<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 331 to 345.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-issues-with-drm"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy-is-not-a-unidimensional-concept"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/privacy-in-social-networked-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-in-the-age-of-the-pandemic"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-amber-sinha-pranesh-prakash-march-12-2016-privacy-concerns-overshadow-monetary-benefits-of-aadhaar-scheme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-copyright-act"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-surveillance.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/privacy-surveillance-roundtable"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill">
    <title>Privacy Law Must Fit the Bill </title>
    <link>https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill</link>
    <description>
        &lt;b&gt;The process of updating Indian privacy policy has gained momentum ever since the launch of the UID project and also the leak of the Radia tapes. The Department of Personnel and Training has lead the drafting of privacy bill for the last three years. This bill will ideally articulate privacy principles and establish the office of the privacy commissioner and most importantly have an over-riding effect over 50 odd existing laws, rules and policies with privacy implications.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.dc-epaper.com/PUBLICATIONS/DC/DCB/2013/09/09/ArticleHtmls/Privacy-law-must-fit-the-bill-09092013013016.shtml?Mode=1"&gt;published in the Deccan Chronicle&lt;/a&gt; on September 9, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Given the harmonizing impact of the proposed privacy bill, we must ensure that rigorous debate and discussion happens before the bill is finalized otherwise there may be terrible consequences.&lt;/p&gt;
&lt;p&gt;Here is a short list of what can possibly go wrong:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One, the privacy bill ignores the massive power asymmetry in Indian societies undermining the right to information – in other jurisdictions referred to as freedom of information and access to information. The power asymmetry is addressed via a public interest test. The right to privacy would be the same for everyone except when public interest is at stake. This enables protection of the right to privacy to be inversely proportionate to power and almost conversely the requirement of transparency to be directly proportionate to power. In other words, the poor would have greater privacy than a middle-class citizens who in turn would have greater privacy than political and economic elites. And transparency requirements would be greatest for economic and political elites and lower for middle-class citizens and lowest for the poor.  If this is not properly addressed in the language of the bill – privacy activists would have undone the significant accomplishments of the right to information or transparency movement in India over the last decade.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two, the privacy bill has chilling effect on free speech. This can happen either by denying the speaker privacy, or by affording those who are spoken about too much privacy. For the speaker - Know Your Customer (KYC) and data retention requirements for telecom and internet infrastructure necessary to participate in the networked public sphere can result in the death of anonymous and pseudonymous speech. Anonymous and pseudonymous speech must be protected as it is a necessary for good governance, free media, robust civil society, and vibrant art and culture in a democracy.  For those spoken about - privacy is clearly required in certain cases to protect the victims of certain categories of crimes. However, the right to privacy could be abused by those occupying public office and those in public life to censor speech that is in the public interest. If for example a sport person does not publicly drink the aerated drink that he or she endorses in advertisements then the public has a right to know.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three, the privacy bill has a limited scope. Jurisprudence in India derives the right to privacy from the right to life and liberty through several key judgments including &lt;i&gt;Naz Foundation v. Govt. of NCT of Delhi&lt;/i&gt; decided by the Delhi High Court. The right to life and liberty or Article 21 unlike other constitutionally guaranteed fundamental rights does not distinguish between citizens and non-citizens. As a consequence the privacy bill must also protect residents, visitors and other persons who may never visit India, but whose personal information may travel to India as part of the global outsourcing phenomena. Also the obligations and safeguards under the privacy bill must equally apply to both the state and the private sector entities that could potentially infringe upon the individual's right to privacy. Different levels of protection may be afforded to citizens, residents, visitors and everybody else. Government and private sector data controllers may be subject to different regulations – for ex. an intelligence agency may not require 'consent' of the data subject to collect personal information and may only provide 'notice' after the investigation has cleared the suspect of all charges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Four, the privacy bill is expected to fix poorly designed technology. There are two diametrically opposite definitions of projects like NATGRID, CMS and UID. The government definition is that all these systems will allow only for targeted interception and surveillance, however the majority of civil society believes that these system will be used for blanket surveillance. If these systems are indeed built in a manner that supports blanket surveillance then legal band-aid in the form of a new law or provision that prohibits blanket surveillance will be a complete failure. The principle of 'privacy by design' is the only way to address this. For ex. shutters of digital cameras are silent and this allows for a particular form of voyeurism called upskirt. Almost a decade ago, the Korean government enacted a law that requires camera and mobile phone manufacturers to ensure that audio recording of a mechanical shutter is played every time the camera function is used. It is also illegal for the user to circumvent or disable this feature. In this example, the principle of notice is hardwired within the technology itself. To remix Spiderman's motto – with great power comes great temptation. We know that a rogue NTRO official installed a spy camera in the office toilet to make recording female colleagues and most recently that NSA officers confessed to spying on their love interests. If the technology can be abused it will be abused. Therefore legal safeguards are a poor substitute for technological safeguards. We need both simultaneously.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Five, the bill does not require compliance with internationally accepted privacy principles including the ones discussed so far 'consent', 'notice' and 'privacy by design'. Apart from human rights considerations – the most important imperative to modernize India privacy laws is trade. We have a vibrant ITES, BPO and KPO sector which handles personal information of foreigners mostly from the North American and European continents.  The Justice AP Shah committee in October 2012 identified privacy principle that required for India - notice, choice and consent, collection limitation, purpose limitation, access and correction, disclosure of information, security, openness and accountability. A privacy bill that does include all these principles will increase the regulatory compliance overhead for Indian enterprise with foreign clients and for multinationals operating in India. There is also the risk that privacy regulators in these jurisdictions will ban outsourcing to Indian firms because our privacy laws are not adequate by their standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To conclude, it is not sufficient for India to enact a privacy law it is essential that we get it right so that there are no unintended consequences on other equally important rights and dimensions of our democracy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill'&gt;https://cis-india.org/internet-governance/blog/deccan-chronicle-september-9-2013-sunil-abraham-privacy-law-must-fit-the-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-12T06:25:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1">
    <title>Privacy Law in India: A Muddled Field - I</title>
    <link>https://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1</link>
    <description>
        &lt;b&gt;The absence of a statute expressing the legislative will of a democracy to forge a common understanding of privacy is a matter of concern,  says BHAIRAV ACHARYA in the first of a two part series. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.thehoot.org/web/freetracker/storynew.php?storyid=565&amp;amp;sectionId=10"&gt;published in the Hoot on April 15, 2014&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;Privacy evades definition and for this reason sits uneasily with law. The multiplicity of everyday privacy claims and transgressions by ordinary people, and the diversity of situations in which these occur, confuse any attempt to create a common meaning of privacy to inform law. Instead, privacy is negotiated contextually, and the circumstances that permit a privacy claim in one situation might form the basis for its transgression in another.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is easy to understand privacy when it is claimed in relation to the body; it is beyond argument that every person has a right to privacy in relation to their bodies, especially intimate areas. It is also accepted that homes and private property secure to their owners a high degree of territorial privacy. But what of privacy from intrusive stares, or even from camera surveillance, when in a public place? Or of biometric privacy to protect against surreptitious fingerprint capturing or DNA collection from the things we touch and the places we visit every day? Or the privacy of a conversation in a restaurant from other patrons? Clearly, there are multiple meanings of privacy that are negotiated by individuals all the time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Law has, where social custom has demanded, clothed some aspects of human activity with an expectation of privacy. In relation to bodily privacy, this is achieved by both ordinary common law without reference to privacy at all, such as the offences of battery and rape; and, by special criminal law that is premised on an expectation of privacy, such as the discredited offences regarding women’s modesty in sections 354 and 509 of the Indian Penal Code, 1860 (IPC), and the new offences of voyeurism and stalking contained in sections 354C and 354D of the IPC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law also privileges communications that are made through telephones, letters, and emails by regulating the manner of their interception in special circumstances. Conditional interception provisions with procedural safeguards – which, for several reasons, are flawed and ineffective – exist to protect the privacy of such communications in section 5(2) of the Indian Telegraph Act, 1885, section 26 of the Indian Post Office Act, 1898, and section 69 of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Territorial privacy, which is afforded by possession of private property, is ordinarily protected by the broad offence of trespass – in India, these are the offences of criminal trespass, house trespass, and lurking house-trespass contained in sections 441 to 443 of the IPC – and house-breaking, which is akin to the offence of breaking and entering in other jurisdictions, in section 445 of the IPC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some measure of protection is provided to biometric information, such as fingerprints and DNA, by limiting their lawful collection by the state: sections 53, 53A, and 54 of the Code of Criminal Procedure, 1973 permit collections of biometric information from arrestees in certain circumstances; this is in addition to a colonial-era collection regime created by the Identification of Prisoners Act, 1920. However, nothing expressly prohibits the police or anybody else from non-consensually developing DNA profiles from human material that is routinely left behind by our bodies, for instance, saliva on restaurant cutlery or hair at the barbershop.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Physical surveillance, by which a person is visually monitored to invade locational privacy, is also inadequately regulated. Besides man-on-woman stalking, which was criminalised only one year ago, no effective measures exist to otherwise protect locational privacy. Indian courts regularly employ their injunctive power but have been loath to issue equitable remedies such as restraining orders to secure privacy. Police surveillance, which is usually covert, is an executive function that is practised with wide latitude under every state police statute and government-issued rules and regulations thereunder with little or no oversight. The risk of misuse of these powers is compounded by the increasingly widespread use of surveillance cameras sans regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other technologies too compromise privacy: GPS-enabled mobile phones offer precise locational information, presumably consensually; cell-tower tracking, almost always non-consensually, is ordered by Indian police without any procedurally built-in safeguards; radio frequency identification to locate vehicles is sought to be made mandatory; and, satellite-based surveillance is available to intelligence agencies, none of which are registered or regulated unlike in other liberal democracies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;No uniform privacy standard in law&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;None of these laws applies a uniform privacy standard nor are they measured against a commonly understood meaning of privacy. The lack of a statutory definition is not the issue; the lack of a statute that expresses the legislative will of a democracy to forge a common understanding of privacy to inform all kinds of human activity is the concern. Ironically, the impetus to draft a privacy law has come from abroad. Foreign senders of personal information – credit card data, home addresses, phone numbers, and the like – to India’s information technology and outsourcing industry demand institutionalised protection for their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pressure from the European Union, which has the world’s strongest information privacy standards and with which India is currently negotiating a free trade agreement, to enact a data protection regime to address privacy has not gone unanswered. The Indian government – specifically, the Department of Personnel and Training, the same department that administers the Right to Information Act, 2005 – is currently drafting a privacy law to govern data protection and surveillance. At stake is the continued growth of India’s information technology and outsourcing sectors that receive significant amounts of European personal data for processing, which drives national exports and gross domestic product.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;An inferred right&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For its part, the Supreme Court has examined more than a few privacy claims to find, intermittently and unconvincingly, that there is a constitutional right to privacy, but the contours of this right remain vague. In 1962, the Supreme Court rejected the existence of a privacy right in Kharak Singh’s case which dealt with intrusive physical surveillance by the police.