<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 21 to 31.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-motor-vehicle-rules"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra">
    <title>An Analysis of the Cases Filed under Section 46 of the Information Technology Act, 2000  for Adjudication in the State of Maharashtra</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra</link>
    <description>
        &lt;b&gt;This is a brief review of some of the cases related to privacy filed under section 46 of the Information Technology Act, 2000 ("the Act") seeking adjudication for alleged contraventions of the Act in the State of Maharashtra. &lt;/b&gt;
        &lt;h3&gt;Background&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 46 of the Act grants the Central Government the power to appoint an adjudicating officer to hold an enquiry to adjudge, upon complaints being filed before that adjudicating officer, contraventions of the Act. The adjudicating officer may be of the Central Government or of the State Government [see section 46(1) of the Act], must have field experience with information technology and law [see section 46(3) of the Act] and exercises jurisdiction over claims for damages up to `5,00,00,000 [see section 46(1A) of the Act]. For the purpose of adjudication, the officer is vested with certain powers of a civil court [see section 46(5) of the Act] and must follow basic principles of natural justice while conducting adjudications [see section 46(2) of the Act]. Hence, the adjudicating officer appointed under section 46 is a quasi-judicial authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, the quasi-judicial adjudicating officer may impose penalties, thereby vesting him with some of the powers of a criminal court [see section 46(2) of the Act], and award compensation, the quantum of which is to be determined after taking into account factors including unfair advantage, loss and repeat offences [see section 47 of the Act]. The adjudicating officer may impose penalties for any of the offences described in section 43, section 44 and section 45 of the Act; and, further, may award compensation for losses suffered as a result of contraventions of section 43 and section 43A. The text of these sections is reproduced in the Schedule below. Further law as to the appointment of the adjudicating officer and the procedure attendant on all adjudications was made by Information Technology (Qualification and Experience of Adjudicating Officers and the Manner of Holding Enquiry) Rules, 2003.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that the adjudicating officer is vested with significant judicial powers, including the power to enforce certain criminal penalties, and is an important quasi-judicial authority.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Excursus&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the outset, it is important to understand the distinction between compensation and damages. Compensation is a sum of money awarded by a civil court, before or along with the primary decree, to indemnify a person for injury or loss. It is usually awarded to a person who has a suffered a monetary loss as a result of the acts or omissions of another party. Its quantification is usually guided by principles of equity. [See &lt;i&gt;Shantilal Mangaldas&lt;/i&gt; AIR 1969 SC 634 and &lt;i&gt;Ranbir Kumar Arora&lt;/i&gt; AIR 1983 P&amp;amp;H 431]. On the hand, damages are punitive and, in addition to restoring an indemnitee to wholeness, may be imposed to deter an offender, punish exemplary offences, and recover consequential losses, amongst other objectives. Damages that are punitive, while not judicially popular in India, are usually imposed by a criminal court in common law jurisdictions. They are distinct from civil and equitable actions. [See the seminal case of &lt;i&gt;The Owners of the Steamship Mediana&lt;/i&gt; [1900] AC 113 (HL)].&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, section 46 of the Act uses the terms “damage”, “injury” and “compensation” interchangeably without regard for the long and rich jurisprudence that finds them to be different concepts.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Cases related to Privacy&lt;/h3&gt;
&lt;p&gt;In the State of Maharashtra, there have been a total of 47 cases filed under section 46 of the Act. Of these, 33 cases have been disposed of by the Adjudicating Officer and 14 are currently pending disposal. &lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; At least three of these cases before the Adjudicating Officer deal with issues related to privacy of communications and personal data. They are:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Case Title&lt;/th&gt;&lt;th&gt;Forum&lt;/th&gt;&lt;th&gt;Date&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Vinod Kaushik&lt;/i&gt; v. &lt;i&gt;Madhvika Joshi&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio Secretary&lt;/i&gt;, IT&lt;br /&gt;Government of Maharashtra&lt;/td&gt;
&lt;td&gt;10.10.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Amit D. Patwardhan&lt;/i&gt; v. &lt;i&gt;Rud India Chains&lt;/i&gt;&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio&lt;/i&gt;&lt;br /&gt;Secretary, IT&lt;br /&gt;Government of Maharashtra&lt;/td&gt;
&lt;td&gt;15.04.2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; v. &lt;i&gt;Minal Bagherwal&lt;/i&gt;&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio Secretary&lt;/i&gt;, IT&lt;br /&gt;Government of Maharashtra&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;26.08.2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In all three cases the Adjudicating Officer was called upon to determine and penalise unauthorised access to personal data of the complainants. In the &lt;i&gt;Vinod Kaushik&lt;/i&gt; case, the complainants’ emails and chat sessions were accessed, copied and made available to the police for legal proceedings without the permission of the complainants. In the &lt;i&gt;Amit Patwardhan&lt;/i&gt; and &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; cases, the complainants’ financial information in the form of bank account statements were obtained from their respective banks without their consent and used against them in legal proceedings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Vinod Kaushik&lt;/i&gt; complaint was filed in 2010 for privacy violations committed between 2008 and 2009. The complaint was made against the complainant’s daughter-in-law – the respondent, who was estranged from her husband, the complainant’s son. The respondent had, independent of the proceedings before the Adjudicating Officer, instituted criminal proceedings alleging cruelty and dowry-related harassment against her estranged husband and the complainant. To support some of the claims made in the criminal proceedings, the respondent accessed the email accounts of her estranged husband and the complainant and printed copies of certain communications, both emails and chat transcripts. The complaint to the Adjudicating Officer was made in relation to these emails and chat transcripts that were obtained without the consent and knowledge of the complainant and his son. On 09.08.2010, the then Adjudicating Officer dismissed the complaint after finding that, owing to the marriage between the respondent and the complainant’s son, there was a relation of mutual trust between them that resulted in the complainant and his son consensually sharing their email account passwords with the respondent. This ruling was appealed to the Cyber Appellate Tribunal (&lt;b&gt;"CyAT"&lt;/b&gt;) which, in a decision of 29.06.2011, found irregularities in the complainant’s son’s privity to the proceedings and remanded the complaint to the Adjudicating Officer for re-adjudication. The re-adjudication, which was conducted by Shri Rajesh Aggarwal as Adjudicating Officer, resulted in a final order of 10.10.2011 (&lt;b&gt;"the final order"&lt;/b&gt;) that is the subject of this analysis. The final order found that the respondent had violated the privacy of the complainant and his son by her unauthorised access of their email accounts and sharing of their private communications. However, the Adjudicating Officer found that the intent of the unauthorised access – to obtain evidence to support a criminal proceeding – was mitigatory and hence ordered the respondent to pay only a small token amount in compensation, not to the complainants but instead to the State Treasury. The Delhi High Court, which was moved in appeal because the CyAT was non-functional, upheld the final order in its decision of 27.01.2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Amit Patwardhan&lt;/i&gt; complaint was filed against the complainant’s ex-employer – the respondent, for illegally obtaining copies of the complainant’s bank account statement. The complainant had left the employ of the respondent to work with a competing business company but not before colluding with the competing business company and diverting the respondent’s customers to them. For redress, the respondent filed suit for a decree of compensation and lead the complainant’s bank statements in evidence to prove unlawful gratification. Since the bank statements were obtained electronically by the respondent without the complainant’s consent, the jurisdiction of the Adjudicating Officer was invoked. In his order of 15.04.2013, Shri Rajesh Aggarwal, the Adjudicating Officer, found that the respondent had, by unlawfully obtaining the complainant’s bank account statements which constitute sensitive personal data, violated the complainant’s privacy. The Adjudicating Officer astutely applied the equitable doctrine of clean hands to deny compensation to the complainant; however, because the complainant’s bank was not a party to the complaint, the Adjudicating Officer was unable to make a ruling on the lack of action by the bank to protect the sensitive personal data of its depositors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; complaint bears a few similarities to the preceding two cases. Like the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter, the issue concerned the manner in which a wife, estranged but still legally married, accessed electronic records of personal data of the complainants; and, like the &lt;i&gt;Amit Patwardhan&lt;/i&gt; matter, the object of the privacy violation was the bank account statements of the complainants that constitute sensitive personal data. The respondent was the estranged wife of one of the complainants who, along with his complainant father, managed the third complainant company. To support her claim for maintenance from the complainant and his family in an independent legal proceeding, the respondent obtained certain bank account statements of the complainants without their consent and, possibly, with the collusion of the respondent bank. After reviewing relevant law from the European Union and the United States, and observant of relevant sectoral regulations applicable in India including the relevant Master Circular of the Reserve Bank of India, and further noting preceding consumer case law on the subject, the Adjudicating Officer issued an order on 26.08.2013. The order found that the complainant’s right to privacy was violated by both the respondents but, while determining the quantum of compensation, distinguished between the respondents in respect of the degree of liability; the respondent wife was ordered to pay a token compensation amount while the respondent bank was ordered to pay higher compensation to each of the three complainants individually.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The high quality of each of the three orders bears specific mention. Despite the superb quality of the judgments of the Indian higher judiciary in the decades after independence, the overall quality of judgment-writing appears to have declined. &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; In the last decade, several Indian judges have called for higher standards of judgment writing from their fellow judges. &lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In this background, it is notable that Shri Rajesh Aggarwal, despite not being a member of the judiciary, has delivered well-reasoned, articulate and clear orders that are cognisant of legal issues and also easily understandable to a non-legal reader.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In each of these cases, the Adjudicating Officer has successfully navigated around the fact that none of the primary parties were interacting and transacting at arm’s length. In the &lt;i&gt;Vinod Kaushik&lt;/i&gt; and &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; matters, the primary parties were estranged but still legally married partners and in the &lt;i&gt;Amit Patwardhan&lt;/i&gt; matter the parties were in an employer-employee relationship. The first Adjudicating Officer in the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter failed, in his order of 09.08.2010, to appreciate that the individual communications of individual persons were privileged by an expectation of privacy, regardless of their relationship. Hence, despite acknowledging that the marital partners in that matter were in conflict with each other, and despite being told by one party that the other party’s access to those private communications was made without consent, the Adjudicating Officer allowed his non-judicial opinion of marriage to influence his order. This mistake was corrected when the matter was remanded for re-adjudication. In the re-adjudication, the new Adjudicating Officer correctly noted that the respondent wife could have chosen to approach the police or a court to follow the proper investigative procedure for accessing emails and other private communications of another person and that her unauthorised use of the complainant’s passwords amounted to a violation of their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Popular conceptions of different types of relationships may affect the (quasi) judicial imagination of privacy. In comparison to the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter, the &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; and &lt;i&gt;Amit Patwardhan&lt;/i&gt; matters both dealt with unauthorised access to bank account statements, by a wife and by an ex-employer respectively. In any event, the same Adjudicating Officer presided over all three matters and correctly found that the facts in all three matters admitted to contraventions of the privacy of the complainants. The conjecture as to whether the first Adjudicating Officer in the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter would have applied the same standard of family unity to unauthorised access of bank account statements by an estranged wife who was seeking maintenance remains untested. However, the reliance placed on the decision of the Delhi State Consumer Protection Commission in the matter of &lt;i&gt;Rupa Mahajan Pahwa,&lt;/i&gt; &lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; where the Commission found that unauthorised access to a bank pass book by an estranged husband violated the privacy of the wife, would suggest that judges clothe financial information with a standard of privacy higher than that given to emails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emails are a form of electronic communication. The &lt;i&gt;PUCL&lt;/i&gt; case (Supreme Court of India, 1996)&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; while it did not explicitly deal with the standard of protection accorded to emails, held that personal communications were protected by an individual right to privacy that emanated from the protection of personal liberty guaranteed under Article 21 of the Constitution of India. Following the &lt;i&gt;Maneka Gandhi&lt;/i&gt; case (Supreme Court of India, 1978)&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;it is settled that persons may be deprived of their personal liberty only by a just, fair and reasonable procedure established by law. As a result, interceptions of private communications that are protected by Article 21 may only be conducted in pursuance of such a procedure. This procedure exists in the form of the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 that came into effect on 27 October 2009 (&lt;b&gt;"the Interception Rules"&lt;/b&gt;). The Interception Rules set out a regime for accessing private emails in certain conditions. The powers and procedure of Section 91 of the Code of Criminal Procedure (&lt;b&gt;"CrPC")&lt;/b&gt; may also apply to obtain data at rest, such as emails stored in an inbox or sent-mail folder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, the orders of the Adjudicating Officer reveal a well-reasoned and progressive understanding of the law and principles relating to the quantification of compensation. By choosing to impose larger amounts of compensation on the bank that violated the privacy of the complainant in the &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; matter, the Adjudicating Officer has indicated that the institutions that hold sensitive personal data, such as financial information, are subject to a higher duty of care in relation of it. But, most importantly, the act of imposing monetary compensation of privacy violations is a step forward because, for the first time in India, it recognises that privacy violations are civil wrongs or injuries that demand compensation.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. These Rules were issued &lt;i&gt;vide&lt;/i&gt; GSR 220(E), dated 17 March 2003 and published in the Gazette of India, Extraordinary, Part II, Section 3(i). These Rules can be accessed here – &lt;a href="http://it.maharashtra.gov.in/PDF/Qual_ExpAdjudicatingOfficer_Manner_of_Holding_Enquiry_Rules.PDF"&gt;http://it.maharashtra.gov.in/PDF/Qual_ExpAdjudicatingOfficer_Manner_of_Holding_Enquiry_Rules.PDF&lt;/a&gt; (visited on 30 September 2013).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. These cases and statistics may be viewed here – &lt;a href="http://it.maharashtra.gov.in/1089/IT-Act-Judgements"&gt;http://it.maharashtra.gov.in/1089/IT-Act-Judgements&lt;/a&gt; (visited on 30 September 2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See generally, Upendra Baxi “"The Fair Name of Justice": The Memorable Voyage of Chief Justice Chandrachud” in &lt;i&gt;A Chandrachud Reader&lt;/i&gt; (Justice V. S. Deshpande ed., Delhi: Documentation Centre &lt;i&gt;etc.&lt;/i&gt;, 1985) and, Rajeev Dhavan, "Judging the Judges" in &lt;i&gt;Judges and the Judicial Power: Essays in Honour of Justice V. R. Krishna Iyer&lt;/i&gt; (Rajeev Dhavan and Salman Khurshid eds., London: Sweet &amp;amp; Maxwell, 1985).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. See generally, Justice B.G .Harindranath, &lt;i&gt;Art of Writing Judgments&lt;/i&gt; (Bangalore: Karnataka Judicial Academy, 2004); Justice T .S. Sivagnanam, &lt;i&gt;The Salient Features of the Art of Writing Orders and Judgments&lt;/i&gt; (Chennai: Tamil Nadu State Judicial Academy, 2010); and, Justice Sunil Ambwani, “Writing Judgments: Comparative Models” Presentation at the National Judicial Academy, Bhopal (2006) available here – &lt;a href="http://districtcourtallahabad.up.nic.in/articles/writing%20judgment.pdf"&gt;http://districtcourtallahabad.up.nic.in/articles/writing%20judgment.pdf&lt;/a&gt; (visited on 29 Sep 2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Appeal No. FA-2008/659 of the Delhi State Consumer Protection Commission, decided on 16 October 2008.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. (1997) 1 SCC 301.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. (1978) 1 SCC 248.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra'&gt;https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-01T15:29:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft">
    <title>Privacy (Protection) Bill, 2013: Updated Third Draft</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has been researching privacy in India since 2010 with the objective of raising public awareness around privacy, completing in depth research, and driving a privacy legislation in India. As part of this work, we drafted the Privacy (Protection) Bill, 2013. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;i&gt;This research is being undertaken as part of the 'SAFEGUARDS' project that CIS is doing with Privacy International and IDRC. &lt;/i&gt;The following is the latest version with changes based on the Round Table held on August 24:&lt;/p&gt;
&lt;hr /&gt;
&lt;p align="center"&gt;&lt;b&gt;[Preamble]&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER I&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Preliminary&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Short title, extent and commencement. –&lt;/b&gt; (1)&lt;b&gt; &lt;/b&gt;This Act may be called the Privacy (Protection) Act, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) It extends to the whole of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) It shall come into force on such date as the Central Government may, by notification in the Official Gazette, appoint.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. Definitions. –&lt;/b&gt; In this Act and in any rules made thereunder, unless the context otherwise requires, –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) “anonymise” means, in relation to personal data, the removal of all data that may, whether directly or indirectly in conjunction with any other data, be used to identify the data subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) “appropriate government” means, in relation the Central Government or a Union Territory Administration, the Central Government; in relation a State Government, that State Government; and, in relation to a public authority which is established, constituted, owned, controlled or substantially financed by funds provided directly or indirectly –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) by the Central Government or a Union Territory Administration, the Central Government;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) by a State Government, that State Government;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) “authorised officer” means an officer, not below the rank of a Gazetted Officer, of an All India Service or a Central Civil Service, as the case may be, who is empowered by the Central Government, by notification in the Official Gazette, to intercept a communication of another person or carry out surveillance of another person under this Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) “biometric data” means any data relating to the physical, physiological or behavioural characteristics of a person which allow their unique identification including, but not restricted to, facial images, finger prints, hand prints, foot prints, iris recognition, hand writing, typing dynamics, gait analysis and speech recognition;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) “Chairperson” and “Member” mean the Chairperson and Member appointed under sub-section (1) of section 17;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) “collect”, with its grammatical variations and cognate expressions, means, in relation to personal data, any action or activity that results in a data controller obtaining, or coming into the possession or control of, any personal data of a data subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) “communication” means a word or words, spoken, written or indicated, in any form, manner or language, encrypted or unencrypted, meaningful or otherwise, and includes visual representations of words, ideas, symbols and images, whether transmitted or not transmitted and, if transmitted, irrespective of the medium of transmission;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(h) “competent organisation” means an organisation or public authority listed in the Schedule;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) “data controller” means a person who, either alone or jointly or in concert with other persons, determines the purposes for which and the manner in which any personal data is processed;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(j) “data processor” means any person who processes any personal data on behalf of a data controller;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(k) “Data Protection Authority” means the Data Protection Authority constituted under sub-section (1) of section 17;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;(l) “data subject” means a person who is the subject of personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(m) “deoxyribonucleic acid data” means all data, of whatever type, concerning the characteristics of a person that are inherited or acquired during early prenatal development;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(n) “destroy”, with its grammatical variations and cognate expressions, means, in relation to personal data, to cease the existence of, by deletion, erasure or otherwise, any personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(o) “disclose”, with its grammatical variations and cognate expressions, means, in relation to personal data, any action or activity that results in a person who is not the data subject coming into the possession or control of that personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(p) “intelligence organisation” means an intelligence organisation under the Intelligence Organisations (Restriction of Rights) Act, 1985 (58 of 1985);&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(q) “interception” or “intercept” means any activity intended to capture, read, listen to or understand the communication of a person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(r) “personal data” means any data which relates to a natural person if that person can, whether directly or indirectly in conjunction with any other data, be identified from it and includes sensitive personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(s) “prescribed” means prescribed by rules made under this Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(t) “process”, with its grammatical variations and cognate expressions, means, in relation to personal data, any action or operation which is performed upon personal data, whether or not by automated means including, but not restricted to, organisation, structuring, adaptation, modification, retrieval, consultation, use, alignment or destruction;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(u) “receive”, with its grammatical variations and cognate expressions, means, in relation to personal data, to come into the possession or control of any personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) “sensitive personal data” means personal data as to the data subject’s –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) biometric data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) deoxyribonucleic acid data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) sexual preferences and practices;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) medical history and health;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) political affiliation;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) commission, or alleged commission, of any offence;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vii) ethnicity, religion, race or caste; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(viii) financial and credit information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(w) “store”, with its grammatical variations and cognate expressions, means, in relation to personal data, to retain, in any form or manner and for any purpose or reason, any personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(x) “surveillance” means any activity intended to watch, monitor, record or collect, or to enhance the ability to watch, record or collect, any images, signals, data, movement, behaviour or actions, of a person, a group of persons, a place or an object, for the purpose of obtaining information of a person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;and all other expressions used herein shall have the meanings ascribed to them under the General Clauses Act, 1897 (10 of 1897) or the Code of Criminal Procedure, 1973 (2 of 1974), as the case may be.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER II&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Regulation of Personal Data&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Regulation of personal data. – &lt;/b&gt;Notwithstanding anything contained in any other law for time being in force, no person shall collect, store, process, disclose or otherwise handle any personal data of another person except in accordance with the provisions of this Act and any rules made thereunder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. Exemption. –&lt;/b&gt; Nothing in this Act shall apply to the collection, storage, processing or disclosure of personal data for personal or domestic use.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER III&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Protection of Personal Data&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Regulation of collection of personal data. –&lt;/b&gt; (1) No personal data of a data subject shall be collected except in conformity with section 6 and section 7.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No personal data of a data subject may be collected under this Act unless it is necessary for the achievement of a purpose of the person seeking its collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Subject to section 6 and section 7, no personal data may be collected under this Act prior to the data subject being given notice, in such and form and manner as may be prescribed, of the collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. Collection of personal data with prior informed consent. –&lt;/b&gt; (1) Subject to sub-section (2), a person seeking to collect personal data under this section shall, prior to its collection, obtain the consent of the data subject.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Prior to a collection of personal data under this section, the person seeking its collection shall inform the data subject of the following details in respect of his personal data, namely: –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) when it will be collected;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) its content and nature;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) the purpose of its collection;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) the manner in which it may be accessed, checked and modified;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) the security practices, privacy policies and other policies, if any, to which it will be subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) the conditions and manner of its disclosure; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) the procedure for recourse in case of any grievance in relation to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Consent to the collection of personal data under this section may be obtained from the data subject in any manner or medium but shall not be obtained as a result of a threat, duress or coercion:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that the data subject may, at any time after his consent to the collection of personal data has been obtained, withdraw the consent for any reason whatsoever and all personal data collected following the original grant of consent shall be destroyed forthwith:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that the person who collected the personal data in respect of which consent is subsequently withdrawn may, if the personal data is necessary for the delivery of any good or the provision of any service, not deliver that good or deny that service to the data subject who withdrew his grant of consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. Collection of personal data without prior consent. – &lt;/b&gt;Personal data may be collected without the prior consent of the data subject if it is –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) necessary for the provision of an emergency medical service to the data subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) required for the establishment of the identity of the data subject and the collection is authorised by a law in this regard;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) necessary to prevent a reasonable threat to national security, defence or public order; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) necessary to prevent, investigate or prosecute a cognisable offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. Regulation of storage of personal data. –&lt;/b&gt; (1) No person shall store any personal data for a period longer than is necessary to achieve the purpose for which it was collected or received, or, if that purpose is achieved or ceases to exist for any reason, for any period following such achievement or cessation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Save as provided in sub-section (3), any personal data collected or received in relation to the achievement of a purpose shall, if that purpose is achieved or ceases to exist for any reason, be destroyed forthwith.