<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 251 to 265.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-business-line-march-25-2016-bhavya-dore-securing-internets-future"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/securing-e-governance-event-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sectoral-privacy-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/second-privacy-and-surveillance-july-4-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sebi-and-communication-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/papers/ebola-a-big-data-disaster"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-news-minute-geetika-mantri-september-28-2019-sc-directs-govt-to-further-regulate-social-media"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/sameet-panda-impact-of-the-jam-trinity-on-pension-pds-in-odisha-during-covid-19"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf">
    <title>Security, Surveillance and Data Sharing Schemes and Bodies in India</title>
    <link>https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf'&gt;https://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-03-14T02:35:31Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/security-governments-data-technology-policy">
    <title>Security, Governments, and Data: Technology and Policy</title>
    <link>https://cis-india.org/internet-governance/events/security-governments-data-technology-policy</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society and the Observer Research Foundation invite you to a one day conference on January 8, 2015 in New Delhi. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;About the Conference&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The conference will focus on the technologies, policies, and practices around cyber security and surveillance. The conference will reach out to a number of key stakeholders including civil society, industry, government, and academia and explore the present scenario in India to reflect on ways forward.&lt;/p&gt;
&lt;h3 align="left" class="western"&gt;&lt;strong&gt;Conference &lt;/strong&gt;&lt;strong&gt;Context&lt;/strong&gt;&lt;/h3&gt;
&lt;p align="justify"&gt;&lt;span&gt;Ensuring the security of the India’s cyber space is a complex, challenging, and ever changing responsibility that the government is tasked with.  Doing so effectively requires a number of factors to come together in a harmonized strategy including: laws &amp;amp; policies, technical capabilities, markets, and a skilled workforce. It also requires collaboration on multiple levels including with foreign governments, domestic and foreign industry, and law enforcement. The first of these is particularly important given the ability of attackers to penetrate across borders and the global nature of data. Any strategy developed by India must be proactive and reactive – evolving defences to prevent a potential threat and applying tactics to respond to a real time threat. To do so, the government of India must legally have the powers to take action and must have the technical capability to do so. Yet, many of these powers and technical capabilities require a degree of intrusion into the lives of citizens and residents of India through means such as surveillance. Thus, such measures must be considered in light of principles of proportionality and necessity, and legal safeguards are needed to protect against the violation of privacy. Furthermore, a principle of optimization must be considered i.e, how much surveillance achieves the most amount of security and how can this security be achieved with the optimal mix of technology, policy and enforcement.&lt;/span&gt;&lt;/p&gt;
&lt;h3 align="left" class="western"&gt;Panel Descriptions&lt;/h3&gt;
&lt;p align="left"&gt; &lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt;Challenges &amp;amp; Present Scenario&lt;/strong&gt;&lt;/p&gt;
&lt;p align="left"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;span&gt;Protecting and enhancing the cyber security of India is a complex and dynamic responsibility. The challenge of securing cyber space is magnified by the demarcated nature of the internet, the multiplicity of vulnerabilities that can be exploited at the national level, the magnitude of infrastructure damage possible from a cyber attack, and the complexity of application of a jurisdiction’s law to a space that is technologically borderless. A comprehensive ‘cyber security’ ecosystem is required to address such challenges – one that involves technology, skills, and capabilities – including surveillance capabilities.  The Government of India has taken numerous steps to address and resolve such challenges.  In July 2013, the National Cyber Security Policy  was published for the purpose of creating an enabling framework for the protection of India’s cyber security. In February 2014, the 52&lt;/span&gt;&lt;sup&gt;nd&lt;/sup&gt;&lt;span&gt; Standing Committee on Information Technology issued a report assessing the implementation of this policy – in which they found that a number of areas needed strengthening. The Government of India has also proposed the establishment of a number of centres focused on cyber security – such as the National Cyber Coordination Center and the National Critical Information Infrastructure Protection Centre.  CERT-IN, under the Department of Electronics and Information Technology is presently the body responsible for overseeing and enforcing cyber security in India, while other bodies such as the Resource Centre for Cyber Forensic and TERM cells under the Department of Telecommunications play critical roles in overseeing and undertaking capabilities related to cyber security.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Law &amp;amp; Policy&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span&gt;India has five statutes regulating the collection and use of data for surveillance purposes. These laws define circumstances on which the government is justified in accessing and collecting real time and stored data as well as procedural safeguards they must adhere to when doing so. The Department of Telecommunications has also issued the Unified Access License which, among other things,  mandates service providers to provide technical support to enable such collection. The Indian judicial system has also provided a number of Rulings that set standards for the access, collection, and use of data as well as defining limitations and safeguards that must be respected in doing so. The draft Privacy Bill 2011, released by the Department of Personnel and Training, also contained provisions addressing surveillance in the context of interception and the use of electronic video recording devices. In the Report of the Group of Experts on Privacy, the AP Shah Committee found that the legal regime for surveillance in India was not harmonized and lacked safeguards. Furthermore, in the era where the direct collection of large volumes of data is easily possible, there is a growing need to re-visit questions about the legitimate and proportionate collection and use (particularly as evidence) of such data. Questions are also arising about the applicability of standards and safeguards to the state. At a global level, catalyzed by the leaks by Edward Snowden, there has been a strong push for governments to review and structure their surveillance regimes to ensure that they are in line with international human rights standards.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;Architecture &amp;amp; Technology&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;span&gt;India is in the process of architecting a number of initiatives that seek to enable the collection and sharing of intelligence such as the CMS, NATGRID, and NETRA. At a regional level, the Ministry of Home Affairs is in the process of implementing ‘Mega Policing Cities’ which include the instalment of CCTV’s and centralized access to crime related information. Globally, law enforcement and governments are beginning to take advantage of the possibilities created by ‘Big Data’ and ‘open source’ policing. The architecture and technology behind any surveillance and cyber security initiative are key to its success. Intelligently and appropriately designed projects and technology can also minimize the possibility of intrusions into the private lives of citizens. Strong access controls, decentralized architecture, and targeted access are all principles that can be incorporated into the architecture and technology behind a project or initiative. At the same time, the technology or process around a project can serve as the ‘weakest link’ – as it is vulnerable to attacks and tampering. Such possibilities raise concerns about the use of foreign technology and dependencies on foreign governments and companies.&lt;/span&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt;International and Domestic Markets&lt;/strong&gt;&lt;/p&gt;
&lt;p align="justify"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;span&gt;Globally, the security market is growing – with companies offering a range of services and products that facilitate surveillance and can be used towards enhancing cyber security. In India, the security market is also growing with studies predicting that it will reach $1.06 billion by 2015.  Recognizing the potential threat posed by imported security and telecom equipment, India also develops its own technologies through the Centre for Development of Telematics –attached to the Department of Telecommunications, and the Centre for Development of Advanced Computing – attached to the Department of Electronics and Information Technology. At times India has also imposed bans on the import of technologies believed to be compromised.  Towards this end, the Government of India  has a number of bodies responsible for licensing, auditing, and certifying the use of security and telecommunication equipment.  Though India has recognized the security vulnerabilities posed by these technologies, as of yet it has not formally recognized the human rights violations that are made possible. Indeed, though India has submitted a request to be a signing member of the &lt;/span&gt;&lt;span&gt;Wassenaar agreement, they have yet to be accepted.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;11.00&lt;/td&gt;
&lt;td&gt;Registration &amp;amp; Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30&lt;/td&gt;
&lt;td&gt;Key Note Speech&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.00&lt;/td&gt;
&lt;td&gt;Challenges &amp;amp; Present Scenario&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;/td&gt;
&lt;td&gt;Law &amp;amp; Policy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.00&lt;/td&gt;
&lt;td&gt;Architecture &amp;amp; Technology&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.00&lt;/td&gt;
&lt;td&gt;International &amp;amp; Domestic Markets&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.00&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.30&lt;/td&gt;
&lt;td&gt;Conclusion &amp;amp; Closing Remarks&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/security-governments-data-technology-policy'&gt;https://cis-india.org/internet-governance/events/security-governments-data-technology-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-12-24T08:06:59Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy">
    <title>Security, Governments and Data: Technology and Policy </title>
    <link>https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy</link>
    <description>
        &lt;b&gt;On January 8, 2015, the Centre for Internet and Society, in collaboration with the Observer research foundation, hosted the day long conference "Security, Governments, and Data: Technology and Policy"  The conference discussed a range of topics including internet governance, surveillance, privacy, and cyber security. &lt;/b&gt;
        &lt;p&gt;The full report written and compiled by Lovisha Aggarwal and Nehaa Chaudhari and edited by Elonnai Hickok &lt;a href="https://cis-india.org/internet-governance/blog/security-governments-data-technology-policy.pdf" class="internal-link"&gt;can be accessed here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The conference was focused on the technologies, policies, and practices around cyber security and surveillance. The conference reached out to a number of key stakeholders including civil society, industry, law enforcement, government, and academia and explored the present scenario in India to reflect on ways forward. The conference was a part of CIS’s work around privacy and surveillance, supported by Privacy International.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Welcome Address&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The welcome address opened with a reference to a document circulated by CIS in 2014 which contained hypothetical scenarios of potential threats to Indian cyber security. This document highlighted the complexity of cyber security and the challenges that governments face in defending their digital borders. When talking about cyber security it is important that certain principles are upheld and security is not pursued only for the sake of security. This approach allows for security to be designed and to support other rights such as the right of access, the right to freedom of expression, and the right to privacy. Indeed, the generation, use, and protection of communications data by the private sector and the government are a predominant theme across the globe today. This cannot be truer for India, as India hosts the third largest population on the internet in the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the welcome, a brief introduction to the Centre for Internet and Society was given. It was noted that CIS is a 6.5 half year old organization that is comprised of lawyers, mathematicians, sociologists, and computer scientists and works across multiple focus areas including accessibility, internet governance, telecom, openness, and access to knowledge. CIS began researching privacy and surveillance in 2010, and has recently begun to expand their research into cyber security. The purpose of this is to understand the relationship between privacy, surveillance, and security and is the beginning of a learning process for CIS. In 2013 CIS undertook a process to attempt to evolve a legal regime to intelligently and adequately deal with privacy in India. Industry specific requirements are key in the Indian context and this process was meant to try and evolve a consensus on what a privacy law in India should look like by bringing together key stakeholders for roundtables. CIS is now in the final stages of preparing individual legal proposals that will be sent to the Government – to hopefully have an informed Privacy Law in India. This event represents CIS’s first attempt to have a simultaneous dialogue on surveillance, cyber security, and privacy. As part of this event and research CIS is trying to understand the technology and market involved in surveillance and cyber security as these are important factors in the development of policy and law.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy'&gt;https://cis-india.org/internet-governance/blog/security-governments-datat-technology-and-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-04-04T05:59:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-research">
    <title>Security Research</title>
    <link>https://cis-india.org/internet-governance/blog/security-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives.&lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Research on the issue of privacy in different sectors in India.&lt;/li&gt;
&lt;li&gt;Monitoring projects, practices, and policies around those sectors.&lt;/li&gt;
&lt;li&gt;Raising public awareness around the issue of privacy, in light of varied projects, industries, sectors and instances.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;State surveillance in India has been carried out by Government agencies for many years. Recent projects include: NATGRID, CMS, NETRA, etc. which aim to overhaul the overall security and intelligence infrastructure in the country. The purpose of such initiatives has been to maintain national security and ensure interconnectivity and interoperability between departments and agencies. Concerns regarding the structure, regulatory frameworks (or lack thereof), and technologies used in these programmes and projects have attracted criticism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance/Security Research -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Central Monitoring System -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Central Monitoring System or CMS is a clandestine mass electronic surveillance data mining program installed by the Center for Development of 	Telematics (C-DOT), a part of the Indian government. It gives law enforcement agencies centralized access to India's telecommunications network and the 	ability to listen in on and record mobile, landline, satellite, Voice over Internet Protocol (VoIP) calls along with private e-mails, SMS, MMS. It also 	gives them the ability to geo-locate individuals via cell phones in real time.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Central Monitoring System: Some Questions to be Raised in Parliament &lt;span&gt;http://bit.ly/1fln2vu&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; India´s ´Big Brother´: The Central Monitoring System (CMS) &lt;a href="http://bit.ly/1kyyzKB"&gt;http://bit.ly/1kyyzKB&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; India's Central Monitoring System (CMS): Something to Worry About? &lt;a href="http://bit.ly/1gsM4oQ"&gt;http://bit.ly/1gsM4oQ&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; C-DoT's surveillance system making enemies on internet 	&lt;a href="http://cis-india.org/news/dna-march-21-2014-krishna-bahirwani-c-dots-surveillance-system-making-enemies-on-internet"&gt; http://cis-india.org/news/dna-march-21-2014-krishna-bahirwani-c-dots-surveillance-system-making-enemies-on-internet &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2. Surveillance Industry : Global And Domestic -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance industry is a multi-billion dollar economic sector that tracks individuals along with their actions such as e-mails and texts. With the 	cause for its existence being terrorism and the government's attempts to fight it, a network has been created that leaves no one with their privacy. All 	that an individual does in the digital world is suspect to surveillance. This included surveillance in the form of snooping where an individual's phone 	calls, text messages and e-mails are monitored or a more active kind where cameras, sensors and other devices are used to actively track the movements and 	actions of an individual. This information allows governments to bypass the privacy that an individual has in a manner that is considered unethical and 	incorrect. This information that is collected also in vulnerable to cyber-attacks that are serious risks to privacy and the individuals themselves. The 	following set of articles look into the ethics, risks, vulnerabilities and trade-offs of having a mass surveillance industry in place.