<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1621 to 1635.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/consumer-privacy-e-commerce"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/uid-worlds-largest-database"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/people-are-knowledge"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/front-page"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/opening-government-best-practice-guide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-media-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rti-and-third-party-info"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/june-2011-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/publications-automated/bulletin-june-2011"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/research/conferences/conference-blogs/workshop"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/ntp-2011-objective"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/draft-ndsap-comments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/cyber-space-hackers-paradise"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/consumer-privacy-e-commerce">
    <title>Consumer Privacy in e-Commerce</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/consumer-privacy-e-commerce</link>
    <description>
        &lt;b&gt;Looking at the larger picture of national security versus consumer privacy, Sahana Sarkar says that though consumer privacy is important in the world of digital technology, individuals must put aside some of their civil liberties when it comes to the question of national security, as it is necessary to prevent societal damage.&lt;/b&gt;
        
&lt;h2&gt;What is Consumer Privacy?&lt;/h2&gt;
&lt;p&gt;In today’s digital economy generating consumer information is inevitable. Though some companies use the personal information they obtain to improve and provide more services to consumers, many companies use the information in an irresponsible manner.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;In countries that do provide legal protection for consumer privacy, it is never protected as an absolute right. Consumer privacy is not considered an absolute right for three reasons:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;What constitutes consumer privacy is culturally, contextually, individually defined&lt;/li&gt;&lt;li&gt;Consumer privacy often conflicts with other market rights&amp;nbsp;&lt;/li&gt;&lt;li&gt;The ownership of a consumer's private information is debated — as consumer's believe they own the information and businesses believe they own the information.&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;In order to understand consumer privacy it is useful to outline the privacy expectations and strategies of both consumers and businesses, and to also examine the protection measures taken by firms to safeguard consumer information. The major privacy concerns held by consumer's can be broken down into three main domains:&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;Consumers want to be informed about the type of information that is being collected from them.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Consumers need to know that they a certain degree of control over the personal information that is being collected.&amp;nbsp;&lt;/li&gt;&lt;li&gt;Consumers need to be assured that their personal information will be secure and will not be abused or stolen.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Though privacy has been defined by many as the "right to be let alone", its application in today’s modern world is not that straightforward. We live in a world where our purchasing behavior, &amp;nbsp;both online and offline, is shared and used invisibly. For instance, if an individual uses a social networking site, it is possible for a third party application to access personal information that is shared. Similarly, if an individual uses a warranty card or loyalty card during a purchase, it is possible for third parties, like data brokers, to collect and use the individuals' personal information.&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;For instance,15 consumer privacy groups have filed a complaint against Facebook for limiting user's ability to browse anonymously. The complaint was regarding the fact that users only had the choice to designate personal information as publicly linkable, or to not provide information at all. Though Facebook claims to ensure users control over their personal data by allowing users to choose their privacy settings, it does not clarify that these setting can change at any given point. &amp;nbsp;Moreover, the latest privacy embarrassment that hit Facebook proves again that Facebook does not protect users’ privacy. A few weeks ago Facebook admitted to passing personal information of its users onto different gaming applications. These gaming applications have in turn passed the information on to advertisers who otherwise could not have accessed the information.[&lt;a href="#1"&gt;1&lt;/a&gt;]&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Breach of Privacy in Information Collection&lt;/h3&gt;
&lt;div&gt;
&lt;p&gt;Internet users often fear the loss of personal privacy, because of the ability businesses and their websites have to collect, store, and process personal data. &amp;nbsp;For example, sites extract information from consumers through a form, and then record data about their user’s browsing habit. &amp;nbsp;After collecting user information, the sites match the data with their personal and demographic information to create a profile of the user’s preferences, which is then used to promote targeted advertisements or provide customized services. The sites might also engage in web lining through which they price a consumer according to their profiles.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Online there are two main ways in which sites collect user information:&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Sites collect information directly through a server software. Sites often use automatic software logs to do this. &amp;nbsp;&lt;/li&gt;&lt;li&gt;A third party extracts information from the site without the consumer’s knowledge. Sites often place cookies on websites to extract user information.&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;
&lt;p&gt;Automatic software logs and third party cookie placement are two overlooked aspect of information collection. &amp;nbsp;Cookies work by collecting personal information while a user surfs the net, and then feeds the information back to a Web server. Cookies are either used to remember the user, or are used by network advertising agencies to target product advertisements based on long term profiles of user’s buying and surfing habits. An example of a website that uses cookies is 'double click'. Web bugs are used by advertising networks to add information to the personal profiles stored in cookies. Web bugs are also used in junk email campaigns to see how many visits the site gets. Cookies and web bugs are just two out of hundreds of technologies used to collect personal information.&amp;nbsp;[&lt;a href="#2"&gt;2&lt;/a&gt;]&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Challenges Posed by Protection of Consumer Privacy&lt;/h3&gt;
&lt;div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In conclusion, I would like to talk about the difficulty in maintaining a balance between the legal collections of information and protecting privacy of consumers. Above I demonstrated how this conflict arises between businesses and consumers&amp;nbsp;&lt;/span&gt;—&lt;span class="Apple-style-span"&gt;&amp;nbsp;and is rooted in businesses wanting personal information for commercial reasons, and a user wanting protection and control over their own information. This conflict can also arise between consumers, businesses, and political bodies. An example that demonstrates this is the ongoing conflict between RIM (Research in Motion) and the Government of India. The Government of India has issued a warning against RIM saying that it would suspend its blackberry operations if they do not adhere to the Indian laws and regulations.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The Ministry of Home Affairs is demanding that RIM allow access to encrypted content that flows in and out of India. In other words the Government of India wants RIM to allow the security forces to have access to &amp;nbsp;data sent using Blackberries by reducing &amp;nbsp;encryption levels, or by providing the government with the decryption keys. The demand by the government is somewhat ironic as Blackberry manufacturers have developed the Blackberry encryption key to protect the consumers’ privacy during any business deal, so that information is not compromised. On the other side of the debate, the government is demanding access to Blackberry communications, because their inability to decrypt the codes makes countering the threats to national security difficult. This is especially true for a country like India, which is constantly facing threats from Maoists, and extremist Islamic groups.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;This example highlights an important question: &amp;nbsp;what is more important&amp;nbsp;&lt;/span&gt;—&lt;span class="Apple-style-span"&gt;&amp;nbsp;national security or consumer privacy? In 2010, RIM agreed to negotiate access to consumer messages only where access requests are within local laws. Blackberry also agreed to not make any specific deals with consumers, and to make its enterprise systems security and confidentiality non-negotiable.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;h3&gt;Conclusion&amp;nbsp;&lt;/h3&gt;
&lt;div&gt;
&lt;p&gt;Though, consumer privacy is very important especially in a world of digital technology, however, when we speak of national security, I feel that individuals must set aside some of their civil liberties &amp;nbsp;— at least to the extent that it is necessary to prevent societal damage. For a clearer understanding of national security vs consumer privacy look at the case of RIM Vs Indian Government in the following sites:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.zdnet.com/blog/igeneration/blackberry-encryption-too-secure-national-security-vs-consumer-privacy/5732"&gt;http://www.zdnet.com/blog/igeneration/blackberry-encryption-too-secure-national-security-vs-consumer-privacy/5732&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://mobile.blorge.com/2010/12/30/rim-vows-to-protect-corporate-clients-in-india-consumer-privacy-open-to-negotiation/"&gt;http://mobile.blorge.com/2010/12/30/rim-vows-to-protect-corporate-clients-in-india-consumer-privacy-open-to-negotiation/&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a class="external-link" href="http://www.zdnet.com/blog/india/rim-vs-indian-government-continues/135"&gt;http://www.zdnet.com/blog/india/rim-vs-indian-government-continues/135&amp;nbsp;&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;[1]http://www.ft.com/cms/s/0/198599e6-dc5f-11df-a0b9-00144feabdc0.html#axzz1O00LowtN&amp;nbsp;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;[2]http://cyber.law.harvard.edu/olds/ecommerce/privacytext.htmlFor an overview of some of these new data-collection technologies, along with some information on privacy-enhancing technologies such as P3P, see Developing Technologies.&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/consumer-privacy-e-commerce'&gt;https://cis-india.org/internet-governance/blog/privacy/consumer-privacy-e-commerce&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sahana</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-28T04:53:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/uid-worlds-largest-database">
    <title>UID: The World’s Largest Biometric Database</title>
    <link>https://cis-india.org/news/uid-worlds-largest-database</link>
    <description>
        &lt;b&gt;At the start of his presentation, Sunil Abraham pointed to two aerial drawings of cybercafes: one where each computer was part of a private booth, and one where the computers were in the open so the screens would be visible to any one. Which layout would be more friendly to women, and why, Abraham wanted to know. Some participants selected the first option, liking the idea of the privacy, while others liked the second option so that the cybercafe owner would be able to monitor users’ activities.&lt;/b&gt;
        
&lt;p&gt;Abraham said he was surprised no one said option one looked like masturbation booths, adding that in May, India passed rules prohibiting the first design option to avoid just such an issue. This is despite a survey conducted of female college students, who liked the idea of privacy in cybercafés that typically are male-dominated.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Cybercafes are just one of the areas impacted by India’s plan for collecting and using biometrics to create unique individual identification cards.&lt;/p&gt;
&lt;p&gt;Abraham focused his presentation on activists’ efforts to counter the government’s myths about a unique identification (UID) program.&lt;/p&gt;
&lt;p&gt;One campaign image showed two soldiers on the border asking for an east-Asian looking person’s identification. The way to balance, or rectify, the drawing, Abraham said, would be to allow citizens to be able to ask the soldiers for the identification information.&lt;/p&gt;
&lt;p&gt;The campaign, “Rethink UID Project,” included several images illustrating various problems with the plan. For example, one said: “Central storage of keys is a bad idea, so is central storage of our biometrics.” As Abraham explained, if storing a copy of your housekey at the police station does not make us feel more secure, then why wouldn’t storing our biometrics with the government also make us a little more scared?&lt;/p&gt;
&lt;p&gt;In the Indian scheme, Abraham said, the government says biometrics will be used as an authentication factor in order to prove your identity, but from a computer science perspective, it’s a bad idea because it is so easy to steal biometrics. And, as Abraham pointed out, if your biometrics are stolen, it’s not possible for you to re-secure it—it’s not like getting a new ATM card and password, he said.&lt;/p&gt;
&lt;p&gt;If this system of national UID was designed using digital keys instead of biometrics, then we would have a completely different configuration, Abraham said.&lt;/p&gt;
&lt;p&gt;Centralized storage is nonnegotiable, and therefore the process of authentification is done through a centralized database, but with digital keys or digital signatures, authentification could be done on a peer basis, so citizen could authenticate border guards and vice versa.&lt;/p&gt;
&lt;p&gt;Another image from the “Rethink UID Project” campaign pointed out that “Technology cannot solve corruption.” As Abraham said, problems of corruption in the subsidy system (food, loans, education, employment guarantee act in rural India, etc) won’t be fixed with biometrics. For example, if biometric equipment is installed at fair-price shops, before the shop owner gives the grain, the citizen would have to present biometrics, which would go through a centralized server and be authenticated, then the citizen would get the grain, and ultimately there would be a record saying this particular citizen collected this amount of subsidized grain at this particular time.&lt;/p&gt;
&lt;p&gt;But there are a whole range of ways shop owners can compromise the system, Abraham said.&lt;/p&gt;
&lt;p&gt;The first way: 30-50 percent of India is illiterate, so shop owner can say the biometrics were rejected by the server and the citizen would not know better. Or, the owner can say there was no connectivity so authentification didn’t go through, or the owner could say there was no electricity so the system won’t work, or the shop owner could give just part of the grain that the citizen is due.&lt;/p&gt;
&lt;p&gt;Corruption innovates and terrorism innovates—if technology innovates, so does corruption, as it is not a static phenomenon, Abraham said. You can’t wish away human beings from technological configurations.&lt;/p&gt;
&lt;p&gt;One village will have multiple biometric readers.&lt;/p&gt;
&lt;p&gt;Abraham said they have proposed an alternative schema: remove readers from the shop, school, hospital, bank, etc., and have only one scanner at the local governance hall. Instead of the citizen becoming transparent to the government, the government should become transparent to the citizen. The shop owners should make transparent which IDs they have given how much grain to, and only if they are going to dispute the ID of a citizen, can they go to the local government administrative office to prove the ID.&lt;/p&gt;
&lt;p&gt;Another image from the “Rethink UID Project” campaign said, “The poor and the rich: who do we track first?”&lt;/p&gt;
&lt;p&gt;Abraham explained that one problem in India is “black money,” or money for which you don’t pay taxes because the accounts are in fake names in order to store money. Like creating fake bank accounts, he said it also would be easy to create fake biometrics by combining the handprints and eyes of multiple people to get a second fake ID. Also the system could be hacked into and iris images Photoshopped. Ghost ideas also could be created and then sold off. Because the rich will get their IDs behind closed doors, Abraham said, it will be easy for them to get multiple IDs, but the poor will not be able to.&lt;/p&gt;
&lt;p&gt;Referring to “tailgating,” or when one ID is card swiped to gain entrance for multiple people, such as swiping one metro card and then two people walking through, Abraham noted that the problem is that the tailgating only is seen as a problem when it’s at the bottom of the pyramid, such as one woman goes to the fair-price shop to collect grain for five or six families so only one person has to lose a day’s wage instead of all five or six losing a day’s wages. Tailgating at the bottom if the pyramid is usually a question of survival, he said.&lt;/p&gt;
&lt;p&gt;Thus, another image from the campaign showed a pyramid and said, “Transparency at the top first…before transparency at the bottom.”&lt;/p&gt;
&lt;p&gt;The first principle is that expectations of privacy should be inversely proportional to power, so people who are really powerful, like NGOs, politicians, or heads of corporations, should have less privacy, and people who have very little power should have more privacy, Abraham said.&lt;/p&gt;
&lt;p&gt;Also, from a business perspective, the nation gets greater return on its investment if surveillance equipment is trained on people at the top of the pyramid to catch big-time corruption, he said.&lt;/p&gt;
&lt;p&gt;Most of the panic around the UID is over the transaction database. Beyond a databse storing everyone’s biometrics, another database will track transactions: every time you buy a mobile phone or purchase a ticket or access a cyber cafe or subsidies, thanks to UID, there will a record made in the transaction database, Abraham said.&lt;/p&gt;
&lt;p&gt;Abraham said it is important to note that surveillance is not an intrinsic part of information systems, but once surveillance is engineered into information systems, both those with good intentions or bad intentions can take advantage of that surveillance capability.&lt;/p&gt;
&lt;p&gt;The UID means there will be 22 databases available to 12 intelligence agencies, he said.&lt;/p&gt;
&lt;p&gt;So when a girl enters into a cybercafé, first she will have to provide her UID, and then the café owner will photocopy the card, then the owner has the right to take a photo of the girl using his own camera, then the owner is supposed to maintain browser logs of her computer for a period of one year.&lt;/p&gt;
&lt;p&gt;So the question then is how to assure accountability without surveillance?&lt;/p&gt;
&lt;p&gt;The first possibility, Abraham said, is partial storage. The transaction database could store half the data, and the central database could store the other half, so the full 360-view of the data would not be available without a court order.&lt;/p&gt;
&lt;p&gt;The second solution is a transaction escrow, where every time a record is put into the main database, it will be encrypted using 2-3 keys, and only if 3 agencies cooperate with keys, can the information be decrypted. Thus, it is targeted surveillance, not blanket surveillance.&lt;/p&gt;
&lt;p&gt;To conclude his presentation, Abraham divided participants into four groups in order to design surveillance systems for internet surveillance, mobile technologies, CCTVs, and border control.&lt;/p&gt;
&lt;p&gt;Sharon Strover spoke on behalf of the CCTV group, saying they ended up with more questions than anything else. They agreed there should be notices when cameras are in use, there should be public knowledge of who is doing surveillance and who has access to the footage, and the data shouldn’t be sold. But the group couldn’t decide which spaces warranted CCTVs and which not.&lt;/p&gt;
&lt;p&gt;Abraham then pointed out that the next generation of CCTVs can read everybody’s irises as they pass the cameras—it’s in the lab now, and 2-3 years from the market, he said.&lt;/p&gt;
&lt;p&gt;Next, Andy Carvin spoke on behalf of the mobile technologies surveillance group. Whether or not capturing metadata or content as well, the mobile phone company can collect it, but it shouldn’t be able to keep any identifiable information for the person – it should only be able to look at information in the aggregate. The rest of the information should be shipped to a non-governmental organization or government agency specialized in privacy, and 2 keys would be required: one from the judiciary and one from the NGO or governmental agency.&lt;/p&gt;
&lt;p&gt;Smári McCarthy reported back for the Internet surveillance group, pointing out that data retention has been useful in criminal cases less than 0.2 percent of the time in one study, and another showed there has been no statistically significant increase in the number of criminal cases solved because of data retention. So, he said, the group concluded there should be no blanket surveillance, only court orders in certain criminal cases that define who will be under surveillance and for how long. Also, they wanted to see a transparency register available so the public could be informed about how many people are under surveillance currently and throughout year and other general information, such as the success rate—how many of these surveillances have led to criminal convictions or similar.&lt;/p&gt;
&lt;p&gt;Finally, Summer Harlow spoke on behalf of the border control group, which said scanning of checked- and carry-on luggage is acceptable, but there should be no luggage searches without specific probable cause from intelligence agencies or if the scans pick up weapons or other contraband. Similarly, people could be subject to spectrum scans and drug/bomb sniffing dogs for weapons and contraband, but again they would not be physically searched by border agents without probable cause. Also, people and luggage could not randomly be searched based on the country of their passport or their flight destination or origin.&lt;/p&gt;
&lt;p&gt;In summary, Abraham said, surveillance is like salt in food: it is essential in small amounts, but completely counter-productive if even slightly excessive.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Download Sunil's presentation &lt;a href="https://cis-india.org/advocacy/igov/uid-largest-database" class="internal-link" title="UID - The World's Largest Database - A Presentation by Sunil Abraham"&gt;here&lt;/a&gt; [PDF, 1389 kb]&lt;/li&gt;&lt;li&gt;Sunil Abraham made the presentation at the Gary Chapman International School on Digital Transformation on 21 July 2011. The original news published by International School on Digital Transformation can be read &lt;a class="external-link" href="http://digitaltransformationschool.org/wiki/Sunil_Abraham_2011/"&gt;here&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Read the schedule &lt;a class="external-link" href="http://digitaltransformationschool.org/2011/schedule/"&gt;here&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/uid-worlds-largest-database'&gt;https://cis-india.org/news/uid-worlds-largest-database&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-07-23T02:04:45Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/people-are-knowledge">
    <title>People are Knowledge – Experimenting with Oral Citations on Wikipedia</title>
    <link>https://cis-india.org/openness/blog-old/people-are-knowledge</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society in association with the Wikimedia Foundation has produced a documentary film "People are Knowledge". The film evolved out of a project on Oral Citations in India and South Africa funded by the Wikimedia Foundation, and undertaken by Wikimedia Foundation Advisory Board Member Achal Prabhala as a short-term fellowship, to help overcome a lack of published materials in emerging languages on Wikipedia. New Delhi-based filmmaker Priya Sen has directed the film, with additional assistance from Zen Marie who handled the shooting in South Africa. The film explores how alternate methods of citation could be employed on Wikipedia, documenting a series of specific situations with regards to published knowledge, and subsequently, with oral citations.  &lt;/b&gt;
        &lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;The Problem&lt;/h3&gt;
&lt;p&gt;Imagine a world with every individual having open access to the sum of human knowledge. But there is a problem — the sum of human knowledge is far greater than the sum of printed knowledge. For example, in India and South Africa, the number of books produced every year is nowhere near to the number of books being producing in UK. There is very little citable, printed material to rely on in the indigenous languages of India or South Africa. So it is difficult for the languages of these countries to grow its own Wikipedia. While there are significant media markets for Indian languages within and outside India, there is very little scholarly publishing in any language other than English. On the other hand, South African languages with the exception of English and Afrikaans have had a largely oral existence and only in recent times have started a publishing tradition, which is in nascent stages.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Total Production of Books in UK, South Africa and India as of 2005&lt;/b&gt;&lt;br /&gt;&lt;br /&gt;
&lt;p&gt;UK: 161,000 books / 60 million people&lt;br /&gt;South Africa: 6100 books/48 million people&lt;br /&gt;India: 97,000 books/1100 million people&lt;/p&gt;
&lt;i&gt;If we were to measure books produced in 2005 per person per country, the comparison is even more glaring&lt;/i&gt;:&lt;br /&gt;&lt;br /&gt;
&lt;p&gt;UK: 1 book per 372 people&lt;br /&gt;South Africa: 1 book per 7869 people&lt;br /&gt;India: 1 book per 11,371 people&lt;/p&gt;
&lt;p&gt;Source: Wikimedia page on Research: Oral Citations. For more details see &lt;a class="external-link" href="http://meta.wikimedia.org/wiki/Research:Oral_Citations"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;As a result of such disparity, everyday, common knowledge — things known, observed and performed by millions of people — do not enter Wikipedia as facts because they haven’t been written down in a reliably published source. Hence, Wikipedia in countries like India and South Africa lose out on opportunities for growth.&lt;/p&gt;
&lt;p&gt;While we are enthused about the rise of “small language Wikipedias”, it may not happen soon. Not with the present rules at least. Even if we were to convince every single person in the South with Internet access to become an active editor on Wikipedia, there is still a problem that they are going to run up against. That problem that currently bedevils everyone working in local languages in Asia and Africa, and nobody seems to have a control over it.&lt;/p&gt;
&lt;p&gt;For Wikipedias in languages of the South, citations aren’t a problem when the articles being added are translations (for universally important topics, reliable citations are already there in English and other European languages). Assuming, however, that we all want the sphere of knowledge to be universally expanded — and not merely translated from languages of the North to languages of the South — there are two specific problems with finding citations for important local subject matters.&lt;/p&gt;
&lt;ul style="list-style-type: square; "&gt;
&lt;li&gt;Published, citable resources may simply not exist. This is not just true of Sub-Saharan African languages (many of which use Latin script, have a relatively recent written history, and small or non-existent publishing markets) but also of several South Asian languages (even though they have non-Latin scripts, a relatively ancient written history and thriving publishing markets in news and entertainment).&lt;/li&gt;
&lt;li&gt;Even when published scholarly resources exist, they may be inaccessible and thus effectively rendered invisible to Wikipedians. Libraries and archives in India and South Africa are usually not electronically indexed. Furthermore, they are not always conveniently located, and often impose a massive bureaucratic burden on the user to search, see, borrow from or even enter. &lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;h3&gt;Oral Citations as a Possible Solution&lt;/h3&gt;
&lt;p&gt;Hindi Wikipedia has over 65,000 articles, Malayalam Wikipedia has about 15,000, and Northern Sotho Wikipedia has about 600. Many of these articles — especially when concerning subjects that are specific to a particular people or place — have no citations whatsoever. Yet, an editor — often several editors — created the articles in question. How? Simply put, and barring laziness and carelessness where citations are available, the basis of fact therein is orally circulated knowledge. Even today, in several parts of the world, people are knowledge. Therefore, an exercise where oral citations are collected and assembled — in a manner not different to that by which print sources are cited on Wikipedia, i.e., with diverse viewpoints, several sources, a rationale for authenticity — might be one way to capture this knowledge in a form that is recognisable to Wikipedia.&lt;/p&gt;
&lt;p&gt;Anthropologists have been doing this for years — in the academy, it is called field work. The average Wikipedians certainly don’t have the capacity to replicate the arduous research programme of a doctoral student but they do have common sense and access to basic telecommunication facilities. So oral citations can:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Create externally verifiable authentication for a Wikipedia article that is based on experiential facts, but lacks citations simply because no printed source has recorded these facts to date.&lt;/li&gt;
&lt;li&gt;Add to the set of published scholarly resources that document an existing fact, for example, in cases where the published sources are archaic or primarily foreign, and thus complete existing knowledge or correct its biases.&lt;/li&gt;
&lt;/ol&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;
&lt;h3&gt;The Experiment&lt;/h3&gt;
&lt;p&gt;Achal Prabhala worked with Wikipedians across three languages in two different countries — Malayalam (40 million speakers) and Hindi (250 million speakers) in India and Northern Sotho (5 million speakers) in South Africa to see how oral citations might be received in the language communities they can benefit, discuss this idea with Wikipedians at large, not as a final solution but as a first step in understanding how we may expand our definition of reliable sources of knowledge beyond what is published in print, and what benefits such an expansion may bring and show this is an idea that takes hold, to create a set of clearly laid-out initial templates that others can use and build upon. Four collaborators: Shiju Alex, Mayur, Mohau Monaledi and Achal Prabhala, with additional help from Vijayakumar Blathur were finalised. Parts of the experiment were then filmed as an edited documentary.&lt;/p&gt;
&lt;h3&gt;The Pitfalls&lt;/h3&gt;
&lt;p&gt;There are numerous potential pitfalls[&lt;a href="#1"&gt;1&lt;/a&gt;] the most glaring of which is the principle of ‘No original research’. Naturally, we’re going to have to find a way to justify our approach, or work around it, or expand its meaning. Several people will welcome it, several people will object on all kinds of grounds, and several others possibly misusing and misinterpreting oral citations (i.e., without care to authenticity, diversity of opinion) in their work on Wikipedia.&lt;/p&gt;
&lt;p&gt;However, this is the right thing to do. The problem is real. The solution being presented is a first step, not a final answer. Sure, people might have a problem with it, and sure, there may be heated objections to it; but overall, if it’s the right thing to do, it should be done, however strange it seems and however unsettling it is.&lt;/p&gt;
&lt;p&gt;After all, if the status quo had to be respected absolutely, we wouldn’t have Wikipedia.&lt;/p&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Note&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt; &lt;a name="1"&gt;[1]On a side note, Achal says that the pitfall to the pitfall is the status quo: literally thousands of articles without any citations whatsoever, a problem that no one notices because they’re in languages that the majority of current editors on Wikipedia do not understand – and a problem which is often overlooked by language communities in the south in favour of growth.&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;a name="1"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;For recorded interviews, &lt;a class="external-link" href="http://commons.wikimedia.org/wiki/Category:Oral_Citations_Project"&gt;click here&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Watch the movie below:&lt;/p&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://player.vimeo.com/video/26469276?title=0&amp;amp;byline=0&amp;amp;portrait=0" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="http://vimeo.com/26469276"&gt;People are Knowledge (subtitled)&lt;/a&gt; from &lt;a href="http://vimeo.com/user7786138"&gt;Achal R. Prabhala&lt;/a&gt; on &lt;a href="http://vimeo.com"&gt;Vimeo&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/people-are-knowledge'&gt;https://cis-india.org/openness/blog-old/people-are-knowledge&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Projects</dc:subject>
    

   <dc:date>2012-12-14T10:26:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/front-page">
    <title>Openness</title>
    <link>https://cis-india.org/openness/front-page</link>
    <description>
        &lt;b&gt;Innovation and creativity are fostered through openness and collaboration. The advent of the Internet radically defined what it means to be open and collaborative. The Internet itself is built upon open standards and free/libre/open source software. Our work in the Openness programme focuses on open data, especially open government data, open access, open education resources, open knowledge in Indic languages, open media, and open technologies and standards -  hardware and software. We approach openness as a cross-cutting principle for knowledge production and distribution, and not as a thing-in-itself.&lt;/b&gt;
        
