T15:53:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy">
    <title>Roundtable on Indian Privacy Law and Policy</title>
    <link>https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy</link>
    <description>
        &lt;b&gt;This event was hosted by the Centre for Law and Development of the National University of Advanced Legal Studies (NUALS) in Kochi. It was attended by members of the faculty of NUALS, some students from the 2nd year, 3rd year, 4th year, and 5th year.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The meeting began with a talk by Bhairav Acharya on the origin of privacy law, its jurisprudential evolution, and the current context in which privacy is being debated in India and around the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav began by talking about the nature of privacy law around the world. Privacy has, until recently, never been a right in English common law. Indeed, the tort of invasion of privacy is also relatively incomplete. Privacy is protected through other torts, including the torts of nuisance, trespass, and others. European treaty requirements have foisted a right to privacy upon the British legal system; the contours of this right remain unclear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;American courts, on the other hand, have been more receptive to claims of the right to privacy. There is much in the American political and legal tradition that has contributed to the easy acceptability of privacy claims. Not least among these are the strong emphasis on the individual as the fundamental unit of governance and sovereignty, and the American libertarian tradition of autonomy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav then spoke of the right to privacy in India. Early cases in the Supreme Court of India see privacy as a negotiation between the liberties of citizens and the power of the state. In a legal tradition deeply influenced by colonialism, Indian courts readily accepted claims against physical police surveillance and other related rights in the criminal justice process – public rights against the state that were once denied to Indian subjects of colonial rule, but held short of viewing privacy as a necessary individual protection against society. This has resulted in dichotomous privacy jurisprudence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav then talked about the contexts in which privacy claims arise in India today. Specifically, he spoke about increasingly sophisticated surveillance techniques and large-scale personal data collection and processing. There are many complexities in both these fields and a lot of time and questions were spent going over them. Surveillance is older than the nation-state; privacy law does not seek the end of surveillance, but only its optimal use. There are many kinds of surveillance, the contemporary debate deals solely with wiretapping and electronic surveillance. Privacy law cannot be blind to the many other kinds of surveillance, including old-fashioned physical surveillance on the road.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data collection, too, cannot be ended, nor should it for it forms the basis of modern commerce and is tied to India’s economic growth. There were questions and discussion on ‘big data’, data mining, analytics, business models, and other related areas. In India, however, in the absence of an innovative IT industry, the dominant business model is of receiving foreign personal data, usually of Europeans and Americans, to provide cheap processing services. This model depends entirely on comparatively lower Indian wages. Hence, it is not surprising that the first personal data protection rules issued by the Indian government in 2011 applied solely to foreign data that was outsourced to India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav then introduced the 2011 draft Right to Privacy Bill that was proposed by the Department of Personnel and Training of the Indian government, as well as the Personal Data Protection Rules issued under the Information Technology Act, 2000. These measures were studied clause-by-clause.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, Indian law in respect of communications surveillance was analysed in detail. The Indian Telegraph Act 1885, the Indian Telegraph Rules 1951 (including the amendments of 1961, 1999, 2007, and 2014) were looked at in detail. These laws were compared to the Indian Post Office Act 1898 and the Information Technology Act 2000. The 1968 report of the Law Commission of India that examined the wiretapping power and suggested possible overreach was also examined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav reviewed Indian law in respect of wiretapping. All Supreme Court case law, especially the cases of &lt;i&gt;Hukum Chand&lt;/i&gt; and &lt;i&gt;Peoples Union for Civil Liberties&lt;/i&gt;, were analysed. Finally, the group looked at how the legal principles applicable to wiretapping have been extended to electronic and Internet surveillance. Over here, the group studied the two sets of 2011 Rules under the IT Act that enable Internet and email surveillance of both content and metadata.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a lunch break, the group spoke about possible models for privacy regulation and protection in India. In respect of surveillance, a lot of time was spent discussing the merits and demerits of judicial warranting of surveillance, as opposed to executive authorisations. The consensus of the group, with a few exceptions, was that judicial warranting would not be a suitable model for Indian surveillance, due to several systemic weaknesses. The group also rejected several of the principles proposed by Justice A. P. Shah in the 2012 Report that was commissioned by the Planning Commission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a discussion on legislative models, the group discussed, clause-by-clause, the CIS proposal on privacy that was read through by Bhairav. This discussion lasted several hours, and covered many areas.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy'&gt;https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-27T14:18:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy">
    <title>Legislating for Privacy - Part II</title>
    <link>https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy</link>
    <description>
        &lt;b&gt;Apart from the conflation of commercial data protection and privacy, the right to privacy bill has ill-informed and poorly drafted provisions to regulate surveillance.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://www.thehoot.org/web/freetracker/storynew.php?storyid=570&amp;amp;sectionId=10"&gt;published in the Hoot&lt;/a&gt; on May 20, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Emblem.png" alt="Emblem" class="image-inline" title="Emblem" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In October 2010, the Department of Personnel and Training ("DOPT") of the Ministry of Personnel, Public Grievances and Pensions released an ‘Approach Paper’ towards drafting a privacy law for India. The Approach Paper claims to be prepared by a leading Indian corporate law firm that, to the best of my knowledge, has almost no experience of criminal procedure or constitutional law. The Approach Paper resulted in the drafting of a Right to Privacy Bill, 2011 ("DOPT Bill") which, although it has suffered several leaks, has neither been published for public feedback nor sent to the Cabinet for political clearance prior to introduction in Parliament.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Approach Paper and DOPT Bill&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The first article in this two-part series broadly examined the many legal facets of privacy. Notions of privacy have long informed law in common law countries and have been statutorily codified to protect bodily privacy, territorial or spatial privacy, locational privacy, and so on. These fields continue to evolve and advance; for instance, the legal imperative to protect intimate body privacy from violation has now expanded to include biometric information, and the protection given to the content of personal communications that developed over the course of the twentieth century is now expanding to encompass metadata and other ‘information about information’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Approach Paper suffers from several serious flaws, the largest of which is its conflation of commercial data protection and privacy. It ignores the diversity of privacy law and jurisprudence in the common law, instead concerning itself wholly with commercial data protection. This creates a false equivalency, albeit not one that cannot be rectified by re-naming the endeavour to describe commercial data protection only.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there are other errors. The paper claims that no right of action exists for privacy breaches between citizens inter se. This is false, the civil wrongs of nuisance, interference with enjoyment, invasion of privacy, and other similar torts and actionable claims operate to redress privacy violations. In fact, in the case of Ratan Tata v. Union of India that is currently being heard by the Supreme Court of India, at least two parties are arguing that privacy is already adequately protected by civil law. Further, the criminal offences of nuisance and defamation, amongst others, and the recently introduced crimes of stalking and voyeurism, all create rights of action for privacy violations. These measures are incomplete, – this is not contested, the premise of these articles is the need for better privacy protection law – but denying their existence is not useful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The shortcomings of the Approach Paper are reflected in the draft legislation it resulted in. A major concern with the DOPT Bill is its amateur treatment of surveillance and interception of communications. This is inevitable for the Approach Paper does not consider this area at all although there is sustained and critical global and national attention to the issues that attend surveillance and communications privacy. For an effort to propose privacy law, this lapse is quite astonishing. The Approach Paper does not even examine if Parliament is competent to regulate surveillance, although the DOPT Bill wades into this contested turf.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Constitutionality of Interceptions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a federal country, laws are weighed by the competence of their legislatures and struck down for overstepping their bounds. In India, the powers to legislate arise from entries that are contained in three lists in Schedule VII of the Constitution. The power to legislate in respect of intercepting communications traditionally emanates from Entry 31 of the Union List, which vests the Union – that is, Parliament and the Central Government – with the power to regulate “Posts and telegraphs; telephones, wireless, broadcasting and other like forms of communication” to the exclusion of the States. Hence, the Indian Telegraph Act, 1885, and the Indian Post Office Act, 1898, both Union laws, contain interception provisions. However, after holding the field for more than a century, the Supreme Court overturned this scheme in Bharat Shah’s case in 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The case challenged the telephone interception provisions of the Maharashtra Control of Organised Crime Act, 1999 ("MCOCA"), a State law that appeared to transgress into legislative territory reserved for the Union. The Supreme Court held that Maharashtra’s interception provisions were valid and arose from powers granted to the States – that is, State Assemblies and State Governments – by Entries 1 and 2 of the State List, which deal with “public order” and “police” respectively. This cleared the way for several States to frame their own communications interception regimes in addition to Parliament’s existing laws. The question of what happens when the two regimes clash has not been answered yet. India’s federal scheme anticipates competing inconsistencies between Union and State laws, but only when these laws derive from the Concurrent List which shares legislative power. In such an event, the ‘doctrine of repugnancy’ privileges the Union law and strikes down the State law to the extent of the inconsistency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In competitions between Union and State laws that do not arise from the Concurrent List but instead from the mutually exclusive Union and State Lists, the ‘doctrine of pith and substance’ tests the core substance of the law and traces it to one the two Lists. Hence, in a conflict, a Union law the substance of which was traceable to an entry in the State List would be struck down, and vice versa.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the doctrine permits incidental interferences that are not substantive. For example, as in a landmark 1946 case, a State law validly regulating moneylenders may incidentally deal with promissory notes, a Union field, since the interference is not substantive. Since surveillance is a police activity, and since “police” is a State subject, care must be taken by a Union surveillance law to remain on the pale of constitutionality by only incidentally affecting police procedure. Conversely, State surveillance laws were required to stay clear of the Union’s exclusive interception power until Bharat Shah’s case dissolved this distinction without answering the many questions it threw up.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the creation of the Republic, India’s federal scheme was premised on the notion that the Union and State Lists were exclusive of each other. Conceptually, the Union and the States could not have competing laws on the same subject. But Bharat Shah did just that; it located the interception power in both the Lists and did not enunciate a new doctrine to resolve their (inevitable) future conflict. This both disturbs Indian constitutional law and goes to the heart of surveillance and privacy law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Three Principles of Interception&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Apart from the important questions regarding legislative competence and constitutionality, the DOPT Bill proposed weak, ill-informed, and poorly drafted provisions to regulate surveillance and interceptions. It serves no purpose to further scrutinise the 2011 DOPT Bill. Instead, at this point, it may be constructive to set out the broad contours of a good interceptions regulation regime. Some clarity on the concepts: intercepting communications means capturing the content and metadata of oral and written communications, including letters, couriers, telephone calls, facsimiles, SMSs, internet telephony, wireless broadcasts, emails, and so on. It does not include activities such visual capturing of images, location tracking or physical surveillance; these are separate aspects of surveillance, of which interception of communications is a part.&lt;br /&gt; &lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Firstly&lt;/span&gt;, all interceptions of communications must be properly sanctioned. In India, under Rule 419A of the Indian Telegraph Rules, 1951, the Home Secretary – an unelected career bureaucrat, or a junior officer deputised by the Home Secretary – with even lesser accountability, authorises interceptions. In certain circumstances, even senior police officers can authorise interceptions. Copies of the interception orders are supposed to be sent to a Review Committee, consisting of three more unelected bureaucrats, for bi-monthly review. No public information exists, despite exhaustive searching, regarding the authorisers and numbers of interception orders and the appropriateness of the interceptions.&lt;br /&gt; &lt;br /&gt;The Indian system derives from outdated United Kingdom law that also enables executive authorities to order interceptions. But, the UK has constantly revisited and revised its interception regime; its present avatar is governed by the Regulation of Investigatory Powers Act, 2000 ("RIPA") which creates a significant oversight mechanism headed by an independent commissioner, who monitors interceptions and whose reports are tabled in Parliament, and quasi-judicially scrutinised by a tribunal comprised of judges and senior independent lawyers, which hears public complaints, cancels interceptions, and awards monetary compensation. Put together, even though the current UK interceptions system is executively sanctioned, it is balanced by independent and transparent quasi-judicial authorities.&lt;br /&gt; &lt;br /&gt;In the United States, all interceptions are judicially sanctioned because American constitutional philosophy – the separation of powers doctrine – requires state action to be checked and balanced. Hence, ordinary interceptions of criminals’ communications as also extraordinary interceptions of perceived national security threats are authorised only by judges, who are ex hypothesi independent, although, as the PRISM affairs teaches us, independence can be subverted. In comparison, India’s interception regime is incompatible with its democracy and must be overhauled to establish independent and transparent authorities to properly sanction interceptions.&lt;br /&gt; &lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Secondly&lt;/span&gt;, no interceptions should be sanctioned but upon ‘probable cause’. Simply described, probable cause is the standard that convinces a reasonable person of the existence of criminality necessary to warrant interception. Probable case is an American doctrine that flows from the US Constitution’s Fourth Amendment that protects the rights of people to be secure in places in which they have a reasonable expectation of privacy. There is no equivalent standard in UK law, except perhaps the common law test of reasonability that attaches to all government action that abridges individual freedoms. If a coherent ‘reasonable suspicion’ test could be coalesced from the common law, I think it would fall short of the strictness that the probable cause doctrine imposes on the executive. Therefore, the probable cause requirement is stronger than ordinary constraint of reasonability but weaker than the standard of reasonable doubt beyond which courts may convict. In this spectrum of acceptable standards, India’s current law in section 5(2) of the Indian Telegraph Act, 1885 is the weakest for it permits interceptions merely “on the occurrence of any public emergency or in the interest of public safety”, which determination is left to the “satisfaction” of a bureaucrat. And, under Rule 419A(2) of the Telegraph Rules, the only imposition on the bureaucrat when exercising this satisfaction is that the order “contain reasons” for the interception.&lt;br /&gt; &lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Thirdly&lt;/span&gt;, all interceptions should be warranted. This point refers not to the necessity or otherwise of the interception, but to the framework within which it should be conducted. Warrants should clearly specify the name and clear identity of the person whose communications are sought to be intercepted. The target person’s identity should be linked to the specific means of communication upon which the suspected criminal conversations take place. Therefore, if the warrant lists one person’s name but another person’s telephone number – which, because of the general ineptness of many police forces, is not uncommon – the warrant should be rejected and the interception cancelled. And, by extension, the specific telephone number, or email account, should be specified. A warrant against a person called Rahul Kumar, for instance, cannot be executed against all Rahul Kumars in the vicinity, nor also against all the telephones that the one specific Rahul Kumar uses, but only against the one specific telephone number that is used by the one specific Rahul Kumar. Warrants should also specify the duration of the interception, the officer responsible for its conduct and thereby liable for its abuse, and other safeguards. Some of these concerns were addressed in 2007 when the Telegraph Rules were amended, but not all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A law that fails to substantially meet the standards of these principles is liable, perhaps in the not too distant future, to be read down or struck down by India’s higher judiciary. But, besides the threat of judicial review, a democratic polity must protect the freedoms and diversity of its citizens by holding itself to the highest standards of the rule of law, where the law is just.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy'&gt;https://cis-india.org/internet-governance/blog/the-hoot-may-20-2014-bhairav-acharya-legislating-for-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-05-28T09:59:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1">
    <title>Privacy Law in India: A Muddled Field - I</title>
    <link>https://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1</link>
    <description>