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court was not unanimous; the majority of judges expressly rejected the notion of locational privacy while declaring that privacy was not a constituent of personal liberty, a lone dissenting judge found the opposite to be true and, furthermore, held that surveillance had a chilling effect on freedom. In 1975, in the Gobind case that presented substantially similar facts, the Supreme Court leaned towards, but held short of, recognising a right to privacy. It did find that privacy flowed from personal autonomy, which bears the influence of American jurisprudence, but subjected it to the interests of government; the latter prevailed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in the PUCL case of 1997 that challenged inadequately regulated wiretaps, the Supreme Court declared that phone conversations were protected by a fundamental right to privacy that flowed from Article 21 of the Indian Constitution. To intrude upon this right, the court said, a law was necessary that is just, fair, and reasonable. If this principle were to be extended beyond communications privacy to, say, identity cards, the Aadhar project, which is being implemented without the sanction of an Act of Parliament, would be judicially stopped.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what does “law” mean? Is it only the law of our Constitution and courts? What of the law that governed Indian societies before European colonisation brought the word ‘privacy’ to our legal system? Classical Hindu law – distinct from colonial and post-independence Hindu law – also recognises and enforces expectations of privacy in different contexts. It recognised the sanctity of the home and family, the autonomy of the community, and prescribed penalties for those who breached these norms. So, too, does Islamic law: all schools of Islamic jurisprudence – ‘fiqh’ – recognise privacy as an enforceable right.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Different words and concepts are used to secure this right, and these words have meanings and connotations of their own. But, the hermeneutics of privacy notwithstanding, this belies the common view that privacy is not an Indian value. Privacy may or may not be a cultural norm, but it has existed in India and South Asia in different forms for millennia.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Bhairav Acharya is a constitutional lawyer practising in the Supreme Court of India. He advises the Centre for Internet &amp;amp; Society, Bangalore, on privacy law and other constitutional issues.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1'&gt;https://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-05-05T06:17:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-issues-with-drm">
    <title>Privacy Issues with DRM</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-issues-with-drm</link>
    <description>
        &lt;b&gt;This post has been written by Jalaj Pandey interning at CIS. It elaborates upon the various privacy issues with the Digital Rights Management. The author talks about the various ways in which content producers use DRM as a tool to infringe the privacy of the end users. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Nehaa Chaudhari provided inputs and also edited the blog post. &lt;a href="https://cis-india.org/internet-governance/blog/privacy-issues-with-drm.docx" class="internal-link"&gt;Click to download the File&lt;/a&gt;.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;div style="text-align: justify; "&gt;
&lt;p&gt;&lt;span&gt;The ubiquity of internet in today's world has made content and information sharing an easy task. &lt;/span&gt;&lt;a name="_ftnref1"&gt;&lt;/a&gt;&lt;span&gt; A certain media file can be shared and made public with hardly any technical obstacles. &lt;/span&gt;&lt;a name="_ftnref2"&gt;&lt;/a&gt;&lt;span&gt; Issues 	like hacking, unauthorized copying and publication, unlicensed usage have become concerns for content producers, who have employed Digital Rights 	Management (hereafter DRM) measures to address some of them.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Several instances of the online privacy intrusion by the content producers have been recorded.	&lt;a name="_ftnref3"&gt;&lt;/a&gt; In 	such a scenario the balancing the rights of the content producers and the end users becomes an important one. It is imperative to find a common ground to safeguard the interests of both the parties involved. In the recent past DRM has been receiving a lot of flak	&lt;a name="_ftnref4"&gt;&lt;/a&gt; because of the privacy issues contented by the users.	&lt;a name="_ftnref5"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the most rudimentary form privacy can be explained as any information about an individual which he/she does not want to be made public. It is important 	to mention that this information is seen from the perspective of an ordinary reasonable person. The UN Declaration of Human Rights, 1948, defines privacy as a fundamental right of every human.	&lt;a name="_ftnref6"&gt;&lt;/a&gt; The functioning of the DRM 	is based on restricting the usage or distribution of the content. Since this restriction is only possible after there is a formal identification of the end 	user,&lt;a name="_ftnref7"&gt;&lt;/a&gt; the content producers 	end up collecting information about the users. For example: a DRM for a music file might work in a manner where it can only be accessed by one computer from which the user accesses and registers for the first time.	&lt;a name="_ftnref8"&gt;&lt;/a&gt; DRMs initially identify the IP addresses of the system and make the file functioning on only that IP address.	&lt;a name="_ftnref9"&gt;&lt;/a&gt; In this way the producer ends up collecting information about the end user. Different DRM models take different ways to collect information of their user.	&lt;a name="_ftnref10"&gt;&lt;/a&gt; While collecting IP 	addresses&lt;a name="_ftnref11"&gt;&lt;/a&gt; in one of them the other way is tracking the user information via download,	&lt;a name="_ftnref12"&gt;&lt;/a&gt; browsing activities, 	subscription service,&lt;a name="_ftnref13"&gt;&lt;/a&gt; etc. 	The usage log of the users is generated and becomes a valuable asset to assess and predict the preferences of the users&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two contentions of privacy have been raised on the privacy issues of DRM -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) What is the accountability of this process and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) Whether it puts the content producers in a position where they can control the users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The information collected is under the control of content producers, who mostly store this information in the form database. BEUC (European Consumer 	Organization) claimed that the DRM systems technologically enable content providers to monitor private consumption of content, create reports of consumption, and profile users.	&lt;a name="_ftnref14"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The information is at the disposal of the content producers. An assessment of DRM applications under Canadian Privacy showed that the firms did not even recognise privacy issues of the customers as a priority.	&lt;a name="_ftnref15"&gt;&lt;/a&gt; In fact the firms failed to provide the information that was stored in their databases.	&lt;a name="_ftnref16"&gt;&lt;/a&gt; This gives an idea about 	the lack of transparency that exists in collecting the information about users. The question whether users are aware of what information is being collected 	and to what extent they are being tracked online remains unanswered. The CEN/ISSS (European Committee for Standardization/ Information Society Standardisation System) pointed out that DRMs have a large potential to transmit, generate personal information about users.	&lt;a name="_ftnref17"&gt;&lt;/a&gt; It has also been characterized by unprecedented levels of monitoring by various content producers.	&lt;a name="_ftnref18"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further the principled level argumentation to this is on lines of collection of information without any authentication from the user herself/himself. It is essential that if any information is collected or saved by the producers it should only be after taking consent of the user.	&lt;a name="_ftnref19"&gt;&lt;/a&gt; Surveillance and compelled disclosure of information about intellectual consumption threaten rights to personal integrity.	&lt;a name="_ftnref20"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DRMs take away the anonymity of the consumption.	&lt;a name="_ftnref21"&gt;&lt;/a&gt; Since the producers can practically monitor the content usage of the user, this has led to wide scale of price discrimination.	&lt;a name="_ftnref22"&gt;&lt;/a&gt; This means that producers would monitor and assess the preferences	&lt;a name="_ftnref23"&gt;&lt;/a&gt; of the user and subsequently raise the prices of that particular class of products.	&lt;a name="_ftnref24"&gt;&lt;/a&gt; In the report of FIPR 	(Foundation of Information Policy and Research) it was found that Microsoft had been trying to implement their DRM systems in their products using a similar approach to gain a monopoly position as in their strategy of browser implementation.	&lt;a name="_ftnref25"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 	&lt;strong&gt; Sony BMG copy protection rootkit scandal		&lt;a name="_ftnref26"&gt;&lt;/a&gt; &lt;/strong&gt; in 2005 brought much criticism to DRM. It was found out that Sony BMG had introduced illegal and harmful copy protection measure in its CDs. The rootkit 	element of the software is used to hide virtually all traces of the copy protection software's presence on a PC, so that an ordinary computer user would 	have no way to find it. Further more than just the DRM part of it the software also made the user's system open to a number of malwares and created 	vulnerabilities in the system. Sony was eventually made to compensate consumer costs, etc on the same. However the question of whether the database in the hands of companies can be used in arbitrary manner was intensely discussed after this.	&lt;a name="_ftnref27"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is essential that an effective framework is brought into effect which caters to privacy interests of the users. Privacy is the basic human right and it 	is the onus of the State to protect and safeguard this right. It is essential that the State does not compromise and support mechanisms which promote the 	welfare of the content producers over the users. The balance of users and producers becomes all the more important in a developing country like ours. The 	lack the awareness and the knowledge coupled with increasing usage of internet can lead to the exploitation of many. It is essential that the States see 	through these problems and collectively find an all encompassing solution to it.&lt;/p&gt;
&lt;div&gt;&lt;br clear="all" /&gt; 
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; K. G. Coffman and A. M. Odlyzko, Growth of the Internet, AT&amp;amp;T Labs - Research, July 6, 2001, available at, (			&lt;a href="http://www.dtc.umn.edu/~odlyzko/doc/oft.internet.growth.pdf"&gt;www.dtc.umn.edu/~odlyzko//doc/oft.internet.growth.pdf&lt;/a&gt;) (hereinafter 			Growth).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; The Daily Source, The Growing Impact of the Internet, April 4, 2016, available at (https://www.dailysource.org/about/impact).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; Corryne Mcsherry, Adobe Spyware Reveals (Again) The Price Of DRM: Your Privacy And Security, Electronic Frontier Foundation, October 17, 2014, 			available at,&lt;/p&gt;
&lt;p&gt;(https://www.eff.org/deeplinks/2014/10/adobe-spyware-reveals-again-price-drm-your-privacy-and-security).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; Digital Rights Management: A failure in the developed world, a danger to the developing world, Electronic Frontier Foundation, March 23, 2005, 			available at,&lt;/p&gt;
&lt;p&gt;(https://www.eff.org/wp/digital-rights-management-failure-developed-world-danger-developing-world).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; R. Subramanya and Byung k. Yi, Digital Rights Management, available at, (			&lt;a href="https://www.academia.edu/8054608/Digital_Rights_Management"&gt;https://www.academia.edu/8054608/Digital_Rights_Management&lt;/a&gt;) (hereinafter 			Digital Rights Management).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; Global internet liberty campaign, privacy and human rights, An International Survey of Privacy Laws and Practice, available at, 			(http://gilc.org/privacy/survey/intro.html).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; Ann Cavoukian, Privacy and Digital Rights Management (DRM): An Oxymoron, Information and Privacy Commissioner Ontario, available at, (			&lt;cite&gt;https://www.ipc.on.ca/images/Resources/up-1&lt;/cite&gt;&lt;strong&gt;drm&lt;/strong&gt;&lt;cite&gt;.pdf&lt;/cite&gt; ) (hereinafter Oxymoron)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; Varian, H.R. (1985) 'Price discrimination and social welfare', American Economic Review, Vol. 75, available at, 			(http://www.economics-ejournal.org/economics/journalarticles/2007-1/references/Varian1985).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; Privacy and Digital Rights Management,A position paper for the W3C workshop on Digital Rights Management, January 2001, available at, (			&lt;cite&gt;www.w3.org/2000/12/drm-ws/pp/hp-poorvi.html&lt;/cite&gt;&lt;cite&gt;)&lt;/cite&gt;&lt;cite&gt;.&lt;/cite&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt; Growth supra note, 1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; Digital Rights Management supra note, 5.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; Thierry Rayna, Privacy or piracy, why choose? Two solutions to the issues of digital rights management and the protection of personal information, 			Intellectual Property Management, Vol. X, No. Y, available at,&lt;/p&gt;
&lt;p&gt;(www.inderscienceonline.com/doi/abs/10.1504/IJIPM.2008.021138).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; Oxymoron supra note, 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; BEUC, Consumentenbond, and CLCV at DRM Working Group 1 (2002), available at, (&lt;cite&gt;https://privacy.org.nz/assets/Files/4558510.pdf).&lt;/cite&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Natali Helberger and Kristo´f Ker´enyi and Bettina Krings, Digital Rights Management and Consumer Acceptability: A Multi-Disciplinary 			Discussion of Consumer Concerns and Expectations, available at (citeseerx.ist.psu.edu/showciting?cid=733532).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt; Knud Bohle, Indicare, Research into unfriendly DRM : A Review, December, 2004,available at, (citeseerx.ist.psu.edu/showciting?cid=733532) 			(hereinafter Indicare).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;&lt;/a&gt; European Committee for Standardization/Information Society Standardisation System (CEN/ISSS) DRM Report, 2003.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;&lt;/a&gt; Indicare supra note, 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;&lt;/a&gt; News Release, "Forrester Technographics Finds Online Consumers Fearful of Privacy Violations" (October 27, 1999 available at, 			(www.forrester.com/ER/Press/Release/0,1769,177,FF.html).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20"&gt;&lt;/a&gt; Julia E. Cohen, Georgetown Law Faculty Publications, DRM and Privacy, January 2010, available at,&lt;/p&gt;