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Notwithstanding anything contained in this section, any personal data may be stored for a period longer than is necessary to achieve the purpose for which it was collected or received, or, if that purpose has been achieved or ceases to exist for any reason, for any period following such achievement or cessation, if –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the data subject grants his consent to such storage prior to the purpose for which it was collected or received being achieved or ceasing to exist;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) it is adduced for an evidentiary purpose in a legal proceeding; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) it is required to be stored under the provisions of an Act of Parliament:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that only that amount of personal data that is necessary to achieve the purpose of storage under this sub-section shall be stored and any personal data that is not required to be stored for such purpose shall be destroyed forthwith:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided further that any personal data stored under this sub-section shall, to the extent possible, be anonymised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9. Regulation of processing of personal data. –&lt;/b&gt; (1) No person shall process any personal data that is not necessary for the achievement of the purpose for which it was collected or received.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Save as provided in sub-section (3), no personal data shall be processed for any purpose other than the purpose for which it was collected or received.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Notwithstanding anything contained in this section, any personal data may be processed for a purpose other than the purpose for which it was collected or received if –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the data subject grants his consent to the processing and only that amount of personal data that is necessary to achieve the other purpose is processed;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) it is necessary to perform a contractual duty to the data subject;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) it is necessary to prevent a reasonable threat to national security, defence or public order; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) it necessary to prevent, investigate or prosecute a cognisable offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10. Transfer of personal data for processing. –&lt;/b&gt; (1) Subject to the provisions of this section, personal data that has been collected in conformity with this Act may be transferred by a data controller to a data processor, whether located in India or otherwise, if the transfer is pursuant to an agreement that explicitly binds the data processor to same or stronger measures in respect of the storage, processing, destruction, disclosure and other handling of the personal data as are contained in this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No data processor shall process any personal data transferred under this section except to achieve the purpose for which it was collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) A data controller that transfers personal data under this section shall remain liable to the data subject for the actions of the data processor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11. Security of personal data and duty of confidentiality. –&lt;/b&gt; (1) No person shall collect, receive, store, process or otherwise handle any personal data without implementing measures, including, but not restricted to, technological, physical and administrative measures, adequate to secure its confidentiality, secrecy, integrity and safety, including from theft, loss, damage or destruction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Data controllers and data processors shall be subject to a duty of confidentiality and secrecy in respect of personal data in their possession or control.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Without prejudice to the provisions of this section, a data controller or data processor shall, if the confidentiality, secrecy, integrity or safety of personal data in its possession or control is violated by theft, loss, damage or destruction, or as a result of any disclosure contrary to the provisions of this Act, or for any other reason whatsoever, notify the data subject, in such form and manner as may be prescribed, forthwith.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12. Regulation of disclosure of personal data. –&lt;/b&gt; Subject to section 10, section 13 and section 14, no person shall disclose, or otherwise cause any other person to receive, the content or nature of any personal data that has been collected in conformity with this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13. Disclosure of personal data with prior informed consent. – &lt;/b&gt;(1) Subject to sub-section (2), a data controller or data processor seeking to disclose personal data under this section shall, prior to its disclosure, obtain the consent of the data subject.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Prior to a disclosure of personal data under this section, the data controller or data processor, as the case may be, seeking to disclose the personal data, shall inform the data subject of the following details in respect of his personal data, namely: –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) when it will be disclosed;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the purpose of its disclosure;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) the security practices, privacy policies and other policies, if any, that will protect it; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) the procedure for recourse in case of any grievance in relation to it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14. Disclosure of personal data without prior consent. –&lt;/b&gt; (1) Subject to sub-section (2), personal data may be disclosed without the prior consent of the data subject if it is necessary –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) to prevent a reasonable threat to national security, defence or public order; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) to prevent, investigate or prosecute a cognisable offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No data controller or data processor shall disclose any personal data unless it has received an order in writing from a police officer not below the rank of [___] in such form and manner as may be prescribed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that an order for the disclosure of personal data made under this sub-section shall not require the disclosure of any personal data that is not necessary to achieve the purpose for which the disclosure is sought:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided further that the data subject shall be notified, in such form and manner as may be prescribed, of the disclosure of his personal data, including details of its content and nature, and the identity of the police officer who ordered its disclosure, forthwith.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;15. Quality and accuracy of personal data. –&lt;/b&gt; (1) Each data controller and data processor shall, to the extent possible, ensure that the personal data in its possession or control, is accurate and, where necessary, is kept up to date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No data controller or data processor shall deny a data subject whose personal data is in its possession or control the opportunity to review his personal data and, where necessary, rectify anything that is inaccurate or not up to date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) A data subject may, if he finds personal data in the possession or control of a data controller or data processor that is not necessary to achieve the purpose for which it was collected, received or stored, demand its destruction, and the data controller shall destroy, or cause the destruction of, the personal data forthwith.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;16. Special provisions for sensitive personal data. –&lt;/b&gt; Notwithstanding anything contained in this Act and the provisions of any other law for the time being in force –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) no person shall store sensitive personal data for a period longer than is necessary to achieve the purpose for which it was collected or received, or, if that purpose has been achieved or ceases to exist for any reason, for any period following such achievement or cessation;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) no person shall process sensitive personal data for a purpose other than the purpose for which it was collected or received;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) no person shall disclose sensitive personal data to another person, or otherwise cause any other person to come into the possession or control of, the content or nature of any sensitive personal data, including any other details in respect thereof.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER IV&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;The Data Protection Authority&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;17.&lt;/b&gt; &lt;b&gt;Constitution of the Data Protection Authority. –&lt;/b&gt; (1) The Central Government shall, by notification, constitute, with effect from such date as may be specified therein, a body to be called the Data Protection Authority consisting of a Chairperson and not more than four other Members, to exercise the jurisdiction and powers and discharge the functions and duties conferred or imposed upon it by or under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Chairperson shall be a person who has been a Judge of the Supreme Court:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that the appointment of the Chairperson shall be made only after consultation with the Chief Justice of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Each Member shall be a person of ability, integrity and standing who has a special knowledge of, and professional experience of not less than ten years in privacy law and policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;18. Term of office, conditions of service, etc. of Chairperson and Members. – &lt;/b&gt;(1) Before appointing any person as the Chairperson or Member, the Central Government shall satisfy itself that the person does not, and will not, have any such financial or other interest as is likely to affect prejudicially his functions as such Chairperson or Member.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Chairperson and every Member shall hold office for such period, not exceeding five years, as may be specified in the order of his appointment, but shall be eligible for reappointment:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that no person shall hold office as the Chairperson or Member after he has attained the age of sixty-seven years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Notwithstanding anything contained in sub-section (2), the Chairperson or any Member may –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) by writing under his hand resign his office at any time;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) be removed from office in accordance with the provisions of section 19 of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) A vacancy caused by the resignation or removal of the Chairperson or Member under sub-section (3) shall be filled by fresh appointment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(5) In the event of the occurrence of a vacancy in the office of the Chairperson, such one of the Members as the Central Government may, by notification, authorise in this behalf, shall act as the Chairperson till the date on which a new Chairperson, appointed in accordance with the provisions of this Act, to fill such vacancy, enters upon his office.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(6) When the Chairperson is unable to discharge his functions owing to absence, illness or any other cause, such one of the Members as the Chairperson may authorise in writing in this behalf shall discharge the functions of the Chairperson, till the date on which the Chairperson resumes his duties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(7) The salaries and allowances payable to and the other terms and conditions of service of the Chairperson and Members shall be such as may be prescribed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that neither the salary and allowances nor the other terms and conditions of service of the Chairperson and any member shall be varied to his disadvantage after his appointment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;19. Removal of Chairperson and Members from office in certain circumstances. – &lt;/b&gt;The Central Government may remove from office the Chairperson or any Member, who –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) is adjudged an insolvent; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) engages during his term of office in any paid employment outside the duties of his office; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) is unfit to continue in office by reason of infirmity of mind or body; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) is of unsound mind and stands so declared by a competent court; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) is convicted for an offence which in the opinion of the President involves moral turpitude; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) has acquired such financial or other interest as is likely to affect prejudicially his functions as a Chairperson or Member, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) has so abused his position as to render his continuance in offence prejudicial to the public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;20. Functions of the Data Protection Authority. –&lt;/b&gt; (1) The Chairperson may inquire, &lt;i&gt;suo moto&lt;/i&gt; or on a petition presented to it by any person or by someone acting on his behalf, in respect of any matter connected with the collection, storage, processing, disclosure or other handling of any personal data and give such directions or pass such orders as are necessary for reasons to be recorded in writing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Without prejudice to the generality of the foregoing provision, the Data Protection Authority shall perform all or any of the following functions, namely –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) review the safeguards provided by or under this Act and other law for the time being       in force for the protection of personal data and recommend measures for their effective  implementation;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) review any measures taken by any entity for the protection of personal data and take such further action is it deems fit;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) review any action, policy or procedure of any entity to ensure compliance with this Act and any rules made hereunder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) formulate, in consultation with experts, norms for the effective protection of personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) promote awareness and knowledge of personal data protection through any means necessary;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) undertake and promote research in the field of protection of personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) encourage the efforts of non-governmental organisations and institutions working in the field of personal data protection;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(h) publish periodic reports concerning the incidence of collection, processing, storage, disclosure and other handling of personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) such other functions as it may consider necessary for the protection of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Subject to the provisions of any rules prescribed in this behalf by the Central Government, the Data Protection Authority shall have the power to review any decision, judgement, decree or order made by it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) In the exercise of its functions under this Act, the Data Protection Authority shall give such directions or pass such orders as are necessary for reasons to be recorded in writing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(5) The Data Protection Authority may, in its own name, sue or be sued.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 21. Secretary, officers and other employees of the Data Protection Authority. – &lt;/b&gt;(1) The Central Government shall appoint a Secretary to the Data Protection Authority to exercise and perform, under the control of the Chairperson such powers and duties as may be prescribed or as may be specified by the Chairperson.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Central Government may provide the Data Protection Authority with such other officers and employees as may be necessary for the efficient performance of the functions of the Data Protection Authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The salaries and allowances payable to and the conditions of service of the Secretary and other officers and employees of the Data Protection Authority shall be such as may be prescribed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 22. Salaries, etc. be defrayed out of the Consolidated Fund of India. –&lt;/b&gt; The salaries and allowances payable to the Chairperson and Members and the administrative expenses, including salaries, allowances and pension, payable to or in respect of the officers and other employees of the of the Data Protection Authority shall be defrayed out of the Consolidated Fund of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 23. Vacancies, etc. not to invalidate proceedings of the Data Protection Authority. –&lt;/b&gt; No act or proceeding of the Data Protection Authority shall be questioned on the ground merely of the existence of any vacancy or defect in the constitution of the Data Protection Authority or any defect in the appointment of a person acting as the Chairperson or Member.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 24. Chairperson, Members and employees of the Data Protection Authority to be public servants. –&lt;/b&gt; The Chairperson and Members and other employees of the Data Protection Authority shall be deemed to be public servants within the meaning of section 21 of the Indian Penal Code, 1860 (45 of 1860).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 25. Location of the office of the Data Protection Authority.&lt;/b&gt; &lt;b&gt;–&lt;/b&gt; The offices of the Data Protection Authority shall be in [___] or any other location as directed by the Chairperson in consultation with the Central Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 26. Procedure to be followed by the Data Protection Authority. – &lt;/b&gt;(1) Subject to the provisions of this Act, the Data Protection Authority shall have powers to regulate –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the procedure and conduct of its business;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the delegation to one or more Members of such powers or functions as the Chairperson may specify.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) In particular and without prejudice to the generality of the foregoing provisions, the powers of the Data Protection Authority&lt;b&gt; &lt;/b&gt;shall include the power to determine the extent to which persons interested or claiming to be interested in the subject-matter of any proceeding before it may be allowed to be present or to be heard, either by themselves or by their representatives or to cross-examine witnesses or otherwise take part in the proceedings:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that any such procedure as may be prescribed or followed shall be guided by the principles of natural justice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;27. Power relating to inquiries. –&lt;/b&gt; (1) The Data Protection Authority shall, for the purposes of any inquiry or for any other purpose under this Act, have the same powers as vested in a civil court under the Code of Civil Procedure, 1908 (5 of 1908), while trying suits in respect of the following matters, namely –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the summoning and enforcing the attendance of any person from any part of India and examining him on oath;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) the discovery and production of any document or other material object producible as evidence;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) the reception of evidence on affidavit;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) the requisitioning of any public record from any court or office;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) the issuing of any commission for the examination of witnesses; and,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) any other matter which may be prescribed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Data Protection Authority shall have power to require any person, subject to any privilege which may be claimed by that person under any law for the time being in force, to furnish information on such points or matters as, in the opinion of the Data Protection Authority, may be useful for, or relevant to, the subject matter of an inquiry and any person so required shall be deemed to be legally bound to furnish such information within the meaning of section 176 and section 177 of the Indian Penal Code, 1860 (45 of 1860).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The Data Protection Authority or any other officer, not below the rank of a Gazetted Officer, specially authorised in this behalf by the Data Protection Authority may enter any building or place where the Data Protection Authority has reason to believe that any document relating to the subject matter of the inquiry may be found, and may seize any such document or take extracts or copies therefrom subject to the provisions of section 100 of the Code of Criminal Procedure, 1973 (2 of 1974), in so far as it may be applicable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The Data Protection Authority shall be deemed to be a civil court and when any offence as is described in section 175, section 178, section 179, section 180 or section 228 of the Indian Penal Code, 1860 (45 of 1860) is committed in the view or presence of the Data Protection Authority, the Data Protection Authority may, after recording the facts constituting the offence and the statement of the accused as provided for in the Code of Criminal Procedure, 1973 (2 of 1974), forward the case to a Magistrate having jurisdiction to try the same and the Magistrate to whom any such case is forwarded shall proceed to hear the complaint against the accused as if the case had been forwarded to him under section 346 of the Code of Criminal Procedure, 1973 (2 of 1974).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;28. Decisions of the &lt;/b&gt;&lt;b&gt;Data Protection Authority. –&lt;/b&gt; (1) The decisions of the Data Protection Authority shall be binding.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) In its decisions, the Data Protection Authority has the power to –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) require an entity to take such steps as may be necessary to secure compliance with the provisions of this Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) require an entity to compensate any person for any loss or detriment suffered;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) impose any of the penalties provided under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 29. Proceedings before the Data Protection Authority to be judicial proceedings. –&lt;/b&gt; The Data Protection Authority shall be deemed to be a civil court for the purposes of section 195 and Chapter XXVI of the Code of Criminal Procedure, 1973 (2 of 1974), and every proceeding before the Data Protection Authority shall be deemed to be a judicial proceeding within the meaning of section 193 and section 228 and for the purposes of section 196 of the Indian Penal Code, 1860 (45 of 1860).&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER V&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Regulation by Data Controllers and Data Processors&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;30. Co-regulation by Data Controllers and the Data Protection Authority. –&lt;/b&gt; (1) The Data Protection Authority may, in consultation with data controllers, formulate codes of conduct for the collection, storage, processing, disclosure or other handling of any personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No code of conduct formulated under sub-section (1) shall be binding on a data controller unless –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) it has received the written approval of the Data Protection Authority; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) it has received the approval, by signature of a director or authorised signatory, of the data controller.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;31. Co-regulation without prejudice to other remedies. – &lt;/b&gt;Any code of conduct formulated under this chapter shall be without prejudice to the jurisdiction, powers and functions of the Data Protection Authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;32. Self-regulation&lt;/b&gt; &lt;b&gt;by data controllers. – &lt;/b&gt;(1) The Data Protection Authority may encourage data controllers and data processors to formulate professional codes of conduct to establish rules for the collection, storage, processing, disclosure or other handling of any personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No code of conduct formulated under sub-section (1) shall be effective unless it is registered, in such form and manner as may be prescribed, by the Data Protection Authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The Data Protection Authority shall, for reasons to be recorded in writing, not register any code of conduct formulated under sub-section (1) that is not adequate to protect personal data.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER IV&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Surveillance and Interception of Communications&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;33. Surveillance and interception of communication to be warranted. – &lt;/b&gt;Notwithstanding anything contained in any other law for the time being in force, no –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) surveillance shall be carried out, and no person shall order any surveillance of another person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) communication shall be intercepted, and no person shall order the interception of any communication of another person; save in execution of a warrant issued under section 36, or an order made under section 38, of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;34.&lt;/b&gt; &lt;b&gt;Application for issuance of warrant. – &lt;/b&gt;(1) Any authorised officer seeking to carry out any surveillance or intercept any communication of another person shall prefer an application for issuance of a warrant to the Magistrate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The application for issuance of the warrant shall be in the form and manner prescribed in the Schedule and shall state the purpose for which the warrant is sought.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The application for issuance of the warrant shall be accompanied by –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) a report by the authorised officer of the suspicious conduct of the person in respect of whom the warrant is sought, and all supporting material thereof;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) an affidavit of the authorised officer, or a declaration under his hand and seal, that the contents of the report and application are true to the best of his knowledge, information and belief, and that the warrant shall be executed only for the purpose stated in the application and shall not be misused or abused in any manner including to interfere in the privacy of any person;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) details of all warrants previously issued in respect of the person in respect of whom the warrant is sought, if any.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;35. Considerations prior to the issuance of warrant. –&lt;/b&gt; (1) No warrant shall issue unless the requirements of section 34 and this section have been met.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Magistrate shall consider the application made under section 34 and shall satisfy himself that the information contained therein sets out –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) a reasonable threat to national security, defence or public order; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) a cognisable offence, the prevention, investigation or prosecution of which is necessary in the public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The Magistrate shall satisfy himself that all other lawful means to acquire the information that is sought by the execution of the warrant have been exhausted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The Magistrate shall verify the identity of the authorised officer and shall satisfy himself that the application for issuance of the warrant is authentic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;36. Issue of warrant. –&lt;/b&gt; (1) Subject to section 34 and section 35, the Magistrate may issue a warrant for surveillance or interception of communication, or both of them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Magistrate may issue the warrant in Chambers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;37. Magistrate may reject application for issuance of warrant. – &lt;/b&gt;If the Magistrate is not satisfied that the requirements of section 34 and section 35 have been met, he may, for reasons to be recorded in writing, –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) refuse to issue the warrant and dispose of the application;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) return the application to the authorised officer without disposing of it;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) pass any order that he thinks fit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;38. Order by Home Secretary in emergent circumstances. –&lt;/b&gt; (1) Notwithstanding anything contained in section 35, if the Home Secretary of the appropriate government is satisfied that a grave threat to national security, defence or public order exists, he may, for reasons to be recorded in writing, order any surveillance or interception of communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) An authorised officer seeking an order for surveillance or interception of communication under this section shall prefer an application to the Home Secretary in the form and manner prescribed in the Schedule and accompanied by the documents required under sub-section (3) of section 34.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) No order for surveillance or interception of communication made by the Home Secretary under this section shall be valid upon the expiry of a period of seven days from the date of the order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) Before the expiry of a period of seven days from the date of an order for surveillance or interception of communication made under this section, the authorised officer who applied for the order shall place the application before the Magistrate for confirmation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;39.&lt;/b&gt; &lt;b&gt;Duration of warrant or order. – &lt;/b&gt;(1) The warrant or order for surveillance or interception of communication shall specify the period of its validity and, upon its expiry, all surveillance and interception of communication, as the case may be, carried out in relation to that warrant or order shall cease forthwith:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that no warrant or order shall be valid upon the expiry of a period of sixty days from the date of its issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) A warrant issued under section 36, or an order issued under section 38, for surveillance or interception of communication, or both of them, may be renewed by a Magistrate if he is satisfied that the requirements of sub-section (2) of section 35 continue to exist.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;40. Duty to inform the person concerned. – &lt;/b&gt;Subject to sub-section (2), before the expiry of a period of sixty days from the conclusion of any surveillance or interception of communication carried out under this Act, the authorised officer who carried out the surveillance or interception of communication shall, in writing in such form and manner as may be prescribed, notify, with reference to the warrant of the Magistrate, and, if applicable, the order of the Home Secretary, each person in respect of whom the warrant or order was issued, of the fact of such surveillance or interception and duration thereof.