&lt;/p&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance Technologies http://bit.ly/14pxg74 &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;New Standard Operating Procedures for Lawful Interception and Monitoring &lt;span&gt;http://bit.ly/1mRRIo4&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Video Surveillance and Its Impact on the Right to Privacy 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/video-surveillance-privacy"&gt; http://cis-india.org/internet-governance/blog/privacy/video-surveillance-privacy &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;More than a Hundred Global Groups Make a Principled Stand against Surveillance 	&lt;a href="http://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance"&gt; http://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Models for Surveillance and Interception of Communications Worldwide 	&lt;a href="http://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide"&gt; http://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Why 'Facebook' is More Dangerous than the Government Spying on You 	&lt;a href="http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you"&gt; http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Difficult Balance of Transparent Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance"&gt; http://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; UK's Interception of Communications Commissioner - A Model of Accountability 		&lt;a href="http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability"&gt; http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India 		&lt;a href="http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"&gt; http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; State Surveillance and Human Rights Camp: Summary &lt;a href="http://bit.ly/ZZNm6M"&gt;http://bit.ly/ZZNm6M&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India Subject to NSA Dragnet Surveillance! No Longer a Hypothesis - It is Now Officially Confirmed		&lt;a href="http://bit.ly/1eqtD8g"&gt;http://bit.ly/1eqtD8g&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Spy Files 3: WikiLeaks Sheds More Light on the Global Surveillance Industry &lt;a href="http://bit.ly/1d6EmjD"&gt;http://bit.ly/1d6EmjD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance Camp IV: Disproportionate State Surveillance - A Violation of Privacy &lt;a href="http://bit.ly/1ilTJts"&gt;http://bit.ly/1ilTJts&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Hacking without borders: The future of artificial intelligence and surveillance &lt;a href="http://bit.ly/1kWiwGv"&gt;http://bit.ly/1kWiwGv&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Driving in the Surveillance Society: Cameras, RFID tags and Black Boxes &lt;a href="http://bit.ly/1mr3KTH"&gt;http://bit.ly/1mr3KTH&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Policy Brief: Oversight Mechanisms for Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance"&gt; http://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;3. Judgements By the Indian Courts -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance industry in India has been brought before the court in different cases. The following articles look into the cause of action in these 	cases along with their impact on India and its citizens.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Anvar v. Basheer and the New (Old) Law of Electronic Evidence 	&lt;a href="http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"&gt; http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Gujarat High Court Judgement on the Snoopgate Issue 	&lt;a href="http://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue"&gt; http://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;4. International Privacy Laws -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Due to the universality of the internet, many questions of accountability arise and jurisdiction becomes a problem. Therefore certain treaties, agreements 	and other international legal literature was created to answer these questions. The articles listed below look into the international legal framework which 	governs the internet.&lt;/p&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Learning to Forget the ECJ's Decision on the Right to be Forgotten and its Implications 		&lt;a href="http://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications"&gt; http://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy and Security Can Co-exist		&lt;a href="http://cis-india.org/internet-governance/blog/privacy-and-security"&gt;http://cis-india.org/internet-governance/blog/privacy-and-security&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; European Union Draft Report Admonishes Mass Surveillance, Calls for Stricter Data Protection and Privacy Laws 		&lt;a href="http://cis-india.org/internet-governance/blog/european-union-draft-report-admonishes-mass-surveillance"&gt; http://cis-india.org/internet-governance/blog/european-union-draft-report-admonishes-mass-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Draft International Principles on Communications Surveillance and Human Rights &lt;a href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Indian Surveillance Framework -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government's mass surveillance systems are configured a little differently from the networks of many countries such as the USA and the UK. This 	is because of the vast difference in infrastructure both in existence and the required amount. In many ways, it is considered that the surveillance network 	in India is far worse than other countries. This is due to the present form of the legal system in existence. The articles below explore the system and its 	functioning including the various methods through which we are spied on. The ethics and vulnerabilities are also explored in these articles.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Paper-thin Safeguards and Mass Surveillance in India - 	&lt;a href="http://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india"&gt; http://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers! - 	&lt;a href="http://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt; http://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Surveillance Industry in India - An Analysis of Indian Security Expos 	&lt;a href="http://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos"&gt; http://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;GSMA Research Outputs: different legal and regulatory aspects of security and surveillance in India	&lt;a href="http://cis-india.org/internet-governance/blog/gsma-research-outputs"&gt;http://cis-india.org/internet-governance/blog/gsma-research-outputs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Way to watch 		&lt;a href="http://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch"&gt; http://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Free Speech and Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/free-speech-and-surveillance"&gt; http://cis-india.org/internet-governance/blog/free-speech-and-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance rises, privacy retreats 		&lt;a href="http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats"&gt; http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Freedom from Monitoring: India Inc. should Push For Privacy Laws 	&lt;a href="http://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring"&gt; http://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Surat's Massive Surveillance Network Should Cause Concern, Not Celebration 	&lt;a href="http://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration"&gt; http://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Vodafone Report Explains Government Access to Customer Data 	&lt;a href="http://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data"&gt; http://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Review of the Functioning of the Cyber Appellate Tribunal and Adjudicator officers under the IT Act 	&lt;a href="http://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act"&gt; http://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Comparison of Indian Legislation to Draft International Principles on Surveillance of Communications	&lt;a href="http://bit.ly/U6T3xy"&gt;http://bit.ly/U6T3xy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;SEBI and Communication Surveillance: New Rules, New Responsibilities? &lt;a href="http://bit.ly/1eqtD8g"&gt;http://bit.ly/1eqtD8g&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Snooping Can Lead to Data Abuse		&lt;a href="http://cis-india.org/internet-governance/blog/snooping-to-data-abuse"&gt;http://cis-india.org/internet-governance/blog/snooping-to-data-abuse&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Big Brother is Watching You &lt;a href="http://bit.ly/1arbxwm"&gt;http://bit.ly/1arbxwm&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Moving Towards a Surveillance State 		&lt;a href="http://cis-india.org/internet-governance/blog/moving-towards-surveillance-state"&gt; http://cis-india.org/internet-governance/blog/moving-towards-surveillance-state &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; How Surveillance Works in India 		&lt;a href="http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india"&gt; http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Big Democracy, Big Surveillance: India's Surveillance State http://bit.ly/1nkg8Ho &lt;/li&gt;
&lt;li&gt; Can India Trust Its Government on Privacy? 		&lt;a href="http://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy"&gt; http://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Indian surveillance laws &amp;amp; practices far worse than US 		&lt;a href="http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us"&gt; http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Security, Surveillance and Data Sharing Schemes and Bodies in India 		&lt;a href="http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf/view"&gt; http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf/view &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Policy Paper on Surveillance in India 		&lt;a href="http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-indiahttp:/cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"&gt; http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-indiahttp://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Constitutionality of Indian Surveillance Law: Public Emergency as a Condition Precedent for Intercepting Communications 		&lt;a href="http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law"&gt; http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 1: Foundations http://bit.ly/1ntqsen &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 2: Gobind and the Compelling State Interest Test		&lt;a href="http://bit.ly/1dH3meL"&gt;http://bit.ly/1dH3meL&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 3: The Public/Private Distinction and the Supreme Court's Wrong Turn		&lt;a href="http://bit.ly/1kBosnw"&gt;http://bit.ly/1kBosnw&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Mastering the Art of Keeping Indians Under Surveillance 		http://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-research'&gt;https://cis-india.org/internet-governance/blog/security-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:55:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights">
    <title>Security and Surveillance: A public discussion on Optimizing Security while Safeguarding Human Rights</title>
    <link>https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to a public discussion on optimizing security and safeguarding human rights at its Bangalore office on Friday, December 19th, 2014, 16:00 to 18:00.&lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society, in collaboration with Privacy International UK, has undertaken exploratory research into surveillance, security, and the security market in India.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Through this research, we hope to understand and document policy and law associated with security, surveillance, and the security market in India and learn about the regulation of security and related technologies such as encryption, filtering, monitoring software, and interception equipment. We also hope to understand the import and export policy regime for dual use technologies.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Such findings will be critical in creating evidence based research to inform security policy and regulation in India and work towards enabling regulatory frameworks that optimize the nation’s security while protecting the rights of citizens.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights'&gt;https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-19T08:46:34Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights">
    <title>Security and Surveillance – Optimizing Security while Safeguarding Human Rights</title>
    <link>https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) on December 19, 2014 held a talk on “Security and Surveillance – Optimizing Security while Safeguarding Human Rights.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The talk focused on a project that is being undertaken by CIS in collaboration with Privacy International, UK. Initiated in 2014, the project seeks to study the regulatory side of surveillance and related technologies in the Indian context. The main objective of the project is to initiate dialogue on surveillance and security in India, government regulation, and the processes that go into the same. The talk saw enthusiastic participation from civil society members, policy advisors on technology, and engineering students.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the event it was highlighted that requirements of judicial authorization, transparency and proportionality are currently lacking in the legal regime for surveillance in India and at the same time India has a strong system of ‘security’ that service providers must adhere to – which works towards enhancing cyber security in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Discussions played out with regard to how most of the nine intelligence agencies that are authorized to intercept information in India are outside the ambit of parliamentary oversight, the RTI and the CAG, making them virtually unaccountable to the Indian public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another conversation focused on the sharing of information between various intelligence agencies within the country, and the fact that this area is virtually unregulated. The discussion then steered to cyber-security in general, emerging technologies used by the Government of India for surveillance, cooperative agreements for surveillance technologies that India has with other countries, the export and import of such technologies from India, and most importantly, the role of service providers in the surveillance debate, and the regulations they are subject to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A common theme seemed to be emerging from the discussion was that the agencies responsible for regulating information interception and surveillance in the country are shockingly unaccountable to the Indian public. As an active civil society member noted today - &lt;i&gt;“There is no oversight/monitoring of the agencies themselves, so there’s no way anyone would even know of how many instances of surveillance or unauthorized interception have actually occurred.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The talk successfully concluded with inputs from members of the audience, and a broad consensus on the fact that the Government of India would have to adhere to stronger regulatory standards, harmonized surveillance standards, stronger export and import certification standards, etc., in order to make surveillance in India more transparent and accountable. As was stated at the talk, &lt;i&gt;“We don’t have a problem with the concept of surveillance per se, - it has more to do with its problematic implementation”.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights'&gt;https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-02-13T02:41:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-business-line-march-25-2016-bhavya-dore-securing-internets-future">
    <title>Securing the internet’s future</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-business-line-march-25-2016-bhavya-dore-securing-internets-future</link>
    <description>
        &lt;b&gt;Mike Godwin, who proposed the eponymous law about online discussion threads, speaks about net neutrality, differential pricing and why no government is likely to oppose stricter surveillance measures.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Bhavya Dore was published in &lt;a class="external-link" href="http://www.thehindubusinessline.com/blink/meet/securing-the-internets-future/article8390016.ece"&gt;Hindu Businessline&lt;/a&gt; on March 25, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;For gravity, there’s Newton’s law, for internet discussion threads, there’s Godwin’s law. Twenty-five years ago, a law student trawling through cyberspace noticed a recurring pattern: at some point in an online discussion, someone would invariably invoke Hitler or the Nazis. The observation led to an act of ‘mimetic engineering’ — rifling through discussion boards, pointing this out, and promptly naming the law after him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Godwin’s law states: As an online discussion grows longer, the probability of a comparison involving Nazis or Hitler approaches one — that is, the likelier this becomes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mike Godwin, 59, a portly, white-haired gent in Harry Potter glasses is best known for this aphoristic piece of wisdom. “The purpose,” he says, “was to make the people who engaged in frivolous comparisons of atrocities seem like they weren’t thinking.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is generally understood that when one of the arguers is falling back on the Nazis as rhetorical shorthand, that person is starting to lose the argument.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“It certainly means one of the arguers has gone to a higher or lower level,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Godwin was in India in February as part of a series of talks organised through the Centre for Internet and Society on net neutrality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In early February, at the Mumbai University’s civics and politics department, he was on a panel with three others at a discussion that occasionally took an agitated tone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“[The debate] hasn’t become heated in every country to the same degree,” he said. “In India it has.” The public discussion has been polarised, with activists vehemently opposing, among other things, ‘Free Basics’ — a Facebook offering. On February 8, the telecom regulator ruled against differential pricing, debarring telecom operators from offering slices of the internet at different prices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Godwin doesn’t see net neutrality and differential pricing as mutually exclusive. “I think some forms [of differential pricing] are potentially good and some forms are potentially bad,” he said. “And the regulator has to look closely and make a determination about the harms or benefits.