&lt;h2&gt;Key Works&lt;/h2&gt;
&lt;h3&gt;Publications&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;a href="http://cis-india.org/openness/blog/open-data-intermediaries-in-developing-countries"&gt;Open Data Intermediaries in Developing Countries - A Synthesis Report&lt;/a&gt;, François van Schalkwyk, Michael Caňares, Sumandro Chattapadhyay, and Alexander Andrason, June 2015.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a href="http://cis-india.org/openness/blog/opening-government-best-practice-guide"&gt;Opening Government: A Guide to Best Practice in Transparency, Accountability and Civic Engagement across the Public Sector&lt;/a&gt;,&amp;nbsp;Transparency &amp;amp; Accountability Initiative, 21 July 2011.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/blog/ogd-draft-v2-call-for-comments"&gt;Open Government Data in India&lt;/a&gt; (v2),&amp;nbsp;Nisha Thompson, 19 August 2011.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a href="http://cis-india.org/openness/blog/open-government-data-study"&gt;Open Government Data Study&lt;/a&gt;,&amp;nbsp;Glover Wright, Pranesh Prakash, Sunil Abraham&lt;em&gt; &lt;/em&gt;and Nishant Shah, Transparency &amp;amp; Accountability Initiative, 20 May 2011&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/research/conferences/conference-blogs/wikipedia-reader"&gt;Critical Point of View: A Wikipedia Reader, &lt;/a&gt;Geert Lovink and Nathaniel Tkacz (eds), Institute of Network Cultures, 9 May 2011.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/blog/open-access-to-scholarly-literature"&gt;Open Access to Scholarly Literature in India: A Status Report: Call for Comments&lt;/a&gt;, Prof. Subbiah Arunachalam and Madhan Muthu, April 2011.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a href="http://cis-india.org/openness/online-video-environment-in-india"&gt;The Online Video Environment in India - A Survey Report&lt;/a&gt;, Siddharth Chadha, Benjamin Moskowitz and Pranesh Prakash, iCommons and the Open Video Alliance, October 2010.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Film&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/blog/people-are-knowledge"&gt;People are Knowledge – Experimenting with Oral Citations on Wikipedia&lt;/a&gt;, directed by Priya Sen and Zen Marie,&amp;nbsp; Wikimedia Foundation,&lt;em&gt; &lt;/em&gt;22 July 2011.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Submissions&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/blog/draft-ndsap-comments"&gt;Comments on the draft National Data Sharing and Accessibility Policy&lt;/a&gt;, submitted to the Department of Science and Technology, June 2011.&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/openness/blog/comments-ifeg-phase-1"&gt;CIS Comments on the Interoperability Framework for e-Governance (Phase I)&lt;/a&gt;, submitted to the Department of Information &amp;amp; Technology, January 2011.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Workshops&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify;"&gt;&lt;a href="https://cis-india.org/openness/blog/comments-ifeg-phase-1" class="external-link"&gt;Workshop on Open Data for Human Development&lt;/a&gt;, organised with UNDP India and Akvo to support officials from the Government of Sikkim to draft an implementation plan for the state level open data policy, June 2015.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;&lt;a href="http://cis-india.org/openness/blog/iraqi-public-data-scenario-workshop"&gt;Iraqi Public Data Scenario Workshop: A Summary&lt;/a&gt;, notes from a workshop organised with UNDP Iraq to support officials of the Government of Iraq to draft an open data policy and build usage scenarios for open government data, October 2012.&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/front-page'&gt;https://cis-india.org/openness/front-page&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>kaeru</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-12-15T08:27:08Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/opening-government-best-practice-guide">
    <title>Opening Government: A Guide to Best Practice in Transparency, Accountability and Civic Engagement across the Public Sector</title>
    <link>https://cis-india.org/openness/blog-old/opening-government-best-practice-guide</link>
    <description>
        &lt;b&gt;The Transparency &amp; Accountability Initiative has published a book called “Opening Government: A Guide to Best Practice in Transparency, Accountability and Civic Engagement across the Public Sector”. We at the Centre for Internet &amp; Society contributed the section on Open Government Data.&lt;/b&gt;
        &lt;p&gt;Cross-posted from the &lt;a class="external-link" href="http://www.transparency-initiative.org/reports/opening-government"&gt;Transparency &amp;amp; Accountability Initiative blog&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;Download &lt;a class="external-link" href="http://www.transparency-initiative.org/wp-content/uploads/2011/07/Opening-Government3.pdf"&gt;the full report&lt;/a&gt; (PDF, 440 Kb)&lt;/p&gt;
&lt;h3&gt;Open Government Partnership&lt;/h3&gt;
&lt;p&gt;In January 2011, a small group of government and civil society leaders from around the world gathered in Washington, DC to brainstorm on how to build upon growing global momentum around transparency, accountability and civic participation in governance. The result was the creation of the Open Government Partnership (OGP), a new multi-stakeholder coalition of governments, civil society and private sector actors working to advance open government around the world — with the goals of increasing public sector responsiveness to citizens, countering corruption, promoting economic efficiencies, harnessing innovation, and improving the delivery of services.&lt;/p&gt;
&lt;p&gt;In September 2011, these founding OGP governments will gather in New York on the margins of the UN General Assembly to embrace a set of high-level open government principles, announce country-specific commitments for putting these principles into practice and invite civil society to assess their performance going forward. Also in September, a diverse coalition of governments will stand up and announce their intention to join a six-month process culminating in the announcement of their own OGP commitments and signing of the declaration of principles in January 2012.&lt;/p&gt;
&lt;h3&gt;'Opening Government' report&lt;/h3&gt;
&lt;p&gt;To help inform governments, civil society and the private sector in developing their OGP commitments, the Transparency and Accountability Initiative (T/A Initiative) reached out to leading experts across a wide range of open government fields to gather their input on current best practice and the practical steps that OGP participants and other governments can take to achieve it.&lt;/p&gt;
&lt;p&gt;The result is the first document of its kind to compile the state of the art in transparency, accountability and citizen participation across 15 areas of governance, ranging from broad categories such as access to information, service delivery and budgeting to more specific sectors such as forestry, procurement and climate finance.&lt;/p&gt;
&lt;p&gt;Each expert’s contribution is organized according to three tiers of potential commitments around open government for any given sector — minimal steps for countries starting from a relatively low baseline, more substantial steps for countries that have already made moderate progress, and most ambitious steps for countries that are advanced performers on open government.&lt;/p&gt;
&lt;h3&gt;Chapters and Contributing Authors&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Aid – &lt;a href="http://www.publishwhatyoufund.org/" target="_blank" title="Publish What You Fund"&gt;Publish What You Fund&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Asset disclosure - &lt;a href="http://www.globalintegrity.org/" target="_blank" title="Global Integrity"&gt;Global Integrity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Budgets – &lt;a href="http://www.internationalbudget.org/" target="_blank" title="IBP"&gt;The International Budget Project&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Campaign finance – &lt;a href="http://www.transparency-usa.org/" target="_blank" title="TI USA"&gt;Transparency International - USA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Climate finance – &lt;a href="http://www.wri.org/" target="_blank" title="WRI"&gt;World Resources Institute&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Fisheries – &lt;a href="http://transparentsea.co/" target="_blank" title="TransparentSea"&gt;TransparentSea&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Financial sector reform  &lt;a href="http://www.gfip.org/" target="_blank" title="Global Financial Integrity"&gt;Global Financial Integrity&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Forestry – &lt;a href="http://www.globalwitness.org/" target="_blank" title="Global Witness"&gt;Global Witness&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Electricity – &lt;a href="http://electricitygovernance.wri.org/" target="_blank" title="Electricity Governance Initiative"&gt;Electricity Governance Initiative&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Environment – &lt;a href="http://www.accessinitiative.org/" target="_blank" title="The Access Initiative"&gt;The Access Initiative&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Extractive industries – &lt;a href="http://www.revenuewatch.org/" target="_blank" title="RWI"&gt;The Revenue Watch Institute&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Open government data – &lt;a href="https://cis-india.org/" target="_blank" title="CIS India"&gt;The Centre for Internet and Society - India&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Procurement – &lt;a href="http://www.transparency-usa.org/" target="_blank" title="TI USA"&gt;Transparency International-USA&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Right to information – &lt;a href="http://www.access-info.org/" target="_blank" title="Access Info"&gt;Access Info&lt;/a&gt; and the &lt;a href="http://www.law-democracy.org/" target="_blank" title="Center for Law and Democracy"&gt;Center for Law and Democracy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Service delivery – &lt;a href="http://www.twaweza.org/" target="_blank" title="Twaweza"&gt;Twaweza&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/opening-government-best-practice-guide'&gt;https://cis-india.org/openness/blog-old/opening-government-best-practice-guide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>e-governance</dc:subject>
    

   <dc:date>2012-12-14T10:26:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report">
    <title>Privacy Matters, Guwahati — Event Report</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report</link>
    <description>
        &lt;b&gt;On June 23, a public seminar on “Privacy Matters” was held at the Don Bosco Institute in Karhulli, Guwahati. It was organised by IDRC, Society in Action Group, IDEA Chirang, an NGO initiative working with grassroots initiatives in Assam, Privacy India and CIS and was attended by RTI activists and grass roots NGO representatives from across the North Eastern region: Manipur, Arunachal Pradesh, Tripura, Nagaland, Assam and Sikkim. The event focused on the challenges and concerns of privacy in India.&lt;/b&gt;
        