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The Magistrate may, on an application made by an authorised officer in such form and manner as may be prescribed, if he is satisfied that the notification under sub-section (1) would –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) present a reasonable threat to national security, defence or public order, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) adversely affect the prevention, investigation or prosecution of a cognisable offence,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;for reasons to be recorded in writing addressed to the authorised officer, order that the person in respect of whom the warrant or order of surveillance or interception of communication was issued, not be notified of the fact of such interception or the duration thereof:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;41. Security and duty of confidentiality and secrecy. – &lt;/b&gt;(1) No person shall carry out any surveillance or intercept any communication of another person without implementing measures, including, but not restricted to, technological, physical and administrative measures, to secure the confidentiality and secrecy of all information obtained as a result of the surveillance or interception of communication, as the case may be, including from theft, loss or unauthorised disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Any person who carries out any surveillance or interception of any communication, or who obtains any information, including personal data, as a result of surveillance or interception of communication, shall be subject to a duty of confidentiality and secrecy in respect of it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Every competent organisation shall, before the expiry of a period of one hundred days from the enactment of this Act, designate as many officers as it deems fit as Privacy Officers who shall be administratively responsible for all interceptions of communications carried out by that competent organisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;42. Disclosure of information. – &lt;/b&gt;(1) Save as provided in this section, no person shall disclose to any other person, or otherwise cause any other person to come into the knowledge or possession of, the content or nature of any information, including personal data, obtained as a result of any surveillance or interception carried out under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Notwithstanding anything contained in this section, if the disclosure of any information, including personal data, obtained as a result of any surveillance or interception of any communication is necessary to –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) prevent a reasonable threat to national security, defence or public order, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) prevent, investigate or prosecute a cognisable offence,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;an authorised officer may disclose the information, including personal data, to any authorised officer of any other competent organisation.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER VI&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Offences and penalties&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;43. Punishment for offences related to personal data. –&lt;/b&gt; (1) Whoever, except in conformity with the provisions of this Act, collects, receives, stores, processes or otherwise handles any personal data shall be punishable with imprisonment for a term which may extend to [___] years and may also be liable to fine which may extend to [___] rupees.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Whoever attempts to commit any offence under sub section (1) shall be punishable with the punishment provided for such offence under that sub-section.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Whoever, except in conformity with the provisions of this Act, collects, receives, stores, processes or otherwise handles any sensitive personal data shall be punishable with imprisonment for a term which may extend to [&lt;i&gt;increased for sensitive personal data&lt;/i&gt;] years and and may also be liable to fine which may extend to [___] rupees.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) Whoever attempts to commit any offence under sub section (3) shall be punishable with the punishment provided for such offence under that sub-section.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;44. Abetment and repeat offenders. –&lt;/b&gt; (1) Whoever abets any offence punishable under this Act shall, if the act abetted is committed in consequence of the abetment, be punishable with the punishment provided for that offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Whoever, having been convicted of an offence under any provision of this Act is again convicted of an offence under the same provision, shall be punishable, for the second and for each subsequent offence, with double the penalty provided for that offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;45. Offences by companies. –&lt;/b&gt; (1) Where an offence under this Act has been committed by a company, every person who, at the time of the offence was committed, was in charge of, and was responsible to, the company for the conduct of the business of the company, as well as the company shall be deemed to be guilty of the offence and shall be liable to be proceeded against and punished accordingly:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that nothing contained in this sub-section shall render any such person liable to any punishment, if he proves that the offence was committed without his knowledge or that he had exercised all due diligence to prevent the commission of such offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Notwithstanding anything contained in sub-section (1), where any offence under this Act has been committed by a company and it is proved that the offence has been committed with the consent or connivance of, or is attributable to any neglect on the part of any director, manager, secretary or other officer of the company, such director, manager, secretary or other officer shall be deemed to be guilty of that offence, and shall be liable to be proceeded against and punished accordingly.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;46. Cognisance. –&lt;/b&gt; Notwithstanding anything contained in the Code of Criminal Procedure, 1973 (2 of 1974), the offences under section 43, section 44 and section 45 shall be cognisable and non-bailable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;47&lt;/b&gt;&lt;b&gt;. General penalty. –&lt;/b&gt; Whoever, in any case in which a penalty is not expressly provided by this Act, fails to comply with any notice or order issued under any provisions thereof, or otherwise contravenes any of the provisions of this Act, shall be punishable with fine which may extend to [___] rupees, and, in the case of a continuing failure or contravention, with an additional fine which may extend to [___] rupees for every day after the first during which he has persisted in such failure or contravention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;48&lt;/b&gt;&lt;b&gt;. Punishment to be without prejudice to any other action. –&lt;/b&gt; The award of punishment for an offence under this Act shall be without prejudice to any other action which has been or which may be taken under this Act with respect to such contravention.&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;CHAPTER VII&lt;/b&gt;&lt;/p&gt;
&lt;p align="center"&gt;&lt;b&gt;Miscellaneous&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 49. Power to make rules. –&lt;/b&gt; (1) The Central Government may, by notification in the Official Gazette, make rules to carry out the provisions of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) In particular, and without prejudice to the generality of the foregoing power, such rules may provide for –&lt;/p&gt;
&lt;p&gt;[__]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Every rule made under this section shall be laid, as soon as may be after it is made, before each House of Parliament while it is in session for a period of thirty days which may be comprised in one session or in two successive sessions and if before the expiry of the session in which it is so laid or the session immediately following, both Houses agree in making any modification in the rule, or both Houses agree that the rule should not be made, the rule shall thereafter have effect only in such modified form or be of no effect, as the case may be, so however, that any such modification or annulment shall be without prejudice to the validity of anything previously done under that rule.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 50. Bar of jurisdiction. –&lt;/b&gt; (1) On and from the appointed day, no court or authority shall have, or be entitled to exercise, any jurisdiction, powers or authority (except the Supreme Court and a High Court exercising powers under Article 32, Article 226 and Article 227 of the Constitution) in relation to matters specified in this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) No order passed under this Act shall be appealable except as provided therein and no civil court shall have jurisdiction in respect of any matter which the Data Protection Authority is empowered by, or under, this Act to determine and no injunction shall be granted by any court or other authority in respect of any action taken or to be taken in pursuance of any power conferred by or under this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 51. Protection of action taken in good faith. – &lt;/b&gt;No suit or other legal proceeding shall lie against the Central Government, State Government, Data Protection Authority, Chairperson, Member or any person acting under the direction either of the Central Government, State Government, Data Protection Authority, Chairperson or Member in respect of anything which is in good faith done or intended to be done in pursuance of this Act or of any rules or any order made thereunder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;52. Power to remove difficulties. –&lt;/b&gt; (1) If any difficulty arises in giving effect to the provisions of this Act, the Central Government may, by order, published in the Official Gazette, make such provisions, not inconsistent with the provisions of this Act, as appears to it to be necessary or expedient for removing the difficulty:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that no such order shall be made under this section after the expiry of a period of three years from the commencement of this Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;(2) Every order made under this section shall be laid, as soon as may be after it is made, before each House of Parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; 53. Act to have overriding effect. – &lt;/b&gt;The provisions of this Act shall have effect notwithstanding anything inconsistent therewith contained in any other law for the time being in force.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft'&gt;https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-updated-third-draft&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-01T12:25:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy">
    <title>The National Cyber Security Policy: Not a Real Policy</title>
    <link>https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy</link>
    <description>
        &lt;b&gt;Cyber security in India is still a nascent field without an organised law and policy framework. Several actors participate in and are affected by India's still inchoate cyber security regime. The National Cyber Security Policy (NCSP) presented the government and other stakeholders with an opportune moment to understand existing legal limitations before devising a future framework. Unfortunately, the NCSP's poor drafting and meaningless provisions do not advance the field.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article was &lt;a class="external-link" href="http://orfonline.org/cms/sites/orfonline/html/cyber/cybsec1.html"&gt;published in the Observer Research Foundation's Cyber Security Monitor Vol. I, Issue.1, August 2013&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;For some time now, law and policy observers in India have been noticing a  definite decline in the quality of national policies emanating from the  Central Government. Unlike legislation, which is notionally subject to  debate in the Parliament of India, policies face no public evaluation  before they are brought in to force. Since, unlike legislation, policies  are neither binding nor enforceable, there has been no principled  ground for demanding public deliberation of significant national  policies. While Parliament’s falling standard of competence has been  almost unanimously condemned, there has been nearly no criticism of the  corresponding failure of the Centre to invigilate the quality of the  official policies of its ministries. Luckily for the drafters of the  National Cyber Security Policy (NCSP), the rest of the country has also  mostly failed to notice its poor content.&lt;br /&gt; &lt;br /&gt;The NCSP was notified into effect on 2 July 2013 by the Department  of Electronics and Information Technology – which calls itself DeitY –  of the Ministry of Communications and Information Technology. As far as  legislation and legal drafting go, DeitY has a dubious record. In March  2013, in a parliamentary appraisal of subordinate law framed by DeitY, a  Lok Sabha committee found ambiguity, invasions of privacy and  potentially illegal clauses. Apprehensions about statutory law  administered by DeitY have also found their way to the Supreme Court of  India, where a constitutional challenge to certain provisions of the  Information Technology Act, 2000 (IT Act) continues. On more than one  occasion, owing to poor drafting, DeitY has been forced to issue  advisories and press releases to clarify the meaning of its laws.  Ironically, the legal validity of these clarifications is also  questionable.&lt;br /&gt; &lt;br /&gt;A national policy must set out, in real and quantifiable terms, the  objectives of the government in a particular field within a specified  time frame. To do that, the policy must provide the social, economic,  political and legal context prevalent at the time of its issue as well  as a normative statement of factual conditions it seeks to achieve at  the time of its expiry. Between these two points in time, the policy  must identify and explain all the particular social, economic, political  and legal measures it intends to implement to secure its success.  Albeit concerned solely with economic growth, the Five-Year Plans – the  Second and Tenth Plans in particular, without prejudice to their success  or failure, are samples of policies that are well-drafted. In this  background, the NCSP should be judged on the basis of how it addresses,  in no particular order, national security, democratic freedoms, economic  growth and knowledge development. Let us restrict ourselves to the  first two issues.&lt;br /&gt; &lt;br /&gt;There are broadly two intersections between national security and  information technology; these are: (i) the security of networked  communications used by the armed forces and intelligence services, and  (ii) the storage of civil information of national importance. While the  NCSP makes no mention of it, the adoption of the doctrine of  network-centric warfare by the three armed forces is underway.  Understanding the doctrine is simple – an intensive use of information  technology to create networks of information aids situational awareness  and enables collaboration to bestow an advantage in combat. However, the  doctrine is vulnerable to asymmetric attack using both primitive and  highly sophisticated means. Pre-empting such attacks should be a primary  policy concern; not so, apparently, for the NCSP which is completely  silent on this issue. The NCSP is slightly more forthcoming on the  protection of critical information infrastructure of a civil nature.  Critical information infrastructure, such as the national power grid or  the Aadhar database, is narrowly defined in section 70 of the IT Act  where it used to describe a protected system. Other provisions of the IT  Act also deal with the protection of critical information  infrastructure. The NCSP does not explain how these statutory provisions  have worked or failed, as the case may be, to necessitate further  mention in a policy document. For instance, section 70A of the IT Act,  inserted in 2008, enables the creation of a national nodal agency to  undertake research and development and other activities in respect of  critical information infrastructure. Despite this, five years later, the  NCSP makes a similar recommendation to operate a National Critical  Information Infrastructure Protection Centre to undertake the same  activities. In the absence of any meaningful explanation of intended  policy measures, there is no reason to expect that the NCSP will succeed  where an Act of Parliament has failed.&lt;br /&gt; &lt;br /&gt;But, putting aside the shortcomings of its piece-meal provisions,  the NCSP also fails to address high-level conceptual policy concerns. As  information repositories and governance services through information  technology become increasingly integrated and centralised, the security  of the information that is stored or distributed decreases. Whether by  intent or error, if these consolidated repositories of information are  compromised, the quantity of information susceptible to damage is  greater leading to higher insecurity. Simply put, if power transmission  is centrally controlled instead of zonally, a single attack could black  out the entire country instead of only a part of it. Or if personal data  of citizens is centrally stored, a single leak could compromise the  privacy of millions of people instead of only hundreds. Therefore, a  credible policy must, before it advocates greater centralisation of  information, examine the merits of diffused information storage to  protect national security. The NCSP utterly fails in this regard.&lt;br /&gt; &lt;br /&gt;Concerns short of national security, such as the maintenance of law  and order, are also in issue because crime is often planned and  perpetrated using information technology. The prevention of crime before  it is committed and its prosecution afterwards is a key policy concern.  While the specific context may vary depending on the nature of the  crime – the facts of terrorism are different from those of insurance  fraud – the principles of constitutional and criminal law continue to  apply. However, the NCSP neither examines the present framework of  cybersecurity-related offences nor suggests any changes in existing law.  It merely calls for a “dynamic legal framework and its periodic review  to address the cyber security challenges” (sic). This is self-evident,  there was no need for a new national policy to make this discovery; and,  ironically, it fails to conduct the very periodic review that it  envisages. This is worrying because the NCSP presented DeitY with an  opportunity to review existing laws and learn from past mistakes. There  are concerns that cybersecurity laws, especially relevant provisions of  the IT Act and its rules, betray a lack of understanding of India’s  constitutional scheme. This is exemplified by the insertion, in 2008, of  section 66A into the IT Act that criminalises the sending of annoying,  offensive and inconvenient electronic messages without regard for the  fact that free speech that is annoying is constitutionally protected.&lt;br /&gt; &lt;br /&gt;In India, cybersecurity law and policy attempts to compensate for  the state’s inability to regulate the internet by overreaching into and  encroaching upon democratic freedoms. The Central Monitoring System  (CMS) that is being assembled by the Centre is a case in point. Alarmed  at its inability to be privy to private communications, the Centre  proposes to build systems to intercept, in real time, all voice and data  traffic in India. Whereas liberal democracies around the world require  such interceptions to be judicially sanctioned, warranted and supported  by probable cause, India does not even have statutory law to regulate  such an enterprise. Given that, once completed, the CMS will represent  the largest domestic interception effort in the world, the failure of  the NCSP to examine the effect of such an exercise on daily  cybersecurity is bewildering. This is made worse by the fact that the  state does not possess the technological competence to build such a  system by itself and is currently tendering private companies for  equipment. The state’s incompetence is best portrayed by the activities  of the Indian Computer Emergency Response Team (CERT-In) that was  constituted under section 70B of the IT Act to respond to “cyber  incidents”. CERT-In has repeatedly engaged in extra-judicial censorship  and has ham-handedly responded to allegedly objectionable blogs or  websites by blocking access to entire domains. Unfortunately, the NCSP,  while reiterating the operations of CERT-In, attempts no evaluation of  its activities precluding the scope for any meaningful policy measures.&lt;br /&gt; &lt;br /&gt;The NCSP’s poor drafting, meaningless provisions, deficiency of  analysis and lack of stated measures renders it hollow. Its notification  into force adds little to the public or intellectual debate about  cybersecurity and does nothing to further the trajectory of either  national security or democratic freedoms in India. In fairness, this  problem afflicts many other national policies. There is a need to  revisit the high intellectual and practical standards set by most  national policies that were issued in the years following Independence.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy'&gt;https://cis-india.org/internet-governance/blog/orfonline-bhairav-acharya-observer-research-foundation-cyber-security-monitor-august-2013-nsp-not-a-real-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-09-25T09:49:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament">
    <title>The Central Monitoring System: Some Questions to be Raised in Parliament</title>
    <link>https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament</link>
    <description>
        &lt;b&gt;The following are some model questions to be raised in the Parliament regarding the lack of transparency in the central monitoring system.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Preliminary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The Central Monitoring System (CMS) is a Central Government project to intercept communications, both voice and data, that is transmitted via telephones and the internet to, from and within India. Owing to the vast nature of this enterprise, the CMS cannot be succinctly described and the many issues surrounding this project are diverse. This Issue Brief will outline preliminary constitutional, legal and technical concerns that are presented by the CMS.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;At the outset, it must be clearly understood that no public documentation exists to explain the scope, functions and technical architecture of the CMS. This lack of transparency is the single-largest obstacle to understanding the Central Government’s motives in conceptualising and operationalizing the CMS. This lack of public documentation is also the chief reason for the brevity of this Issue Note. Without making public the policy, law and technical abilities of the CMS, there cannot be an informed national debate on the primary concerns posed by the CMS, i.e the extent of envisaged state surveillance upon Indian citizens and the safeguards, if any, to protect the individual right to privacy. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Surveillance and Privacy&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Surveillance is necessary to secure political organisation. Modern nation-states, which are theoretically organised on the basis of shared national and societal characteristics, require surveillance to detect threats to these characteristics. In democratic societies, beyond the immediate requirements of national integrity and security, surveillance must be targeted at securing the safety and rights of individual citizens. This Issue Brief does not dispute the fact that democratic countries, such as India, should conduct surveillance to secure legitimate ends. Concerns, however, arise when surveillance is conducted in a manner unrestricted and unregulated by law; these concerns are compounded when a lack of law is accompanied by a lack of transparency.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Technological advancement leads to more intrusive surveillance. The evolution of surveillance in the United States resulted, in 1967, in the first judicial recognition of the right to privacy. In &lt;i&gt;Katz&lt;/i&gt; v. &lt;i&gt;United States&lt;/i&gt; the US Supreme Court ruled that the privacy of communications had to be balanced with the need to conduct surveillance; and, therefore, wiretaps had to be warranted, judicially sanctioned and supported by probable cause. &lt;i&gt;Katz&lt;/i&gt; expanded the scope of the Fourth Amendment of the US Constitution, which protected against unreasonable searches and seizures. Most subsequent US legal developments relating to the privacy of communications from surveillance originate in the &lt;i&gt;Katz&lt;/i&gt; judgement. Other common law countries, such as the United Kingdom and Canada, have experienced similar judicial evolution to recognise that the right to privacy must be balanced with governance.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;Right to Privacy in India&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Unfortunately, India does not have a persuasive jurisprudence of privacy protection. In the &lt;i&gt;Kharak Singh&lt;/i&gt; (1964) and &lt;i&gt;Gobind&lt;/i&gt; (1975) cases, the Supreme Court of India considered the question of privacy from physical surveillance by the police in and around the homes of suspects. In the latter case, the Supreme Court found that some of the Fundamental Rights “could be described as contributing to the right to privacy” which was nevertheless subject to a compelling public interest. This insipid inference held the field until 1994 when, in the &lt;i&gt;Rajagopal&lt;/i&gt; (“Auto Shankar”, 1994) case, the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty recognised by Article 21 of the Constitution. However, &lt;i&gt;Rajagopal&lt;/i&gt; dealt specifically with the publication of an autobiography, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case. While finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards which continue to be routinely ignored. A more robust statement of the right to privacy was made recently by the Delhi High Court in the &lt;i&gt;Naz &lt;/i&gt;&lt;i&gt;Foundation&lt;/i&gt; case (2011) that de-criminalised consensual homosexual acts; however, this judgment has been appealed to the Supreme Court.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Issues Pertaining to the CMS&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;While judicial protection from physical surveillance was cursorily dealt with in the &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; cases, the Supreme Court of India directly considered the issue of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case. Wiretaps in India primarily occur on the strength of powers granted to certain authorities under section 5(2) of the Indian Telegraph Act, 1885. The Court found that the Telegraph Act, and Rules made thereunder, did not prescribe adequate procedural safeguards to create a “just and fair” mechanism to conduct wiretaps. Therefore, it laid down the following procedure to conduct wiretaps: &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;(a) the order should be issued by the relevant Home Secretary (this power is delegable to a Joint Secretary),&lt;br /&gt; (b) the interception must be carried out exactly in terms of the order and not in excess of it,&lt;br /&gt; (c) a determination of whether the information could be reasonably secured by other means,&lt;br /&gt; (d) the interception shall cease after sixty (60) days.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Therefore, prima facie, any voice interception conducted through the CMS will be in violation of this Supreme Court judgement. The CMS will enforce blanket surveillance upon the entire country without regard for reasonable cause or necessity. This movement away from targeted surveillance to blanket surveillance without cause, conducted without statutory sanction and without transparency, is worrying.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accordingly, the following questions may be raised, in Parliament, to learn more about the CMS project: &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Which statutes, Government Orders, notifications etc deal with the establishment and maintenance of the CMS?&lt;/li&gt;
&lt;li&gt;Which is the nodal agency in charge of implementing the CMS?&lt;/li&gt;
&lt;li&gt;What are the powers and functions of the nodal agency?&lt;/li&gt;
&lt;li&gt;What guarantees exist to protect ordinary Indian citizens from intrusive surveillance without cause?&lt;/li&gt;
&lt;li&gt;What are the technical parameters of the CMS?&lt;/li&gt;
&lt;li&gt;What are the consequences for misuse or abuse of powers by any person working in the CMS project?&lt;/li&gt;
&lt;li&gt;What recourse is available to Indian citizens against whom there is unnecessary surveillance or against whom there has been a misuse or abuse of power?&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament'&gt;https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T10:30:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings">
    <title>The National Privacy Roundtable Meetings</title>