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Godwin has worked with the Wikimedia Foundation, which offered Wikipedia Zero for free in some countries through specific providers, as a gateway to Wikipedia. But he isn’t trying to convince you one way or the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“[There is] an idea that there was something valuable about carriers [service providers] being neutral,” he said. “And I still think that that’s true… But the thing that changed was this: with Wikipedia, I realised it doesn’t matter if you have neutrality if nobody can afford it. Neutrality hasn’t served the people who can’t afford to pay to have the wires built up to their provinces.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This then boils down to the fundamental question: how do we create a world that gets people connected? “It may involve cross-subsidies of various sorts, and all of these things historically have invited some degree of government regulation,” said Godwin. “The question is less ‘do you regulate or not regulate’, the question is ‘do you do it right’.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But does Free Basics mean anything to a developing country which needs real basics first: water, sanitation, shelter? Godwin doesn’t buy into the premise that the internet is a luxury that comes after all these things.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I think that [idea] is wrong,” he said. “Because when people can share information or resources about where the water is or what good health practices are or how to properly cultivate a crop, they help everyone else. And the impulse to help and share what they know is strong.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Godwin’s first law has now been well entrenched in popular culture. But wait, he has a second one. This one goes: Surveillance is the crack cocaine of governments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Almost all governments want to engage in surveillance,” he said. “Some governments have disagreements with other governments over their surveillance but rarely will we see them categorically refuse to surveil.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And yet, he says, our outrage over this is driven by an “antiquated notion of privacy” that the content of our emails or conversations should be free from prying eyes. “In the rest of the century and future centuries people will look back at this idea and laugh: that people thought that content was the important thing,” he said. Someone reading your mail isn’t the only possible violation, but whether they are accessing the whole ecosystem of your communication. “The metadata can give away the whole store,” he said. “The metadata can be more revealing. Who are you talking to, at what time of day, for how long, how big is the message? These are all things that can matter.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That’s not the only thing that’s changed. The internet has, since its early days, become a more charged, more violent place, where poison, bile and abuse fly thick and fast.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The level of hatefulness directed towards women online is particularly bad,” he continued, “It is a huge cross-cultural problem.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other enduring problem is how do you balance free speech rights while curtailing hate speech? “If there were an easy answer I’d tell you what it is,” said Godwin.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Still, banning or blocking sites, as the Indian government has been in the past eager to do, is hardly a solution. “I won’t say there is never an argument for it,” said Godwin, pausing a beat, “I will say that I have never heard one that was any good.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-business-line-march-25-2016-bhavya-dore-securing-internets-future'&gt;https://cis-india.org/internet-governance/news/the-hindu-business-line-march-25-2016-bhavya-dore-securing-internets-future&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-03-28T02:24:35Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/securing-e-governance-event-report">
    <title>Securing e-Governance</title>
    <link>https://cis-india.org/internet-governance/securing-e-governance-event-report</link>
    <description>
        &lt;b&gt;On June 16, 2012, Privacy India in partnership with the Centre for Internet &amp; Society, Bangalore, International Development Research Centre, Canada, Privacy International, UK and the Society in Action Group, Gurgaon organised a public discussion on “Securing e-Governance: Ensuring Data Protection and Privacy”, at the Ahmedabad Management Association. &lt;/b&gt;
        &lt;p&gt;The conversation brought together a cross section of citizens, lawyers, activists, researchers, academia and students.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Prashant.jpg/@@images/7d25500b-2486-4674-9b83-5584b672cf38.jpeg" alt="Prashant Iyengar" class="image-inline" title="Prashant Iyengar" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Prashant Iyengar, &lt;/b&gt;&lt;b&gt;Assistant Professor, Jindal Global Law,&lt;/b&gt; opened the conference with an explanation of Privacy India’s mandate to  raise awareness, spark civil action and promote democratic dialogue  around privacy challenges and violations in India. He summarized the  series of eight consultation previously organized across India in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary"&gt;Kolkata&lt;/a&gt; on January 23, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-conferencebanglaore"&gt;Bangalore&lt;/a&gt; on February 5, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad"&gt;Ahmedabad&lt;/a&gt; on March 26, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report"&gt;Guwahati&lt;/a&gt; on June 23, 2011, in &lt;a href="https://cis-india.org/internet-governance/privacy-chennai-report.pdf/view"&gt;Chennai&lt;/a&gt; on August 6, 2011, in &lt;a href="https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill"&gt;Mumbai&lt;/a&gt; on January 21, 2012, in &lt;a href="https://cis-india.org/internet-governance/all-india-privacy-delhi-report"&gt;New Delhi&lt;/a&gt; on February 3, 2012 and again in &lt;a href="https://cis-india.org/internet-governance/high-level-privacy-conclave"&gt;New Delhi&lt;/a&gt; on February 4, 2012.&lt;/p&gt;
&lt;p&gt;He described an egregious instance where the State Government of  Karnataka, announced a plan to “post on its website all details of (1.51  crore) ration cardholders in the state”, to weed out duplicate ration  cards and promote transparency. Details posted on the website would  include the “ration card number, category of card (BPL/APL), names and  photographs of the head and other members of a family, address, sources  of income, LPG gas connection and number of cylinders in  village/taluk/district wise.” An official said, “This would also work as  a marriage bureau, for instance, a boy can see a photograph of a girl  on the website and see whether she suits him”.&lt;a href="#_ftn1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;He described another embarrassing incident, which took place in 2008.  Sixteen surveillance cameras were stolen from the Taj Mahal. After they  had been replaced, in December 2010, it was reported that all of the  CCTVs in the Taj Mahal had stopped working due to a “virus attack” on  their computer systems. The district administration and the police  department were apparently in disagreement as to who bore the burden of  their maintenance.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Prof. Subhash Bhatnagar, Advisor Center for e-Governance IIM, Ahmedabad&lt;/b&gt;,  dismissed the notion that privacy is irrelevant in India. A survey on  e-governance, of 50,000 people conducted in major cities of India shows  that confidentiality and security of data were among the top 3 concerns  among 20 choices. He discussed various mission mode projects in the  National e-Governance Plan that holds and shares large amounts of data  on individuals and business. He referred to his personal experience when  enrolling for UID. He noticed that the box concerning consent for  sharing of information with third parties was, by default, automatically  ticked. When he asked the UID staff, they mentioned that the software  does not allow for enrollment to continue if the box is not ticked. He  called for increased vigilance among citizens, a phone helpline  dedicated to resolution of privacy intrusions and sensitizing designers  of e-Governance projects.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Subhash.jpg/@@images/1bc58ead-4318-430d-bc78-b892513ad498.jpeg" alt="Subhash Bhatnagar" class="image-inline" title="Subhash Bhatnagar" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Nityesh.jpg/@@images/2e28525b-1577-4abb-96c8-68284ac72f46.jpeg" alt="Nityesh Bhatt" class="image-inline" title="Nityesh Bhatt" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Dr. Nityesh Bhatt, Sr. Associate Prof and Chairperson-Information   Management Area, Institute of Management, Nirma University, Ahmedabad,&lt;/b&gt;&lt;i&gt; &lt;/i&gt;stressed   the importance of limiting access of information on a need-to-know   basis, which is one of the most fundamental security principles. He   described various characteristics of information security management   including: planning, policy, programs, protection, people and project   management. Lastly, he recommended ‘SETA’ as an essential program,   designed to reduce the incidence of accidental security breaches by   employees, contractors, consultants, vendors, and business partners. A   SETA program consists of three elements: security education, security  training, and security awareness. It can improve employee behavior and  enables the organization to hold employees accountable for their  actions.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Dr. Neeta Shah, &lt;/b&gt;&lt;b&gt;Director (e-Governance) Gujarat Informatics Limited,&lt;/b&gt;&lt;i&gt; &lt;/i&gt;described   the extent of e-governance initiatives in Gujarat (there are more than   100 e-governance applications running) and its impact. She discussed   successful e-governance initiatives that have helped solve critical   problems such as the online teacher application process, which   accelerates the recruitment process of primary teachers.&lt;/p&gt;
&lt;p&gt;E-governance applications of various departments ensure security of data and privacy protection through the following measures:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Network security (NIPS, Firewalls, content filtering, HIPS, antivirus, etc.)&lt;/li&gt;
&lt;li&gt;Data security (robust SAN environment with high raid levels to prevent any data loss)&lt;/li&gt;
&lt;li&gt;Application security (audited by empanelled TPA)&lt;/li&gt;
&lt;li&gt;DR/BCP provisioning (real-time data is replicated to DR site in case  of any physical calamity or damage to resources at primary site, backup  exists at remote different seismological locations)&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;When  designing e-government projects, the government tends to think about  security of the system, but not privacy of the data. Security in the  minds of the government is achieved through strengthening  infrastructure, but they often overlook the human dynamic.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Neeta.jpg/@@images/6f2d5dba-dac7-4743-ad72-72b47f919575.jpeg" alt="Neeta Shah" class="image-inline" title="Neeta Shah" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Gopalkrishnan Devnathan (Kris dev), Co-founder, International Transparency and Accountability Network,&lt;/b&gt;&lt;i&gt; &lt;/i&gt;described  e-Governance as the application of Information and Communication  Technology for delivering government services. It involves the  integration of various systems and services between  Government-to-Citizens, Government-to-Business, Government-to-Government  as well as back office processes and interactions within the entire  government framework. E-governance initiatives can ensure privacy and  security through:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Securing data/transaction using Smart Card with triple access control, Card, PIN and Biometrics (multimodal)&lt;/li&gt;
&lt;li&gt;Mirrored data storage with proper security&lt;/li&gt;
&lt;li&gt;Indelible audit trail using encrypted flat file&lt;/li&gt;
&lt;li&gt;Prevent server intrusion and data theft upfront rather than do post-mortem analysis&lt;/li&gt;
&lt;li&gt;Information on data accessed can be communicated on real time basis using ICT tools&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Lastly, he&lt;i&gt; &lt;/i&gt;identified the usefulness, inhibitions and potential security solutions for the Unique Identification System.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Gopalakrishnan.jpg/@@images/cb006e36-05e6-410f-87de-a179119a5023.jpeg" alt="Gopalakrishnan Devnathan" class="image-inline" title="Gopalakrishnan Devnathan" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Anindya.jpg/@@images/1f025dc0-c8bd-4df9-af39-dbabdfb83521.jpeg" alt="Anindya Kumar" class="image-inline" title="Anindya Kumar" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Anindya Kumar Banerjee, Regional Manager- East, CG &amp;amp; MP at Ncomputing Inc., &lt;/b&gt;discussed a comparative analysis of e-governance initiatives in India. He analyzed various factors such as ease of use, simplicity of procedures, time savings compared to manual, affordable cost of service and reduction in corruption. He described the difference infrastructural threats of security and privacy in e-Governance.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;&lt;b&gt;Dr. Mrinalini Shah, Professor of Operations Management at Institute of Management Technology, Ghaziabad&lt;/b&gt;&lt;i&gt; &lt;/i&gt;identified  the slow legal system and multiple jurisdiction system as a challenge  for privacy and security of data and implementations of suitable access  controls and authorization as a helping factor.&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Mrinalini.jpg/@@images/efdbd8d4-d5d6-4a3d-9360-6aaa79acfaa2.jpeg" alt="Mrinalini Shah" class="image-inline" title="Mrinalini Shah" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Utkarsh.jpg/@@images/28ea0c0e-9ede-436c-bca6-12fd6f748c37.jpeg" alt="Utkarsh Jani" class="image-inline" title="Utkarsh Jani" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Utkarsh Jani, Advocate, Jani Advocates&lt;/b&gt;, described the relevant section of the Information Technology Act (ITA) relating to privacy and the political and social challenges surrounding the right to privacy. He discussed the right to privacy vis-à-vis data protection.  Though the ITA does enforce a level of data protection, it is far from flawless.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ITA lacks the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The definition and classification of data types.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The nature and protection of the categories of data.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Data controllers and data processors have distinct &lt;/li&gt;
&lt;li&gt;Clear restrictions on the manner of data collection.&lt;/li&gt;
&lt;li&gt;Clear guidelines on the purposes for which the data can be put and to whom it can be sent.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Standards and technical measures governing the collection, storage, access to, protection, retention and destruction of data.&lt;/li&gt;
&lt;li&gt;It does not provide strong safeguard and penalties against the aforesaid breaches. &lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;S&lt;b&gt;unny Vaghela, Founder and CTO, TechDefence Pvt. Ltd&lt;/b&gt;., provided a hacker’s perspective to security and privacy issues in e-governance. Cyber crimes such as privacy violations and data breaches are increasing because of the dependence on complex computer infrastructures. Complex computer infrastructures make systems vulnerable because if one application is hacked, the entire network can be accessed and compromised.&lt;/p&gt;
&lt;p&gt;He conducted a live demonstration, showing how simple it is to hack into a government website. From his personal experience as an ethical hacker, he stated that government agencies are extremely negligent about the privacy and the security of data. A major concern with e-governance websites is that they not designed with privacy in mind, leaving the personal and private details of citizens vulnerable.&lt;/p&gt;
&lt;p&gt;He called for full penetration testing and vulnerability assessment of  e-governance portals in order to maintain the privacy of citizens and  protect government data. Some government websites that were hacked  include AMC e-governance (was awarded one best e-governance award in  2010), CBI server and the Income Tax of India server.&lt;/p&gt;
&lt;p&gt;Lastly, he described the frequent mistakes made by the government in  e-Governance projects. The government started using the e-Governance  systems in 2003. Typically, three things are a component of the  application: the person, the source code and the database, but the  security is on the network. Governments work on developing the network  to be secure, but they often overlook the application. A solution to  this could be the use of high interaction honey pots.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Sunny.jpg/@@images/3fbba656-7cad-49f4-8563-3bc50e958198.jpeg" alt="Sunny Vaghela" class="image-inline" title="Sunny Vaghela" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/NishaThompson.jpg/@@images/f03f05bb-ba12-421f-a921-47f4b80b17c2.jpeg" alt="Nisha Thompson" class="image-inline" title="Nisha Thompson" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;b&gt;Nisha Thompson, Data Project Manager at Arghyam/ India Water Portal&lt;/b&gt;, discussed the increased amount of data generated through e-governance initiatives and its impact. When more data is generated and collected, politics and privacy become intertwined. There can be a conflict between opening up data and privacy thus; one needs to decide on parameters. For example, with regards to privacy and national security, parameters should be in place to determine where privacy ends and the public good starts. In India, this line does not begin with the individual as it does in many contexts. Collective privacy in India is important. She described various online tools that increase transparency and awareness such as: Transparency Chennai, India Governs and I Paid a Bribe.&lt;/p&gt;
&lt;p&gt;Over the course of the day, participants engaged in lively discussion on various issues such as the objectives and features of e-governance, examples of e-governance projects, and the parameters, problems, loopholes and tensions in e-governance projects.&lt;/p&gt;
&lt;p&gt;Participants response to privacy concerns have to a large extent focused on the fact that e-Governance is a double-edge sword. E-governance initiatives are an invariable tool for ensuring wider participation and deeper involvement of citizens, institutions, NGOs as well as private firms in the decision making process. However, the political and regulatory environment must be strengthened.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_participants.jpg/@@images/cc15001d-bf85-4b07-9eb8-c87cb6dcc50f.jpeg" alt="Participants" class="image-inline" title="Participants" /&gt;&lt;/p&gt;