&lt;p&gt;Unfortunately many of the scheduled invitees had to drop out owing to developments on the Lokpal issue at the Centre, and simultaneously Guwahati was witnessing unrest following an agitation over land rights that left three persons dead.&lt;/p&gt;
&lt;p&gt;Welcoming the participants, Prashant Iyengar, lead researcher for Privacy India, gave an introduction to the objectives of Privacy India, and briefed the gathering about the thematic “Privacy Matters” consultations previously held across the country in Kolkata, Bangalore and Ahmedabad. Mr. Iyengar also gave a background to issues that India is facing in concern with &amp;nbsp;privacy, &amp;nbsp;explaining &amp;nbsp;the &amp;nbsp;many &amp;nbsp;contexts &amp;nbsp;that &amp;nbsp;privacy &amp;nbsp;can &amp;nbsp;be &amp;nbsp;found &amp;nbsp;in, and &amp;nbsp;raising questions such as: Why is &amp;nbsp;privacy important? How can it be maintained with the way technology is encroaching upon our lives? And how can we make privacy laws functional?&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/P1.jpg/image_preview" alt="Privacy Guwahati - 1" class="image-inline image-inline" title="Privacy Guwahati - 1" /&gt;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"Privacy objectives are to raise awareness, spark civil action and promote democratic dialogue around privacy challenges and violations in India. One of Privacy India’s goals is to build consensus towards the promulgation of a comprehensive privacy legislation in India through consultation with the public, legislators and the legal and academic community."&lt;/p&gt;
&lt;/blockquote&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;Prashant Iyengar, Privacy India.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;h2&gt;Event Sessions&lt;/h2&gt;
&lt;p&gt;The structure of the event was one of open discussion, with presentations made by those who wanted to share. Throughout the day, the conversation fell into three main topics including: privacy and the RTI, privacy and the UID, and privacy and surveillance in the context of North East India.&lt;/p&gt;
&lt;h3&gt;Privacy and the RTI&lt;/h3&gt;
&lt;p&gt;Prashant Iyengar opened the discussion on privacy and the RTI by highlighting the tension between the&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;need for transparency of the State, and the need to protect the privacy of public figures. For many&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;participants privacy and transparency was a new concept that they had&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; &amp;nbsp;just started thinking&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;about. Participant Rakesh (HRLN, Manipur)&amp;nbsp;spoke on the shortcomings that he saw in the RTI Act noting that though the RTI brings some transparency to society, many citizens still do not understand the extent of their Right to Information as it is protected under the Act. Furthermore, the RTI Act is still not applied equally across the country, and the transparency that the RTI tries to achieve is still in very nascent stages. Lowang, a participant from Aru &amp;nbsp;nachal Pradesh, shared the importance of drawing a line between privacy and transparency when it comes to information related to education and health. Anjuman Azra Begum, a research scholar working on indigenous people rights, noted the irony of the RTI as it is meant to bring transparency to the state, yet all ministers and MLA’s take an oath of secrecy, not transparency. Anjuman also spoke on the fact that the RTI often fails to protect the privacy of sensitive issues, such as sexual balance. She echoed Rakesh’s comment on the inaccessibility of the RTI, sharing that for a common person to exercise his/her rights is a very daunting task. Anthony Debbarmun, a human rights activist from Tripura noted that he felt that the North Eastern states are by and large seen as resource (land) by the centre and has shown no concern for citizens and their well-being. Government is seen as a dictator in this &amp;nbsp;region, &amp;nbsp;hence &amp;nbsp;the &amp;nbsp;question — Transparency &amp;nbsp;for &amp;nbsp;whom?, &amp;nbsp;Privacy &amp;nbsp;for &amp;nbsp;Whom? &amp;nbsp;The distinction between the transparency brought about by the RTI and individual privacy was also made. It was pointed out that the RTI is concerned with transparency of the State, but individual privacy is separate from this concept.&lt;/p&gt;
&lt;pre&gt;&lt;strong&gt;Personal Experiences Shared&lt;/strong&gt;&lt;/pre&gt;
&lt;p&gt;Anjuman Azra Begum shared her sister’s experience with the RTI. Her sister had applied for a job in 2008. Their family filed an RTI for details of the procedure, but was denied details by the RTI officer, who said that furnishing details would violate the privacy of other candidates. This example raises questions about when it is appropriate for RTI officers to withhold information in the name of privacy, and what mechanisms can be put in place to ensure that the RTI does not use privacy as a way to deny information. Lowang also shared his experience with the RTI. He had filed an RTI asking for answer sheets because he doubted the appointment of police personnel. He was told that the cost in total would be Rs.2000, when in reality each sheet costs Rs.2 — &amp;nbsp;the misconstruing of facts was another example of how RTI officials restrict access information indirectly. From these examples the concern about RTI officials using privacy as an excuse to deny information was brought to the surface. To highlight the problems with the current implementation of the RTI and the lack of basic knowledge of how to use the RTI Mhao Lotha from the DICE Foundation shared &amp;nbsp;a &amp;nbsp;personal &amp;nbsp;experience &amp;nbsp;of &amp;nbsp;his &amp;nbsp;friend &amp;nbsp;who &amp;nbsp;had &amp;nbsp;filed &amp;nbsp;an &amp;nbsp;RTI &amp;nbsp;against &amp;nbsp;the &amp;nbsp;fishery department, and the RTI official simply shouted at her. L. Rima told a similar story as Mhao Lotha. &amp;nbsp;In &amp;nbsp;her &amp;nbsp;experience &amp;nbsp;the &amp;nbsp;RTI &amp;nbsp;is &amp;nbsp;good &amp;nbsp;in &amp;nbsp;theory, &amp;nbsp;but &amp;nbsp;in &amp;nbsp;practice &amp;nbsp;it &amp;nbsp;has &amp;nbsp;become &amp;nbsp;a commercial platform, where officers pay money to applicants for RTI cases to be taken off.&lt;/p&gt;
&lt;p&gt;From the discussion and the shared experiences it was clear that the RTI, although a strong law on paper, &amp;nbsp;still &amp;nbsp;faces many challenges in implementation that a privacy law could also face, and that the fact that if more privacy is brought into the RTI, it will become yet another way for the State to avoid disclosing information.&lt;/p&gt;
&lt;pre&gt;&lt;strong&gt;Questions to Consider&lt;/strong&gt;&lt;/pre&gt;
&lt;ul&gt;&lt;li&gt;Can a &amp;nbsp;privacy &amp;nbsp;law &amp;nbsp;be &amp;nbsp;made &amp;nbsp;to be &amp;nbsp;functional &amp;nbsp;in the &amp;nbsp;same &amp;nbsp;way &amp;nbsp;that &amp;nbsp;the RTI is functional?&lt;/li&gt;&lt;li&gt;In terms of the RTI who should have more privacy? &amp;nbsp;Who should be more transparent? Can NGOs be held accountable under the RTI?&lt;/li&gt;&lt;li&gt;What mechanism should be established to enforce the balance between privacy and transparency?&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Privacy and Security/Law Enforcement in the North East of India&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/p2.jpg/image_preview" alt="Guwahati 2" class="image-inline image-inline" title="Guwahati 2" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Another important discussion held during the conference was the practices of law enforcement in the North East, security, and privacy. Because the North East is in a state of armed conflict several laws such as the Armed Forces Special Powers Act, Sedition Act and provisions in the IPC give immunity to security forces. &amp;nbsp;This has led to gross&amp;nbsp;violation of citizens’ privacy by law enforcement agencies&amp;nbsp;&amp;nbsp;— as the acts give large amounts&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&amp;nbsp;of power &amp;nbsp; to &amp;nbsp; law &amp;nbsp;enforcement &amp;nbsp;agencies with &amp;nbsp;little &amp;nbsp;or &amp;nbsp;no accountability, &amp;nbsp;and &amp;nbsp;the &amp;nbsp;acts &amp;nbsp;are &amp;nbsp;often &amp;nbsp;misused.&amp;nbsp;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Furthermore, the security laws that exist in the North East explicitly prohibit access to individual personal information. For example, in the Assam Police Manual, which is followed by police in the North East — no papers can be given out to the public except to the investigation officer — this includes personal information such as medical records and post-mortem reports. &amp;nbsp;Anjuman shared an example of how this rule violates individual privacy. In her example, a victim was not allowed access her own medical report, but her medical records were being circulated among police, doctors, and media. &amp;nbsp;This example highlights how privacy and the right to information can go hand in hand as it was the victim’s right to access her own medical file, and at the same time getting access to her own medical file is an act of personal privacy protection.&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Personal Experiences Shared&lt;/strong&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Participants shared how individual privacy is often violated by the army, as it is allowed to enter and search any space without warrant, if there is any type of “suspicion”. They also shared how phone tapping and random monitoring is a common practice by both the army and civil police. For example, one day the police recorded a conversation by Director of the Police, Wireless who was giving a lecture on how to lead an effective agitation. The transcript was handed to the high court and the director punished. Other examples include policemen frisking women in public, newspapers publishing police frisking women in public, and law enforcement agencies compelling pregnant women to give birth in open in front of people. The discussion surrounding privacy and security/law enforcement highlighted an important way in which privacy is violated in the North East. The unregulated action of law enforcement acts as a very real and dangerous way in which individual privacy is violated on a daily basis.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span class="Apple-style-span"&gt;&lt;strong&gt;Questions to Consider&lt;/strong&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Can privacy legislation regulate the acts of law enforcement agencies?&lt;/li&gt;&lt;li&gt;Will privacy legislation be implemented differently in the North East because of the armed conflict?&lt;/li&gt;&lt;li&gt;Will a privacy law supersede other laws such as the AFSPA?&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Privacy and the UID&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;During &amp;nbsp; the &amp;nbsp; conference &amp;nbsp; the &amp;nbsp; discussion &amp;nbsp; also briefly focused on the UID and privacy. It was shared&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;that there had yet&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;to&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;be UID consultations in the North East of India. The only information individuals had about the UID was that it was going to allow individuals to access BPL benefits more easily.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Questions around the UID included: why is the UID needed for citizens living within their own country? How will the UID impact and help families who send their children to gather rations from the ration shops? What is the connection between the UID and the expected privacy law? What is the connection between the UID and intelligence agencies? What would UID mean to people living in border areas?&lt;/p&gt;
&lt;div&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;h3&gt;Privacy as a Fundamental Right&lt;/h3&gt;
&lt;/div&gt;
&lt;p&gt;In the closing discussion Prashant Iyengar shared different examples of privacy in Indian case law, and the various ways in which the Supreme Court has defined privacy as a right that is implicit in the right to life. The participants discussed what privacy means to them, and what they thought a right to privacy should entail. Among the points raised, it was brought up that privacy should be a right that is legally protected for sovereign individuals. The law should also include parameters and limitations in order to protect an individual’s autonomy. Furthermore, privacy should be understood and linked to the concept of human rights and individual rights. From the closing session, and the above sessions many themes and &amp;nbsp;questions &amp;nbsp;pertaining &amp;nbsp;to &amp;nbsp;privacy &amp;nbsp;came &amp;nbsp;out &amp;nbsp;that &amp;nbsp;will &amp;nbsp;need &amp;nbsp;to &amp;nbsp;be addressed &amp;nbsp;when considering the way forward &amp;nbsp;for a privacy legislation including:&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Property rights and privacy&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Privacy rights of minorities&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Privacy and the UID&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Privacy and law enforcement agencies&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Privacy as a fundamental right&lt;/span&gt;&lt;/li&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;The interplay of privacy law and traditional law&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&lt;a href="https://cis-india.org/internet-governance/publications/guwahati-privacy.pdf" class="internal-link" title="Guwahati Event Report [PDF]"&gt;Download the Event Report here&lt;/a&gt; [PDF, 178 kb]&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-08-26T10:31:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-media-law">
    <title>Privacy &amp; Media Law</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-media-law</link>
    <description>
        &lt;b&gt;In her research, Sonal Makhija, a Bangalore-based lawyer, tries to delineate the emerging privacy concerns in India and the existing media norms and guidelines on the right to privacy. The research examines the existing media norms (governed by Press Council of India, the Cable Television Networks (Regulation) Act, 1995 and the Code of Ethics drafted by the News Broadcasting Standard Authority), the constitutional protection guaranteed to an individual’s right to privacy upheld by the courts, and the reasons the State employs to justify the invasion of privacy. The paper further records, both domestic and international, inclusions and exceptions with respect to the infringement of privacy. &lt;/b&gt;
        &lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;Last year’s satirical release, Peepli [Live], accurately captured what takes place in media news rooms. The film revolves around a debt-ridden farmer whose announcement to commit suicide ensue a media circus. Ironically, in the case of the Radia tapes, the same journalists found themselves in the centre of the media’s frenzy-hungry, often intrusive and unverified style of reporting.[&lt;a href="#1"&gt;1&lt;/a&gt;] Exposés, such as, the Radia tapes and Wikileaks have thrown open the conflict between the right to information, or what has come to be called ‘informational activism’, and the right to privacy. Right to information and the right to communicate the information via media is guaranteed under Article 19(1) (a) of the Constitution of India. In &lt;i&gt;State of Uttar Pradesh v Raj Narain&lt;/i&gt;,[&lt;a href="#2"&gt;2&lt;/a&gt;] the Supreme Court of India held that Article 19(1) (a), in addition, to guaranteeing freedom of speech and expression, guarantees the right to receive information on matters concerning public interest. However, more recently concerns over balancing the right to information with the right to privacy have been raised, especially, by controversies like the Radia-tapes.&lt;/p&gt;
&lt;p&gt;For instance, last year Ratan Tata filed a writ petition before the Supreme Court of India alleging that the unauthorised publication of his private conversations with Nira Radia was in violation of his right to privacy. The writ, filed by the industrialist, did not challenge the action of the Directorate-General of Income Tax to record the private conversations for the purpose of investigations. Instead, it was challenging the publication of the private conversations that took place between the industrialist and Nira Radia by the media. Whether the publication of those private conversations was in the interest of the public has been widely debated. What the Tata episode brought into focus was the need for a law protecting the right to privacy in India.&lt;/p&gt;
&lt;p&gt;India, at present, does not have an independent statute protecting privacy; the right to privacy is a deemed right under the Constitution. The right to privacy has to be understood in the context of two fundamental rights: the right to freedom under Article 19 and the right to life under Article 21 of the Constitution.&lt;/p&gt;
&lt;p&gt;The higher judiciary of the country has recognised the right to privacy as a right “implicit in the right to life and liberty guaranteed to the citizens of this country by Article 21”. The Indian law has made some exceptions to the rule of privacy in the interest of the public, especially, subsequent to the enactment of the Right to Information Act, 2005 (RTI). The RTI Act, makes an exception under section 8 (1) (j), which exempts disclosure of any personal information which is not connected to any public activity or of public interest or which would cause an unwarranted invasion of privacy of an individual. What constitutes an unwarranted invasion of privacy is not defined. However, courts have taken a positive stand on what constitutes privacy in different circumstances.&lt;/p&gt;
&lt;p&gt;The purpose of this paper is to delineate the emerging privacy concerns in India and the existing media norms and guidelines on the right to privacy. At present, the media is governed by disparate norms outlined by self-governing media bodies, like the Press Council of India, the Cable Television Networks (Regulation) Act, 1995 and the Code of Ethics drafted by the News Broadcasting Standard Authority (NBSA). The paper examines the existing media norms, constitutional protection guaranteed to an individual’s right to privacy and upheld by courts, and the reasons the State employs to justify the invasion of privacy. The paper records, both domestic and international, inclusions and exceptions with respect to the infringement of privacy.&lt;/p&gt;
&lt;p&gt;The paper traces the implementation of media guidelines and the meanings accorded to commonly used exceptions in reporting by the media, like, ‘public interest’ and ‘public person’. This paper is not an exhaustive attempt to capture all privacy and media related debates. It does, however, capture debates within the media when incursion on the right to privacy is considered justifiable.  The questions that the paper seeks to respond to are: When is the invasion on the right to privacy defensible? How the media balances the right to privacy with the right to information? How is ‘public interest’ construed in day-to-day reporting? The questions raised are seen in the light of case studies on the invasion of privacy in the media, the interviews conducted with print journalists, the definition of the right to privacy under the Constitution of India and media’s code of ethics.&lt;/p&gt;
&lt;h3&gt;Constitutional Framework of Privacy&lt;/h3&gt;
&lt;p&gt;The right to privacy is recognised as a fundamental right under the Constitution of India. It is guaranteed under the right to freedom (Article 19) and the right to life (Article 21) of the Constitution. Article 19(1) (a) guarantees all citizens the right to freedom of speech and expression. It is the right to freedom of speech and expression that gives the media the right to publish any information. Reasonable restrictions on the exercise of the right can be imposed by the State in the interests of sovereignty and integrity of the State, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence. Article 21 of the Constitution provides, &lt;b&gt;"No person shall be deprived of his life or personal liberty except according to procedure established by law." &lt;/b&gt;Courts have interpreted the right to privacy as implicit in the right to life. In &lt;i&gt;R.Rajagopal v. State of T.N.&lt;/i&gt;[&lt;a href="#3"&gt;3&lt;/a&gt;]; and &lt;i&gt;PUCL v. UOI&lt;/i&gt;[&lt;a href="#4"&gt;4&lt;/a&gt;], the courts observed that the right to privacy is an essential ingredient of the right to life.&lt;/p&gt;
&lt;p&gt;For instance, in &lt;i&gt;R. Rajagopal v State of Tamil Nadu&lt;/i&gt;, Auto Shankar — who was sentenced to death for committing six murders — in his autobiography divulged his relations with a few police officials. The Supreme Court in dealing with the question on the right to privacy, observed, that the right to privacy is implicit in the right to life and liberty guaranteed to the citizens of the country by Article 21. It is a ‘right to be left alone.’ "A citizen has a right to safeguard the privacy of his own, his family, marriage, procreation, motherhood, child-bearing and education among other matters.” The publication of any of the aforesaid personal information without the consent of the person, whether accurate or inaccurate and ‘whether laudatory or critical’ would be in violation of the right to privacy of the person and liable for damages. The exception being, when a person voluntarily invites controversy or such publication is based on public records, then there is no violation of privacy.&lt;/p&gt;
&lt;p&gt;In &lt;i&gt;PUCL v. UOI&lt;/i&gt;,[&lt;a href="#5"&gt;5&lt;/a&gt;]which is popularly known as the wire-tapping case, the question before the court was whether wire-tapping was an infringement of a citizen’s right to privacy. The court held that an infringement on the right to privacy would depend on the facts and circumstances of a case. It observed that, &lt;b&gt;"telephone conversation is an important facet of a man's private life. Right to privacy would certainly include telephone-conversation in the privacy of one's home or office. Telephone-tapping would, thus, infract Article 21 of the Constitution of India unless it is permitted under the procedure established by law."&lt;/b&gt; It further observed that the right to privacy also derives from Article 19 for &lt;b&gt;"when a person is talking on telephone, he is exercising his right to freedom of speech and expression."&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;In Kharak Singh v. State of U.P,[&lt;a href="#6"&gt;6&lt;/a&gt;] where police surveillance was being challenged on account of violation of the right to privacy, the Supreme Court held that domiciliary night visits were violative of Article 21 of the Constitution and the personal liberty of an individual.&lt;/p&gt;
&lt;p&gt;The court, therefore, has interpreted the right to privacy not as an absolute right, but as a limited right to be considered on a case to case basis. It is the exceptions to the right to privacy, like ‘public interest’, that are of particular interest to this paper.&lt;/p&gt;
&lt;h3&gt;International Conventions&lt;/h3&gt;
&lt;p&gt;Internationally the right to privacy has been protected in a number of conventions. For instance, the Universal Declaration of Human Rights, 1948 (UDHR) under Article 12 provides that:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;"No one shall be subjected to arbitrary interference with his privacy, family, home or correspondence, or to attacks upon his honour and reputation. Everyone has the right to the protection of the law against such interference or attacks." &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The UDHR protects any arbitrary interference from the State to a person’s right to privacy. Similarly, International Covenant on Civil and Political Rights, 1976 (ICCPR) under Article 17 imposes the State to ensure that individuals are protected by law against “arbitrary or unlawful interference with his privacy, family, home or correspondence, nor to unlawful attacks on his honour and reputation. &lt;a name="7"&gt;[7] &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Thus, ensuring that States enact laws to protect individual’s right to privacy. India has ratified the above conventions. The ratification of the Conventions mandates the State to take steps to enact laws to protect its citizens. Although, human right activists have periodically demanded that the State take adequate measures to protect human rights of the vulnerable in society, the right to privacy has received little attention.&lt;/p&gt;
&lt;p&gt;Similarly, Article 16 of the Convention on the Rights of the Child (CRC) provides protection to a minor from any unlawful interference to his/her right to privacy and imposes a positive obligation on States who have ratified the convention to enact a law protecting the same. India does have safeguards in place to protect identity of minors, especially, juveniles and victims of abuse. However, there are exceptions when the law on privacy does not apply even in case of a minor.&lt;/p&gt;
&lt;p&gt;The right to privacy, therefore, is not an absolute right and does not apply uniformly to all situations and all class of persons. For instance, privacy with respect to a certain class of persons, like a person in public authority, affords different protection as opposed to private individuals.&lt;/p&gt;
&lt;h3&gt;Public Person&lt;/h3&gt;
&lt;p&gt;In case of a representative of the public, such as a public person, the right to privacy afforded to them is not of the same degree as that to a private person. The Press Council of India (PCI) has laid down Norms of Journalistic Conduct, which address the issue of privacy. The PCI Norms of Journalistic Conduct, recognises privacy as an inviolable human right, but adds a caveat; that the degree of privacy depends on circumstances and the person concerned.&lt;/p&gt;
&lt;p&gt;In the landmark judge’s asset case, &lt;i&gt;CPIO, Supreme Court of India vs Subhash Chandra Agarwal&lt;/i&gt;,[&lt;a href="#8"&gt;8&lt;/a&gt;] the court recognised the tension between the right to information and the right to privacy, especially, with respect to public persons. The case arose from an application filed by a citizen who was seeking information under the RTI Act on whether judges of high courts and Supreme Court were filing asset declarations in accordance with full resolution of the Supreme Court. The court held that information concerning private individuals held by public authority falls within the ambit of the RTI Act. It remarked that whereas public persons are entitled to privacy like private persons, the privacy afforded to private individuals is greater than that afforded to those in public authority, especially in certain circumstances.&lt;/p&gt;
&lt;p&gt;The court commented:&lt;/p&gt;
&lt;p&gt;"A private citizen's privacy right is undoubtedly of the same nature and character as that of a public servant. Therefore, it would be wrong to assume that the substantive rights of the two differ. Yet, inherent in the situation of the latter is the premise that he acts for the public good, in the discharge of his duties, and is accountable for them. The character of protection, therefore, afforded to the two classes — public servants and private individuals, is to be viewed from this perspective. The nature of restriction on the right to privacy is therefore, of a different order; in the case of private individuals, the degree of protection afforded is greater; in the case of public servants, the degree of protection can be lower, depending on what is at stake."&lt;/p&gt;
&lt;p&gt;In testing whether certain information falls within the purview of the RTI Act, the court said one should consider the following three tests:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;whether the disclosure of the personal information is with the aim of providing knowledge of the proper performance of the duties and tasks assigned to the public servant in any specific case;&lt;/li&gt;
&lt;li&gt;whether the information is deemed to comprise the individual's private details, unrelated to his position in the organization, and,&lt;/li&gt;
&lt;li&gt;whether the disclosure will furnish any information required to establish accountability or transparency in the use of public resources.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Would this rule hold true for information on relatives/ friends of public persons? The rule is that, unless, private information on relatives/friends of public person’s impacts public interest and accountability, the information should not be revealed.&lt;/p&gt;
&lt;p&gt;In 2010, the media reported that Sunanda Pushkar, a close friend of the Minister of State for External Affairs, Shashi Tharoor, holds a significant holding in the IPL Kochi team. The media exposure led to the exit of Shashi Tharoor from the government. While the media’s questioning of Pushkar’s holdings was legitimate, the media’s reporting on her past relationships and how she dressed had no bearing on public interest or accountability.[&lt;a href="#9"&gt;9&lt;/a&gt;] The media accused Pushkar of playing proxy for Tharoor in the Rs. 70 crore sweat equity deal. Much of the media attention focussed on her personal life, as opposed to, how she attained such a large stake in the IPL Kochi team. It minutely analysed her successes and failures, questioned her ability and accused her of having unbridled ambition and greed for money and power.[&lt;a href="#10"&gt;10&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;If one was to consider the rules of privacy set by the court in the judges assets’ case much of the personal information published by the media on Tharoor and Pushkar, failed to shed light on the IPL holdings or the establishment of the nexus between the IPL holdings and the government involvement.&lt;/p&gt;
&lt;p&gt;The tests delineated by the court in considering what personal information regarding a public authority may be shared under the RTI Act, can be adopted by the media when reporting on public officials. If personal information divulged by the media does not shed light on the performance of a public official, which would be of public interest, then the information revealed violates the standards of privacy. Personal details which have no bearing on public resources or interests should not be published.&lt;/p&gt;
&lt;p&gt;The media coverage of the Bombay terror attacks displayed the same lack of restraint, where the minutest details of a person’s last communication with his/her family were repeatedly printed in the media. None of the information presented by the media revealed anything new about the terror attack or emphasised the gravity of the attack.&lt;/p&gt;
&lt;p&gt;A senior journalist, who talked off the record and reported on the Mumbai terror attacks, agreed that the media overstepped their limits in the Mumbai terror attacks. As per her, violation of privacy takes place at two stages: the first time, when you overstep your boundaries and ask a question you should not have, and the second, when you publish that information. Reflecting on her ten years of reporting experience, she said, “Often when you are covering a tragedy, there is little time to reflect on your reporting. Besides, if you, on account of violating someone’s privacy, choose not to report a story, some competing paper would surely carry that story. You would have to defend your decision to not report the story to your boss.” The competitiveness of reporting and getting a story before your competitor, she agreed makes even the most seasoned journalists ruthless sometimes. Besides, although PCI norms exist, not many read the PCI norms or recall the journalistic ethics when they are reporting on the field.[&lt;a href="#11"&gt;11&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;The PCI Norms reiterate that the media should not intrude "the privacy of an individual, unless outweighed by genuine overriding public interest, not being a prurient or morbid curiosity."[&lt;a href="#12"&gt;12&lt;/a&gt;] The well accepted rule, however, is that once a matter or information comes in the public domain, it no longer falls within the sphere of the private. The media has failed to make the distinction between what is warranted invasion of privacy and what constitutes as an unwarranted invasion of privacy. For instance, identity of a rape or kidnap victim that would further cause discrimination is often revealed by the media.&lt;/p&gt;
&lt;h3&gt;Safeguarding Identity of Children&lt;/h3&gt;
&lt;p&gt;The Juvenile Justice (Care and Protection of Children) Act lays down that the media should not disclose the names, addresses or schools of juveniles in conflict with the law or that of a child in need of care and protection, which would lead to their identification. The exception, to identification of a juvenile or child in need of care and protection, is when it is in the interest of the child. The media is prohibited from disclosing the identity of the child in such situations.&lt;/p&gt;
&lt;p&gt;Similarly, the Convention on the Rights of the Child (CRC) stipulates that:&lt;/p&gt;
&lt;p&gt;Article 16&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;No child shall be subjected to arbitrary or unlawful interference with his or her privacy, family, or correspondence, nor to unlawful attacks on his or her honour and reputation. &lt;/li&gt;
&lt;li&gt;The child has the right to the protection of the law against such interference or attacks. &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;Article 40 of the Convention, states that the privacy of a child accused of infringing penal law should be protected at all stages of the proceedings.&lt;/p&gt;
&lt;p&gt;Almost all media, print and broadcast, fail to observe these guidelines. Prashant Kulkarni[&lt;a href="#13"&gt;13&lt;/a&gt;] (name changed), who was a photographer with Reuters a few years ago, said that in Reuters photographs taken by photojournalists could not be altered or edited, to ensure authenticity.&lt;/p&gt;
&lt;p&gt;As far as taking photographs of certain vulnerable persons is concerned, he admitted to photographing street children who are drug addicts on the streets of Mumbai. The photographs were published by Reuters. However, when he was on an assignment for an NGO working with children, the NGO cautioned him about photographing children who are drug addicts, to protect their identity. Similarly, identity of HIV and AIDS patients, including children, should be protected and not revealed. Children affected with HIV and AIDS should not be identified by name or photograph, even if consent has been granted by the minor’s parents/guardian.&lt;/p&gt;
&lt;p&gt;As a rule, Kulkarni said, he does not seek consent of individuals when he is taking their photographs, if they are in a public place. If they do not object, the assumption is that they are comfortable with being photographed. The PCI norms do not expressly provide that consent of a person should be sought. But, journalists are expected to exercise restraint in certain situations. Likewise, identifying juveniles in conflict with law is restricted. This includes taking photographs of juveniles that would lead to their identification.&lt;/p&gt;
&lt;p&gt;Kulkarni, who extensively covered the Bombay train blasts in 2006, explains, "At the time of the Bombay train explosions, I avoided taking pictures that were gory or where dead people could be identified. However, I did take photographs of those injured in the blast and were getting treated in government hospitals. I did not expressly seek their consent. They were aware of being photographed. That is the rule I have applied, even when I was on an assignment in West Africa. I have never been on an assignment in Europe, so am not sure whether I would have applied the same rule of thumb. Nonetheless, now as a seasoned photographer, I would refrain from taking pictures of children who are drug addicts."&lt;/p&gt;
&lt;h3&gt;Safeguarding Identity of Rape Victims&lt;/h3&gt;
&lt;p&gt;Section 228A of the Indian Penal Code makes disclosure of the identity of a rape victim punishable. In the recent Aarushi Talwar murder case and the rape of an international student studying at the Tata Institute of Social Sciences (TISS) the media frenzy compromised the privacy of the TISS victim and besmirched the character of the dead person.[&lt;a href="#14"&gt;14&lt;/a&gt;] In the TISS case, the media did not reveal the name of the girl, but revealed the name of the university and the course she was pursuing, which is in violation of the PCI norms. In addition to revealing names of individuals, the PCI norms expressly states that visual representation in moments of personal grief should be avoided. In the Aarushi murder case, the media repeatedly violated this norm.&lt;/p&gt;
&lt;p&gt;The media in both cases spent enough newsprint speculating about the crimes. Abhinav Pandey[&lt;a href="#15"&gt;15&lt;/a&gt;] (name changed), a senior journalist reporting on crime, agrees that the media crossed its boundaries in the TISS case by reporting sordid details of how the rape took place. "Names of victims of sexual crime cannot be reported. In fact, in many instances the place of stay and any college affiliation should also be avoided, as they could be easily identified. Explicit details of the offence drawn from the statement given by the victim to the police are irrelevant to the investigation or to the public at large. Similarly, names of minors and pictures, including those of juveniles, have to be safeguarded."&lt;/p&gt;
&lt;p&gt;"Crime reporters receive most of their stories from the police. Therefore, one has to be careful before publishing the story. At times in the rigour of competitive journalism, if you decide to publish an unverified story, as a good journalist you should present a counter-point. As a seasoned journalist it is easy to sense when a story is being planted by the police. If you still want to carry the story, one has to be careful not to taint the character of a person," he adds.&lt;/p&gt;
&lt;p&gt;"For instance, in my reporting if I find that the information will not add to the investigation, I will not include it in my copy. Last year, we had anonymous letters being circulated among crime reporters which alleged corruption among senior IPS officers. Instead of publishing the information contained in those letters with the names of the IPS officers, we published a story on corruption and cronyism on IPS officers. In the Faheem Ansari matter, who was an accused in the 26/11 trial, I had received his email account password. Accessing his account also amounts to violation of privacy. But, we only published the communication between him and some handlers in Pakistan, which we knew would have an impact on the investigation. Our job requires us to share information in the public domain, sometimes we would violate privacy. Nonetheless, one has to be cautious."&lt;/p&gt;
&lt;h3&gt;Trial by Media &amp;amp; Media Victimisation&lt;/h3&gt;
&lt;p&gt;The PCI norms lay down the guidelines for reporting cases and avoiding trial by media. The PCI warns journalists not to give excessive publicity to victims, witnesses, suspects and accused as that amounts to invasion of privacy. Similarly, the identification of witnesses may endanger the lives of witnesses and force them to turn hostile. Zaheera Sheikh, who was a key witness in the Gujarat Best Bakery case, was a victim of excessive media coverage and sympathy. Her turning hostile invited equal amount of media speculation and wrath. Her excessive media exposure possibly endangered her life. Instead, of focussing on the lack of a witness protection program in the country, the media focussed on the twists and turns of the case and the 19 year old’s conflicting statements.  The right of the suspect or the accused to privacy is recognised by the PCI to guard against the trial by media.&lt;/p&gt;
&lt;p&gt;Swati Deshpande,[&lt;a href="#16"&gt;16&lt;/a&gt;] a Senior Assistant Editor (Law) at the Times of India, Mumbai, observes that, “As a good journalist one will always have more information than required, but whether you publish that information or exercise restraint is up to you.” In a span of 11 years of court reporting, as per her, there have been instances when she has exercised the option of not reporting certain information that could be defamatory and cannot be attributed. If an allegation is made in a court room, but is not supported by evidence or facts, then it is advisable that it be dropped from the report.&lt;/p&gt;
&lt;p&gt;"In the Bar Dancers’ case which was before the Bombay High Court, the petition made allegations of all kinds against certain ministers. I did not report that, although I could have justified it by saying it is part of the petition, and I was just doing my job. The allegation was neither backed by facts nor was it of public interest. As a rule one should report on undisputed facts. Then again, with court reporting one is treading on safer grounds, as opposed to other beats."&lt;/p&gt;
&lt;p&gt;"In cases of rape when facts are part of the judgement, you report facts that are relevant to the judgement or give you an insight on why the court took a certain view and add value to the copy. One should avoid a situation where facts revealed are offensive or reveal the identity of the victim. The past history of both the victim and the accused should not be reported."&lt;/p&gt;
&lt;p&gt;She admitted, that "Media reporting often gives the impression that the accused has committed the crime or the media through its independent investigation wing has found a particular fact. When in fact, it has relied entirely on the information given by the police and failed to question or verify the facts by an independent source. The result is that most crime reporting is one-sided, because the information received from the police is rarely questioned."&lt;/p&gt;
&lt;p&gt;As per her, to a certain degree the publication of Tata–Radia conversations did violate Tata’s privacy. "Media needs to question itself prior to printing on how the information is of public interest. Of course, as a journalist you do not want to lose out on a good story, but there needs to be gate keeping, which is mostly absent in most of the media today."&lt;/p&gt;
&lt;p&gt;In the Bofors pay-off case[&lt;a href="#17"&gt;17&lt;/a&gt;] the High Court of Delhi, observed that, “The fairness of trial is of paramount importance as without such protection there would be trial by media which no civilised society can and should tolerate.  The functions of the court in the civilised society cannot be usurped by any other authority.”[&lt;a href="#18"&gt;18&lt;/a&gt;]  It further criticised the trend of police or the CBI holding a press conference for the media when investigation of a crime is still ongoing. The court agreed that media awareness creates awareness of the crime, but the right to fair trial is as valuable as the right to information and freedom of communication.&lt;/p&gt;
&lt;p&gt;The 200th report of the Law Commission dealt with the issue of &lt;b&gt;Trial by media: Free Speech vs Fair Trial under Criminal Procedure&lt;/b&gt;. The report, focussed on the pre-judicial coverage of a crime, accused and suspects, and how it impacts the administration of justice.  The Contempt of Courts Act, under section 2 defines criminal contempt as:&lt;/p&gt;
&lt;p&gt;"…the publication, (whether by words, spoken or written or by signs, or by visible representations, or otherwise), of any matter or the doing of any other act whatsoever which&lt;br /&gt;(i) … … … …&lt;br /&gt;(ii) prejudices or interferes or tends to interfere with the due course&lt;br /&gt;of any judicial proceedings; or&lt;br /&gt;(iii) interferes or tends to interfere with or obstructs or tends to obstruct, the administration of justice in any manner."&lt;/p&gt;
&lt;p&gt;Section 3(1) of the Act exempts any publication and distribution of publication, "if the publisher had no reasonable grounds for believing that the proceeding was pending”. In the event, the person is unaware of the pendency, any publication (whether by words spoken or written or signs or visible representations) interferes or tends to interfere with or obstructs “the course of justice in connection with any civil or criminal proceeding pending at the time of publication, if at that time he had no reasonable grounds for believing that the proceeding was pending." The report emphasizes that publications during the pre-trial stage by the media could affect the rights of the accused. An evaluation of the accused’s character is likely to affect or prejudice a fair trial.&lt;/p&gt;
&lt;p&gt;If the suspect’s pictures are shown in the media, identification parades of the accused conducted under Code of Civil Procedure would be prejudiced. Under Contempt of Court Act, publications that interfere with the administration of justice amount to contempt. Further, the principles of natural justice emphasise fair trial and the presumption of innocence until proven guilty.  The rights of an accused are protected under Article 21 of the Constitution, which guarantees the right to fair trial. This protects the accused from the over-zealous media glare which can prejudice the case. Although, in recent times the media has failed to observe restraint in covering high-profile murder cases, much of which has been hailed as media’s success in ensuring justice to the common man.&lt;/p&gt;
&lt;p&gt;For instance, in the Jessica Lal murder case, the media took great pride in acting as a facilitator of justice. The media in the case whipped up public opinion against the accused and held him guilty even when the trial court had acquitted the accused. The media took on the responsibility of administering justice and ensuring the guilty are punished, candle light vigils and opinion polls on the case were organised by the media. Past history of the accused was raked up by the media, including photographs of the accused in affluent bars and pubs in the city were published after he was acquitted. The photographs of Manu Sharma in pubs insinuated how he was celebrating after his acquittal.&lt;/p&gt;
&lt;p&gt;The Apex Court observed that the freedom of speech has to be carefully and cautiously used to avoid interference in the administration of justice. If trial by media hampers fair investigation and prejudices the right of defence of the accused it would amount to travesty of justice. The Court remarked that the media should not act as an agency of the court.[&lt;a href="#19"&gt;19&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;The Court, commented, "Presumption of innocence of an accused is a legal presumption and should not be destroyed at the very threshold through the process of media trial and that too when the investigation is pending."[&lt;a href="#20"&gt;20&lt;/a&gt;]&lt;/p&gt;
&lt;h3&gt;Sting Operations&lt;/h3&gt;
&lt;p&gt;On 30 August, 2007 Live India, a news channel conducted a sting operation on a Delhi government school teacher forcing a girl student into prostitution. Subsequent to the media exposé, the teacher Uma Khurana[&lt;a href="#21"&gt;21&lt;/a&gt;] was attacked by a mob and was suspended by the Directorate of Education, Government of Delhi. Later investigation and reports by the media exposed that there was no truth to the sting operation. The girl student who was allegedly being forced into prostitution was a journalist. The sting operation was a stage managed operation. The police found no evidence against the teacher to support allegations made by the sting operation of child prostitution. In this case, the High Court of Delhi charged the journalist with impersonation, criminal conspiracy and creating false evidence. The Ministry of Information and Broadcasting sent a show cause notice to TV-Live India, alleging the telecast of the sting operation by channel was “defamatory, deliberate, containing false and suggestive innuendos and half truths."[&lt;a href="#22"&gt;22&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;Section 5 of the Cable Television Networks (Regulation) Act, 1995 and the Cable Television Network Rules (hereafter the Cable Television Networks Act), stipulates that no programme can be transmitted or retransmitted on any cable service which contains anything obscene, defamatory, deliberate, false and suggestive innuendos and half truths. The Rules prescribes a programming code to be followed by channels responsible for transmission/re-transmission of any programme.&lt;/p&gt;
&lt;p&gt;The programme code restricts airing of programmes that offend decency or good taste, incite violence, contains anything obscene, defamatory, deliberate, false and suggestive innuendos and half truths, criticises, maligns or slanders any individual in person or certain groups, segments of social, public and moral life of the country and affects the integrity of India, the President and the judiciary. The programme code provided by the Rules is exhaustive. The Act empowers the government to restrict operation of any cable network it thinks is necessary or expedient to do so in public interest.&lt;/p&gt;
&lt;p&gt;The court observed that false and fabricated sting operations violate a person’s right to privacy. It further, observed, "Giving inducement to a person to commit an offence, which he is otherwise not likely and inclined to commit, so as to make the same part of the sting operation is deplorable and must be deprecated by all concerned including the media.” It commented that while “…sting operations showing acts and facts as they are truly and actually happening may be necessary in public interest and as a tool for justice, but a hidden camera cannot be allowed to depict something which is not true, correct and is not happening but has happened because of inducement by entrapping a person."[&lt;a href="#23"&gt;23&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;The court criticised the role of the media in creating situations of entrapment and using the ‘inducement test’. It remarked that such inducement tests infringe upon the individual's right to privacy. It directed news channels to take steps to prohibit “reporters from producing or airing any programme which are based on entrapment and which are fabricated, intrusive and sensitive.[&lt;a href="#24"&gt;24&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;The court proposed a set of guidelines to be followed by news channels and electronic media in carrying out sting operations. The guidelines direct a channel proposing to telecast a sting operation to obtain a certificate from the person who recorded or produced the same certifying that the operation is genuine to his knowledge. The guidelines propose that the Ministry of Information and Broadcasting should set up a committee which would have the powers to grant permission for telecasting sting operations. The permission to telecast a sting operation should be granted by the committee only if it is satisfied about the overriding public interest to telecast the sting operation. The guidelines mandate that, in addition, to ensuring accuracy, the operation should not violate a person’s right to privacy, "unless there is an identifiable large public interest” for broadcasting or publishing the material. However, the court failed to define what constitutes 'larger public interest'.&lt;/p&gt;
&lt;p&gt;The PCI norms also lay down similar guidelines which require a newspaper reporting a sting operation to obtain a certificate from the person involved in the sting to certify that the operation is genuine and record in writing the various stages of the sting. The decision to report the sting vests with the editor who merely needs to satisfy himself that the sting operation is of public interest.&lt;/p&gt;
&lt;p&gt;In addition, to the Cable Television Networks Act and the PCI norms, the News Broadcasting Standard Authority (NBSA) was set up in 2008 as a self-regulatory body by News Broadcasters Association.[&lt;a href="#25"&gt;25&lt;/a&gt;] The primary objective of the NBSA is to receive complaints on broadcasts. The NBSA has drafted a Code of Ethics and Broadcasting Standards governing broadcasters and television journalists. The Code of Ethics provides guiding principles relating to privacy and sting operations that broadcasters should follow.&lt;/p&gt;
&lt;p&gt;With respect to privacy, the Code directs channels not to intrude into the private lives of individuals unless there is a “clearly established larger and identifiable public interest for such a broadcast.” Any information on private lives of persons should be “warranted in public interest.” Similarly, for sting operations, the Code directs that they should be used as “a last resort” by news channels and should be guided by larger public interest. They should be used to gather conclusive evidence of criminality and should not edit/alter visuals to misrepresent truth.&lt;/p&gt;
&lt;p&gt;In a recent judgement on a supposed sting operation conducted by M/s. Associated Broadcasting Company Pvt. Limited[&lt;a href="#26"&gt;26&lt;/a&gt;] on TV9 on ‘Gay culture rampant in Hyderabad’, the NBA took suo motu notice of the violation of privacy of individuals with alternate sexual orientation and misuse of the tool of sting operation. NBA in its judgement held that the Broadcaster had violated clauses on privacy, sting operations and sex and nudity of the Code of Ethics. It further, observed, that the Broadcaster and the story did not reveal any justifiable public interest in using the sting operation and violating the privacy of individuals. In this particular case, the Broadcaster had revealed the personal information and faces of supposedly gay men in Hyderabad to report on the ‘underbelly’ of gay culture and life. However, the news report, as NBSA observed, did not prove any criminality and was merely a sensational report of gay culture allegedly prevalent in Hyderabad.&lt;/p&gt;
&lt;p&gt;The PCI norms provide that the press should not tape-record conversations without the person’s express consent or knowledge, except where it is necessary to protect a journalist in a legal action or for “other compelling reason.” What constitutes a compelling reason is left to the discretion of the journalist.&lt;/p&gt;
&lt;p&gt;It was in the 1980s, that the first sting operation on how women were being trafficked was carried out by the Indian Express reporter Ashwin Sarin. As part of the sting, the Express purchased a tribal girl called Kamla. Subsequently, in 2001, the sting operation conducted by Tehelka exposed corruption in defence contracts using spy cams and journalists posing as arms dealers.  The exposé on defence contracts led to the resignation of the then defence minister George Fernandes. Sting operations gained legitimacy in India, especially in the aftermath of the Tehelka operation, exposing corruption within the government. The original purpose of a sting operation or an undercover operation was to expose corruption. Stings were justifiable only when it served a public interest. Subsequent to the Tehelka exposé, stings have assumed the status of investigative journalism, much of which has been questioned in recent times, especially, with respect to ethics involved in conducting sting operations and the methods of entrapment used by the media.  Further, stings by Tehelka, where the newspaper used sex workers to entrap politicians have brought to question the manner in which stings are operated. Although, the overriding concern surrounding sting operations has been its authenticity, as opposed to, the issue of personal privacy.&lt;/p&gt;
&lt;p&gt;For instance, in March 2005 a television news channel carried out a sting operation involving Bollywood actor Shakti Kapoor to expose the casting couch phenomenon in the movie industry. The video showing Shakti Kapoor asking for sexual favours from an aspiring actress, who was an undercover reporter, was received with public outrage. Nonetheless, prominent members of the media questioned the manner in which the sting was conducted. The sting was set up as an entrapment. The court has taken a strong view against the use of entrapment in sting operations. In the case of the Shakti Kapoor sting, privacy of the actor was clearly violated. The manner in which the sting was conducted casts serious doubt on who was the victim.[&lt;a href="#27"&gt;27&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;Additionally, the sting violated the PCI norms. It failed to provide a record of the various stages of how the sting operation was conducted. In United Kingdom, the media when violating privacy of a person has to demonstrate that it is in the interest of the public.&lt;/p&gt;
&lt;h3&gt;International Law on Media &amp;amp; Privacy Ethics&lt;/h3&gt;
&lt;p&gt;United Kingdom&lt;/p&gt;
&lt;p&gt;The Press Complaints Commission (PCC), UK is a self-regulatory body similar to NBA. The PCC has put down code of ethics to be followed by journalists. The PCC guidelines provide that everyone has the right to privacy and editors must provide reason for intrusions to a person’s privacy. This includes photographing individuals in private places without their consent. Interestingly, private places include public or private property "where there is a reasonable expectation of privacy." In India however, as Kulkarni pointed out, photographs are taken without the consent of an individual if he/she is in a public space.&lt;/p&gt;
&lt;p&gt;Like the PCI norms, the PCC Code lays down guidelines to follow when reporting on minors (below 16 years of age) who have been victims of sexual assault. As per the guidelines, the identity of the children should be protected. Further, relatives or friends of persons convicted or accused of a crime should not be identified without their consent, unless the information is relevant to the story.  References to a person’s race, colour, sexual orientation and gender should be avoided. For instance, the media reportage of the TISS rape case, which revealed the nationality and colour of the victim, would be in violation of the PCC Code. In the TISS rape case, the information on the nationality and colour of the victim was not only irrelevant to the story, but as amply demonstrated by the media it reinforced prejudices against white women as ‘loose or amoral’.[&lt;a href="#28"&gt;28&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;As far as sting operations are concerned, the PCC lays down that the press must not publish material acquired by hidden camera or clandestine devices by intercepting private messages, emails or telephone calls without consent. However, revealing private information in cases of public interest is an exception to the general rule to be followed with respect to individual privacy. The PCC defines public interest to include, but it is not restricted to:&lt;/p&gt;
&lt;p&gt;"i) Detecting or exposing crime or serious impropriety &lt;br /&gt;ii) Protecting public health and safety&lt;br /&gt;iii) Preventing the public from being misled by an action or statement of an individual or organisation"&lt;/p&gt;
&lt;p&gt;It requires editors to amply demonstrate that a publication is of public interest. In case the material is already in public domain the same rules of privacy do not apply. However, in cases involving children below 16 years of age, editors must demonstrate exceptional public interest that overrides the interest of the child. Tellingly, the PCC recognises freedom of expression as public interest.&lt;/p&gt;
&lt;p&gt;The PCC, to ensure that persons are not hounded by the media have started issuing desist orders. The PCC issues a desist notice to editors to prevent the media from contacting the person. Preventive pre-publication is when the PCC pre-empts a story that may be pursued or published and attempts to either influence the reporting of the story in a way that it is not in violation of a person’s privacy or persuades the media house not to publish the story. The PCC, however, does not have the powers to prevent publication.&lt;/p&gt;
&lt;p&gt;Further, United Kingdom is a member of the European Convention on Human Rights (ECHR), which guarantees the right to privacy under Article 8 of the Convention: "&lt;b&gt;Everyone has the right to respect for his private and family life, his home and his correspondence.&lt;/b&gt;"&lt;/p&gt;
&lt;p&gt;However, there is no independent law which recognises the right to privacy. The judiciary however has protected the right to privacy in several occasions, like in the famous J.K. Rowling case where the English Court held, that a minor’s photograph without the consent of the parent or guardian, though not offensive, violates the child’s right to privacy.[&lt;a href="#29"&gt;29&lt;/a&gt;]&lt;/p&gt;
&lt;h3&gt;France&lt;/h3&gt;
&lt;p&gt;The French legal system protects the right to privacy under: Article 9 of the Civil Code.&lt;/p&gt;
&lt;p&gt;Article 9 of the Civil Code states:&lt;/p&gt;
&lt;p&gt;Everyone has the right to respect for his private life. Without prejudice to compensation for injury suffered, the court may prescribe any measures, such as sequestration, seizure and others, appropriate to prevent or put an end to an invasion of personal privacy; in case of an emergency those measures may be provided for by an interim order. The right to privacy allows anyone to oppose dissemination of his or her picture without their express consent.&lt;/p&gt;
&lt;p&gt;Article 9 covers both the public and private spheres, and includes not merely the publication of information but also the method of gathering information. Also, in France violation of one’s privacy is a criminal offence. This includes recording or transmitting private conversations or picture of a person in a private place without the person’s consent. This implies that privacy is not protected in a public place. Any picture taken of a person dead or alive, without their prior permission, is prohibited. Buying of such photographs where consent of a person also constitutes as an offence. Journalists, however, are not disqualified from the profession if they have committed such an offence.[&lt;a href="#30"&gt;30&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;France has the Freedom of the Press of 29 July 1881 which protects minors from being identified and violent and licentious publication which targets minors. It punishes slander, publication of any information that would reveal the identity of a victim of a sexual offence, information on witnesses and information on court proceedings which include a person’s private life.[&lt;a href="#31"&gt;31&lt;/a&gt;]&lt;/p&gt;
&lt;h3&gt;Sweden&lt;/h3&gt;
&lt;p&gt;Privacy is protected in Sweden under its Constitution. All the four fundamental laws of the country: the Instrument of Government, the Act of Succession, the Freedom of the Press Act, and the Fundamental Law on Freedom of Expression protect privacy. The Instrument of Government Act of 1974 provides for the protection of individual privacy. It states that freedom of expression is limited under Article 13 of the Constitution:&lt;/p&gt;
&lt;p&gt;"Freedom of expression and freedom of information may be restricted having regard to the security of the Realm, the national supply, public safety and order, the integrity of the individual, the sanctity of private life, or the prevention and prosecution of crime.  Freedom of expression may also be restricted in economic activities.  Freedom of expression and freedom of information may otherwise be restricted only where particularly important reasons so warrant."&lt;/p&gt;
&lt;p&gt;Sweden has a Press Council which was established in 1916.  The Council consists of the Swedish Newspaper Publishers' Association, the Magazine Publishers' Association, the Swedish Union of Journalists and the National Press Club. The Council consists of "a judge, one representative from each of the above-mentioned press organisations and three representatives of the general public who are not allowed to have any ties to the newspaper business or to the press organisations."&lt;/p&gt;
&lt;p&gt;Additionally, there is an office of the Press Ombudsman which was established in 1969. Earlier the Swedish Press Council used to deal with complaints on violations of good journalistic practice. After the setting up of the Press Ombudsman, the complaints are first handled by the Press Ombudsman, who is empowered to take up matters suo motu. "Any interested members of the public can lodge a complaint with the PO against newspaper items that violate good journalistic practice. But, the person to whom the article relates to must provide a written consent, if the complaint is to result in a formal criticism of the newspaper."[&lt;a href="#33"&gt;33&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;The Swedish Press Council reports that in the recent years, 350-400 complaints have been registered annually, of which most concern coverage of criminal matters and invasion of privacy.&lt;/p&gt;
&lt;p&gt;Sweden, additionally, has a Code of Ethics which applies to press, radio and television. The Code of Ethics was adopted by the Swedish Co-operation Council of the Press in September 1995. The Code of Ethics for Press, Radio and Television in Sweden has been drawn up by the Swedish Newspaper Publishers' Association, the Magazine Publishers' Association, the Swedish Union of Journalists and the National Press Club.&lt;/p&gt;
&lt;p&gt;The Code of Ethics lay down norms to be followed in respect of privacy. It states that caution should be exercised when publishing information that:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Infringes on a persons’ privacy, unless it is obviously in public interest,&lt;/li&gt;
&lt;li&gt;Information on suicides or attempted suicides&lt;/li&gt;
&lt;li&gt;Information on victims of crime and accidents. This includes publication of pictures or photographs[&lt;a href="#34"&gt;34&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Race, sex, nationality, occupation, political affiliation or religious persuasion in certain cases, especially when such information is of no importance, should not be published.&lt;/p&gt;
&lt;p&gt;One should exercise care in use of pictures, especially, retouching a picture by an electronic method or formulating a caption to deceive the reader. In case a picture has been retouched, it should be indicated below the photograph.&lt;/p&gt;
&lt;p&gt;Further, the Code asks journalists to consider “the harmful consequences that might follow for persons if their names are published” and names should be published only if it is in the public interest. Similarly, if a person’s name is not be revealed, the media should refrain from publishing a picture or any particulars with respect to occupation, title, age, nationality, sex of the person, which would enable identification of the person.&lt;/p&gt;
&lt;p&gt;In case of court reporting or crime reporting, the Code states that the final judgement of the Court should be reported and given emphasis, as opposed to conducting a media trial. In addition, Sweden has incorporated the ECHR in 1994.&lt;/p&gt;
&lt;h3&gt;Japan&lt;/h3&gt;
&lt;p&gt;The Japan Newspaper Publishers &amp;amp; Editors Association or Nihon Shinbun Kyokai (NSK),[&lt;a href="#35"&gt;35&lt;/a&gt;] was established in 1946 as an independent and voluntary organisation to establish the standard of reporting, and protect and promote interests of the media. The organisation as part of its mandate has developed the Canon of Journalism, which provides for ethics and codes members of the body should follow. The Canon recognises that with the easy availability of information, the media constantly has to grapple with what information should be published and what should be held back. The Code provides that journalists have a sense of responsibility and should not hinder public interests. In addition, to ensuring accuracy and fairness, the Code   states that respect of human rights, includes respect for human dignity, individual honour and right to privacy. Right to privacy is acknowledged as a human right.&lt;/p&gt;
&lt;p&gt;Japan does not have an information ministry or organs like the PCC in the U.K. or the Press Ombudsman in Sweden. Apart from the Canon, the NSK has a code for marketing of newspapers, an advertising code and the Kisha club guidelines.[&lt;a href="#36"&gt;36&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;Japan in 2003 formulated the Personal Information Protection Act, which regulates public and private sector. The Act, which came into effect in 2005, aims to ensure that all personal data collected by the public and private sector are handled with care. The Act requires that the purpose of collecting personal information and its use should be specified, information should be acquired by fair means, any information should not be supplied to third parties without prior consent of the individual concerned.&lt;/p&gt;
&lt;h3&gt;Netherlands&lt;/h3&gt;
&lt;p&gt;The right to privacy is protected under Article 10 of the Netherlands Constitution. Further, the Article also provides for the enactment of Rules for dissemination of personal data and the right of persons to be informed when personal data is being recorded.&lt;/p&gt;
&lt;p&gt;Netherlands also has the Netherlands Press Council which keeps the media in check. The Code of the International Federation of Journalists and the Code of Conduct for Dutch Journalists was drafted by the Dutch Society of Editors-in-Chief to establish media reporting standards. These guidelines can be disregarded by the media only in cases involving social interest.&lt;/p&gt;
&lt;p&gt;The Code recognises:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;That a person’s privacy should not be violated when there is no overriding social interest;&lt;/li&gt;
&lt;li&gt;In cases concerning public persons violation of privacy would take place, but they have the right to be protected, especially, if that information is not of public interest;&lt;/li&gt;
&lt;li&gt;The media should refrain from publishing pictures and images of persons without prior permission of persons. Similarly, the media should not publish personal letters and notes without the prior permission of those involved;&lt;/li&gt;
&lt;li&gt;The media should refrain from publishing pictures and information of suspects and accused; and&lt;/li&gt;
&lt;li&gt;Details of criminal offence should be left out if they would add to the suffering of the victim or his/her immediate family and if they are not needed to demonstrate the nature and gravity of the offence or the consequences thereof. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;The right to privacy in India has failed to acquire the status of an absolute right. The right in comparison to other competing rights, like, the right to freedom of speech &amp;amp; expression, the right of the State to impose restrictions on account of safety and security of the State, and the right to information, is easily relinquished. The exceptions to the right to privacy, such as, overriding public interest, safety and security of the State, apply in most countries. Nonetheless, as the paper demonstrates, unwarranted invasion of privacy by the media is widespread. For instance, in the UK, Sweden, France and Netherlands, the right to photograph a person or retouching of any picture is prohibited unlike, in India where press photographers do not expressly seek consent of the person being photographed, if he/she is in a public space.  In France, not only is the publication of information is prohibited on account of the right to privacy, but the method in which the information is procured also falls within the purview of the right to privacy and could be violative. This includes information or photograph taken in both public and private spaces. Privacy within public spaces is recognised, especially, “where there is reasonable expectation of privacy.” The Indian norms or code of ethics in journalism fail to make such a distinction between public and private space. Nor do the guidelines impose any restrictions on photographing an individual without seeking express consent of the individual.&lt;/p&gt;
&lt;p&gt;The Indian media violates privacy in day-to-day reporting, like overlooking the issue of privacy to satisfy morbid curiosity. The PCI norms prohibit such reporting, unless it is outweighed by ‘genuine overriding public interest’. Almost all the above countries prohibit publication of details that would hurt the feelings of the victim or his/her family. Unlike the UK, where the PCC can pass desist orders, in India the family and/or relatives of the victims are hounded by the media.&lt;/p&gt;
&lt;p&gt;In India, the right to privacy is not a positive right. It comes into effect only in the event of a violation. The law on privacy in India has primarily evolved through judicial intervention. It has failed to keep pace with the technological advancement and the burgeoning of the 24/7 media news channels. The prevalent right to privacy is easily compromised for other competing rights of ‘public good’, ‘public interest’ and ‘State security’, much of what constitutes public interest or what is private is left to the discretion of the media.&lt;/p&gt;
&lt;p&gt;&lt;a name="7"&gt;
&lt;pre&gt;Notes&lt;/pre&gt;
&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="7"&gt;&lt;/a&gt;&lt;a name="1"&gt;[1]The Radia Tapes’ controversy concerns recording of conversations between the lobbyist Nira Radia and politicians, industrialists, bureaucrats and journalists with respect to the 2G spectrum scam. The tapes were recorded by the Income Tax Department. The role played by the media, especially some prominent journalists, in scam has been questioned. A handful of magazines and newspapers have questioned the media ethics employed by these journalists, whose recorded conversations are in the public domain or have been published by a few political magazines. The publication of the recorded conversations by a few media publications has received a sharp reaction from the said journalists. They have accused those media journals of unverified reporting and conducting a smear campaign against them.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;[2]1975 AIR 865, 1975 SCR (3) 333.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;[3](1994) 6 S.C.C. 632.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;[4]AIR 1997 SC 568.&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="5"&gt;[5]AIR 1997 SC 568.&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="6"&gt;[6]AIR 1997 SC 568.&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2010-04-23/india/28149154_1_sunanda-pushkar-shashi-tharoor-ipl-kochi" name="7"&gt;[7]International Covenant on Civil and Political Rights, Part III Art. 17.  Available at: http://www2.ohchr.org/english/law/ccpr.htm [Last accessed 20//04/2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="8"&gt;[8]W.P. (C) 288/2009&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="9"&gt;[9]PTI, Media just turned me into a 'slut' in IPL row: Sunanda Pushkar, 23/04/2010 Available at http://articles.timesofindia.indiatimes.com/2010-04-23/india/28149154_1_sunanda-pushkar-shashi-tharoor-ipl-kochi [Last accessed 20/04/2011]. &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="10"&gt;[10]Vrinda Gopinath, "Got A Girl, Named Sue", 26/04/2010 Available at  http://www.outlookindia.com/article.aspx?265098 [Last accessed 20/04/2011]&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="11"&gt;[11]Interview with Senior Assistant Editor, Hindustan Times, on 18.04.11.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="12"&gt;[12]Guideline 6 (i) Right to Privacy, Norm if Journalistic Conduct, PCI.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="13"&gt;[13]Interview with a freelance photographer and a former Reuters photographer on 16.04.11.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="14"&gt;[14]Kumar, Vinod, “Raped American student’s drink not spiked in our bar,” 16.04.09 Available at http://www.mid-day.com/news/2009/apr/160409-Mumbai-News-Raped-American-student-date-drug-CafeXO-Tata-Institute-of-Social-Sciences.htm, Anon, “Party pics boomerangon TISS rape victim” , 04 .05.09, Available at http://www.mumbaimirror.com/index.aspx?page=article§id=15&amp;amp;contentid=2009050420090504031227495d8b4e80f  [Last Accessed April 20,2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="15"&gt;[15]Interview with Abhinav Pandey, crime reporter with a leading newspaper, on 21.04.11.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="16"&gt;[16]Interview with Swati Deshpande, Senior Assistant Editor (Law), Times of India, on 15.04.11.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="17"&gt;[17]Crl.Misc.(Main) 3938/2003&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="18"&gt;[18]Ibid.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="19"&gt;[19]Sidhartha Vashisht @ Manu Sharma vs State (Nct Of Delhi), Available at http://www.indiankanoon.org/doc/1515299/.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="20"&gt;[20]Ibid&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="21"&gt;[21]WP(Crl.) No.1175/2007&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="22"&gt;[22]Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="23"&gt;[23]Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="24"&gt;[24]Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="25"&gt;[25]NBA is a community formed by private television &amp;amp; current affairs broadcasters. As per the NBA website, it currently has 20 leading news channels and current affairs broadcaster as its members. Complaints can be filed against any of the broadcasters that are members of NBA on whom the Code of Ethics is binding. &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="26"&gt;[26]For additional details, please refer to the website: http://www.nbanewdelhi.com/authority-members.asp [Last Accessed April 20,2011]&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="27"&gt;[27]TNN, “'Full video will further embarrass Shakti', 15.03.2005 Available at http://articles.timesofindia.indiatimes.com/2005-03-15/mumbai/27849089_1_sting-operation-shakti-kapoor-film-industry.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="28"&gt;[28]For more details please refer to the PCC website: http://www.pcc.org.uk/ [Last Accessed April 20,2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="29"&gt;[29]Singh, A., May 2008,  “JK Rowling wins privacy case over son's photos”http://www.telegraph.co.uk/news/uknews/1936471/JK-Rowling-wins-privacy-case-over-sons-photos.html [Last Accessed April 20,2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="30"&gt;[30]For more details, please refer to: http://www.kbkcl.co.uk/2008/03/privacy-law-the-french-experience/  and http://ambafrance-us.org/spip.php?article640 [Last Accessed April 20,2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="31"&gt;[31]For more details, please refer to:http://www.ambafrance-uk.org/Freedom-of-speech-in-the-French.html [Last Accessed April 20,2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="32"&gt;[32]http://www.po.se/english/how-self-regulation-works [Last Accessed April 20,2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="33"&gt;[33]Ibid.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="34"&gt;[34]Please refer to this website for additional details: http://ethicnet.uta.fi/sweden/code_of_ethics_for_the_press_radio_and_television  and http://www.po.se/english/code-of-ethics/85-code-of-ethics-for [Last Accessed April 20,2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="35"&gt;[35]http://www.pressnet.or.jp/english/index.htm [Last Accessed April 20,2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="36"&gt;[36]Kisha Clubs, are clubs where only a few media houses/newspapers have access to public institution information. They have been criticised for its lack of openness and encouraging monopoly on reporting.&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-media-law'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-media-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Sonal Makhija</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-14T10:26:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rti-and-third-party-info">
    <title>RTI and Third Party Information: What Constitutes the Private and Public?</title>
    <link>https://cis-india.org/internet-governance/blog/rti-and-third-party-info</link>
    <description>
        &lt;b&gt;The passing of the Right to Information Act, 2005 was seen as giving an empowering tool in the hands of the citizens of India, six years post its implementation, loopholes have surfaced with misuse of the many fundamental concepts, which have yet not been defined to allow for a consistent pattern of decisions. Among many problems that emerge with the Act, a major problem is defining the extent to which an individual has access to other people’s information. While most of us tend to think that asking for other people’s phone numbers, personal details like passport number or IT returns are private and would be kept so, under the RTI Act and as seen in the Central Information Commission (CIC) decisions, all of these details can be availed of by someone who doesn’t know you at all!&lt;/b&gt;
        