&lt;p&gt;(https://www.academia.edu/2164013/DRM_and_Privacy).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;&lt;/a&gt; Thierry Rayna, Privacy or piracy, why choose? Two solutions to the issues of digital rights management and the protection of personal information, Intellectual Property Management, available at, (			&lt;a href="http://www.inderscienceonline.com/doi/abs/10.1504/IJIPM.2008.021138"&gt;www.inderscienceonline.com/doi/abs/10.1504/IJIPM.2008.021138&lt;/a&gt;) 			(hereinafter Privacy or piracy).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;&lt;/a&gt; Moe, W. and Fader, P. (2004) 'Dynamic conversion behavior at e-commerce sites', Management Science, Vol. 50, available at,&lt;/p&gt;
&lt;p&gt;(https://www.researchgate.net/publication/227447618_Dynamic_Conversion_Behavior_at_E-Commerce_Sites).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;&lt;/a&gt; Privacy or piracy supra note, 21.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;&lt;/a&gt; Sismeiro, C. and Bucklin, R. (2004) 'Modeling purchase behavior at an e-commerce web site: a task completion approach', Journal of Marketing 			Research, available at, (&lt;cite&gt;citeseerx.ist.psu.edu/showciting?cid=906878&lt;/cite&gt;&lt;cite&gt;).&lt;/cite&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;&lt;/a&gt; Ross Anderson, Foundation of Information Policy and Research Consultation Response to DRM (2004), available at, (&lt;cite&gt;www.&lt;/cite&gt; &lt;strong&gt;fipr&lt;/strong&gt;&lt;cite&gt;.org/APIG_&lt;/cite&gt;&lt;strong&gt;DRM&lt;/strong&gt;&lt;cite&gt;_submission&lt;/cite&gt;&lt;cite&gt;.pdf&lt;/cite&gt;).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;&lt;/a&gt; Otto Helweg, Sony, Rootkits and Digital Rights Management Gone Too Far, Oct, Oct. 31, 2014, available at 			(https://blogs.technet.microsoft.com/markrussinovich/2005/10/31).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn27"&gt;&lt;/a&gt; Sony BMG Litigation Info, Electronic Frontier Foundation, available at, (https://www.eff.org/cases/sony-bmg-litigation-info).&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-issues-with-drm'&gt;https://cis-india.org/internet-governance/blog/privacy-issues-with-drm&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Jalaj Pandey</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-05-03T02:41:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy-is-not-a-unidimensional-concept">
    <title>Privacy is not a unidimensional concept</title>
    <link>https://cis-india.org/internet-governance/privacy-is-not-a-unidimensional-concept</link>
    <description>
        &lt;b&gt;Right  to privacy is important not only for our negotiations with the information age but also to counter the transgressions of a welfare state. A robust right to privacy is essential for all citizens in India to defend their individual autonomy in the face of invasive state actions purportedly for the public good. The ruling of this nine-judge bench will have far-reaching impact on the extent and scope of rights available to us all.&lt;/b&gt;
        
&lt;div&gt;This article, written by Amber Sinha was published in the &lt;a class="external-link" href="http://economictimes.indiatimes.com/news/politics-and-nation/aadhar-privacy-is-not-a-unidimensional-concept/articleshow/59716562.cms"&gt;Economic Times&lt;/a&gt; on July 23, 2017.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
      &lt;br /&gt;&lt;/div&gt;
&lt;div&gt;In a disappointing case of judicial evasion by the apex court,
      it has taken over 600 days since a reference order passed in
      August 11, 2015, for this bench to be constituted. Over two days
      of arguments, the counsels for the petitioners have presented
      before the court why the right to privacy, despite not finding a
      mention in the Constitution of India, is a fundamental right
      essential to a person’s dignity and liberty, and must be read into
      not one but multiple articles of the Constitution. The government
      will make its arguments in the coming week.&lt;/div&gt;
&lt;div&gt;One must wonder why we are debating the contours of the right
      to privacy, which 40 years of jurisprudence had lulled us into
      believing we already had. The answer to that can be found in a
      series of hearings in the Aadhaar case that began in 2012. Justice
      KS Puttaswamy, a former Karnataka High Court judge, filed a
      petition before the Supreme Court, questioning the validity of the
      Aadhaar project due its lack of legislative basis (since then the
      Aadhaar Act was passed in 2016) and its transgressions on our
      fundamental rights. Over time, a number of other petitions also
      made their way to the apex court, challenging different aspects of
      the Aadhaar project. Since then, five different interim orders by
      the Supreme Court have stated that no person should suffer because
      they do not have an Aadhaar number. Aadhaar, according to the
      court, could not be made mandatory to avail benefits and services
      from government schemes. Further, the court has limited the use of
      Aadhaar to specific schemes: LPG, PDS, MGNREGA, National Social
      Assistance Programme, the Pradhan Mantri Jan Dhan Yojna and EPFO.&lt;br /&gt;
      &lt;br /&gt;&lt;/div&gt;
&lt;div&gt;The real spanner in the works in the progress of this case was
      the stand taken by Mukul Rohatgi, then attorney general of India
      who, in a hearing before the court in July 2015, stated that there
      is no constitutionally guaranteed right to privacy. His reliance
      was on two Supreme Court judgments in MP Sharma v Satish Chandra
      (1954) and Kharak Singh v State of Uttar Pradesh (1962): both
      cases, decided by eight- and six-judge benches respectively,
      denied the existence of a constitutional right to privacy. As the
      subsequent judgments which upheld the right to privacy were by
      smaller benches, Rohatgi claimed that MP Sharma and Kharak Singh
      still prevailed over them, until they were overruled by a larger
      bench.&lt;/div&gt;
&lt;div&gt;The reference to a larger bench has since delayed the entire
      matter, even as a number of government schemes have made Aadhaar
      mandatory. This reading of privacy as a unidimensional concept by
      the courts is, with due respect, erroneous. Privacy, as a concept,
      includes within its scope, spatial, familial, informational and
      decisional aspects. We all have a legitimate expectation of
      privacy in our private spaces, such as our homes, and in our
      personal relationships. Similarly, we must be able to exercise
      some control over how personal data, like our financial
      information, are disseminated. Most importantly, privacy gives us
      the space to make autonomous choices and decisions without
      external interference. All these dimensions of privacy must stand
      as distinct rights. In MP Sharma, the court rejected a certain
      aspect of the right of privacy by refusing to acknowledge a right
      against search and seizure. This, in no way prevented the court,
      even in the form of a smaller bench, from ruling on any other
      aspects of privacy, including those that are relevant to the
      Aadhaar case.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The limited referral to this bench means that the court will
      have to rule on the status of privacy and its possible limitations
      in isolation, without even going into the details of the Aadhaar
      case (based on the nature of protection that this bench accords to
      privacy, the petitioners and defendants in the Aadhaar case will
      have to argue afresh on whether the project does impede on this
      most fundamental right). There are no facts of the case to ground
      the legal principles in, and defining the contours of a right can
      be a difficult exercise. The court must be wary of how any limits
      they put on the right may be used in future. Equally, it is
      important to articulate that any limitations on the right to
      privacy due to competing interests such as national security and
      public interest must be imposed only when necessary and always be
      proportionate. &lt;br /&gt;
      &lt;br /&gt;&lt;/div&gt;
&lt;p&gt;
    
    
    
    
    
    It will not be enough for the court to merely state that we have a
    constitutional right to privacy. They would be well advised to cut
    through the muddle of existing privacy jurisprudence, and
    unequivocally establish the various facets of the right. Without
    that, we may not be able to withstand the modern dangers of
    surveillance, denial of bodily integrity and self-determination
    through forcible collection of information. The nine judges, in
    their collective wisdom, must not only ensure that we have a right
    to privacy, but also clearly articulate a robust reading of this
    right capable of withstanding the growing interferences with our
    autonomy.&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy-is-not-a-unidimensional-concept'&gt;https://cis-india.org/internet-governance/privacy-is-not-a-unidimensional-concept&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-08-07T08:02:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/privacy-in-social-networked-world">
    <title>Privacy in the Social Networked World</title>
    <link>https://cis-india.org/news/privacy-in-social-networked-world</link>
    <description>
        &lt;b&gt;The Asian Privacy Scholars Network 2nd International Conference was hosted by the Centre for Business Information Ethics, Meiji University, Tokyo, Japan, on behalf of the Asian Privacy Scholars Network, November 19 - 20, 2012. Elonnai Hickok is speaking at the event.&lt;/b&gt;
        &lt;h3&gt;Monday, November 19, 2012&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09:00—09:30&lt;/td&gt;
&lt;td&gt;Registration and Welcome&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:30—10:30&lt;/td&gt;
&lt;td&gt;Keynote Speaker: Pirongrong Ramasoota&lt;br /&gt;(Chulalongkorn University, Thailand)&lt;br /&gt;The Future of Privacy in the World's Largest Democracy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30—11:00&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00—12:30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Whon-Il Park (Kyung Hee University, Korea)&lt;br /&gt;How to Protect, or Utilize, Personal Visual Information in Korea&lt;/p&gt;
&lt;p&gt;Sinta Dewi Rosadi (University Padjadjaran, Indonesia)&lt;br /&gt;Constitutional Privacy Protection: The Indonesian Experience&lt;/p&gt;
&lt;p&gt;Takato Natsui (Meiji University, Japan) Censorship, Burying and Mental Health in Business Office&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:30—14:00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:00—15:00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lilian Edwards (Strathclyde University, UK)&lt;br /&gt;International Implications of the Proposed Revision of the EU Data Protection Directive&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Graham Greenleaf (UNSW, Australia and Meiji University, Japan)&lt;br /&gt;100 Data Privacy Laws: Their Significance and Origins&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:00—15:30&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30—16:30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Kiyoshi Murata/Yohko Orito (Meiji University/Ehime University, Japan)&lt;br /&gt;Japanese Youngsters' Social Attitude towards Privacy&lt;/p&gt;
&lt;p&gt;Ryoko Asai/Iordanis Kavathatzopoulos&lt;br /&gt;(Meiji University, Japan/Uppsala University, Sweden) The Paradoxical Nature of Privacy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00—20:00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Conference Banquet (Salon San, 23rd Floor, Liberty Tower, Meiji University)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Tuesday, November 20, 2012&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09:00—09:45&lt;/td&gt;
&lt;td&gt;Keynote Speaker: Roger Clarke&lt;br /&gt;(Xamax Consultancy, UNSW and ANU, Australia)&lt;br /&gt;Consumer-Oriented Social Media as Market Opportunity&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:45—10:00&lt;/td&gt;
&lt;td&gt;Video Presentation from David Lyon (Queens University, Canada)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00—10:30&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30—12:00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Daniel Trottier (Uppsala University, Sweden) Social Networking Sites and Crowd-sourced Surveillance&lt;/p&gt;
&lt;p&gt;Colin Bennett (University of Victoria, Canada) Social Networking and Privacy Jurisdiction&lt;/p&gt;
&lt;p&gt;Andrew Adams (Meiji University, Japan) Facebook Code: SNS Platform Affordances and Privacy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:00—13:00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00—14:30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Elonnai Hickok (Centre for Internet and Society, India) Transparency and Privacy in India&lt;/p&gt;
&lt;p&gt;Fumio Shimpo (Keio University, Japan) Current Developments in Japanese Data Protection Policy&lt;/p&gt;
&lt;p&gt;Panel: Chen, Greenleaf, Hickok, Shimpo&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30—15:00&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:00—17:00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Ian Brown (University of Oxford, UK) Data Protection and Social Networking Services&lt;/p&gt;
&lt;p&gt;Shirley Williams (University of Reading, UK) Do Computer Science Scholars Consider Issues of Privacy when Studying Large Twitter Data Sets?&lt;/p&gt;
&lt;p&gt;Final Panel: Adams, Bennett, Brown, Clarke, Williams&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Organisers&lt;/h3&gt;
&lt;p&gt;Prof Andrew A. Adams, Meiji University, Tokyo, Japan&lt;br /&gt;Prof Kiyoshi Murata, Meiji University, Tokyo, Japan&lt;br /&gt;Prof Graham Greenleaf, UNSW, Sydney, Australia&lt;br /&gt;(JSPS Visiting Fellow, Meiji University Sep-Dec 2012)&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.kisc.meiji.ac.jp/~ethicj/APSN2/program.pdf"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/privacy-in-social-networked-world'&gt;https://cis-india.org/news/privacy-in-social-networked-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-04T16:19:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-in-the-age-of-the-pandemic">
    <title>Privacy in the Age of the Pandemic</title>
    <link>https://cis-india.org/internet-governance/events/privacy-in-the-age-of-the-pandemic</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, JKGA Law Chambers, and LawyersClubIndia invites you to the online panel discussion on ‘Privacy in the Age of the Pandemic.’ &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;This event will happen on July 18 (Saturday), from 5:30pm to 7:00pm. The discussion will bring together an inter-disciplinary group of experts to unpack some of the core Privacy issues that will undoubtedly shape society, and future governance in the context of the Covid-19 pandemic.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Register for the event &lt;a class="external-link" href="https://tinyurl.com/Privacy-18thJuly"&gt;here&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;&lt;img src="http://cis-india.org/internet-governance/privacy_covid19_event_poster/" alt="null" width="50%" /&gt;&lt;/p&gt;
&lt;p class="discreet"&gt;As panelists, we have:&lt;br /&gt;1) Arnab Kumar, who was instrumental in coming up with the Aarogya Setu app and has led policy initiatives from the front at NITI Aayog;&lt;br /&gt;2) Vrinda Bhandari - well known for her advocacy and academic work in this domain;&lt;br /&gt;3) Sahil Deo - who is helping stakeholders make more informed decisions in policy using data analysis;&lt;br /&gt;4) Mira Swaminathan - a policy researcher with deep domain experience in the dangers of surveillance; and&lt;br /&gt;5) Antaraa Vasudev, founder of Civis, an initiative enabling the layperson to understand the effects of policy changes on them!&lt;/p&gt;