&lt;h3&gt;About Privacy India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Privacy India was established in 2010 with the objective of raising awareness, sparking civil action and promoting democratic dialogue around privacy challenges and violations in India. One of our goals is to build consensus towards the promulgation of comprehensive privacy legislation in India through consultations with the public, policymakers, legislators and the legal and academic community.&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p&gt;&lt;a href="#_ftnref1"&gt;[1]&lt;/a&gt; Nagesh Prabhu, A way to check bogus ration cards, THE HINDU, September 18, 2010, &lt;a href="http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/article696087.ece"&gt;http://www.thehindu.com/todays-paper/tp-national/tp-karnataka/article696087.ece&lt;/a&gt; (last visited Oct 23, 2011).&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click below to download the following resources:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="resolveuid/fc0269aba5d44a5488c08aefe92d58d2" class="internal-link"&gt;E-Governance, Identity and Privacy&lt;/a&gt; [PDF, 253 Kb]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/securing-e-governance-programme.pdf" class="internal-link"&gt;Event Brochure&lt;/a&gt; [PDF, 1618 Kb]&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/securing-e-governance-event-report'&gt;https://cis-india.org/internet-governance/securing-e-governance-event-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>natasha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-06-26T06:45:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sectoral-privacy-research">
    <title>Sectoral Privacy Research</title>
    <link>https://cis-india.org/internet-governance/blog/sectoral-privacy-research</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, India has been researching privacy in India since the year 2010, with special focus on the following issues.&lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Research on the issue of privacy in different sectors in India.&lt;/li&gt;
&lt;li&gt;Monitoring projects, practices, and policies around those sectors.&lt;/li&gt;
&lt;li&gt;Raising public awareness around the issue of privacy, in light of varied projects, industries, sectors and instances.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Right to Privacy has evolved in India since many decades, where the question of it being a Fundamental Right has been debated many times in courts of Law. With the advent of information technology and digitisation of the services, the issue of Privacy holds more relevance in sectors like Banking, Healthcare, Telecommunications, ITC, etc., The Right to Privacy is also addressed in light of the Sexual minorities, Whistle-blowers, Government services, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sectors -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Consumer Privacy and other sectors -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consumer privacy laws and regulations seek to protect any individual from loss of privacy due to failures or limitations of corporate customer privacy 	measures. The following articles deal with the current consumer privacy laws in place in India and around the world. Also, privacy concerns have been 	considered along with other sectors like Copyright law, data protection, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Consumer Privacy - How to Enforce an Effective Protective Regime? &lt;a href="http://bit.ly/1a99P2z"&gt;http://bit.ly/1a99P2z&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Information Technology Act: Do we have the Safeguards for Electronic Privacy? &lt;a href="http://bit.ly/10VJp1P"&gt;http://bit.ly/10VJp1P&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Limits to Privacy http://bit.ly/19mPG6I &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;§ Copyright Enforcement and Privacy in India &lt;a href="http://bit.ly/18fi9fM"&gt;http://bit.ly/18fi9fM&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Privacy in India: Country Report http://bit.ly/14pnNwl &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;§ Transparency and Privacy &lt;a href="http://bit.ly/1a9dMnC"&gt;http://bit.ly/1a9dMnC&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Report of the Group of Experts on Privacy (Contributed by CIS) &lt;a href="http://bit.ly/VqzKtr"&gt;http://bit.ly/VqzKtr&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The (In) Visible Subject: Power, Privacy and Social Networking &lt;a href="http://bit.ly/15koqol"&gt;http://bit.ly/15koqol&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and the Indian Copyright Act, 1857 as Amended in 2010 &lt;a href="http://bit.ly/1euwX0r"&gt;http://bit.ly/1euwX0r&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Should Ratan Tata be afforded the Right to Privacy? &lt;a href="http://bit.ly/LRlXin"&gt;http://bit.ly/LRlXin&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Comments on Information Technology (Guidelines for Cyber Café) Rules, 2011 &lt;a href="http://bit.ly/15kojJn"&gt;http://bit.ly/15kojJn&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Broadcasting Standards Authority Censures TV9 over Privacy Violations! &lt;a href="http://bit.ly/16L4izl"&gt;http://bit.ly/16L4izl&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Is Data Protection Enough? &lt;a href="http://bit.ly/1bvaWx2"&gt;http://bit.ly/1bvaWx2&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy, speech at stake in cyberspace	&lt;a href="http://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1"&gt;http://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Q&amp;amp;A to the Report of the Group of Experts on Privacy &lt;a href="http://bit.ly/TPhzQQ"&gt;http://bit.ly/TPhzQQ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy worries cloud Facebook's WhatsApp Deal 	&lt;a href="http://cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal"&gt; http://cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ GNI Assessment Finds ICT Companies Protect User Privacy and Freedom of Expression &lt;a href="http://bit.ly/1mjbpmL"&gt;http://bit.ly/1mjbpmL&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ A Stolen Perspective &lt;a href="http://bit.ly/1bWHyzv"&gt;http://bit.ly/1bWHyzv&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Is Data Protection enough? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough"&gt; http://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ I don't want my fingerprints taken &lt;a href="http://bit.ly/aYdMia"&gt;http://bit.ly/aYdMia&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Keeping it Private &lt;a href="http://bit.ly/15wjTVc"&gt;http://bit.ly/15wjTVc&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Personal Data, Public Profile &lt;a href="http://bit.ly/15vlFk4"&gt;http://bit.ly/15vlFk4&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Why your Facebook Stalker is Not the Real Problem &lt;a href="http://bit.ly/1bI2MSc"&gt;http://bit.ly/1bI2MSc&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Private Eye &lt;a href="http://bit.ly/173ypSI"&gt;http://bit.ly/173ypSI&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ How Facebook is Blatantly Abusing our Trust &lt;a href="http://bit.ly/OBXGXk"&gt;http://bit.ly/OBXGXk&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Open Secrets &lt;a href="http://bit.ly/1b5uvK0"&gt;http://bit.ly/1b5uvK0&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Big Brother is Watching You &lt;a href="http://bit.ly/1cGpg0K"&gt;http://bit.ly/1cGpg0K&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Banking/Finance -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy in the banking and finance industry is crucial as the records and funds of one person must not be accessible by another without the due 	authorisation. The following articles deal with the current system in place that governs privacy in the financial and banking industry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Banking: Do Indian Banking Standards Provide Enough Privacy Protection? &lt;a href="http://bit.ly/18fhsTM"&gt;http://bit.ly/18fhsTM&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Finance and Privacy &lt;a href="http://bit.ly/15aUPh6"&gt;http://bit.ly/15aUPh6&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Making the Powerful Accountable &lt;a href="http://bit.ly/1nvzSpC"&gt;http://bit.ly/1nvzSpC&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Telecommunications -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The telecommunications industry is the backbone of current technology with respect to ICTs. The telecommunications industry has its own rules and 	regulations. These rules are the focal point of the following articles including criticism and acclaim.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Telecommunications: Do We Have the Safeguards? &lt;a href="http://bit.ly/10VJp1P"&gt;http://bit.ly/10VJp1P&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Media Law &lt;a href="http://bit.ly/18fgDfF"&gt;http://bit.ly/18fgDfF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ IP Addresses and Expeditious Disclosure of Identity in India &lt;a href="http://bit.ly/16dBy4N"&gt;http://bit.ly/16dBy4N&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Telecommunications and Internet Privacy Read more: &lt;a href="http://bit.ly/16dEcaF"&gt;http://bit.ly/16dEcaF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Encryption Standards and Practices &lt;a href="http://bit.ly/KT9BTy"&gt;http://bit.ly/KT9BTy&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Encryption Standards and Practices 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/privacy_encryption"&gt; http://cis-india.org/internet-governance/blog/privacy/privacy_encryption &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Security: Privacy, Transparency and Technology 	&lt;a href="http://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technolog"&gt; http://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technolog &lt;/a&gt; y&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Sexual Minorities -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the internet is a global forum of self-expression and acceptance for most of us, it does not hold true for sexual minorities. The internet is a place 	of secrecy for those that do not conform to the typical identities set by society and therefore their privacy is more important to them than most. When 	they reveal themselves or are revealed by others, they typically face a lot of group hatred from the rest of the people and therefore value their privacy. 	The following article looks into their situation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;· Privacy and Sexual Minorities http://bit.ly/19mQUyZ&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Health -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy between a doctor and a patient is seen as incredibly important and so should the privacy of a person in any situation where they reveal more 	than they would to others in the sense of CT scans and other diagnoses. The following articles look into the present scenario of privacy in places like a 	hospital or diagnosis center.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Health and Privacy &lt;a href="http://bit.ly/16L1AJX"&gt;http://bit.ly/16L1AJX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy Concerns in Whole Body Imaging: A Few Questions &lt;a href="http://bit.ly/1jmvH1z"&gt;http://bit.ly/1jmvH1z&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. e-Governance -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main focus of governments in ICTs is their gain for governance. There have many a multiplicity of laws and legislation passed by various countries 	including India in an effort to govern the universal space that is the internet. Surveillance is a major part of that governance and control. The articles 	listed below deal with the issues of ethics and drawbacks in the current legal scenario involving ICTs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ E-Governance and Privacy &lt;a href="http://bit.ly/18fiReX"&gt;http://bit.ly/18fiReX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Governmental Databases &lt;a href="http://bit.ly/18fmSy8"&gt;http://bit.ly/18fmSy8&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Killing Internet Softly with its Rules &lt;a href="http://bit.ly/1b5I7Z2"&gt;http://bit.ly/1b5I7Z2&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Cyber Crime &amp;amp; Privacy &lt;a href="http://bit.ly/17VTluv"&gt;http://bit.ly/17VTluv&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Understanding the Right to Information &lt;a href="http://bit.ly/1hojKr7"&gt;http://bit.ly/1hojKr7&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy Perspectives on the 2012-2013 Goa Beach Shack Policy &lt;a href="http://bit.ly/ThAovQ"&gt;http://bit.ly/ThAovQ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Identifying Aspects of Privacy in Islamic Law 	&lt;a href="http://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"&gt; http://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ What Does Facebook's Transparency Report Tell Us About the Indian Government's Record on Free Expression &amp;amp; Privacy? 	&lt;a href="http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy"&gt; http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell &lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy"&gt; -us-about-indian-government-record-on-free-expression-and-privacy &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India 	&lt;a href="http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"&gt; http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Internet Privacy in India 	&lt;a href="http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india"&gt; http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-i &lt;/a&gt; &lt;a href="http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india"&gt;ndia&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Internet-driven Developments - Structural Changes and Tipping Points &lt;a href="http://bit.ly/10s8HVH"&gt;http://bit.ly/10s8HVH&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Data Retention in India &lt;a href="http://bit.ly/XR791u"&gt;http://bit.ly/XR791u&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ 2012: Privacy Highlights in India &lt;a href="http://bit.ly/1kWe3n7"&gt;http://bit.ly/1kWe3n7&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Big Dog is Watching You! The Sci-fi Future of Animal and Insect Drones &lt;a href="http://bit.ly/1kWee1W"&gt;http://bit.ly/1kWee1W&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Privacy Law in India: A Muddled Field - I 		&lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1"&gt; http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-priv &lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1"&gt; acy-law-in-india-a-muddled-field-1 &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Four Parts of Privacy in India 		&lt;a href="http://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india"&gt; http://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Right to Privacy in Peril 		&lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Microsoft Releases its First Report on Data Requests by Law Enforcement Agencies around the World		&lt;a href="http://bit.ly/1kWjylM"&gt;http://bit.ly/1kWjylM&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Criminal Law Amendment Bill 2013 - Penalising 'Peeping Toms' and Other Privacy Issues &lt;a href="http://bit.ly/1dO46o5"&gt;http://bit.ly/1dO46o5&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy vs. Transparency: An Attempt at Resolving the Dichotomy		&lt;a href="http://cis-india.org/openness/blog-old/privacy-v-transparency"&gt;http://cis-india.org/openness/blog-old/privacy-v-transparency&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to "Not" Recognize India as Data Secure Nation till Enactment of Privacy Legislation		&lt;a href="http://bit.ly/1sJME9j"&gt;http://bit.ly/1sJME9j&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to Prevent the Installation of RFID tags in Vehicles &lt;a href="http://bit.ly/1hxidzU"&gt;http://bit.ly/1hxidzU&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The National Privacy Roundtable Meetings &lt;a href="http://bit.ly/158ayNW"&gt;http://bit.ly/158ayNW&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Transparency Reports - A Glance on What Google and Facebook Tell about Government Data Requests		&lt;a href="http://bit.ly/19NYTal"&gt;http://bit.ly/19NYTal&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; CIS and International Coalition Calls upon Governments to Protect Privacy &lt;a href="http://bit.ly/18oOTDk"&gt;http://bit.ly/18oOTDk&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; An Analysis of the Cases Filed under Section 46 of the Information Technology Act, 2000 for Adjudication in the State of Maharashtra		&lt;a href="http://bit.ly/16dKyoo"&gt;http://bit.ly/16dKyoo&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee		&lt;a href="http://bit.ly/17eZntz"&gt;http://bit.ly/17eZntz&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; CIS Supports the UN Resolution on "The Right to Privacy in the Digital age" &lt;a href="http://bit.ly/1c2A89q"&gt;http://bit.ly/1c2A89q&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Brochures from Expos on Smart Cards, e-Security, RFID &amp;amp; Biometrics in India &lt;a href="http://bit.ly/1f714fN"&gt;http://bit.ly/1f714fN&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Electoral Databases - Privacy and Security Concerns &lt;a href="http://bit.ly/Mb4ktM"&gt;http://bit.ly/Mb4ktM&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Net Neutrality and Privacy &lt;a href="http://bit.ly/1khi1GQ"&gt;http://bit.ly/1khi1GQ&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Intermediary Liability Resources &lt;a href="http://bit.ly/1hRT8OD"&gt;http://bit.ly/1hRT8OD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Feedback to the NIA Bill &lt;a href="http://bit.ly/1ePhUeg"&gt;http://bit.ly/1ePhUeg&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India's Identity Crisis &lt;a href="http://bit.ly/1lTRuuz"&gt;http://bit.ly/1lTRuuz&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook, Privacy, and India &lt;a href="http://bit.ly/a2HzhT"&gt;http://bit.ly/a2HzhT&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Private censorship and the Right to Hear 		&lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear"&gt; http://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Your Privacy is Public Property (Rules issued by a control-obsessed government have armed officials with widespread powers to pry into your private 		life. &lt;a href="http://cis-india.org/news/privacy-public-property"&gt;http://cis-india.org/news/privacy-public-property&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The India Privacy Monitor Map &lt;a href="http://bit.ly/19A5mCZ"&gt;http://bit.ly/19A5mCZ&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy and Security can Co-Exist &lt;a href="http://bit.ly/193fPXi"&gt;http://bit.ly/193fPXi&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; A Street View of the Private and The Public (&lt;a href="http://bit.ly/15VKmdf"&gt;http://bit.ly/15VKmdf&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Sense and Censorship &lt;a href="http://bit.ly/14KFwyo"&gt;http://bit.ly/14KFwyo&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Government access to private sector data &lt;a href="http://bit.ly/18rjd1X"&gt;http://bit.ly/18rjd1X&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India: Privacy in Peril &lt;a href="http://bit.ly/1g5QbZj"&gt;http://bit.ly/1g5QbZj&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Big Democracy, Big Surveillance: India's Surveillance State &lt;a href="http://bit.ly/1nkg8Ho"&gt;http://bit.ly/1nkg8Ho&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Who Governs the Internet? Implications for Freedom and National Security &lt;a href="http://bit.ly/1hnnJ2a"&gt;http://bit.ly/1hnnJ2a&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;7. Whistle-blowers -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whistle-blowers are always in a difficult situation when they must reveal the misdeeds of their corporations and governments due to the blowback that is 	possible if their identity is revealed to the public. As in the case of Edward Snowden and many others, a whistle-blowers identity is to be kept the most 	private to avoid the consequences of revealing the information that they did. This is the main focus of the article below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Privacy Rights of Whistle-blowers &lt;a href="http://bit.ly/18GWmM3"&gt;http://bit.ly/18GWmM3&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. Cloud and Open Source -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cloud computing and open source software have grown rapidly over the past few decades. Cloud computing is when an individual or company uses offsite 	hardware on a pay by usage basis provided and owned by someone else. The advantages are low costs and easy access along with decreased initial costs. Open 	source software on the other hand is software where despite the existence of proprietary elements and innovation, the software is available to the public 	at no charge. These software are based of open standards and have the obvious advantage of being compatible with many different set ups and are free. The 	following article highlights these computing solutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy, Free/Open Source, and the Cloud &lt;a href="http://bit.ly/1cTmGoI"&gt;http://bit.ly/1cTmGoI&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. e-Commerce -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the fastest growing applications of the internet is e-Commerce. This includes many facets of commerce such as online trading, the stock exchange 	etc. in these cases, just as in the financial and banking industries, privacy is very important to protect ones investments and capital. The following 	article's main focal point is the world of e-Commerce and its current privacy scenario.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Consumer Privacy in e-Commerce http://bit.ly/1dCtgTs&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sectoral-privacy-research'&gt;https://cis-india.org/internet-governance/blog/sectoral-privacy-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:46:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/second-privacy-and-surveillance-july-4-2014">