&lt;p&gt;According to section 2 (n) of the RTI Act, 2005, 'third party' means a person other than the citizen making a request for information and includes a 'public authority'. This implies that the term 'third party' includes anyone other than the appellant or the respondent. In matters where an appellant is seeking information not regarding his or her own activities, or is asking for details of shared records that list details of several persons other than him or her, information cannot be provided until the ‘third party’ consents to disclosure and subsequently until the Central Public Information Office (CPIO), after considering the implications of such disclosure allows it. Section 11 (1) the Act provides the procedure to access third party information wherein the appellant needs to request for the third party’s consent after which the CPIO will produce a written request to the 'third party' and within a stipulated time period obtain their response. However, it is not the information bearer (third party) who holds the key to disclosure. The power, by the RTI Act, 2005, is vested in the public information officer who will then, either see a 'larger public interest', or otherwise allow disclosure based on the merits of the case.&lt;/p&gt;
&lt;p&gt;In such a situation, it is interesting to
see who the Central Information Commission (CIC) regards as 'third party'.
While going through the judgments delivered by the CIC, one comes across
several judgments that tell you who can and who cannot access your information.
While a son or daughter naturally inherits his/her father’s wealth, land or
other possessions, they do not inherit his position for obtaining information.
This is just one instance. Similar holds true for access to information of a
deceased kin. Unless the public information officer sees a ‘larger public
interest’ in disclosure of such information, it cannot be revealed even to the
deceased’s wife, husband or children unless they hold a power of attorney specifically
to a right to access information.&lt;/p&gt;
&lt;p&gt;This brings us to the question of ‘larger public interest’ and what information can be delved to anyone for this cause. While the RTI Act, 2005, clearly states that the appellant needs not a reason to ask for any information, it is largely based on the public information officer’s inference as to what the appellant may do with the data and hence, maybe deemed as acting in public interest or for personal gains. This also produces positions of potential criminality and the need for State subjects to prove themselves as ideal information seekers, void of malice in order for the public information officer to rule in their favour.&lt;/p&gt;
&lt;p&gt;Third party position is a problematic one as it only goes so far as to define the state-mediated interaction between two subjects in relation to each other through legal machinery that holds massive discretionary powers to disclose or withhold information. Hence, while, in relation to ‘third party’, a subject may need to justify his larger benevolent interests, the State finds no problems revealing or disclosing information for its own good. In Shri Rajender Kumar Arya vs Dy. Commissioner of Police (DCP), (4 March 2009), the commission ruled that they now have the decision of the Madras High Court in the context of right to privacy in light of the RTI Act. The Madras High Court observed that with the advent of the Right to Information Act, section 3 of the Act entitles a citizen to the right of information. Section 4(2) of the said Act obliges a public authority to disclose information to common people. Even personal information or information, which may otherwise amount to an invasion of privacy, may also be disclosed if the larger public interest so warrants. The court in fact came to the conclusion that the right to privacy virtually fades out in front of the 'Right to Information' and 'larger public interest’. This tells us that ‘third party’ is a mere negotiating position from which the State itself regulates information flow to citizens and can revoke these privileges as and when needed.&lt;/p&gt;
&lt;p&gt;Moreover, there is no clear definition to the ‘larger public interest’ or ‘invasion of privacy’. In several judgments, the committee upholds principles of natural justice to justify instance of public good but these cannot be upheld for all decisions. It is also interesting to see what comes under the purview of ‘public information’. It’s a misconception if you think that you hold the right to revealing your age, birth date, place you belong to, your marks, the rank that you hold, the salary you get, the returns you file or subsequently any of this information regarding your children. As upheld in&amp;nbsp;&lt;a class="external-link" href="http://www.indiankanoon.org/doc/1835611/"&gt;&lt;em&gt;Madhulika Rastogi vs Regional Passport Office, New Delhi&lt;/em&gt;&lt;/a&gt;,&amp;nbsp;on 4 February 2009, &lt;a class="external-link" href="http://www.rti.india.gov.in/cic_decisions/SG-18022009-41.pdf"&gt;&lt;em&gt;M. Rajamannar vs PIO, AC Division, Indira Gandhi National Open University&lt;/em&gt;&lt;/a&gt; on 18 February 2009 and &lt;a class="external-link" href="http://www.rti.india.gov.in/cic_decisions/AD-16022009-03.pdf"&gt;&lt;em&gt;A.V.Subrahmanyam vs BSNL, Hyderabad&lt;/em&gt;&lt;/a&gt; on 16 February 2009 — the judgments illustrate that information submitted to public authorities at any point in time whether to get admitted to school, to get a license, to pass a public services examination or even file a divorce; all qualify for access to other people because they have been knowingly submitted to the public domain. A lot of sensitive information like passport details, telephone call records and medical records that can map intimate interactions of a person’s daily life can also be obtained if larger public interest is proven.&lt;/p&gt;
&lt;p&gt;Hence, it becomes important to revise and rethink the commonly accepted notions of privacy, especially when information gains such strategic importance as well as fluidity through fast expanding platforms as well as tools such as RTI. While one may confidently think that information generated by the self, pertaining to one’s own business and life rightfully belongs to the private domain, it is very important to realize the constantly looming hold of the State to any information. In such a situation, what you can claim as private data totally depends on how much common interest it garners.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rti-and-third-party-info'&gt;https://cis-india.org/internet-governance/blog/rti-and-third-party-info&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Noopur Raval</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2011-11-24T09:21:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/june-2011-bulletin">
    <title>June 2011 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/june-2011-bulletin</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage:&lt;/b&gt;
        &lt;h2&gt;&lt;b&gt;Researchers@Work&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research knowledge base, the RAW programme has been collaborating with different organisations and individuals to focus on its three year thematic of Histories of the Internets in India. Six monographs Rewiring Bodies, Archive and Access, Pornography and the Law, The Leap of Rhodes or, How India Dealt with the Last Mile Problem - An Inquiry into Technology and Governance, Transparency and Politics and Internet, Society and Space in Indian Cities are published online and will be launched later this year.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/cis-raw/histories/Internetcities/cept-centre-for-role-of-internet"&gt;CEPT      to Set up Centre to Research Role of Internet in Social Development&lt;/a&gt; [Published in the Indian Express on June 18, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Upcoming Event in CEPT, Ahmedabad&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/research/conferences/conference-blogs/workshop"&gt;Locating      Internets: Histories of the Internet(s) in India — Research Training and      Curriculum Workshop: Call for Participation&lt;/a&gt; [Deadline for submission –      15 July 2011; Workshop from 19 to 22 August 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Digital Natives with a Cause?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? is a knowledge programme initiated by CIS and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who want to critically engage with the dominant discourse on youth, technology and social change, in order to look at the alternative practices and ideas in the Global South. It also aims at building new ecologies that amplify and augment the interventions and actions of the digitally young as they shape our futures.&lt;/p&gt;
&lt;h3&gt;The Digital Natives Newsletter&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/dn/digital-dinosaurs/weblogentry_view"&gt;The      Digital Dinosaurs&lt;/a&gt; [Volume 5]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt; Pathways&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;HE Cell's initiative on social justice, in collaboration with CIS, has initiated the Pathways Project for Learning in Higher Education. It is supported by the Ford Foundation. Under this project, nine under-graduate colleges in different parts of India will be identified to provide special skills in livelihood, knowledge and technology to underprivileged students in those colleges.&lt;/p&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/research/grants/pathways-project/pathways-proposal-info/weblogentry_view"&gt;Pathways      for Learning in Higher Education&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Accessibility&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;h3&gt;New Blog Entries&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/accessibility/blog/2011/06/21/communications-and-video-accessibility"&gt;Policy      Spotlight: 21st Century Communications and Video Accessibility Act&lt;/a&gt; [Written by Deepti Bharthur; contains an e-mail interview with Jenifer      Simpson, Senior Director for Government Affairs and head of the      Telecommunications &amp;amp; Technology Policy Initiative at the American      Association of People with Disabilities ]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/accessibility/blog/2011/06/13/ict-sri-lanka"&gt;ICT      Accessibility in Sri Lanka&lt;/a&gt; [Written by Nirmita Narasimhan]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Intellectual Property&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;CIS believes that access to knowledge and culture is essential as it promotes creativity and innovation and bridges the gaps between the developed and developing world positively. Hence, the campaigns for an international treaty on copyright exceptions for print-impaired, advocating against PUPFIP Bill, calls for the WIPO Broadcast Treaty to be restricted to broadcast, questioning the demonization of 'pirates', and supporting endeavours that explore and question the current copyright regime.&lt;/p&gt;
&lt;h3&gt;Statement&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/ipr/blog/sccr-22ndsession-cis-statement"&gt;Statement      of CIS, India, on the WIPO Broadcast Treaty at the 22nd SCCR&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/ipr/blog/lid-on-royalty-outflows"&gt;Putting      a Lid on Royalty Outflows — How the RBI can Help Reduce your IP Costs&lt;/a&gt; [Written by Sanjana Govil]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Openness&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS believes that innovation and creativity should be fostered through openness and collaboration and is committed towards promotion of open standards, open access, and free/libre/open source software.&lt;/p&gt;
&lt;h3&gt;Submission&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/openness/blog/2011/06/08/draft-ndsap-comments"&gt;Comments      on the draft National Data Sharing and Accessibility Policy&lt;/a&gt; [submitted      to the National Spatial Data Infrastructure]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Internet Governance&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Although there may not be one centralized authority that rules the Internet, the Internet does not just run by its own volition: for it to operate in a stable and reliable manner, there needs to be in place infrastructure, a functional domain name system, ways to curtail cyber crime across borders, etc. The Tunis Agenda of the second World Summit on the Information Society (WSIS), paragraph 34 defined Internet governance as “the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet.”  Its latest endeavour has resulted into these:&lt;/p&gt;
&lt;h3&gt;New Articles&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/the-present-and-future-dangers-of-indias-draconian-new-internet-regulations/weblogentry_view"&gt;The      Present — and Future — Dangers of India's Draconian New Internet      Regulations&lt;/a&gt; [By Anja Kovacs in the Caravan on June 1, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/big-brother-watching-you/weblogentry_view"&gt;Big      Brother is Watching You&lt;/a&gt; [By Sunil Abraham in Deccan Herald on June 1,      2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/2011/06/08/digital-is-political"&gt;The      Digital is Political&lt;/a&gt; [By Nishant Shah in Down to Earth, Issue of June      15, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/want-to-be-watched/weblogentry_view"&gt;Do      You Want to be Watched?&lt;/a&gt; [By Sunil Abraham in Pragati on June 8, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/2011/06/09/snooping-to-data-abuse"&gt;Snooping      Can Lead to Data Abuse&lt;/a&gt; [By Sunil Abraham in Mail Today on June 9,      2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/2011/06/22/privacy-and-security"&gt;Privacy      and Security Can Co-exist&lt;/a&gt; [By Sunil Abraham in Mail Today on June 21,      2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Column in Indian Express&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah, Director-Research will be writing a series of columns on Internet and Society issues:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/blog/2011/06/08/password-in-hindi"&gt;Say      'Password' in Hindi&lt;/a&gt; [By Nishant Shah in the Indian Express, May 15,      2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Upcoming Event&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/events/socio-financial-online-networks"&gt;Socio-financial      Online Networks: Globalizing Micro-Credit through Micro-transactional      Networked Platforms – A Public Lecture by Radhika Gajalla&lt;/a&gt; [at the      Centre for Internet and Society, Bangalore, July 8, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing a project, ‘Privacy in Asia’. &lt;i&gt;It is funded by Privacy International (PI), UK and the International Development Research Centre, Canada and is being administered in collaboration with the Society and Action Group, Gurgaon&lt;/i&gt;. The two-year project commenced on 24 March 2010 and will be completed as agreed to by the stakeholders. It was set up with the objective of raising awareness, sparking civil action and promoting democratic dialogue around challenges and violations of privacy in India. In furtherance of these goals it aims to draft and promote over-arching privacy legislation in India by drawing upon legal and academic resources and consultations with the public.&lt;/p&gt;
&lt;h3&gt;Featured Research&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/2011/06/14/copyright-enforcement"&gt;Copyright      Enforcement and Privacy in India&lt;/a&gt; [Written by Prashant Iyengar]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Articles&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/2011/06/04/street-view-of-private-and-public"&gt;A      Street View of Private and the Public&lt;/a&gt; [By Prashant Iyengar in Tehelka      on June 4, 2011]&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/blind-man-view-of-elephunt%20/?searchterm=The%20new%20Right%20to%20Privacy%20Bill%202011%20%E2%80%94%20A%20Blind%20Man%27s%20View%20of%20the%20Elephunt"&gt;The      new Right to Privacy Bill 2011 — A Blind Man's View of the Elephunt&lt;/a&gt; [By Prashant Iyengar in Privacy India website on June 8, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;New Blog Entry&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-india/2011/06/03/bloggers-rights-and-privacy"&gt;Bloggers'      Rights Subordinated to Rights of Expression: Cyber Law Expert&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Event organised in Guwahati&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/advocacy/igov/privacy-guwahati-conference.pdf/view"&gt;Privacy      matters&lt;/a&gt; [Donbosco Institute, Kharguli, Guwahati, June 23, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Upcoming Events&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/internet-surveillance-policy-lecture"&gt;Internet      Surveillance Policy: “…the second time as farce?” – A Public Lecture by      Caspar Bowden&lt;/a&gt; [TERI, Bangalore, June 27, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/events/privacy-matters-hyderabad"&gt;Privacy      Matters - A Public Conference in Hyderabad&lt;/a&gt; [Osmania University Center      for International Program, Hyderabad, July 9, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Telecom&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The growth in telecommunications in India has been impressive. While the potential for growth and returns exist, a range of issues need to be addressed for this potential to be realized. One aspect is more extensive rural coverage and the second aspect is a countrywide access to broadband which is low at about eight million subscriptions. Both require effective and efficient use of networks and resources, including spectrum. It is imperative to resolve these issues in the common interest of users and service providers. CIS campaigns to facilitate this:&lt;/p&gt;
&lt;h3&gt;Articles by Shyam Ponappa&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly on Telecom issues in the Business Standard and these articles are mirrored on the CIS website as well.&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/advocacy/telecom/blog/2011/06/08/ntp-2011-objective"&gt;NTP      2011 Objective: Broadband&lt;/a&gt; [published in the Business Standard on June 2,      2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;b&gt;Miscellaneous&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/notices/technology-transparency-accountability"&gt;Technology,      Transparency and Accountability: A Bar-Camp in Delhi&lt;/a&gt; [June 5, 2011,      Delhi]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/notices/communication-policy-advocacy-technology-and-online-freedom-of-expression-a-toolkit-for-media-development"&gt;Communication      Policy Advocacy, Technology, and Online Freedom of Expression: A Toolkit      for Media Development&lt;/a&gt; [June 20 – July 1, 2011, Budapest, Hungary]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;News &amp;amp; Media Coverage&lt;/b&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/cyber-space-hackers-paradise"&gt;Your cyber space is a hackers paradise&lt;/a&gt; [Mail Today, June 6, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/centaur-reveals-personal-info"&gt;Centaur website reveals guests' personal info&lt;/a&gt; [Times of India, June 20, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/seamier-side-of-texting"&gt;Mumbai Takes Note of Sexting, the Seamier Side of Texting&lt;/a&gt; [Times of India, June 19, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/state-just-did-to-you"&gt;Look what the state just did to you&lt;/a&gt; [Mid Day, June 12, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/india-e-tolerance"&gt;Tough neighbourhood tests India's e-tolerance&lt;/a&gt; [Times of India, June 12, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/looser-web-rules"&gt;India Weighing Looser Web Rules&lt;/a&gt; [Wall Street Journal, May 30, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/public-data-on-web"&gt;Public data on the Web leaves much to be desired&lt;/a&gt; [Hindu, May 28, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/aadhar-coming-to-bengaluru"&gt;What documents will you need, to get UID?&lt;/a&gt; [CitizenMatters.in, May 28, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/mobile-education-villages"&gt;Mobile education comes to villages&lt;/a&gt; [Mail Today, May 27, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/google-stalks-street"&gt;Google now stalks your street&lt;/a&gt; [Hindu, May 27, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/women-love-facebook"&gt;Women in love with Facebook&lt;/a&gt; [Deccan Herald, May 27, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/google-unveils-controversial-street-view"&gt;Google Unveils Controversial Street View Mapping in B’lore&lt;/a&gt; [Economic Times, Mumbai, May 27, 2011]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/e-g-8-report-internet-rights"&gt;NGOs say eG8 report must stress internet rights&lt;/a&gt; [TELECOMPAPER, May 26, 2011]&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Follow us elsewhere&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="http://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Follow CIS on &lt;a href="http://identi.ca/main/remote?nickname=cis"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/group.php?gid=28535315687"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="http://www.cis-india.org/"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/june-2011-bulletin'&gt;https://cis-india.org/about/newsletters/june-2011-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2012-07-30T07:14:57Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/publications-automated/bulletin-june-2011">
    <title>The Centre for Internet and Society - Bulletin - July '11</title>
    <link>https://cis-india.org/publications-automated/bulletin-june-2011</link>
    <description>
        &lt;b&gt;Greetings from the Centre for Internet and Society! In this issue we are pleased to present you the latest updates about our research, upcoming events, and news and media coverage. Subscribe to our newsletter and get monthly updates in your inbox and read it at your convenience. The newsletter issue of June 2011 can be accessed here! Click below to download previous issues.&lt;/b&gt;
        