        &lt;b&gt;The absence of a statute expressing the legislative will of a democracy to forge a common understanding of privacy is a matter of concern,  says BHAIRAV ACHARYA in the first of a two part series. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.thehoot.org/web/freetracker/storynew.php?storyid=565&amp;amp;sectionId=10"&gt;published in the Hoot on April 15, 2014&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Privacy evades definition and for this reason sits uneasily with law. The multiplicity of everyday privacy claims and transgressions by ordinary people, and the diversity of situations in which these occur, confuse any attempt to create a common meaning of privacy to inform law. Instead, privacy is negotiated contextually, and the circumstances that permit a privacy claim in one situation might form the basis for its transgression in another.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is easy to understand privacy when it is claimed in relation to the body; it is beyond argument that every person has a right to privacy in relation to their bodies, especially intimate areas. It is also accepted that homes and private property secure to their owners a high degree of territorial privacy. But what of privacy from intrusive stares, or even from camera surveillance, when in a public place? Or of biometric privacy to protect against surreptitious fingerprint capturing or DNA collection from the things we touch and the places we visit every day? Or the privacy of a conversation in a restaurant from other patrons? Clearly, there are multiple meanings of privacy that are negotiated by individuals all the time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Law has, where social custom has demanded, clothed some aspects of human activity with an expectation of privacy. In relation to bodily privacy, this is achieved by both ordinary common law without reference to privacy at all, such as the offences of battery and rape; and, by special criminal law that is premised on an expectation of privacy, such as the discredited offences regarding women’s modesty in sections 354 and 509 of the Indian Penal Code, 1860 (IPC), and the new offences of voyeurism and stalking contained in sections 354C and 354D of the IPC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law also privileges communications that are made through telephones, letters, and emails by regulating the manner of their interception in special circumstances. Conditional interception provisions with procedural safeguards – which, for several reasons, are flawed and ineffective – exist to protect the privacy of such communications in section 5(2) of the Indian Telegraph Act, 1885, section 26 of the Indian Post Office Act, 1898, and section 69 of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Territorial privacy, which is afforded by possession of private property, is ordinarily protected by the broad offence of trespass – in India, these are the offences of criminal trespass, house trespass, and lurking house-trespass contained in sections 441 to 443 of the IPC – and house-breaking, which is akin to the offence of breaking and entering in other jurisdictions, in section 445 of the IPC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some measure of protection is provided to biometric information, such as fingerprints and DNA, by limiting their lawful collection by the state: sections 53, 53A, and 54 of the Code of Criminal Procedure, 1973 permit collections of biometric information from arrestees in certain circumstances; this is in addition to a colonial-era collection regime created by the Identification of Prisoners Act, 1920. However, nothing expressly prohibits the police or anybody else from non-consensually developing DNA profiles from human material that is routinely left behind by our bodies, for instance, saliva on restaurant cutlery or hair at the barbershop.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Physical surveillance, by which a person is visually monitored to invade locational privacy, is also inadequately regulated. Besides man-on-woman stalking, which was criminalised only one year ago, no effective measures exist to otherwise protect locational privacy. Indian courts regularly employ their injunctive power but have been loath to issue equitable remedies such as restraining orders to secure privacy. Police surveillance, which is usually covert, is an executive function that is practised with wide latitude under every state police statute and government-issued rules and regulations thereunder with little or no oversight. The risk of misuse of these powers is compounded by the increasingly widespread use of surveillance cameras sans regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other technologies too compromise privacy: GPS-enabled mobile phones offer precise locational information, presumably consensually; cell-tower tracking, almost always non-consensually, is ordered by Indian police without any procedurally built-in safeguards; radio frequency identification to locate vehicles is sought to be made mandatory; and, satellite-based surveillance is available to intelligence agencies, none of which are registered or regulated unlike in other liberal democracies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;No uniform privacy standard in law&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;None of these laws applies a uniform privacy standard nor are they measured against a commonly understood meaning of privacy. The lack of a statutory definition is not the issue; the lack of a statute that expresses the legislative will of a democracy to forge a common understanding of privacy to inform all kinds of human activity is the concern. Ironically, the impetus to draft a privacy law has come from abroad. Foreign senders of personal information – credit card data, home addresses, phone numbers, and the like – to India’s information technology and outsourcing industry demand institutionalised protection for their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pressure from the European Union, which has the world’s strongest information privacy standards and with which India is currently negotiating a free trade agreement, to enact a data protection regime to address privacy has not gone unanswered. The Indian government – specifically, the Department of Personnel and Training, the same department that administers the Right to Information Act, 2005 – is currently drafting a privacy law to govern data protection and surveillance. At stake is the continued growth of India’s information technology and outsourcing sectors that receive significant amounts of European personal data for processing, which drives national exports and gross domestic product.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;An inferred right&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For its part, the Supreme Court has examined more than a few privacy claims to find, intermittently and unconvincingly, that there is a constitutional right to privacy, but the contours of this right remain vague. In 1962, the Supreme Court rejected the existence of a privacy right in Kharak Singh’s case which dealt with intrusive physical surveillance by the police.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court was not unanimous; the majority of judges expressly rejected the notion of locational privacy while declaring that privacy was not a constituent of personal liberty, a lone dissenting judge found the opposite to be true and, furthermore, held that surveillance had a chilling effect on freedom. In 1975, in the Gobind case that presented substantially similar facts, the Supreme Court leaned towards, but held short of, recognising a right to privacy. It did find that privacy flowed from personal autonomy, which bears the influence of American jurisprudence, but subjected it to the interests of government; the latter prevailed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in the PUCL case of 1997 that challenged inadequately regulated wiretaps, the Supreme Court declared that phone conversations were protected by a fundamental right to privacy that flowed from Article 21 of the Indian Constitution. To intrude upon this right, the court said, a law was necessary that is just, fair, and reasonable. If this principle were to be extended beyond communications privacy to, say, identity cards, the Aadhar project, which is being implemented without the sanction of an Act of Parliament, would be judicially stopped.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what does “law” mean? Is it only the law of our Constitution and courts? What of the law that governed Indian societies before European colonisation brought the word ‘privacy’ to our legal system? Classical Hindu law – distinct from colonial and post-independence Hindu law – also recognises and enforces expectations of privacy in different contexts. It recognised the sanctity of the home and family, the autonomy of the community, and prescribed penalties for those who breached these norms. So, too, does Islamic law: all schools of Islamic jurisprudence – ‘fiqh’ – recognise privacy as an enforceable right.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Different words and concepts are used to secure this right, and these words have meanings and connotations of their own. But, the hermeneutics of privacy notwithstanding, this belies the common view that privacy is not an Indian value. Privacy may or may not be a cultural norm, but it has existed in India and South Asia in different forms for millennia.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Bhairav Acharya is a constitutional lawyer practising in the Supreme Court of India. He advises the Centre for Internet &amp;amp; Society, Bangalore, on privacy law and other constitutional issues.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1'&gt;https://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-05-05T06:17:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments">
    <title>Open Call for Comments: The Privacy Protection Bill 2013 drafted by the Centre for Internet and Society</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is announcing an Open Call for Comments to the CIS Privacy Protection Bill 2013.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In early 2013 the Centre for Internet and Society drafted the Privacy (Protection) Bill 2013 as a citizen’s version of privacy legislation for India. The Privacy (Protection) Bill, 2013 seeks to protect privacy by regulating (i) the manner in which personal data is collected, processed, stored, transferred and destroyed — both by private persons for commercial gain and by the state for the purpose of governance; (ii) the conditions upon which, and procedure for, interceptions of communications — both voice and data communications, including both data-in-motion and data-at-rest — may be conducted and the authorities permitted to exercise those powers; and, (iii) the manner in which forms of surveillance not amounting to interceptions of communications — including the collection of intelligence from humans, signals, geospatial sources, measurements and signatures, and financial sources — may be conducted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been collecting comments to the Privacy Protection Bill since April 2013 with the intention of submitting the Bill to the Department of Personnel and Training as a citizen’s version of a privacy legislation for India.  If you would like to submit comments on the Privacy Protection Bill to be included as part of the Centre for Internet and Society’s submission to the Department of Personnel and Training, please email comments to &lt;a href="mailto:bhairav@cis-india.org"&gt;bhairav@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf" class="internal-link"&gt;Download the latest version of the Privacy Protection Bill&lt;/a&gt;&lt;/b&gt; (February 2014)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments'&gt;https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-25T05:38:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/concerns-regarding-dna-law">
    <title>Concerns Regarding DNA Law</title>
    <link>https://cis-india.org/internet-governance/blog/concerns-regarding-dna-law</link>
    <description>
        &lt;b&gt;Recently, a long government process to draft a law to permit the collection, processing, profiling, use and storage of human DNA is nearing conclusion. There are several concerns with this government effort. Below, we present broad-level issues to be kept in mind while dealing with DNA law.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Background&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Department of Biotechnology released, in 29 April 2012, a     working draft of a proposed Human DNA Profiling Bill, 2012 ("DBT     Bill") for public comments. The draft reveals an effort to (i)     permit the collection of human blood, tissue and other samples for     the purpose of creating DNA profiles, (ii) license private     laboratories that create and store the profiles, (iii) store the DNA     samples and profiles in various large databanks in a number of     indices, and (iv) permit the use of the completed DNA profiles in     scientific research and law enforcement. The regulation of human DNA     profiling is of significant importance to the efficacy of law     enforcement and the criminal justice system and correspondingly has     a deep impact on the freedoms of ordinary citizens from profiling     and monitoring. Below, we highlight five important concerns to bear     in mind before drafting and implementing DNA legislation.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Primary Issues&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Purpose of DNA Profiling&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;DNA  profiling  serves  two broad  purposes – (i) forensic – to     establish  unique  identity  of a person in the criminal justice system; and, (ii) research – to     understand human genetics and its contribution  to  anthropology, biology  and  other  sciences.      These  two  purposes have  very different approaches  to DNA  profiling and  the  issues and      concerns attendant on them vary accordingly. Forensic DNA profiling is undertaken to afford either     party in a criminal trial a better  possibility  of  adducing corroborative evidence to      prosecute,  or to  defend, an alleged offence. DNA, like fingerprints, is a biometric estimation of the     individuality of a person. By itself, in the same manner that fingerprint evidence is only proof     of the presence of a person at a particular place and not proof of the commission of a crime, DNA     is merely corroborative evidence  and cannot,  on its  own  strength,  result  in a     conviction  or  acquittal  of  an  offence. Therefore, DNA  and fingerprints,  and the  process  by which they      are  collected and  used as evidence, should be broadly similar. &lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;h3&gt;Procedural Integrity&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Forensic DNA profiling results from biological source material     that is usually collected from crime scenes or forcibly from offenders and convicts. Biological     source material found at a crime scene is very rarely non-contaminated and the procedure by     which it is collected and its integrity ensured is of primary legislative importance. To avoid the     danger of contaminated crime scene evidence being introduced in the criminal justice system     to pervert the course of justice, it is crucial to ensure that DNA is collected only from     intact human cells and not from compromised genetic material. Therefore, if the biological source     material found at a crime scene  does  not  contain  at  least  one  intact  human  cell,      the  whole  of  the biological  source material should be destroyed to prevent the possibility of     compromised genetic material being collected to  yield  inconclusive results.  Adherence  to  this      basic  principle  will  obviate  the possibility  of  partial      matches  of  DNA  profiles  and  the  resulting  controversy  and      confusion that ensues.&lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;h3&gt;Conditions of Collection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, the taking of fingerprints is chiefly governed by the     Identification of Prisoners Act, 1920 ("Prisoners Act") and section 73 of the Indian Evidence Act,     1872 ("Evidence Act"). The Prisoners Act permits  the forcible taking of  fingerprints from     convicts and  suspects in certain  conditions.  The Evidence  Act,  in  addition,  permits      courts  to  require  the  taking  of fingerprints  for  the  forensic  purpose  of  establishing  unique      identity  in  a  criminal  trial. No &lt;br /&gt; provisions exist for consensual taking of fingerprints, presumably     because of the danger of self-incrimination and general privacy concerns. Since, as discussed     earlier, fingerprints and DNA are  biometric  measurements  that  should  be treated  equally     to the  extent possible, the conditions for the collection of DNA should be similar to those for     the taking of fingerprints.Accordingly,  there  should  be  no  legal  provisions  that      enable  other  kinds  of  collection, including from volunteers and innocent people.&lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Retention of DNA&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As  a  general  rule applicable  in  India,  the  retention  of      biometric  measurements  must  be supported  by  a  clear  purpose  that  is  legitimate, judicially      sanctioned  and  transparent. The Prisoners Act, which permits the forcible taking of fingerprints     from convicts, also mandates the destruction of these fingerprints when the person is acquitted     or discharged. The indefinite collection  of  biometric  measurements  of people  is  dangerous,      susceptible  to  abuse  and invasive of civil rights. Therefore, once lawfully collected from     crime scenes and offenders, their DNA profiles must  be  retained  in  strictly  controlled      databases with  highly  restricted access for the forensic purpose of law enforcement only. DNA should     not be held in databases that allow non-forensic use. Further, the indices within these     databases should be watertight and exclusive of each other.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;DNA Laboratories&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The process by which DNA profiles are created from biological     source material is of critical importance. Because of the evidentiary value of DNA profiles, the     laboratories in which these profiles  are  created  must  be  properly  licensed,     professionally  managed  and manned  by competent  and  impartial  personnel.  Therefore,  the  process  by      which  DNA laboratories  are licensed and permitted to operate is significant.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/concerns-regarding-dna-law'&gt;https://cis-india.org/internet-governance/blog/concerns-regarding-dna-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>DNA Profiling</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-29T10:09:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/re-the-human-dna-profiling-bill-2012">
    <title>Re: The Human DNA Profiling Bill, 2012</title>
    <link>https://cis-india.org/internet-governance/blog/re-the-human-dna-profiling-bill-2012</link>
    <description>
        &lt;b&gt;This short note speaks to legal issues arising from the proposed Human DNA Profiling Bill, 2012 ("DBT Bill") that was circulated drafted under the aegis of the Department of Biotechnology of the Ministry of Science and Technology, Government of India, which seeks to collect human DNA samples, profile them and store them. These comments are made clause-by-clause against the DBT Bill. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;Clause-by-clause comments on the Working Draft version of April 29, 2012 from the Centre for Internet and Society&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;This short note speaks to legal issues arising from the proposed Human DNA Profiling Bill, 2012 (&lt;b&gt;"DBT Bill"&lt;/b&gt;) that was circulated within the Experts Committee constituted under the aegis of the Department of Biotechnology of the Ministry of Science and Technology, Government of India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;This note must be read against the relevant provisions of the DBT Bill and, where indicated, together with the proposed Forensic DNA Profiling (Regulation) Bill, 2013 that was drafted by the Centre for Internet &amp;amp; Society, Bangalore (&lt;b&gt;"CIS Bill"&lt;/b&gt;). These comments must also be read alongside the two-page submission titled “A Brief Note on the Forensic DNA Profiling (Regulation) Bill, 2013” (&lt;b&gt;"CIS Note"&lt;/b&gt;). Whereas the aforesaid CIS Note raised issues that informed the drafting of the CIS Bill, this present note seeks to provide legal comments on the DBT Bill.&lt;b&gt;&lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;Preamble&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The DBT Bill, in its current working form, lacks a preamble. No doubt, a preamble will be added later once the text of the DBT Bill is finalised. Instead, the DBT Bill contains an introduction. It must be borne in mind that the purpose of the legislation should be spelt out in the preamble since preambular clauses have interpretative value. [See, &lt;i&gt;A. Thangal Kunju Musaliar&lt;/i&gt; AIR 1956 SC 246; &lt;i&gt;Burrakur Coal Co. Ltd.&lt;/i&gt; AIR 1961 SC 954; and &lt;i&gt;Arnit Das&lt;/i&gt; (2000) 5 SCC 488]. Hence, a preamble that states the intent of Parliament to create permissible conditions for DNA source material collection, profiling, retention and forensic use in criminal trials is necessary.&lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Objects Clause&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;An ‘objects clause,’ detailing the intention of the legislature and containing principles to inform the application of a statute, in the main body of the statute is an enforceable mechanism to give directions to a statute and can be a formidable primary aid in statutory interpretation. [See, for example, section 83 of the Patents Act, 1970 that directly informed the Order of the Controller of Patents, Mumbai, in the matter of NATCO Pharma and Bayer Corporation in Compulsory Licence Application No. 1 of 2011.] Therefore, the DBT Bill should incorporate an objects clause that makes clear that (i) the principles of notice, confidentiality, collection limitation, personal autonomy, purpose limitation and data minimisation must be adhered to at all times; (ii) DNA profiles merely estimate the identity of persons, they do not conclusively establish unique identity; (iii) all individuals have a right to privacy that must be continuously weighed against efforts to collect and retain DNA; (iv) centralised databases are inherently dangerous because of the volume of information that is at risk; (v) forensic DNA profiling is intended to have probative value; therefore, if there is any doubt regarding a DNA profile, it should not be received in evidence by a court; (vi) once adduced, the evidence created by a DNA profile is only corroborative and must be treated on par with other biometric evidence such as fingerprint measurements. &lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Definitions&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The definition of “analytical procedure” in clause 2(1)(a) of the DBT Bill is practically redundant and should be removed. It is used only twice – in clauses 24 and 66(2)(p) which give the DNA Profiling Board the power to frame procedural regulations. In the absence of specifying the content of any analytical procedure, the definition serves no purpose.