    <title>Second Privacy and Surveillance Roundtable</title>
    <link>https://cis-india.org/internet-governance/blog/second-privacy-and-surveillance-july-4-2014</link>
    <description>
        &lt;b&gt;On July 4, 2014, the Centre for Internet and Society in association with the Cellular Operators Association of India organized a privacy roundtable at the India International Centre. The primary aim was to gain inputs on what would constitute an ideal surveillance regime in India.&lt;/b&gt;
        &lt;h2&gt;Introduction: About the Privacy and Surveillance Roundtables&lt;/h2&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;The Privacy and Surveillance Roundtables are a CIS initiative, in partnership with the Cellular Operators Association of India (COAI), as well as local     partners. From June 2014 – November 2014, CIS and COAI will host seven Privacy and Surveillance Roundtable discussions across multiple cities in India. The     Roundtables will be closed-door deliberations involving multiple stakeholders. Through the course of these discussions we aim to deliberate upon the     current legal framework for surveillance in India, and discuss possible frameworks for surveillance in India. The provisions of the draft CIS Privacy Bill     2013, the International Principles on the Application of Human Rights to Communication Surveillance, and the Report of the Group of Experts on Privacy will     be used as background material and entry points into the discussion. The recommendations and dialogue from each roundtable will be compiled and submitted     to the Department of Personnel and training&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second Privacy and Surveillance Roundtable was held in New Delhi at the India International Centre by the Centre for Internet and Society in     collaboration with the Cellular Operators Association of India on the 4&lt;sup&gt;th&lt;/sup&gt; of July, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aim of the discussion was to gain inputs on what would constitute an ideal surveillance regime in India working with the&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf"&gt;CIS Draft Privacy Protection Bill&lt;/a&gt;, the    &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt; prepared by the Justice Shah committee, and the    &lt;a href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Background and Context: Privacy and  Surveillance in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The discussion began with the chair giving an overview of the legal framework that governs communications interception under Indian Law. The interception     of telecommunication is governed by Section 5(2) of the Telegraph Act,1885 and Rule 419A of the Telegraph Rules,1951. The framework under the Act has remained the same since it was drafted in 1885. An amendment to the Telegraph Rules in 1996 in light of the directions given under    &lt;i&gt;PUCL v Union of India&lt;/i&gt;&lt;a name="_ftnref1"&gt;&lt;/a&gt; was possibly the first change to     this colonial framework barring a brief amendment in 1961.&lt;a name="_ftnref2"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the drafting of the Act, the only two Indian members of the drafting committee objected to the wide scope given to interception under Section 5(2).     In 1968, however, the 30&lt;sup&gt;th&lt;/sup&gt; Law Commission Report studying Section 5(2) came to the conclusion that the standards in the Act may be     unconstitutional given factors such as ‘public emergency’ were too wide in nature and called for a relook at the provision.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the interception of postal mail is governed by Section 26 of the Post Office Act, 1898, the interception of modern forms of communication that use     electronic information and traffic data are governed under Sections 69 and 69B of the Information Technology Act, 2000, while interception of telephonic conversations are governed by section 5(2) of the Indian Telegraph Act 1885 and subsequent rules under section 419A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;What the law ought to be?&lt;/b&gt;&lt;br /&gt;With the shift in time, the Chair noted that the concept of the law has changed from  its original colonial perspective. Cases such as    &lt;i&gt;Maneka Gandhi v Union of India&lt;/i&gt;&lt;a name="_ftnref3"&gt;&lt;/a&gt;, highlighted that an     acceptable law must be one that is ‘just, fair and reasonable’. &lt;span&gt;From judgments such as these, one can impute that any surveillance law should not be arbitrary and must comply with the principles of criminal procedure. Although this is ideal, recent matters that are at the heart of surveillance and privacy, such as the Nira Radia matter, currently sub-judice, will hopefully clarify the     scope of surveillance that is considered permissible in India.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Why is it important now?&lt;/b&gt;&lt;br /&gt;In India, the need to adopt a legislation on privacy came in the wake of the Indo-EU Free Trade Agreement negotiations, where a data adequacy assessment conducted by     the European Commission showed that India’s data protection practices were weak. In response to this, the Department of Personnel and Training drafted a Privacy Bill, of which two drafts have been made, though the later draft has not been made available to the public.&lt;/p&gt;
&lt;p&gt;The formation of a privacy proposal in India is not entirely new. For example in 1980, former Union minister VN Gadgil proposed a bill to deal with     limiting reportage on public personalities. Much of this bill was based on a bill in the House of Lords in 1960 suggested by Lord Mancroft to prevent     uncontrolled reporting. The chair notes here that in India privacy has developed comprehensively as a concept in response to the reporting practices of the     media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although, the right to privacy has been recognised as an implicit part of the right to life under the Constitution, the National Commission to Review the Working of the Constitution set up in February 2000 suggested the addition of a separate and distinct fundamental right to privacy under Article 21 B&lt;a name="_ftnref4"&gt;&lt;/a&gt; along the same lines of Article 8 of the European Convention of Human Rights.    &lt;a name="_ftnref5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While these are notable efforts in the development of privacy, the Chair raised the question of whether India is merely 'inheriting' reports and negotiations, without adopting such standards into practice and a law.&lt;/p&gt;
&lt;h2&gt;Discussions&lt;/h2&gt;
&lt;h3&gt;Cloud base storage and surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Opening up the discussion on electronic interception, a participant asked about the applicability of a Privacy regulation to cloud based services. Cloud     based storage is of increasing relevance given that the cloud permits foreign software companies to store large amounts of customer information at little     or no cost.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian jurisdiction, however, would be limited to a server that resides in India or a service provider that originates or terminates in India. Moving the     servers back to India is a possible solution, however, it could have negative economic implications.&lt;span&gt;In terms of telecommunications, any communications that originate or terminate using Indian satellites are protected from foreign interception.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before delving into further discussion, the Chair posed the question of as to what kind of society we would like to live in, contrasting the individual     based society principle and the community based principle. While the former is followed by most Western Nations as a form of governance, Orientalist and/or     Asian tradition follows the community based principle where the larger focus is community rights. However, it would be incorrect to say that the latter     system does not protect rights such as privacy, as often Western perceptions seem to imply. For example, the Chair points out that the oldest Hindu laws     such as the Manu Smriti protected personal privacy.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Regulatory models for surveillance &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt;After the preliminary discussion, the Chair then posed the fundamental question of &lt;b&gt;how&lt;/b&gt;&lt;b&gt; &lt;/b&gt;a government can regulate surveillance. During the discussion, a&lt;span&gt; comparison was made between the UK, the US &lt;/span&gt;&lt;i&gt;modus operandi &lt;/i&gt;&lt;span&gt;i.e. the rule of probable cause coupled with exhaustion of other remedies, and the Indian rule based     out of Section 5(2) of the Telegraph Act, 1885. &lt;/span&gt;&lt;span&gt;In the United States, wire taps cannot be conducted without a Judge’s authorization.&lt;/span&gt;&lt;span&gt;For example, the Foreign Intelligence Surveillance Act, which governs foreign persons, has secret courts. In addition, a participant added that surveillance requests in the US are rarely if ever, rejected. While on paper, the US model seems acceptable, most participants are weary of the practicability of such a system in India citing that a judiciary that is shielded from public scrutiny entirely cannot be truly independent. T&lt;/span&gt;&lt;span&gt;he UK follows an interception regime regulated by the Executive, the beginnings of which lay in its Telegraph Act in 1861, which the Indian Telegraph Act is based on. However, the interception regime of the UK has constantly changed with a steady re-evaluation of the law. Surveillance in the UK is regulated by the Regulation of Investigatory Powers Act of 2000(RIPA), in addition it has draft bills pending on Data Retention and on the Admissibility of intercepted communications as evidence.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In contrast, India follows an executive framework, where the Home Secretary gives authorization for conducting wiretaps. This procedure can be compromised in emergent circumstances, where an officer not below the rank of a Joint Secretary can pass an     order.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participants agreed that the current system is grossly inadequate, and the Chair asked whether both a warrant and a judicial order based system would be appropriate for     India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering the judicial model as a possible option, participants thought of the level of judiciary apt for regulating matters on surveillance in India.     While participants felt that High Court judges would be favourable, the immense backlog at the High Court level and the lack of judges is a challenge and     risks being inefficient. &lt;span&gt;If one were to accept the magistrate system, the Chair adds that there are executive magistrates within the hierarchy who are not judicial officers. To this, a participant posed the question as to whether a judicial model is truly a workable one and whether it should be abandoned. &lt;/span&gt;&lt;span&gt;In response, a participant, iterated the &lt;/span&gt;&lt;i&gt;Maneka Gandhi &lt;/i&gt;&lt;span&gt;ratio that “A law must be just, fair and reasonable and be established to the satisfaction     of a judicially trained mind”&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was then discussed how the alternative executive model is followed in India, and how sources disclose that police officers often use (and sometimes misuse) dedicated powers under     Section 5(2), despite Rule 419A having narrowed down the scope of authority. A participant disagreed here, stating that most orders for the interception of communications are passed by the Home     Secretary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;When the People’s Union for Civil Liberties challenged Section 5(2) of the Telegraph Act, the Supreme Court held that it did not stand the test of Maneka     Gandhi and proposed the set-up of a review committee under its guidelines which was institutionalised following an amendment in 2007 to the Telegraph     Rules.&lt;/span&gt;&lt;a name="_ftnref6"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Rule 419A, a review committee comprises of officials such as the Cabinet Secretary, Secretary of the Department of Telecommunications, Secretary of     the Department of Law and Justice and the Secretary of Information Technology and Communication ministry at the Centre and the Chief Secretary ,the Law     Secretary and an officer not below the rank of a Principal secretary at the State level. A participant suggested that the Home Secretary should also be     placed in the review committee to explain the reasons for allowing the interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Albeit Rule 419A states that the Review Committee sits twice a month, the actual review time according to conflicting reports is somewhere between a day to     a week. The government mandates that such surveillance cannot continue for more than 180 days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In contrast to the Indian regime, the UK has a Commissioner who reviews the reasons for the interception along with the volume of communication among other     elements. The reports of such interceptions are made public after the commissioner decides whether it should be classified or declassified and individuals     can challenge such interception at the Appellate Tribunal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant asked whether in India, such a provision exists for informing the person under surveillance about the interception. A stakeholder answered     that a citizen can find out whether somebody is intercepting his or her communications via the government but did not elaborate on how.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Authorities for authorizing interception&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;On the subject of the regulatory model, a participant asked whether magistrates would be competent enough to handle matters on interception. It was pointed out that although this is subjective, it can be said that a lower court judge does not apply the principles of constitutional law, which include privacy, among other rights.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Having rejected the possibility of High Court judges earlier in the discussion, certain participants felt that setting up a tribunal to handle issues related to surveillance could be a good option, considering the subject matter and specialisation of judges. Yet, it was pointed out that the problem with any judicial system, is delay that happens not merely inordinately but strategically with multiple applications being filed in multiple forums. In response, a participant suggested a more federal model with greater checks and balances, which certain others felt can only be found in an executive system.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The CIS Privacy Protection Bill and surveillance&lt;/h3&gt;