&lt;h2&gt;*Researchers@Work*&lt;/h2&gt;
&lt;p&gt;RAW is a multidisciplinary research initiative. CIS believes that in order to understand the contemporary concerns in the field of Internet and society, it is necessary to produce local and contextual accounts of the interaction between the Internet and socio-cultural and geo-political structures. To build original research knowledge base, the RAW programme has been collaborating with different organisations and individuals to focus on its three year thematic of Histories of the Internets in India. Six monographs Rewiring Bodies, Archive and Access, Pornography and the Law, The Leap of Rhodes or, How India Dealt with the Last Mile Problem - An Inquiry into Technology and Governance, Transparency and Politics and Internet, Society and Space in Indian Cities are published online and will be launched later this year.&lt;/p&gt;
&lt;p&gt;# New Blog Entry&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../research/cis-raw/histories/Internetcities/cept-centre-for-role-of-internet" class="external-link"&gt;CEPT to Set up Centre to Research Role of Internet in Social Development&lt;/a&gt; [Published in the Indian Express on June 18, 2011]&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;# Upcoming Event in CEPT, Ahmedabad&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../research/conferences/conference-blogs/workshop" class="external-link"&gt;Locating Internets: Histories of the Internet(s) in India — Research Training and Curriculum Workshop: Call for Participation&lt;/a&gt; [Deadline for submission – 15 July 2011; Workshop from 19 to 22 August 2011]&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;* Digital Natives*&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;Digital Natives with a Cause? is a knowledge programme initiated by CIS and Hivos, Netherlands. It is a research inquiry that seeks to look at the changing landscape of social change and political participation and the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who want to critically engage with the dominant discourse on youth, technology and social change, in order to look at the alternative practices and ideas in the Global South. It also aims at building new ecologies that amplify and augment the interventions and actions of the digitally young as they shape our futures.&lt;/p&gt;
&lt;p&gt;# The Digital Natives Newsletter&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../research/dn/digital-dinosaurs/weblogentry_view" class="external-link"&gt;The Digital Dinosaurs&lt;/a&gt; [Volume 5]&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;* Pathways*&lt;/h2&gt;
&lt;p&gt;HE Cell's initiative on social justice, in collaboration with CIS, has initiated the Pathways Project for Learning in Higher Education. It is supported by the Ford Foundation. Under this project, nine under-graduate colleges in different parts of India will be identified to provide special skills in livelihood, knowledge and technology to underprivileged students in those colleges.&lt;/p&gt;
&lt;div&gt;# New Blog Entry&lt;/div&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;&lt;a href="https://cis-india.org/../research/grants/pathways-project/pathways-proposal-info/weblogentry_view" class="external-link"&gt;Pathways for Learning in Higher Education&lt;/a&gt;&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;*Accessibility*&lt;/h2&gt;
&lt;p&gt;Estimates of the percentage of the world's population that is disabled vary considerably. But what is certain is that if we count functional disability, then a large proportion of the world's population is disabled in one way or another. At CIS we work to ensure that the digital technologies, which empower disabled people and provide them with independence, are allowed to do so in practice and by the law. To this end, we support web accessibility guidelines, and change in copyright laws that currently disempower the persons with disabilities.&lt;/p&gt;
&lt;p&gt;# New Blog Entries&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/accessibility/blog/2011/06/21/communications-and-video-accessibility" class="external-link"&gt;Policy Spotlight: 21st Century Communications and Video Accessibility Act&lt;/a&gt; [Written by Deepti Bharthur; contains an e-mail interview with Jenifer Simpson, Senior Director for Government Affairs and head of the Telecommunications &amp;amp; Technology Policy Initiative at the American Association of People with Disabilities ]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/accessibility/blog/2011/06/13/ict-sri-lanka" class="external-link"&gt;ICT Accessibility in Sri Lanka&lt;/a&gt; [Written by Nirmita Narasimhan]&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;h2&gt;*Intellectual Property*&amp;nbsp;&lt;/h2&gt;
&lt;/div&gt;
&lt;p&gt;CIS believes that access to knowledge and culture is essential as it promotes creativity and innovation and bridges the gaps between the developed and developing world positively. Hence, the campaigns for an international treaty on copyright exceptions for print-impaired, advocating against PUPFIP Bill, calls for the WIPO Broadcast Treaty to be restricted to broadcast, questioning the demonization of 'pirates', and supporting endeavours that explore and question the current copyright regime.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;# Statement&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/ipr/blog/sccr-22ndsession-cis-statement" class="external-link"&gt;Statement of CIS, India, on the WIPO Broadcast Treaty at the 22nd SCCR&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;# New Blog Entry&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/ipr/blog/lid-on-royalty-outflows" class="external-link"&gt;Putting a Lid on Royalty Outflows — How the RBI can Help Reduce your IP Costs&lt;/a&gt; [Written by Sanjana Govil]&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;h2&gt;*Openness*&lt;/h2&gt;
&lt;div&gt;
&lt;p&gt;CIS believes that innovation and creativity should be fostered through openness and collaboration and is committed towards promotion of open standards, open access, and free/libre/open source software.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;# Submission&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/openness/blog/2011/06/08/draft-ndsap-comments" class="external-link"&gt;Comments on the draft National Data Sharing and Accessibility Policy&lt;/a&gt; [submitted to the National Spatial Data Infrastructure]&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;# &lt;strong&gt;Comments&lt;/strong&gt;&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;
&lt;a class="external-link" href="http://localhost:8090/website/advocacy/openness/blog/ict-in-school-education"&gt;Comments on Draft National Policy on ICT in School Education&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;*Internet Governance*&lt;/span&gt;&lt;/h2&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;Although there may not be one centralized authority that rules the Internet, the Internet does not just run by its own volition: for it to operate in a stable and reliable manner, there needs to be in place infrastructure, a functional domain name system, ways to curtail cyber crime across borders, etc. The Tunis Agenda of the second World Summit on the Information Society (WSIS), paragraph 34 defined Internet governance as "the development and application by governments, the private sector and civil society, in their respective roles, of shared principles, norms, rules, decision-making procedures, and programmes that shape the evolution and use of the Internet."&lt;/p&gt;
&lt;p&gt;# New Articles&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/igov/blog/the-present-and-future-dangers-of-indias-draconian-new-internet-regulations/weblogentry_view" class="external-link"&gt;The Present — and Future — Dangers of India's Draconian New Internet Regulations&lt;/a&gt; [By Anja Kovacs in the Caravan on June 1, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/igov/blog/big-brother-watching-you/weblogentry_view" class="external-link"&gt;Big Brother is Watching You&lt;/a&gt; [By Sunil Abraham in Deccan Herald on June 1, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/igov/blog/2011/06/08/digital-is-political" class="external-link"&gt;The Digital is Political&lt;/a&gt; [By Nishant Shah in Down to Earth, Issue of June 15, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/igov/blog/want-to-be-watched/weblogentry_view" class="external-link"&gt;Do You Want to be Watched?&lt;/a&gt; [By Sunil Abraham in Pragati on June 8, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/igov/blog/2011/06/09/snooping-to-data-abuse" class="external-link"&gt;Snooping Can Lead to Data Abuse&lt;/a&gt; [By Sunil Abraham in Mail Today on June 9, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/igov/blog/2011/06/22/privacy-and-security" class="external-link"&gt;Privacy and Security Can Co-exist&lt;/a&gt; [By Sunil Abraham in Mail Today on June 21, 2011]&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;&lt;em&gt;Columns in Indian Express&lt;/em&gt;&lt;br /&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Nishant Shah, Director-Research is writing a series of columns on Internet and Society issues:&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/igov/blog/2011/06/08/password-in-hindi" class="external-link"&gt;Say 'Password' in Hindi&lt;/a&gt; [By Nishant Shah in the Indian Express, May 15, 2011]&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;# Upcoming Event&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;&lt;span class="Apple-style-span"&gt;Socio-financial Online Networks: Globalizing Micro-Credit through Micro-transactional Networked Platforms – A &lt;a href="https://cis-india.org/../events/socio-financial-online-networks" class="external-link"&gt;Public Lecture&lt;/a&gt; by Radhika Gajalla [at the Centre for Internet and Society, Bangalore, July 8, 2011]&lt;/span&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;p&gt;CIS is doing a project, ‘Privacy in Asia’. &lt;em&gt;It is funded by Privacy
 International (PI), UK and the International Development Research 
Centre, Canada and is being administered in collaboration with the 
Society and Action Group, Gurgaon&lt;/em&gt;. The two-year project commenced on
 24 March 2010 and will be completed as agreed to by the stakeholders. 
It was set up with the objective of raising awareness, sparking civil 
action and promoting democratic dialogue around challenges and 
violations of privacy in India. In furtherance of these goals it aims to
 draft and promote over-arching privacy legislation in India by drawing 
upon legal and academic resources and consultations with the public.&lt;/p&gt;
&lt;div&gt;# Featured Research&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/igov/privacy-india/2011/06/14/copyright-enforcement" class="external-link"&gt;Copyright Enforcement and Privacy in India&lt;/a&gt; [Written by Prashant Iyengar]&lt;/li&gt;&lt;/ul&gt;
# New Articles&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/igov/privacy-india/2011/06/04/street-view-of-private-and-public" class="external-link"&gt;A Street View of Private and the Public&lt;/a&gt; [By Prashant Iyengar in Tehelka on June 4, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/igov/privacy-india/blind-man-view-of-elephunt%20/?searchterm=The%20new%20Right%20to%20Privacy%20Bill%202011%20%E2%80%94%20A%20Blind%20Man's%20View%20of%20the%20Elephunt" class="external-link"&gt;The new Right to Privacy Bill 2011 — A Blind Man's View of the Elephunt&lt;/a&gt; [By Prashant Iyengar in Privacy India website on June 8, 2011]&lt;/li&gt;&lt;/ul&gt;
# New Blog Entry&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/igov/privacy-india/2011/06/03/bloggers-rights-and-privacy" class="external-link"&gt;Bloggers' Rights Subordinated to Rights of Expression: Cyber Law Expert&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
# Event Organised in Guwahati&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/igov/privacy-guwahati-conference.pdf/view" class="external-link"&gt;Privacy matters&lt;/a&gt; [Donbosco Institute, Kharguli, Guwahati, June 23, 2011]&lt;/li&gt;&lt;li&gt;
&lt;a class="external-link" href="http://localhost:8090/website/events/privacymattershyderabad"&gt;Privacy Matters - A Public Conference in Hyderabad&lt;/a&gt; [The English and Foreign Languages University (TBC), Hyderabad, June 18, 2011]&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;span class="Apple-style-span"&gt;# Upcoming Events&lt;/span&gt;&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../events/internet-surveillance-policy-lecture" class="external-link"&gt;Internet Surveillance Policy: “…the second time as farce?” – A Public Lecture by Caspar Bowden&lt;/a&gt; [TERI, Bangalore, June 27, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../events/privacy-matters-hyderabad" class="external-link"&gt;Privacy Matters - A Public Conference in Hyderabad&lt;/a&gt; [Osmania University Center for International Program, Hyderabad, July 9, 2011]&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;*Telecom*&lt;/h2&gt;
&lt;div&gt;
&lt;p&gt;The growth in telecommunications in India has been impressive. While 
the potential for growth and returns exist, a range of issues need to be
 addressed for this potential to be realized. One aspect is more 
extensive rural coverage and the second aspect is a countrywide access 
to broadband which is low at about eight million subscriptions. Both 
require effective and efficient use of networks and resources, including
 spectrum. It is imperative to resolve these issues in the common 
interest of users and service providers. CIS campaigns to facilitate 
this:&lt;/p&gt;
&lt;p&gt;# Articles by Shyam Ponappa&lt;/p&gt;
&lt;p&gt;Shyam Ponappa is a Distinguished Fellow at CIS. He writes regularly 
on Telecom issues in the Business Standard and these articles are 
mirrored on the CIS website as well.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../advocacy/telecom/blog/2011/06/08/ntp-2011-objective" class="external-link"&gt;NTP 2011 Objective: Broadband&lt;/a&gt; [published in the Business Standard on June 2, 2011]&lt;/li&gt;&lt;/ul&gt;
&lt;h2&gt;* Miscellaneous *&lt;/h2&gt;
&lt;/div&gt;
&lt;p&gt;# &lt;a href="https://cis-india.org/../notices/technology-transparency-accountability" class="external-link"&gt;Technology, Transparency and Accountability: A Bar-Camp in Delhi&lt;/a&gt; [June 5, 2011, Delhi]&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../notices/communication-policy-advocacy-technology-and-online-freedom-of-expression-a-toolkit-for-media-development" class="external-link"&gt;Communication Policy Advocacy, Technology, and Online Freedom of Expression: A Toolkit for Media Development&lt;/a&gt; [June 20 – July 1, 2011, Budapest, Hungary]&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;h2&gt;*News &amp;amp; Media Coverage*&lt;/h2&gt;
&lt;div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../news/cyber-space-hackers-paradise" class="external-link"&gt;Your cyber space is a hackers paradise&lt;/a&gt; [Mail Today, June 6, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../news/centaur-reveals-personal-info" class="external-link"&gt;Centaur website reveals guests' personal info&lt;/a&gt; [Times of India, June 20, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../news/seamier-side-of-texting" class="external-link"&gt;Mumbai Takes Note of Sexting, the Seamier Side of Texting&lt;/a&gt; [Times of India, June 19, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../news/state-just-did-to-you" class="external-link"&gt;Look what the state just did to you&lt;/a&gt; [Mid Day, June 12, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../news/india-e-tolerance" class="external-link"&gt;Tough neighbourhood tests India's e-tolerance&lt;/a&gt; [Times of India, June 12, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../news/looser-web-rules" class="external-link"&gt;India Weighing Looser Web Rules&lt;/a&gt; [Wall Street Journal, May 30, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../news/public-data-on-web" class="external-link"&gt;Public data on the Web leaves much to be desired&lt;/a&gt; [Hindu, May 28, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../news/aadhar-coming-to-bengaluru" class="external-link"&gt;What documents will you need, to get UID?&lt;/a&gt; [CitizenMatters.in, May 28, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../news/mobile-education-villages" class="external-link"&gt;Mobile education comes to villages&lt;/a&gt; [Mail Today, May 27, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../news/google-stalks-street" class="external-link"&gt;Google now stalks your street&lt;/a&gt; [Hindu, May 27, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../news/women-love-facebook" class="external-link"&gt;Women in love with Facebook&lt;/a&gt; [Deccan Herald, May 27, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../news/google-unveils-controversial-street-view" class="external-link"&gt;Google Unveils Controversial Street View Mapping in B’lore&lt;/a&gt; [Economic Times, Mumbai, May 27, 2011]&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/../news/e-g-8-report-internet-rights" class="external-link"&gt;NGOs say eG8 report must stress internet rights&lt;/a&gt; [TELECOMPAPER, May 26, 2011]&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;h2&gt;* Follow us Elsewhere*&lt;/h2&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Get short, timely messages from us on &lt;a class="external-link" href="http://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Follow CIS on &lt;a class="external-link" href="http://identi.ca/main/remote?nickname=cis"&gt;identi.ca&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Join the CIS group on &lt;a class="external-link" href="http://www.facebook.com/group.php?gid=28535315687"&gt;Facebook&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/../" class="external-link"&gt;www.cis-india.org&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;em&gt;CIS is grateful to Kusuma Trust which was founded by Anurag 
Dikshit and Soma Pujari, philanthropists of Indian origin, for its core 
funding and support for most of its projects.&lt;/em&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;h2&gt;*Archives*&lt;/h2&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/april-2011.pdf" class="internal-link" title="April 2011 Newsletter"&gt;April 2011&lt;/a&gt; [PDF, 112 KB]&lt;/li&gt;&lt;li&gt;&lt;a title="March 2011 Bulletin" class="internal-link" href="http://localhost:8090/website/publications/bulletin-march11"&gt;March 2011&lt;/a&gt; [PDF, 115 KB]&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="Newsbulletin - February - 2011" class="internal-link" href="http://localhost:8090/website/advocacy/accessibility/newsletter-march-11"&gt;February 2011&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="The Centre for Internet and Society - Bulletin - January 2011" class="internal-link" href="http://localhost:8090/website/publications/news-bulletin-january"&gt;January 2011&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="December 2010" class="internal-link" href="http://localhost:8090/website/publications/december-2010-bulletin"&gt;December &amp;nbsp;2010&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="November 10 Bulletin" class="internal-link" href="http://localhost:8090/website/publications/november-10-bulletin"&gt;November 2010&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="October 2010 Bulletin" class="internal-link" href="http://localhost:8090/website/publications/october-2010"&gt;October 2010&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="September 2010 Bulletin" class="internal-link" href="http://localhost:8090/website/publications/september-2010"&gt;September 2010&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;a title="August 2010 Bulletin" class="internal-link" href="http://localhost:8090/website/publications/august-bulletin-2010"&gt;August 2010&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
Looking forward to hearing from you. Please feel free to write to us for any queries or details required.&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/publications-automated/bulletin-june-2011'&gt;https://cis-india.org/publications-automated/bulletin-june-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-19T06:43:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement">
    <title>Copyright Enforcement and Privacy in India</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement</link>
    <description>
        &lt;b&gt;Copyright can function contradictorily, as both the vehicle for the preservation of privacy as well as its abuse, writes Prashant Iyengar. The research examines the various ways in which privacy has been implicated in the shifting terrain of copyright enforcement in India and concludes by examining the notion of the private that emerges from a tapestry view of the relevant sections of Copyright Act.&lt;/b&gt;
        &lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;Copyright can function contradictorily, as both the vehicle for the  preservation of privacy as well as its abuse. This paper examines the  various ways in which privacy has been implicated in the shifting  terrain of copyright enforcement in India. Chiefly, there are three  kinds of situations that we will be discussing here: The first is  straightforward and deals with the physical privacy intrusion caused by  the execution of search and seizure orders during the investigation of  infringement. The second situation involves the violation of privacy  through the misappropriation of confidential information. The last  situation involves the wrongful appropriation of a person’s persona or  their ‘publicity’ – the photographs of celebrities, for instance – for  private gain. Instances of each of these situations, and the manner in  which the courts have negotiated the privacy claims that have arisen are  described in the sections that follow. In addition, Copyright law,  dealing as it does mainly with offences of the nature of unauthorised  publicity/publication putatively inscribes certain spaces and activities  as either public or private. The concluding section of this paper  examines the notion of the private that emerges from a tapestry view of  various sections of the Copyright Act.&lt;/p&gt;
&lt;h2&gt;Copyright Enforcement&lt;/h2&gt;
&lt;h3&gt;Context setting&lt;/h3&gt;
&lt;p&gt;Over the past several decades there has been an increasing awareness  globally – and within India – of the importance of 'knowledge societies'  which, in contrast to earlier industrial or agrarian societies,  leverage 'information' as the key raw material and output of  a range of  productive activity. As one UNESCO Report puts it "Knowledge is today  recognized as the object of huge economic, political and cultural  stakes"[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#1"&gt;1&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;In this new paradigm, investment in Information and Communications  Technology (ICT), the enactment of strong Intellectual Property laws,  and their strict enforcement are prescribed as imperative in  facilitating the transition away from the older economic modes. The  promise of the knowledge society is particularly alluring for developing  countries, like India, where it is viewed as a vehicle for achieving  what Ravi Sundaram has termed 'temporally-accelerative' development[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#2"&gt;2&lt;/a&gt;],  through which we would be able to transcend our "historical  disabilities", and achieve parity with the incumbent masters of the  world. &lt;span class="Apple-style-span"&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#3"&gt;3&lt;/a&gt;]&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In their eagerness to provide the best  supportive conditions to usher in this coveted knowledge society,  nations have been tightening their Intellectual Property regimes  – including copyright law. This has entailed a two fold expansion,  firstly, in the scope of copyright to include, for instance,  ‘technological protection measures’ within their ambit and secondly, in  the powers of investigation, search and seizure put at the disposal  enforcement agencies. In addition, as we shall see, courts in India have  enthusiastically bought into this vision of a knowledge economy, and  this has fuelled their eagerness to craft innovative – if legally  unsound – orders which put tremendously intrusive powers in the hands of  copyright owners. Taken together, these developments have taken their  toll on the privacy of individuals which this section will explore in  further detail. We begin with a brief description of the statutory  mechanism for copyright enforcement – both civil and criminal - under  the Copyright Act. We then move on to the way courts have crafted new  orders that magnify the powers of copyright owners to the detriment of  the privacy of individuals. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Civil and Criminal Enforcement under the Copyright Act&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;The Copyright Act provides for both civil and criminal remedies for  infringement. Section 55 provides for civil remedies and declares that,  upon infringement, "the owner of the copyright shall be entitled to all  such remedies by way of injunction, damages, accounts and otherwise as  are or may be conferred by law for the infringement of a right." Civil  suits are instituted at the appropriate district court having  jurisdiction – including where the plaintiff resides.&lt;/p&gt;
&lt;p&gt;Similarly, Chapter XIII (Sections 63-70) provides a range of criminal  penalties for infringing copyrights which are typically punishable with  terms of imprisonment that “may extend up to three years” along with a  fine. These offences would be taken cognizance of and tried at the court  of the Metropolitan Magistrate or Judicial Magistrate of the First  class [Sec 70], in the same manner as all cognizable offences[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#4"&gt;4&lt;/a&gt;] in  India i.e., by following the procedures under the Code of Criminal  Procedure, 1973. Section 64 of the Copyright Act dealing with police  powers was amended in 1984 to give plenary powers to police officers, of  the rank of a sub-inspector and above, to seize without warrant all  infringing copies of works “if he is satisfied” that an offence of  infringement under section 63, “has been, is being, or is likely to be,  committed”. Prior to amendment, this power could only be exercised by a  police officer when the matter had already been taken cognizance of by a  Magistrate.  Prima facie, this is a very sweeping power since its  exercise is unsupervised by the judiciary and only depends on the  “satisfaction” of a police officer. To put matters in perspective, under  the Income Tax Act, dealing with the far more sensitive issue of tax  evasion, a search and seizure can only be conducted based on information  already in the possession of the investigating authority.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#5"&gt;5&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;In &lt;i&gt;Girish Gandhi &amp;amp; Ors. v Union of India&lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#6"&gt;6&lt;/a&gt;],  a case before the Rajasthan High Court, the petitioner, who ran a video  cassette rental business, challenged the constitutional validity of the  wide powers granted to police officers under this section. Citing  various instances of violations of privacy that the abuse of the section  could occasion, the petitioner contended:&lt;/p&gt;
&lt;p&gt;"The provisions of section 64 itself gives arbitrary and naked powers  without any guidelines to the police officer to seize any material from  the shop and thus, drag the video owners to the litigation. He has  given instances in the petition that &lt;i&gt;police officer usually demands for video cassettes to be given to them free of charge for viewing it at their homes&lt;/i&gt; and in case, on any reason either the video cassette is not available  or it is not given free of charge, there is likelihood that police  officer shall misuse his powers and try to seize the material for  prosecution under the various provisions of the Act."&lt;/p&gt;
&lt;p&gt;Although the High Court dismissed the petition on the grounds that it  did not disclose any actual injury to the petitioner, it upheld the  constitutionality of the section by reading the word "satisfaction" to  mean that the "police officer will not act until and unless he has got  some type of information on which information he is satisfied and his  satisfaction shall be objective."&lt;/p&gt;
&lt;p&gt;[Section 64] is also not arbitrary for the reason that guidelines and  safeguards are provided under Sections 51, 52 and 52A and Section 64(2)  of the Copyright Act, coupled with the fact that &lt;i&gt;it is expected of  the police officer that he would not act arbitrarily and his  satisfaction shall always based on some material or knowledge and he  shall only proceed for action under Section 64 in a bona fide manner and  not for making a roving inquiry&lt;/i&gt;. (emphasis added)&lt;/p&gt;
&lt;p&gt;Despite the pious hopes expressed in this decision, they do not  appear to have influenced the actual behaviour of police officers. In  May 2011, the Delhi High Court struck down a notification issued by the  Commissioner of Police which had instructed all subordinate  functionaries of the police to "attend to and provide assistance"  whenever any complaint "in respect of violation of the provisions of  Copyright Act, 1957" was received from three companies: Super Cassettes  Industries Limited, Phonographic Performance Ltd and Indian Performance  Right Society Ltd.  This virtually amounted to the commandeering of the  criminal enforcement system by a few private owners for their own  private interests. In their suit, the petitioner — Event and  Entertainment Management Association — had contended that the police  machinery "cannot be made to act at the behest of certain privileged  copyright owners". Striking the notification down, as unconstitutional,  Justice Muralidhar of the Delhi High Court held:&lt;/p&gt;
&lt;p&gt;"To the extent the impugned circular privileges the complaints from  SCIL over other complaints from owners of copyright it is unsustainable  in law for the simple reason that there has to be equal protection of  the law in terms of Article 14 of the Constitution. The police are not  expected to act differently depending on who the complainant is. All  complaints under the Act require the same seriousness of response and  the promptitude with which the police will take action, &lt;i&gt;Likewise, the  caution that the Police is required to exercise by making a preliminary  inquiry and satisfying itself that prima facie there is an infringement  of copyright will be no different as regards the complaints or  information received under the Act&lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#7"&gt;7&lt;/a&gt;]."&lt;/p&gt;
&lt;p&gt;The Judge also issued some welcome remarks on the manner in which complaints under Section 64 were to be handled:&lt;/p&gt;
&lt;p&gt;In order that the power to seize in terms of Section 64 of the Act is  not exercised in an arbitrary and whimsical manner, it has to be hedged  in with certain implied safeguards that constitute a check on such  power. Consequently, prior to exercising the power of seizure under  Section 64(1) of the Act the Police officer concerned has to necessarily  be prima facie satisfied that there is an infringement of copyright in  the manner complained of. In other words, merely on the receipt of the  information or a complaint from the owner of a copyright about the  infringement of the copyrighted work, the Police is not expected to  straightway effect seizure. Section 52 of the Act enables the person  against whom such complaint is made to show that one or more of the  circumstances outlined in that provision exists and that therefore there  is no infringement. During the preliminary inquiry by the Police, if  such a defence is taken by the person against whom the complaint is made  it will be incumbent on the Police to prima facie be satisfied that  such defence is untenable before proceeding further with the  seizure.(emphasis added)[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#8"&gt;8&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;This decision significantly tempers the severity of possible searches  and seizures conducted by the police under Copyright Law. It advances  the cause of privacy by reining in the power of the state to arbitrarily  intrude on citizens.&lt;/p&gt;
&lt;p&gt;Parallel to the attempt at ‘hedging in’ of police powers in criminal  enforcement by this High court, there has been a move to expand powers  of investigative bodies in civil suits. The next sub-section looks at  two innovations by courts – Anton Piller Orders and John Doe orders –  which are mechanisms unwarranted by civil procedural law, but crafted by  high courts specifically to deal with copyright investigation.&lt;/p&gt;
&lt;h3&gt;'Anton Piller' orders and 'John Doe' Orders&lt;/h3&gt;
&lt;p&gt;In addition to the extensive police powers under the Copyright Act  mentioned above, plaintiffs have other, equally intrusive powers at  their disposal. In the past decade it has become common for copyright  owners and owners-associations to employ civil procedure to emulate the  same kind of invasiveness. This is done via the mechanism of so-called  ‘Anton Piller’ orders  - orders obtained unilaterally ‘ex-parte’ (in the  absence of the defendant) from civil courts which permit  court-appointed officers, accompanied by representatives of the  plaintiffs themselves, to search premises and seize evidence without  prior warning to the defendant. Frequently, courts have also issued  ‘John Doe’ orders[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#9"&gt;9&lt;/a&gt;] –orders  to search and seize against unnamed/unknown defendants - which  virtually translates into untrammelled powers in the hands of the  plaintiffs, aided by court-appointed local commissioners, to raid any  premises they set their eyes on.&lt;/p&gt;
&lt;p&gt;Although the authority of the courts under Indian law to grant these orders is suspect[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#10"&gt;10&lt;/a&gt;],  they have virtually been regularized in practice over the past decade  through routine issual by the High Courts, especially the Delhi High  Court. This has led to a widespread phenomenon of powerful copyright  owning groups such as the Business Software Alliance and the Indian  Performing Right Society Limited managing to successfully assume for  themselves almost plenary powers of search and seizure as they go about  knocking on the doors of small businesses and demanding to be allowed to  audit their software. An anonymous post on the popular Indian  Intellectual Property Weblog ‘Spicy IP’ graphically conveys the  invasiveness inherent in the execution of these orders:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Ghost Post on IP (Software) Raids: Court Sponsored Extortion?&lt;/b&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#11"&gt;11&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Picture this:&lt;/i&gt;&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;You are working in your office one day, when all of a sudden, a group  of people arrive unannounced brandishing a court order. The order  allows them to walk into your office and conduct an audit of all your  office computers to collect evidence of the use of unlicensed software  in your office.&lt;/p&gt;
&lt;p&gt;This group consists of a court-appointed commissioner, lawyers  representing the plaintiff, and technical persons who will carry out the  actual software audit.&lt;/p&gt;
&lt;p&gt;Knowing that to disobey the order will amount to a contempt of court, you allow the group to carry out the audit.&lt;/p&gt;
&lt;p&gt;The audit lasts several hours and continues well into the night.  Needless to say, it is physically and emotionally draining on you as  your work has come to a stand-still. Everyone around you knows there is  some court proceeding going on. You have already lost face with your  employees, and possibly even clients who have visited your office during  the audit.&lt;/p&gt;
&lt;p&gt;As you have several dozen computers purchased over a period of time,  and the audit is conducted unannounced, you may not have the time to  gather documentation and invoices demonstrating the purchase of licensed  software.&lt;/p&gt;
&lt;p&gt;While the court order allows you to back up your valuable client and  business data, the plaintiff’s lawyers don’t allow you to do so, stating  that documents/ data found on machines that contain any unlicensed  software may not be backed up.&lt;/p&gt;
&lt;p&gt;All computers found with copies of what the plaintiff’s lawyers are  calling unlicensed software are seized and sealed. You do not have the  time, presence of mind or legal representation to argue that such copies  may be backup copies allowed under the law, or that therefore several,  or all of the seized machines are not liable to be seized, or that such  copies are actually allowed under the software license.&lt;/p&gt;
&lt;p&gt;Even more importantly, your licensed servers are seized because they  are found to contain back-up copies of software, allowed under the law,  but deemed infringing by the plaintiff’s lawyers.&lt;/p&gt;
&lt;p&gt;At the end of the audit, you are informed that your computers contain  copies of unlicensed software to varying degrees. You are made to sign a  report prepared by the commissioner, along with sheets that represent  the software audit of each computer in your office.&lt;/p&gt;
&lt;p&gt;Most of your computers and servers are seized and sealed. You are  told that you cannot touch them till the court allows you to. You are  not even allowed to separate the hard drives of those machines that  contain the alleged unlicensed software, for the purpose of seizure, so  as to enable you to continue using the rest of the machine, even though  the court order clearly states that only storage media containing the  unlicensed software is to be seized.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;In a 2008 case, Autodesk Inc vs. AVT Shankardass[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#12"&gt;12&lt;/a&gt;], the Delhi High Court – which happens to be the most enthusiastic issuer of Anton Piller orders[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#13"&gt;13&lt;/a&gt;] –issued  guidelines on the considerations which judges should weigh before  granting such orders in software piracy cases. Worryingly, the  guidelines stipulate that "The test of reasonable and credible  information regarding the existence of pirated software or incriminating  evidence should not be subjected to strict proof". Instead the court  prescribes that "It has to be tested on the touchstone of pragmatism and  the natural and normal course of conduct and practice in trade."&lt;/p&gt;
&lt;p&gt;The Court also included a few guidelines meant to safeguard the  defendant. These include the possibility of requiring the plaintiff to  deposit costs in the court "so that in case pirated software or  incriminating evidence is not found then the defendant can be suitably  compensated for the obtrusion in his work or privacy." Although on the  face of it, these guidelines threatened to open up the floodgates for  the granting of Anton Pillar orders, in fact, these fears seem not to  have been realized. The privacy-invasive ambitions of IP owners have  been subverted by a combination of the security requirements stipulated  in the Autodesk guidelines above, the judiciary’s own  inefficiency/inconsistency and a greater assertiveness and defiance on  the part of defendants. The following passage from the 2011 Special 301  India Country Report on Copyright Protection and Enforcement[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#14"&gt;14&lt;/a&gt;], prepared  by the IIPA, records the industry’s frustrations in obtaining Anton  Pillar orders from the courts over the past year:&lt;/p&gt;
&lt;p&gt;Unfortunately, in 2010, such enforcement efforts have become much  less effective due to judges imposing conditions on such orders.&lt;/p&gt;
&lt;p&gt;With periodic changes to the roster of judges on the Original Side  Jurisdiction of the Delhi High Court (which is done as a matter of  routine and procedure where the roster changes every 6 months), BSA  reports: 1) the imposition of security costs on Plaintiffs; 2) the grant  of local commission orders without orders to seize and seal computer  systems containing pirated/unlicensed software; 3) granting the right to  Defendants to obtain back up copies of their proprietary data while at  the same time ensuring that the evidence of infringement is preserved in  electronic form; 4) assigning a low number of technical experts for  large inspections, making carrying out orders more time-consuming and  raising court commissioners’ fees; and 5) ineffective implementation and  lack of deterrence from contempt proceedings against defendants who  disrupt or defy Anton Pillar orders.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#15"&gt;15&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;Notwithstanding this temporary setback, Anton Piller orders and John  Doe orders remain powerful weapons in the arsenal of large copyright  owners who continue to use it in ways that are extremely intrusive.  These orders exemplify an instance of how courts rarely reflect on the  privacy implications of the orders that they themselves issue –similar  action undertaken by the executive would have most likely invited the  court’s consideration on whether they violate privacy.&lt;/p&gt;
&lt;p&gt;In the next section we move on to private ‘technological’ measures of  enforcing copyright which are likely to receive statutory sanction.&lt;/p&gt;
&lt;h3&gt;Technological Measures&lt;/h3&gt;
&lt;p&gt;In the light of the industry’s perception of a weakening of its  enforcement options due to the judiciary’s waning enthusiasm, it remains  to be seen what new manoeuvres they would make to strengthen  enforcement.  One foreseeable arena of conflict would be the new  measures proposed to be included in the Copyright Act that criminalise  the circumvention of ‘technological protection measures’ (TPMs) built  into software by manufacturers. The proposed new Section 65A  criminalises the circumvention of “an effective technological measure  applied for the purpose of protecting any of the rights conferred by  this Act," "with the intention of infringing such rights”. This is  punishable with imprisonment up to two years and a fine. However the  section also creates a vast list of exceptions including research,  testing, national security etc which make it a comparatively soft tool  in the hands of prosecutors. Among the list of exceptions is a clause  that enables the circumvention of TPMs in order to facilitate purposes  that are 'not expressly prohibited' – including, conceivably, to  exercise fair dealing rights under Section 52. Although this is a  welcome provision, it requires, as a condition of its exercise, that the  person ‘facilitating the circumvention’ maintain a record of the  persons for whose benefit this has been done. This has led to  apprehensions of violations of privacy especially from disability rights  groups, who would potentially be the biggest users of this section as  it would enable them to make electronic content more widely accessible.  However, the lawful exercise of this right would mean that each instance  of use of electronic content – say an e-book – by a disabled person  would be recorded, which could deter them from accessing content. It  would also clearly amount to a violation of their privacy compared to  other analog users who are not required to similarly maintain logs each  time they share books, for instance.&lt;/p&gt;
&lt;p&gt;On the whole, despite the effect these measures have of diminishing  absolute control over our electronic resources, the fact that the IIPA -  which has been one the most rapid ‘defenders’ of IP - has consistently  complained about their inadequacy in its Special 301 Reports[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#16"&gt;16&lt;/a&gt;] gives us some cause for optimism that the privacy invasions it could occasion would not be too severe.&lt;/p&gt;
&lt;p&gt;Meanwhile, in a first of its kind, in 2005 the High Court of Andhra  Pradesh permitted the prosecution, under the Copyright Act, of persons  accused of having circumvented technological protection measures in  mobile devices.&lt;/p&gt;
&lt;p&gt;In Syed Asifuddin and Ors. v The State of Andhra Pradesh [&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#17"&gt;17&lt;/a&gt;] the  accused had altered the software on the mobile handsets provided by one  service provider (Reliance), so that the same handset could be used to  access the network of a rival provider (Tata Indicom). The Court  observed that "if a person alters computer programme of another person  or another computer company, the same would be infringement of the  copyright."  The matter was then relegated to the trial court to receive  evidence on whether in fact such alteration had occurred.&lt;/p&gt;
&lt;p&gt;This ruling, if correct, effectively negates the need for any  amendment to the law since circumvention of technological measures  typically involves an unauthorized alteration of copyrighted code. Of  course it would always be open to the defendant to assert his fair  dealing rights in defence, but that issue was not deliberated upon by  the High Court in this instance.&lt;/p&gt;
&lt;h3&gt;Portents&lt;/h3&gt;