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The definition of “audit” in clause 2(1)(b) is relevant for measuring the training programmes and laboratory conditions specified in clauses 12(f) and 27. However, the term “audit” is subsequently used in an entirely different manner in Chapter IX which relates to financial information and transparency. This is a conflicting definition. The term “audit” has a well-established use for financial information that does not require a definition. Hence, this definition should be removed.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The definition of “calibration” in clause 2(1)(d) is redundant and should be removed since the term is not meaningfully used in the DBT Bill.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The definition of “DNA Data Bank” in clause 2(1)(h) is unnecessary. The DBT Bill seeks to establish a National DNA Data Bank, State DNA Data Banks and Regional DNA Data Banks &lt;i&gt;vide&lt;/i&gt; clause 32. These national, state and regional databases must be defined individually with reference to their establishment clauses. Defining a “DNA Data Bank”, exclusive of the national, state and regional databases, creates the assumption that any private individual can start and maintain a database. This is a drafting error.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The definition of “DNA Data Bank Manager” in clause 2(1)(i) is misleading since, in the text of the DBT Bill, it is only used in relation to the proposed National DNA Data Bank and never in relation to the State and Regional Data Banks. If it is the intention of DBT Bill that only the national database should have a manager, the definition should be renamed to ‘National DNA Data Bank Manager’ and the clause should specifically identify the National DNA Data Bank. This is a drafting error.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The definition of “DNA laboratory” in clause 2(1)(j) should refer to the specific clauses that empower the Central Government and State Governments to license and recognise DNA laboratories. This is a drafting error.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The definition of “DNA profile” in clause 2(1)(l) is too vague. Merely the results of an analysis of a DNA sample may not be sufficient to create an actual DNA profile. Further, the results of the analysis may yield DNA information that, because of incompleteness or lack of information, is inconclusive. These incomplete bits of information should not be recognised as DNA profiles. This definition should be amended to clearly specify the contents of a complete and valid DNA profile that contains, at least, numerical representations of 17 or more loci of short tandem repeats that are sufficient to estimate biometric individuality of a person.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The definition of “forensic material” in clause 2(1)(o) needs to be amended to remove the references to intimate and non-intimate body samples. If the references are retained, then evidence collected from a crime scene, where an intimate or non-intimate collection procedure was obviously not followed, will not fall within the scope of “forensic material”.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The terms “intimate body sample” and “non-intimate body sample” that are defined in clauses 2(1)(q) and 2(1)(v) respectively are not used anywhere outside the definitions clause except for an inconsequential reference to non-intimate body samples only in the rule-making provision of clause 66(2)(zg). “Intimate body sample” is not used anywhere outside the definitions clause. Both these definitions are redundant and should be removed.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The terms “intimate forensic procedure” and “non-intimate forensic procedure”, that are defined in clauses 2(1)(r) and 2(1)(w) respectively, are not used anywhere except for an inconsequential reference of non-intimate forensic procedure in the rule-making provision of clause 66(2)(zg). “Intimate forensic procedure” is not used anywhere outside the definitions clause. Both these definitions are redundant and should be removed.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The term “known samples” that is defined in clause 2(1)(s) is not used anywhere outside the definitions clause and should be removed for redundancy.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The definition of “offender” in clause 2(1)(y) if vague because it does not specify the offences for which an “offender” need be convicted. It is also linked to an unclear definition of the term “undertrial”, which does not specify the nature of pending criminal proceedings and, therefore, could be used to describe simple offences such as, for example, failure to pay an electricity bill, which also attracts criminal penalties.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The term “proficiency testing” that is defined in clause 2(1)(zb) is not used anywhere in the text of the DBT Bill and should be removed.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The definitions of “quality assurance”, “quality manual” and “quality system” serve no enforceable purpose since they are used only in relation to the DNA Profiling Board’s rule-making powers under clauses 18 and 66. Their inclusion in the definitions clause is redundant. Accordingly, these definitions should be removed.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The term “suspect” defined in clause 2(1)(zi) is vague and imprecise. The standard by which suspicion is to be measured, and by whom suspicion may be entertained – whether police or others, has not been specified. The term “suspect” is not defined in either the Code of Criminal Procedure, 1973 (&lt;b&gt;"CrPC"&lt;/b&gt;) or the Indian Penal Code, 1860 (&lt;b&gt;"IPC"&lt;/b&gt;).&lt;b&gt;&lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;The&lt;/span&gt;&lt;/b&gt;&lt;span style="text-decoration: underline;"&gt; &lt;b&gt;DNA Profiling Board&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Clause 3 of the DBT Bill, which provides for the establishment of the DNA Profiling Board, contains a sub-clause (2) which vests the Board with corporate identity. This vesting of legal personality in the DNA Profiling Board – when other boards and authorities, even ministries and independent departments, and even the armed forces do not enjoy this function – is ill-advised and made without sufficient thought. Bodies corporate may be corporations sole – such the President of India, or corporations aggregate – such as companies. The intent of corporate identity is to create a fictional legal personality where none previously existed in order for the fictional legal personality to exist apart from its members, enjoy perpetual succession and to sue in its own legal name. Article 300 of the Constitution of India vests the Central Government with legal personality in the legal name of the Union of India and the State Governments with legal personality in the legal names of their respective states. Apart from this constitutional dispensation, some regulatory authorities, such as the Telecom Regulatory Authority of India (&lt;b&gt;"TRAI"&lt;/b&gt;) and the Securities and Exchange Board of India (&lt;b&gt;"SEBI"&lt;/b&gt;) have been individually vested with legal personalities as bodies corporate to enable their autonomous governance and independent functioning to secure their ability to free, fairly and impartially regulate the market free from governmental or private collusion. Similarly, some overarching national commissions, such as the Election Commission of India and the National Human Rights Commission (&lt;b&gt;"NHRC"&lt;/b&gt;) have been vested with the power to sue and be sued in their own names. In comparison, the DNA Profiling Board is neither an independent market regulator nor an overarching national commission with judicial powers. There is no legal reason for it to be vested with a legal personality on par with the Central Government or a company. Therefore, clause 3(2) should be removed.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The size and composition of the Board that is staffed under clause 4 is extremely large. Creating unwieldy and top-heavy bureaucratic authorities and investing them with regulatory powers, including the powers of licensing, is avoidable. The DBT Bill proposes to create a Board of 16 members, most of them from a scientific background and including a few policemen and one legal administrator. In its present form, the Board is larger than many High Courts but does not have a single legal member able to conduct licensing. Drawing from the experiences of other administrative and regulatory bodies in India, the size of the Board should be drastically reduced to no more than five members, at least half of whom should be lawyers or ex-judges. The change in the legal composition of the Board is necessary because the DBT Bill contemplates that it will perform the legal function of licensing that must obey basic tenets of administrative law. The current membership may be viable only if the Board is divested of its administrative and regulatory powers and left with only scientific advice functions. Moreover, stacking the Board with scientists and policemen appears to ignore the perils that DNA collection and retention pose to the privacy of ordinary citizens and their criminal law rights. The Board should have adequate representation from the human rights community – both institutional (e.g NHRC and the State Human Rights Commissions) and non-institutional (well-regarded and experienced human rights activists). The Board should also have privacy advocates.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Clauses 5(2) and 5(3) establish an unequal hierarchy within the Board by privileging some members with longer terms than others. There is no good reason for why the Vice-Chancellor of a National Law University, the Director General of Police of a State, the Director of a Central Forensic Science Laboratory and the Director of a State Forensic Science Laboratory should serve membership terms on the Board that are longer than those of molecular biologists, population geneticists and other scientists. Such artificial hierarchies should be removed at the outset. The Board should have one pre-eminent chairperson and other equal members with equal terms.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Chairperson of the Board, who is first mentioned in clause 5(1), has not been duly and properly appointed. Clause 4 should be modified to mention the appointment of the Chairperson and other Members.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Clause 7 deals with the issue of conflict of interest in narrow cases. The clause requires members to react on a case-by-case basis to the business of the Board by recusing themselves from deliberations and voting where necessary. Instead, it may be more appropriate to require members to make a full and public disclosures of their real and potential conflicts of interest, and then granting the Chairperson the power to prevent such members from voting on interested matters. Failure to follow these anti-collusion and anti-corruption safeguards should attract criminal penalties.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Clause 10 anticipates the appointment of a Chief Executive Officer of the Board who shall be a serving Joint Secretary to the Central Government. Clause 10(3) further requires this officer to be scientist. This may not be possible because the administrative hierarchy of the Central Government may not contain a genetic scientist.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The functions of the Board specified in clause 12 are overbroad. Advising ministries, facilitating governments, recommending the size of funds and so on – these are administrative and governance functions best left to the executive. Once the Board is modified to have sufficient legal and human rights representation, then the functions of the Board can non-controversially include licensing, developing standards and norms, safeguarding privacy and other rights, ensuring public transparency, promoting information and debate and a few other limited functions necessary for a regulatory authority.&lt;b&gt;&lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;DNA Laboratories&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The provisions of Chapters V and VI may be simplified and merged.&lt;b&gt;&lt;br /&gt;&lt;span style="text-decoration: underline;"&gt;DNA Data Banks&lt;/span&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The creation of multiple indices in clause 32(4) cannot be justified and must be removed. The collection of biological source material is an invasion of privacy that must be conducted only in strict conditions when the potential harm to individuals is outweighed by the public good. This balance may only be struck when dealing with the collection and profiling of samples from certain categories of offenders. The implications of collecting and profiling DNA samples from corpses, suspects, missing persons and others are vast and have either not been properly understood or deliberately ignored. At this moment, the forcible collection of biological source material should be restricted to the categories of offenders mentioned in the Identification of Prisoners Act, 1920 (&lt;b&gt;"Prisoners Act"&lt;/b&gt;) with a suitable addition for persons arrested in connection with certain specified terrorism-related offences. Therefore, databases should contain only an offenders’ index and a crime scene index.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Clause 32(6), which requires the names of individuals to be connected to their profiles, and hence accessible to persons connected with the database, should be removed. DNA profiles, once developed, should be anonymised and retained separate from the names of their owners.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Clause 36, which allows international disclosures of DNA profiles of Indians, should be removed immediately. Whereas an Indian may have legal remedies against the National DNA Data Bank, he/she certainly will not be able to enforce any rights against a foreign government or entity. This provision will be misused to rendition DNA profiles abroad for activities not permitted in India. Similarly, as in data protection regimes around the world, DNA profiles should remain within jurisdictions with high privacy and other legal standards.&lt;b&gt;&lt;br /&gt;Use&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The only legitimate purpose for which DNA profiles may be used is for establishing the identity of individuals in criminal trials and confirming their presence or absence from a certain location. Accordingly, clauses 39 and 40 should be re-drafted to specify this sole forensic purpose and also specify the manner in which DNA profiles may be received in evidence. For more information on this point, see the relevant provisions of the CIS Note and the CIS Bill.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The disclosure of DNA profiles should only take place to a law enforcement agency conducting a valid investigation into certain offences and to courts currently trying the individuals to whom the DNA profiles pertains. All other disclosures of DNA profiles should be made illegal. Non-consensual disclosure of DNA profiles for the study of population genetics is specifically illegal. The DBT Bill does not prescribe stringent criminal penalties and other mechanisms to affix individual liability on individual scientists and research institutions for improper use of DNA profiles; it is therefore open to the criticism that it seeks to sacrifice individual rights of persons, including the fundamental right to privacy, without parallel remedies and penalties. Clause 40 should be removed in entirety.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Clause 43 should be removed in entirety. This note does not contemplate the retention of DNA profiles of suspects and victims, except as derived from a crime scene.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Clause 45 sets out a post-conviction right related to criminal procedure and evidence. This would fundamentally alter the nature of India’s criminal justice system, which currently does not contain specific provisions for post-conviction testing rights. However, courts may re-try cases in certain narrow cases when fresh evidence is brought forth that has a nexus to the evidence upon which the person was convicted and if it can be proved that the fresh evidence was not earlier adduced due to bias. Any other fresh evidence that may be uncovered cannot prompt a new trial. Clause 45 is implicated by Article 20(2) of the Constitution of India and by section 300 of the CrPC. The principle of &lt;i&gt;autrefois acquit&lt;/i&gt; that informs section 300 of the CrPC specifically deals with exceptions to the rule against double jeopardy that permit re-trials. [See, for instance, &lt;i&gt;Sangeeta Mahendrabhai Patel&lt;/i&gt; (2012) 7 SCC 721].&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/re-the-human-dna-profiling-bill-2012'&gt;https://cis-india.org/internet-governance/blog/re-the-human-dna-profiling-bill-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>DNA Profiling</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-29T10:00:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra">
    <title>An Analysis of the Cases Filed under Section 46 of the Information Technology Act, 2000  for Adjudication in the State of Maharashtra</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra</link>
    <description>
        &lt;b&gt;This is a brief review of some of the cases related to privacy filed under section 46 of the Information Technology Act, 2000 ("the Act") seeking adjudication for alleged contraventions of the Act in the State of Maharashtra. &lt;/b&gt;
        &lt;h3&gt;Background&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 46 of the Act grants the Central Government the power to appoint an adjudicating officer to hold an enquiry to adjudge, upon complaints being filed before that adjudicating officer, contraventions of the Act. The adjudicating officer may be of the Central Government or of the State Government [see section 46(1) of the Act], must have field experience with information technology and law [see section 46(3) of the Act] and exercises jurisdiction over claims for damages up to `5,00,00,000 [see section 46(1A) of the Act]. For the purpose of adjudication, the officer is vested with certain powers of a civil court [see section 46(5) of the Act] and must follow basic principles of natural justice while conducting adjudications [see section 46(2) of the Act]. Hence, the adjudicating officer appointed under section 46 is a quasi-judicial authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, the quasi-judicial adjudicating officer may impose penalties, thereby vesting him with some of the powers of a criminal court [see section 46(2) of the Act], and award compensation, the quantum of which is to be determined after taking into account factors including unfair advantage, loss and repeat offences [see section 47 of the Act]. The adjudicating officer may impose penalties for any of the offences described in section 43, section 44 and section 45 of the Act; and, further, may award compensation for losses suffered as a result of contraventions of section 43 and section 43A. The text of these sections is reproduced in the Schedule below. Further law as to the appointment of the adjudicating officer and the procedure attendant on all adjudications was made by Information Technology (Qualification and Experience of Adjudicating Officers and the Manner of Holding Enquiry) Rules, 2003.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that the adjudicating officer is vested with significant judicial powers, including the power to enforce certain criminal penalties, and is an important quasi-judicial authority.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Excursus&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the outset, it is important to understand the distinction between compensation and damages. Compensation is a sum of money awarded by a civil court, before or along with the primary decree, to indemnify a person for injury or loss. It is usually awarded to a person who has a suffered a monetary loss as a result of the acts or omissions of another party. Its quantification is usually guided by principles of equity. [See &lt;i&gt;Shantilal Mangaldas&lt;/i&gt; AIR 1969 SC 634 and &lt;i&gt;Ranbir Kumar Arora&lt;/i&gt; AIR 1983 P&amp;amp;H 431]. On the hand, damages are punitive and, in addition to restoring an indemnitee to wholeness, may be imposed to deter an offender, punish exemplary offences, and recover consequential losses, amongst other objectives. Damages that are punitive, while not judicially popular in India, are usually imposed by a criminal court in common law jurisdictions. They are distinct from civil and equitable actions. [See the seminal case of &lt;i&gt;The Owners of the Steamship Mediana&lt;/i&gt; [1900] AC 113 (HL)].&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, section 46 of the Act uses the terms “damage”, “injury” and “compensation” interchangeably without regard for the long and rich jurisprudence that finds them to be different concepts.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Cases related to Privacy&lt;/h3&gt;