    <link>https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society ("CIS"), the Federation of Indian Chambers of Commerce and Industry ("FICCI"), the Data Security Council of India ("DSCI") and Privacy International are, in partnership, conducting a series of national privacy roundtable meetings across India from April to October 2013. The roundtable meetings are designed to discuss possible frameworks to privacy in India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Background: The Roundtable Meetings and Organisers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/"&gt;CIS&lt;/a&gt; is a Bangalore-based non-profit think-tank and research organisation with interests in, amongst other fields, the law, policy and practice of free speech and privacy in India. &lt;a href="http://www.ficci.com/"&gt;FICCI&lt;/a&gt; is a non-governmental, non-profit association of approximately 250,000 Indian bodies corporate. It is the oldest and largest organisation of businesses in India and represents a national corporate consensus on policy issues. &lt;a href="http://www.dsci.in/"&gt;DSCI&lt;/a&gt; is an initiative of the National Association of Software and Service Companies, a non-profit trade association of Indian information technology ("IT") and business process outsourcing ("BPO") concerns, which promotes data protection in India. &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt; is a London-based non-profit organisation that defends and promotes the right to privacy across the world.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy in the Common Law and in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Because privacy is a multi-faceted concept, it has rarely been singly regulated. A taxonomy of privacy yields many types of individual and social activity to be differently regulated based on the degree of harm that may be caused by intrusions into these activities.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nature of the activity is significant; activities that are implicated by the state are attended by public law concerns and those conducted by private persons &lt;i&gt;inter se&lt;/i&gt; demand market-based regulation. Hence, because the principles underlying warranted police surveillance differ from those prompting consensual collections of personal data for commercial purposes, legal governance of these different fields must proceed differently. For this and other reasons, the legal conception of privacy — as opposed to its cultural construction – has historically been diverse and disparate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditionally, specific legislations have dealt separately with individual aspects of privacy in tort law, constitutional law, criminal procedure and commercial data protection, amongst other fields. The common law does not admit an enforceable right to privacy.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; In the absence of a specific tort of privacy, various equitable remedies, administrative laws and lesser torts have been relied upon to protect the privacy of claimants.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question of whether privacy is a constitutional right has been the subject of limited judicial debate in India. The early cases of &lt;i&gt;Kharak Singh&lt;/i&gt; (1964)&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; and &lt;i&gt;Gobind&lt;/i&gt; (1975)&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; considered privacy in terms of physical surveillance by the police in and around the homes of suspects and, in the latter case, the Supreme Court of India found that some of the Fundamental Rights “could be described as contributing to the right to privacy” which was nevertheless subject to a compelling public interest. This inference held the field until 1994 when, in the &lt;i&gt;Rajagopal&lt;/i&gt; case (1994),&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty guaranteed by Article 21 of the Constitution of India. However, &lt;i&gt;Rajagopal&lt;/i&gt; dealt specifically with a book, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case (1996)&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; and, while finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards.&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;A more robust statement of the right to privacy was made recently by the Delhi High Court in the &lt;i&gt;Naz &lt;/i&gt;&lt;i&gt;Foundation&lt;/i&gt; case (2011)&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;that de-criminalised consensual homosexual acts; however, this judgment is now in appeal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Attempts to Create a Statutory Regime&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The silence of the common law leaves the field of privacy in India open to occupation by statute. With the recent and rapid growth of the Indian IT and BPO industry, concerns regarding the protection of personal data to secure privacy have arisen. In May 2010, the European Union ("EU") commissioned an assessment of the adequacy of Indian data protection laws to evaluate the continued flow of personal data of European data subjects into India for processing. That assessment made adverse findings on the adequacy and preparedness of Indian data protection laws to safeguard personal data.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Conducted amidst negotiations for a free trade agreement between India and the EU, the failed assessment potentially impeded the growth of India’s outsourcing industry that is heavily reliant on European and North American business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, the Department of Electronics and Information Technology of the Ministry of Communications and Information Technology, Government of India, issued subordinate legislation under the rule-making power of the Information Technology Act, 2000 ("IT Act"), to give effect to section 43A of that statute. These rules – the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 ("Personal Data Rules")&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; — were subsequently reviewed by the Committee on Subordinate Legislation of the 15&lt;sup&gt;th&lt;/sup&gt; Lok Sabha.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; The Committee found that the Personal Data Rules contained clauses that were ambiguous, invasive of privacy and potentially illegal.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, a draft privacy legislation called the ‘Right to Privacy Bill, 2011’, which was drafted within the Department of Personnel and Training ("DoPT") of the Ministry of Personnel, Public Grievances and Pensions, Government of India,  was made available on the internet along with several file notings ("First DoPT Bill"). The First DoPT Bill contained provisions for the regulation of personal data, interception of communications, visual surveillance and direct marketing. The First DoPT Bill was referred to a Committee of Secretaries chaired by the Cabinet Secretary which, on 27 May 2011, recommended several changes including re-drafts of the chapters relating to interception of communications and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aware of the need for personal data protection laws to enable economic growth, the Planning Commission constituted a Group of Experts under the chairmanship of Justice Ajit P. Shah, a retired Chief Justice of the Delhi High Court who delivered the judgment in the &lt;i&gt;Naz Foundation&lt;/i&gt; case, to study foreign privacy laws, analyse existing Indian legal provisions and make specific proposals for incorporation into future Indian law. The Justice Shah Group of Experts submitted its Report to the Planning Commission on 16 October 2012 wherein it proposed the adoption of nine National Privacy Principles.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; These are the principles of notice, choice and consent, collection limitation, purpose limitation, disclosure of information, security, openness, and accountability. The Report recommended the application of these principles in laws relating to interception of communications, video and audio recordings, use of personal identifiers, bodily and genetic material, and personal data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Criminal Procedure and Special Laws Relating to Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While the &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; cases first brought the questions of permissibility and limits of police surveillance to the Supreme Court, the power to collect information and personal data of a person is firmly embedded in Indian criminal law and procedure. Surveillance is an essential condition of the nation-state; the inherent logic of its foundation requires the nation-state to perpetuate itself by interdicting threats to its peaceful existence. Surveillance is a method by which the nation-state’s agencies interdict those threats. The challenge for democratic countries such as India is to find the optimal balance between police powers of surveillance and the essential freedoms of its citizens, including the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regime governing the interception of communications is contained in section 5(2) of the Indian Telegraph Act, 1885 ("Telegraph Act") read with rule 419A of the Indian Telegraph Rules, 1951 ("Telegraph Rules"). The Telegraph Rules were amended in 2007&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; to give effect to, amongst other things, the procedural safeguards laid down by the Supreme Court in the &lt;i&gt;PUCL&lt;/i&gt; case. However, India’s federal scheme permits States to also legislate in this regard. Hence, in addition to the general law on interceptions contained in the Telegraph Act and Telegraph Rules, some States have also empowered their police forces with interception functions in certain cases.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; Ironically, even though some of these State laws invoke heightened public order concerns to justify their invasions of privacy, they establish procedural safeguards based on the principle of probable cause that surpasses the Telegraph Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, further subordinate legislation issued to fulfil the provisions of sections 69(2) and 69B(3) of the IT Act permit the interception and monitoring of electronic communications — including emails — to collect traffic data and to intercept, monitor, and decrypt electronic communications.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The proposed Privacy (Protection) Bill, 2013 and Roundtable Meetings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In this background, the proposed Privacy (Protection) Bill, 2013 seeks to protect privacy by regulating (i) the manner in which personal data is collected, processed, stored, transferred and destroyed — both by private persons for commercial gain and by the state for the purpose of governance; (ii) the conditions upon which, and procedure for, interceptions of communications — both voice and data communications, including both data-in-motion and data-at-rest — may be conducted and the authorities permitted to exercise those powers; and, (iii) the manner in which forms of surveillance not amounting to interceptions of communications — including the collection of intelligence from humans, signals, geospatial sources, measurements and signatures, and financial sources — may be conducted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous roundtable meetings to seek comments and opinion on the proposed Privacy (Protection) Bill, 2013 took place at:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;New Delhi: April 13, 2013 (&lt;a class="external-link" href="http://bit.ly/17REl0W"&gt;http://bit.ly/17REl0W&lt;/a&gt;) with 45 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Bangalore: April 20, 2013 (&lt;a class="external-link" href="http://bit.ly/162t8rU"&gt;http://bit.ly/162t8rU&lt;/a&gt;) with 45 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Chennai: May 18, 2013 (&lt;a class="external-link" href="http://bit.ly/12ICGYD"&gt;http://bit.ly/12ICGYD&lt;/a&gt;) with 25 participants.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mumbai, June 15, 2013 (&lt;a class="external-link" href="http://bit.ly/12fJSvZ"&gt;http://bit.ly/12fJSvZ&lt;/a&gt;) with 20 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kolkata: July 13, 2013 (&lt;a class="external-link" href="http://bit.ly/11dgINZ"&gt;http://bit.ly/11dgINZ&lt;/a&gt;) with 25 participants; and&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;New Delhi: August 24, 2013 (&lt;a class="external-link" href="http://bit.ly/195cWIf"&gt;http://bit.ly/195cWIf&lt;/a&gt;) with 40 participants.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The roundtable meetings were multi-stakeholder events with participation from industry representatives, lawyers, journalists, civil society organizations and Government representatives. On an average, 75 per cent of the participants represented industry concerns, 15 per cent represented civil society and 10 per cent represented regulatory authorities. The model followed at the roundtable meetings allowed for equal participation from all participants.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See generally, Dan Solove, “A Taxonomy of Privacy” &lt;i&gt;University of Pennsylvania Law Review&lt;/i&gt; (Vol. 154, No. 3, January 2006).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office&lt;/i&gt; [2003] UKHL 53.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See &lt;i&gt;A&lt;/i&gt; v. &lt;i&gt;B plc&lt;/i&gt; [2003] QB 195; &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office &lt;/i&gt;[2001] EWCA Civ 2081; &lt;i&gt;R (Ellis)&lt;/i&gt; v. &lt;i&gt;Chief Constable of Essex Police&lt;/i&gt; [2003] EWHC 1321 (Admin).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of Uttar Pradesh&lt;/i&gt; AIR 1963 SC 1295.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;i&gt;Gobind&lt;/i&gt; v. &lt;i&gt;State of Madhya Pradesh&lt;/i&gt; AIR 1975 SC 1378.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;R. Rajagopal&lt;/i&gt; v. &lt;i&gt;State of Tamil Nadu&lt;/i&gt; AIR 1995 SC 264.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;i&gt;People’s Union for Civil Liberties&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; (1997) 1 SCC 30.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. A Division Bench of the Supreme Court of India comprising Kuldip Singh and Saghir Ahmad, JJ, found that the procedure set out in section 5(2) of the Indian Telegraph Act, 1885 and rule 419 of the Indian Telegraph Rules, 1951 did not meet the “just, fair and reasonable” test laid down in &lt;i&gt;Maneka Gandhi&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; AIR 1978 SC 597 requisite for the deprivation of the right to personal liberty, from whence the Division Bench found a right to privacy emanated, guaranteed under Article 21 of the Constitution of India. Therefore, Kuldip Singh, J, imposed nine additional procedural safeguards that are listed in paragraph 35 of the judgment.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;i&gt;Naz Foundation&lt;/i&gt; v. &lt;i&gt;Government of NCT Delhi&lt;/i&gt; (2009) 160 DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. The 2010 data adequacy assessment of Indian data protection laws was conducted by Professor Graham Greenleaf. His account of the process and his summary of Indian law can found at Graham Greenleaf, "Promises and Illusions of Data Protection in Indian Law"&lt;i&gt; International Data Privacy Law&lt;/i&gt; (47-69, Vol. 1, No. 1, March 2011).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The Rules were brought into effect vide Notification GSR 313(E) on 11 April 2011. CIS submitted comments on the Rules that can be found here – &lt;a href="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011"&gt;http://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. The Committee on Subordinate Legislation, a parliamentary ‘watchdog’ committee, is mandated by rules 317-322 of the Rules of Procedure and Conduct of Business in the Lok Sabha (14&lt;sup&gt;th&lt;/sup&gt; edn., New Delhi: Lok Sabha Secretariat, 2010) to examine the validity of subordinate legislation.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. See the 31&lt;sup&gt;st&lt;/sup&gt; Report of the Committee on Subordinate Legislation that was presented on 21 March 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. See paragraphs 7.14-7.17 on pages 69-72 of the Report of the Group of Experts on Privacy, 16 October 2012, Planning Commission, Government of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. See, the Indian Telegraph (Amendment) Rules, 2007, which were brought into effect &lt;i&gt;vide&lt;/i&gt; Notification GSR 193(E) of the Department of Telecommunications of the Ministry of Communications and Information Technology, Government of India, dated 1 March 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. See, &lt;i&gt;inter alia&lt;/i&gt;, section 14 of the Maharashtra Control of Organised Crime Act, 1999; section 14 of the Andhra Pradesh Control of Organised Crime Act, 2001; and, section 14 of the Karnataka Control of Organised Crime Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. See, the Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data and Information) Rules, 2009 vide GSR 782 (E) dated 27 October 2009; and, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 vide GSR 780 (E) dated 27 October 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings'&gt;https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-21T10:03:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril">
    <title>India:Privacy in Peril</title>
    <link>https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril</link>
    <description>
        &lt;b&gt;The danger of mass surveillance in India is for real. The absence of a regulating law is damning for Indians who want to protect their privacy against the juggernaut of state and private surveillance.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was originally &lt;a class="external-link" href="http://www.frontline.in/cover-story/india-privacy-in-peril/article4849211.ece"&gt;published in the Frontline&lt;/a&gt; on July 12, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;At the concluding scene of his latest movie, Superman disdainfully flings a  surveillance drone down to earth in front of a horrified general. “You  can’t control me,” he tells his military minder. “You can’t find out  where I hang up my cape.” This exchange goes to the crux of  surveillance: control. Surveillance is the means by which nation-states  exercise control over people. If the logical basis of the nation-state  is the establishment and maintenance of homogeneity, it is necessary to  detect and interdict dissent before it threatens the boundedness and  continuity of the national imagination. This imagination often cannot  encompass diversity, so it constructs categories of others that include  dissenters and outsiders. Admittedly, this happens less in India because  the foundation of the Indian nation-state imagined a diverse society  expressing a plurality of ideas in a variety of languages secured by a  syncretic and democratic government that protected individual freedoms.  Unfortunately, this vision is still to be realised, and the foundational  idea of India continues to be challenged by poor governance, poverty,  insurgencies and rebellion. Consequently, surveillance is, for the  modern nation-state, a &lt;i&gt;condicio sine qua non&lt;/i&gt;—an essential element  without which it will eventually cease to exist. The challenge for  democratic nation-states is to find the optimal balance between  surveillance and the duty to protect the freedoms of its citizens.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;History of wiretaps&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some countries, such as the United States, have assembled a vast  apparatus of surveillance to monitor the activities of their citizens  and foreigners. Let us review the recent controversy revealed by the  whistle-blower Edward Snowden. In 1967, the U.S. Supreme Court ruled in &lt;i&gt;Katz vs United States&lt;/i&gt; that wiretaps had to be warranted, judicially sanctioned and supported  by probable cause. This resulted in the passage of the Wiretap Act of  1968 that regulated domestic surveillance. Following revelations that  Washington was engaging in unrestricted foreign surveillance in the  context of the Vietnam war and anti-war protests, the U.S. Congress  enacted the Foreign Intelligence Surveillance Act (FISA) in 1978. FISA  gave the U.S. government the power to conduct, without judicial  sanction, surveillance for foreign intelligence information; and, with  judicial sanction from a secret FISA court, surveillance of anybody if  the ultimate target was a foreign power. Paradoxically, even a U.S.  citizen could be a foreign power in certain circumstances. Domestically,  FISA enabled secret warrants for specific items of information such as  library book borrowers and car rentals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the 9/11 World Trade Centre attacks, Congress enacted the Patriot Act of 2001, Section 215 of which dramatically expanded the scope of FISA to allow secret warrants to conduct surveillance in respect of “any tangible thing” that was relevant to a national security investigation. In exercise of this power, a secret FISA court issued secret warrants ordering a number of U.S. companies to share, in real time, voice and data traffic with the National Security Agency (NSA). We may never know the full scope of the NSA’s surveillance, but we know this: (a) Verizon Communications, a telecommunications major, was ordered to provide metadata for all telephone calls within and without the U.S.; (b) the NSA runs a clandestine programme called PRISM that accesses Internet traffic, such as e-mails, web searches, forum comments and blogs, in real time; and (c) the NSA manages a comprehensive data analysis system called Boundless Informant that intercepts and analyses voice and data traffic around the world and subjects them to automated pattern recognition. The documents leaked by Snowden allege that Google, Facebook, Apple, Dropbox, Microsoft and Yahoo! participate in PRISM, but these companies have denied their involvement.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;India fifth-most monitored&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;How does this affect India? The Snowden documents reveal that India is the NSA’s fifth-most monitored country after Iran, Pakistan, Jordan and Egypt. Interestingly, China is monitored less than India. Several billion pieces of data from India, such as e-mails and telephone metadata, were intercepted and monitored by the NSA. For Indians, it is not inconceivable that our e-mails, should they be sent using Gmail, Yahoo! Mail or Hotmail, or our documents, should we be subscribing to Dropbox, or our Facebook posts, are being accessed and read by the NSA. Incredibly, most Indian governmental communication, including that of Ministers and senior civil servants, use private U.S. e-mail services. We no longer enjoy privacy online. The question of suspicious activity, irrespective of the rubric under which suspicion is measured, is moot. Any use of U.S. service providers is potentially compromised since U.S. law permits intrusive dragnet surveillance against foreigners. This clearly reveals a dichotomy in U.S. constitutional law: the Fourth Amendment’s guarantees of privacy, repeatedly upheld by U.S. courts, protect U.S. citizens to a far greater extent than they do foreigners. It is natural for a nation-state to privilege the rights of its citizens over others. As Indians, therefore, we must clearly look out for ourselves.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy and personal liberty&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, India does not have a persuasive jurisprudence of privacy protection. In the Kharak Singh (1964) and Gobind (1975) cases, the Supreme Court of India considered the question of privacy from physical surveillance by the police in and around homes of suspects. In the latter case, the court found that some of the Fundamental Rights “could be described as contributing to the right to privacy”, which was subject to a compelling public interest. This insipid inference held the field until 1994 when, in the Rajagopal (“Auto Shankar”, 1994) case, the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty recognised by Article 21 of the Constitution. However, Rajagopal dealt specifically with the publication of an autobiography, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the People’s Union for Civil Liberties (PUCL) case. While finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards which continue to be routinely ignored. A more robust statement of the right to privacy was made by the Delhi High Court in the Naz Foundation case (2011) that decriminalised consensual homosexual acts; however, there is an appeal against the judgment in the Supreme Court.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Legislative silence&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Judicial vagueness has been compounded by legislative silence. India does not have a law to operationalise a right to privacy. Consequently, a multitude of laws permit daily infractions of privacy. These infractions have survived because they are diverse, dissipated and quite disorganised. However, the technocratic impulse to centralise and consolidate surveillance and data collection has, in recent years, alarmed many citizens. The state hopes to, through enterprises such as the Central Monitoring System (CMS), the Crime and Criminals Tracking Network and System (CCTNS), the National Intelligence Grid (NATGRID), the Telephone Call Interception System (TCIS) and the Unique Identification Number (UID), replicate the U.S. successes in surveillance and monitoring and profiling all its citizens. However, unlike the U.S., India proposes to achieve this without an enabling law. Let us consider the CMS. No documents have been made available that indicate the scope and size of the CMS.&lt;br /&gt;&lt;br /&gt;From a variety of police tenders for private equipment, it appears that the Central government hopes to put in place a system that will intercept, in real time, all voice and data traffic originating or terminating in India or being carried by Indian service providers. This data will be subject to pattern recognition and other automated tests to detect emotional markers, such as hate, compassion or intent. The sheer scale of this enterprise is intimidating; all communications in India’s many languages will be subject to interception and testing designed to detect different forms of dissent. This mammoth exercise in monitoring is taking place—it is understood that some components of the CMS are already operational—without statutory sanction. No credible authorities exist to supervise this exercise, no avenues for redress have been identified and no consequences have been laid down for abuse.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Statutory Surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a recent interview, Milind Deora, Minister of State for Communications and Information Technology, dismissed public scepticism of the CMS saying that direct state access to private communications was better for privacy since it reduced dependence on the interception abilities of private service providers. This circular argument is both disingenuous and incorrect. No doubt, trusting private persons with the power to intercept and store the private data of citizens is flawed. The leaking of the Niira Radia tapes, which contain the private communications of Niira Radia taped on the orders of the Income Tax Department, testifies to this flaw. However, bypassing private players to enable direct state access to private communications will preclude leaks and, thereby, remove from public knowledge the fact of surveillance. This messy situation may be obviated by a regime of statutory regulation of warranted surveillance by an independent and impartial authority. This system is favoured by liberal democracies around the world but conspicuously resisted by the Indian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question of privacy legislation was recently considered by a committee chaired by Justice Ajit Prakash Shah, a former judge of the Delhi High Court who sat on the Bench that delivered the Naz Foundation judgment. The Shah Committee was constituted by the Planning Commission for a different reason: the need to protect personal data that are outsourced to India for processing. The lack of credible privacy law, it is foreseen, will result in European and other foreign personal data being sent to other attractive processing destinations, such as Vietnam, Israel or the Philippines, resulting in the decline of India’s outsourcing industry. However, the Shah Committee also noted the absence of law sufficient to protect against surveillance abuses. Most importantly, the Shah Committee formulated nine national privacy principles to inform any future privacy legislation (see story on page 26). In 2011, the Department of Personnel and Training (DoPT) of the Ministry of Human Resource Development, the same Ministry entrusted with implementing the Right to Information Act, 2005, leaked a draft privacy Bill, marked ‘Secret’, on the Internet. The DoPT Bill received substantive criticism from the Attorney General and some government Secretaries for the clumsy drafting. A new version of the DoPT Bill is reported to have been drafted and sent to the Ministry of Law for consideration. This revised Bill, which presumably contains chapters to regulate surveillance, including the interception of communications, has not been made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need for privacy legislation cannot be overstated. The Snowden affair reveals the extent of possible state surveillance of private communications. For Indians who must now explore ways to protect their privacy against the juggernaut of state and private surveillance, the absence of regulatory law is damning. Permitting, through public inaction, unwarranted and non-targetted dragnet surveillance by the Indian state without reasonable cause would be an act of surrender of far-reaching implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information, they say, is power. Allowing governments to exercise this power over us without thought for the rule of law constitutes the ultimate submission possible in a democratic nation-state. And, since superheroes are escapist fantasies, without the prospect of good laws we will all be subordinate to a new national imagination of control and monitoring, surveillance and profiling. If allowed to come to pass, this will be a betrayal of the foundational idea of India as a free and democratic republic tolerant of dissent.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;i&gt;Bhairav Acharya is a constitutional lawyer practising in the Supreme Court of India. He advises the Centre for Internet &amp;amp; Society, Bangalore, on privacy law and other constitutional issues&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril'&gt;https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T09:56:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011">
    <title>Comments on the Information Technology (Electronic Service Delivery) Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011</link>
    <description>
        &lt;b&gt;Bhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Information Technology (Electronic Services Delivery) Rules, 2011. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I &lt;span&gt;&lt;span&gt;Preliminary&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.1  This submission presents comments from the Centre for Internet and Society (&lt;b&gt;“CIS”&lt;/b&gt;) on the Information Technology (Electronic Service Delivery) Rules, 2011 that were notified by the Central Government in the Gazette of India vide Notification GSR 316(E) on 11 April 2011 (&lt;b&gt;“ESD Rules”&lt;/b&gt; or &lt;b&gt;“Rules”&lt;/b&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.2  The ESD Rules were notified only eight months before the Electronic Delivery of Services Bill, 2011 was tabled in the Lok Sabha on 27 December 2011 (Bill 137 of 2011) (&lt;b&gt;“EDS Bill” &lt;/b&gt;or&lt;b&gt; “Bill”&lt;/b&gt;). Both the ESD Rules and the EDS Bill are concerned with enabling computer-based electronic delivery of government services to Indian citizens (&lt;b&gt;“electronic service delivery”&lt;/b&gt;). Both the Rules and the Bill originate from the same government department: the Department of Electronics and Information Technology of the Ministry of Communications and Information Technology. Since the EDS Bill seeks to enact a comprehensive legislative framework for mandating and enforcing electronic service delivery, the purpose of the ESD Rules are called into question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II &lt;span&gt;&lt;span&gt;Basic Issues Regarding Electronic Service Delivery&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.1  CIS believes that there are significant conceptual issues regarding electronic service delivery that demand attention. The Department-related Parliamentary Standing Committee on Information Technology of the Fifteenth Lok Sabha (&lt;b&gt;“Standing Committee”&lt;/b&gt;) raised a few concerns when it submitted its 37th Report on the EDS Bill on 29 August 2012. There is a clear need for a national debate on the manner of effecting exclusive electronic service delivery to the exclusion of manual service delivery. Some of these issues are briefly summarised as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Mandatory exclusive electronic service delivery pre-supposes the ability of all Indian citizens to easily access such mechanisms. While there are no authoritative national statistics on familiarity with computer-related technologies, it is apparent that a large majority of Indians, most of whom are likely to be already marginalised and vulnerable, are totally unfamiliar with such technologies to endanger their ability to receive basic government services;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b)  Consequent upon mandatory exclusive electronic service delivery for basic government services, a large group of ‘middlemen’ will arise to facilitate access for that majority of Indians who cannot otherwise access these services. This group will control the interface between citizens and their government. As a result, citizens’ access to governance will deteriorate. This problem may be mitigated to a certain extent by creating a new class of public servants to solely facilitate access to electronic service delivery mechanisms;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) The issue of governmental incapacity at the citizen-government interface might be addressed by contracting private service providers to operate mandatory exclusive electronic service delivery mechanisms. However, it is difficult to see how commercialising access to essential government services serves the public interest, especially when public funds will be expended to meet the costs of private service providers. Permitting private service providers to charge a fee from the general public to allow access to essential government services is also ill advised;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d)  All electronic service delivery, whether mandatory to the exclusion of other service delivery mechanisms or offered simultaneously with manual service delivery, must be accompanied by strong data protection measures to ensure the sanctity of sensitive personal information shared online with the state. At present, there are no specific laws that bind the state, or its agents, to the stringent requirements of privacy necessary to protect personal liberties. In the same vein, strong data security measures are necessary to prevent sensitive personal information from being compromised or lost;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) All electronic service delivery, whether mandatory to the exclusion of other service delivery mechanisms or offered simultaneously with manual service delivery, must ensure ease and equality of accessibility. For this reason, electronic service delivery mechanisms should conform to the National Policy on Open Standards, 2010 (or the proposed National Electronic Access Policy which is currently awaiting adoption), the Interoperability Framework for E-Governance in India and the Website Guidelines of the National Informatics Centre;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) Electronic service delivery requires infrastructure which India does not currently have but can develop. Only 1.44 per cent of India’s population has access to a broadband internet connection&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; and current daily energy demand far exceeds supply. On the other hand, the number of broadband subscribers is increasing,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; the annual installed capacity for electricity generation is growing&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; and the literacy rate is increasing.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.2  The ESD Rules do not address any of the issues raised in the preceding paragraph. As a result, they cannot be seen to represent the result of a national consensus on the crucial question of mandating exclusive electronic service delivery and the means of enforcing such a scheme. Further, very few of the provisions of the Rules are binding; instead, the Rules appear to be drafted to serve as a minimal model for electronic service delivery. &lt;b&gt;In this background, CIS believes that the Rules should be treated as an incomplete arrangement that prescribe the minimal standards necessary to bind private service providers before comprehensive and statutory electronic service delivery legislation is enacted, perhaps in the form of the EDS Bill or otherwise. &lt;/b&gt;Therefore, without prejudice to the issues raised in the preceding paragraph, CIS offers the following comments on the provisions of the Rules while reserving the opportunity to make substantive submissions on electronic service delivery in general to an appropriate forum at a later date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III &lt;span&gt;Improper Exercise of Subordinate Legislative Power&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.1  Rule 317 of the Rules of Procedure and Conduct of Business in the Lok Sabha (Fourteenth Edition, July 2010) (&lt;b&gt;“Rules of Procedure”&lt;/b&gt;), which empowers the Committee on Subordinate Legislation to scrutinise exercises of statutory delegation of legislative powers for impropriety, states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;There shall be a Committee on Subordinate Legislation to scrutinize and report to the House whether the powers to make regulations, rules, subrules, bye-laws etc., conferred by the Constitution or delegated by Parliament are being properly exercised within such delegation.