&lt;p&gt;Section 6 of the CIS Privacy Protection Bill lists the procedure for applying to a magistrate for a warrant for interception. One of the grounds listed in     the Bill is the disclosure of all previously issued warrants with respect to the concerned person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Section 7 of the Bill, cognisable offences that impact public interest are listed as grounds for interception. Considering the wide range of offences     that are cognisable, there is debate on whether they all constitute serious enough offences to justify the interception of communications. For example, the     bouncing of a cheque under the Negotiable Instruments Act is a cognisable offence in public interest, but is it serious enough an offence to justify the     interception of communications? How should this, then be classified so as to not make arbitrary classifications and manage national security is another     question raised by the Chair.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The example of Nira Radia and the fact that the income tax authorities requested the surveillance demonstrates the subsisting lack of a framework     for limiting access to information in India. A participant suggested that a solution could be to define the government agencies empowered to intercept     communications and identify the offences that justify the interception of communications under Section 7 of the CIS Privacy Protection Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the discussion, it was pointed out that the Government Privacy Bill, 2011 gives a broad mandate to conduct interception that goes beyond the reasonable restrictions under Article 19 (2) of the     Constitution. For example, among grounds for interception like friendly relations with other States, Security and public disorder, there are also vague     grounds for interception such as the &lt;i&gt;protection of the rights and freedoms of others&lt;/i&gt; and &lt;i&gt;any other purpose mentioned within the Act&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the Justice Shah report did not recommend that “any other purpose within the Act” be a ground for interception, it did recommend “protection of     the freedom of others” continue to be listed as a permissible ground for the interception of communications.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Meta-data and surveillance &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt;Under Section 17 of the Draft Bill, metadata can be intercepted on grounds of national security or commission of an offence. Metadata is not protected     under Rule 419A of the Telegraph Rules and a participant asked as to why this is. The Chair then posed the question to the conference of whether there     should be a distinction between the two forms of data at all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While participants agreed that Telecommunication Service Providers store meta data and not content data, there is a need according to certain participants,     to circumscribe the limits of permissible metadata collection. These participants advocated for a uniform standard of protection for both meta and content     data, whereas another participant felt that there needs to be a distinction between content data and meta data. Certain participants also stressed that     defining what amounts to metadata is essential in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chair moved on to discussing the provisions relating to communication service providers under Chapter V. It was noted that this section will be     irrelevant however, if the Central Monitoring System comes into force, as it will allow interception to be conducted by the Government independent of     service providers.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Data Retention and Surveillance &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt;Data can be classified into two kinds for the purposes of interception, i.e. content and Meta data. Content data represents the content in the communication in itself whereas Meta data is the information about the communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Telecommunications service providers are legally required to retain metadata for the previous year under the Universal Access Service Terms, although no maximum time limit on retention has been legally established.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant highlighted that the principle of necessity has been ignored completely in India and there is currently a practice of mass data collection. In particular, metadata is collected freely by companies, as it is not considered an invasion of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another stakeholder mentioned that nodal officers set up under every Telecommunication Service Provider are summoned to court to explain the obtainment of the intercepted data. The participant mentions that Telecom Service Providers are reluctant to explain the process of each interception, questioning as to why Telecom Service Providers must be involved in judicial proceedings regarding the admissibility of evidence when they merely supply the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant asked as to where a Grievance Redressal mechanism can be fit in within the current surveillance framework in India. In response, it was noted that with a Magistrate model, procedure cannot be prescribed as Criminal Procedure would apply. However, if tribunals were to be created, a procedure that deals with the concerns of multiple stakeholders would be apt.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A doubt raised by a stakeholder was whether prior sanction could be invoked by public servants against surveillance. Its applicability must be seen on a case to case basis, although for the most part, prior sanction would not be applicable considering that public officials accused of offences are not be entitled to prior sanction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 14 of the CIS Privacy Protection Bill prohibits the sharing of information collected by surveillance with persons other than authorised authorities in an event of national security or the commission of a cognisable offence. Participants agreed that the wording of the section was too wide and could be misused.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant also pointed out that in practice, such parameters on disclosure are futile as even on civil family matters, metadata is shared amongst the service provider and the individuals that request it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With relation to metadata, a participant suggested a maximum retention period of 2 years. As pointed out earlier, Call Detail Records, a service provider must retain the information for at     least one year, however, there is no limit placed on retention, and destruction of the same is left to the discretion of the service provider. Generally it was agreed by &lt;span&gt;participants that a great deal more clarity is needed as currently the UASL     merely states that Internet Protocol Detail Record (IPDR)&lt;/span&gt;&lt;a name="_ftnref7"&gt;&lt;/a&gt;&lt;span&gt; should be maintained for a     year.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Duties of the Service Provider&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;br /&gt;Under the CIS Privacy Protection Bill , the duties of Telecommunication Service Providers broadly includes ‘measures to protect privacy and     confidentiality’ without further elaboration. A participant mentioned that applicable and specific privacy practices for different industries need to be     defined. Another participant stressed that such practices should be based in principles and not based in technology - citing rapidly evolving technology     and the obsolete government standards that are meant to be followed as security practices for ISPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another area that needs attention according to a participant is the integrity of information after interception is conducted. Participants also felt that     audit practices by Telecommunication Service Providers should be confined to examining the procedures followed by the company, and not examine content,     which is currently the practice according to other participants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant also mentioned that standards do not be prescribed to Telco's considering the Department of Telecommunications conducts technical audits. Another     participant felt that the existing system on audits is inadequate and perhaps a different model standard should be suggested. The Chair suggests that a model     akin to the Statement on Auditing Standards that has trained persons acting as auditors could fair better and give security to Telco's by ensuring immunity     for proceedings based on compliance with the standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next issue discussed was whether surveillance requests can be ignored by Telco's, and whether Telco's can be held liable for repeatedly ignoring interception requests. A stakeholder replied that although there are no rules for such compliance, a     hierarchal acquiescence exists which negates any flexibility.&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;Admissibility of Evidence&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;/b&gt;&lt;br /&gt;The significance given to intercepted communications as evidence was the next question put forth by the Chair. For example in the US, the ‘fruit of the     poisonous tree’ rule is followed where evidence that has been improperly received discredits its admissibility in law as well as further evidence found on     the basis of it. In India, however, intercepted communications are accorded full evidentiary value, irrespective of how such evidence is procured. The 1972 Supreme Court Judgment of &lt;i&gt;Malkani v State of Maharashtra&lt;/i&gt;, reiterated a seminal UK judgment, &lt;i&gt;Kuruma, Son of Kanju v. R&lt;/i&gt; &lt;a name="_ftnref8"&gt;&lt;/a&gt;, which stated that if the evidence was admissible it is irrelevant how it was     obtained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participants suggested more interaction with the actual investigative process of surveillance, which includes prosecutors and investigators to gain a     better understanding of how evidence is collected and assessed.&lt;/p&gt;
&lt;h2&gt;Conclusions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Roundtable in Delhi was not a discussion on surveillance trapped in theory but a practical exposition on the realities of governance and surveillance.     There seemed to be two perspectives on the regulatory model both supported with workable solutions, although the overall agreement was on an organised     executive model with accountability and a review system. In addition, inputs on technology and its bearing on the surveillance regime were informative. A     clear difference of opinion was presented here on the kind of protection metadata should be accorded. In addition, feedback from stakeholders on how     surveillance is conducted at the service provider level, highlight the need for an overhaul of the regime, incorporating multiple stakeholder concerns.&lt;/p&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; 1994 4 SCC 569&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; The definition of telegraph was expanded with the Telegraph Laws (Amendment) Act, 1961 under Section 3 (1AA) to ‘‘telegraph’ means any appliance,             instrument, material or apparatus used or capable of use for transmission or reception of signs, signals, writing, images and sounds orintelligence             of any nature by wire, visual or other electro-magnetic emissions, radio waves or Hertzian waves, galvanic, electric or magnetic means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Explanation.—’Radio waves’ or ‘Hertzian waves’ means electromagnetic waves of frequencies lower than 3,000 giga-cycles per second propagated in             space without artificial guide;]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; 1978 AIR 597&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; Art 21-B-“Every person has a right to respect for his private and family life, his home and his correspondence.”, Accessed at &amp;lt;            &lt;a href="http://lawmin.nic.in/ncrwc/finalreport/v1ch3.htm"&gt;http://lawmin.nic.in/ncrwc/finalreport/v1ch3.htm&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; Article 8 of the European Convention on Human Rights mentions&lt;/p&gt;
&lt;p&gt;&lt;i&gt; 1. Everyone has the right to respect for his private and family life, his home and his correspondence.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; 2. There shall be no interference by a public authority with the exercise of this right except such as is in accordance with the law and is                 necessary in a democratic society in the interests of national security, public safety or the economic well-being of the country, for the                 prevention of disorder or crime, for the protection of health or morals or for the protection of the rights and freedoms of others. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Article 8 was invoked in &lt;i&gt;Rajagopal v State of Tamil Nadu&lt;/i&gt; (1995 AIR 264)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; PUCL v Union of India, (1997) 1 SCC 301&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; IPDR measures bandwidth and monitors internet traffic.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; [1955] A.C. 197&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/second-privacy-and-surveillance-july-4-2014'&gt;https://cis-india.org/internet-governance/blog/second-privacy-and-surveillance-july-4-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>anandini</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-08-09T04:10:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sebi-and-communication-surveillance">
    <title>SEBI and Communication Surveillance: New Rules, New Responsibilities?</title>
    <link>https://cis-india.org/internet-governance/blog/sebi-and-communication-surveillance</link>
    <description>
        &lt;b&gt;In this blog post, Kovey Coles writes about the activities of the Securities Exchange Board of India (SEBI), discusses the importance of call data records (CDRs), and throws light on the significant transition in governmental leniency towards access to private records.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was  undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking  with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Securities Exchange Board of India (SEBI) is the country’s securities and market regulator, an investigation agency which seeks to combat market offenses such as insider trading. SEBI has received much media attention this month regarding its recent expansion of authority; the agency is reportedly on track to be granted powers to access telecom companies’ CDRs. These CDRs are kept by telecommunication companies for billing purposes, and contain information on who sent a call, who received a call, and how long the call lasted, but does not disclose information about call content. Although SEBI has emphatically sought several new investigative powers since 2009 (including access to CDRs, surveillance of email, and monitoring of social media), India’s Ministry of Finance only recently endorsed SEBI’s plea for direct access to service providers’ CDRs. In SEBI’s founding legislation, this capability is not mentioned. Very recently, however, the Ministry of Finance has decided to support expansion of current legislation in regards to CDR access for SEBI, the Reserve Bank of India (RBI), and potentially other agencies, when it comes to prevention of money laundering and other economic offenses.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;SEBI’s Authority (Until Now)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Established in 1992 under the Securities and Exchange Board of India Act, SEBI was created with the power of "registering and regulating the working of… [individuals] and intermediaries who may be associated with securities markets in any manner."&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; Its powers have included "calling for information from, undertaking inspection, conducting inquires and audits of the intermediaries and self-regulatory organisations in the securities market."&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Although the agency has held the responsibility to investigate records on market activity, they have never explicitly enjoyed a right to CDRs or other communications data. Now, with the intention of “meeting new challenges thrown forward by the technological and market advances,”&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; SEBI and the Ministry of Finance want to extend their record keeping scope and investigative powers to include CDR access, a form of communications surveillance.&lt;/p&gt;
&lt;p&gt;But the ultimate question is whether agencies like SEBI need this type of easy access to records of communication.&lt;/p&gt;
&lt;h3&gt;What is the Importance of CDR Access?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Reports on SEBI’s recent expansion are quick to ensure that the agency is not looking for phone-tapping rights, which intercepts messages within telephonic calls, but instead only seeks call records. CDRs, in effect, are “metadata,” a sort of information about information. In this case, it is data about communications, but it is not the communications themselves. Currently, there a total of nine agencies which are able to make actual phone-tapping requests in India. But when it comes to access of CDRs, the government seems much more generous in expanding powers of existing agencies. SEBI, as well as RBI and others, are all looking to be upgraded in their authority over CDRs. Experts argue, however, that "metadata and other forms of non-content data may reveal even more about an individual than the content itself, and thus deserves equivalent protection."&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; Therefore, a second crucial question is whether this sensitive CDR data will feature the same detail of protection and safeguards which exist for communication interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One reason for the recent move in CDR access is that SEBI and RBI have found the process of obtaining CDRs too arduous and ill-defined.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Currently, under section 92 of the CrPc, Magistrates and Commissioners of Police can request a CDR only with an official corresponding first information report (FIR), while there exists no explicit guideline for SEBI’s role in the process of CDR acquisition.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Although the government may seek to relax this procedure, SEBI’s founding legislation prohibits investigation without the pretense of “reasonable grounds," as stipulated in section 11C of the SEBI Act.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; It has always stood that only under these reasonable grounds could SEBI begin inspection of an intermediary’s "books, registers, and other documents."&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;With the government creating a way for SEBI and similar agencies to circumvent the traditional procedures for access to CDRs, these new standards should incorporate safeguards to ensure the protection of individual privacy. Banking companies, financial institutions, and intermediaries have already been obliged to maintain extensive record keeping of transactions, clients, and other financial data under section 12 of the Prevention of Money-Laundering Act of 2002.&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;But books and records containing financial data differ greatly from communication data, which can include much more personal information and therefore may compromise individuals’ freedom of speech and expression, as well as the right to privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Significance and Responsibility in this Decision&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Judging from SEBI’s prior capabilities of inspection and inquiry, this change may initially seem only a minor expansion of power for the agency, but it actually represents a significant transition in governmental leniency toward access to private records. As mentioned, the recent goal of the Ministry of Finance to extend rights to CDRs is resulting in amended powers for more agencies than only SEBI. Moreover, this power expansion comes on the heels of controversy surrounding America’s National Security Agency (NSA) amassing millions of CDRs and other datasets both domestically and internationally. There is obvious room for concern over Indian citizen’s call records being made more easily accessible, with fewer checks and balances in place. The benefits of the new policy include easier access to evidence which could incriminate those involved in financial crimes. But is that benefit actually worth giving SEBI the right to request citizen’s call records? In the cases against economic offenses, CDR access often amounts only to circumstantial evidence. With its ongoing battle against insider trading and other financial malpractice, crimes which are inherently difficult to prove, SEBI could have aspirations to grow progressively more omnipresent. But as the agency’s breadth expands, citizen’s rights to privacy are simultaneously being curtailed. Ultimately, the value of preventing economic offense must be balanced with the value of the people’s rights to privacy.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. 1992 Securities and Exchange Board of India Act, section 11, part 2(b).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. 1992 Securities and Exchange Board of India Act, section 11, part 2(i).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. “Sebi Finalising new Anti-money laundering guidelines,” &lt;i&gt;The Times of India, &lt;/i&gt;June 16, 2013&lt;/p&gt;