&lt;p&gt;In the State of Maharashtra, there have been a total of 47 cases filed under section 46 of the Act. Of these, 33 cases have been disposed of by the Adjudicating Officer and 14 are currently pending disposal. &lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; At least three of these cases before the Adjudicating Officer deal with issues related to privacy of communications and personal data. They are:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Case Title&lt;/th&gt;&lt;th&gt;Forum&lt;/th&gt;&lt;th&gt;Date&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Vinod Kaushik&lt;/i&gt; v. &lt;i&gt;Madhvika Joshi&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio Secretary&lt;/i&gt;, IT&lt;br /&gt;Government of Maharashtra&lt;/td&gt;
&lt;td&gt;10.10.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Amit D. Patwardhan&lt;/i&gt; v. &lt;i&gt;Rud India Chains&lt;/i&gt;&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio&lt;/i&gt;&lt;br /&gt;Secretary, IT&lt;br /&gt;Government of Maharashtra&lt;/td&gt;
&lt;td&gt;15.04.2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; v. &lt;i&gt;Minal Bagherwal&lt;/i&gt;&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio Secretary&lt;/i&gt;, IT&lt;br /&gt;Government of Maharashtra&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;26.08.2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In all three cases the Adjudicating Officer was called upon to determine and penalise unauthorised access to personal data of the complainants. In the &lt;i&gt;Vinod Kaushik&lt;/i&gt; case, the complainants’ emails and chat sessions were accessed, copied and made available to the police for legal proceedings without the permission of the complainants. In the &lt;i&gt;Amit Patwardhan&lt;/i&gt; and &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; cases, the complainants’ financial information in the form of bank account statements were obtained from their respective banks without their consent and used against them in legal proceedings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Vinod Kaushik&lt;/i&gt; complaint was filed in 2010 for privacy violations committed between 2008 and 2009. The complaint was made against the complainant’s daughter-in-law – the respondent, who was estranged from her husband, the complainant’s son. The respondent had, independent of the proceedings before the Adjudicating Officer, instituted criminal proceedings alleging cruelty and dowry-related harassment against her estranged husband and the complainant. To support some of the claims made in the criminal proceedings, the respondent accessed the email accounts of her estranged husband and the complainant and printed copies of certain communications, both emails and chat transcripts. The complaint to the Adjudicating Officer was made in relation to these emails and chat transcripts that were obtained without the consent and knowledge of the complainant and his son. On 09.08.2010, the then Adjudicating Officer dismissed the complaint after finding that, owing to the marriage between the respondent and the complainant’s son, there was a relation of mutual trust between them that resulted in the complainant and his son consensually sharing their email account passwords with the respondent. This ruling was appealed to the Cyber Appellate Tribunal (&lt;b&gt;"CyAT"&lt;/b&gt;) which, in a decision of 29.06.2011, found irregularities in the complainant’s son’s privity to the proceedings and remanded the complaint to the Adjudicating Officer for re-adjudication. The re-adjudication, which was conducted by Shri Rajesh Aggarwal as Adjudicating Officer, resulted in a final order of 10.10.2011 (&lt;b&gt;"the final order"&lt;/b&gt;) that is the subject of this analysis. The final order found that the respondent had violated the privacy of the complainant and his son by her unauthorised access of their email accounts and sharing of their private communications. However, the Adjudicating Officer found that the intent of the unauthorised access – to obtain evidence to support a criminal proceeding – was mitigatory and hence ordered the respondent to pay only a small token amount in compensation, not to the complainants but instead to the State Treasury. The Delhi High Court, which was moved in appeal because the CyAT was non-functional, upheld the final order in its decision of 27.01.2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Amit Patwardhan&lt;/i&gt; complaint was filed against the complainant’s ex-employer – the respondent, for illegally obtaining copies of the complainant’s bank account statement. The complainant had left the employ of the respondent to work with a competing business company but not before colluding with the competing business company and diverting the respondent’s customers to them. For redress, the respondent filed suit for a decree of compensation and lead the complainant’s bank statements in evidence to prove unlawful gratification. Since the bank statements were obtained electronically by the respondent without the complainant’s consent, the jurisdiction of the Adjudicating Officer was invoked. In his order of 15.04.2013, Shri Rajesh Aggarwal, the Adjudicating Officer, found that the respondent had, by unlawfully obtaining the complainant’s bank account statements which constitute sensitive personal data, violated the complainant’s privacy. The Adjudicating Officer astutely applied the equitable doctrine of clean hands to deny compensation to the complainant; however, because the complainant’s bank was not a party to the complaint, the Adjudicating Officer was unable to make a ruling on the lack of action by the bank to protect the sensitive personal data of its depositors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; complaint bears a few similarities to the preceding two cases. Like the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter, the issue concerned the manner in which a wife, estranged but still legally married, accessed electronic records of personal data of the complainants; and, like the &lt;i&gt;Amit Patwardhan&lt;/i&gt; matter, the object of the privacy violation was the bank account statements of the complainants that constitute sensitive personal data. The respondent was the estranged wife of one of the complainants who, along with his complainant father, managed the third complainant company. To support her claim for maintenance from the complainant and his family in an independent legal proceeding, the respondent obtained certain bank account statements of the complainants without their consent and, possibly, with the collusion of the respondent bank. After reviewing relevant law from the European Union and the United States, and observant of relevant sectoral regulations applicable in India including the relevant Master Circular of the Reserve Bank of India, and further noting preceding consumer case law on the subject, the Adjudicating Officer issued an order on 26.08.2013. The order found that the complainant’s right to privacy was violated by both the respondents but, while determining the quantum of compensation, distinguished between the respondents in respect of the degree of liability; the respondent wife was ordered to pay a token compensation amount while the respondent bank was ordered to pay higher compensation to each of the three complainants individually.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The high quality of each of the three orders bears specific mention. Despite the superb quality of the judgments of the Indian higher judiciary in the decades after independence, the overall quality of judgment-writing appears to have declined. &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; In the last decade, several Indian judges have called for higher standards of judgment writing from their fellow judges. &lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In this background, it is notable that Shri Rajesh Aggarwal, despite not being a member of the judiciary, has delivered well-reasoned, articulate and clear orders that are cognisant of legal issues and also easily understandable to a non-legal reader.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In each of these cases, the Adjudicating Officer has successfully navigated around the fact that none of the primary parties were interacting and transacting at arm’s length. In the &lt;i&gt;Vinod Kaushik&lt;/i&gt; and &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; matters, the primary parties were estranged but still legally married partners and in the &lt;i&gt;Amit Patwardhan&lt;/i&gt; matter the parties were in an employer-employee relationship. The first Adjudicating Officer in the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter failed, in his order of 09.08.2010, to appreciate that the individual communications of individual persons were privileged by an expectation of privacy, regardless of their relationship. Hence, despite acknowledging that the marital partners in that matter were in conflict with each other, and despite being told by one party that the other party’s access to those private communications was made without consent, the Adjudicating Officer allowed his non-judicial opinion of marriage to influence his order. This mistake was corrected when the matter was remanded for re-adjudication. In the re-adjudication, the new Adjudicating Officer correctly noted that the respondent wife could have chosen to approach the police or a court to follow the proper investigative procedure for accessing emails and other private communications of another person and that her unauthorised use of the complainant’s passwords amounted to a violation of their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Popular conceptions of different types of relationships may affect the (quasi) judicial imagination of privacy. In comparison to the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter, the &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; and &lt;i&gt;Amit Patwardhan&lt;/i&gt; matters both dealt with unauthorised access to bank account statements, by a wife and by an ex-employer respectively. In any event, the same Adjudicating Officer presided over all three matters and correctly found that the facts in all three matters admitted to contraventions of the privacy of the complainants. The conjecture as to whether the first Adjudicating Officer in the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter would have applied the same standard of family unity to unauthorised access of bank account statements by an estranged wife who was seeking maintenance remains untested. However, the reliance placed on the decision of the Delhi State Consumer Protection Commission in the matter of &lt;i&gt;Rupa Mahajan Pahwa,&lt;/i&gt; &lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; where the Commission found that unauthorised access to a bank pass book by an estranged husband violated the privacy of the wife, would suggest that judges clothe financial information with a standard of privacy higher than that given to emails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emails are a form of electronic communication. The &lt;i&gt;PUCL&lt;/i&gt; case (Supreme Court of India, 1996)&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; while it did not explicitly deal with the standard of protection accorded to emails, held that personal communications were protected by an individual right to privacy that emanated from the protection of personal liberty guaranteed under Article 21 of the Constitution of India. Following the &lt;i&gt;Maneka Gandhi&lt;/i&gt; case (Supreme Court of India, 1978)&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;it is settled that persons may be deprived of their personal liberty only by a just, fair and reasonable procedure established by law. As a result, interceptions of private communications that are protected by Article 21 may only be conducted in pursuance of such a procedure. This procedure exists in the form of the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 that came into effect on 27 October 2009 (&lt;b&gt;"the Interception Rules"&lt;/b&gt;). The Interception Rules set out a regime for accessing private emails in certain conditions. The powers and procedure of Section 91 of the Code of Criminal Procedure (&lt;b&gt;"CrPC")&lt;/b&gt; may also apply to obtain data at rest, such as emails stored in an inbox or sent-mail folder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, the orders of the Adjudicating Officer reveal a well-reasoned and progressive understanding of the law and principles relating to the quantification of compensation. By choosing to impose larger amounts of compensation on the bank that violated the privacy of the complainant in the &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; matter, the Adjudicating Officer has indicated that the institutions that hold sensitive personal data, such as financial information, are subject to a higher duty of care in relation of it. But, most importantly, the act of imposing monetary compensation of privacy violations is a step forward because, for the first time in India, it recognises that privacy violations are civil wrongs or injuries that demand compensation.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. These Rules were issued &lt;i&gt;vide&lt;/i&gt; GSR 220(E), dated 17 March 2003 and published in the Gazette of India, Extraordinary, Part II, Section 3(i). These Rules can be accessed here – &lt;a href="http://it.maharashtra.gov.in/PDF/Qual_ExpAdjudicatingOfficer_Manner_of_Holding_Enquiry_Rules.PDF"&gt;http://it.maharashtra.gov.in/PDF/Qual_ExpAdjudicatingOfficer_Manner_of_Holding_Enquiry_Rules.PDF&lt;/a&gt; (visited on 30 September 2013).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. These cases and statistics may be viewed here – &lt;a href="http://it.maharashtra.gov.in/1089/IT-Act-Judgements"&gt;http://it.maharashtra.gov.in/1089/IT-Act-Judgements&lt;/a&gt; (visited on 30 September 2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See generally, Upendra Baxi “"The Fair Name of Justice": The Memorable Voyage of Chief Justice Chandrachud” in &lt;i&gt;A Chandrachud Reader&lt;/i&gt; (Justice V. S. Deshpande ed., Delhi: Documentation Centre &lt;i&gt;etc.&lt;/i&gt;, 1985) and, Rajeev Dhavan, "Judging the Judges" in &lt;i&gt;Judges and the Judicial Power: Essays in Honour of Justice V. R. Krishna Iyer&lt;/i&gt; (Rajeev Dhavan and Salman Khurshid eds., London: Sweet &amp;amp; Maxwell, 1985).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. See generally, Justice B.G .Harindranath, &lt;i&gt;Art of Writing Judgments&lt;/i&gt; (Bangalore: Karnataka Judicial Academy, 2004); Justice T .S. Sivagnanam, &lt;i&gt;The Salient Features of the Art of Writing Orders and Judgments&lt;/i&gt; (Chennai: Tamil Nadu State Judicial Academy, 2010); and, Justice Sunil Ambwani, “Writing Judgments: Comparative Models” Presentation at the National Judicial Academy, Bhopal (2006) available here – &lt;a href="http://districtcourtallahabad.up.nic.in/articles/writing%20judgment.pdf"&gt;http://districtcourtallahabad.up.nic.in/articles/writing%20judgment.pdf&lt;/a&gt; (visited on 29 Sep 2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Appeal No. FA-2008/659 of the Delhi State Consumer Protection Commission, decided on 16 October 2008.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. (1997) 1 SCC 301.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. (1978) 1 SCC 248.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra'&gt;https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-01T15:29:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft">
    <title>Privacy (Protection) Bill, 2013: Updated Third Draft</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has been researching privacy in India since 2010 with the objective of raising public awareness around privacy, completing in depth research, and driving a privacy legislation in India. As part of this work, we drafted the Privacy (Protection) Bill, 2013. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;This research is being undertaken as part of the 'SAFEGUARDS' project that CIS is doing with Privacy International and IDRC. &lt;/i&gt;The following is the latest version with changes based on the Round Table held on August 24:&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="center"&gt;&lt;b&gt;[Preamble]&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER I&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Preliminary&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Short title, extent and commencement. –&lt;/b&gt; (1)&lt;b&gt; &lt;/b&gt;This Act may be called the Privacy (Protection) Act, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) It extends to the whole of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) It shall come into force on such date as the Central Government may, by notification in the Official Gazette, appoint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. Definitions. –&lt;/b&gt; In this Act and in any rules made thereunder, unless the context otherwise requires, –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) “anonymise” means, in relation to personal data, the removal of all data that may, whether directly or indirectly in conjunction with any other data, be used to identify the data subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) “appropriate government” means, in relation the Central Government or a Union Territory Administration, the Central Government; in relation a State Government, that State Government; and, in relation to a public authority which is established, constituted, owned, controlled or substantially financed by funds provided directly or indirectly –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) by the Central Government or a Union Territory Administration, the Central Government;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) by a State Government, that State Government;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) “authorised officer” means an officer, not below the rank of a Gazetted Officer, of an All India Service or a Central Civil Service, as the case may be, who is empowered by the Central Government, by notification in the Official Gazette, to intercept a communication of another person or carry out surveillance of another person under this Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) “biometric data” means any data relating to the physical, physiological or behavioural characteristics of a person which allow their unique identification including, but not restricted to, facial images, finger prints, hand prints, foot prints, iris recognition, hand writing, typing dynamics, gait analysis and speech recognition;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) “Chairperson” and “Member” mean the Chairperson and Member appointed under sub-section (1) of section 17;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) “collect”, with its grammatical variations and cognate expressions, means, in relation to personal data, any action or activity that results in a data controller obtaining, or coming into the possession or control of, any personal data of a data subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) “communication” means a word or words, spoken, written or indicated, in any form, manner or language, encrypted or unencrypted, meaningful or otherwise, and includes visual representations of words, ideas, symbols and images, whether transmitted or not transmitted and, if transmitted, irrespective of the medium of transmission;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(h) “competent organisation” means an organisation or public authority listed in the Schedule;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) “data controller” means a person who, either alone or jointly or in concert with other persons, determines the purposes for which and the manner in which any personal data is processed;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(j) “data processor” means any person who processes any personal data on behalf of a data controller;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(k) “Data Protection Authority” means the Data Protection Authority constituted under sub-section (1) of section 17;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;(l) “data subject” means a person who is the subject of personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(m) “deoxyribonucleic acid data” means all data, of whatever type, concerning the characteristics of a person that are inherited or acquired during early prenatal development;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(n) “destroy”, with its grammatical variations and cognate expressions, means, in relation to personal data, to cease the existence of, by deletion, erasure or otherwise, any personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(o) “disclose”, with its grammatical variations and cognate expressions, means, in relation to personal data, any action or activity that results in a person who is not the data subject coming into the possession or control of that personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(p) “intelligence organisation” means an intelligence organisation under the Intelligence Organisations (Restriction of Rights) Act, 1985 (58 of 1985);&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(q) “interception” or “intercept” means any activity intended to capture, read, listen to or understand the communication of a person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(r) “personal data” means any data which relates to a natural person if that person can, whether directly or indirectly in conjunction with any other data, be identified from it and includes sensitive personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(s) “prescribed” means prescribed by rules made under this Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(t) “process”, with its grammatical variations and cognate expressions, means, in relation to personal data, any action or operation which is performed upon personal data, whether or not by automated means including, but not restricted to, organisation, structuring, adaptation, modification, retrieval, consultation, use, alignment or destruction;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(u) “receive”, with its grammatical variations and cognate expressions, means, in relation to personal data, to come into the possession or control of any personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) “sensitive personal data” means personal data as to the data subject’s –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) biometric data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) deoxyribonucleic acid data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) sexual preferences and practices;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) medical history and health;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) political affiliation;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) commission, or alleged commission, of any offence;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vii) ethnicity, religion, race or caste; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(viii) financial and credit information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(w) “store”, with its grammatical variations and cognate expressions, means, in relation to personal data, to retain, in any form or manner and for any purpose or reason, any personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(x) “surveillance” means any activity intended to watch, monitor, record or collect, or to enhance the ability to watch, record or collect, any images, signals, data, movement, behaviour or actions, of a person, a group of persons, a place or an object, for the purpose of obtaining information of a person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;and all other expressions used herein shall have the meanings ascribed to them under the General Clauses Act, 1897 (10 of 1897) or the Code of Criminal Procedure, 1973 (2 of 1974), as the case may be.