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the Committee on Subordinate Legislation is specifically empowered by rule 320(vii) of the Rules of Procedure to examine any provision of the ESD Rules to consider “&lt;i&gt;whether it appears to make some unusual or unexpected use of the powers conferred by the Constitution or the Act pursuant to which it is made.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2 Accordingly, the attention of the Committee on Subordinate Legislation is called to an improper exercise of delegated power under rule 3(1) of the ESD Rules, which states:&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may on its own or through an agency authorised by it, deliver public services through electronically- enabled kiosks or any other electronic service delivery mechanism.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;This sub-rule (1) empowers both the Central Government and State Governments to provide electronic service delivery on their own.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.3 The ESD Rules are made in exercise of delegated powers conferred under section 87(2)(ca) read with section 6-A(2) of the Information Technology Act, 2000 (&lt;b&gt;“IT Act”&lt;/b&gt;). Section 87(2)(ca) of the IT Act empowers the Central Government to make rules to provide for:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;the manner in which the authorised service provider may collect, retain and appropriate service charges under sub-section (2) of section 6-A.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Section 6-A(2) of the IT Act states:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;The appropriate Government may also authorise any service provider authorised under sub-section (1) to collect, retain and appropriate such service charges, as may be prescribed by the appropriate Government for the purpose of providing such services, from the person availing such service.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prima facie&lt;/i&gt;, the delegated powers under section 87(2)(ca) read with section 6-A(2) of the IT Act, in exercise of which the ESD Rules are made, only permit delegated legislation to regulate private service providers, &lt;span&gt;they do not permit the executive to exercise these powers to empower itself to conduct electronic service delivery on its own&lt;/span&gt;.&lt;b&gt; Therefore, to the extent that the ESD Rules authorise the Central Government and State Governments to provide electronic service delivery on their own, such authorisation constitutes an improper exercise of delegated power and is &lt;i&gt;ultra vires&lt;/i&gt; the IT Act.&lt;/b&gt; This may be resolved by deriving the delegated legislative competence of the ESD Rules from section 87(1) of the IT Act, instead of section 87(2)(ca) read with section 6-A(2).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IV &lt;span&gt;Clause-by-Clause Comments&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 2 - Definitions&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;4.1.1     Rule 2(c) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"authorised agent" means an agent of the appropriate Government or service provider and includes an operator of an electronically enabled kiosk who is permitted under these rules to deliver public services to the users with the help of a computer resource or any communication device, by following the procedure specified in the rules&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In accordance with the argument regarding improper exercise of delegated power contained in paragraphs 3.1 – 3.3 of this submission, the appropriate Government cannot undertake electronic service delivery under these Rules. Consequently, the appropriate Government cannot appoint an agent to provide electronic service delivery on behalf, and under the control, of the appropriate Government since, as the principal, the appropriate Government would be responsible for the acts of its agents. Instead, private service providers may provide electronic service delivery as contractees of the appropriate Government who might enter into such contracts as a sovereign contractor. Therefore, only a private service provider may appoint an authorised agent under these Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.1.2 Therefore, it is proposed that rule 2(c) is amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;““authorised agent” means an agent of a service provider, and includes an operator of an electronically enabled kiosk, who is permitted under these rules to deliver public services with the help of a computer resource or any communication device, by following the procedure specified in these rules”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3 - &lt;span&gt;System of Electronic Service Delivery&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;4.2.1    Rule 3(3) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may determine the manner of encrypting sensitive electronic records requiring confidentiality, white they are electronically signed.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This sub-rule is supposed to prescribe stringent standards to maintain the security, confidentiality and privacy of all personal information used during electronic service delivery transactions. In the absence of transactional security, electronic service delivery will invite fraud, theft and other misuse to impugn its viability as a means of delivering public services. However, the use of the term “&lt;i&gt;may&lt;/i&gt;” leaves the prescription of security standards up to the discretion of the appropriate Government. Further, the language of the sub-rule is unclear and imprecise.&lt;/p&gt;
&lt;p&gt;4.2.2    &lt;b&gt;Therefore, it is proposed that rule 3(3) is amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“The appropriate Government shall, prior to any electronic service delivery, determine the manner of encrypting electronic records and shall prescribe standards for maintaining the safety, security, confidentiality and privacy of all information collected or used in the course of electronic service delivery.”&lt;/p&gt;
&lt;p&gt;4.3.1    Rule 3(5) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may allow receipt of payments made by adopting the Electronic Service Delivery System to be a deemed receipt of payment effected in compliance with the financial code and treasury code of such Government.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Firstly&lt;/span&gt;, if these Rules enable payments to be made electronically, they must also validate the receipt of these payments. Inviting citizens to make electronic payments for government services without recognising the receipt of those payments is farcical to attract abusive and corrupt practices. Therefore, it is imperative that these Rules compulsorily recognise receipt of payments, either by deeming their receipt to be valid receipts under existing law or by specially recognising their receipt by other means including the law of evidence. Either way, electronic receipts of electronic payments must be accorded the validity in law that manual/paper receipts have; and, copies of such electronic receipts must be capable of being adduced in evidence. &lt;span&gt;Secondly&lt;/span&gt;, the use of the phrase “&lt;i&gt;financial code and treasury code&lt;/i&gt;” is avoidable since these terms are undefined.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.3.2 Therefore, it is proposed that rule 3(5) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“Any receipt of payment made by electronic service delivery shall be deemed to be a valid receipt of such payment under applicable law and shall be capable of being adduced as evidence of such payment.”&lt;/p&gt;
&lt;p&gt;4.4.1    Rule 3(6) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may authorise service providers or their authorised agents to collect, retain and appropriate such service charges as may be specified by the appropriate Government for the purpose of providing such services from the person availing such services: &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;Provided that the apportioned service charges shall be clearly indicated on the receipt to be given to the person availing the services.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This sub-rule is an almost verbatim reproduction of the provisions of section 6-A(2) of the IT Act which reads as follows:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may also authorise any service provider authorised under sub-section (1) to collect, retain and appropriate such service charges, as may be prescribed by the appropriate Government for the purpose of providing such services, from the person availing such service.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the IT Act specifically delegates to the appropriate Governments the power to authorise service providers to levy charges, rule 3(6) of the ESD Rules that merely copies the provisions of the parent statute is meaningless. The purpose of delegated legislation is to give effect to the provisions of a statute by specifying the manner in which statutory provisions shall be implemented. Copying and pasting statutory provisions is a absurd misuse of delegated legislative powers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.4.2 Therefore, it is proposed that sub-rule (6) is deleted and the remaining sub-rules of rule 3 are renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4.5.1 Rule 3(7) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government shall by notification specify the scale of service charges which may be charged and collected by the service providers and their authorised agents for various kinds of services.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;This is an almost verbatim reproduction of the provisions of section 6-A(4) of the IT Act which reads as follows:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government shall, by notification in the Official Gazette, specify the scale of service charges which may be charged and collected by the service providers under this section.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted in paragraph 4.3.1 of this submission, the purpose of delegated legislation is not to copy the provisions of the parent statute, but to amplify the scope of the delegated power and the manner of effecting its implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.5.2  Therefore, it is proposed that sub-rule (7) is deleted and the remaining sub-rules of rule 3 are renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4.6.1 Rule 3(8) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may also determine the norms on service levels to be complied with by the Service Provider and the authorised agents.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no quarrel with the power of the government to determine norms for, or directly prescribe, service levels to regulate service providers. However, without a scheme of statutory or sub-statutory penalties for contravention of the prescribed service levels, a sub-delegated service level cannot enforce any penalties. Simply put, &lt;span&gt;the state cannot enforce penalties unless authorised by law&lt;/span&gt;. Unfortunately, rule 3(8) contains no such authorisation. Service levels for service providers without a regime of penalties for non-compliance is meaningless, especially since service providers will be engaged in providing access to essential government services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.6.2  Therefore, it is proposed that rule 3(8) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“The appropriate Government shall prescribe service levels to be complied with by all service providers and their authorised agents which shall include penalties for failure to comply with such service levels.”&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Thirty-Seventh Report of the Standing Committee on Information Technology (2011-12) on the Electronic Delivery of Services Bill, 2011 (New Delhi: Lok Sabha Secretariat, 29 August 2012) at pp. 13, 17 and 34. See also, &lt;i&gt;Telecom Sector in India: A Decadal Profile&lt;/i&gt; (New Delhi: Telecom Regulatory Authority of India, 8 June 2012).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Annual Report (2011-12) of the Department of Telecommunications, Ministry of Communications and Information Technology, Government of India (New Delhi: Department of Telecommunications, 2012) at pp. 5 and 1-3.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Report of the Working Group on Power of the Twelfth Plan (New Delhi: Planning Commission, Government of India, January 2012).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Provisional Report of the Census of India 2011 (New Delhi: Registrar General and Census Commissioner, 2011) from p. 124.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011'&gt;https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T12:12:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011">
    <title>Comments on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011</link>
    <description>
        &lt;b&gt;Bhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Sensitive Personal Data Rules. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;I &lt;span&gt;&lt;span&gt;Preliminary&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.1  The Centre for Internet and Society (&lt;b&gt;“CIS”&lt;/b&gt;) is pleased to present this submission on the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 that were notified by the Central Government in the Gazette of India vide Notification GSR 313(E) on 11 April 2011 (&lt;b&gt;“Sensitive Personal Data Rules” or “Rules”&lt;/b&gt;) to the Committee on Subordinate Legislation of the Fifteenth Lok Sabha.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.2 The protection of personal information lies at the heart of the right to privacy; and, for this reason, it is an imperative legislative and policy concern in liberal democracies around the world. In India, although remedies for invasions of privacy exist in tort law and despite the Supreme Court of India according limited constitutional recognition to the right to privacy&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;, there have never been codified provisions protecting the privacy of individuals and their personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Sensitive Personal Data Rules represent India’s first legislative attempt to recognise that all persons have a right to protect the privacy of their personal information. However, the Rules suffer from numerous conceptual, substantive and procedural weaknesses, including drafting defects, which demand scrutiny and rectification. The interpretation and applicability of the Rules was further confused when, on 24 August 2011, the Department of Information Technology of the Ministry of Communications attempted to reinterpret the Rules through a press release oblivious to the universally accepted basic proposition that law cannot be made or reinterpreted via press releases.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Therefore, the attention of the Committee on Subordinate Legislation of the Fifteenth Lok Sabha is called to the following submissions:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II &lt;span&gt;Principles to Facilitate Appraisal&lt;/span&gt;&lt;/b&gt;&lt;br /&gt;2.1  The Sensitive Personal Data Rules are an important step towards building a legal regime that protects the privacy of individuals whilst enabling the secure collection, use and storage of personal information by state and private entities. The Rules are to be welcomed in principle. However, at present, the Rules construct an incomplete regime that does not adequately protect privacy and, for this reason, falls short of internationally accepted data protection standards.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This not only harms the personal liberties of Indian citizens, it also affects the ability of Indian companies to conduct commerce in foreign countries. More importantly, the Rules offer no protection against the state.&lt;/p&gt;
&lt;p&gt;2.2  To enact a comprehensive personal information protection regime, CIS believes that the Rules should proceed on the basis of the following broad principles:&lt;/p&gt;
&lt;p&gt;(a)   &lt;span&gt;Principle of Notice / Prior Knowledge&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All persons from whom personal information is collected have a right to know, before the personal information is collected and, where applicable, at any point thereafter: (i) of an impending collection of personal information; (ii) the content and nature of the personal information being collected; (iii) the purpose for which the personal information is being collected; (iv) the broad identities of all natural and juristic persons who will have access to the collected personal information; (v) the manner in which the collected personal information will be used; (vi) the duration for which the collected personal information will be stored; (vii) whether the collected personal information will be disclosed to third parties including the police and other law enforcement agencies; (viii) of the manner in which they may access, check, modify or withdraw their collected personal information; (ix) the security practices and safeguards that will govern the sanctity of the collected personal information; (x) of all privacy policies and other policies in relation to the collected personal information; (xi) of any breaches in the security, safety, privacy and sanctity of the collected personal information; and, (xii) the procedure for recourse, including identities and contact details of ombudsmen and grievance redress officers, in relation to any misuse of the collected personal information.&lt;/p&gt;
&lt;p&gt;(b)    &lt;span&gt;Principle of Consent&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Personal information must only be collected once the person to whom it pertains has consented to its collection. Such consent must be informed, explicit and freely given. Informed consent is conditional upon the fulfilment of the principle of notice/prior knowledge set out in the preceding paragraph. Consent must be expressly given: the person to whom the personal information to be collected pertains must grant explicit and affirmative permission to collect personal information; and, he must know, or be made aware, of any action of his that will constitute such consent. Consent that is obtained using threats or coercion, such as a threat of refusal to provide services, does not constitute valid consent. Any person whose personal information has been consensually collected may, at any time, withdraw such consent for any or no reason and, consequently, his personal information, including his identity, must be destroyed. When consent is withdrawn in this manner, the person who withdrew consent may be denied any service that requires the use of the personal information for which consent was withdrawn.&lt;/p&gt;
&lt;p&gt;(c)  &lt;span&gt;Principle of Necessity / Collection Limitation&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Personal information must only be collected when, where and to the extent necessary. Necessity cannot be established in general; there must be a specific nexus connecting the content of the personal information to the purpose of its collection. Only the minimal amount of personal information necessary to achieve the purpose should be collected. If a purpose exists that warrants a temporally specific, or an event-dependent, collection of personal information, such a collection must only take place when that specific time is reached or that event occurs. If the purpose of personal information is dependent upon, or specific to, a geographical area or location, that personal information must only be collected from that geographical area or location.&lt;/p&gt;
&lt;p&gt;(d)  &lt;span&gt;Right to be Forgotten / Principle of Purpose Limitation&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Once collected, personal information must be processed, used, stored or otherwise only for the purpose for which it was collected. If the purpose for which personal information was collected is achieved, the collected personal information must be destroyed and the person to whom that personal information pertained must be ‘forgotten.’ Similarly, collected personal information must be destroyed and the person to whom it pertained ‘forgotten’ if the purpose for which it was collected expires or ceases to exist. Personal information collected for a certain purpose cannot be used or stored for another purpose nor even used or stored for a similar purpose to arise in the future without the express and informed consent of the person from whom it was collected in accordance with the principles of notice/prior knowledge and consent.&lt;/p&gt;
&lt;p&gt;(e)    &lt;span&gt;Right of Access&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All persons from whom personal information is collected have a right to access that personal information at any point following its collection to check its accuracy, make corrections or modifications and have destroyed that which is inaccurate. Where personal information of more than one person is held in an aggregated form such that affording one person access to it may endanger the right to privacy of another person, the entity holding the aggregated personal information must, to the best of its ability, identify the portion of the personal information that pertains to the person seeking access and make it available to him. All persons from whom personal information is collected must be given copies of their personal information upon request.&lt;/p&gt;
&lt;p&gt;(f)   &lt;span&gt;Principle­ regarding Disclosure&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Personal information, once collected, must never be disclosed. However, if the person to whom certain personal information pertains consents to its disclosure in accordance with the principle of consent after he has been made aware of the proposed disclosee and other details related to the personal information in accordance with the principle of notice/prior knowledge, the personal information may be disclosed. Consent to a disclosure of this nature may be obtained even during collection of the personal information if the person to whom it pertains expressly consents to its future disclosure. Notwithstanding the rule against disclosure and the consent exception to the rule, personal information may be disclosed to the police or other law enforcement agencies on certain absolute conditions. Since the protection of personal information is a policy imperative, the conditions permitting its disclosure must be founded on a clear and serious law enforcement need that overrides the right to privacy; and, in addition, the disclosure conditions must be strict, construed narrowly and, in the event of ambiguity, interpreted to favour the individual right to privacy. Therefore, (i) there must be a demonstrable need to access personal information in connection with a criminal offence; (ii) only that amount of personal information that is sufficient to satisfy the need must be disclosed; and, (iii), since such a disclosure is non-consensual, it must follow a minimal due process regime that at least immediately notifies the person concerned and affords him the right to protest the disclosure.&lt;/p&gt;
&lt;p&gt;(g)  &lt;span&gt;Principle of Security&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All personal information must be protected to absolutely maintain its sanctity, confidentiality and privacy by implementing safeguards against loss, unauthorised access, destruction, use, processing, storage, modification, de-anonymisation, unauthorised disclosure and other risks. Such a level of protection must include physical, administrative and technical safeguards that are constantly and consistently audited. Protection measures must be revised to incorporate stronger measures and mechanisms as and when they arise.&lt;/p&gt;
&lt;p&gt;(h) &lt;span&gt;Principle of Transparency / ‘Open-ness’&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;All practices, procedures and policies governing personal information must be made available to the person to whom that personal information pertains in a simple and easy-to-understand manner. This includes policies relating to the privacy, security and disclosure of that personal information. If an entity that seeks to collect personal information does not have these policies, it must immediately draft, publish and display such policies in addition to making them available to the person from whom it seeks to collect personal information before the collection can begin.&lt;/p&gt;
&lt;p&gt;(i)  &lt;span&gt;Principle of Accountability&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Liability attaches to the possession of personal information of another person. Since rights and duties, such as those in relation to privacy of personal information, are predicated on accountability, this principle binds all entities that seek to possess personal information of another person. As a result, an entity seeking to collect, use, process, store or disclose personal information of another person is accountable to that person for complying with all these principles as well as the provisions of any law. The misuse of personal information causes harm to the person to whom it pertains to attract and civil and criminal penalties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.3 These principles are reflective of internationally accepted best practices to form the basis upon which Indian legislation to protect personal information should be drafted. The Sensitive Personal Data Rules, in their current form, fall far short of the achieving the substantive intent of these principles. &lt;b&gt;CIS submits that either (i) the Sensitive Personal Data Rules should be replaced with new and comprehensive legislation that speaks to the objectives and purpose of these principles, or (ii) the Sensitive Personal Data Rules are radically modified by amendment to bring Indian law to par with world standards.&lt;/b&gt; Nevertheless, without prejudice to the preceding submission, CIS offers the following clause-by-clause comments on the Sensitive Personal Data Rules:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III &lt;span&gt;&lt;span&gt;Clause-by-Clause Analysis and Comments&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Rule 2 - Definitions&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3.1.1    Rule 2(1)(b) of the Sensitive Personal Data Rules defines “biometrics” as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"Biometrics" means the technologies that measure and analyse human body characteristics, such as 'fingerprints', 'eye retinas and irises', 'voice patterns', "facial patterns', 'hand measurements' and 'DNA' for authentication purposes.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.1.2   &lt;span&gt;Firstly&lt;/span&gt;, the Sensitive Personal Data Rules do not use the term “biometrics.” Instead, rule 3(vi), which defines sensitive personal data, uses the term “biometric information.” It is unclear why rule 2(1)(b) provides a definition of the technologies by which information is obtained instead of clearly identify the information that constitutes sensitive personal data. This is one of several examples of poor drafting of the Sensitive Personal Data Rules. &lt;span&gt;Secondly&lt;/span&gt;, biometric information is not used only for authentication; there are many other reasons for collecting and using biometric information. For instance, DNA is widely collected and used for medical research. Restricting the application of the definition to only that biometric information that is used for authentication is illogical to deprive the Rules of meaning.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.1.3    Therefore, it is proposed that rule 2(1)(b) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;““Biometric information” means any information relating to the physical, physiological or behavioural characteristics of an individual which enable their unique identification including, but not limited to, fingerprints, retinas, irises, voice patterns, facial patterns, Deoxyribonucleic acid (DNA) and genetic information.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2.1  Rule 2(1)(c) of the Sensitive Personal Data Rules defines “body corporate” in accordance with the definition provided in clause (i) of the Explanation to section 43A of the Information Technology Act, 2000 (&lt;b&gt;“IT Act”&lt;/b&gt;) as follows:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;“body corporate” means any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2.2 &lt;span&gt;Firstly&lt;/span&gt;, this definition of a body corporate is poorly drafted to extend beyond incorporated entities to bring within its ambit even unincorporated professional organisations such as societies and associations which, by their very nature, are not bodies corporate.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an arbitrary reinterpretation of the fundamental principles of company law. As it presently stands, this peculiar definition will extend to public and private limited companies, including incorporated public sector undertakings, ordinary and limited liability partnerships, firms, sole proprietorships, societies and associations; but, &lt;span&gt;&lt;span&gt;will exclude public and private trusts&lt;/span&gt;&lt;/span&gt;&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; &lt;span&gt;and unincorporated public authorities&lt;/span&gt;. Hence, whereas non-governmental organisations that are organised as societies will fall within the definition of “body corporate,” those that are organised as trusts will not. Similarly, incorporated public authorities such as Delhi Transport Corporation and even municipal corporations such as the Municipal Corporation of Delhi will fall within the definition of “body corporate” but unincorporated public authorities such as the New Delhi Municipal Council and the Delhi Development Authority will not. This is a &lt;i&gt;prima facie&lt;/i&gt; violation of the fundamental right of all persons to be treated equally under the law guaranteed by Article 14 of the Constitution of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2.3  &lt;span&gt;Secondly&lt;/span&gt;, whereas state entities and public authorities often collect and use sensitive personal data, with the exception of state corporations the Sensitive Personal Data Rules do not apply to the state. This means that the procedural safeguards offered by the Rules do not bind the police and other law enforcement agencies allowing them a virtually unfettered right to collect and use, even misuse, sensitive personal data without consequence. Further, state entities such as the Unique Identification Authority of India or the various State Housing Boards which collect, handle, process, use and store sensitive personal data are not covered by the Rules and remain unregulated. It is not possible to include these unincorporated entities within the definition of a body corporate; but, in pursuance of the principles set out in paragraph 2.2 of this submission, the Rules should be expanded to all state entities, whether incorporated or not.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.2.4  Therefore, it is proposed that rule 2(1)(c) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;““body corporate” means the body corporate defined in sub-section (7) of section 2 read with section 3 of the Companies Act, 1956 (1 of 1956) and includes those entities which the Central Government may, by notification in the Official Gazette, specify in this behalf but shall not include societies registered under the Societies Registration Act, 1860 (21 of 1860), trusts created under the Indian Trusts Act, 1882 (2 of 1882) or any other association of individuals that is not a legal entity apart from the members constituting it and which does not enjoy perpetual succession.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Further, it is proposed that the Sensitive Personal Data Rules be re-drafted to apply to societies registered under the Societies Registration Act, 1860 and trusts created under the Indian Trusts Act, 1882 in a manner reflective of their distinctiveness from bodies corporate&lt;/b&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Furthermore, it is proposed that the Sensitive Personal Data Rules be re-drafted to apply to public authorities and the state as defined in Article 12 of the Constitution of India&lt;/b&gt;.&lt;/p&gt;