&lt;p&gt;With the terrain of copyright infringement increasingly shifting from  ‘street piracy’ to online piracy, it remains to be seen how innovations  in copyright enforcement impact privacy. Three events are particularly  interesting in this context.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;In August 2007, a techie from Bangalore was arrested on charges  of having posted incendiary images of a popular folk hero on a website.  He had been traced based on the IP Address details provided by a leading  ISP. It later turned out that the IP address information was incorrect.  By the time the error was noticed, he had already been held in jail  illegally for a period of 50 days.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#19"&gt;19&lt;/a&gt;] Shocking  as this incident is, it offers a portent of the gravity of the possible  privacy abuses that we are likely to witness in the years to come as  copyright owners begin to hunt down infringers on the Internet.&lt;/li&gt;
&lt;li&gt;In  2006, the Delhi High Court the pioneer among the Indian Judiciary in  issuing John Doe orders added another feather to its cap by permitting  the filing of a suit against an IP address. In a case of defamation by  email from an unknown sender, a company was able to successfully file a  suit against the IP address and obtain an order against the ISP to track  down the user who was later impleaded as a party to the suit. This case  and the growing number of John Doe orders issued, indicates that the  judiciary in India has been quite willing to partner with litigants in  their fishing expeditions. While it cannot be gainsaid that this has  aided the legitimate interests of litigants, this has come at the price  of a callous disregard for the interests of consumer privacy in India,  which, as the incident described above highlights, could easily descend  into a full blown human rights violation. &lt;/li&gt;
&lt;li&gt;With the arrest in  November 2010 of a four-member gang from Hyderabad for uploading media  content – including popular film titles - on Bittorrent, the popular  online file sharing tool, the industry has signalled its capacity and  willingness to take the battle over copyright to the Internet.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#20"&gt;20&lt;/a&gt;] New  rules notified under the Information Technology Act make it mandatory  for 'intermediaries' (ISPs) to co-operate in locating and removing  ‘infringing content’ that is stored or transmitted by them.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#21"&gt;21&lt;/a&gt;]  This will facilitate untrammelled access to users by copyright industries. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Although it is too early to predict the future for the Internet that  these developments will result in, they are definitely a source of  apprehension from the perspective of privacy.&lt;/p&gt;
&lt;h2&gt;Copyright and Confidential Information&lt;/h2&gt;
&lt;p&gt;Although the protection of 'confidential information' and 'copyright' occupy distinct realms in the law[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#22"&gt;22&lt;/a&gt;],  they converge occasionally, and copyright has been used as an  instrument by people and organisations to protect their confidential  information. In fact it has become quite routine for written pleadings  by plaintiffs in cases to assert the omnibus infringement of their  ‘copyrights, confidential information, trade secrets, trademarks designs  etc’ without specifying which of the claims is urged. For instance  in Mr. M. Sivasamy v M/S. Vestergaard Frandsen[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#23"&gt;23&lt;/a&gt;] a  case before the Delhi High Court, the plaintiffs claimed  that. "Defendants are violating the trade secrets, confidential  information and copyrights of the plaintiffs.”; Similarly in Dietrich  Engineering Consultant v Schist India &amp;amp; Ors , before the Bombay High  Court, the plaintiffs contended"..the suit is filed to prevent   unauthorized and illegal use of the plaintiffs  confidential  information and infringement of the 1st  plaintiffs Copyright".[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#24"&gt;24&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;In one of the earliest cases of this kind, Zee Telefilms Ltd. v  Sundial Communications Pvt. Ltd, the Bombay High Court delivered a  ruling in favour of the plaintiffs on both grounds of copyright  infringement and confidential information. Here the employees of the  plaintiffs – a company engaged in the business of producing television  serials - had developed the concept for a program which they had  registered with the Film Writers Association. Subsequently, they made a  confidential pitch of the concept to the representatives of the  defendants, a well known TV channel. Although initially the defendants  appeared reluctant to take the concept forward, they proceeded later on,  without the authorization of the plaintiffs, to produce a TV serial  that closely mirrored the ideas contained in the show conceived by the  plaintiff. In an action seeking to restrain the defendants from  proceeding with their production, the High Court agreed with  the plaintiff’s claims both on the count of copyright infringement and  confidentiality. Curiously, the determination of both issues turned on  the similarities between the plaintiff’s and defendant’s concepts –  which is traditionally a determination relevant only to copyright cases.  On the issue of confidentiality, the court held "Keeping in view  numerous striking similarities in two works and in the light of the  material produced on record, it is impossible to accept that the  similarities in two works were mere coincidence...the plaintiffs'  business prospect and their goodwill would seriously suffer if the  confidential information of this kind was allowed to be used against  them in competition with them by the defendants."&lt;/p&gt;
&lt;p&gt;Although a clear line is demarcated between the claims of  confidentiality and copyright in this case, this distinction is less  sharp in other cases of the same nature.&lt;/p&gt;
&lt;p&gt;In a more recent case &lt;i&gt;Diljeet Titus, Advocate v Mr. Alfred A. Adebare &amp;amp; Ors&lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#25"&gt;25&lt;/a&gt;] four  associates of the plaintiff’s law firm quit together to start their own  practice. While leaving they took documents they had drafted including  agreements, due diligence reports and a list of clients along with them.  The plaintiff filed a suit for injunction, asserting both that this  material was confidential and that he owned the copyrights over them.  The Delhi High Court agreed and issued an injunction restraining the  defendants from “utilizing the material of the plaintiff forming subject  matter of the suit and from disseminating or otherwise exploiting the  same including the data for their own benefit.” What is interesting in  this case is the conflation of confidentiality and copyright – both in  the allegations of the plaintiff and the rebuttals of the defendant who  sought to resist claims of confidentialty on grounds that they had  themselves authored the papers in question.&lt;/p&gt;
&lt;p&gt;Curiously, where copyright and confidentiality claims coincide, it  would appear that the parameters of determining copyright infringement  end up determining the issue of confidentiality as well.&lt;/p&gt;
&lt;p&gt;In the next section we move on to the last copyright/privacy issue  that we had flagged in the introduction – the invocation of copyright in  aid of the ‘right to publicity’ of individuals which can be read as a  kind of privacy claim.&lt;/p&gt;
&lt;h2&gt;Copyright and Publicity&lt;/h2&gt;
&lt;p&gt;Do we have a copyright over our identities – our names, our  appearances, our life histories, our reputation and our bodies - so that  we have an actionable interest in preventing their deployment in public  without our express authorization?&lt;/p&gt;
&lt;p&gt;This question has arisen in a limited set of cases in India that  raise interesting questions. As with the confidentiality cases discussed  above, the lines separating ‘defamation’ actions from ‘copyright’  claims is not brightly drawn in these cases.  Neither is the line  linking copyright to the protection of privacy clearly evident. All one  can say with confidence is that copyright and privacy are two words  tossed into the plaints by the plaintiffs while asserting their claims.&lt;/p&gt;
&lt;p&gt;In one of the most high-profile cases of its kind, Phoolan Devi v Shekhar Kapoor[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#26"&gt;26&lt;/a&gt;] the  Delhi High Court was faced with the question of whether ‘public  figures’ are entitled to any degree of control over the representation  of their lives. Here the petitioner, Phoolan Devi, a reformed bandit,  had 'licensed'[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#27"&gt;27&lt;/a&gt;] the  production of a biopic on her life to the defendant, a film director of  note, who was to consult the plaintiff’s own writings and those of her  authorised biographer in making the film. However, the defendant – the  director of the biopic – had exceeded this mandate and also depicted  incidents that emerged from various newspaper accounts – including a  graphic gang rape scene where the plaintiff was the victim, and a  massacre which she had allegedly orchestrated. Although generally  well-known, neither of these incidents were either admitted to by the  plaintiff herself or mentioned in the plaintiff’s own writings and those  of her biographer. Even worse, the film had not been shown to her even  several months after it had been released to national and international  audiences.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#28"&gt;28&lt;/a&gt;] In  Arundhati Roy’s moving words the producers of the film “[R]e-invent her  life. Her loves. Her rapes. They implicate her in the murder of  twenty-two men that she denies having committed. Then they try to  slither out of showing her the film!”[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#29"&gt;29&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;One of the contentions that the petitioner’s advocate had advanced  was that the defendant had no right “to mutilate or distort the facts as  based upon prison diaries” and that any such distortion would fall  afoul of her right under Sec 57 of the Indian Copyright Act. This  section confers certain ‘special rights’ on the author including the  right to claim authorship and to restrain any distortion/mutilation or  modification of the work that would be prejudicial to his/her honour or  reputation.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#30"&gt;30&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;These rights survive any assignment of the copyright made by the  author i.e. they can e asserted by the author above any contract entered  into by her with third parties such as the producer in this case. The  Court framed the question it was faced with in these terms:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;[T]he question before me is whether such person like the plaintiff  has no right to defend when someone enlarges the terrible facts, enters  the realm of her private life, depicts in graphic details rape, sexual  intercourse, exhibits nudity, portrays the living person which brings  shame, humiliation and memories of events which haunts and will go on  haunting the plaintiff, more so the person is still living. Whether the  plaintiff has no right and her life can become an excuse for film makers  and audience to participate in an exercise of legitimate violence with  putting all inhibitions aside.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;Ultimately, the High Court sided with the petitioner and issued an  injunction restraining the defendant from exhibiting his film.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#31"&gt;31&lt;/a&gt;] This  decision was based more on a consideration of constitutional right to  privacy principles than an evaluation of the plaintiff’s case under  Copyright law. However, it does provide an interesting factual matrix  for the exploration of the way in which protection of copyright and  privacy might overlap.&lt;/p&gt;
&lt;p&gt;In a contrasting case before the Bombay High Court, &lt;i&gt;Manisha Koirala v Shashilal Nair &amp;amp; Ors &lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#32"&gt;32&lt;/a&gt;] an  injunction was sought against the release of a film in which the  petitioner, a noted actress, was depicted in the nude through the device  of a ‘body double’. Here the plot was entirely fictional and the  plaintiff, a noted actress, had agreed to perform in the film with  ‘substituted shots’ during the scenes in the story that involved nudity.  Subsequently, she appears to have reconsidered this decision and  objected to the very inclusion of these scenes in its final version. In  her petition before the court, she alleged defamation and malicious  injurious falsehood, arguing that the exhibition of the film would  result in a violation her right to privacy "as the objectionable shots,  attempt to expose the body of a female which is suggested to be that of  the plaintiff". She contended that “the right to portray her on screen  can only be exercised in a manner, which is subject to the fundamental  principle that such portrayal can only be with her unconditional  consent." "The present rendition" of her part in the film, she alleged  was “an invasion of privacy as it is embarrassing and will cause  irreparable damage to her reputation which remains untarnished thereby  causing irreparable loss and injury”. Although Copyright is not invoked  in this case by the petitioner, there is an audible echo of some of the  reputational anxieties that had animated Phoolan Devi’s case mentioned  above. The difference, however, is that in this case the petitioner’s  claim was not grounded in a quest for control over her biography, but  over the image of her body. Unlike the previous case, here the Court was  unsympathetic to the petitioner’s claims. The court treated her  previous ‘consents’ as determinative of all issues and dismissed her  case holding:&lt;/p&gt;
&lt;blockquote class="webkit-indent-blockquote"&gt;
&lt;p&gt;"The Court ...cannot be a moral guardian in this context. ..It is..  clear to my mind that once having agreed to act in the film it will be  too late for the plaintiff .. to hold that a case of defamation has been  made out.. To maintain a case of malicious falsehood it must be held  out that the statement was false. In the instant case what is sought to  be contended is that the scenes involving the film artist would result  in an action of malicious injurious falsehood or malicious falsehood by  associating the plaintiff's with the scenes which she had not enacted..  The plaintiff was prima facie aware as earlier held and that the scenes  formed part of the story board have been enacted by a double and  consequently it cannot be said that in the present case the plaintiff  has been able to establish a case of malicious falsehood."[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#33"&gt;33&lt;/a&gt;]&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p&gt;One of the facts that was relevant in the court’s decision was that  the defendant, as the ‘holder of the copyright in the film’, had  incurred vast expenditure in publicising its release. Here, in a  reversal of the Phoolan Devi case, copyright is held up as a shield  against a competing privacy claim. The issue of the extent of overlap  between copyright and privacy however remains unsettled in law. In April  2007, the Madras High Court granted a temporary injunction against the  publishers of an unauthorised biography of former Tamil Nadu Chief  Minister Jayalalitha. In her petition she alleged that the biography  “had been written without any verification of facts. Such a publication  would spoil her image and damage her status in politics and public  life.” Her petition contended that “No one has a right to publish  anything concerning personal private matters without consent, whether  truthful or otherwise, whether laudatory or critical.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#34"&gt;34&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;Although it does not reference Copyright law, this case is another  illustration of the enduring relevance of the question of whether we are  entitled to the exclusive authorship of our private life-stories.&lt;/p&gt;
&lt;h2&gt;The Private under the Copyright Act&lt;/h2&gt;
&lt;p&gt;In its various sections, the Copyright Act inscribes certain spaces  and actions as either public or private. Specified activities are  labelled public even though they are conducted within the domestic  confines of one’s home. Similarly, activities that infringe copyright  are nevertheless immunised from prosecution due to the fact that they  are conducted for a ‘private’ purpose. In this concluding section of  this paper, we try to piece together a narrative of privacy and the  private domain that emerges from a combined reading of various sections  and decisions under the Copyright Act.&lt;/p&gt;
&lt;p&gt;We begin, here, by collating the Copyright Act’s various  articulations of the ‘public’ and ‘private’. By treating them as  intertwining, &lt;i&gt;mutually constitutive&lt;/i&gt; terms, we proceed to analyse  these various articulations in the Copyright Act with a view to seeing  what account of the private realm may emerge.&lt;/p&gt;
&lt;h3&gt;Public/Publish&lt;/h3&gt;
&lt;p&gt;One of the key rights that most owners of copyrights enjoy is the  exclusive right to "publish" or "communicate their work to the public".&lt;/p&gt;
&lt;p&gt;The Act defines "publication" to mean “making a work available to the  public by issue of copies or by communicating the work to the public”.  Significantly, in case of dispute, if the issue of copies or  communication to the public is “of an insignificant nature” it is deemed  not to constitute a publication [Section 6]. This signals that the  notions of publicity and publication under the Copyright Act are in some  senses moored to the magnitude of the receiving public. The ‘private’  then is constituted, reciprocally, as the ‘insignificant public’.&lt;/p&gt;
&lt;p&gt;Under the Indian Copyright Act, "communication to the public" occurs  when a person makes any work “available for being seen or heard or  otherwise enjoyed by the public directly or by any means of display or  diffusion other than by issuing copies of such work”. Such communication  occurs “regardless of whether any member of the public actually sees,  hears or otherwise enjoys the work so made available.”[Section 2(ff)][&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#35"&gt;35&lt;/a&gt;]&lt;/p&gt;
&lt;h3&gt;Private&lt;/h3&gt;
&lt;div&gt;The word ‘private’ is expressly referenced in four provisions of the Copyright Act.&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;Section 39 declares that “the making of any sound recording or  visual recording for the private use of the person making such  recording, or solely for purposes of bona fide teaching or research”  would not violate the broadcast reproduction right or performer's right;&lt;/li&gt;
&lt;li&gt;Section  51 which stipulates when copyrights are infringed declares that the  “imports into India, any infringing copies of the work” would constitute  an infringement except if it is only a single copy of any work that is  imported “for the private and domestic use of the importer”.&lt;/li&gt;
&lt;li&gt;Section 52(1) of the Copyright Act lists certain acts as not infringing of copyright. These include:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;(a) a fair dealing with a literary, dramatic, musical or  artistic work, not being a computer programme, for the purposes of  private use, including research. A proposed amendment to this section  seeks to extend this protection to all ‘personal’ uses in addition to  ‘private uses including research[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#36"&gt;36&lt;/a&gt;]. ‘Personal use’ has been interpreted in non-copyright contexts to include the family members of the person living with him.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#37"&gt;37&lt;/a&gt;] The  definition of ‘person’ under the General Clauses Act includes a  “company or association or body of individuals, whether incorporated or  not”. Although the case law on the point is scant[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#38"&gt;38&lt;/a&gt;], it  would be interesting to see if ‘personal use’ can be read to include  the use by companies internally, thereby casting a shroud of privacy on  corporations for the purpose of copyright.&lt;/li&gt;
&lt;li&gt;(p) the reproduction,  for the purpose of research or private study or with a view to  publication, of an unpublished literary, dramatic or musical work kept  in a library, museum or other institution to which the public has  access.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;In addition to the provisions listed above, Section 52 the Act also  shields certain spaces and occasions as immune from the charge of  copyright infringement (although they are not specially designated as  ‘private’). These include educational institutions[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#39"&gt;39&lt;/a&gt;], non-profit clubs, societies[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#40"&gt;40&lt;/a&gt;], religious institutions[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#41"&gt;41&lt;/a&gt;] and religious ceremonies including marriages.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#42"&gt;42&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;Perhaps the most elaborate calibration of the boundaries between the  'private' and 'public' under the Indian Ccopyright Act by the judiciary  occurs in the case &lt;i&gt;Garware Plastics and Polyester vs Telelink &amp;amp; Ors&lt;/i&gt;[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#43"&gt;43&lt;/a&gt;].,  decided by the Bombay High Court in 1989. The case called for the  determination of whether films transmitted via neighbourhood cable  networks and viewed in the privacy of customers’ homes would constitute  an unauthorised ‘communication to the public’ under the Copyright Act.  Here the defendants had purchased video tapes of popular films and begun  transmitting them over cable networks owned by them. For this they  charged a monthly maintenance fee from their customers. Under the  Copyright Act then in force, ‘communication to the public’ was defined  simply as "communication to the public in whatever manner, including  communication through satellite.” After an extensive review of English  law on the subject, the court ruled that this did constitute an  unauthorised communication to the public:&lt;/p&gt;
&lt;p&gt;"Whether a communication is to the public or whether it is a private  communication depends essentially on the persons receiving the  communication. If they can be characterized as the public or a protein  of the public , the communication is to the public…From the authorities  the principal criteria which emerge for determining the issue are(1) the  character of audience and whether it can be described as a private or  domestic audience consisting of family members or members of the  household, (2) whether the audience in relation to the owner of the  copyright can be so considered…Applying the test of the character of the  audience watching these video films , can this audience be called a  Section of the public or is this audience a private or domestic audience  of the defendants ? In the present case &lt;i&gt;it cannot be said that the  audience which watches video films shown by the defendants consists of  family members and guests of the defendants. The video film may be  watched by a large Section of the public in the privacy of their  homes. But this does not make it a private communication so as to take  it our of the definition of "broadcast" under the Copyright Act, 1957&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;It is true that the network operates through the connection of a  cable to all these various apartments or houses. But this cannot in any  way affect the character of the audience. The viewers are not members of  one family or their guests. They do not have even the homogeneity of  club members of one family or their guests. They do not have even the  homogeneity of a club membership.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#44"&gt;44&lt;/a&gt;] (emphasis added)&lt;/p&gt;
&lt;p&gt;A central feature emerging from this case that distinguishes public  form private in Copyright law is homogeneity or affiliation: that space  is marked ‘private’ where a pre-affiliated group – united either by  kinship or association in pursuit of a common goal – comes together in  pursuit of a non-commercial common interest. Conversely, ‘Public’ is  where the unaffiliated congregate. On the face, this accords with the  spirit of the various fair dealing rights under the Copyright Act which  carve out immunised spaces for institutions that correspond to these  definitions – educational institutions, religious institutions and  ceremonies, amateur clubs etc are immune from infringement actions  because, one could say, their activities are ‘private’.&lt;/p&gt;
&lt;p&gt;In 1994 the Copyright Act was amended to fortify this conclusion by  expanding the definition of ‘communication to the public’ to include  ‘communication through satellite or cable or any other means of  simultaneous communication to more than one household or place of  residence including residential rooms of any hotel or hostel shall be  deemed to be communication to the public;” (Sec 2(ff), Explanation)&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;I would like to conclude this paper with some reflections on the  assertion I made in the introduction about copyright law being both an  instrument for the protection and violation of privacy. From the  discussion in the previous sections, it follows:&lt;/p&gt;
&lt;p&gt;Firstly, that 'property' – as embodied by copyright law – is, at  best, an unreliable guarantor of privacy. It works when bussed along  with dignity claims– for instance the Phoolan Devi case where the  petitioner’s suffering underlay her property claim– but fails when  asserted as ‘property’ per se (as in Manisha Koirala’s case[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#45"&gt;45&lt;/a&gt;]).  One does not (under the Indian Copyright Act, at least) have a reliable  ‘property’ interest in one’s life story, bodily representation, name  etc. This stands in contrast with other regimes such as the US where  several states have enacted ‘Right to publicity’ statutes or have  recognised publicity rights through common law processes.[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#46"&gt;46&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;These rights can be read to offer people a 'property' means for  protecting their privacy (by preventing unauthorised publicity) in those  jurisdictions. Analogous claims are unavailable in India.&lt;/p&gt;
&lt;p&gt;Secondly, that ‘property’ operates frequently as a license for the  violation of privacy with impunity.  This emerges most clearly from the  cases of copyright investigation that we examined in Section 1.2 above.  Pecuniary copyright interests appear to completely overwhelm any regard  for competing privacy concerns.&lt;/p&gt;
&lt;p&gt;Thirdly, that, notwithstanding the preceding two points, the  copyright act does protect privacy in limited ways. Chiefly these are a)  By conferring limited copyright on 'unpublished works', it enables  authors to restrict their publication except on terms acceptable to  them. b) The Act grants a very wide “Performer’s right” to performers  and no sound or visal recording may be made of them without their  express consent. No such recording can broadcast or communicated to the  public without their consent. This gives a very powerful weapon of  control in the hands of performers to restrict the extent to which  representations of them are publicised. C) As mentioned above in the  penultimate section of this paper, various fair dealing exceptions carve  out spaces of privacy where infringing acts are granted immunity – for  instance private uses, uses in educational institutions and libraries,  etc.&lt;/p&gt;
&lt;p&gt;Lastly, with the arena of copyright infringement shifting gradually  to the internet, it is foreseeable that the IT Act will be employed with  greater frequency in the coming years to do the work of copyright  enforcement. The legal regime already supports this change through  provisions in the IT Act which preserve all existing rights available  under the Copyright Act [Section 81 (proviso) of the IT Act] and put new  powers of take-down [see Intermediary Guidelines] in the hands of  Copyright Owners. Thus on the one hand, copyright owners would be able  to lawfully hack into potential infringers’ computers while enjoying  immunity under the IT Act. On the other hand, ‘intermediaries’ would be  legally bound to co-operate in copyright enforcement including,  conceivably, handing over a number of personal details of those accused  of copyright infringement. In other jurisdictions, such as the EU, such  ‘co-operation’ is heavily policed by judicial oversight where personally  identifiable information is involved[&lt;a href="http://localhost:8090/website/advocacy/igov/privacy-india/copyright-enforcement#47"&gt;47&lt;/a&gt;]. Contrastingly,  in India, with its diminished concerns for privacy and limited  awareness of how IP address data can seriously imperil privacy, there is  a very real threat that these provision will license the wholesale  violation of online privacy.&lt;/p&gt;
&lt;pre&gt;Notes&lt;/pre&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="1"&gt;[1]Anon, 2005. Towards Knowledge  Societies, Paris: UNESCO. Available at:  http://unesdoc.unesco.org/images/0014/001418/141843e.pdf [Accessed April  20, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="2"&gt;[2]Sundaram says "Temporal acceleration  was a significant part of the imaginary of developmentalism - this was  inherent in the logic of 'catching up' with the core areas of the world  economy by privileging a certain strategy of growth that actively  delegitimized local and 'traditional' practices."&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="3"&gt;[3]This aspiration underlies several of  the policy documents prepared in India in the last decade –  Illustratively, the report submitted by the National Task Force on  Information Technology (NTFIT) in 1998 captures this sentiment well:  “For India, the rise of Information Technology is an opportunity to  overcome historical disabilities and once again become the master of  one's own national destiny. IT is a tool that will enable India to  achieve the goal of becoming a strong, prosperous and self-confident  nation. In doing so, IT promises to compress the time it would otherwise  take for India to advance rapidly in the march of development and  occupy a position of honor and pride in the comity of nations” Tiwari,  Ghanshyam et al. Government of India. Central Advisory Board of  Education, Ministry of Human Resource Development .Report of the Central  Advisory Board of Education Committee On Universalisation of Secondary  Education. New Delhi: 2005&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="4"&gt;[4]There is some ambiguity on whether  offences under the Copyright Act punishable with imprisonment “which may  extend to three years” are 'cognizable' or not. The Code of Criminal  Procedure 1973 classifies all offences which prescribe a penalty of  three years and above as cognizable and non bailable [First Schedule].  Offences which are punishable with imprisonment of less than three years  are classified as ‘non-cognizable’ and ‘bailable’. In the absence of a  definitive ruling from the Supreme Court on this issue, different High  Courts have offered conflicting interpretations. See Singh, S. &amp;amp;  Aprajita, 2008. Insight into the nature of offence of Copyright  Infringement. Journal of Intellectual Property Rights, 13(6),  pp.583-589. Available at:  http://nopr.niscair.res.in/bitstream/123456789/2433/1/JIPR%2013%286%29%20583-589.pdf  [Accessed May 12, 2011]. See also Agarwal, D.K., 2010. Arrest under the  customs act ? Bailable or non-bailable offence. Translation  Interpreting Services. Available at:  http://translation-tech.com/blog/213/arrest-under-the-customs-act-bailable-or-non-bailable-offence/  [Accessed May 12, 2011]. The determination of this issue would have  wide ranging implications since the police have a wider assortment of  powers with respect to interrogation, arrest, search and seizure in the  course of investigating cognizable offences than they have with respect  to non-cognizable offences. &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="5"&gt;[5]"Where Director of Inspection or  Commissioner in consequence of information in his possession, has reason  to believe that any person having in possession of any money, etc.."  has not disclosed it for purposes of Income Tax.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="6"&gt;[6]AIR 1997 Raj 78 &amp;lt; http://indiankanoon.org/doc/661363/&amp;gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="7"&gt;[7]Event and Entertainment Management  Association  v. Union of India (Delhi HC) Order dated 2nd May 2011  &amp;lt;http://courtnic.nic.in/dhcorder/dhcqrydisp_o.asp?pn=84697&amp;amp;yr=2011&amp;gt;.  Harkauli, S., 2011. HC nullifies police circular on copyright issue.  The Pioneer. Available at:  http://www.dailypioneer.com/336974/HC-nullifies-police-circular-on-copyright-issue.html  [Accessed May 9, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="8"&gt;[8]Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="9"&gt;[9]As recently as April 2011, the Delhi  high court restrained “cable operators nationwide from telecasting  matches of the Indian Premier League (IPL) without authorization from  MSM Satellite (Singapore) Pte Ltd, which owns the broadcasting rights.  See Bailay, R., 2011. Cable operators can’t telecast IPL without  authorization, says HC. Livemint. Available at:  http://www.livemint.com/articles/2011/04/27212449/Cable-operators-can8217t-te.html?atype=tp  [Accessed May 13, 2011]. For an early history of John Doe orders in  India, see Krishnamurthy, N. &amp;amp; Anand, P., 2003. India Trade marks in  a state of change. Managing Intellectual Property. Available at:  http://www.managingip.com/Article/1321770/India-Trade-marks-in-a-state-of-change.html  [Accessed May 13, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="10"&gt;[10]These orders are granted by the  Court supposedly under Section 75 read with Order 26 of the Code of  Civil Procedure which empowers the court to appoint “Local  Commissioners” to record evidence in special cases. I have stated my  opinions elsewhere on why I believe these powers may not be invoked for  the purpose of effecting routine searches and seizures in the manner as  is currently being practiced by the higher judiciary – especially the  Delhi High Court. See Iyengar, P., 2009. BSA’s response on Spicy IP – in  perspective. Original Fakes. Available at:  http://originalfakes.wordpress.com/2009/04/04/bsas-response-on-spicy-ip-in-perspective/  [Accessed May 10, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="11"&gt;[11]Anon, 2009. Ghost Post on IP  (Software) Raids: Court Sponsored Extortion? SPICY IP. Available at:  http://spicyipindia.blogspot.com/2009/03/ghost-post-on-ip-software-raids-court.html  [Accessed May 10, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="12"&gt;[12]Autodesk Inc Vs. AVT Shankardass,  Available at:  http://delhicourts.nic.in/Jul08/Autodesk%20Inc%20Vs.%20AVT%20Shankardass.pdf  [Accessed May 10, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="13"&gt;[13]The 2011 Special 301 Country Report  on India prepared by the IIPA specifically cites the Delhi High Court  in this context, statng “The industry enjoys a very high success rate  with respect to the grant of such orders at the Delhi High Court”.  According to this report, the Business Software Alliance was able to  obtain 34 such orders in 2009.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="14"&gt;[14]Anon, 2011. Special 301 Report on  Copyright Protection and Enforcement: 2011 India Country Report,  International Intellectual Property Alliance. Available at:  http://www.iipa.com/rbc/2011/2011SPEC301INDIA.pdf [Accessed May 9,  2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="15"&gt;[15]Ibid at. Pp 41-42.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="16"&gt;[16]The 2010 Special 301 Country Report  lists the following defects of the proposed Section 65A: “(a) does not  cover access controls and is limited only to TPMs protecting the  exercise of exclusive rights; (b) covers only the “act” of circumvention  and does not also cover manufacturing, trafficking in, or distributing  circumvention devices or services; (c) does not define an “effective  technological measure”; (d) contains an exception which would appear to  permit circumvention for any purpose that would not amount to  infringement under the act (thereby almost completely eviscerating any  protection); (e) creates other overbroad exceptions; and (f) provides  for only criminal and not civil remedies."&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="17"&gt;[17]Syed Asifuddin And Ors. v The State Of Andhra Pradesh, 2005 CriLJ 4314 (Andhra Pradesh HC ).&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="18"&gt;[18]Ibid.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="19"&gt;[19]Holla, A., 2009. Wronged, techie  gets justice 2 yrs after being jailed. Mumbai Mirror. Available at:  http://www.mumbaimirror.com/index.aspx?page=article&amp;amp;sectid=2&amp;amp;contentid=200906252009062503144578681037483  [Accessed March 23, 2011]. See also Nanjappa, V., 2008. “I have lost  everything.” Rediff.com News. Available at:  http://www.rediff.com/news/2008/jan/21inter.htm [Accessed March 23,  2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="20"&gt;[20]Pahwa, N., 2010. Hyderabad Police  Arrests Torrent Uploaders - MediaNama. MediaNama. Available at:  http://www.medianama.com/2010/11/223-hyderabad-police-arrests-torrent-uploaders/  [Accessed May 12, 2011]. &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="21"&gt;[21]GSR 314(E) Dated 11 April 2011:  Information Technology (Intermediaries guidelines) Rules, 2011  http://www.mit.gov.in/sites/upload_files/dit/files/GSR314E_10511(1).pdf  [Accessed May 12, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="22"&gt;[22]See Zee Telefilms Ltd. v Sundial Communications Pvt. Ltd., 2003 (5) BomCR 404 (Bombay High Court 2003).&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="23"&gt;[23]Mr. M. Sivasamy v M/S. Vestergaard Frandsen (Delhi High court 2009).&amp;lt; http://indiankanoon.org/doc/916718/&amp;gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="24"&gt;[24]Dietrich Engineering Consultant v  Schist India &amp;amp; Ors (Bombay High Court, 2009) &amp;lt;  http://indiankanoon.org/doc/1634545/&amp;gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="25"&gt;[25]Mr. Diljeet Titus, Advocate vs Mr. Alfred A. Adebare And Ors, 130 DLT 330 (Delhi High Court 2006).&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="26"&gt;[26]Phoolan Devi v Shekhar Kapoor And  Ors. (1994). DLT (Vol. 57 (1995), p. 154). Retrieved from  http://indiankanoon.org/doc/793946/&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="27"&gt;[27]The conditions under which this  license were obtained speak eloquently to the ills of the current  copyright system. According to Phoolan Devi’s lawyer, the noted advocate  Indira Jaisingh, the contract was signed by Phoolan Devi while she was  behind prison bars. She did not speak or understand Hindi or English and  only spoke in a local dialect. The copyright contract was written  entirely in English and gave her a paltry sum or Rs. 2 lakh – which was a  pittance considering the budget and projected returns from the film.  Jaisingh, I., 2001. Supreme Court lawyer Indira Jaisingh pays tribute to  Phoolan Devi. Available at:  http://www.rediff.com/news/2001/jul/26spec.htm [Accessed June 10, 2011].  Arundhati Roy’s two superb critiques of the film and its director  movingly capture why this is not a simple case of copyright assignment.  See Roy, A., 1994. The Great Indian Rape Trick - I. Sawnet. Available  at: http://www.sawnet.org/books/writing/roy_bq1.html [Accessed June 10,  2011].; Roy, A., 1994. The Great Indian Rape Trick - II. Sawnet.  Available at: http://www.sawnet.org/books/writing/roy_bq2.html [Accessed  June 10, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="28"&gt;[28]Ibid, Roy, A., 1994. The Great Indian Rape Trick - I. &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="29"&gt;[29]Ibid, Roy, A., 1994. The Great Indian Rape Trick - II&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="30"&gt;[30]Section 57 of the Act reads  “Author’s Special Rights: ‘Independently of the author's copyright and  even after the assignment either wholly or partially of the said  copyright, the author of a work shall have the right-&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;(a) to claim authorship of the work; and&lt;br /&gt;&lt;span class="Apple-style-span"&gt;(b)  to restrain or claim damages in respect of any distortion, mutilation,  modification or other act in relation to the said work which is done  before the expiration of the term of copyright if such distortion,  mutilation, modification or other act would be prejudicial to his honour  or reputation:”&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;a name="31"&gt;[31]The case was later  settled out of court with Phoolan Devi being able to secure a  substantially higher compensation. Ultimately, the case was not about  the depiction of rape generally, but primarily about Phoolan Devi’s  sovereign right to decide the terms on which her own life would be  represented.&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="32"&gt;[32]Manisha Koirala v Shashilal Nair  &amp;amp; Ors. (2002). BomCR (Vol. 2003 (2), p. 136). Retrieved from  http://indiankanoon.org/doc/1913646/&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="33"&gt;[33]Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="34"&gt;[34]Anon, 2011. High Court Grants  Injunction Till June 7 Against Publishing Book on Jayalalithaa. The  Hindu, p.01. Available at:  http://www.hindu.com/2011/04/27/stories/2011042762360100.htm [Accessed  May 12, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="35"&gt;[35]For a more dispersed account on the  concept of the ‘public’ under Indian law, See Iyengar, P, ‘Where the  private and the public collide’, iCommons Lab Report, September- October  2007, pp. 7-8, Icommons.org, &amp;lt;  http://archive.icommons.org/articles/what-is-public&amp;gt; last visited May  2011&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="36"&gt;[36]Copyright (Amendment) Bill 2010 http://prsindia.org/uploads/media/Copyright%20Act/Copyright%20Bill%202010.pdf &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="37"&gt;[37]See Sivasubramania Iyer v. S.H.  Krishnaswamy AIR 1981 Ker 57 , a case under  Kerala Buildings (Lease  &amp;amp; Rent Control) Act 1965.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="38"&gt;[38]Goods purchased for the private use  of a corporation would be goods purchased for the ”personal use” of the  corporation. 158 IC 703.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="39"&gt;[39]52(1)(g), (h) and (i)&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="40"&gt;[40]52(1)(k) and (l)&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="41"&gt;[41]52(1)(l)&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="42"&gt;[42]52(1)(za)&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="43"&gt;[43]AIR 1989 Bom 331, 1989 (2) BomCR 433, (1989) 91 BOMLR 139 &amp;lt;http://indiankanoon.org/doc/858705/&amp;gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="44"&gt;[44]Ibid.&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="45"&gt;[45]At first glance this distinction  may seem facile since even Manisha Koirala invoked ‘reputational harm’  as a prop to buttress her property claim. However, I believe this case  was complicated by the fact that the court had to consider whether the  display of someone else’s body could have implicated Manisha Koirala’s  privacy/dignity. Koirala was, in effect, arguing that she had absolute  ‘proprietorial’ control over all representations of her body – a  property argument which the court was unwilling to concede. &lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="46"&gt;[46]See Footnote 90 and accompanying  text in Samuelson, P., 2000. Privacy as Intellectual Property? SSRN  eLibrary; Stanford Law Review. Available at:  http://ssrn.com/paper=239412 [Accessed on June 14, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;&lt;a name="47"&gt;[47]Lebatard, F.-R., Copyright  Enforcement and the Protection of Privacy in France. Translegal.  Available at:  http://www.translegal.com/feature-articles/copyright-enforcement-and-the-protection-of-privacy-in-france  [Accessed June 14, 2011].&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement'&gt;https://cis-india.org/internet-governance/blog/privacy/copyright-enforcement&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-14T10:27:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/research/conferences/conference-blogs/workshop">
    <title>Locating Internets: Histories of the Internet(s) in India — Research Training and Curriculum Workshop: Call for Participation</title>
    <link>https://cis-india.org/research/conferences/conference-blogs/workshop</link>
    <description>
        &lt;b&gt;Deadline for submission: 26th July 2011-06-08;
When: 19th - 22nd August, 2011;
Where: Centre for Environmental Planning and Technology (CEPT) University, Ahmedabad;
Organised by: Centre for Internet and Society, Bangalore and CEPT University, Ahmedabad.
Please Note: Travel support is only available for domestic travel within India.&lt;/b&gt;
        