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER II&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Regulation of Personal Data&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Regulation of personal data. – &lt;/b&gt;Notwithstanding anything contained in any other law for time being in force, no person shall collect, store, process, disclose or otherwise handle any personal data of another person except in accordance with the provisions of this Act and any rules made thereunder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. Exemption. –&lt;/b&gt; Nothing in this Act shall apply to the collection, storage, processing or disclosure of personal data for personal or domestic use.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER III&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Protection of Personal Data&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Regulation of collection of personal data. –&lt;/b&gt; (1) No personal data of a data subject shall be collected except in conformity with section 6 and section 7.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No personal data of a data subject may be collected under this Act unless it is necessary for the achievement of a purpose of the person seeking its collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Subject to section 6 and section 7, no personal data may be collected under this Act prior to the data subject being given notice, in such and form and manner as may be prescribed, of the collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. Collection of personal data with prior informed consent. –&lt;/b&gt; (1) Subject to sub-section (2), a person seeking to collect personal data under this section shall, prior to its collection, obtain the consent of the data subject.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Prior to a collection of personal data under this section, the person seeking its collection shall inform the data subject of the following details in respect of his personal data, namely: –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) when it will be collected;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) its content and nature;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) the purpose of its collection;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) the manner in which it may be accessed, checked and modified;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) the security practices, privacy policies and other policies, if any, to which it will be subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) the conditions and manner of its disclosure; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) the procedure for recourse in case of any grievance in relation to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Consent to the collection of personal data under this section may be obtained from the data subject in any manner or medium but shall not be obtained as a result of a threat, duress or coercion:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that the data subject may, at any time after his consent to the collection of personal data has been obtained, withdraw the consent for any reason whatsoever and all personal data collected following the original grant of consent shall be destroyed forthwith:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that the person who collected the personal data in respect of which consent is subsequently withdrawn may, if the personal data is necessary for the delivery of any good or the provision of any service, not deliver that good or deny that service to the data subject who withdrew his grant of consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. Collection of personal data without prior consent. – &lt;/b&gt;Personal data may be collected without the prior consent of the data subject if it is –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) necessary for the provision of an emergency medical service to the data subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) required for the establishment of the identity of the data subject and the collection is authorised by a law in this regard;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) necessary to prevent a reasonable threat to national security, defence or public order; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) necessary to prevent, investigate or prosecute a cognisable offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. Regulation of storage of personal data. –&lt;/b&gt; (1) No person shall store any personal data for a period longer than is necessary to achieve the purpose for which it was collected or received, or, if that purpose is achieved or ceases to exist for any reason, for any period following such achievement or cessation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Save as provided in sub-section (3), any personal data collected or received in relation to the achievement of a purpose shall, if that purpose is achieved or ceases to exist for any reason, be destroyed forthwith.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Notwithstanding anything contained in this section, any personal data may be stored for a period longer than is necessary to achieve the purpose for which it was collected or received, or, if that purpose has been achieved or ceases to exist for any reason, for any period following such achievement or cessation, if –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the data subject grants his consent to such storage prior to the purpose for which it was collected or received being achieved or ceasing to exist;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) it is adduced for an evidentiary purpose in a legal proceeding; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) it is required to be stored under the provisions of an Act of Parliament:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that only that amount of personal data that is necessary to achieve the purpose of storage under this sub-section shall be stored and any personal data that is not required to be stored for such purpose shall be destroyed forthwith:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided further that any personal data stored under this sub-section shall, to the extent possible, be anonymised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9. Regulation of processing of personal data. –&lt;/b&gt; (1) No person shall process any personal data that is not necessary for the achievement of the purpose for which it was collected or received.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Save as provided in sub-section (3), no personal data shall be processed for any purpose other than the purpose for which it was collected or received.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Notwithstanding anything contained in this section, any personal data may be processed for a purpose other than the purpose for which it was collected or received if –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the data subject grants his consent to the processing and only that amount of personal data that is necessary to achieve the other purpose is processed;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) it is necessary to perform a contractual duty to the data subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) it is necessary to prevent a reasonable threat to national security, defence or public order; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) it necessary to prevent, investigate or prosecute a cognisable offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10. Transfer of personal data for processing. –&lt;/b&gt; (1) Subject to the provisions of this section, personal data that has been collected in conformity with this Act may be transferred by a data controller to a data processor, whether located in India or otherwise, if the transfer is pursuant to an agreement that explicitly binds the data processor to same or stronger measures in respect of the storage, processing, destruction, disclosure and other handling of the personal data as are contained in this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No data processor shall process any personal data transferred under this section except to achieve the purpose for which it was collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) A data controller that transfers personal data under this section shall remain liable to the data subject for the actions of the data processor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11. Security of personal data and duty of confidentiality. –&lt;/b&gt; (1) No person shall collect, receive, store, process or otherwise handle any personal data without implementing measures, including, but not restricted to, technological, physical and administrative measures, adequate to secure its confidentiality, secrecy, integrity and safety, including from theft, loss, damage or destruction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Data controllers and data processors shall be subject to a duty of confidentiality and secrecy in respect of personal data in their possession or control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Without prejudice to the provisions of this section, a data controller or data processor shall, if the confidentiality, secrecy, integrity or safety of personal data in its possession or control is violated by theft, loss, damage or destruction, or as a result of any disclosure contrary to the provisions of this Act, or for any other reason whatsoever, notify the data subject, in such form and manner as may be prescribed, forthwith.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12. Regulation of disclosure of personal data. –&lt;/b&gt; Subject to section 10, section 13 and section 14, no person shall disclose, or otherwise cause any other person to receive, the content or nature of any personal data that has been collected in conformity with this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13. Disclosure of personal data with prior informed consent. – &lt;/b&gt;(1) Subject to sub-section (2), a data controller or data processor seeking to disclose personal data under this section shall, prior to its disclosure, obtain the consent of the data subject.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Prior to a disclosure of personal data under this section, the data controller or data processor, as the case may be, seeking to disclose the personal data, shall inform the data subject of the following details in respect of his personal data, namely: –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) when it will be disclosed;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the purpose of its disclosure;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) the security practices, privacy policies and other policies, if any, that will protect it; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) the procedure for recourse in case of any grievance in relation to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14. Disclosure of personal data without prior consent. –&lt;/b&gt; (1) Subject to sub-section (2), personal data may be disclosed without the prior consent of the data subject if it is necessary –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) to prevent a reasonable threat to national security, defence or public order; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) to prevent, investigate or prosecute a cognisable offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No data controller or data processor shall disclose any personal data unless it has received an order in writing from a police officer not below the rank of [___] in such form and manner as may be prescribed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that an order for the disclosure of personal data made under this sub-section shall not require the disclosure of any personal data that is not necessary to achieve the purpose for which the disclosure is sought:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided further that the data subject shall be notified, in such form and manner as may be prescribed, of the disclosure of his personal data, including details of its content and nature, and the identity of the police officer who ordered its disclosure, forthwith.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;15. Quality and accuracy of personal data. –&lt;/b&gt; (1) Each data controller and data processor shall, to the extent possible, ensure that the personal data in its possession or control, is accurate and, where necessary, is kept up to date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No data controller or data processor shall deny a data subject whose personal data is in its possession or control the opportunity to review his personal data and, where necessary, rectify anything that is inaccurate or not up to date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) A data subject may, if he finds personal data in the possession or control of a data controller or data processor that is not necessary to achieve the purpose for which it was collected, received or stored, demand its destruction, and the data controller shall destroy, or cause the destruction of, the personal data forthwith.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;16. Special provisions for sensitive personal data. –&lt;/b&gt; Notwithstanding anything contained in this Act and the provisions of any other law for the time being in force –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) no person shall store sensitive personal data for a period longer than is necessary to achieve the purpose for which it was collected or received, or, if that purpose has been achieved or ceases to exist for any reason, for any period following such achievement or cessation;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) no person shall process sensitive personal data for a purpose other than the purpose for which it was collected or received;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) no person shall disclose sensitive personal data to another person, or otherwise cause any other person to come into the possession or control of, the content or nature of any sensitive personal data, including any other details in respect thereof.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER IV&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;The Data Protection Authority&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;17.&lt;/b&gt; &lt;b&gt;Constitution of the Data Protection Authority. –&lt;/b&gt; (1) The Central Government shall, by notification, constitute, with effect from such date as may be specified therein, a body to be called the Data Protection Authority consisting of a Chairperson and not more than four other Members, to exercise the jurisdiction and powers and discharge the functions and duties conferred or imposed upon it by or under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Chairperson shall be a person who has been a Judge of the Supreme Court:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that the appointment of the Chairperson shall be made only after consultation with the Chief Justice of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Each Member shall be a person of ability, integrity and standing who has a special knowledge of, and professional experience of not less than ten years in privacy law and policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;18. Term of office, conditions of service, etc. of Chairperson and Members. – &lt;/b&gt;(1) Before appointing any person as the Chairperson or Member, the Central Government shall satisfy itself that the person does not, and will not, have any such financial or other interest as is likely to affect prejudicially his functions as such Chairperson or Member.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Chairperson and every Member shall hold office for such period, not exceeding five years, as may be specified in the order of his appointment, but shall be eligible for reappointment:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that no person shall hold office as the Chairperson or Member after he has attained the age of sixty-seven years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Notwithstanding anything contained in sub-section (2), the Chairperson or any Member may –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) by writing under his hand resign his office at any time;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) be removed from office in accordance with the provisions of section 19 of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) A vacancy caused by the resignation or removal of the Chairperson or Member under sub-section (3) shall be filled by fresh appointment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(5) In the event of the occurrence of a vacancy in the office of the Chairperson, such one of the Members as the Central Government may, by notification, authorise in this behalf, shall act as the Chairperson till the date on which a new Chairperson, appointed in accordance with the provisions of this Act, to fill such vacancy, enters upon his office.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(6) When the Chairperson is unable to discharge his functions owing to absence, illness or any other cause, such one of the Members as the Chairperson may authorise in writing in this behalf shall discharge the functions of the Chairperson, till the date on which the Chairperson resumes his duties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(7) The salaries and allowances payable to and the other terms and conditions of service of the Chairperson and Members shall be such as may be prescribed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that neither the salary and allowances nor the other terms and conditions of service of the Chairperson and any member shall be varied to his disadvantage after his appointment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;19. Removal of Chairperson and Members from office in certain circumstances. – &lt;/b&gt;The Central Government may remove from office the Chairperson or any Member, who –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) is adjudged an insolvent; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) engages during his term of office in any paid employment outside the duties of his office; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) is unfit to continue in office by reason of infirmity of mind or body; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) is of unsound mind and stands so declared by a competent court; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) is convicted for an offence which in the opinion of the President involves moral turpitude; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) has acquired such financial or other interest as is likely to affect prejudicially his functions as a Chairperson or Member, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) has so abused his position as to render his continuance in offence prejudicial to the public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;20. Functions of the Data Protection Authority. –&lt;/b&gt; (1) The Chairperson may inquire, &lt;i&gt;suo moto&lt;/i&gt; or on a petition presented to it by any person or by someone acting on his behalf, in respect of any matter connected with the collection, storage, processing, disclosure or other handling of any personal data and give such directions or pass such orders as are necessary for reasons to be recorded in writing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Without prejudice to the generality of the foregoing provision, the Data Protection Authority shall perform all or any of the following functions, namely –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) review the safeguards provided by or under this Act and other law for the time being       in force for the protection of personal data and recommend measures for their effective  implementation;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) review any measures taken by any entity for the protection of personal data and take such further action is it deems fit;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) review any action, policy or procedure of any entity to ensure compliance with this Act and any rules made hereunder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) formulate, in consultation with experts, norms for the effective protection of personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) promote awareness and knowledge of personal data protection through any means necessary;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) undertake and promote research in the field of protection of personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) encourage the efforts of non-governmental organisations and institutions working in the field of personal data protection;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(h) publish periodic reports concerning the incidence of collection, processing, storage, disclosure and other handling of personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) such other functions as it may consider necessary for the protection of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Subject to the provisions of any rules prescribed in this behalf by the Central Government, the Data Protection Authority shall have the power to review any decision, judgement, decree or order made by it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) In the exercise of its functions under this Act, the Data Protection Authority shall give such directions or pass such orders as are necessary for reasons to be recorded in writing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(5) The Data Protection Authority may, in its own name, sue or be sued.