&lt;p class="discreet"&gt;The session will be moderated by Shweta Reddy, and Akshit Goyal.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-in-the-age-of-the-pandemic'&gt;https://cis-india.org/internet-governance/events/privacy-in-the-age-of-the-pandemic&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-07-15T11:34:00Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data">
    <title>Privacy in the Age of Big Data</title>
    <link>https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data</link>
    <description>
        &lt;b&gt;Personal data is freely accessible, shared and even sold, and those to whom this information belongs have little control over its flow.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.asianage.com/india/all-india/100417/privacy-in-the-age-of-big-data.html"&gt;Asian Age&lt;/a&gt; on April 10, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In 2011 it was estimated that the quantity of data produced globally surpassed 1.8 zettabyte. By 2013, it had increased to 4 zettabytes. This is a result of digital services which involve constant data trails left behind by human activity. This expansion in the volume, velocity, and variety of data available, together with the development of innovative forms of statistical analytics on the data collected, is generally referred to as “Big Data”. Despite significant (though largely unrealised) promises about Big Data, which range from improved decision-making, increased efficiency and productivity to greater personalisation of services, concerns remain about the impact of such datafication of all human activity on an individual’s privacy. Privacy has evolved into a sweeping concept, including within its scope matters pertaining to control over one’s body, physical space in one’s home, protection from surveillance, and from search and seizure, protection of one’s reputation as well as one’s thoughts. This generalised and vague conception of privacy not only comes with great judicial discretion, it also thwarts a fair understanding of the subject. Robert Post called privacy a concept so complex and “entangled in competing and contradictory dimensions, so engorged with various and distinct meanings”, that he sometimes “despairs whether it can be usefully addressed at all”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This also leaves the idea of privacy vulnerable to considerable suspicion and ridicule. However, while there is a lack of clarity over the exact contours of what constitutes privacy, there is general agreement over its fundamental importance to our ability to lead whole lives. In order to understand the impact of datafied societies on privacy, it is important to first delve into the manner in which we exercise our privacy. The ideas of privacy and data management that are prevalent can be traced to the Fair Information Practice Principles (FIPP). These principles are the forerunners of most privacy regimes internationally, such as the OECD Privacy Guidelines, APEC Framework, or the nine National Privacy Principles articulated by the Justice A.P. Shah Committee Report. All of these frameworks have rights to notice, consent and correction, and how the data may be used, as their fundamental principles. It makes the data subject to the decision-making agent about where and when her/his personal data may be used, by whom, and in what way. The individual needs to be notified and his consent obtained before his personal data is used. If the scope of usage extends beyond what he has agreed to, his consent will be required for the increased scope.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In theory, this system sounds fair. Privacy is a value tied to the personal liberty and dignity of an individual. It is only appropriate that the individual should be the one holding the reins and taking the large decisions about the use of his personal data. This makes the individual empowered and allows him to weigh his own interests in exercising his consent. The allure of this paradigm is that in one elegant stroke, it seeks to ensure that consent is informed and free and also to implement an acceptable trade-off between privacy and competing concerns. This approach worked well when the number of data collectors were less and the uses of data was narrower and more defined. Today’s infinitely complex and labyrinthine data ecosystem is beyond the comprehension of most ordinary users. Despite a growing willingness to share information online, most people have no understanding of what happens to their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The quantity of data being generated is expanding at an exponential rate. From smartphones and televisions, trains and airplanes, sensor-equipped buildings and even the infrastructures of our cities, data now streams constantly from almost every sector and function of daily life, “creating countless new digital puddles, lakes, tributaries and oceans of information”. The inadequacy of the regulatory approaches and the absence of a comprehensive data protection regulation is exacerbated by the emergence of data-driven business models in the private sector and the adoption of data-driven governance approach by the government. The Aadhaar project, with over a billion registrants, is intended to act as a platform for a number of digital services, all of which produce enormous troves of data. The original press release by the Central Government reporting the approval by the Cabinet of Ministers of the Digital India programme, speaks of “cradle to grave” digital identity as one of its vision areas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the very idea of the government wanting to track its citizens’ lives from cradle to grave is creepy enough in itself, let us examine for a minute what this form of datafied surveillance will entail. A host of schemes under Digital India shall collect and store information through the life cycle of an individual. The result, as we can see, is building databases on individuals, which when combined, will provide a 360 degree view into the lives of individuals. Alongside the emergence of India Stack, a set of APIs built on top of the Aadhaar, conceptualised by iSPIRT, a consortium of select IT companies from India, to be deployed and managed by several agencies, including the National Payments Corporation of India, promises to provide a platform over which different private players can build their applications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sum of these interconnected parts will lead to a complete loss of anonymity, greater surveillance and impact free speech and individual choice. The move towards a cashless economy — with sharp nudges from the government — could lead to lack of financial agencies in case of technological failures as has been the case in experiments with digital payments in Africa. Lack of regulation in emerging data driven sectors such as Fintech can enable predatory practices where right to remotely deny financial services can be granted to private sector companies. An architecture such as IndiaStack enables datafication of financial transactions in a way that enables linked and structured data that allows continued use of the transaction data collected. It is important to recognise that at the stage of giving consent, there are too many unknowns for us to make informed decisions about the future uses of our personal data. Despite blanket approvals allowing any kind of use granted contractually through terms of use and privacy policies, there should be legal obligations overriding this consent for certain kinds of uses that may require renewed consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Biometrics-based identification in UK: &lt;/b&gt;In  2005, researchers from London School of Economics and Political Science  came out with a detailed report on the UK Identity Cards Bill (‘UK  Bill’) — the proposed legislation for a national identification system  based on biometrics. The project also envisaged a centralised database  (like India) that would store personal information along with the entire  transaction history of every individual. The report pointed strongly  against the centralising storage of information and suggested other  alternatives such as a system based on smartcards (where biometrics are  stored on the card itself) or offline biometric-reader terminals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the report, the alternatives would also have been cheaper as neither required real-time online connectivity. In India, online authentication is a far greater challenge. According to Network Readiness Index, 2016, India ranks 91, whereas UK is placed eight. Poor Internet connectivity can raise a lot of problems in the future including paralysis of transactions. The UK identification project was subsequently discarded as a result of the privacy and cost considerations raised in this report.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Aadhaar: Privacy concerns&lt;/h3&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Once the data is collected through National Information Utilities, it will be privatised and controlled by private utilities.&lt;/li&gt;
&lt;li&gt;Once an individual’s data is entered in the system, it cannot be deleted. That individual will have no control over it.&lt;/li&gt;
&lt;li&gt;Aadhaar Data (Demographic details along with photographs) are shared/transferred with the private entities including telecom companies as per the Aadhaar (Targeted delivery of Financial and other subsidies, benefits and services) Act, 2016 with the consent of Aadhaar number holder to fulfil their e-KYC requirements. The data is shared in encrypted form through secured channel.&lt;/li&gt;
&lt;li&gt;Aadhaar Enabled Payment System (AEPS) on which 119 banks are live.&lt;/li&gt;
&lt;li&gt;More than 33.87 crore transactions have taken place through AEPS, which was only 46 lakhs in May 2014.&lt;/li&gt;
&lt;li&gt;As on 30-9-2016, 78 government schemes were linked to Aadhaar.&lt;/li&gt;
&lt;li&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016, provides that no core-biometric information (fingerprints, iris scan) shall be shared with anyone for any reason whatsoever (Sec 29) and that the biometric information shall not be used for any purpose other than generation of Aadhaar and authentication.&lt;/li&gt;
&lt;li&gt;Access to the data repository of UIDAI, called the Central Identities Data Repository(CIDR), is provided to third parties or private companies.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Central Monitoring System&lt;/b&gt; (CMS) is already live in  Delhi, New Delhi and Mumbai. Union minister Ravi Shankar Prasad revealed  this in one of his replies in the Lok Sabha last year. CMS has been set  up to automate the process of Lawful Interception &amp;amp; Monitoring of  telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Central Monitoring System&lt;/b&gt; (CMS) is already live in  Delhi, New Delhi and Mumbai. Union minister Ravi Shankar Prasad revealed  this in one of his replies in the Lok Sabha last year. CMS has been set  up to automate the process of Lawful Interception &amp;amp; Monitoring of  telecommunications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Lawful Intercept &lt;/b&gt;and Monitoring (LIM) systems are used  by the Indian Government to intercept records of voice, SMSes, GPRS  data, details of a subscriber’s application and recharge history and  call detail record (CDR) and monitor Internet traffic, emails,  web-browsing, Skype and any other Internet activity of Indian users.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data'&gt;https://cis-india.org/internet-governance/blog/asian-age-amber-sinha-april-10-2017-privacy-in-the-age-of-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-11T14:43:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-amber-sinha-pranesh-prakash-march-12-2016-privacy-concerns-overshadow-monetary-benefits-of-aadhaar-scheme">
    <title>Privacy Concerns Overshadow Monetary Benefits of Aadhaar Scheme</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-amber-sinha-pranesh-prakash-march-12-2016-privacy-concerns-overshadow-monetary-benefits-of-aadhaar-scheme</link>
    <description>
        &lt;b&gt;Since its inception in 2009, the Aadhaar system has been shrouded in controversy over issues of privacy, security and viability. It has been implemented without a legislative mandate and has resulted in a PIL in the Supreme Court, which referred it to a Constitution bench. On Friday, it kicked up more dust when the Lok Sabha passed a Bill to give statutory backing to the unique identity number scheme.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in the &lt;a class="external-link" href="http://www.hindustantimes.com/india/privacy-concerns-overshadow-monetary-benefits-of-aadhaar-scheme/story-E3o0HRwc6XOdlgjqgmmyAM.html"&gt;Hindustan Times &lt;/a&gt;on March 12, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;There was an earlier attempt to give legislative backing to this project by the UPA government, but a parliamentary standing committee, led by BJP leader Yashwant Sinha, had rejected the bill in 2011 on multiple grounds. In an about-turn, the BJP-led NDA government decided to continue with Aadhaar despite most of those grounds still remaining.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Separately, there have been orders passed by the Supreme Court that prohibit the government from making Aadhaar mandatory for availing government services whereas this Bill seeks to do precisely that, contrary to the government’s argument that Aadhaar is voluntary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In some respects, the new Aadhaar Bill is a significant improvement over the previous version. It places stringent restrictions on when and how the UID Authority (UIDAI) can share the data, noting that biometric information — fingerprint and iris scans — will not be shared with anyone. It seeks prior consent for sharing data with third party. These are very welcome provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But a second reading reveals the loopholes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government will get sweeping power to access the data collected, ostensibly for “efficient, transparent, and targeted delivery of subsidies, benefits and services” as it pleases “in the interests of national security”, thus confirming the suspicions that the UID database is a surveillance programme masquerading as a project to aid service delivery.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The safeguards related to accessing the identification information can be overridden by a district judge. Even the core biometric information may be disclosed in the interest of national security on directions of a joint secretary-level officer. Such loopholes nullify the privacy-protecting provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Amongst the privacy concerns raised by the Aadhaar system are the powers it provides private third parties to use one’s UID number. This concern, which wouldn’t exist without a national ID squarely relates to Aadhaar and needs a more comprehensive data protection law to fix it. The supposed data protection under the Information Technology Act is laughable and inadequate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bill was introduced as a Money Bill, normally reserved for matters related to taxation, borrowing and the Consolidated Fund of India (CFI), and it would be fair to question whether this was done to circumvent the Rajya Sabha.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;None of the above arguments even get to the question of implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aadhaar hasn’t been working. When looking into reasons why 22% of PDS cardholders in Andhra Pradesh didn’t collect their rations it was found that there was fingerprint authentication failure in 290 of the 790 cardholders, and in 93 instances there was an ID mismatch. A recent paper in the Economic and Political Weekly by Hans Mathews, a mathematician with the CIS, shows the programme would fail to uniquely identify individuals in a country of 1.2 billion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The debate shouldn’t be only about the Aadhaar Bill being passed off as a Money Bill and about the robustness of its privacy provisions, but about whether the Aadhaar project can actually meet its stated goals.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-amber-sinha-pranesh-prakash-march-12-2016-privacy-concerns-overshadow-monetary-benefits-of-aadhaar-scheme'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-amber-sinha-pranesh-prakash-march-12-2016-privacy-concerns-overshadow-monetary-benefits-of-aadhaar-scheme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pranesh Prakash and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-17T16:12:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy">