&lt;p&gt;LOCATING INTERNETS is an innovative, multi-disciplinary, workshop that engages with some of the most crucial debates around Internet and Society within academic scholarship, discourse and practice in India. It explores Where, When, How and What has changed with the emergence of Internet and Digital Technologies in the country. The Internet is not a singular monolithic entity but is articulated in various forms – sometimes materially, through accessing the web; at others, through our experiences; and yet others through imaginations of policy and law. Internets have become a part of our everyday practice, from museums and archives, to school and university programmes, living rooms and public spaces, relationships and our bodily lived realities. It becomes necessary to reconfigure our existing concepts, frameworks and ideas to make sense of the rapidly digitising world around us. The Internet is no longer contained in niche disciplines or specialised everyday practices. LOCATING INTERNETS invites scholars, teachers, researchers, advanced research students and educationalists from any discipline to learn and discuss how to ask new questions and design innovative curricula in their discipline by introducing concepts and ideas from path-breaking research in India.&lt;/p&gt;
&lt;p&gt;Comprised of training, public lectures, open discussion spaces, and hands-on curriculum building exercises, this workshop will introduce the participants to contemporary debates, help them articulate concerns and problems from their own research and practice, and build knowledge clusters to develop innovative and open curricula which can be implemented in interdisciplinary undergraduate spaces in the country. It showcases the research outputs produced by the Centre for Internet and Society’s Researchers @ Work Programme, and brings together nine researchers to talk about alternative histories, processes, and bodies of the Internets, and how they can be integrated into mainstream pedagogic practices and teaching environments.&lt;/p&gt;
&lt;h3&gt;Knowledge Clusters for the Workshop&lt;/h3&gt;
&lt;p&gt;LOCATING INTERNETS is designed innovatively to accommodate for various intellectual and practice based needs of the participants. While the aim is to introduce the participants to a wide interdisciplinary range of scholarship, we also hope to address particular disciplinary and scholarly concerns of the participants. The workshop is further divided into three knowledge clusters which help the participants to focus their energies and ideas in the course of the four days.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Bridging the Gap&lt;/strong&gt;: This workshop seeks to break away from the utopian public discourse of the Internets as a-historical and completely dis-attached from existing technology ecologies in the country. This knowledge cluster intends to produce frameworks that help us contextualize the contemporary internet policy, discourse and practice within larger geo-political and socio-historical flows and continuities in Modern India. The first cluster chartsdifferent pre-histories of the Internets, mapping the continuities and ruptures through philosophy of techno-science, archiving practices, and electronifcation of governments,to develop new technology-society perspectives.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Paradigms of Practice&lt;/strong&gt;:One of the biggest concerns about Internet studies in India and other similar developed contexts is the object oriented approach that looks largely at specific usages, access, infrastructure, etc. However, it is necessary to understand that the Internet is not merely a tool or a gadget. The growth of Internets produces systemic changes at the level of process and thought. The technologies often get appropriated for governance both by the state and the civil society, producing new processes and dissonances which need to be charted. The second cluster looks at certain contemporary processes that the digital and Internet technologies change drastically in order to recalibrate the relationship between the state, the market and the citizen.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Feet on the Ground&lt;/strong&gt;: The third cluster looks at contemporary practices of the Internet to understand the recent histories of movements, activism and cultural practices online. It offers an innovative way of understanding the physical objects and bodies that undergo dramatic transitions as digital technologies become pervasive, persuasive and ubiquitous. It draws upon historical discourse, everyday practices and cultural performances to form new ways of formulating and articulating the shapes and forms of social and cultural structures.&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Workshop Outcomes&lt;/h3&gt;
&lt;p&gt;The participants are expected to engage with issue of Internet and it various systemic processes through their own disciplinary interests. Apart from lectures and orientation sessions, the participants will actively work on their own project ideas during the period in groups and will be guided by experts. The final outcome of the workshops would be curriculum for undergraduate and graduate teaching space of various disciplines in the country.&lt;/p&gt;
&lt;h3&gt;Participation Guidelines&lt;/h3&gt;
&lt;p&gt;LOCATING INTERNETS is now accepting submissions from interested participants in the following format:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Name:&lt;/li&gt;&lt;li&gt;Institutional affiliation and title:&lt;/li&gt;&lt;li&gt;Address:&lt;/li&gt;&lt;li&gt;Email address:&lt;/li&gt;&lt;li&gt;Phone number:&lt;/li&gt;&lt;li&gt;A brief resume of work experience (max. 350 words)&lt;/li&gt;&lt;li&gt;Statement of interest (max. 350 words)&lt;/li&gt;&lt;li&gt;Key concerns you want to address in the Internet and Society field (max. 350 words)&lt;/li&gt;&lt;li&gt;Identification with one Knowledge-cluster of the workshop and a proposal for integrating it in your research/teaching practice (max. 500 words)&lt;/li&gt;&lt;li&gt;Current interface with technologies in your pedagogic practices (max. 350 words)&lt;/li&gt;&lt;li&gt;Additional information or relevant hyperlinks you might want to add (Max. 10 lines)&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;pre&gt;Notes:&lt;/pre&gt;
&lt;ul&gt;&lt;li&gt;Submissions will be accepted only from participants in India, as attachments in .doc, .docx or .odt formats at &lt;a class="external-link" href="mailto:locatinginternets@cis-india.org"&gt;locatingInternets@cis-india.org&lt;/a&gt;&lt;/li&gt;&lt;li&gt;Submissions made beyond 26th July 2011 may not be considered for participation. &lt;br /&gt;&lt;/li&gt;&lt;li&gt;Submissions will be scrutinized by the organisers and selected participants will be informed by the 30th July 2011, about their participation.&lt;/li&gt;&lt;li&gt;Selected participants will be required to make their own travel arrangements to the workshop. A 2nd A.C. train return fare will be reimbursed to the participants.&amp;nbsp; Shared accommodation and selected meals will be provided at the workshop.&lt;/li&gt;&lt;li&gt;A limited number of air-fare reimbursements will be available to participants in extraordinary circumstances. All travel support is only available for domestic travel in the country.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Chairs&lt;/strong&gt;: Nishant Shah, Director-Research, Centre for Internet and Society Bangalore;&lt;/p&gt;
&lt;p&gt;Pratyush Shankar, Associate Professor &amp;amp; Head of Undergraduate Program, Faculty of Architecture, CEPT University&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Supported by&lt;/strong&gt;: Kusuma Foundation, Hyderabad&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Experts&lt;/strong&gt;:Anja Kovacs, Arun Menon, Asha Achuthan, Ashish Rajadhykasha, Aparna Balachandran, Namita Malhotra, Nithin Manayath, Nithya Vasudevan, Pratyush Shankar, Rochelle Pinto and Zainab Bawa&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/research/conferences/conference-blogs/workshop'&gt;https://cis-india.org/research/conferences/conference-blogs/workshop&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Development</dc:subject>
    