&lt;p&gt;3.3.1  Rule 2(1)(d) of the Sensitive Personal Data Rules defines “cyber incidents” as follows:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;"Cyber incidents" means any real or suspected adverse event in relation to cyber security that violates an explicitly or implicitly applicable security policy resulting in unauthorised access, denial of service or disruption, unauthorised use of a computer resource for processing or storage of information or changes to data, information without authorisation.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.3.2  Before examining the provisions of this clause, CIS questions the need for this definition. The term “&lt;i&gt;cyber incidents&lt;/i&gt;” is used only once in these rules: the proviso to rule 6(1) which specifies the conditions upon which personal information or sensitive personal data may be disclosed to the police or other law enforcement authorities without the prior consent of the person to whom the information pertains. An analysis of rule 6(1) is contained at paragraphs 3.11.1 – 3.11.4 of this submission. &lt;span&gt;Firstly&lt;/span&gt;, personal information and sensitive personal data should only be disclosed in connection with the prevention, investigation and prosecution of an existing offence. Offences cannot be created in the definitions clause of sub-statutory rules, they can only be created by a parent statute or another statute. &lt;span&gt;Secondly&lt;/span&gt;, the scope and content of “cyber incidents” are already covered by section 43 of the IT Act. When read with section 66 of IT Act, an offence is created that is larger than the scope of the term “cyber incidents” to render this definition redundant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.3.3   Therefore, it is proposed that the definition of “cyber incidents” in rule 2(1)(d) be deleted and the remaining clauses in sub-rule (1) of rule 2 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.4.1  Rule 2(1)(g) of the Sensitive Personal Data Rules defines “intermediary” in accordance with the definition provided in section 2(1)(w) of the IT Act. However, the term “intermediary” is not used anywhere in the Sensitive Personal Data Rules and so its definition is redundant. This is another instance of careless drafting of the Sensitive Personal Data Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.4.2   Therefore, it is proposed that the definition of “intermediary” in rule 2(1)(g) be deleted and the remaining clauses in sub-rule (1) of rule 2 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 3 - Sensitive Personal Data&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3.5.1    Rule 3 of the Sensitive Personal Data Rules provides an aggregated definition of sensitive personal data as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Sensitive personal data or information of a person means such personal information which consists of information relating to – &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)   password; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(ii)  financial information such as Bank account or credit card or debit card or other payment instrument details ; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(iii) physical, physiological and mental health condition; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iv) sexual orientation; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(v)  medical records and history; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vi) Biometric information; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(vii) any detail relating to the above clauses as provided to body corporate for providing service; and &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(viii) any of the information received under above clauses by body corporate for processing, stored or processed under lawful contract or otherwise: &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;provided that, any information that is freely available or accessible in public domain or furnished under the Right to Information Act, 2005 or any other law for the time being in force shall not be regarded as sensitive personal data or information for the purposes of these rules.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.5.2    In accordance with the principle that certain kinds of personal information are particularly sensitive, due to the intimate nature of their content in relation to the right to privacy, to invite privileged protective measures regarding the collection, handling, processing, use and storage of such sensitive personal data, it is surprising that rule 3 does not protect electronic communication records of individuals. Emails and chat logs as well as records of internet activity such as online search histories are particularly vulnerable to abuse and misuse and should be accorded privileged protection.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.5.3    Therefore, it is proposed that rule 3 be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;“Sensitive personal data or information of a person means personal information as to that person’s –&lt;/p&gt;
&lt;p&gt;(i)  passwords and encryption keys;&lt;/p&gt;
&lt;p&gt;(ii)  financial information including, but not limited to, information relating to his bank accounts, credit cards, debit cards, negotiable instruments, debt and other payment details;&lt;/p&gt;
&lt;p&gt;(iii) physical, physiological and mental condition;&lt;/p&gt;
&lt;p&gt;(iv)  sexual activity and sexual orientation;&lt;/p&gt;
&lt;p&gt;(v)   medical records and history;&lt;/p&gt;
&lt;p&gt;(vi)  biometric information; and&lt;/p&gt;
&lt;p&gt;(vii) electronic communication records including, but not limited to, emails, chat logs and other communications made using a computer;&lt;/p&gt;
&lt;p&gt;and shall include any data or information related to the sensitive personal data or information set out in this rule that is provided to, or received by, a body corporate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that, any information that is freely available or accessible in the public domain or furnished under the Right to Information Act, 2005 or any other law for the time being in force shall not be regarded as sensitive personal data or information for the purposes of these rules.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 4 - Privacy and Disclosure Policy&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;3.6.1    Rule 4 of the Sensitive Personal Data Rules, which obligates certain bodies corporate to publish privacy and disclosure policies for personal information, states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Body corporate to provide policy for privacy and disclosure of information. – &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(1) The body corporate or any person who on behalf of body corporate collects, receives, possess, stores, deals or handle information of provider of information, shall provide a privacy policy for handling of or dealing in personal information including sensitive personal data or information and ensure that the same are available for view by such providers of information who has provided such information under lawful contract. Such policy shall be published on website of body corporate or any person on its behalf and shall provide for –&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)  Clear and easily accessible statements of its practices and policies; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii) type of personal or sensitive personal data or information collected under rule 3; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iii) purpose of collection and usage of such information; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iv) disclosure of information including sensitive personal data or information as provided in rule 6; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(v)  reasonable security practices and procedures as provided under rule 8. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.6.2  This rule is very badly drafted, contains several discrepancies and is legally imprecise. &lt;span&gt;Firstly&lt;/span&gt;, this rule is overbroad to bind all bodies corporate that receive and use information, as opposed to “personal information” or “sensitive personal data.” All bodies corporate receive and use information, even a vegetable seller uses information relating to vegetables and prices; but, not all bodies corporate receive and use personal information and even fewer bodies corporate receive and use sensitive personal data. The application of this provision should turn on the reception and use of personal information, which includes sensitive personal data, and not simply information. &lt;span&gt;Secondly&lt;/span&gt;, although this rule only applies when a provider of information provides information, the term “provider of information” is undefined. It may mean any single individual who gives his personal information to a body corporate, or it may even mean another entity that outsources or subcontracts work that involves the handling of personal information. This lack of clarity compromises the enforceability of this rule. The government’s press release of 24 August 2011 acknowledged this error but since it is impossible, not to mention unconstitutional, for a statutory instrument like these Rules to be amended, modified, interpreted or clarified by a press release, CIS is inclined to ignore the press release altogether. It is illogical that privacy policies not be required when personal information is directly given by a single individual. This rule should bind all bodies corporate that receive and use personal information irrespective of the source of the personal information. &lt;span&gt;Thirdly&lt;/span&gt;, it is unclear whether separate privacy policies are required for personal information and for sensitive personal data. There is a distinction between personal information and sensitive personal data and since these Sensitive Personal Data Rules deal with the protection of sensitive personal data, this rule 4 should unambiguously mandate the publishing of privacy policies in relation to sensitive personal data. Any additional requirement for personal information must be set out to clearly mark its difference from sensitive personal data. &lt;span&gt;Fourthly&lt;/span&gt;, because of sloppy drafting, the publishing duties of the body corporate in respect of any sensitive personal data are unclear. For example, the phrase “&lt;i&gt;personal or sensitive personal data or information&lt;/i&gt;” used in clause (ii) is meaningless since “personal information” and “sensitive personal data or information” are defined terms.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.6.3  Therefore, it is proposed that rule 3 be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;b&gt;Duty to publish certain policies. – &lt;/b&gt;(1) Any body corporate that collects, receives, possesses, stores, deals with or handles personal information or sensitive personal data from any source whatsoever shall, prior to collecting, receiving, possessing, storing, dealing with or handling such personal information or sensitive personal data, publish and prominently display the policies listed in sub-rule (2) in relation to such personal information and sensitive personal data.&lt;/p&gt;
&lt;p&gt;(2) In accordance with sub-rule (1) of this rule, all bodies corporate shall publish separate policies for personal information and sensitive personal data that clearly state –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) the meanings of personal information and sensitive personal data in accordance with these rules;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) the practices and policies of that body corporate in relation to personal information and sensitive personal data;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) descriptive details of the nature and type of personal information and sensitive personal data collected, received, possessed, stored or handled by that body corporate;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) the purpose for which such personal information and sensitive personal data is collected, received, possessed, stored or handled by that body corporate;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) the manner and conditions upon which such personal information and sensitive personal data may be disclosed in accordance with rule 6 of these rules; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) the reasonable security practices and procedures governing such personal information and sensitive personal data in accordance with rule 8 of these rules.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 5 - Collection of Information&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;3.7.1    Rule 5(1) of the Sensitive Personal Data Rules lays down the requirement of consent before personal information can be collected as follows:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Body corporate or any person on its behalf shall obtain consent in writing through letter or Fax or email from the provider of the sensitive personal data or information regarding purpose of usage before collection of such information.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.7.2 &lt;span&gt;Firstly&lt;/span&gt;, the principle and requirement of consent is of overriding importance when collecting personal information, which includes sensitive personal data. Pursuant to the principles laid down in paragraph 2.2 of this submission, consent must be informed, explicit and freely given. Since sub-rule (3) of rule 5 attempts to secure the informed consent of persons giving personal information, this sub-rule must establish that all personal information can only be collected upon explicit consent that is freely given, irrespective of the medium and manner in which it is given. &lt;span&gt;Secondly&lt;/span&gt;, it may be noted that sub-rule (1) only applies to sensitive personal data and not to other personal information that is not sensitive personal data. This is ill advised.  &lt;span&gt;Thirdly&lt;/span&gt;, this sub-rule relating to actual collection of personal information should follow a provision establishing the principle of necessity before collection can begin. The principle of necessity is currently laid down in sub-rule (2) of rule 5 which should be re-numbered to precede this sub-rule relating to collection.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.7.3   Therefore, it is proposed that rule 5(1) be re-numbered to sub-rule (2) of rule 5 and re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“A body corporate seeking to collect personal information or sensitive personal data of a person shall, prior to collecting that personal information or sensitive personal data, obtain the express and informed consent of that person in any manner, and through any medium, that may be convenient but shall not obtain such consent through threat, duress or coercion.”&lt;/p&gt;
&lt;p&gt;3.8.1    Rule 5(2) of the Sensitive Personal Data Rules sets out the principle of necessity governing the collection of personal information as follows:&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Body corporate or any person on its behalf shall not collect sensitive personal data or information unless — &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a)  the information is collected for a lawful purpose connected with a function or activity of the body corporate or any person on its behalf; and &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b) the collection of the sensitive personal data or information is considered necessary for that purpose.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.8.2    &lt;span&gt;Firstly&lt;/span&gt;, before allowing a body corporate to collect personal information, which includes sensitive personal data, the law should strictly ensure that the collection of such personal information is necessary. Necessity cannot be established in general, there must be a nexus connecting the personal information to the purpose for which the personal information is sought to be collected. This important sub-rule sets out the principles upon which personal information can be collected; and, should therefore be the first sub-rule of rule 5. &lt;span&gt;Secondly&lt;/span&gt;, this sub-rule only applies to sensitive personal data instead of all personal information. It is in the public interest that the principle of necessity applies to all personal information, including sensitive personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.8.3 &lt;b&gt;Therefore, it is proposed that rule 5(2) be re-numbered to sub-rule (1) of rule 5 and re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“No body corporate shall collect any personal information or sensitive personal data of a person unless it clearly establishes that –&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;(a) the personal information or sensitive personal data is collected for a lawful purpose that is directly connected to a function or activity of the body corporate; and&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;(b) the collection of the personal information or sensitive personal data is necessary to achieve that lawful purpose.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.9.1 Rule 5(3) of the Sensitive Personal Data Rules attempts to create an informed consent regime for the collection of personal information as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;While collecting information directly from the person concerned, the body corporate or any person on its behalf snail take such steps as are, in the circumstances, reasonable to ensure that the person concerned is having the knowledge of — &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(a)  the fact that the information is being collected; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(b)  the purpose for which the information is being collected; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(c)  the intended recipients of the information; and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(d)  the name and address of — &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)   the agency that is collecting the information; and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii)  the agency that will retain the information.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.9.2   &lt;span&gt;Firstly&lt;/span&gt;, this sub-rule (3) betrays the carelessness of its drafters by bringing within its application any and all information collected by a body corporate from a person instead of only personal information or sensitive personal data. &lt;span&gt;Secondly&lt;/span&gt;, this provision is crucial to establishing a regime of informed consent before personal information is given by a person to a body corporate. For consent to be informed, the person giving consent must be made aware of not only the collection of that personal information or sensitive personal data, but also the purpose for which it is being collected, the manner in which it will be used, the intended recipients to whom it will be sent or made accessible, the duration for which it will be stored, the conditions upon which it may be disclosed, the conditions upon which it may be destroyed as well as the identities of all persons who will collect, receive, possess, store, deal with or handle that personal information or sensitive personal data. &lt;span&gt;Thirdly&lt;/span&gt;, the use of the phrase “&lt;i&gt;take such steps as are, in the circumstances, reasonable&lt;/i&gt;” dilutes the purpose of this provision and compromises the establishment of an informed consent regime. Instead, the use of the term “reasonable efforts”, which has an understood meaning in law, will suffice to protect individuals while giving bodies corporate sufficient latitude to conduct their business.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.9.3    Therefore, it is proposed that rule 5(3) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;“A body corporate seeking to collect personal information or sensitive personal data of a person shall, prior to such collection, make reasonable efforts to inform that person of the following details in respect of his personal information or sensitive personal data –&lt;/p&gt;
&lt;p&gt;(a)  the fact that it is being collected;&lt;/p&gt;
&lt;p&gt;(b)  the purpose for which it is being collected;&lt;/p&gt;
&lt;p&gt;(c)  the manner in which it will be used;&lt;/p&gt;
&lt;p&gt;(d)  the intended recipients to whom it will be sent or made available;&lt;/p&gt;
&lt;p&gt;(e)  the duration for which it will be stored;&lt;/p&gt;
&lt;p&gt;(f)   the conditions upon which it may be disclosed;&lt;/p&gt;
&lt;p&gt;(g)  the conditions upon which it may be destroyed; and&lt;/p&gt;
&lt;p&gt;(h)  the identities of all persons and bodies corporate who will collect, receive, possess, store, deal with or handle it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.10.1  Rule 5(4) of the Sensitive Personal Data Rules lays down temporal restrictions to the retention of personal information:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Body corporate or any person on its behalf holding sensitive personal data or information shall not retain that information for longer than is required for the purposes for which the information may lawfully be used or is otherwise required under any other law for the time being in force.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.10.2  Since this sub-rule (4) only applies to sensitive personal data instead of all personal information, bodies corporate are permitted to hold personal information of persons that is not sensitive personal data for as long as they like even after the necessity that informed the collection of that personal information expires and the purpose for which it was collected ends. This is a dangerous provision that deprives the owners of personal information of the ability to control its possession to jeopardise their right to privacy. The Sensitive Personal Data Rules should prescribe a temporal limit to the storage of all personal information by bodies corporate.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.10.3  Therefore, it is proposed that rule 5(4) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“No body corporate shall store, retain or hold personal information or sensitive personal data for a period longer than is required to achieve the purpose for which that personal information or sensitive personal data was collected.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 6 - Disclosure of Information&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.11.1  Rule 6(1) of the Sensitive Personal Data Rules, which deals with the crucial issue of disclosure of personal information, states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Disclosure of sensitive personal data or information by body corporate to any third party shall require prior permission from the provider of such information, who has provided such information under lawful contract or otherwise, unless such disclosure has been agreed to in the contract between the body corporate and provider of information, or where the disclosure is necessary for compliance of a legal obligation: &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provided that the information shall be shared, without obtaining prior consent from provider of information, with Government agencies mandated under the law to obtain information including sensitive personal data or information for the purpose of verification of identity, or for prevention, detection, investigation including cyber incidents, prosecution, and punishment of offences. The Government agency shall send a request in writing to the body corporate possessing the sensitive personal data or information stating clearly the purpose of seeking such information. The Government agency shall also state that the information so obtained shall not be published or shared with any other person.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.11.2  In addition to errors and discrepancies in drafting, this sub-rule contains wide and vague conditions of disclosure of sensitive personal data to gravely impair the privacy rights and personal liberties of persons to whom such sensitive personal data pertains. A summary of drafting errors and discrepancies follows: &lt;span&gt;Firstly&lt;/span&gt;, this sub-rule only applies to sensitive personal data instead of all personal information. The protection of personal information that is not sensitive personal data is an essential element of the right to privacy; hence, prohibiting bodies corporate from disclosing personal information at will is an important public interest prerogative. &lt;span&gt;Secondly&lt;/span&gt;, the use of the phrase “&lt;i&gt;any third party&lt;/i&gt;” lends vagueness to this provision since the term “third party” has not been defined. &lt;span&gt;Thirdly&lt;/span&gt;, the repeated use of the undefined phrase “&lt;i&gt;provider of information&lt;/i&gt;” throughout these Rules and in this sub-rule is confusing since, as pointed out in paragraph 3.6.2 of this submission, it could mean either or both of the single individual who consents to the collection of his personal information or another entity that transfers personal information to the body corporate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.11.3  Further, the conditions upon which bodies corporate may disclose personal information and sensitive personal data without the consent of the person to whom it pertains are dangerously wide. &lt;span&gt;Firstly&lt;/span&gt;, the disclosure of personal information and sensitive personal data when it is “&lt;i&gt;necessary for compliance of a legal obligation&lt;/i&gt;” is an extremely low protection standard. The law must intelligently specify the exact conditions upon which disclosure sans consent is possible; since the protection of personal information is a public interest priority, the conditions upon which it may be disclosed must outweigh this priority to be significant and serious enough to imperil the nation or endanger public interest. The disclosure of personal information and sensitive personal data for mere compliance of a legal obligation, such as failure to pay an electricity bill, is farcical. &lt;span&gt;Secondly&lt;/span&gt;, the proviso sets out the conditions upon which the state, through its law enforcement agencies, may access personal information and sensitive personal data without the consent of the person to whom it pertains. Empowering the police with access to personal information can serve a public good if, and only if, it results in the prevention or resolution of crime; if not, this provision will give the police carte blanche to misuse and abuse this privilege. Hence, personal information should only be disclosed for the prevention, investigation and prosecution of an existing criminal offence. &lt;span&gt;Thirdly&lt;/span&gt;, the definition and use of the term “&lt;i&gt;cyber incidents&lt;/i&gt;” is unnecessary because section 43 of the IT Act already lists all such incidents. In addition, when read with section 66 of the IT Act, there emerges a clear list of offences to empower the police to seek non-consensual disclosure of personal information to obviate the need for any further new terminology. &lt;span&gt;In sum&lt;/span&gt;, with regard to the non-consensual disclosure of personal information for the purposes of law enforcement: a demonstrable need to access personal information to prevent, investigate or prosecute crime must exist; only that amount of personal information sufficient to satisfy the need must be disclosed; and, finally, no disclosure may be permitted without clearly laid down procedural safeguards that fulfil the requirements of a minimal due process regime.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.11.4  Therefore, it is proposed that rule 6(1) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“No body corporate shall disclose any personal information or sensitive personal data to anyone whosoever without the prior express consent of the person to whom the personal information or sensitive personal data to be disclosed pertains.&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;Provided that if the personal information or sensitive personal data was collected pursuant to an agreement that expressly authorises the body corporate to disclose such personal information or sensitive personal data, and if the person to whom the personal information or sensitive personal data pertains was aware of this authorisation prior to such collection, the body corporate may disclose the personal information or sensitive personal data without obtaining the consent of the person to whom it pertains in the form and manner specified in such agreement.&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;Provided further that if a reasonable threat to national security, defence or public order exists, or if the disclosure of personal information or sensitive personal data is necessary to prevent, investigate or prosecute a criminal offence, the body corporate shall, upon receiving a written request from the police or other law enforcement authority containing the particulars and details of the personal information or sensitive personal data to be disclosed, disclose such personal information or sensitive personal data to such police or other law enforcement authority without the prior consent of the person to whom it pertains.”&lt;/p&gt;