&lt;p&gt;&lt;a href="http://timesofindia.indiatimes.com/business/india-business/Sebi-finalizing-new-anti-money-laundering-guidelines/articleshow/20615014.cms"&gt;http://timesofindia.indiatimes.com/business/india-business/Sebi-finalizing-new-anti-money-laundering-guidelines/articleshow/20615014.cms&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: left; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. International Principles on the Application of Human Rights to Communications Surveillance -&lt;a href="http://www.necessaryandproportionate.net/#_edn1"&gt;http://www.necessaryandproportionate.net/#_edn1&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. “Sebi to soon to get Powers to Access Call Records,” &lt;i&gt;Business Today&lt;/i&gt;, June 13, 2013&lt;/p&gt;
&lt;p&gt;&lt;a href="http://businesstoday.intoday.in/story/sebi-call-record-access/1/195815.html"&gt;http://businesstoday.intoday.in/story/sebi-call-record-access/1/195815.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. 1973 Criminal Procedure Code, Section 92 &lt;a href="http://trivandrum.gov.in/~trivandrum/pdf/act/CODE_OF_CRIMINAL_PROCEDURE.pdf"&gt;http://trivandrum.gov.in/~trivandrum/pdf/act/CODE_OF_CRIMINAL_PROCEDURE.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;“Govt gives Sebi, RBI Access to Call Data Records,” The Times of India, June 14, 2013&lt;/p&gt;
&lt;p&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2013-06-14/india/39975284_1_home-ministry-access-call-data-records-home-secretary"&gt;http://articles.timesofindia.indiatimes.com/2013-06-14/india/39975284_1_home-ministry-access-call-data-records-home-secretary&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. 1992 Securities and Exchange Board of India Act, section 11C, part 8&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. 2002 Prevention of Money-Laundering Act, section 12&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sebi-and-communication-surveillance'&gt;https://cis-india.org/internet-governance/blog/sebi-and-communication-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>kovey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T10:51:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age">
    <title>Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India</title>
    <link>https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age</link>
    <description>
        &lt;b&gt;The development of information technology has transformed the way in which individuals make everyday transactions and communicate with the world around us. These interactions and transactions are recorded and stored – constantly available for access by the individual and the company through which the service was used.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;For example, the ubiquitous smartphone, above and beyond a communication device, is a device which can maintain a complete record of the communications data, photos, videos and documents, and a multitude of other deeply personal information, like application data which includes location tracking, or financial data of the user. As computers and phones increasingly allow us to keep massive amounts of personal information accessible at the touch of a button or screen (a standard smartphone can hold anything between 500 MB to 64 GB of data), the increasing reliance on computers as information-silos also exponentially increases the harms associated with the loss of control over such devices and the information they contain. This vulnerability is especially visceral in the backdrop of law enforcement and the use of coercive state  power to maintain security, juxtaposed with the individual’s right to secure their privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;American Law - The Fourth Amendment Protection against Unreasonable Search and Seizure&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The right to conduct a search and seizure of persons or places is an essential part of investigation and the criminal justice system. The societal interest in maintaining security is an overwhelming consideration which gives the state a restricted mandate to do all things necessary to keep law and order, which includes acquiring all possible information for investigation of criminal activities, a restriction which is based on recognizing the perils of state-endorsed coercion and its implication on individual liberty. Digitally stored information, which is increasingly becoming a major site of investigative information, is thus essential in modern day investigation techniques. Further, specific crimes which have emerged out of the changing scenario, namely, crimes related to the internet, require investigation almost exclusively at the level of digital evidence. The role of courts and policy makers, then, is to balance the state’s mandate to procure information with the citizens’ right to protect it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scope of this mandate is what is currently being considered before the Supreme Court of the United States, which begun hearing arguments in the cases Riley v. California,&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;and United States v Wurie,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;on the 29&lt;sup&gt;th&lt;/sup&gt; of April, 2014. At issue is the question of whether the police should be allowed to search the cell phones of individuals upon arrest, without obtaining a specific warrant for such search. The cases concern instances where the accused was arrested on account of a minor infraction and a warrantless search was conducted, which included the search of cell phones in their possession. The information revealed in the phones ultimately led to the evidence of further crimes and the conviction of the accused of graver crimes. The appeal is for a suppression of the evidence so obtained, on grounds that the search violates the Fourth Amendment of the American Constitution. Although there have been a plethora of conflicting decisions by various lower courts (including the judgements in &lt;i&gt;Wurie &lt;/i&gt;and &lt;i&gt;Riley&lt;/i&gt;),&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;the Federal Supreme Court will be for the first time deciding upon the issue of whether cell phone searches should require a higher burden under the Fourth Amendment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the core of the issue are considerations of individual privacy and the right to limit the state’s interference in private matters. The fourth amendment in the Constitution of the United States expressly grants protection against unreasonable searches and seizure,&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;however, without a clear definition of what is unreasonable, it has been left to the courts to interpret situations in which the right to non-interference would trump the interests of obtaining information in every case, leading to vast and varied jurisprudence on the issue. The jurisprudence stems from the wide fourth amendment protection against unreasonable government interference, where the rule is generally that any &lt;i&gt;warrantless &lt;/i&gt;search is unreasonable, unless covered by certain exceptions. The standard for the protection under the Fourth Amendment is a subjective standard, which is determined as per the state of the bind of the individual, rather than any objective qualifiers such as physical location; and extends to all situations where individuals have a &lt;i&gt;reasonable expectation of privacy&lt;/i&gt;, i.e., situations where individuals can legitimately expect privacy, which is a subjective test, not purely dependent upon the physical space being searched.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore, the requirement of reasonableness is generally only fulfilled when a search is conducted subsequent to obtaining a warrant from a &lt;i&gt;neutral magistrate, &lt;/i&gt;by demonstrating &lt;i&gt;probable cause &lt;/i&gt;to believe that evidence of any unlawful activity would be found upon such search. A warrant is, therefore, an important limitation on the search powers of the police. Further, the protection excludes roving or general searches and requires &lt;i&gt;particularity &lt;/i&gt;of the items to be searched&lt;i&gt;.&lt;/i&gt; The restriction derives its power from the exclusionary rule, which bars evidence obtained through unreasonable search or seizure, obtained directly or through additional warrants based upon such evidence, from being used in subsequent prosecutions. However, there have evolved several exceptions to the general rule, which includes cases where the search takes place upon the lawful arrest of an accused, a practice which is justified by the possibility of hidden weapons upon the accused or of destruction of important evidence.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The appeal, if successful, would provide an exception to the rule that any search upon lawful arrest is always reasonable, by creating a caveat for the search of computer devices like smartphones. If the court does so, it would be an important recognition of the fact that evolving technologies have transmuted the concept of privacy to beyond physical space, and legal rules and standards that applied to privacy even twenty years ago, are now anachronistic in an age where individuals can record their entire lives on an iPhone. Searching a person nowadays would not only lead to the recovery of calling cards or cigarettes, but phones and computers which can be the digital record of a person’s life, something which could not have been contemplated when the laws were drafted. Cell phone and computer searches are the equivalent of searches of thousands of documents, photos and personal records, and the expectation of privacy in such cases is much higher than in regular searches. Courts have already recognized that cell phones and laptop computers are objects in which the user may have a reasonable expectation of privacy by making them analogous to a “closed container” which the police cannot search and hence coming under the protection of the Fourth Amendment.&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, cell phones and computers also hold data which could be instrumental in investigating criminal activity, and with technologies like remote wipes of computer data available, such data is always at the risk of destruction if delay is occurred upon the investigation. As per the oral arguments, being heard now, the Court seems to be carving out a specific principle applicable to new technologies. The Court is likely to introduce subtleties specific to the technology involved – for example, it may seek to develop different principles for smartphones (at issue in &lt;i&gt;Riley) &lt;/i&gt;and the more basic kind of cell-phones (at issue in &lt;i&gt;Wurie&lt;/i&gt;), or it may recognize that only certain kinds of information may be accessed,&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;or may even evolve a rule that would allow seizure, but not a search, of the cell phone before a search warrant can be obtained.&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;Recognizing that transformational technology needs to be reflected in technology-specific legal principles is an important step in maintaining a synchronisation between law and technology and the additional recognition of a higher threshold adopted for digital evidence and privacy would go a long way in securing digital privacy in the future.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Search and Seizure in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Indian jurisprudence on privacy is a wide departure from that in the USA. Though it is difficult to strictly compartmentalize the many facets of the right to privacy, there is no express or implicit mention of such a right in the Indian Constitution. Although courts have also recognized the importance of procedural safeguards in protecting against unreasonable governmental interference, the recognition of the intrinsic right to privacy as non-interference, which may be different from the instrumental rights that criminal procedure seeks to protect (such as misuse of police power), is sorely lacking. The general law providing for the state’s power of search and seizure of evidence is found in the Code of Criminal Procedure, 1973.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 93 provides for the general procedure of search. Section 93 allows for a magistrate to issue a warrant for the search of any “document or thing”, including a warrant for general search of an area, where it believes it is required for the purpose of investigation. The &lt;i&gt;particularity &lt;/i&gt;of the search warrant is not a requirement under S. 93(2), and hence a warrant may be for general or roving search of a place. Section 100, which further provides for the search of a closed place, includes certain safeguards such as the presence of witnesses and the requirement of a warrant before a police officer may be allowed ingress into the closed place. However, under S. 165 and S. 51 of the code, the requirements of a search warrant are exempted. S. 165 dispenses with the warrant requirement and provides for an &lt;i&gt;officer in charge&lt;/i&gt; &lt;i&gt;of a police station, &lt;/i&gt;or any other officer duly authorized by him,&lt;i&gt; &lt;/i&gt;to conduct the search of any place as long as he has &lt;i&gt;reasonable grounds&lt;/i&gt; to believe that such search would be for the purpose of an investigation and a belief that a search warrant cannot be obtained without &lt;i&gt;undue delay&lt;/i&gt;. Further, the officer conducting such search must &lt;i&gt;as far as possible&lt;/i&gt; note down the reasons for such belief in writing prior to conducting the search. Section 51 provides another express exception to the requirement of search warrants, by allowing the search of a person arrested lawfully provided that the arrested person &lt;i&gt;may not or cannot be admitted to bail&lt;/i&gt;, and requires any such seized items to be written in a search memo. As long as these conditions are fulfilled, the police has an unqualified authority to search a person upon arrest. Therefore, where the arrestee can be admitted to bail as per the warrant, or, in cases of warrantless arrest, as per the law, the search and seizure of such person may not be regular, and the evidence so collected would be subject to greater scrutiny by the court. However, besides these minimal protections, there is no additional procedural protection of individual privacy, and the search powers of the police are extremely wide and discretionary. In fact, there is a specific absence of the exclusionary rule as a protection as well, which means that, unlike under the Fourth Amendment, the non-compliance with the procedural requirements of search &lt;i&gt;would not by itself vitiate the proceedings&lt;/i&gt; or suppress the evidence so found, but would only amount to an irregularity which must be simply another factor considered in evaluating the evidence.&lt;a href="#fn10" name="fr10"&gt;[10] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The extent of the imputation of the Fourth Amendment protection against unreasonable governmental interference in the Indian constitution is also uncertain. A direct imputation of the Fourth Amendment into the Indian Constitution has been disregarded by the Supreme Court.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt;Though the allusions to the Fourth Amendment have mostly been invoked on facts where unreasonable intrusions &lt;i&gt;into the homes&lt;/i&gt; of persons were challenged, the indirect imputation of the right to privacy into the right under Article 21 of the Constitution, invoking the right to privacy as a right to non-interference and a right to live with dignity, would suggest that the considerations for privacy under the Constitution are not merely objective, or physical, but depend on the subjective facts of the situation, i.e. its effect on the right to live with dignity (analogous to the reasonable expectation of privacy test laid down in &lt;i&gt;Katz&lt;/i&gt;).&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; Further, the court has specifically struck down provisions for search and seizure which confer particularly wide and discretionary powers on the executive without judicial scrutiny, holding that searches must be subject to the doctrine of proportionality, and that a provision &lt;i&gt;probable cause &lt;/i&gt;to effect any search.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;The Fourth Amendment protection against unreasonable interference in private matters by the state is a useful standard to assess privacy, since it imputes a concept of privacy as an intrinsic right as well as an instrumental one, i.e. privacy as non-interference is a good in itself, notwithstanding the rights it helps achieve, like the freedom of movement or speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regarding digital privacy in particular, Indian law and policy has failed to stand up to the challenges that new technologies pose to privacy and has in fact been regressive, by engaging in surveillance of communications and by allowing governmental access to digital records of online communications (including emails, website logs, etc.) without judicial scrutiny and accountability.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; In an age of transformative technology and of privacy being placed at a much greater risk, laws which were once deemed reasonable are now completely inadequate in guaranteeing freedom and liberty as encapsulated by the right to privacy. The disparity is even more pronounced in cases of investigation of cyber-crimes which rely almost exclusively on digital evidence, such as those substantively enumerated under the Information Technology Act, but investigated under the general procedure laid down in the Code of Criminal Procedure, which is already mentioned. The procedures for investigation of cyber-crimes and the search and seizure of digital evidence require special consideration and must be brought in line with changing norms. Although S.69 and 69B lay down provisions for investigation of certain crimes,&lt;a href="#fn15" name="fr15"&gt;[15] &lt;/a&gt;which requires search upon an order by &lt;i&gt;competent authority,&lt;/i&gt; i.e. the Secretary to the Department of IT in the Government of India, the powers of search and seizure are also present in several other rules, such as rule 3(9) of the Information Technology (Due diligence observed by intermediaries guidelines) Rules, 2011 which allows access to information from intermediaries by a simple written order by &lt;i&gt;any agency or person who are lawfully authorised for investigative, protective, cyber security or intelligence activity&lt;/i&gt;; or under rule 6 of the draft Reasonable Security Practices Rules, 2011 framed under Section 43A of the Information Technology Act, where &lt;i&gt;any government agency &lt;/i&gt;may, for the prevention, detection, investigation, prosecution, and punishment of offences, obtain any personal data from an intermediate “body corporate” which stores such data. The rules framed for investigation of digital evidence, therefore, do not inspire much confidence where safeguarding privacy is concerned. In the absence of specific guidelines or amendments to the procedures of search and seizure of digital evidence, the inadequacies of applying archaic standards leads to unreasonable intrusions of individual privacy and liberties – an incongruity which requires remedy by the courts and legislature of the country.