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 21. Secretary, officers and other employees of the Data Protection Authority. – &lt;/b&gt;(1) The Central Government shall appoint a Secretary to the Data Protection Authority to exercise and perform, under the control of the Chairperson such powers and duties as may be prescribed or as may be specified by the Chairperson.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Central Government may provide the Data Protection Authority with such other officers and employees as may be necessary for the efficient performance of the functions of the Data Protection Authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The salaries and allowances payable to and the conditions of service of the Secretary and other officers and employees of the Data Protection Authority shall be such as may be prescribed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 22. Salaries, etc. be defrayed out of the Consolidated Fund of India. –&lt;/b&gt; The salaries and allowances payable to the Chairperson and Members and the administrative expenses, including salaries, allowances and pension, payable to or in respect of the officers and other employees of the of the Data Protection Authority shall be defrayed out of the Consolidated Fund of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 23. Vacancies, etc. not to invalidate proceedings of the Data Protection Authority. –&lt;/b&gt; No act or proceeding of the Data Protection Authority shall be questioned on the ground merely of the existence of any vacancy or defect in the constitution of the Data Protection Authority or any defect in the appointment of a person acting as the Chairperson or Member.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 24. Chairperson, Members and employees of the Data Protection Authority to be public servants. –&lt;/b&gt; The Chairperson and Members and other employees of the Data Protection Authority shall be deemed to be public servants within the meaning of section 21 of the Indian Penal Code, 1860 (45 of 1860).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 25. Location of the office of the Data Protection Authority.&lt;/b&gt; &lt;b&gt;–&lt;/b&gt; The offices of the Data Protection Authority shall be in [___] or any other location as directed by the Chairperson in consultation with the Central Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 26. Procedure to be followed by the Data Protection Authority. – &lt;/b&gt;(1) Subject to the provisions of this Act, the Data Protection Authority shall have powers to regulate –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the procedure and conduct of its business;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the delegation to one or more Members of such powers or functions as the Chairperson may specify.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) In particular and without prejudice to the generality of the foregoing provisions, the powers of the Data Protection Authority&lt;b&gt; &lt;/b&gt;shall include the power to determine the extent to which persons interested or claiming to be interested in the subject-matter of any proceeding before it may be allowed to be present or to be heard, either by themselves or by their representatives or to cross-examine witnesses or otherwise take part in the proceedings:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that any such procedure as may be prescribed or followed shall be guided by the principles of natural justice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27. Power relating to inquiries. –&lt;/b&gt; (1) The Data Protection Authority shall, for the purposes of any inquiry or for any other purpose under this Act, have the same powers as vested in a civil court under the Code of Civil Procedure, 1908 (5 of 1908), while trying suits in respect of the following matters, namely –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the summoning and enforcing the attendance of any person from any part of India and examining him on oath;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the discovery and production of any document or other material object producible as evidence;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) the reception of evidence on affidavit;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) the requisitioning of any public record from any court or office;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) the issuing of any commission for the examination of witnesses; and,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) any other matter which may be prescribed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Data Protection Authority shall have power to require any person, subject to any privilege which may be claimed by that person under any law for the time being in force, to furnish information on such points or matters as, in the opinion of the Data Protection Authority, may be useful for, or relevant to, the subject matter of an inquiry and any person so required shall be deemed to be legally bound to furnish such information within the meaning of section 176 and section 177 of the Indian Penal Code, 1860 (45 of 1860).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The Data Protection Authority or any other officer, not below the rank of a Gazetted Officer, specially authorised in this behalf by the Data Protection Authority may enter any building or place where the Data Protection Authority has reason to believe that any document relating to the subject matter of the inquiry may be found, and may seize any such document or take extracts or copies therefrom subject to the provisions of section 100 of the Code of Criminal Procedure, 1973 (2 of 1974), in so far as it may be applicable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The Data Protection Authority shall be deemed to be a civil court and when any offence as is described in section 175, section 178, section 179, section 180 or section 228 of the Indian Penal Code, 1860 (45 of 1860) is committed in the view or presence of the Data Protection Authority, the Data Protection Authority may, after recording the facts constituting the offence and the statement of the accused as provided for in the Code of Criminal Procedure, 1973 (2 of 1974), forward the case to a Magistrate having jurisdiction to try the same and the Magistrate to whom any such case is forwarded shall proceed to hear the complaint against the accused as if the case had been forwarded to him under section 346 of the Code of Criminal Procedure, 1973 (2 of 1974).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;28. Decisions of the &lt;/b&gt;&lt;b&gt;Data Protection Authority. –&lt;/b&gt; (1) The decisions of the Data Protection Authority shall be binding.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) In its decisions, the Data Protection Authority has the power to –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) require an entity to take such steps as may be necessary to secure compliance with the provisions of this Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) require an entity to compensate any person for any loss or detriment suffered;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) impose any of the penalties provided under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 29. Proceedings before the Data Protection Authority to be judicial proceedings. –&lt;/b&gt; The Data Protection Authority shall be deemed to be a civil court for the purposes of section 195 and Chapter XXVI of the Code of Criminal Procedure, 1973 (2 of 1974), and every proceeding before the Data Protection Authority shall be deemed to be a judicial proceeding within the meaning of section 193 and section 228 and for the purposes of section 196 of the Indian Penal Code, 1860 (45 of 1860).&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER V&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Regulation by Data Controllers and Data Processors&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;30. Co-regulation by Data Controllers and the Data Protection Authority. –&lt;/b&gt; (1) The Data Protection Authority may, in consultation with data controllers, formulate codes of conduct for the collection, storage, processing, disclosure or other handling of any personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No code of conduct formulated under sub-section (1) shall be binding on a data controller unless –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) it has received the written approval of the Data Protection Authority; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) it has received the approval, by signature of a director or authorised signatory, of the data controller.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;31. Co-regulation without prejudice to other remedies. – &lt;/b&gt;Any code of conduct formulated under this chapter shall be without prejudice to the jurisdiction, powers and functions of the Data Protection Authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;32. Self-regulation&lt;/b&gt; &lt;b&gt;by data controllers. – &lt;/b&gt;(1) The Data Protection Authority may encourage data controllers and data processors to formulate professional codes of conduct to establish rules for the collection, storage, processing, disclosure or other handling of any personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No code of conduct formulated under sub-section (1) shall be effective unless it is registered, in such form and manner as may be prescribed, by the Data Protection Authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The Data Protection Authority shall, for reasons to be recorded in writing, not register any code of conduct formulated under sub-section (1) that is not adequate to protect personal data.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER IV&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Surveillance and Interception of Communications&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;33. Surveillance and interception of communication to be warranted. – &lt;/b&gt;Notwithstanding anything contained in any other law for the time being in force, no –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) surveillance shall be carried out, and no person shall order any surveillance of another person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) communication shall be intercepted, and no person shall order the interception of any communication of another person; save in execution of a warrant issued under section 36, or an order made under section 38, of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;34.&lt;/b&gt; &lt;b&gt;Application for issuance of warrant. – &lt;/b&gt;(1) Any authorised officer seeking to carry out any surveillance or intercept any communication of another person shall prefer an application for issuance of a warrant to the Magistrate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The application for issuance of the warrant shall be in the form and manner prescribed in the Schedule and shall state the purpose for which the warrant is sought.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The application for issuance of the warrant shall be accompanied by –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) a report by the authorised officer of the suspicious conduct of the person in respect of whom the warrant is sought, and all supporting material thereof;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) an affidavit of the authorised officer, or a declaration under his hand and seal, that the contents of the report and application are true to the best of his knowledge, information and belief, and that the warrant shall be executed only for the purpose stated in the application and shall not be misused or abused in any manner including to interfere in the privacy of any person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) details of all warrants previously issued in respect of the person in respect of whom the warrant is sought, if any.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;35. Considerations prior to the issuance of warrant. –&lt;/b&gt; (1) No warrant shall issue unless the requirements of section 34 and this section have been met.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Magistrate shall consider the application made under section 34 and shall satisfy himself that the information contained therein sets out –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) a reasonable threat to national security, defence or public order; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) a cognisable offence, the prevention, investigation or prosecution of which is necessary in the public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The Magistrate shall satisfy himself that all other lawful means to acquire the information that is sought by the execution of the warrant have been exhausted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The Magistrate shall verify the identity of the authorised officer and shall satisfy himself that the application for issuance of the warrant is authentic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;36. Issue of warrant. –&lt;/b&gt; (1) Subject to section 34 and section 35, the Magistrate may issue a warrant for surveillance or interception of communication, or both of them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Magistrate may issue the warrant in Chambers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;37. Magistrate may reject application for issuance of warrant. – &lt;/b&gt;If the Magistrate is not satisfied that the requirements of section 34 and section 35 have been met, he may, for reasons to be recorded in writing, –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) refuse to issue the warrant and dispose of the application;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) return the application to the authorised officer without disposing of it;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) pass any order that he thinks fit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38. Order by Home Secretary in emergent circumstances. –&lt;/b&gt; (1) Notwithstanding anything contained in section 35, if the Home Secretary of the appropriate government is satisfied that a grave threat to national security, defence or public order exists, he may, for reasons to be recorded in writing, order any surveillance or interception of communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) An authorised officer seeking an order for surveillance or interception of communication under this section shall prefer an application to the Home Secretary in the form and manner prescribed in the Schedule and accompanied by the documents required under sub-section (3) of section 34.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) No order for surveillance or interception of communication made by the Home Secretary under this section shall be valid upon the expiry of a period of seven days from the date of the order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) Before the expiry of a period of seven days from the date of an order for surveillance or interception of communication made under this section, the authorised officer who applied for the order shall place the application before the Magistrate for confirmation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;39.&lt;/b&gt; &lt;b&gt;Duration of warrant or order. – &lt;/b&gt;(1) The warrant or order for surveillance or interception of communication shall specify the period of its validity and, upon its expiry, all surveillance and interception of communication, as the case may be, carried out in relation to that warrant or order shall cease forthwith:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that no warrant or order shall be valid upon the expiry of a period of sixty days from the date of its issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) A warrant issued under section 36, or an order issued under section 38, for surveillance or interception of communication, or both of them, may be renewed by a Magistrate if he is satisfied that the requirements of sub-section (2) of section 35 continue to exist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;40. Duty to inform the person concerned. – &lt;/b&gt;Subject to sub-section (2), before the expiry of a period of sixty days from the conclusion of any surveillance or interception of communication carried out under this Act, the authorised officer who carried out the surveillance or interception of communication shall, in writing in such form and manner as may be prescribed, notify, with reference to the warrant of the Magistrate, and, if applicable, the order of the Home Secretary, each person in respect of whom the warrant or order was issued, of the fact of such surveillance or interception and duration thereof.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Magistrate may, on an application made by an authorised officer in such form and manner as may be prescribed, if he is satisfied that the notification under sub-section (1) would –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) present a reasonable threat to national security, defence or public order, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) adversely affect the prevention, investigation or prosecution of a cognisable offence,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;for reasons to be recorded in writing addressed to the authorised officer, order that the person in respect of whom the warrant or order of surveillance or interception of communication was issued, not be notified of the fact of such interception or the duration thereof:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;41. Security and duty of confidentiality and secrecy. – &lt;/b&gt;(1) No person shall carry out any surveillance or intercept any communication of another person without implementing measures, including, but not restricted to, technological, physical and administrative measures, to secure the confidentiality and secrecy of all information obtained as a result of the surveillance or interception of communication, as the case may be, including from theft, loss or unauthorised disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Any person who carries out any surveillance or interception of any communication, or who obtains any information, including personal data, as a result of surveillance or interception of communication, shall be subject to a duty of confidentiality and secrecy in respect of it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Every competent organisation shall, before the expiry of a period of one hundred days from the enactment of this Act, designate as many officers as it deems fit as Privacy Officers who shall be administratively responsible for all interceptions of communications carried out by that competent organisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;42. Disclosure of information. – &lt;/b&gt;(1) Save as provided in this section, no person shall disclose to any other person, or otherwise cause any other person to come into the knowledge or possession of, the content or nature of any information, including personal data, obtained as a result of any surveillance or interception carried out under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Notwithstanding anything contained in this section, if the disclosure of any information, including personal data, obtained as a result of any surveillance or interception of any communication is necessary to –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) prevent a reasonable threat to national security, defence or public order, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) prevent, investigate or prosecute a cognisable offence,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;an authorised officer may disclose the information, including personal data, to any authorised officer of any other competent organisation.