&lt;p&gt;3.12.1  Rule 6(2) of the Sensitive Personal Data Rules creates an additional disclosure mechanism:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Notwithstanding anything contain in sub-rule (1), any sensitive personal data on Information shall be disclosed to any third party by an order under the law for the time being in force.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.12.2  This sub-rule is overbroad to enable anyone’s sensitive personal data to be disclosed to any other person without the application of any standards of necessity, proportionality or due process and without the person to whom the sensitive personal data pertains having any recourse or remedy. Such provisions are the hallmarks of authoritarian and police states and have no place in a liberal democracy. For instance, the invocation of this sub-rule will enable a police constable in Delhi to exercise unfettered power to access the biometric information or credit card details of a politician in Kerala since an order of a policeman constitutes “&lt;i&gt;an order under the law&lt;/i&gt;”. Pursuant to our submission in paragraph 3.11.4, adequate measures exist to secure the disclosure of personal information or sensitive public data in the public interest. The balance of convenience between privacy and public order has already been struck. This sub-rule should be removed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.12.3 Therefore, it is proposed that rule 6(2) be deleted and the remaining sub-rules in rule 6 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;3.13.1  Rule 6(4) of the Sensitive Personal Data Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The third party receiving the sensitive personal data or information from body corporate or any person on its behalf under sub-rule (1) shall not disclose it further.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.13.2  &lt;span&gt;Firstly&lt;/span&gt;, as mentioned elsewhere in this submission, the phrase “&lt;i&gt;third party&lt;/i&gt;” has not been defined. This is a drafting discrepancy that must be rectified. &lt;span&gt;Secondly&lt;/span&gt;, this sub-rule only encompasses sensitive personal data and not other personal information that is not sensitive personal data. &lt;span&gt;Thirdly&lt;/span&gt;, it may be necessary, in the interests of business or otherwise, for personal information or sensitive personal data that has been lawfully disclosed to a third person to be disclosed further if the person to whom that personal information consents to it.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.13.3  Therefore, it is proposed that rule 6(4) be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;“Personal information and sensitive personal data that has been lawfully disclosed by a body corporate to a person who is not the person to whom such personal information or sensitive personal data pertains in accordance with the provisions of these rules may be disclosed further upon obtaining the prior and express consent of the person to whom it pertains.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 7 - Transfer of Information&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.14.1  Rule 7 of the Sensitive Personal Data Rules sets out the conditions upon which bodies corporate may transfer personal information or sensitive personal data to other bodies corporate in pursuance of a business arrangement:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;A body corporate or any person on its behalf may transfer sensitive personal data or information including any information, to any other body corporate or a person in India, or located in any other country, that ensures the same level of data protection that is adhered to by the body corporate as provided for under these Rules. The transfer may be allowed only if it is necessary for the performance of the lawful contract between the body corporate or any person on its behalf and provider of information or where such person has consented to data transfer.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.14.2  This provision allows personal information and sensitive personal data to be transferred across international borders to other bodies corporate in pursuance of a business agreement. The transfer of such information is a common feature of international commerce in which Indian information technology companies participate with significant success. Within India too, personal information and sensitive personal data is routinely transferred between companies in furtherance of an outsourced business model. Besides affecting ease of business, the sub-rule also affects the ability of persons to control their personal information and sensitive personal data. However, the sub-rule has been poorly drafted: &lt;span&gt;firstly&lt;/span&gt;, the simultaneous use of the phrases “&lt;i&gt;provider of information&lt;/i&gt;” and “&lt;i&gt;such person&lt;/i&gt;” is imprecise and misleading; &lt;span&gt;secondly&lt;/span&gt;, the person to whom any personal information or sensitive personal data pertains must pre-consent to the transfer of such information.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3.14.3  Therefore, it is proposed that rule 7 be re-drafted to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“A body corporate may transfer any personal information or sensitive personal data in its possession to another body corporate, whether located in India or otherwise, if the transfer is pursuant to an agreement that binds the other body corporate to same, similar or stronger measures of privacy, protection, storage, use and disclosure of personal information and sensitive personal data as are contained in these rules, and if the express and informed consent of the person to whom the personal information or sensitive personal data pertains is obtained prior to the transfer.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 8 - Reasonable Security Practices&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.15.1  Following rule 8(1) of the Sensitive Personal Data Rules that prescribes reasonable security practices and procedures necessary for protecting personal information and sensitive personal data, rule 8(2) asserts that the international standard ISO/IEC 27001 fulfils the protection standards required by rule 8(1):&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;&lt;i&gt;The international Standard IS/ISO/IEC 27001 on "Information Technology - Security Techniques - Information Security Management System - Requirements" is one such standard referred to in sub-rule (1).&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.15.2  ISO/IEC 27001 is an information security management system standard that is prescribed by the International Organisation for Standardisation and the International Electrotechnical Commission. CIS raises no objection to the content or quality of the ISO/IEC 27001 standard. However, to achieve ISO/IEC 27001 compliance and certification, one must first purchase a copy of the standard. A copy of the ISO/IEC 27001 standard costs approximately Rs. _____/-. The cost of putting in place the protective measures required by the ISO/IEC 27001 standard are higher: these include the cost of literature and training, the cost of external assistance, the cost of technology, the cost of employees’ time and the cost of certification.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3.15.3  Therefore, to bring these standards within the reach of small and medium-sized Indian bodies corporate, an appropriate Indian authority, such as the Bureau of Indian Standards, should re-issue affordable standards that are equivalent to ISO/IEC 27001. &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IV &lt;span&gt;The Press Release of 24 August 2011&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.1  The shoddy drafting of the Sensitive Personal Data Rules resulted in national and international confusion about its interpretation. However, instead of promptly correcting the embarrassingly numerous errors in the Rules, the Department of Information Technology of the Ministry of Communications and Information Technology chose to issue a press release on 24 August 2011 that was published on the website of the Press Information Bureau. The content of that press release is brought to the attention of the Committee of Subordinate Legislation as follows:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;Clarification on Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 Under Section 43A of the Information Technology ACT, 2000.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;Press Note&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;The Department of Information Technology had notified Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 under section 43A of the Information Technology Act, 2000 on 11.4.2011 vide notification no. G.S.R. 313(E).&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;These rules are regarding sensitive personal data or information and are applicable to the body corporate or any person located within India. Any such body corporate providing services relating to collection, storage, dealing or handling of sensitive personal data or information under contractual obligation with any legal entity located within or outside India is not subject to the requirement of Rules 5 &amp;amp; 6. Body corporate, providing services to the provider of information under a contractual obligation directly with them, as the case may be, however, is subject to Rules 5 &amp;amp; 6. Providers of information, as referred to in these Rules, are those natural persons who provide sensitive personal data or information to a body corporate. It is also clarified that privacy policy, as prescribed in Rule 4, relates to the body corporate and is not with respect to any particular obligation under any contract. Further, in Rule 5(1) consent includes consent given by any mode of electronic communication.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Ministry of Communications &amp;amp; Information Technology (Dept. of Information Technology) &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Press Information Bureau, Government of India, Bhadra 2, 1933, August 24, 2011&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;&lt;i&gt;SP/ska &lt;br /&gt; (Release ID :74990)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.2  It is apparent from a plain reading of the text that this press release seeks to re-interpret the application of rules 5 and 6 of the Sensitive Personal Data Rules insofar as they apply to Indian bodies corporate receiving personal information collected by another company outside India. Also, it seeks to define the term “providers of information” to address the confusion created by the repeated use this term in the Rules. Further, it re-interprets the scope and application of rule 4 relating to duty of bodies corporate to publish certain policies. Furthermore, it seeks to amend the provisions of rule 5(1) relating to manner and medium of obtaining consent prior to collecting personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.3  At the outset, it must be understood that a press release is not valid law. According to Article 13(3) of the Constitution of India,&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;...&lt;i&gt;law&lt;/i&gt; &lt;i&gt;includes any Ordinance, order, bye law, rule, regulation, notification, custom or usages having in the territory of India the force of law.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Law includes orders made in exercise of a statutory power as also orders and notifications made in exercise of a power conferred by statutory rules.&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;[See, &lt;i&gt;Edward Mills&lt;/i&gt; AIR 1955 SC 25 at pr. 12, &lt;i&gt;Babaji Kondaji Garad&lt;/i&gt; 1984 (1) SCR 767 at pp. 779-780 and &lt;i&gt;Indramani Pyarelal Gupta&lt;/i&gt; 1963 (1) SCR 721 at pp. 73-744]&lt;/p&gt;
&lt;p&gt;Sub-delegated orders, made in exercise of a power conferred by statutory rules, cannot modify the rules.&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt; &lt;span&gt;[See, &lt;i&gt;Raj Narain Singh&lt;/i&gt; AIR 1954 SC 569 and &lt;i&gt;Re Delhi Laws Act&lt;/i&gt; AIR 1951 SC 332]&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;span&gt;Therefore, press releases, which are not made or issued in exercise of a delegated or sub-delegated power are not “law” and cannot modify statutory rules.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;V &lt;span&gt;Summary&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;5.1&lt;span&gt; &lt;/span&gt;CIS submits that the following provisions of the Sensitive Personal Data Rules be amended or annulled&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Rule 2(1)(b);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 2(1)(c);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 2(1)(d);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 2(1)(g);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 3;&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 4(1);&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 5(1);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 5(2);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 5(3);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 5(4);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 6(1);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 6(1) Proviso;&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 6(2);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 6(4);&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 7; and&lt;/span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Rule 8.&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;5.2 CIS submits that the Committee on Subordinate Legislation &lt;span&gt;should take a serious view of the press release issued by the &lt;/span&gt;&lt;span&gt;Department of Information Technology of the Ministry of Communications and Information Technology on 24 August 2011.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;5.3 CIS submits &lt;/span&gt;&lt;span&gt;that in exercise of the powers granted to the Committee on Subordinate Legislation under Rules 317 and 320 of the Lok Sabha Rules of Procedure, the provisions of the Sensitive Personal Data Rules listed in the preceding paragraph 5.1 should be annulled; and, the Committee may be pleased to consider and recommend as an alternative the amendments proposed by CIS in this submission.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;5.4 CIS thanks the Committee on Subordinate Legislation for the opportunity to present this submission and reiterates its commitment to supporting the Committee with any clarification, question or other requirement it may have.&lt;/span&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See generally, &lt;i&gt;Kharak Singh&lt;/i&gt; AIR 1963 SC 1295, &lt;i&gt;Gobind&lt;/i&gt; (1975) 2 SCC 148, &lt;i&gt;R. Rajagopal&lt;/i&gt; (1994) 6 SCC 632, &lt;i&gt;People’s Union for Civil Liberties&lt;/i&gt; (1997) 1 SCC 301 and &lt;i&gt;Canara Bank&lt;/i&gt; (2005) 1 SCC 496.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. See &lt;i&gt;infra&lt;/i&gt; pr. 4.3.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See, for comparison, Directive 95/46/EC of 24 October 1995 of the European Parliament and Council, the Data Protection Act, 1998 of the United Kingdom and the Proposed EU Regulation on on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection Regulation).&lt;/p&gt;
&lt;p class="MsoFootnoteText"&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].&lt;span&gt;See generally, &lt;i&gt;Board of Trustees of Ayurvedic College&lt;/i&gt; AIR 1962 SC 458 and &lt;i&gt;S. P. Mittal&lt;/i&gt; AIR 1983 SC 1.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;span&gt;See &lt;/span&gt;&lt;span&gt;generally, &lt;i&gt;W. O. Holdsworth&lt;/i&gt; AIR 1957 SC 887 and &lt;i&gt;Duli Chand&lt;/i&gt; AIR 1984 Del 145.&lt;/span&gt;&lt;/p&gt;
&lt;div id="_mcePaste"&gt; &lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T12:13:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011">
    <title>Comments on the Information Technology (Guidelines for Cyber Cafe) Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011</link>
    <description>
        &lt;b&gt;Bhairav Acharya on behalf of the Centre for Internet and Society submitted the following comments on the Information Technology (Guidelines for Cyber Cafe Rules), 2011.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;I  &lt;span&gt;Preliminary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.1 This submission presents preliminary clause-by-clause comments from the Centre for Internet and Society (“&lt;b&gt;CIS&lt;/b&gt;”) on the Information Technology (Guidelines for Cyber Café) Rules, 2011 that were notified by the Central Government in the Gazette of India vide Notification GSR 315(E) on 11 April 2011 (“&lt;b&gt;Cyber Café Rules&lt;/b&gt;”).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.2 This submission is for the consideration of the Committee on Subordinate Legislation of the Fifteenth Lok Sabha. In its 21&lt;sup&gt;st&lt;/sup&gt; Report, the Committee on Subordinate Legislation presciently noted that:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“…&lt;i&gt;statutory rules ought to be framed and notified not only in time but utmost care and caution should also be exercised in their formulation and finalization so as to get rid of any avoidable discrepancies. As far as possible, the aim should be to prevent needless litigation arising subsequently from badly framed rules.&lt;/i&gt;” [See the 21&lt;sup&gt;st&lt;/sup&gt; Report of the Lok Sabha Committee on Subordinate Legislation presented on 16 December 2011 at pr. 2.1]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, the Cyber Café Rules have been poorly drafted, contain several discrepancies and, more seriously, may impinge upon constitutionally guaranteed freedoms of Indian citizens. The attention of the Committee on Subordinate Legislation is accordingly called to the following provisions of the Cyber Cafe Rules:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;II  &lt;span&gt;Validity of the Cyber Cafe Rules&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.1 The Cyber Cafe Rules are made in exercise of powers granted under section 87(2)(zg) read with section 79(2) of the Information Technology Act, 2000 (&lt;b&gt;“IT Act”&lt;/b&gt;). Read together, these delegated powers invest the executive with the power to frame rules for exempting cyber cafes from liability for any third party information, data or communication link if they comply with Central Government guidelines. The empowerment made by section 87(2)(zg) of the IT Act pertains to:&lt;/p&gt;
&lt;p&gt;“&lt;i&gt;the guidelines to be observed by the intermediaries under sub-section (2) of section 79&lt;/i&gt;”&lt;/p&gt;
&lt;p&gt;Sections 79 (1) and (2) state:&lt;/p&gt;
&lt;p&gt;“&lt;b&gt;&lt;i&gt;79. Exemption from liability of intermediary in certain cases. –&lt;/i&gt;&lt;/b&gt;&lt;i&gt; (1) Notwithstanding anything contained in any law for the time being in force but subject to the provisions of sub-sections (2) and (3), an intermediary shall not be liable for &lt;span&gt;any third party information, data, or communication link made available or hosted by him&lt;/span&gt;. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(2) The provisions of sub-section (1) shall apply if— &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(a) the function of the intermediary is limited to providing access to a communication system over which information made available by third parties is transmitted or temporarily stored or hasted; or&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(b) the intermediary does not— &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)  initiate the transmission, &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii) select the receiver of the transmission, and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iii) select or modify the information contained in the transmission; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(c) the intermediary observes due diligence while discharging his duties under this Act and also observes &lt;span&gt;such other guidelines as the Central Government may prescribe in this behalf&lt;/span&gt;.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.2 Hence, section 79(2) permits the Central Government to prescribe guidelines for cyber cafes to comply with in order to claim the general exemption from liability granted by section 79(1) of the IT Act. The Cyber Cafe Rules constitute those guidelines. However, the liability from which cyber cafes may be exempted extends only to “&lt;i&gt;any third party information, data, or communication link made available or hosted&lt;/i&gt;” by users of cyber cafes. In other words, the liability of cyber cafes (the exemption from which is supposed to be controlled by the Cyber Cafe Rules) is only in respect of the information, data or communication links of their users. No liability is assigned to cyber cafes for failing to collect identity information of their users. Therefore, the Cyber Cafe Rules made under the power granted by section 79(2)(c) of the IT Act cannot make cyber cafes liable for user identification information. In accordance with sections 79(2)(c) and 79(1) read with section 87(2)(zg) of the IT Act, the Cyber Cafe Rules may legitimately deal with the duties of cyber cafes in respect of any information, data or communication links of their users, but not in respect of user identification. However, the thrust of the Cyber Cafe Rules, and the pith of their provisions, is concerned solely with registering and identifying cyber cafe users including collecting their personal information, photographing them, storing their personal information and reporting these non-content related details to the police. There is even a foray into interior design to dictate the height limits of furniture inside cyber cafes. All of this may be a legitimate governance concern, but it cannot be undertaken by the Cyber Cafe Rules. &lt;b&gt;To the extent that the Cyber Cafe Rules deal with issues beyond those related to any information, data or communication links of cyber cafe users, the Rules exceed the permissible limit of delegated powers under section 79(2) and 87(2)(zg) of the IT Act and, consequently, are &lt;i&gt;ultra vires&lt;/i&gt; the IT Act.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III Clause-by-Clause Analysis and Comments&lt;/b&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 2 - Definitions&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.1  Rule 2(1)(c) of the Cyber Cafe Rules defines a cyber cafe in accordance with the definition provided in section 2(1)(na) of the IT Act as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;“cyber cafe” means any facility from where access to the internet is offered by any person in the ordinary course of business to the members of the public&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This definition of a cyber cafe is overbroad to bring within its ambit any establishment that offers internet access in the course of its business such as airports, restaurants and libraries. In addition, some State Road Transport Corporations offer wi-fi internet access on their buses; and, Indian Railways, as well as Bangalore Metro Rail Corporation Limited, plans to offer wi-fi internet access on some of its trains. These will all fall within the definition of “cyber cafe” as it is presently enacted. The definition of “cyber cafe” should be read down to only relate to commercial establishments that primarily offer internet access to the general public for a fee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that rule 2(1)(c) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“notwithstanding anything contained in clause (na) of sub-section (1) of section 2 of the Act, and for the purposes of these rules only, “cyber cafe” means, any commercial establishment which primarily offers access to the internet to members of the general public for consideration for any purpose but does not include any educational or academic institution, office or place where access to the internet is restricted to authorised persons only.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2 Rule 2(1)(e) of the Cyber Cafe Rules defines “data” in accordance with the definition provided in section 2(1)(o) of the IT Act. However, the term “data” is not used anywhere in the Cyber Cafe Rules and so its definition is redundant. This is one of several instances of careless drafting of the Cyber Cafe Rules.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that the definition of “data” in rule 2(1)(e) be deleted and the clauses in sub-rule (1) of rule 2 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.3 Rule 2(1)(g) of the Cyber Cafe Rules defines “intermediary” in accordance with the definition provided in section 2(1)(w) of the IT Act. While all cyber cafes are intermediaries, not all intermediaries are cyber cafes: there are different categories of intermediaries that are regulated by other rules under the IT Act. The Cyber Cafe Rules make no mention of any other category of intermediaries other than cyber cafes; indeed, the term “intermediary” is not used anywhere in the Cyber Cafe Rules. Its definition is therefore redundant.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that the definition of “intermediary” in rule 2(1)(g) be deleted and the clauses in sub-rule (1) of rule 2 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Rule 3 - Agency for Registration of Cyber Cafes&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;4.1 Rule 3 of the Cyber Cafe Rules, which attempts to set out a registration regime for cyber cafes, as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;b&gt;&lt;i&gt;3. Agency for registration of cyber cafe. –&lt;/i&gt;&lt;/b&gt;&lt;i&gt; (1) All cyber cafes shall be registered with a unique registration number with an agency called as registration agency as notified by the Appropriate Government in this regard. The broad terms of registration shall include: &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i) name of establishment; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii) address with contact details including email address; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iii) whether individual or partnership or sole properitership or society or company; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iv) date of incorporation; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(v) name of owner/partner/proprietor/director; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vi) whether registered or not (if yes, copy of registration with Registrar of Firms or Registrar of Companies or Societies); and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vii) type of service to be provided from cyber cafe &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Registration of cyber cafe may be followed up with a physical visit by an officer from the registration agency. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(2) The details of registration of cyber cafe shall be published on the website of the registration agency. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(3) The Appropriate Government shall make an endeavour to set up on-line registration facility to enable cyber cafe to register on-line. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(4) The detailed process of registration to be mandatorily followed by each Registration Agency notified by the Appropriate Government shall be separately notified under these rules by the central Government.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS raises two unrelated and substantial objections to this provision: &lt;span&gt;firstly&lt;/span&gt;, all cyber cafes across India are already registered under applicable local and municipal laws such as the relevant State Shops and Establishments Acts and the relevant Police Acts that provide detailed information to enable the relevant government to regulate cyber cafes; and, &lt;span&gt;secondly&lt;/span&gt;, the provisions of rule 3 create an incomplete and clumsy registration regime that does not clearly establish a procedure for registration within a definite timeframe and does not address the consequences of a denial of registration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.2  At the outset, it is important to understand the distinction between registration and licensing. The state may identify certain areas or fields of business, or certain industries, to be regulated by the conditions of a licence in the public interest. These may include shops selling alcohol or guns; or, industries such as telecommunications, mining or nuclear power. Licences for various activities are issued by the state for a limited term on the basis of need and public interest and licensees are permitted to operate only within the term and conditions of the licence. Failure to observe licence conditions can result in the cancellation of the licence and other penalties, sometimes even criminal proceedings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Registration, on the other hand, is an information-gathering activity that gives no power of intervention to the state unless there is a general violation of law. The primary statutory vehicle for achieving this registration are the various Shops and Establishments Acts of each State and Union Territory and other municipal registration regulations. For example, under section 5 of the Delhi Shops and Establishments Act, 1954, an establishment, which includes shops, commercial establishments and places of public amusement and entertainment, must fulfil the following registration requirements:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;b&gt;&lt;i&gt;5. Registration of establishment. –&lt;/i&gt;&lt;/b&gt;&lt;i&gt; (1) Within the period specified in sub-section (5), the occupier of every establishment shall send to the Chief Inspector a statement in a prescribed form, together with such fees as may be prescribed, containing &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(a) the name of the employer and the manager, if any; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(b) the postal address of the establishment; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(c) the name, if any, of the establishment, &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(d) the category of the establishment, i.e. whether it is a shop, commercial establishment, residential hotel, restaurant eating house, theatre or other place of public amusement or entertainment; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(e) the number of employees working about the business of the establishment; and &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(f) such other particulars as may be prescribed. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(2) On receipt of the statement and the fees, the Chief Inspector shall, on being satisfied about the correctness of the statement, register the establishment in the Register of Establishments in such manner as may be prescribed and shall issue, in a prescribed form, a registration certificate to the occupier. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(3) The registration certificate shall be prominently displayed at the establishment and shall be renewed at such intervals as may be prescribed in this respect. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(4) In the event of any doubt or difference of opinion between an occupier and the Chief Inspector as to the category to which shall after such enquiry, as it may think proper, decide the category of each establishment and the decision thereto shall be final for the purpose of this Act. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(5) Within ninety days from the date mentioned in column 2 below in respect of the establishment mentioned in column 1, the statement together with fees shall be sent to the Chief Inspector under sub-section (1).&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides the registration regime, the Shops and Establishments Acts also enact inspection regimes to verify the accuracy of all registered information, the maintenance of labour standards and other public safety requirements. These are not addressed by the Cyber Cafe Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.3 In addition to the various Shops and Establishments Acts which prescribe registration procedures, &lt;span&gt;all premises within which cyber cafes operate are subject to a further licensing regime under the various State Police Acts&lt;/span&gt; as places of public amusement and entertainment. For example, a cyber cafe is deemed to be a “place of public amusement” under section 2(9) of the Bombay Police Act, 1951 and therefore subject to the licensing, registration and regulatory provisions of the Rules for Licensing and Controlling Places of Public (Other than Cinemas) and Performances for Public Amusement including Cabaret Performances, Discotheque, Games, Poll Game, Parlours, Amusements Parlours providing Computer Games, Virtual Reality Games, Cyber Cafes with Net Connectivity, Bowling Alleys, Cards Rooms, Social Clubs, Sports Clubs, Meals and Tamasha Rules, 1960. Similar provisions exist in Delhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In view of these two-fold registration requirements under the Shops and Establishments Acts and relevant Police Acts, creating yet another layer of registration is unwarranted. The Cyber Cafe Rules do not prescribe any new registration requirement that has not already been covered by the Shops and Establishments Acts and Police Acts. Multiple overlapping legislations will create confusion within the various departments of the relevant government and, more importantly, will result in non-compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.4 Without prejudice to the preceding comments relating to already existing registration requirements under the Shops and Establishments Acts and Police Acts, rule 3 of the Cyber Cafe Rules are very poorly drafted and do not fulfil the requirements of a valid registration regime. Most State governments have not notified a registration agency for cyber cafes as required by the Cyber Cafe Rules, probably because appropriate provisions under the Shops and Establishments Acts already exist. No time-limit has been specified for the registration process. This means that the (as yet non-existent) registration agency may delay, whether out of inefficiency or malice, a registration application without consequences for the delay. This not only discourages small and medium enterprises to hinder economic growth, it also encourages corruption as cyber cafe operators will be forced to pay a bribe to receive their registration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4.5 Furthermore, rule 3(4) of the Cyber Cafe Rules, which calls on the Central Government to notify rules made by State governments, reads as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;(4) The detailed process of registration to be mandatorily followed by each Registration Agency notified by the Appropriate Government shall be separately notified under these rules by the central Government.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This nonsensical provision, which gives the Central Government the power to notify rules made by State governments, &lt;i&gt;prima facie&lt;/i&gt; violates the constitutional scheme of division of legislative powers between the Union and States. Rules that have been made by State governments, the subject matter of which is within the legislative competence of the State legislatures, are notified by those State governments for application within their States and no separate notification of these rules can be done by the Central Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that rule 3 be deleted in entirety and the remaining rules be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 4 - Identification of User&lt;/span&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5.1 Rule 4 of the Cyber Cafe Rules attempts to establish the identity of cyber cafe users. This is a legitimate and valid exercise to prevent unlawful use of cyber cafes. Sub-rule (1) of rule 4 reads as follows:&lt;/p&gt;
&lt;p&gt;“&lt;i&gt;(1) The Cyber Cafe shall not allow any user to use its computer resource without the identity of the user being established. The intending user may establish his identify by producing a document which shall identify the users to the satisfaction of the Cyber Cafe. Such document may include any of the following:&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(i)   Identity card issued by any School or College; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(ii)  Photo Credit Card or debit card issued by a Bank or Post Office; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iii) Passport; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(iv) Voter Identity Card; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(v)  Permanent Account Number (PAN) card issued by Income-Tax Authority; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vi) Photo Identity Card issued by the employer or any Government Agency; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vi) Driving License issued by the Appropriate Government; or &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(vii) Unique Identification (UID) Number issued by the Unique Identification Authority of India (UIDAI).&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of credits cards or debit cards to verify identity is specifically discouraged by the Reserve Bank of India because it directly results in identity theft, fraud and other financial crimes. Online credit card fraud results in large losses to individual card-holders and to banks. The other identity documents specified in rule 4 will suffice to accurately establish the identity of users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that the use of credit or debit cards as a means of establishing identity in rule 4(1)(ii) be deleted and the remaining clauses in sub-rule (1) of rule 4 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p class="DefaultCxSpFirst"&gt;5.2  Rule 4(2) of the Cyber Café Rules compels the storage of photographs and other personal information of users by cyber cafés:&lt;/p&gt;