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a class="external-link" href="http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-132_h315.pdf"&gt;http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-132_h315.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a class="external-link" href="http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-212_86qd.pdf"&gt;http://www.supremecourt.gov/oral_arguments/argument_transcripts/13-212_86qd.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. In Wurie, the motion to supress was allowed, while in Riley it was denied. Also see US v Jacob Finley, US v Abel Flores-Lopez where the motion to suppress was denied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. The Fourth Amendment to the Constitution of the United States of America: &lt;i&gt;"The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Katz v United States, 389 U.S. 347, 352 (1967).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Stephen Saltzer, American Criminal Procedure&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. United States v Chan, 830 F. Supp. 531,534 (N.D. Cal. 1993).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. A factor considered in &lt;i&gt;US v Abel Flores-Lopez, &lt;/i&gt;where the court held that the search of call history in a cell phone did not constitute a sufficient infringement of privacy to require the burden of a warrant.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. The decision in Smallwood v. Florida, No. SC11-1130, before the Florida Supreme Court, made such a distinction.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. State Of Maharashtra v. Natwarlal Damodardas Soni, AIR 1980 SC 593; Radhakrishnan v State of UP, 1963 Supp. 1 S.C.R. 408&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. M.P. Sharma v Satish Chandra, AIR 1954 SC 300&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Kharak Singh v State of UP, (1964) 1 SCR 332; Gobind v State of Madhya Pradesh, 1975 AIR 1378&lt;/p&gt;
&lt;p class="Footnote" style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. &lt;i&gt;District Registrar and Collector&lt;/i&gt; v. &lt;i&gt;Canara Bank, &lt;/i&gt;AIR 2005 SC 186&lt;i&gt;, &lt;/i&gt;which related to S.73 of the Andhra Pradesh Stamps Act which allowed ‘any person’ to enter into ‘any premises’ for the purpose of conducting a search.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. S. 69 and 69B of the Information Technology (Amendment) Act, 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Procedures and Safeguards for Monitoring and collecting traffic data or information rules 2009, &lt;i&gt;available at &lt;/i&gt;&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009" class="external-link"&gt;http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age'&gt;https://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-02T06:45:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/papers/ebola-a-big-data-disaster">
    <title>Sean McDonald - Ebola: A Big Data Disaster</title>
    <link>https://cis-india.org/papers/ebola-a-big-data-disaster</link>
    <description>
        &lt;b&gt;We are proud to initiate the CIS Papers series with a fascinating exploration of humanitarian use of big data and its discontents by Sean McDonald, FrontlineSMS, in the context of utilisation of Call Detail Records for public health response during the Ebola crisis in Liberia. The paper highlights the absence of a dialogue around the significant legal risks posed by the collection, use, and international transfer of personally identifiable data and humanitarian information, and the grey areas around assumptions of public good. The paper calls for a critical discussion around the experimental nature of data modeling in emergency response due to mismanagement of information has been largely emphasized to protect the contours of human rights.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Read&lt;/h2&gt;
&lt;h4&gt;Download the paper: &lt;a href="https://github.com/cis-india/papers/raw/master/CIS_Papers_2016.01_Sean-McDonald.pdf"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Preface&lt;/h2&gt;
&lt;p&gt;This study titled “Ebola: A Big Data Disaster” by Sean Martin McDonald, undertaken with support from the Open Society Foundation, Ford Foundation, and Media Democracy Fund, explores the use of Big Data in the form of Call Detail Record (CDR) data in humanitarian crisis.&lt;/p&gt;
&lt;p&gt; It discusses the challenges of digital humanitarian coordination in health emergencies like the Ebola outbreak in West Africa, and the marked tension in the debate around experimentation with humanitarian technologies and the impact on privacy. McDonald’s research focuses on the two primary legal and human rights frameworks, privacy and property, to question the impact of unregulated use of CDR’s on human rights. It also highlights how the diffusion of data science to the realm of international development constitutes a genuine opportunity to bring powerful new tools to fight crisis and emergencies.&lt;/p&gt;
&lt;p&gt;Analysing the risks of using CDRs to perform migration analysis and contact tracing without user consent, as well as the application of big data to disease surveillance is an important entry point into the debate around use of Big Data for development and humanitarian aid. The paper also raises crucial questions of legal significance about the access to information, the limitation of data sharing, and the concept of proportionality in privacy invasion in the public good. These issues hold great relevance in today's time where big data and its emerging role for development, involving its actual and potential uses as well as harms is under consideration across the world.&lt;/p&gt;
&lt;p&gt;The paper highlights the absence of a dialogue around the significant legal risks posed by the collection, use, and international transfer of personally identifiable data and humanitarian information, and the grey areas around assumptions of public good. The paper calls for a critical discussion around the experimental nature of data modelling in emergency response due to mismanagement of information has been largely emphasized to protect the contours of human rights.&lt;/p&gt;
&lt;p&gt;This study offers an important perspective for us at the Centre for Internet and Society, and our works on Privacy, Big Data, and Big Data for Development, and very productively articulates the risks of adopting solutions to issues important for development without taking into consideration legal implications and the larger impact on human rights. We look forward to continue to critically engage with issues raised by Big Data in the context of human rights and sustainable development, and bring together diverse perspectives on these issues.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;- Elonnai Hickok, Policy Director, the Centre for Internet and Society&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;CIS Papers&lt;/h2&gt;
&lt;p&gt;The CIS Papers series publishes open access monographs and discussion pieces that critically contribute to the debates on digital technologies and society. It includes publication of new findings and observations, of work-in-progress, and of critical review of existing materials. These may be authored by researchers at or affiliated to CIS, by external researchers and practitioners, or by a group of discussants. CIS offers editorial support to the selected monographs and discussion pieces. The views expressed, however, are of the authors' alone.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/papers/ebola-a-big-data-disaster'&gt;https://cis-india.org/papers/ebola-a-big-data-disaster&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Disaster Response</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Humanitarian Response</dc:subject>
    
    
        <dc:subject>CIS Papers</dc:subject>
    

   <dc:date>2016-04-21T09:57:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-news-minute-geetika-mantri-september-28-2019-sc-directs-govt-to-further-regulate-social-media">
    <title>SC directs govt to further regulate social media: Is it necessary? Experts weigh in</title>
    <link>https://cis-india.org/internet-governance/news/the-news-minute-geetika-mantri-september-28-2019-sc-directs-govt-to-further-regulate-social-media</link>
    <description>
        &lt;b&gt;With the SC's directive to the Indian government for further regulation of social media, TNM asked experts what were the challenges associated with the same.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Geetika Mantri was published in the &lt;a class="external-link" href="https://www.thenewsminute.com/article/sc-directs-govt-further-regulate-social-media-it-necessary-experts-weigh-109662"&gt;News Minute&lt;/a&gt; on September 28, 2019. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court recently &lt;a href="https://www.hindustantimes.com/india-news/strike-a-balance-says-supreme-court-to-centre-seeks-status-report-in-3-weeks-on-framing-of-social-media-regulations/story-djEnQ62Uue407iCMPZcagK.html" target="_blank"&gt;expressed&lt;/a&gt; the need to regulate social media to curb fake news, defamation and trolling. It also asked the Union government to come up with guidelines to prevent misuse of social media while protecting users’ privacy in three weeks’ time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The apex court made these statements while hearing a transfer petition by Facebook which has asked for petitions on regulation of social media filed in Madras, Bombay and Madhya Pradesh High Courts on similar issues to be transferred to the SC so that the scope can be expanded.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, social media platforms already come under the purview of the Information Technology (IT) Act, the ‘intermediaries guidelines’ that were notified under the IT Act in 2011 and the Indian Penal Code.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the SC's directive to the Indian government for further regulation of social media, TNM asked experts what were the challenges associated with the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Existing regulations and misuse&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Executive Director of the Internet Freedom Foundation (which is also an intervenor in the above case in SC) and lawyer Apar Gupta points out that under existing laws, social media channels are already required to take down content if they are directed to do so by a court or law enforcement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are also reporting mechanisms on these platforms, where they exercise discretion to ascertain whether a reported post is violating community guidelines and needs to be taken down. These, however, have been reported to be arbitrary – many posts on body positivity and menstruation, for instance, have been taken down in the past while other explicit imagery continues to be allowed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“But it’s necessary to have minimum legal standards that need to be fulfilled to compel such take-downs on social media. If platforms had to take down posts based on individual complaints, it could result in many frivolous take-downs. Free speech should be the norm, and removal of content, the exception,” Apar argues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IT consultant Kiran Chandra says that many of the existing regulations themselves are “dangerously close to censorship and may have a chilling effect on freedom of speech, which is why cases are being fought on those in courts.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even under existing regulations, there is scope for misuse - which has also been &lt;a href="https://www.scoopwhoop.com/jailed-for-40-days-the-story-of-up-teen-who-was-booked-for-sedition-for-his-social-media-posts/" target="_blank"&gt;documented&lt;/a&gt; in the past - to curb dissent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“One of the key problems of a lot of regulatory measures is the vagueness of language which is exploited by state agencies to behave in a repressive way,” Kiran says. “Any regulation has to be clear and concrete so that there is no scope for overreach."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Much of fake news is driven by politics&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Fake news isn't exactly new, but its proliferation and extent have expanded manifold with social media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Srinivas Kodali, an independent security researcher, says that it is not as though governments do not know where a good portion of fake news is coming from. “Most political parties have IT cells that dedicatedly work on creating and spreading fake news. But what is the Election Commission or anyone else doing to stop that?” he questions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kiran points out that this machinery exists with a view to gain electoral dividends. “There can be no countering fake news without taking on these structures and the political forces behind them,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He adds that social media giants also need to take responsibility. “Currently, considering the role social media companies play in the society, they are doing almost nothing [about fake news]. In fact, virality - and a lot of fake news tends to be viral - is the basis of the business model of many social media companies, including Facebook, and WhatsApp, which it owns. At the very least, these companies need to dedicate far more resources, and must provide more transparency into their functioning if any dent has to be made in countering fake news.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kiran also says that there is a need to support websites that bust fake news, and make people more aware of the need to verify news.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Defamation and online harassment&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Experts say that when it comes to the SC’s observation that there should be redressal mechanisms for someone who has been ‘defamed’ on social media, the recourse is pretty clear-cut.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, a fellow at the Centre for Internet and Society, says, “If it concerns defamation, it is very likely that the victim knows where the defamatory post has come from. Even if it is not an original message, the defamation law does not require you to find out the origin of such a message. Anyone who has put it, forwarded it, is liable.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That being said, it is the social media giants that need to pick up the slack when it comes to dealing with targeted harassment and online bullying.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has been reported &lt;a href="https://www.thenewsminute.com/article/fb-does-little-curb-hate-speech-against-muslims-dalits-minorities-study-103475" target="_blank"&gt;earlier &lt;/a&gt;that Facebook, due to its lack of understanding of the Indian context as well as diversity, often fails in effectively removing hate speech from the platform in India. Facebook's community guidelines are unavailable in several Indian languages too.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kiran says that while there already exist legal provisions for dealing with offensive speech, the problem is that they are either misused or underused. “Critics of the government get hit with these cases unreasonably while many who engage in hate speech and abuse are followed by the most powerful people in the country. Here again, social media firms need to massively increase the resources they spend on weeding out such content.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;strong&gt;Privacy and surveillance concerns&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any conversation on additional regulation of social media brings up concerns about privacy and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apar says if regulators want easy access to user information for curbing misuse, spread of fake news and the like, it would require online platforms to modify their products to increase surveillance - to have exact details about who said what, when and about whom. “This is why it’s important for legal standards and conditions for accessing user information to be followed. Government also needs to become more accountable on what information on users they are demanding from social media companies.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Kiran cautions that “any bid at regulating expression online has to be proportional and concrete with adequate redressal mechanisms and without any blanket provisions.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We need strong data protection and privacy laws which restrict the scope of these companies and reduce their footprint online,” he adds, referring, for instance to Facebook's monopoly - the company also owns Instagram. “Similarly, the role they play in elections and political processes as a whole, needs to be checked.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Srinivas points out that ultimately, social media is a reflection of what is happening in the society: “If there is no rule of law offline, it won’t be there online.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-news-minute-geetika-mantri-september-28-2019-sc-directs-govt-to-further-regulate-social-media'&gt;https://cis-india.org/internet-governance/news/the-news-minute-geetika-mantri-september-28-2019-sc-directs-govt-to-further-regulate-social-media&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Geetika Mantri</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2019-09-30T14:28:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/sameet-panda-impact-of-the-jam-trinity-on-pension-pds-in-odisha-during-covid-19">
    <title>Sameet Panda - Impact of the JAM Trinity on Pension &amp; PDS in Odisha during COVID-19</title>
    <link>https://cis-india.org/raw/sameet-panda-impact-of-the-jam-trinity-on-pension-pds-in-odisha-during-covid-19</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/sameet-panda-impact-of-the-jam-trinity-on-pension-pds-in-odisha-during-covid-19'&gt;https://cis-india.org/raw/sameet-panda-impact-of-the-jam-trinity-on-pension-pds-in-odisha-during-covid-19&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2021-02-26T06:45:00Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