    <title>Privacy and the Information Technology Act — Do we have the Safeguards for Electronic Privacy?</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy</link>
    <description>
        &lt;b&gt;How do the provisions of the Information Technology Act measure up to the challenges of privacy infringement? Does it provide an adequate and useful safeguard for our electronic privacy? Prashant Iyengar gives a comprehensive analysis on whether and how the Act fulfils the challenges and needs through a series of FAQs while drawing upon real life examples. &lt;/b&gt;
        &lt;h2&gt;What kinds of computer related activities impinge on privacy?&lt;/h2&gt;
&lt;p&gt;Although Information and Communications Technologies (ICTs) have greatly enhanced our capacities to collect, store, process and communicate information, it is ironically these very capacities of technology which make us vulnerable to intrusions of our privacy on a previously impossible scale. Firstly, data on our own personal computers can compromise us in unpleasant ways — with consequences ranging from personal embarrassment to financial loss. Secondly, transmission of data over the Internet and mobile networks is equally fraught with the risk of interception — both lawful and unlawful — which could compromise our privacy. Thirdly, in this age of cloud computing when much of "our" data — our emails, chat logs, personal profiles, bank statements, etc., reside on distant servers of the companies whose services we use, our privacy becomes only as strong as these companies’ internal electronic security systems. Fourthly, the privacy of children, women and minorities tend to be especially fragile in this digital age and they have become frequent targets of exploitation. Fifthly, Internet has spawned new kinds of annoyances from electronic voyeurism to spam or offensive email to ‘phishing’ — impersonating someone else’s identity for financial gain — each of which have the effect of impinging on one’s privacy.&lt;/p&gt;
&lt;p&gt;Although there are a number of technological measures through which these risks can be reduced, it is equally important to have a robust legal regime in place which lays emphasis on the maintenance of privacy. This note looks at whether and how the Information Technology Act that we currently have in India measures up to these challenges of electronic privacy [&lt;a href="#1"&gt;1&lt;/a&gt;].&lt;/p&gt;
&lt;h2&gt;&lt;span class="Apple-style-span"&gt;What provisions in the IT Act protect against violations of privacy?&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;At the outset, it would be pertinent to note that the IT Act defines a ‘computer resource’; expansively as including a “computer, computer system, computer network, data, computer database or software” [&lt;a href="#2"&gt;2&lt;/a&gt;]. As is evident, this definition is wide enough to cover most intrusions which involve any electronic communication devices or networks — including mobile networks. Briefly, then IT Act provides for both civil liability and criminal penalty for a number of specifically proscribed activities involving use of a computer —  many of which impinge on privacy directly or indirectly. These will be examined in detail in the following sub-sections.&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span"&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;Intrusions into computers and mobile devices&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;accessing&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;downloading/copying/extraction of data or extracts any data&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;introduction of computer contaminant[&lt;a href="#3"&gt;3&lt;/a&gt;];or computer virus[&lt;a href="#4"&gt;4&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;causing damage either to the computer resource or data residing on it&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;disruption&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;denial of access&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;facilitating access by an unauthorized person&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;charging the services availed of by a person to the account of another person,&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;destruction or diminishing of value of information&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;stealing, concealing, destroying or altering source code with an intention&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;span class="Apple-style-span"&gt;
&lt;p&gt;The Act provides for the civil remedy of “damages by way of compensation” for damages caused by any of these actions. In addition anyone who “dishonestly” and “fraudulently” does any of these specified acts is liable to be punished with imprisonment for a term of upto three years or with a fine which may extend to five lakh rupees, or with both[&lt;a href="#5"&gt;5&lt;/a&gt;].&lt;/p&gt;
&lt;/span&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Bangalore techie convicted for hacking govt site (2009, Deccan Herald)&lt;/b&gt;[&lt;a href="#6"&gt;6&lt;/a&gt;]&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In November 2009, The Additional Chief Metropolitan Magistrate, Egmore, Chennai, sentenced N G Arun Kumar, a techie from Bangalore to undergo a rigorous imprisonment for one year with a fine of Rs 5,000 under section 420 IPC (cheating) and Section 66 of IT Act (hacking).&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;Investigations had revealed that Kumar was logging on to the BSNL broadband Internet connection as if he was the authorised genuine user and ‘made alteration in the computer database pertaining to broadband Internet user accounts’ of the subscribers.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;The CBI had registered a cyber crime case against Kumar and carried out investigations on the basis of a complaint by the Press Information Bureau, Chennai, which detected the unauthorised use of broadband Internet.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;The complaint also stated that the subscribers had incurred a loss of Rs 38,248 due to Kumar’s wrongful act. He used to ‘hack’ sites from Bangalore as also from Chennai and other cities, they said.&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Children's privacy online&lt;/h3&gt;
&lt;p&gt;As computers and the Internet become ubiquitous children have increasingly become exposed to crimes such as pornography and stalking that make use of their private information. The newly inserted section 67B of the IT Act (2008) attempts to safeguard the privacy of children below 18 years by creating a new enhanced penalty for criminals who target children.&lt;/p&gt;
&lt;p&gt;The section firstly penalizes anyone engaged in child pornography. Thus, any person who “publishes or transmits” any material which depicts children engaged in sexually explicit conduct, or anyone who creates, seeks, collects, stores, downloads, advertises or exchanges this material may be punished with imprisonment upto five years (seven years for repeat offenders) and with a fine of upto Rs. 10 lakh.&lt;/p&gt;
&lt;p&gt;Secondly, this section punishes the online enticement of children into sexually explicitly acts, and the facilitation of child abuse, which are also punishable as above.&lt;/p&gt;
&lt;p&gt;Viewed together, these provisions seek to carve out a limited domain of privacy for children from would-be sexual predators.&lt;/p&gt;
&lt;p&gt;The section exempts from its ambit, material which is justified on the grounds of public good, including the interests of "science, literature, art, learning or other objects of general concern". Material which is kept or used for bona fide "heritage or religious purpose" is also exempt.&lt;/p&gt;
&lt;p&gt;In addition, the newly released Draft Intermediary Due-Diligence Guidelines, 2011 [&lt;a href="#7"&gt;7&lt;/a&gt;]require ‘intermediaries’[&lt;a href="#8"&gt;8&lt;/a&gt;]to notify users not to store, update, transmit and store any information that is inter alia, “pedophilic” or “harms minors in any way”. An intermediary who obtains knowledge of such information is required to “act expeditiously to work with user or owner of such information to remove access to such information that is claimed to be infringing or to be the subject of infringing activity”. Further, the intermediary is required to inform the police about such information and preserve the records for 90 days.&lt;/p&gt;
&lt;h3&gt;Electronic Voyeurism&lt;/h3&gt;
&lt;p&gt;Although once regarded as only the stuff of spy cinema, the explosion in consumer electronics has lowered the costs and the size of cameras to such an extent that the threat of hidden cameras recording people’s intimate moments has become quite real. Responding to the growing trend of such electronic voyeurism, a new section 66E has been inserted into the IT Act which penalizes the capturing, publishing and transmission of images of the "private area" [&lt;a href="#9"&gt;9&lt;/a&gt;]of any person without their consent, "under circumstances violating the privacy" [&lt;a href="#10"&gt;10&lt;/a&gt;] of that person.&lt;/p&gt;
&lt;p&gt;This offence is punishable with imprisonment of upto three years or with a fine of upto Rs. two lakh or both.&lt;/p&gt;
&lt;h3&gt;Phishing – or Identity Theft&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The word 'phishing' is commonly used to describe the offence of electronically impersonating someone else for financial gain. This is frequently done either by using someone else’s login credentials to gain access to protected systems, or by the unauthorized application of someone else’s digital signature in the course of electronic contracts. Increasingly a new type of crime has emerged wherein sim cards of mobile phones have been ‘cloned’ enabling miscreants to make calls on others' accounts. This is also a form of identity theft.&lt;/p&gt;
&lt;p&gt;Two sections of the amended IT Act penalize these crimes:&lt;/p&gt;
&lt;p&gt;Section 66C makes it an offence to “fraudulently or dishonestly” make use of the electronic signature, password or other unique identification feature of any person. Similarly, section 66D makes it an offence to “cheat by personation” [&lt;a href="#11"&gt;11&lt;/a&gt;] by means of any ‘communication device’[&lt;a href="#12"&gt;12&lt;/a&gt;] or 'computer resource'.&lt;/p&gt;
&lt;p&gt;Both offences are punishable with imprisonment of upto three years or with a fine of upto Rs. one lakh.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Mumbai Police Solves Phishing scam&lt;/b&gt; &lt;span class="Apple-style-span"&gt;[&lt;a href="#13"&gt;13&lt;/a&gt;]&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;In 2005, a financial institute complained that they were receiving misleading emails ostensibly emanating from ICICI Bank’s email ID.&lt;/p&gt;
&lt;p&gt;An investigation was carried out with the emails received by the customers of that financial institute and the accused were arrested. The place of offence, Vijaywada was searched for the evidence. One laptop and mobile phone used for committing the crime was seized.&lt;/p&gt;
&lt;p&gt;The arrested accused had used open source code email application software for sending spam e-mails. He had downloaded the same software from the Internet and then used it as it is.&lt;/p&gt;
&lt;p&gt;He used only VSNL to spam the e-mail to customers of the financial institute because VSNL email service provider does not have spam box to block the unsolicited emails.&lt;/p&gt;
&lt;p&gt;After spamming e-mails to the institute customers he got the response from around 120 customers of which 80 are genuine and others are not correct because they do not have debit card details as required for e-banking."&lt;/p&gt;
&lt;p&gt;The customers who received his e-mail felt that it originated from the bank. When they filled the confidential information and submitted it the said information was directed to the accused. This was possible because the dynamic link was given in the first page (home page) of the fake website. The dynamic link means when people click on the link provided in spam that time only the link will be activated. The dynamic link was coded by handling the Internet Explorer onclick () event and the information of the form will be submitted to the web server (where the fake website is hosted). Then server will send the data to the configured e-mail address and in this case the e-mail configured was to the e-mail of the accused. All the information after phishing (user name, password, transaction password, debit card number and PIN, mother’s maiden name) which he had received through the Wi-Fi Internet connectivity of Reliance.com was now available on his Acer laptop.&lt;/p&gt;
&lt;p&gt;This crime was registered under section 66 of the IT Act, sections 419, 420, 465, 468 and 471 of  the Indian Penal Code and sections 51, 63 and 65 of the Indian Copyright Act, 1957 which attract the punishment of three years imprisonment and fine upto Rs 2 lac which the accused never thought of.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Spam and Offensive Messages&lt;/h3&gt;
&lt;p&gt;Although the advent of e-mail has greatly enhanced our communications capacities, most e-mail networks today remain susceptible to attacks from spammers who bulk-email unsolicited promotional or even offensive messages to the nuisance of users. Among the more notorious of these scams is/was the so-called "section 409 scam" in which victims receive e-mails from alleged millionaires who induce them to disclose their credit information in return for a share in millions.&lt;/p&gt;
&lt;p&gt;Section 66A of the IT Act attempts to address this situation by penalizing the sending of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;any message which is grossly offensive or has a menacing character&lt;/li&gt;
&lt;li&gt;false information for the purpose of causing annoyance, inconvenience, danger, insult, criminal intimidation, enmity, hatred or ill-will&lt;/li&gt;
&lt;li&gt;any electronic e-mail for the purpose of causing annoyance or inconvenience, or to deceive the addressee about the origin of such messages;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;This offence is punishable with imprisonment upto three years and with a fine[&lt;a href="#14"&gt;14&lt;/a&gt;]&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="Apple-style-span"&gt;&lt;b&gt;Hoax E-mails&lt;/b&gt; [&lt;a href="#15"&gt;15&lt;/a&gt;]&lt;/span&gt;&lt;br /&gt;&lt;br /&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In 2009, a 15-year-old Bangalore teenager was arrested by the cyber crime investigation cell (CCIC) of the city crime branch for allegedly sending a hoax e-mail to a private news channel. In the e-mail, he claimed to have planted five bombs in Mumbai, challenging the police to find them before it was too late.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;According to police officials, at around 1p.m. on May 25, the news channel received an e-mail that read: “I have planted five bombs in Mumbai; you have two hours to find it.” The police, who were alerted immediately, traced the Internet Protocol (IP) address to Vijay Nagar in Bangalore. The Internet service provider for the account was BSNL, said officials.&lt;/span&gt;&lt;/p&gt;