&lt;p&gt;“&lt;i&gt;The Cyber Cafe shall keep a record of the user identification document by either storing a photocopy or a scanned copy of the document duly authenticated by the user and authorised representative of cyber cafe. Such record shall be securely maintained for a period of at least one year.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this submission does not question the requirement of storing user information for the purposes of law enforcement, this rule 4(2) does not prescribe the standards of security, confidentiality and privacy that should govern the storage of photographs and other personal information by cyber cafes. Without such a prescription, cyber cafes will simply store photographs of users, including minors and women, and important personal information that can be misused, such as passport copies, in a file with no security. This is unacceptable. Besides endangering vulnerable user information, it makes identity theft and other offences easier to perpetrate. If cyber cafes are to collect, store and disclose personal information of users, they must be bound to strict standards that explicitly recognise their duties and obligations in relation to that personal information. In this regard, the attention of the Committee on Subordinate Legislation is called to CIS’ submission regarding the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that rule 4(2) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“Any information of any user collected by a cyber cafe under this rule shall be collected, handled, stored and disclosed in accordance with the provisions of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, for a period not exceeding six months from the date of collection of that information.”&lt;/p&gt;
&lt;p&gt;5.3  Sub-rule (3) of rule 4 allows cyber cafe users to be photographed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;(3) In addition to the identity established by an user under sub-rule (1), he may be photographed by the Cyber Cafe using a web camera installed on one of the computers in the Cyber Cafe for establishing the identity of the user. Such web camera photographs, duly authenticated by the user and authorised representative of cyber cafe, shall be part of the log register which may be maintained in physical or electronic form.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the identity documents listed in rule 4(1) all contain a photograph of their owner, the need for further photography is unnecessary. This provision needlessly burdens cyber cafe owners, who will be required to store two sets of photographs of users – their photographic identity documents in addition to individual photographs, and invades the individual privacy rights of users who will be exposed to unnecessary photography by private cyber cafe operators. Granting a non-state entity the right to take photographs of other individuals to no apparent gain or purpose is avoidable, especially when no measures are prescribed to regulate the safe and lawful storage of such photographs. Without strict safety measures governing the taking and storing of photographs of users, including minor girls and women, the Cyber Cafe Rules leave open the possibility of gross misuse of these photographs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that sub-rule (3) of rule 4 be deleted and the remaining sub-rules of rule 4 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;5.4  Sub-rue (4) of rule 4 reads as follows:&lt;/p&gt;
&lt;p&gt;“&lt;i&gt;(4) A minor without photo Identity card shall be accompanied by an adult with any of the documents as required under sub-rule (1).&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regulating a minor’s access and use of the internet may serve a public good but it cannot be achieved by law. Information deemed unsuitable for minors that is available via other media, such as video, television or magazines, is not legally proscribed for minors. The law cannot and does not regulate their availability to minors. The protection of minors is an overriding public and jurisprudential concern, but law alone cannot achieve this end. Most minors do not possess photographic identity documents and rule 4(4) will, if implemented, result in internet access being taken away from minors. Restricting a minor’s ability to access useful, educational and other harmless content available on the internet is harmful to the public interest as it discourages education and awareness.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that rule 4(4) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“A minor who does not possess any of the identity documents listed under sub-rule (1) of this rule may provide the name and address of his parent or guardian prior to using the cyber cafe.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5.5  Rule 4(5) of the Cyber Cafe Rules states that a user “&lt;i&gt;shall be allowed to enter the cyber cafe after he has established his identity&lt;/i&gt;.” However, since rule 4(1) already addresses identity verification by specifically preventing a cyber cafe from “&lt;i&gt;allow[ing] any user to use its computer resource without the identity of the user of the user being established&lt;/i&gt;,” this rule 4(5) is redundant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that rule 4(4) be deleted and the remaining sub-rules of rule 4 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;5.6  Rule 4(6) of the Cyber Cafe Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;(6) The Cyber cafe shall immediately report to the concerned police, if they have reasonable doubt or suspicion regarding any user.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision is legally imprecise, poorly drafted and impossible to enforce. The nature of doubt or suspicion that is necessary before contacting the police is unclear. A cyber cafe may doubt whether a customer is able to pay the bill for his internet usage, or be suspicious because of the length of a person’s beard. Requiring the police to be called because someone is doubtful is ridiculous. Furthermore, reasonableness in law is a well-established concept of rationality; it is not open to interpretation. “Reasonable doubt” is a criminal law threshold that must be reached in order to secure a conviction. Reporting requirements must be clear and unambiguous.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that rule 4(6) be deleted.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Rule 5 - Log Register&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;6.1  Rule 5(3) of the Cyber Cafe Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;(3) Cyber Cafe shall prepare a monthly report of the log register showing date- wise details on the usage of the computer resource and submit a hard and soft copy of the same to the person or agency as directed by the registration agency by the 5th day of next month.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This provision is akin to telephone tapping. If phone companies are not required to report the call histories of each of their users and cable television providers not required to report individual viewing preferences, there is no reason for cyber cafes to report the internet usage of users. There may be instances where public interest may be served by monitoring the internet history of specific individuals, just as it is possible to tap an individual’s telephone if it is judicially determined that such a need exists. However, in the absence of such protective provisions to safeguard individual liberties, this sub-rule (3) is grossly violative of the individual right to privacy and should be removed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Therefore, it is proposed that rule 5(3) be deleted and the remaining sub-rules of rule 5 be accordingly renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 7&lt;b&gt; - &lt;/b&gt;Inspection of Cyber Cafe&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;7.1  Rule 7 of the Cyber Cafe Rules provides for an inspection regime:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;An officer autnorised by the registration agency, is authorised to check or inspect cyber cafe and the computer resource of network established therein, at any time for the compliance of these rules. The cyber cafe owner shall provide every related document, registers and any necessary information to the inspecting officer on demand.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The corollary of a registration regime is an inspection regime. This is necessary to determine that the information provided during registration is accurate and remains updated. However, as stated in paragraphs 3.2 – 3.4 of this submission, a comprehensive and more easily enforceable registration and inspection regime already exists in the form of the various Shops and Establishments Acts in force across the country. Those provisions also provide for the consequences of an inspection, which the Cyber Cafe Rules do not.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Therefore, it is proposed that rule 7 be deleted.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;IV &lt;span&gt;Summary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;8.1  In sum:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Under the delegated powers contained in section 87(2)(zg) read with section 79(2) of the IT Act, the Central Government does not have the competence to make rules for identifying cyber cafe users including collecting, storing and disclosing personal information of cyber cafe users nor for prescribing the interior design of cyber cafes and, to the extent that the Rules do so, they are &lt;i&gt;ultra vires&lt;/i&gt; the parent statute;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) The attention of the Committee on Subordinate Legislation is invited to the following provisions of the Cyber Cafe Rules which require amendment or annulment:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Rule 2(1)(c);&lt;/li&gt;
&lt;li&gt;Rule 2(1)(e);&lt;/li&gt;
&lt;li&gt;Rule 2(1)(g);&lt;/li&gt;
&lt;li&gt;Rule 3(1);&lt;/li&gt;
&lt;li&gt;Rule 3(4);&lt;/li&gt;
&lt;li&gt;Rule 4(1);&lt;/li&gt;
&lt;li&gt;Rule 4(2);&lt;/li&gt;
&lt;li&gt;Rule 4(3);&lt;/li&gt;
&lt;li&gt;Rule 4(4);&lt;/li&gt;
&lt;li&gt;Rule 4(5);&lt;/li&gt;
&lt;li&gt;Rule 4(6);&lt;/li&gt;
&lt;li&gt;Rule 5(3); and&lt;/li&gt;
&lt;li&gt;Rule 7.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;(c)  The Cyber Cafe Rules are extremely poorly framed, rife with discrepancies and will give rise to litigation. They should be selectively annulled and, to prevent a repeat of the same mistakes, new rules may be framed in concert with experts, professional organisations and civil society in a democratic manner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8.2 CIS would like to conclude by taking this opportunity to present its compliments to the Committee on Subordinate Legislation and to offer the Committee any assistance or support it may require.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-it-guidelines-for-cyber-cafe-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T12:15:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft">
    <title>The Privacy (Protection) Bill 2013: A Citizen's Draft </title>
    <link>https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has been researching privacy in India since 2010 with the objective of raising public awareness around privacy, completing in depth research, and driving a privacy legislation in India. As part of this work, Bhairav Acharya has drafted the Privacy (Protection) Bill 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Privacy (Protection) Bill 2013 contains  provisions that speak to data protection, interception, and  surveillance. The Bill also establishes the powers and functions of the  Privacy Commissioner, and lays out offenses and penalties for  contravention of the Bill. The Bill represents a citizen's version of a  possible privacy legislation for India, and will be shared with key  stakeholders including civil society, industry, and government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013.pdf" class="internal-link"&gt;Click&lt;/a&gt; to download a full draft of the Privacy (Protection) Bill, 2013.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft'&gt;https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:50:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-motor-vehicle-rules">
    <title>Comments on the Proposed Rule 138A of the Central Motor Vehicle Rules, 1989 Concerning Radio Frequency Identification Tags</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-motor-vehicle-rules</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society gave its comments on the proposed Rule 138A of the Central Motor Vehicle Rules, 1989. The comments were made in response to Notification GSR 738(E) published in the Gazette of India on October 3, 2012.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;I &lt;span&gt;Preliminary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.1 These initial comments are made with regard to Notification GSR 738(E), published in the Gazette of India, Extraordinary, Part II, Section 3, Sub-section (i), on 3 October 2012 &lt;br /&gt;(&lt;b&gt;“Impugned Notification”&lt;/b&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.2 The Impugned Notification proposes to insert a new rule 138A in the Central Motor Vehicle Rules, 1989 (&lt;b&gt;“CMV Rules”&lt;/b&gt;) to make mandatory the installation of radio frequency identification (&lt;b&gt;“RFID”&lt;/b&gt;) tags on all light and heavy motor vehicles to enable their instant identification and monitoring by electronic toll collection booths, the police and any other authority or person that is able to query and read RFID tags.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;II  &lt;span&gt;Validity of the Impugned Notification&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; (a) &lt;span&gt;The Scope and Limits of the Executive Power of the Union&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.1 The competence of the Central Government to govern by executive action (such as the Impugned Notification) is restricted to the extent of the executive power of the Union.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; Following the &lt;i&gt;Ram Jawaya Kapur&lt;/i&gt; case,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; it is settled that the extent of the Union’s executive power is coterminous with the legislative power of Parliament even in the absence of controlling legislation in that field.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; This is in addition to the Union’s subordinate executive power to give effect to legislation through statutory delegation&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; and its directory executive power to give directions to the States.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Thus, there are three kinds of executive power exercisable by the Union:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the &lt;span&gt;regular power&lt;/span&gt;, exercisable in the absence of controlling legislation, if the subject of  executive action is a matter upon which Parliament is competent to legislate;&lt;br /&gt;(b) the &lt;span&gt;subordinate power&lt;/span&gt;, exercisable under the terms of a controlling statute, if that statute specifically delegates such a power to the Union; and&lt;br /&gt;(c) the &lt;span&gt;directory power&lt;/span&gt;, exercisable within judicial limits, to secure the compliance of the States with the laws of the Union.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.2 The regular executive power of the Union cannot be exercised over a matter that is controlled by parliamentary legislation.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; This principle is akin to, but does not correspond exactly with, the doctrine of occupied field which is primarily concerned with the legislative entries contained in Schedule VII of the Constitution of India. Nevertheless, it is settled that since the power of the executive to act is subject to the control of the legislature, a statutory regime, where it exists, cannot be circumvented by the free exercise of executive power.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; In the case of the Impugned Notification, the Motor Vehicles Act, 1988 constitutes a statutory regime that occupies the field to preclude regular executive action by the Central Government with regard to RFID tags in motor vehicles. The Impugned Notification should next be examined only in light of the scope and limits of the Union’s subordinate executive power since, as the Impugned Notification is not a direction to the States, the Union’s directory executive power is not in issue.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;(b) &lt;span&gt;Extent of the Central Government’s Rule-Making Power&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.3  The subordinate executive power of the Union emanates from section 110 of the Motor Vehicles Act, 1988 (&lt;b&gt;“MV Act”&lt;/b&gt;) that confers the Central Government with the power to make rules to implement the statute. At this point it is important to note that the legislative competence of the MV Act is traceable to Entry 35 of List III, Schedule VII of the Constitution of India. Entry 35 concerns:&lt;/p&gt;
&lt;p&gt;&lt;i&gt; Mechanically propelled vehicles including the principles on which taxes on such vehicles are to be levied.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Entry 35 being a concurrent subject, it is open to both the Union and the States to act to regulate motor vehicles.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; Accordingly, the MV Act also vests the States with subordinate executive power through sections 28, 38, 65, 95, 96, 107, 111, 138 and 176 which confer State Governments with the power to make rules to implement the statute in, and amend its application to, their particular states. As for the Union, so for the States is the regular executive power precluded by the existence of a statutory regime.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2.4       Section 110 of the MV Act states:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;110. Power of the Central Government to make rules. – &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(1) The Central Government may make rules regulating the construction, equipment and maintenance of motor vehicles and trailers with respect to all or any of the following matters, namely:-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a)  the width, height, length and overhand of vehicles and of the loads carried;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(b) the size, nature, maximum retail price and condition of tyres, including embossing thereon of date and year of manufacture, and the maximum load carrying capacity;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(c) brakes and steering gear;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(d) the use of safety glasses including prohibition of the use of tinted safety glasses;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(e) signalling appliances, lamps and reflectors;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(f) speed governors;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(g) the emission of smoke, visible vapour, sparks, ashes, grit or oil;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(h) the reduction of noise emitted by or caused by vehicles;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(i) the embossment of chassis number and engine number and the date of manufacture;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(j) safety belts, handle bars of motor cycles, auto-dippers and other equipments essential for safety of drivers, passengers and other road-user;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(k) standards of the components used in the vehicle as inbuilt safety devices;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(l) provision for transportation of goods of dangerous or hazardous nature to human life;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(m) standards for emission of air pollutants;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(n) installation of catalytic convertors in the class of vehicles to be prescribed;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(o) the placement of audio-visual or radio or tape recorder type of devices in public vehicles;&lt;br /&gt;(p) warranty after sale of vehicle and norms therefor:&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provided that any rules relating to the matters dealing with the protection of environment, so far as may be, shall be made after consultation with the Ministry of the Government of India dealing with environment.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(2) Rules may be made under sub-section (1) governing the matters mentioned therein, including the manner of ensuring the compliance with such matters and the maintenance of motor vehicles in respect of such matters, either generally in respect of motor vehicles or trailers or in respect of motor vehicles or trailers of a particular class or in particular circumstances.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; (3) Notwithstanding anything contained in this section,-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a) the Central Government may exempt any class of motor vehicles from the provisions of this Chapter;&lt;br /&gt;(b) a State Government may exempt any motor vehicle or any class or description of motor vehicles from the rules made under sub-section (1) subject to such conditions as may be prescribed by the Central Government.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.5 The subordinate executive power of the Union, &lt;i&gt;i.e.&lt;/i&gt; the rule-making power, is restricted to the exact extent of the delegation.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; This is a well settled and undisputed principle of administrative law. Therefore, the Central Government cannot, in exercise of the rule-making power granted under section 110 of the MV Act, frame rules for matters for which it has not been specifically empowered under that section. Section 110 of the MV Act does not grant the Central Government the power to make rules for mandating RFID tags on vehicles. Clauses (a) to (p) of section 110(1) descriptively list the matters relating to the construction, equipment and maintenance of motor vehicles that the Central Government is competent to regulate by exercising its executive power. This list is exactingly drafted; the absence of general words or a miscellaneous empowerment obviates the need for examining any particular word or words in clauses (a) to (p) in light of the principle of &lt;i&gt;ejusdem generis&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.6 In the absence of a specific empowerment, or even a general empowerment that may be positively construed &lt;i&gt;ejusdem generis&lt;/i&gt;, only two clauses of section 110(1) require further examination. These are:&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(e) signalling appliances, lamps and reflectors;&lt;/i&gt; and,&lt;br /&gt;&lt;i&gt;(o) the placement of audio-visual or radio or tape recorder type of devices in public vehicles;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (e), which deals with signalling appliances, cannot be read to include RFID tags since, in accordance with the principle of &lt;i&gt;noscitur a sociis&lt;/i&gt;, the meaning of the words “signalling appliances” is derived from its association with the words “lamps and reflectors.”&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; Therefore, RFID tags, which are totally unrelated to lamps, reflectors and related signalling appliances, are not the subject of clause (e). On the other hand, while clause (o) contains an executive empowerment in respect of radio devices, the empowerment only concerns “public vehicles”; and, hence, the installation of RFID tags in non-public vehicles including light vehicles, such as cars, and heavy vehicles, such trucks and lorries, cannot be carried out under this clause. In any event, the word “radio” must be interpreted &lt;i&gt;noscitur a sociis&lt;/i&gt; in light of its association with the words “audio-visual” and “tape recorder” to yield an executive empowerment in respect of in-vehicle entertainment devices only.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.7  &lt;b&gt;Therefore, in the absence of an empowerment under section 110 of the MV Act in respect of RFID tags, the Impugned Notification of the Central Government is &lt;i&gt;ultra vires&lt;/i&gt; the MV Act. Rules that are &lt;i&gt;ultra vires&lt;/i&gt; the parent statute for exceeding the limits of subordinate executive power are void.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; The Impugned Notification is both &lt;i&gt;ultra vires&lt;/i&gt; its parent statute and void. In this regard, it is instructive to note that it is settled that void rules neither acquire validity by a subsequent conferment of statutory power nor by their publication in the Official Gazette.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;b&gt;III  &lt;span&gt;Constitutional Implications regarding Privacy&lt;/span&gt;&lt;/b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.1 Across the world, RFID technology has been challenged on the basis of its intrusion into personal privacy. RFID tags operate on a pre-determined radio frequency; and, unless the tags are programmed to rapidly, constantly and randomly switch frequencies or are able to jam unauthorised queries – an extremely expensive proposition, RFID signals can be easily intercepted. The interception a vehicle’s RFID signals, whether by public authorities or by private persons, can yield detailed locational information of the driver of the vehicle. This is an unwarranted intrusion into the locational privacy of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2 Locational privacy is an intrinsic part of the right to privacy. An intrusion into this right, such as in the form of mandatory RFID tags on vehicles, will reveal information as to &lt;i&gt;inter alia&lt;/i&gt; a person’s whereabouts and daily routine as well as addresses of friends’ houses, visits to the hospital, visits to a place of worship, restaurant preferences, addresses of children’s schools and so on. This will affect ordinary citizens, politicians and civil servants equally. All this information will be at the hands of the police. To place the power of tracking and monitoring ordinary individuals with the police, when such technology is not even available with intelligence agencies, would be an act of recklessness. This is compounded by the total lack of safeguards accompanying the attempted imposition of RFID technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.3   Following the &lt;i&gt;Kharak Singh&lt;/i&gt;&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; and &lt;i&gt;Gobind&lt;/i&gt;&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; cases, the locational privacy of individuals, specifically in relation to their privacy from the police, is constitutionally protected.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; It is now accepted that privacy is an essential ingredient of personal liberty forming a part of the right recognised under Article 21 of the Constitution. It is further settled that the personal liberty of an individual cannot be taken away except by a law that establishes a procedure that is fair, just and reasonable that withstands the tests of Article 14 and Article 19 of the Constitution.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;The Impugned Notification, while constituting a “law” under Article 13 of the Constitution, does not create a fair, just and reasonable procedure to deprive individuals of their personal liberty and therefore fails the tests imposed by &lt;i&gt;Maneka Gandhi&lt;/i&gt;. Therefore, the Impugned Notification, even if it were not void for want of competence, would be &lt;i&gt;ultra vires&lt;/i&gt; the Constitution for violating Article 21.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;IV  &lt;span&gt;Summary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4.1  In sum:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a)  Section 110 of the MV Act does not bestow on the Central Government a specific empowerment to make rules in respect of RFID tags;&lt;br /&gt;(b)  The Impugned Notification exceeds the delegated limits of the Central Government’s subordinate executive power;&lt;br /&gt;(c)  &lt;b&gt;The Impugned Notification is &lt;i&gt;ultra vires&lt;/i&gt; the MV Act, its parent statute;&lt;/b&gt;&lt;br /&gt;(d)  Rules that are &lt;i&gt;ultra vires&lt;/i&gt; the parent statute for exceeding the limits of subordinate executive power are void;&lt;br /&gt;(e)  &lt;b&gt;The Impugned Notification is void;&lt;/b&gt;&lt;br /&gt;(f)   The imposition of mandatory RFID tags on vehicles will yield locational information to seriously invade the right to  privacy;&lt;br /&gt;(g)  The right to privacy is an essential ingredient of personal liberty and is constitutionally protected;&lt;br /&gt;(h)  The Impugned Notification violates the right to privacy without creating a fair, just and reasonable procedure to deprive persons of their personal liberty;&lt;br /&gt;(i)   The Impugned Notification is &lt;i&gt;ultra vires&lt;/i&gt; the Constitution for violating Article 21;&lt;br /&gt;(j)   &lt;b&gt;Any rule that mandates RFID tags on vehicles to violate the right to privacy is void &lt;i&gt;ab initio&lt;/i&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Article 73 of the Constitution of India.&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;i&gt;Ram Jawaya Kapur&lt;/i&gt; AIR 1955 SC 549.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. &lt;i&gt;Ibid&lt;/i&gt; at prs. 12-14.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. See generally, &lt;i&gt;In re Delhi Laws Act&lt;/i&gt; AIR 1951 SC 332, &lt;i&gt;Harishankar Bagla&lt;/i&gt; AIR 1954 SC 465, &lt;i&gt;Rajnarain Singh &lt;/i&gt; AIR 1954 SC 569 and &lt;i&gt;Edward Mills&lt;/i&gt; AIR 1955 SC 25.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. See Articles 256 and 257 of the Constitution and &lt;i&gt;State of Rajasthan&lt;/i&gt; (1977) 3 SCC 592.&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;Bishamber Dayal&lt;/i&gt; (1982) 1 SCC 39 at pr. 20.&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;i&gt;Bharat Coking Coal&lt;/i&gt; (1990) 4 SCC 557 at prs. 15-17.&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].Article 253 of the Constitution.&lt;br /&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Article 162 of the Constitution.&lt;br /&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. See &lt;i&gt;In re Delhi Laws Act&lt;/i&gt; AIR 1951 SC 332, &lt;i&gt;State of Bihar&lt;/i&gt; (2000) 4 SCC 640, &lt;i&gt;Shri Sitaram Sugar&lt;/i&gt; (1990) 3 SCC 223 [all Constitution Benches], &lt;i&gt;Ramakrishnan Kulwant Rai&lt;/i&gt; 1989 Supp (1) SCC 541, &lt;i&gt;K. M. Charia Abdullah&lt;/i&gt; (1965) 1 SCR 601, &lt;i&gt;Charanjit Gill&lt;/i&gt; (2000) 5 SCC 742, &lt;i&gt;ADM (Rev.) Delhi Administration&lt;/i&gt; (2000) 5 SCC 451 and &lt;i&gt;State of Karnataka&lt;/i&gt; (1983) 2 SCC 402.&lt;br /&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. For foundational Indian case law on the principle of &lt;i&gt;noscitur a sociis&lt;/i&gt;, see generally, &lt;i&gt;M. K. Ranganathan&lt;/i&gt; AIR 1955 SC 604, &lt;i&gt;Hospital Mazdoor Sabha&lt;/i&gt; AIR 1960 SC 110 and &lt;i&gt;Corporation of the City of Nagpur&lt;/i&gt; AIR 1960 SC 675.&lt;br /&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. See &lt;i&gt;Supreme Court Welfare Association&lt;/i&gt; (1989) 4 SCC 187 and &lt;i&gt;State of Karnataka&lt;/i&gt; (1983) 2 SCC 402.&lt;br /&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. &lt;i&gt;General Officer Commanding-in-Chief&lt;/i&gt; (1988) 2 SCC 351 at prs. 12-14.&lt;br /&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. &lt;i&gt;Kharak Singh&lt;/i&gt; AIR 1963 SC 1295. The majority, speaking through Ayyangar, J., found that ‘domiciliary visits’ conducted by the police in exercise of powers granted under police regulations violated Article 21 of the Constitution; and, the minority speaking through Subba Rao, J., found that both secret police picketing (as to the location of individuals) and domiciliary visits violated both Article 21 and Article 19(1)(d) of the Constitution.&lt;br /&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. &lt;i&gt;Gobind&lt;/i&gt; (1975) 2 SCC 148.&lt;br /&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. For a jurisprudential development of the right to privacy in India, see generally &lt;i&gt;Kharak Singh&lt;/i&gt; AIR 1963 SC 1295, &lt;i&gt;R. M. Malkani&lt;/i&gt; (1973) 1 SCC 471, &lt;i&gt;Gobind&lt;/i&gt; (1975) 2 SCC 148, &lt;i&gt;R. Rajagopal&lt;/i&gt; (1994) 6 SCC 632, &lt;i&gt;People’s Union for Civil Liberties&lt;/i&gt; (1997) 1 SCC 301, &lt;i&gt;Mr ‘X’&lt;/i&gt; (1998) 8 SCC 296, &lt;i&gt;Canara Bank&lt;/i&gt; (2005) 1 SCC 496, &lt;i&gt;Bharat Shah&lt;/i&gt; (2008) 13 SCC 5, &lt;i&gt;Naz Foundation&lt;/i&gt; (2009) 160 DLT 277, &lt;i&gt;Selvi&lt;/i&gt; (2010) 7 SCC 263 and &lt;i&gt;Ram Jethmalani&lt;/i&gt; (2011) 8 SCC 1.&lt;br /&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. &lt;i&gt;Maneka Gandhi&lt;/i&gt; (1978) 1 SCC 248 at prs. 4-14 (per Bhagwati, Untwalia and Fazal Ali, JJ.), 48-49 (per Chandrachud, J.), 62-78 and 79-91 (per Krishna Iyer, J.) and 192-199, 201, 203 and 211-215 (per Beg, CJI.)&lt;br /&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. In this regard, see also &lt;i&gt;Supreme Court Welfare Association&lt;/i&gt; (1989) 4 SCC 187 and &lt;i&gt;N. Bakshi&lt;/i&gt; 1962 Supp (1) SCR 505 for the proposition that rules violating the Constitution are void &lt;i&gt;ab initio&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-motor-vehicle-rules'&gt;https://cis-india.org/internet-governance/blog/comments-on-motor-vehicle-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-04T15:32:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