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER VI&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Offences and penalties&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;43. Punishment for offences related to personal data. –&lt;/b&gt; (1) Whoever, except in conformity with the provisions of this Act, collects, receives, stores, processes or otherwise handles any personal data shall be punishable with imprisonment for a term which may extend to [___] years and may also be liable to fine which may extend to [___] rupees.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Whoever attempts to commit any offence under sub section (1) shall be punishable with the punishment provided for such offence under that sub-section.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Whoever, except in conformity with the provisions of this Act, collects, receives, stores, processes or otherwise handles any sensitive personal data shall be punishable with imprisonment for a term which may extend to [&lt;i&gt;increased for sensitive personal data&lt;/i&gt;] years and and may also be liable to fine which may extend to [___] rupees.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) Whoever attempts to commit any offence under sub section (3) shall be punishable with the punishment provided for such offence under that sub-section.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;44. Abetment and repeat offenders. –&lt;/b&gt; (1) Whoever abets any offence punishable under this Act shall, if the act abetted is committed in consequence of the abetment, be punishable with the punishment provided for that offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Whoever, having been convicted of an offence under any provision of this Act is again convicted of an offence under the same provision, shall be punishable, for the second and for each subsequent offence, with double the penalty provided for that offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;45. Offences by companies. –&lt;/b&gt; (1) Where an offence under this Act has been committed by a company, every person who, at the time of the offence was committed, was in charge of, and was responsible to, the company for the conduct of the business of the company, as well as the company shall be deemed to be guilty of the offence and shall be liable to be proceeded against and punished accordingly:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that nothing contained in this sub-section shall render any such person liable to any punishment, if he proves that the offence was committed without his knowledge or that he had exercised all due diligence to prevent the commission of such offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Notwithstanding anything contained in sub-section (1), where any offence under this Act has been committed by a company and it is proved that the offence has been committed with the consent or connivance of, or is attributable to any neglect on the part of any director, manager, secretary or other officer of the company, such director, manager, secretary or other officer shall be deemed to be guilty of that offence, and shall be liable to be proceeded against and punished accordingly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;46. Cognisance. –&lt;/b&gt; Notwithstanding anything contained in the Code of Criminal Procedure, 1973 (2 of 1974), the offences under section 43, section 44 and section 45 shall be cognisable and non-bailable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;47&lt;/b&gt;&lt;b&gt;. General penalty. –&lt;/b&gt; Whoever, in any case in which a penalty is not expressly provided by this Act, fails to comply with any notice or order issued under any provisions thereof, or otherwise contravenes any of the provisions of this Act, shall be punishable with fine which may extend to [___] rupees, and, in the case of a continuing failure or contravention, with an additional fine which may extend to [___] rupees for every day after the first during which he has persisted in such failure or contravention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;48&lt;/b&gt;&lt;b&gt;. Punishment to be without prejudice to any other action. –&lt;/b&gt; The award of punishment for an offence under this Act shall be without prejudice to any other action which has been or which may be taken under this Act with respect to such contravention.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER VII&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Miscellaneous&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 49. Power to make rules. –&lt;/b&gt; (1) The Central Government may, by notification in the Official Gazette, make rules to carry out the provisions of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) In particular, and without prejudice to the generality of the foregoing power, such rules may provide for –&lt;/p&gt;
&lt;p&gt;[__]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Every rule made under this section shall be laid, as soon as may be after it is made, before each House of Parliament while it is in session for a period of thirty days which may be comprised in one session or in two successive sessions and if before the expiry of the session in which it is so laid or the session immediately following, both Houses agree in making any modification in the rule, or both Houses agree that the rule should not be made, the rule shall thereafter have effect only in such modified form or be of no effect, as the case may be, so however, that any such modification or annulment shall be without prejudice to the validity of anything previously done under that rule.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 50. Bar of jurisdiction. –&lt;/b&gt; (1) On and from the appointed day, no court or authority shall have, or be entitled to exercise, any jurisdiction, powers or authority (except the Supreme Court and a High Court exercising powers under Article 32, Article 226 and Article 227 of the Constitution) in relation to matters specified in this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No order passed under this Act shall be appealable except as provided therein and no civil court shall have jurisdiction in respect of any matter which the Data Protection Authority is empowered by, or under, this Act to determine and no injunction shall be granted by any court or other authority in respect of any action taken or to be taken in pursuance of any power conferred by or under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 51. Protection of action taken in good faith. – &lt;/b&gt;No suit or other legal proceeding shall lie against the Central Government, State Government, Data Protection Authority, Chairperson, Member or any person acting under the direction either of the Central Government, State Government, Data Protection Authority, Chairperson or Member in respect of anything which is in good faith done or intended to be done in pursuance of this Act or of any rules or any order made thereunder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;52. Power to remove difficulties. –&lt;/b&gt; (1) If any difficulty arises in giving effect to the provisions of this Act, the Central Government may, by order, published in the Official Gazette, make such provisions, not inconsistent with the provisions of this Act, as appears to it to be necessary or expedient for removing the difficulty:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that no such order shall be made under this section after the expiry of a period of three years from the commencement of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;(2) Every order made under this section shall be laid, as soon as may be after it is made, before each House of Parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 53. Act to have overriding effect. – &lt;/b&gt;The provisions of this Act shall have effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft'&gt;https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-01T12:25:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy">
    <title>The National Cyber Security Policy: Not a Real Policy</title>
    <link>https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy</link>
    <description>
        &lt;b&gt;Cyber security in India is still a nascent field without an organised law and policy framework. Several actors participate in and are affected by India's still inchoate cyber security regime. The National Cyber Security Policy (NCSP) presented the government and other stakeholders with an opportune moment to understand existing legal limitations before devising a future framework. Unfortunately, the NCSP's poor drafting and meaningless provisions do not advance the field.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article was &lt;a class="external-link" href="http://orfonline.org/cms/sites/orfonline/html/cyber/cybsec1.html"&gt;published in the Observer Research Foundation's Cyber Security Monitor Vol. I, Issue.1, August 2013&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;For some time now, law and policy observers in India have been noticing a  definite decline in the quality of national policies emanating from the  Central Government. Unlike legislation, which is notionally subject to  debate in the Parliament of India, policies face no public evaluation  before they are brought in to force. Since, unlike legislation, policies  are neither binding nor enforceable, there has been no principled  ground for demanding public deliberation of significant national  policies. While Parliament’s falling standard of competence has been  almost unanimously condemned, there has been nearly no criticism of the  corresponding failure of the Centre to invigilate the quality of the  official policies of its ministries. Luckily for the drafters of the  National Cyber Security Policy (NCSP), the rest of the country has also  mostly failed to notice its poor content.&lt;br /&gt; &lt;br /&gt;The NCSP was notified into effect on 2 July 2013 by the Department  of Electronics and Information Technology – which calls itself DeitY –  of the Ministry of Communications and Information Technology. As far as  legislation and legal drafting go, DeitY has a dubious record. In March  2013, in a parliamentary appraisal of subordinate law framed by DeitY, a  Lok Sabha committee found ambiguity, invasions of privacy and  potentially illegal clauses. Apprehensions about statutory law  administered by DeitY have also found their way to the Supreme Court of  India, where a constitutional challenge to certain provisions of the  Information Technology Act, 2000 (IT Act) continues. On more than one  occasion, owing to poor drafting, DeitY has been forced to issue  advisories and press releases to clarify the meaning of its laws.  Ironically, the legal validity of these clarifications is also  questionable.&lt;br /&gt; &lt;br /&gt;A national policy must set out, in real and quantifiable terms, the  objectives of the government in a particular field within a specified  time frame. To do that, the policy must provide the social, economic,  political and legal context prevalent at the time of its issue as well  as a normative statement of factual conditions it seeks to achieve at  the time of its expiry. Between these two points in time, the policy  must identify and explain all the particular social, economic, political  and legal measures it intends to implement to secure its success.  Albeit concerned solely with economic growth, the Five-Year Plans – the  Second and Tenth Plans in particular, without prejudice to their success  or failure, are samples of policies that are well-drafted. In this  background, the NCSP should be judged on the basis of how it addresses,  in no particular order, national security, democratic freedoms, economic  growth and knowledge development. Let us restrict ourselves to the  first two issues.&lt;br /&gt; &lt;br /&gt;There are broadly two intersections between national security and  information technology; these are: (i) the security of networked  communications used by the armed forces and intelligence services, and  (ii) the storage of civil information of national importance. While the  NCSP makes no mention of it, the adoption of the doctrine of  network-centric warfare by the three armed forces is underway.  Understanding the doctrine is simple – an intensive use of information  technology to create networks of information aids situational awareness  and enables collaboration to bestow an advantage in combat. However, the  doctrine is vulnerable to asymmetric attack using both primitive and  highly sophisticated means. Pre-empting such attacks should be a primary  policy concern; not so, apparently, for the NCSP which is completely  silent on this issue. The NCSP is slightly more forthcoming on the  protection of critical information infrastructure of a civil nature.  Critical information infrastructure, such as the national power grid or  the Aadhar database, is narrowly defined in section 70 of the IT Act  where it used to describe a protected system. Other provisions of the IT  Act also deal with the protection of critical information  infrastructure. The NCSP does not explain how these statutory provisions  have worked or failed, as the case may be, to necessitate further  mention in a policy document. For instance, section 70A of the IT Act,  inserted in 2008, enables the creation of a national nodal agency to  undertake research and development and other activities in respect of  critical information infrastructure. Despite this, five years later, the  NCSP makes a similar recommendation to operate a National Critical  Information Infrastructure Protection Centre to undertake the same  activities. In the absence of any meaningful explanation of intended  policy measures, there is no reason to expect that the NCSP will succeed  where an Act of Parliament has failed.&lt;br /&gt; &lt;br /&gt;But, putting aside the shortcomings of its piece-meal provisions,  the NCSP also fails to address high-level conceptual policy concerns. As  information repositories and governance services through information  technology become increasingly integrated and centralised, the security  of the information that is stored or distributed decreases. Whether by  intent or error, if these consolidated repositories of information are  compromised, the quantity of information susceptible to damage is  greater leading to higher insecurity. Simply put, if power transmission  is centrally controlled instead of zonally, a single attack could black  out the entire country instead of only a part of it. Or if personal data  of citizens is centrally stored, a single leak could compromise the  privacy of millions of people instead of only hundreds. Therefore, a  credible policy must, before it advocates greater centralisation of  information, examine the merits of diffused information storage to  protect national security. The NCSP utterly fails in this regard.&lt;br /&gt; &lt;br /&gt;Concerns short of national security, such as the maintenance of law  and order, are also in issue because crime is often planned and  perpetrated using information technology. The prevention of crime before  it is committed and its prosecution afterwards is a key policy concern.  While the specific context may vary depending on the nature of the  crime – the facts of terrorism are different from those of insurance  fraud – the principles of constitutional and criminal law continue to  apply. However, the NCSP neither examines the present framework of  cybersecurity-related offences nor suggests any changes in existing law.  It merely calls for a “dynamic legal framework and its periodic review  to address the cyber security challenges” (sic). This is self-evident,  there was no need for a new national policy to make this discovery; and,  ironically, it fails to conduct the very periodic review that it  envisages. This is worrying because the NCSP presented DeitY with an  opportunity to review existing laws and learn from past mistakes. There  are concerns that cybersecurity laws, especially relevant provisions of  the IT Act and its rules, betray a lack of understanding of India’s  constitutional scheme. This is exemplified by the insertion, in 2008, of  section 66A into the IT Act that criminalises the sending of annoying,  offensive and inconvenient electronic messages without regard for the  fact that free speech that is annoying is constitutionally protected.&lt;br /&gt; &lt;br /&gt;In India, cybersecurity law and policy attempts to compensate for  the state’s inability to regulate the internet by overreaching into and  encroaching upon democratic freedoms. The Central Monitoring System  (CMS) that is being assembled by the Centre is a case in point. Alarmed  at its inability to be privy to private communications, the Centre  proposes to build systems to intercept, in real time, all voice and data  traffic in India. Whereas liberal democracies around the world require  such interceptions to be judicially sanctioned, warranted and supported  by probable cause, India does not even have statutory law to regulate  such an enterprise. Given that, once completed, the CMS will represent  the largest domestic interception effort in the world, the failure of  the NCSP to examine the effect of such an exercise on daily  cybersecurity is bewildering. This is made worse by the fact that the  state does not possess the technological competence to build such a  system by itself and is currently tendering private companies for  equipment. The state’s incompetence is best portrayed by the activities  of the Indian Computer Emergency Response Team (CERT-In) that was  constituted under section 70B of the IT Act to respond to “cyber  incidents”. CERT-In has repeatedly engaged in extra-judicial censorship  and has ham-handedly responded to allegedly objectionable blogs or  websites by blocking access to entire domains. Unfortunately, the NCSP,  while reiterating the operations of CERT-In, attempts no evaluation of  its activities precluding the scope for any meaningful policy measures.&lt;br /&gt; &lt;br /&gt;The NCSP’s poor drafting, meaningless provisions, deficiency of  analysis and lack of stated measures renders it hollow. Its notification  into force adds little to the public or intellectual debate about  cybersecurity and does nothing to further the trajectory of either  national security or democratic freedoms in India. In fairness, this  problem afflicts many other national policies. There is a need to  revisit the high intellectual and practical standards set by most  national policies that were issued in the years following Independence.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy'&gt;https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-25T09:49:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament">
    <title>The Central Monitoring System: Some Questions to be Raised in Parliament</title>
    <link>https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament</link>
    <description>