&lt;pre&gt;&lt;span class="Apple-style-span"&gt;&lt;b&gt;Minor Hoax Spells Major Trouble&lt;/b&gt;&lt;/span&gt;&lt;/pre&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class="Apple-style-span"&gt;Sixteen-year-old Rakesh Patel (name changed), a student from Ahmedabad, sent an e-mail to a private news channel on March 18, 2008, warning officials of a bomb on an Andheri-bound train. In the e-mail, he claimed to be a member of the Dawood Ibrahim gang. Three days later, the crime investigation cell (CCIC) of the city police arrested the boy under section 506 (ii) for criminal intimidation. He was charge-sheeted on November 28, 2008.&lt;br /&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Status: Patel was given a warning by a juvenile court&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;A 14-year-old Colaba boy sent a hoax e-mail to a TV channel in Madhya Pradesh, three days after the July 26, 2008, Ahmedabad bomb blasts. He claimed that 29 bombs would go off in Jabalpur. He was picked up by officers of the anti-terrorism squad (ATS) who, with the help of the MP police, were able to trace the e-mail to a cyber café in Colaba.&lt;/span&gt;&lt;br /&gt;&lt;span class="Apple-style-span"&gt;Status: No FIR was registered. The Cuffe Parade police registered a non-cognizable (NC) complaint &lt;/span&gt;&lt;span class="Apple-style-span"&gt;against him, and the boy was allowed to go home after the police gave him a “strict warning”.&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Shariq Khan, 18, was arrested in Bhopal on July 26, 2006, for sending out three e-mails claiming to be a member of the terrorist organisation, which the police believed was behind the 7/11 train bombings. He was arrested by the Bhopal police. Later, the ATS brought the boy to Mumbai and also booked him for a five-year-old unsolved case where an unknown accused had sent e-mail warnings to the department of Atomic Energy (DAE) in 2001.&lt;br /&gt;Status: The police filed a charge-sheet against Shariq who claimed that he had sent the e-mails for fun. Trial is pending in a juvenile court. Shariq is presently out on bail in Bhopal.&lt;/li&gt;
&lt;li&gt;On February 26, 2006, a 17-yearold student from Jamnabai Narsee School called an Alitalia flight bound to Milan at 2 a.m. telling them there was a bomb on board. He wanted to stop his girlfriend from going abroad. She was one of the 12 students on their way to attend a mock United Nations session in Geneva.&lt;br /&gt;Status: After being grilled by the police, he was arrested, but let out on bail.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Lawful Interception and monitoring of electronic communications under the IT Act&lt;/h2&gt;
&lt;p&gt;In addition to violations of privacy by criminal and the mischievous minded, electronic communications and storage are also a goldmine for governmental supervision and surveillance. This section provides a brief overview of the provisions in the IT Act which circumscribe the powers of the state to intercept electronic communications.&lt;/p&gt;
&lt;p&gt;The newly amended IT Act completely rewrote its provisions in relation to lawful interception. The new section 69 dealing with “power to issue directions for interception or monitoring or decryption of any information through any computer resource” is much more elaborate than the one it replaced, In October 2009, the Central Government notified rules under section 69 which lay down procedures and safeguards for interception, monitoring and decryption of information (the “Interception Rules 2009”). This further thickens the legal regime in this context.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Unlawful Intercept&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;In August 2007, Lakshmana Kailash K., a techie from Bangalore was arrested on the suspicion of having posted insulting images of Chhatrapati Shivaji, a major historical figure in the state of Maharashtra, on the social-networking site Orkut. The police identified him based on IP address details obtained from Google and Airtel – Lakshmana’s ISP. He was brought to Pune and detained for 50 days before it was discovered that the IP address provided by Airtel was erroneous. The mistake was evidently due to the fact that while requesting information from Airtel, the police had not properly specified whether the suspect had posted the content at 1:15 p.m. or a.m.&lt;/p&gt;
&lt;p&gt;Taking cognizance of his plight from newspaper accounts, the State Human Rights Commission subsequently ordered the company to pay Rs 2 lakh to Lakshmana as damages [&lt;a href="#16"&gt;16&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;The incident highlights how minor privacy violations by ISPs and intermediaries could have impacts that gravely undermine other basic human rights [&lt;a href="#17"&gt;17&lt;/a&gt;].&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In addition to section 69, the Government has been empowered under the newly inserted section 69B to "monitor and collect traffic data or information generated, transmitted, received or stored in any computer resource".&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;"Traffic data" has been defined in the section to mean “any data identifying or purporting to identify any person, computer system or computer network or any location to or from which communication is or may be transmitted.” Rules have been issued by the Central Government under this section (the “Monitoring and Collecting Traffic Data Rules, 2009”) which are similar, although with important distinctions, to the rules issued under section 69. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Thus, there are two parallel interception and monitoring regimes in place under the Information Technology Act. In the paragraphs that follow, we provide an overview of the regime of surveillance under section 69 — since they are more targeted towards the individual, and consequently the threats to privacy are more severe — while highlighting important differences in the rules drafted under section 69.&lt;/p&gt;
&lt;h3&gt;Who may lawfully intercept?&lt;/h3&gt;
&lt;p&gt;Section 69 empowers the “Central Government or a state government or any of its officers specially authorised by the Central Government or the state government, as the case may be” to exercise powers of interception under this section.&lt;/p&gt;
&lt;p&gt;Under the Interception Rules 2009, the secretary in the Ministry of Home Affairs has been designated as the "competent authority", with respect to the Central Government, to issue directions pertaining to interception, monitoring and decryption. Similarly, the respective state secretaries in charge of Home Departments of the various states and union territories are designated as "competent authorities" to issue directions with respect to the state government [&lt;a href="#18"&gt;18&lt;/a&gt;].&lt;/p&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;/td&gt;
&lt;td&gt;Central Government&lt;/td&gt;
&lt;td&gt;State/Union Territory&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Ordinary Circumstances&lt;/td&gt;
&lt;td&gt;Secretary in the Ministry of Home Affairs&lt;/td&gt;
&lt;td&gt;Secretary in charge of Home Departments of State&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Emergency&lt;/td&gt;
&lt;td&gt;Head or second senior most officer of security and law enforcement&lt;/td&gt;
&lt;td&gt;Authorized officer not below the rank of Inspectors General of Police&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;p&gt;However, an exception is made in cases of emergency, either&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;in remote areas where obtaining prior directions from the competent authority is not feasible or&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;for ‘operational reasons’ where obtaining prior directions is not feasible.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In such cases it would be permissible to carry out interception after obtaining the orders of the Head or second senior most officer of security and law enforcement at the central level, and an authorized officer not below the rank of Inspector General of Police at the state or union territory level. The order must be communicated to the competent authority within three days of its issue, and approval must be obtained from the authority within seven working days, failing which the order would lapse.&lt;/p&gt;
&lt;p&gt;Where a state/union territory wishes to intercept/monitor or decrypt information beyond its territory, the competent authority for that state must make a request to the competent authority of the Central Government to issue appropriate directions.&lt;/p&gt;
&lt;h2&gt;Under what circumstances a direction to intercept may be issued?&lt;/h2&gt;
&lt;h3&gt;Purposes for which interception may be directed&lt;/h3&gt;
&lt;p&gt;Under section 69, the powers of interception may be exercised by the authorized officers “when they are satisfied that it is necessary or expedient” to do so in the interest of:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;sovereignty or integrity of India,&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;defense of India,&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;security of the state,&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;friendly relations with foreign states or&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;public order or&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;preventing incitement to the commission  of any cognizable offence relating to above or&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;for investigation of any offence.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Under section 69B, the competent authority may issue directions for monitoring for a range of “cyber security”[&lt;a href="#20"&gt;20&lt;/a&gt;] purposes including, inter alia, “identifying or tracking of any person who has breached, or is suspected of having breached or being likely to breach cyber security”.&lt;/p&gt;
&lt;h3&gt;Contents of direction&lt;/h3&gt;
&lt;p&gt;The reasons for ordering interception must be recorded in writing [&lt;a href="#21"&gt;21&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In the case of a direction under section 69, in arriving at its decision, the competent authority must consider alternate means of acquiring the information other than issuing a direction for interception [&lt;/span&gt;&lt;a href="#22"&gt;22&lt;/a&gt;&lt;span class="Apple-style-span"&gt;]. The direction must relate to information sent or likely to be sent from one or more particular computer resources to another (or many) computer resources [&lt;/span&gt;&lt;a href="#23"&gt;23&lt;/a&gt;&lt;span class="Apple-style-span"&gt;]. The direction must specify the name and designation of the officer to whom information obtained is to be disclosed, and also specify the uses for which the information is to be employed [&lt;/span&gt;&lt;a href="#24"&gt;24&lt;/a&gt;&lt;span class="Apple-style-span"&gt;].&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Duration of interception and periodic review&lt;/h3&gt;
&lt;p&gt;Once issued, an interception direction issued under section 69 remains in force for a period of 60 days (unless withdrawn earlier), and may be renewed for a total period not exceeding 180 days [&lt;a href="#25"&gt;25&lt;/a&gt;]. A direction issued under section 69B does not expire automatically through the lapse of time and theoretically would continue until withdrawn.&lt;/p&gt;
&lt;p&gt;Within seven days of its issue, a copy of a direction issued under either section 69 or section 69B must be forwarded to the review committee constituted to oversee wiretapping under the Indian Telegraph Act [&lt;a href="#26"&gt;26&lt;/a&gt;]. Every two months, the review committee is required to meet and record its findings as to whether the direction was validly issued in light of section 69(3) [&lt;a href="#27"&gt;27&lt;/a&gt;]. If the review committee is of the opinion that it was not, it can set aside the direction and order destruction of all information collected [&lt;a href="#28"&gt;28&lt;/a&gt;].&lt;/p&gt;
&lt;h3&gt;What powers of interception do they have?&lt;/h3&gt;
&lt;p&gt;The competent authority may, in his written direction “direct any agency of the appropriate government to intercept monitor or decrypt or cause to be intercepted or monitored or decrypted any information generated, transmitted, received or stored in any computer resource”[&lt;a href="#29"&gt;29&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;Accordingly, the subscriber or intermediary or any person in charge of the computer resource is must, if required by the designated government agency, extend all facilities, equipment and technical assistance to:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;provide access to or secure access to the computer resource generating, transmitting, receiving or storing such information; or&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;intercept, monitor, or decrypt[&lt;a href="#30"&gt;30&lt;/a&gt;] the information, as the case may be; or&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;provide information stored in computer resource.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The intermediary must maintain records mentioning the intercepted information, the particulars of the person, e-mail account, computer resource, etc., that was intercepted, the particulars of the authority to whom the information was disclosed, number of copies of the information that were made, the date of their destruction, etc. [&lt;a href="#31"&gt;31&lt;/a&gt;].  This list of requisitions received must be forwarded to the government agency once every 15 days to ensure their authenticity [&lt;a href="#32"&gt;32&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;In addition, a responsibility is cast on the intermediary to put in place adequate internal checks to ensure that unauthorized interception does not take place, and extreme secrecy of intercepted information is maintained [&lt;a href="#33"&gt;33&lt;/a&gt;].&lt;/p&gt;
&lt;h2&gt;How long can information collected during interception be retained?&lt;/h2&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Interception rules require all records, including electronic records pertaining to interception to be destroyed by the government agency “in every six months except in cases where such information is required or likely to be required for functional purposes”. In the case of the Monitoring and Collecting of Traffic Data Rules 2009, this period is nine months from the date of creation of record.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;In addition, all records pertaining to directions for interception and monitoring are to be destroyed by the intermediary within a period of two months following discontinuance of interception or monitoring, unless they are required for any ongoing investigation or legal proceedings. In the case of Monitoring Rules, this period is six months from the date of discontinuance.&lt;/p&gt;