    
        <dc:subject>Gaming</dc:subject>
    
    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>CISRAW</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Cybercultures</dc:subject>
    
    
        <dc:subject>archives</dc:subject>
    
    
        <dc:subject>New Pedagogies</dc:subject>
    
    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>IT Cities</dc:subject>
    

   <dc:date>2011-07-21T06:00:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/ntp-2011-objective">
    <title>NTP 2011 Objective: Broadband</title>
    <link>https://cis-india.org/telecom/blog/ntp-2011-objective</link>
    <description>
        &lt;b&gt;The Indian government has to choose between accessible, affordable services and short-term revenue, writes Shyam Ponappa in this article published in the Business Standard on June 2, 2011.&lt;/b&gt;
        &lt;p&gt;Apart from the scams, confused ideas are roiling India’s telecom sector. One instance is the finance ministry urging spectrum auctions to collect Rs 30,000 crore to help bridge the fiscal deficit. Another is the Ashok Chawla committee recommending spectrum auctions for transparency, making transparency the criterion for managing spectrum. The committee apparently does not mention the disastrous US auction, and attributes the UK fiasco to extraneous reasons; presumably, they knew the facts. Such issues need logical and systematic remedies. Otherwise, the success of the telecom sector will degenerate into yet another failure.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Objectives: the transaction should be structured in the public interest;&lt;/li&gt;
&lt;li&gt;A life-cycle analysis of costs and benefits, and not just windfall revenues (since short-term cash drives the finance ministry’s concerns, it is important for the ministry and the government to step back and consider alternatives, such as the sale of BSNL’s vast real estate. If the goal is ubiquitous and affordable broadband, this would be much less damaging to the public interest than spectrum auctions); and&lt;/li&gt;
&lt;li&gt;End-to-end solutions are required from an integrated systems perspective.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;The New Telecom Policy ’11&lt;/h2&gt;
&lt;p&gt;For the New Telecom Policy 2011 (NTP ’11), the first requirement is to define convergent goals. We could take a leaf from countries with excellent broadband that built high-quality next generation networks. While the US and UK have strong initiatives, Japan, Sweden, South Korea and Finland have highly rated broadband. Australia and Singapore are now building next-generation networks. Both are common-access, open-to-all service providers.&lt;/p&gt;
&lt;h3&gt;Spectrum Management&lt;/h3&gt;
&lt;p&gt;In India we must begin with unravelling the mess of spectrum management. There are two separate skeins. Legacy issues of irregularities and scams form one stream, to be dealt with by the process of law. On the other hand, policies for next-generation networks need a process of stakeholder workouts to deliver services. Broadly, there are two ways of approaching spectrum management. One is to allocate specified bands for exclusive use, as was customary until now. An alternative is to create a common spectrum pool for use by all service providers. In other words, any provider can dynamically access spectrum for carrying voice, image and/or data. This method of dynamic spectrum access is now feasible, and the US is starting off with TV white space. The Federal Communications Commission has appointed nine companies including Spectrum Bridge and Google as database administrators; a tenth, Microsoft, is under consideration. India could start out on this if the government chooses the objective of accessible and affordable services.&lt;/p&gt;
&lt;h2&gt;Network vs Revenue&lt;/h2&gt;
&lt;p&gt;The choice is between building/configuring a high-quality, least-cost network and high short-term government collections. Over a longer period, a restrained approach emphasising networks and services is likely to be superior to aggressive government fees, as we found with NTP ’99 — revenue sharing resulted in explosive growth together with higher collections than the amount foregone from licence fees (see data from the Telecom Regulatory Authority of India and the Comptroller and Auditor General2).&lt;/p&gt;
&lt;p&gt;How can the government evaluate this trade-off? The diagram below outlines alternative approaches to spectrum allocation and the likely outcomes. The outcomes should be evaluated as public interest costs and benefits.&lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/costs.jpg/image_preview" alt="Costs" class="image-inline image-inline" title="Costs" /&gt;&lt;/p&gt;
&lt;p&gt;The first step is to choose between exclusive spectrum use and common access. Exclusive use entails allocation through auctions; methods like first come, first served (FCFS); or “beauty contests”, for example, the evaluation of stipulated criteria such as technology, financial capacity and so on. Auctions are transparent. Common access, too, is completely transparent, provided the usage and payment systems have integrity.&lt;/p&gt;
&lt;p&gt;If there are few operators (three or four), each can be allocated 20 MHz or more for exclusive use. In such circumstances, the relative merits are not obvious. However, in an emerging economy like India – without a ubiquitous network and with too little spectrum distributed among many operators – the logical choice for efficient spectrum management is common access.&lt;/p&gt;
&lt;p&gt;Auctions often lead to service deprivation because of high costs (the “winner’s curse”). However, there are exceptions, where bidding is kept reasonable, as in Finland, or France because of its timing, after the fiasco of the European auctions. The other alternatives, FCFS or beauty contests, can result in low or high costs depending on government policies. High fees ratchet up costs with windfall gains to government in the short term, but users are deprived of these funds for networks and services. For example, in India, while the government collected nearly Rs 1,03,000 crore for 3G and broadband wireless access auctions, new facilities and services have been slow. Instead, this spectrum is largely used to support 2G users.&lt;/p&gt;
&lt;p&gt;Low fees would have improved the odds of high-quality and low-cost facilities, affordable pricing, and better coverage. The government, however, would have lost its short-term windfall gains.&lt;/p&gt;
&lt;p&gt;Once the government sets the objective of affordable, high-quality services, the next steps will be:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Spectrum allocation and management&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The decision criteria are:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Technology: The rationale for optimal channel width is that with lower capital cost there is greater throughput with a 20 MHz band than with several smaller bands.&lt;/li&gt;
&lt;li&gt;Economics: The capital cost of shared facilities through common access is far lower than if each operator invested in separate access networks.&lt;/li&gt;
&lt;li&gt; Practical results: High-quality broadband in countries like Japan, Sweden and South Korea was built without spectrum auctions.&lt;/li&gt;
&lt;li&gt;Carbon footprint and resources: Both are minimised with shared facilities, such as towers and equipment.&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;These reasons make common spectrum the logical choice, as against auctions for exclusive allocations.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Common network&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/TreeCommon_Spectrum__NetworkJun_7_2011.jpg/image_preview" alt="Tree " class="image-inline image-inline" title="Tree " /&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;A common network is, therefore, a logical and environmentally sound choice. The question is how best to own and operate it.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;pre&gt;Notes&lt;/pre&gt;
&lt;ol&gt;
&lt;li&gt;E.g. see: "Winner’s Curse", Chris Anderson, Wired, May ’02:&lt;a class="external-link" href="http://www.wired.com/wired/archive/10.05/change.html"&gt;http://www.wired.com/wired/archive/10.05/change.html&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Trai’s estimate of foregone revenues by March ’07: under Rs 20,000 crore: “Indicators for Telecom Growth”, Trai, ’05: &lt;a class="external-link" href="http://www.trai.gov.in/trai/upload/StudyPapers/2/ir30june.pdf"&gt;http://www.trai.gov.in/trai/upload/StudyPapers/2/ir30june.pdf&lt;/a&gt;&lt;br /&gt;&lt;i&gt;Revenue share collections by March ’07: Rs 40,000 crore; by March ’10: Rs 80,000 crore: "Performance Audit Report on the Department of Telecommunications, Ministry of Communications and Information Technology"&lt;/i&gt;, &lt;a class="external-link" href="http://saiindia.gov.in/cag/union-audit/report-no-19-performance-audit-issue-licences-and-allocation-2g-spectrum-department-tele"&gt;http://saiindia.gov.in/cag/union-audit/report-no-19-performance-audit-issue-licences-and-allocation-2g-spectrum-department-tele&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Read the original &lt;a class="external-link" href="http://organizing-india.blogspot.com/2011/06/ntp-2011-objective-broadband.html"&gt;here&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/ntp-2011-objective'&gt;https://cis-india.org/telecom/blog/ntp-2011-objective&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shyam Ponappa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2012-07-26T10:09:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/draft-ndsap-comments">
    <title>Comments on the draft National Data Sharing and Accessibility Policy</title>
    <link>https://cis-india.org/openness/blog-old/draft-ndsap-comments</link>
    <description>
        &lt;b&gt;A draft of the 'National Data Sharing and Accessibility Policy', which some hope will be the open data policy of India, was made available for public comments in early May.  This is what the Centre for Internet and Society submitted.&lt;/b&gt;
        
&lt;p&gt;These are the comments that we at the Centre for Internet and Society submitted to the National Spatial Data Infrastructure on the draft &lt;a class="external-link" href="http://dst.gov.in/NDSAP.pdf"&gt;National Data Sharing and Accessibility Policy&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Comments on the National Data Sharing and Accessibility Policy by the Centre for Internet and Society&lt;/h2&gt;
&lt;p&gt;We would like to begin by noting our appreciation for the forward-thinking nature of the government that is displayed by its pursuit of a policy on sharing of governmental data and enabling its use by citizens. We believe such a policy is a necessity in all administratively and technologically mature democracies. In particular, we applaud the efforts to make this applicable through a negative list of data that shall not be shared rather than a positive list of data that shall be shared, hence making sharing the default position. However, we believe that there are many ways in which this policy can be made even better than it already is.&lt;/p&gt;
&lt;h2&gt;1. Name&lt;/h2&gt;
&lt;p&gt;We believe that nomenclature of the policy must accurately reflect both the content of the policy as well as prevailing usage of terms. Given that 'accessibility' is generally used to mean accessibility for persons with disabilities, it is advisable to change the name of the policy.&lt;/p&gt;
&lt;h3&gt;Recommendation:&lt;/h3&gt;
&lt;p&gt;A. We would recommend calling this the "National Open Data Policy" to reflect the nomenclature already established for similar policies in other nations like the UK. In the alternative, it could be called a "National Public Sector Information Reuse Policy". If neither of those are acceptable, then it could be re-titled the "National Data Sharing and Access Policy".&lt;/p&gt;
&lt;h2&gt;2. Scope and Enforceability&lt;/h2&gt;
&lt;p&gt;It is unclear from the policy what all departments it covers, and whether it is enforceable.&lt;/p&gt;
&lt;h3&gt;Recommendation:&lt;/h3&gt;
&lt;p&gt;A. This policy should cover the same scope as the Right to Information (RTI) Act: all 'public authorities' as defined under the RTI Act should be covered by this policy.&lt;/p&gt;
&lt;p&gt;B. Its enforceability should be made clear by including provisions on consequences of non-compliance.&lt;/p&gt;
&lt;h2&gt;3. Categorization&lt;/h2&gt;
&lt;p&gt;The rationale for the three-fold categorization is unclear. In particular, it is unclear why the category of 'registered access' exists, and on what basis the categorization into 'open access' and 'registered access' is to be done. If the purpose of registration is to track usage, there are many better ways of doing so without requiring registration.&lt;/p&gt;
&lt;h3&gt;Recommendation:&lt;/h3&gt;
&lt;p&gt;A. Having three categories of:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Open data&lt;/li&gt;&lt;li&gt;Partially restricted data&lt;/li&gt;&lt;li&gt;Restricted data&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;B. Data that is classified as non-shareable (as per a reading of s.8 and s.9 of RTI Act as informed by the decisions of the Central Information Commission) should be classified as ‘restricted’.&lt;/p&gt;
&lt;p&gt;C. The rationale for classifying data as 'open' or 'partially restricted' should be how the data collection body is funded. If it depends primarily on public funds, then the data it outputs should necessarily be made fully open. If it is funded primarily through private fees, then the data may be classified as 'partially restricted'. 'Partially restricted' data may be restricted for non-commercial usage, with registration and/or a licence being required for commercial usage.&lt;/p&gt;
&lt;h2&gt;4. Licence&lt;/h2&gt;
&lt;p&gt;No licence has been prescribed in the policy for the data. Despite India not allowing for database rights, it still allows for copyright over original literary works, which includes original databases. All governmental works are copyrighted by default in India, just as they are in the UK. To ensure that this policy goes beyond merely providing access to data to ensure that people are able to use that data, it must provide for a conducive copyright licence.&lt;/p&gt;
&lt;h3&gt;Recommendation:&lt;/h3&gt;
&lt;p&gt;A. The licence that has been created by the UK government (another country in which all governmental works are copyrighted by default) may be referred to: http://www.nationalarchives.gov.uk/doc/open-government-licence/&lt;/p&gt;
&lt;p&gt;B. However, the UK needed to draft its own licence because the concept of database rights are recognized in the EU, which is not an issue here in India. Thus, it would be preferable to use the Open Data Commons - Attribution licence:&lt;/p&gt;
&lt;p&gt;http://www.opendatacommons.org/licenses/by/&lt;/p&gt;
&lt;p&gt;The UK licence is compatible with both the above-mentioned licence as well as with the Creative Commons - Attribution licence, and includes many aspects that are common with Indian law, e.g., bits on usage of governmental emblems, etc.&lt;/p&gt;
&lt;h2&gt;5. Integrity of the data&lt;/h2&gt;
&lt;p&gt;Currently, there is no way of ensuring that the data that is put out by the data provider is indeed the data that has been downloaded by a citizen.&lt;/p&gt;
&lt;h3&gt;Recommendation:&lt;/h3&gt;
&lt;p&gt;It is imperative to require data providers to provide integrity checks (via an MD5 hash of the data files, for instance) to ensure that technological corruption of the data can be detected.&lt;/p&gt;
&lt;h2&gt;6. Authenticity of the data&lt;/h2&gt;
&lt;p&gt;Currently, there is no way of ensuring that the data that is put out by the data provider indeed comes from the data provider.&lt;/p&gt;
&lt;h3&gt;Recommendation:&lt;/h3&gt;
&lt;p&gt;It is preferable to require data providers to authenticate the data by using a digital signature.&lt;/p&gt;
&lt;h2&gt;7. Archival and versioning&lt;/h2&gt;
&lt;p&gt;The policy is silent on how long data must be made available.&lt;/p&gt;
&lt;h3&gt;Recommendation:&lt;/h3&gt;
&lt;p&gt;There must be a system of archival that is prescribed to enable citizens to access older data. Further, a versioning and nomenclature system is required alongside the metadata to ensure that citizens know the period that the data pertains to, and have access to the latest data by default.&lt;/p&gt;
&lt;h2&gt;8. Open standards&lt;/h2&gt;
&lt;p&gt;While the document does mention standards-compliance, it is preferable to require open standards to the greatest extent possible, and require that the data that is put out be compliant with the Interoperability Framework for e-Governance (IFEG) that the government is currently in the process of drafting and finalizing.&lt;/p&gt;
&lt;h3&gt;Recommendation:&lt;/h3&gt;
&lt;p&gt;A. The policy should reference the National Open Standards Policy that was finalised by the Department of Information Technology in November 2010, as well as to the IFEG.&lt;/p&gt;
&lt;p&gt;B. The data should be made available, insofar as possible, in structured documents with semantic markup, which allows for intelligent querying of the content of the document itself. Before settling upon a usage-specific semantic markup schema, well-established XML schemas should be examined for their suitability and used wherever appropriate. It must be ensured that the metadata are also in a standardized and documented format.&lt;/p&gt;
&lt;h2&gt;9. Citizen interaction&lt;/h2&gt;
&lt;p&gt;One of the most notable failings of other governments' data stores has been the fact that they don't have adequate interaction with the citizen projects that emerge from that data. For instance, it is sometimes seen that citizens may point out flaws in the data put out by the government. At other times, citizens may create very useful and interesting projects on the basis of the data made public by the government.&lt;/p&gt;
&lt;h3&gt;Recommendation:&lt;/h3&gt;
&lt;p&gt;A. The government's primary datastore (data.gov.in) should catalogue such citizen projects, including open and documented APIs that the have been made available for easy access to that data.&lt;/p&gt;
&lt;p&gt;B. Additionally the primary datastore should act as a conduit for citizen's comments and corrections to the data provider. Data providers should be required to take efforts to keep the data up-to-date.&lt;/p&gt;
&lt;p&gt;C. Multiple forms of access should preferably be provided to data, to allow non-technical users interactive use of the data through the Web.&lt;/p&gt;
&lt;h2&gt;10. Principles, including 'Protection of Intellectual Property'&lt;/h2&gt;
&lt;p&gt;It is unclear why ‘protection of intellectual property’ is one of the guiding principles of this policy. Only those ideals which are promoted by this policy should be designated as ‘principles’. This policy, insofar as we can see, has no relation whatsoever with protection of intellectual property. The government is not seeking to enforce copyright over the data through this policy. Indeed, it is seeking to encourage the use of public data. Indeed, the RTI Act makes it clear in s.9 that government copyright shall not act as a barrier to access to information.&lt;/p&gt;
&lt;p&gt;Given that, it makes no sense to include ‘protection of intellectual property’ amongst the principles guiding this policy. Further, there are some other principles that may be removed without affecting the purpose or aim of this document: ‘legal conformity’ (this is a given since a policy wouldn’t wish to violate laws); ‘formal responsibility’ (‘accountability’ encapsulates this); ‘professionalism’ (‘accountability’ encapsulates this); ‘security’ (this policy isn’t about promoting security, though it needs to take into account security concerns).&lt;/p&gt;
&lt;h3&gt;Recommendation:&lt;/h3&gt;
&lt;p&gt;A. Remove ‘protection of intellectual property’, ‘legal conformity’, ‘formal responsibility’, ‘professionalism’, and ‘security’ from the list of principles in para 1.2.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/draft-ndsap-comments'&gt;https://cis-india.org/openness/blog-old/draft-ndsap-comments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Submissions</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2011-08-24T06:32:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/cyber-space-hackers-paradise">
    <title>Your cyber space is a hackers paradise</title>
    <link>https://cis-india.org/news/cyber-space-hackers-paradise</link>
    <description>
        &lt;b&gt;It Looks like hackers are having a ball targeting all kinds of websites — gaming, news, government, personal email and even those run by terror networks, writes Shayan Ghosh. The article was published in Mail Today on June 6, 2011.&lt;/b&gt;
        
&lt;p&gt;After Sony PlayStation Network and Gmail breaches this week, the latest is an attack on Sony Pictures.&lt;/p&gt;
&lt;p&gt;The hackers who broke into the Sony Pictures website have collected private information such as passwords and email identities.&lt;/p&gt;
&lt;p&gt;"A group of criminal hackers known as LulzSec claimed to have breached some of our websites," CEO of Sony Pictures Entertainment Michael Lynton said.&lt;/p&gt;
&lt;p&gt;LulzSec, involved in the hacking of several leading US media firms last month, however, has another story to tell. The group blamed Sony Pictures for carelessness.&lt;br /&gt;&lt;br /&gt;"Every bit of data we took wasnt encrypted. Sony stored over 10 lakh passwords of its customers in plaintext, which means it is just a matter of taking it." "We broke into SonyPictures. com and compromised over 10 lakh users personal information, including passwords, email addresses, home addresses, dates of birth, and all Sony data associated with their accounts.&lt;/p&gt;
&lt;p&gt;Among other things, we also compromised all administration details of Sony Pictures ( including passwords) along with 75,000 music codes and 3.5 million coupons", the group said in a post on Pastebin. com . Google mail, too, was breached this week and the hackers gained access to email accounts of hundreds of people, including senior US government officials and journalists. Google confirmed that Gmail accounts were hacked." We recently uncovered a campaign to collect user passwords, likely through phishing,” the search, cloud and net tech giant said on its blog.&lt;/p&gt;
&lt;p&gt;Asked about reports that Gmail accounts of some Indian diplomats based in China had been hacked, Google declined to comment, saying it had no data of any specific people whose accounts have been hacked.&lt;/p&gt;
&lt;p&gt;But the company pointed fingers at China.&lt;/p&gt;
&lt;p&gt;"This campaign, which appears to originate from Jinan in China, affected what seem to be the personal Gmail accounts of hundreds of users, including senior US government officials, Chinese political activists, officials in several Asian countries ( predominantly South Korea), military personnel and journalists, among others," a posting on the companys official blog said.&lt;/p&gt;
&lt;p&gt;Indian experts, too, blame Chinese hackers. "China poses a serious threat to our national security as these hacking issues dont just seem to stop," Ahmedabadbased cybercrime consultant Sunny Vaghela said.&lt;/p&gt;
&lt;p&gt;The hackers probably targeted Gmail because of the number of users they have, Vaghela added.&lt;/p&gt;
&lt;p&gt;All regimes have now started implementing surveillance mechanisms on the Internet. This is a disturbing trend all over the world.&lt;/p&gt;
&lt;p&gt;China has supremacy on it mainly because they are an early adopter of Internet surveillance and content filtering mechanisms,” a software consultant based in Bangalore, Anivar Aravind, said.&lt;/p&gt;
&lt;p&gt;"Its become more about proving a point. Hackers want to tell people that I can hack into your system and show its vulnerability," Center for Internet and Society director of research in Bangalore Nishant Shah said.&lt;/p&gt;
&lt;p&gt;But LulzSec has its own logic: "Our goal here is not to come across as master hackers… Why do you put such faith in a company that allows itself to become open to these simple attacks?"&lt;/p&gt;
&lt;p&gt;Online Safety Measures&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Secure your Email:&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Change passwords often&lt;/li&gt;&lt;li&gt;Use the Gmail feature to check your “ last account activity”. It shows the IP address ( denoting a specific computer) used to access your email &lt;br /&gt;&lt;/li&gt;&lt;li&gt;Do not open unknown email attachments&lt;/li&gt;&lt;li&gt;Do not store sensitive and personal data in email accounts&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Things to Avoid&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Do not visit unknown sites; Use different passwords for different accounts&amp;nbsp;&lt;/li&gt;&lt;li&gt;Do not divulge credit card numbers over emails or on social networks&amp;nbsp;&lt;/li&gt;&lt;li&gt;Keep track of your credit/ debit card account&amp;nbsp;&lt;/li&gt;&lt;li&gt;For online transactions use encrypted websites. Look for SSL certificate or padlock icon&lt;br /&gt;&lt;br /&gt;Read the original published by Mail Today &lt;a class="external-link" href="http://epaper.mailtoday.in/showstory.aspx?queryed=9&amp;amp;querypage=22&amp;amp;boxid=315562&amp;amp;parentid=54412&amp;amp;eddate=Jun%20%206%202011%2012:00AM&amp;amp;issuedate=NaNundefinedundefined"&gt;here&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/cyber-space-hackers-paradise'&gt;https://cis-india.org/news/cyber-space-hackers-paradise&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2011-08-23T00:58:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