        &lt;b&gt;The following are some model questions to be raised in the Parliament regarding the lack of transparency in the central monitoring system.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Preliminary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The Central Monitoring System (CMS) is a Central Government project to intercept communications, both voice and data, that is transmitted via telephones and the internet to, from and within India. Owing to the vast nature of this enterprise, the CMS cannot be succinctly described and the many issues surrounding this project are diverse. This Issue Brief will outline preliminary constitutional, legal and technical concerns that are presented by the CMS.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;At the outset, it must be clearly understood that no public documentation exists to explain the scope, functions and technical architecture of the CMS. This lack of transparency is the single-largest obstacle to understanding the Central Government’s motives in conceptualising and operationalizing the CMS. This lack of public documentation is also the chief reason for the brevity of this Issue Note. Without making public the policy, law and technical abilities of the CMS, there cannot be an informed national debate on the primary concerns posed by the CMS, i.e the extent of envisaged state surveillance upon Indian citizens and the safeguards, if any, to protect the individual right to privacy. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Surveillance and Privacy&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Surveillance is necessary to secure political organisation. Modern nation-states, which are theoretically organised on the basis of shared national and societal characteristics, require surveillance to detect threats to these characteristics. In democratic societies, beyond the immediate requirements of national integrity and security, surveillance must be targeted at securing the safety and rights of individual citizens. This Issue Brief does not dispute the fact that democratic countries, such as India, should conduct surveillance to secure legitimate ends. Concerns, however, arise when surveillance is conducted in a manner unrestricted and unregulated by law; these concerns are compounded when a lack of law is accompanied by a lack of transparency.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Technological advancement leads to more intrusive surveillance. The evolution of surveillance in the United States resulted, in 1967, in the first judicial recognition of the right to privacy. In &lt;i&gt;Katz&lt;/i&gt; v. &lt;i&gt;United States&lt;/i&gt; the US Supreme Court ruled that the privacy of communications had to be balanced with the need to conduct surveillance; and, therefore, wiretaps had to be warranted, judicially sanctioned and supported by probable cause. &lt;i&gt;Katz&lt;/i&gt; expanded the scope of the Fourth Amendment of the US Constitution, which protected against unreasonable searches and seizures. Most subsequent US legal developments relating to the privacy of communications from surveillance originate in the &lt;i&gt;Katz&lt;/i&gt; judgement. Other common law countries, such as the United Kingdom and Canada, have experienced similar judicial evolution to recognise that the right to privacy must be balanced with governance.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;Right to Privacy in India&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Unfortunately, India does not have a persuasive jurisprudence of privacy protection. In the &lt;i&gt;Kharak Singh&lt;/i&gt; (1964) and &lt;i&gt;Gobind&lt;/i&gt; (1975) cases, the Supreme Court of India considered the question of privacy from physical surveillance by the police in and around the homes of suspects. In the latter case, the Supreme Court found that some of the Fundamental Rights “could be described as contributing to the right to privacy” which was nevertheless subject to a compelling public interest. This insipid inference held the field until 1994 when, in the &lt;i&gt;Rajagopal&lt;/i&gt; (“Auto Shankar”, 1994) case, the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty recognised by Article 21 of the Constitution. However, &lt;i&gt;Rajagopal&lt;/i&gt; dealt specifically with the publication of an autobiography, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case. While finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards which continue to be routinely ignored. A more robust statement of the right to privacy was made recently by the Delhi High Court in the &lt;i&gt;Naz &lt;/i&gt;&lt;i&gt;Foundation&lt;/i&gt; case (2011) that de-criminalised consensual homosexual acts; however, this judgment has been appealed to the Supreme Court.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Issues Pertaining to the CMS&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;While judicial protection from physical surveillance was cursorily dealt with in the &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; cases, the Supreme Court of India directly considered the issue of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case. Wiretaps in India primarily occur on the strength of powers granted to certain authorities under section 5(2) of the Indian Telegraph Act, 1885. The Court found that the Telegraph Act, and Rules made thereunder, did not prescribe adequate procedural safeguards to create a “just and fair” mechanism to conduct wiretaps. Therefore, it laid down the following procedure to conduct wiretaps: &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;(a) the order should be issued by the relevant Home Secretary (this power is delegable to a Joint Secretary),&lt;br /&gt; (b) the interception must be carried out exactly in terms of the order and not in excess of it,&lt;br /&gt; (c) a determination of whether the information could be reasonably secured by other means,&lt;br /&gt; (d) the interception shall cease after sixty (60) days.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Therefore, prima facie, any voice interception conducted through the CMS will be in violation of this Supreme Court judgement. The CMS will enforce blanket surveillance upon the entire country without regard for reasonable cause or necessity. This movement away from targeted surveillance to blanket surveillance without cause, conducted without statutory sanction and without transparency, is worrying.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accordingly, the following questions may be raised, in Parliament, to learn more about the CMS project: &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Which statutes, Government Orders, notifications etc deal with the establishment and maintenance of the CMS?&lt;/li&gt;
&lt;li&gt;Which is the nodal agency in charge of implementing the CMS?&lt;/li&gt;
&lt;li&gt;What are the powers and functions of the nodal agency?&lt;/li&gt;
&lt;li&gt;What guarantees exist to protect ordinary Indian citizens from intrusive surveillance without cause?&lt;/li&gt;
&lt;li&gt;What are the technical parameters of the CMS?&lt;/li&gt;
&lt;li&gt;What are the consequences for misuse or abuse of powers by any person working in the CMS project?&lt;/li&gt;
&lt;li&gt;What recourse is available to Indian citizens against whom there is unnecessary surveillance or against whom there has been a misuse or abuse of power?&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament'&gt;https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T10:30:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings">
    <title>The National Privacy Roundtable Meetings</title>
    <link>https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society ("CIS"), the Federation of Indian Chambers of Commerce and Industry ("FICCI"), the Data Security Council of India ("DSCI") and Privacy International are, in partnership, conducting a series of national privacy roundtable meetings across India from April to October 2013. The roundtable meetings are designed to discuss possible frameworks to privacy in India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Background: The Roundtable Meetings and Organisers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/"&gt;CIS&lt;/a&gt; is a Bangalore-based non-profit think-tank and research organisation with interests in, amongst other fields, the law, policy and practice of free speech and privacy in India. &lt;a href="http://www.ficci.com/"&gt;FICCI&lt;/a&gt; is a non-governmental, non-profit association of approximately 250,000 Indian bodies corporate. It is the oldest and largest organisation of businesses in India and represents a national corporate consensus on policy issues. &lt;a href="http://www.dsci.in/"&gt;DSCI&lt;/a&gt; is an initiative of the National Association of Software and Service Companies, a non-profit trade association of Indian information technology ("IT") and business process outsourcing ("BPO") concerns, which promotes data protection in India. &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt; is a London-based non-profit organisation that defends and promotes the right to privacy across the world.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy in the Common Law and in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Because privacy is a multi-faceted concept, it has rarely been singly regulated. A taxonomy of privacy yields many types of individual and social activity to be differently regulated based on the degree of harm that may be caused by intrusions into these activities.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nature of the activity is significant; activities that are implicated by the state are attended by public law concerns and those conducted by private persons &lt;i&gt;inter se&lt;/i&gt; demand market-based regulation. Hence, because the principles underlying warranted police surveillance differ from those prompting consensual collections of personal data for commercial purposes, legal governance of these different fields must proceed differently. For this and other reasons, the legal conception of privacy — as opposed to its cultural construction – has historically been diverse and disparate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditionally, specific legislations have dealt separately with individual aspects of privacy in tort law, constitutional law, criminal procedure and commercial data protection, amongst other fields. The common law does not admit an enforceable right to privacy.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; In the absence of a specific tort of privacy, various equitable remedies, administrative laws and lesser torts have been relied upon to protect the privacy of claimants.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question of whether privacy is a constitutional right has been the subject of limited judicial debate in India. The early cases of &lt;i&gt;Kharak Singh&lt;/i&gt; (1964)&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; and &lt;i&gt;Gobind&lt;/i&gt; (1975)&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; considered privacy in terms of physical surveillance by the police in and around the homes of suspects and, in the latter case, the Supreme Court of India found that some of the Fundamental Rights “could be described as contributing to the right to privacy” which was nevertheless subject to a compelling public interest. This inference held the field until 1994 when, in the &lt;i&gt;Rajagopal&lt;/i&gt; case (1994),&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty guaranteed by Article 21 of the Constitution of India. However, &lt;i&gt;Rajagopal&lt;/i&gt; dealt specifically with a book, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case (1996)&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; and, while finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards.&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;A more robust statement of the right to privacy was made recently by the Delhi High Court in the &lt;i&gt;Naz &lt;/i&gt;&lt;i&gt;Foundation&lt;/i&gt; case (2011)&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;that de-criminalised consensual homosexual acts; however, this judgment is now in appeal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Attempts to Create a Statutory Regime&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The silence of the common law leaves the field of privacy in India open to occupation by statute. With the recent and rapid growth of the Indian IT and BPO industry, concerns regarding the protection of personal data to secure privacy have arisen. In May 2010, the European Union ("EU") commissioned an assessment of the adequacy of Indian data protection laws to evaluate the continued flow of personal data of European data subjects into India for processing. That assessment made adverse findings on the adequacy and preparedness of Indian data protection laws to safeguard personal data.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Conducted amidst negotiations for a free trade agreement between India and the EU, the failed assessment potentially impeded the growth of India’s outsourcing industry that is heavily reliant on European and North American business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, the Department of Electronics and Information Technology of the Ministry of Communications and Information Technology, Government of India, issued subordinate legislation under the rule-making power of the Information Technology Act, 2000 ("IT Act"), to give effect to section 43A of that statute. These rules – the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 ("Personal Data Rules")&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; — were subsequently reviewed by the Committee on Subordinate Legislation of the 15&lt;sup&gt;th&lt;/sup&gt; Lok Sabha.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; The Committee found that the Personal Data Rules contained clauses that were ambiguous, invasive of privacy and potentially illegal.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, a draft privacy legislation called the ‘Right to Privacy Bill, 2011’, which was drafted within the Department of Personnel and Training ("DoPT") of the Ministry of Personnel, Public Grievances and Pensions, Government of India,  was made available on the internet along with several file notings ("First DoPT Bill"). The First DoPT Bill contained provisions for the regulation of personal data, interception of communications, visual surveillance and direct marketing. The First DoPT Bill was referred to a Committee of Secretaries chaired by the Cabinet Secretary which, on 27 May 2011, recommended several changes including re-drafts of the chapters relating to interception of communications and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aware of the need for personal data protection laws to enable economic growth, the Planning Commission constituted a Group of Experts under the chairmanship of Justice Ajit P. Shah, a retired Chief Justice of the Delhi High Court who delivered the judgment in the &lt;i&gt;Naz Foundation&lt;/i&gt; case, to study foreign privacy laws, analyse existing Indian legal provisions and make specific proposals for incorporation into future Indian law. The Justice Shah Group of Experts submitted its Report to the Planning Commission on 16 October 2012 wherein it proposed the adoption of nine National Privacy Principles.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; These are the principles of notice, choice and consent, collection limitation, purpose limitation, disclosure of information, security, openness, and accountability. The Report recommended the application of these principles in laws relating to interception of communications, video and audio recordings, use of personal identifiers, bodily and genetic material, and personal data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Criminal Procedure and Special Laws Relating to Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While the &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; cases first brought the questions of permissibility and limits of police surveillance to the Supreme Court, the power to collect information and personal data of a person is firmly embedded in Indian criminal law and procedure. Surveillance is an essential condition of the nation-state; the inherent logic of its foundation requires the nation-state to perpetuate itself by interdicting threats to its peaceful existence. Surveillance is a method by which the nation-state’s agencies interdict those threats. The challenge for democratic countries such as India is to find the optimal balance between police powers of surveillance and the essential freedoms of its citizens, including the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regime governing the interception of communications is contained in section 5(2) of the Indian Telegraph Act, 1885 ("Telegraph Act") read with rule 419A of the Indian Telegraph Rules, 1951 ("Telegraph Rules"). The Telegraph Rules were amended in 2007&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; to give effect to, amongst other things, the procedural safeguards laid down by the Supreme Court in the &lt;i&gt;PUCL&lt;/i&gt; case. However, India’s federal scheme permits States to also legislate in this regard. Hence, in addition to the general law on interceptions contained in the Telegraph Act and Telegraph Rules, some States have also empowered their police forces with interception functions in certain cases.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; Ironically, even though some of these State laws invoke heightened public order concerns to justify their invasions of privacy, they establish procedural safeguards based on the principle of probable cause that surpasses the Telegraph Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, further subordinate legislation issued to fulfil the provisions of sections 69(2) and 69B(3) of the IT Act permit the interception and monitoring of electronic communications — including emails — to collect traffic data and to intercept, monitor, and decrypt electronic communications.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The proposed Privacy (Protection) Bill, 2013 and Roundtable Meetings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In this background, the proposed Privacy (Protection) Bill, 2013 seeks to protect privacy by regulating (i) the manner in which personal data is collected, processed, stored, transferred and destroyed — both by private persons for commercial gain and by the state for the purpose of governance; (ii) the conditions upon which, and procedure for, interceptions of communications — both voice and data communications, including both data-in-motion and data-at-rest — may be conducted and the authorities permitted to exercise those powers; and, (iii) the manner in which forms of surveillance not amounting to interceptions of communications — including the collection of intelligence from humans, signals, geospatial sources, measurements and signatures, and financial sources — may be conducted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous roundtable meetings to seek comments and opinion on the proposed Privacy (Protection) Bill, 2013 took place at:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;New Delhi: April 13, 2013 (&lt;a class="external-link" href="http://bit.ly/17REl0W"&gt;http://bit.ly/17REl0W&lt;/a&gt;) with 45 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Bangalore: April 20, 2013 (&lt;a class="external-link" href="http://bit.ly/162t8rU"&gt;http://bit.ly/162t8rU&lt;/a&gt;) with 45 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Chennai: May 18, 2013 (&lt;a class="external-link" href="http://bit.ly/12ICGYD"&gt;http://bit.ly/12ICGYD&lt;/a&gt;) with 25 participants.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mumbai, June 15, 2013 (&lt;a class="external-link" href="http://bit.ly/12fJSvZ"&gt;http://bit.ly/12fJSvZ&lt;/a&gt;) with 20 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kolkata: July 13, 2013 (&lt;a class="external-link" href="http://bit.ly/11dgINZ"&gt;http://bit.ly/11dgINZ&lt;/a&gt;) with 25 participants; and&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;New Delhi: August 24, 2013 (&lt;a class="external-link" href="http://bit.ly/195cWIf"&gt;http://bit.ly/195cWIf&lt;/a&gt;) with 40 participants.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The roundtable meetings were multi-stakeholder events with participation from industry representatives, lawyers, journalists, civil society organizations and Government representatives. On an average, 75 per cent of the participants represented industry concerns, 15 per cent represented civil society and 10 per cent represented regulatory authorities. The model followed at the roundtable meetings allowed for equal participation from all participants.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See generally, Dan Solove, “A Taxonomy of Privacy” &lt;i&gt;University of Pennsylvania Law Review&lt;/i&gt; (Vol. 154, No. 3, January 2006).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office&lt;/i&gt; [2003] UKHL 53.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See &lt;i&gt;A&lt;/i&gt; v. &lt;i&gt;B plc&lt;/i&gt; [2003] QB 195; &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office &lt;/i&gt;[2001] EWCA Civ 2081; &lt;i&gt;R (Ellis)&lt;/i&gt; v. &lt;i&gt;Chief Constable of Essex Police&lt;/i&gt; [2003] EWHC 1321 (Admin).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of Uttar Pradesh&lt;/i&gt; AIR 1963 SC 1295.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;i&gt;Gobind&lt;/i&gt; v. &lt;i&gt;State of Madhya Pradesh&lt;/i&gt; AIR 1975 SC 1378.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;R. Rajagopal&lt;/i&gt; v. &lt;i&gt;State of Tamil Nadu&lt;/i&gt; AIR 1995 SC 264.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;i&gt;People’s Union for Civil Liberties&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; (1997) 1 SCC 30.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. A Division Bench of the Supreme Court of India comprising Kuldip Singh and Saghir Ahmad, JJ, found that the procedure set out in section 5(2) of the Indian Telegraph Act, 1885 and rule 419 of the Indian Telegraph Rules, 1951 did not meet the “just, fair and reasonable” test laid down in &lt;i&gt;Maneka Gandhi&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; AIR 1978 SC 597 requisite for the deprivation of the right to personal liberty, from whence the Division Bench found a right to privacy emanated, guaranteed under Article 21 of the Constitution of India. Therefore, Kuldip Singh, J, imposed nine additional procedural safeguards that are listed in paragraph 35 of the judgment.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;i&gt;Naz Foundation&lt;/i&gt; v. &lt;i&gt;Government of NCT Delhi&lt;/i&gt; (2009) 160 DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. The 2010 data adequacy assessment of Indian data protection laws was conducted by Professor Graham Greenleaf. His account of the process and his summary of Indian law can found at Graham Greenleaf, "Promises and Illusions of Data Protection in Indian Law"&lt;i&gt; International Data Privacy Law&lt;/i&gt; (47-69, Vol. 1, No. 1, March 2011).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The Rules were brought into effect vide Notification GSR 313(E) on 11 April 2011. CIS submitted comments on the Rules that can be found here – &lt;a href="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011"&gt;http://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. The Committee on Subordinate Legislation, a parliamentary ‘watchdog’ committee, is mandated by rules 317-322 of the Rules of Procedure and Conduct of Business in the Lok Sabha (14&lt;sup&gt;th&lt;/sup&gt; edn., New Delhi: Lok Sabha Secretariat, 2010) to examine the validity of subordinate legislation.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. See the 31&lt;sup&gt;st&lt;/sup&gt; Report of the Committee on Subordinate Legislation that was presented on 21 March 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. See paragraphs 7.14-7.17 on pages 69-72 of the Report of the Group of Experts on Privacy, 16 October 2012, Planning Commission, Government of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. See, the Indian Telegraph (Amendment) Rules, 2007, which were brought into effect &lt;i&gt;vide&lt;/i&gt; Notification GSR 193(E) of the Department of Telecommunications of the Ministry of Communications and Information Technology, Government of India, dated 1 March 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. See, &lt;i&gt;inter alia&lt;/i&gt;, section 14 of the Maharashtra Control of Organised Crime Act, 1999; section 14 of the Andhra Pradesh Control of Organised Crime Act, 2001; and, section 14 of the Karnataka Control of Organised Crime Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. See, the Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data and Information) Rules, 2009 vide GSR 782 (E) dated 27 October 2009; and, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 vide GSR 780 (E) dated 27 October 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings'&gt;https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-21T10:03:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