&lt;h2&gt;What penalties accrue to intermediaries and subscribers for resisting interception?&lt;/h2&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Section 69 stipulates a penalty of imprisonment upto a term of seven years and fine for any “subscriber or intermediary or any person who fails to assist the agency” empowered to intercept.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Data Protection under the IT Act&lt;/h2&gt;
&lt;h3&gt;Data Retention Requirements of 'Intermediaries'&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Section 67C of the amended IT Act mandates ‘intermediaries’[&lt;a href="#34"&gt;34&lt;/a&gt;] to maintain and preserve certain information under their control for durations which are to be specified by law. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;Any intermediary who fails to retain such electronic records may be punished with imprisonment up to three years and a fine.&lt;/p&gt;
&lt;h3&gt;Liability for body-corporates under section 43A&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;The newly inserted section 43A makes a start at introducing a mandatory data protection regime in Indian law. The section obliges corporate bodies who ‘possess, deal or handle’ any ‘sensitive personal data’ to implement and maintain ‘reasonable’ security practices, failing which they would be liable to compensate those affected by any negligence attributable to this failure. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;It is only the narrowly-defined ‘body corporates’ [&lt;a href="#35"&gt;35&lt;/a&gt;] engaged in ‘commercial or professional activities’ who are the targets of this section. Thus government agencies and non-profit organisations are entirely excluded from the ambit of this section [&lt;a href="#36"&gt;36&lt;/a&gt;]. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;“Sensitive personal data or information” is any information that the Central Government may designate as such, when it sees fit to.&lt;/p&gt;
&lt;p&gt;The “reasonable security practices” which the section obliges body corporates to observe are restricted to such measures as may be specified either “in an agreement between the parties” or in any law in force or as prescribed by the Central Government.&lt;/p&gt;
&lt;p&gt;By defining both “sensitive personal data” and “reasonable security practice” in terms that require executive elaboration, the section in effect pre-empts the courts from evolving an iterative, contextual definition of these terms.&lt;/p&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Mphasis BPO Fraud: 2005&lt;/b&gt; [&lt;a href="#37"&gt;37&lt;/a&gt;]&lt;br /&gt;&lt;br /&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In December 2004, four call centre employees, working at an outsourcing facility operated by MphasiS in India, obtained PIN codes from four customers of MphasiS’ client, Citi Group. These employees were not authorized to obtain the PINs. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt; &lt;/span&gt;&lt;span class="Apple-style-span"&gt;In association with others, the call centre employees opened new accounts at Indian banks using false identities. Within two months, they used the PINs and account information gleaned during their employment at MphasiS to transfer money from the bank accounts of CitiGroup customers to the new accounts at Indian banks. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;By April 2005, the Indian police had tipped off to the scam by a U.S. bank, and quickly identified the individuals involved in the scam. Arrests were made when those individuals attempted to withdraw cash from the falsified accounts, $426,000 was stolen; the amount recovered was $230,000.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h3&gt;Draft Reasonable Security Practices Rules 2011 &lt;span class="Apple-style-span"&gt;[&lt;a href="#38"&gt;38&lt;/a&gt;]&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;In February 2011, the Ministry of Information and Technology, published draft rules under section 43A in order to define “sensitive personal information” and to prescribe “reasonable security practices” that body corporates must observe in relation to the information they hold.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Sensitive Personal Information&lt;/b&gt;&lt;br /&gt;Rule 3 of these Draft Rules designates the following types of information as ‘sensitive personal information’:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;password;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;user details as provided at the time of registration or thereafter;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;information related to financial information such as Bank account / credit card / debit card / other payment instrument details of the users;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;physiological and mental health condition;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;medical records and history;(vi) Biometric information;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;information received by body corporate for processing, stored or processed under lawful contract or otherwise;&lt;/li&gt;
&lt;/ul&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;call data records;&lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;p&gt;This however, does not apply to “any information that is freely available or accessible in public domain or accessible under the Right to Information Act, 2005”.&lt;/p&gt;
&lt;p&gt;They and “any person” holding sensitive personal information are forbidden from “keeping that information for longer than is required for the purposes for which the information may lawfully be used”[&lt;a href="#40"&gt;40&lt;/a&gt;]&lt;/p&gt;
&lt;h3&gt;Mandatory Privacy Policies for body corporates&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Rule 4 of the draft rules enjoins a body corporate or its representative who “collects, receives, possess, stores, deals or handles” data to provide a privacy policy “for handling of or dealing in user information including sensitive personal information”. This policy is to be made available for view by such “providers of information” [&lt;a href="#41"&gt;41&lt;/a&gt;]. The policy must provide details of:&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;Type of personal or sensitive information collected under sub-rule (ii) of rule 3;&lt;/li&gt;
&lt;li&gt;Purpose, means and modes of usage of such information;&lt;/li&gt;
&lt;li&gt;Disclosure of information as provided in rule 6 [&lt;a href="#42"&gt;42&lt;/a&gt;]. &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;b&gt;Prior Consent and Use Limitation during Data Collection&lt;/b&gt;&lt;/div&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;In addition to the restrictions on collecting sensitive personal information, body corporate must obtain prior consent from the “provider of information” regarding “purpose, means and modes of use of the information”. The body corporate is required to “take such steps as are, in the circumstances, reasonable”[&lt;a href="#43"&gt;43&lt;/a&gt;] to ensure that the individual from whom data is collected is aware of :&lt;/span&gt;&lt;/p&gt;
&lt;div&gt;
&lt;ul&gt;
&lt;li&gt;the fact that the information is being collected; and&lt;/li&gt;
&lt;li&gt;the purpose for which the information is being collected; and&lt;/li&gt;
&lt;li&gt;the intended recipients of the information; and&lt;/li&gt;
&lt;li&gt;the name and address of :&lt;/li&gt;
&lt;li&gt;the agency that is collecting the information; and&lt;/li&gt;
&lt;li&gt;the agency that will hold the information. &lt;/li&gt;
&lt;/ul&gt;
&lt;/div&gt;
&lt;p&gt;During data collection, body corporates are required to give individuals the option to opt-in or opt-out from data collection [&lt;a href="#44"&gt;44&lt;/a&gt;]. They must also permit individuals to review and modify the information they provide "wherever necessary" [&lt;a href="#45"&gt;45&lt;/a&gt;]. Information collected is to be kept securely [&lt;a href="#46"&gt;46&lt;/a&gt;], used only for the stated purpose [&lt;a href="#47"&gt;47&lt;/a&gt;] and any grievances must be addressed by the body corporate “in a time bound manner” [&lt;a href="#48"&gt;48&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;Unlike "sensitive personal information" there is no obligation to retain information only for as long as is it is required for the purpose collected.&lt;/p&gt;
&lt;h3&gt;Limitations on Disclosure of Information&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;The draft rules require a body corporate to obtain prior permission from the provider of such information obtained either “under lawful contract or otherwise” before information is disclosed [&lt;a href="#49"&gt;49&lt;/a&gt;]. The body corporate or any person on its behalf shall not publish the sensitive personal information [&lt;a href="#50"&gt;50&lt;/a&gt;]. Any third party receiving this information is prohibited from disclosing it further [&lt;a href="#51"&gt;51&lt;/a&gt;]. However, a proviso to this sub-rule mandates information to be provided to ‘government agencies’ for the purposes of “verification of identity, or for prevention, detection, investigation, prosecution, and punishment of offences”. In such cases, the government agency is required to send a written request to the body corporate possessing the sensitive information, stating clearly the purpose of seeking such information. The government agency is also required to “state that the information thus obtained will not be published or shared with any other person” [&lt;a href="#52"&gt;52&lt;/a&gt;].&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Sub-rule (2) of rule 6 requires “any information” to be “disclosed to any third party by an order under the law for the time being in force.” This is to be done “without prejudice” to the obligations of the body corporate to obtain prior permission from the providers of information [&lt;a href="#53"&gt;53&lt;/a&gt;].&lt;/p&gt;
&lt;h3&gt;Reasonable Security Practices&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Rule 7 of the draft rules stipulates that a body corporate shall be deemed to have complied with reasonable security practices if it has implemented security practices and standards which require:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;a comprehensive documented information security program; and&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;information security policies that contain managerial, technical, operational and physical security control measures that are commensurate with the information assets being protected.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In case of an information security breach, such body corporate will be “required to demonstrate, as and when called upon to do so by the agency mandated under the law, that they have implemented security control measures as per their documented information security program and information security policies”.&lt;/p&gt;
&lt;p&gt;The rule stipulates that by adopting the International Standard IS/ISO/IEC 27001 on “Information Technology – Security Techniques – Information Security Management System – Requirements”, a body corporate will be deemed to have complied with reasonable security practices and procedures.&lt;/p&gt;
&lt;p&gt;The rule also permits “industry associations or industry clusters” who are following standards other than IS/ISO/IEC 27001 but which nevertheless correspond to the requirements of sub-rule 7(1), to obtain approval for these codes from the government. Once this approval has been sought and obtained, the observance of these standards by a body corporate would deem them to have complied with the reasonable security practice requirements of section 43A.&lt;/p&gt;
&lt;h2&gt;Penalties and Remedies for breach of Data Protection&lt;/h2&gt;
&lt;h3&gt;Civil Liability for Corporates&lt;/h3&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;As mentioned above, any body corporates who fail to observe data protection norms may be liable to pay compensation if:&lt;/span&gt;&lt;/div&gt;
&lt;ul&gt;
&lt;li&gt;it is negligent in implementing and maintaining reasonable security practices, and thereby &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;causes wrongful loss or wrongful gain to any person;[&lt;a href="#54"&gt;54&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Claims for compensation are to be made to the adjudicating officer appointed under section 46 of the IT Act. Further, details of the powers and functions of this officer are given in succeeding sections of this note.&lt;/p&gt;
&lt;h3&gt;Criminal liability for disclosure of information obtained in the course of exercising powers under the IT Act&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Section 72 of the Information Technology Act imposes a penalty on “any person” who, having secured access to any electronic record, correspondence, information, document or other material using powers conferred by the Act or rules, discloses such information without the consent of the person concerned. Such unauthorized disclosure is punishable “with imprisonment for a term which may extend to two years, or with fine which may extend to one lakh rupees, or with both.”&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Criminal Liability for unauthorized disclosure of information by any person of information obtained under contract&lt;/h3&gt;
&lt;p&gt;Section 72A of the IT Act imposes a penalty on any person [&lt;a href="#55"&gt;55&lt;/a&gt;] (including an intermediary) who&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;has obtained personal information while providing services under a lawful contract and&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;discloses the personal information without consent of the person, &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;with the intent to cause, or knowing it is likely to cause wrongful gain or wrongful loss [&lt;a href="#56"&gt;56&lt;/a&gt;]&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Such unauthorised disclosure to a third person is punishable with imprisonment upto three years or with fine upto Rs five lakh, or both.&lt;/p&gt;
&lt;h2&gt;Whom to call? Adjudicatory Mechanism and Remedies under the IT Act&lt;/h2&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;This section provides a brief outline of the mechanism installed by the IT Act to activate the various remedies and penalties prescribed in various sections of the Act. As a victim of online intrusion, how does one use the IT Act to seek redressal?&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;As mentioned above, the IT Act provides for both the civil remedy of damages in compensation (Chapter IX) as well as criminal penalties for offences such as imprisonment and fine (Chapter XI). In general, claiming a civil remedy does not bar one from seeking criminal prosecution and ideally both should be pursued together. For clarity, in the sections that follow, we will be discussing the two procedures separately.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;Civil Damages and Compensation&lt;/h2&gt;
&lt;h3&gt;Whom to approach?&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Section 46 of the IT Act empowers the Central Government to appoint “adjudication officers” to adjudicate whether any person has committed any of the contraventions described in Chapter IX of the Act (See section 2.1 and 4.2 above) and to determine the quantum of compensation payable. Accordingly, the Central Government has designated the secretaries of the Department of Information Technology of each of the states or union territories as the “adjudicating officer” with respect to each of their territories [&lt;a href="#57"&gt;57&lt;/a&gt;].&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;However, a pecuniary limit has been placed on the powers of adjudicating officers, and they may only adjudicate cases where the quantum of compensation claimed does not exceed Rs. five crores. In cases where the compensation claimed exceeds this amount, jurisdiction would vest in the “competent court”, under the Code of Civil Procedure [&lt;a href="#58"&gt;58&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;Section 61 of the Act bars ordinary civil courts from jurisdiction over matters which the adjudicating officers have been empowered to decide under this Act.&lt;/p&gt;
&lt;h2&gt;When must a complaint be filed?&lt;/h2&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;The Limitation Act provides that a suit must be filed within three years from when the right to sue accrues [&lt;a href="#59"&gt;59&lt;/a&gt;].&lt;/span&gt;&lt;/div&gt;
&lt;h2&gt;What is the procedure?&lt;/h2&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Section 46 and the rules framed under that section provide elaborate guidelines on the procedure that is to be followed by the adjudicating officer. Thus, the adjudicating officer is required to give the accused person “a reasonable opportunity for making representation in the matter”. Thereafter, if , on an inquiry, “he is satisfied that the person has committed the contravention, he may impose such penalty or award such compensation as he thinks fit in accordance with the provisions of that section.”&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;In order to carry out their duties adjudicating officer have been invested with the powers of a civil court which are conferred on the cyber appellate tribunal [&lt;a href="#60"&gt;60&lt;/a&gt;]. Additionally, they have the power to punish for their contempt undert the Code of Criminal Procedure.&lt;/p&gt;
&lt;p&gt;Rules framed under the section provide further details on the procedure that must be followed and provide for the issuance of a “show cause notice”, manner of holding enquiry, compounding of offences, etc. [&lt;a href="#61"&gt;61&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;Section 47 provides that in adjudging the quantum of compensation, the adjudicating officer shall have due regard to the following factors, namely:—&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;the amount of gain of unfair advantage, wherever quantifiable, made as a result of the default; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;the amount of loss caused to any person as a result of the default;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;the repetitive nature of the default.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Where must a complaint be filed and in what format?&lt;/h2&gt;
&lt;p&gt;The complaint must be made to the adjudicating officer of the state or union territory on the basis of location of computer system, computer network. The complaint must be made on a plain paper in the format provided in the Performa attached to the rules [&lt;a href="#62"&gt;62&lt;/a&gt;].&lt;/p&gt;
&lt;p&gt;In case the offender or computer resource is located abroad, it would be deemed, for the purpose of prosecution to be located in India [&lt;a href="#63"&gt;63&lt;/a&gt;].&lt;/p&gt;
&lt;h2&gt;How long does the process take?&lt;/h2&gt;
&lt;div&gt;
&lt;div&gt;The Rules direct that the whole matter should be heard and decided “as far as possible” within a period of six months [&lt;a href="#64"&gt;64&lt;/a&gt;].&lt;/div&gt;
&lt;/div&gt;
&lt;h2&gt;How much does it cost?&lt;/h2&gt;
&lt;p&gt;The Rules stipulates a variable fee payable by a bank draft calculated on the basis of damages claimed by way of compensation&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;a) Upto Rs. 10,000&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;10% ad valorem rounded off to nearest next hundred&lt;/span&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;b) From 10001 to Rs.50000&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Rs. 1000 plus 5% of the amount exceeding Rs.10,000 rounded off to nearest next hundred&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;c) From Rs.50001 to Rs.100000&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Rs. 3000/- plus 4% of the amount exceeding Rs. 50,000 rounded off to nearest next hundred&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;d) More than Rs. 100000&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Rs.5000/- plus 2% of the amount exceeding Rs. 100,000 rounded off to nearest next hundred&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h3&gt;Appeals to the Cyber Appellate Tribunal and the High Court&lt;/h3&gt;
&lt;p&gt;The Act provides for the constitution of a cyber appellate tribunal to hear appeals from cases decided by the adjudicating officer.&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;&lt;span class="Apple-style-span"&gt;Within 25 days of the copy of the decision being made available by the adjudicating officer, the aggrieved party may file an appeal before the cyber appellate tribunal.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;&lt;/span&gt;Section 57 provides that the appeal filed before the cyber appellate tribunal shall be dealt with by it as expeditiously as possible and endeavor shall be made by it to dispose of the appeal finally within six months from the date of receipt of the appeal. Section 62 gives the right of appeal to a high court to any person aggrieved by any decision or order of the cyber appellate tribunal on any question of fact or law arising out of such order. Such an appeal must be filed within 60 days from the date of communication of the decision or order of the cyber appellate tribunal.&lt;/p&gt;
&lt;h3&gt;Can contraventions be compounded (compromised) with the offender?&lt;/h3&gt;
&lt;p&gt;Except in the case of repeat offenders, contraventions may be compromised by the adjudicating officer or between the parties either before or after institution of the suit. Where any contravention has been compounded the IT Act provides that “no proceeding or further proceeding, as the case may be, shall be taken against the person guilty of such contravention in respect of the contravention so compounded”[&lt;a href="#65"&gt;65&lt;/a&gt;].&lt;/p&gt;
&lt;h3&gt;Criminal Penalties&lt;/h3&gt;
&lt;p&gt;The process described above applies to “contraventions” under Chapter IX of the Act. In addition to being liable to pay compensation, in the cases falling under section 43, such offenders may also be liable for criminal penalties such as imprisonment and fines [&lt;a href="#66"&gt;66&lt;/a&gt;]. This sub-section of this paper deals with the procedure to be followed with respect to the criminal offences set out under Chapter XI of the Act (for example, see sections 2.2 to 2.5 above).&lt;/p&gt;
&lt;h2&gt;Whom to approach? Who can take cognizance of offences and investigate them?&lt;/h2&gt;
&lt;p&gt;Section 78 of the IT Act empowers police officers of the rank of Inspectors and above to investigate offences under the IT Act.&lt;/p&gt;
&lt;p&gt;Many states have set up dedicated cyber crime police stations to investigate offences under this Act [&lt;a href="#67"&gt;67&lt;/a&gt;]. Thus, for example, the State of Karnataka has set up a special cyber crime police station responsible for investigating all offences under the IT Act with respect to the entire territory of Karnataka [&lt;a href="#68"&gt;68&lt;/a&gt;].&lt;/p&gt;
&lt;h2&gt;When must a complaint be lodged?&lt;/h2&gt;
&lt;p&gt;Although there is no time limit prescribed by the IT Act or the Code of Criminal Procedure with respect to when an FIR must be filed, in general, courts tend to take an adverse view when a significant delay has occurred between the time of occurrence of an offence and it’s reporting to the nearest police station.&lt;/p&gt;
&lt;p&gt;The Code of Criminal Procedure forbids courts from taking cognizance of cases after three years “if the offence is punishable with imprisonment for a term exceeding one year but not exceeding three years”. Where either the commission of the offence was not known to the person aggrieved, or where it is not known by whom the offence committed, this period is computed from the date on which respectively the offence or the identity of the offender comes to the knowledge of the person aggrieved [&lt;a href="#69"&gt;69&lt;/a&gt;].&lt;/p&gt;
&lt;h2&gt;What is the procedure?&lt;/h2&gt;
&lt;p&gt;No special procedure is prescribed for the trial of cyber offences and hence the general provisions of criminal procedure would apply with respect to investigation, charge sheet, trial, decision, sentencing and appeal.&lt;/p&gt;
&lt;h2&gt;Can offences be compounded?&lt;/h2&gt;
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Offences punishable with imprisonment of upto three years are compoundable by a competent court. However, repeat offenders cannot have their subsequent offences compounded. Additionally, offences which “affect the socio-economic conditions of the country” or those committed against a child under 18 years of age or against women cannot be compounded [&lt;a href="#70"&gt;70&lt;/a&gt;]. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span class="Apple-style-span"&gt;Bibliography&lt;/span&gt;&lt;/h3&gt;
&lt;div&gt;&lt;span class="Apple-style-span"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/div&gt;
&lt;p&gt;&lt;a name="1"&gt;[1].&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;The IT Act is only one of the various laws which safeguard citizens from violations of online privacy. In addition, in the domain of finance, for instance, various RBI regulations mandate strong security protocols with respect to data held by financial institutions. Since this is the subject of a different dispatch on banking and privacy which we have brought out, these regulations are omitted from this discussion.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="2"&gt;[2].Section 2(k) of the IT Act defines ‘computer’ as any electronic magnetic, optical or other high-speed data processing device or system which performs logical, arithmetic, and memory functions by manipulations of electronic, magnetic or optical impulses, and includes all input, output, processing, storage, computer software, or communication facilities which are connected or related to the computer in a computer system or computer network.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="3"&gt;[3].Section 43 defines "computer contaminant" as any set of computer instructions that are designed— (a) to modify, destroy, record, transmit data or program residing within a computer, computer system or computer network; or (b) by any means to usurp the normal operation of the computer, computer system, or computer network;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="4"&gt;[4].Similarly, "computer virus" has been defined in section 43 as “any computer instruction, information, data or program that destroys, damages, degrades or adversely affects the performance of a computer resource or attaches itself to another computer resource and operates when a program, data or instruction is executed or some other event takes place in that computer resource;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="6"&gt;[6].Section 66 of the IT Act. &lt;/a&gt;&lt;a name="5"&gt;Anon, 2009. Bangalore techie convicted for hacking govt site. Deccan Herald. Available at: http://goo.gl/jCvAh. [Accessed March 29, 2011];&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="7"&gt;[7].The Information Technology (Due Diligence observed by Intermediaries Guidelines) Rules, 2011;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="8"&gt;[8].‘Intermediary’ has been defined very expansively under section 2(w) of the Act to mean, with respect to any electronic record, “any person who on behalf of another person receives, stores or transmits that record, or provides any service with respect to that record and includes telecom service providers, network service providers, Internet service providers, web hosting service providers, search engines, online payment sites, online-auction sites, online-market places and cyber cafes&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="9"&gt;[9].‘Private area’ has been defined in section 66E as “the naked or undergarment clad genitals, pubic area, buttocks or female breast”.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="10"&gt;[10].Defined as “circumstances in which a person can have a reasonable expectation that (i) he or she could disrobe in privacy, without being concerned that an image of his or her private area was being captured or (ii) any part of his or her private area would not be visible to the public regardless of whether that person is in a public or private place”. See explanation to Section 66E&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="11"&gt;[11]."Cheating by personation" is a crime defined under section 416 the Indian Penal Code. According to that section, “a person is said to "cheat by personation" if he cheats by pretending to be some other person, or by knowingly substituting one person for another, or representing that he or any other person is a person other than he or such other person really is." The explanation to the section adds that "the offence is committed whether the individual personated is a real or imaginary person".  Two illustrations to the section further elaborate its meaning: (a) A cheats by pretending to be a certain rich banker of the same name. A cheats by personation (b) A cheats by pretending to be B, a person who is deceased. A cheats by personation.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="12"&gt;[12].Communication device" has been defined to mean "cell phones, personal digital assistance (sic) or combination of both or any other device used to communicate send or transmit any text, video, audio or image".&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="12"&gt;&lt;/a&gt;&lt;a name="12"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="13"&gt;[13].2005. Cyber Crime Cell, Mumbai: Case of Phishing. Mumbai Police. Available at: http://www.cybercellmumbai.com/case-studies/case-of-fishing [Accessed March 23, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="12"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="14"&gt;[14]. Although no maximum limit is prescribed for the fine under this section, Section 63 of the Indian Penal Code declares that “Where no sum is expressed to which a fine may extend, the amount of fine to which the offender is liable is unlimited, but shall not be excessive”.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="12"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="12"&gt;&lt;/a&gt;&lt;a name="15"&gt;[15].Hafeez, M., 2009. Crime Line: Curiosity was his main motive, say city police. Crime Line. Available at: http://mateenhafeez.blogspot.com/2009/05/curiosity-was-his-main-motive-say-city.html [Accessed March 23, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="16"&gt;[16]. Holla, A., 2009. Wronged, techie gets justice 2 yrs after being jailed. Mumbai Mirror. Available at: http://www.mumbaimirror.com/index.aspx?page=article&amp;amp;sectid=2&amp;amp;contentid=200906252009062503144578681037483 [Accessed March 23, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="17"&gt;[17].See also Nanjappa, V., 2008. 'I have lost everything'. Rediff.com News. Available at: http://www.rediff.com/news/2008/jan/21inter.htm [Accessed March 23, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="18"&gt;[18]. By contrast, rules framed under Section 69B designates only the Secretary to the Government of India in the Department of Information Technology under the Ministry of Communications and IT as the “competent authority” to issue orders of interception.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="19"&gt;[19].It is unclear what these “operational reasons” could mean. The text of the rules provide no useful guidance.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="20"&gt;[20].“Cyber security breach” is defined as meaning “any real or suspected adverse event in relation to cyber security that violates an explicitly or implicitly acceptable security policy resulting in unauthorized access, denial of service, disruption, unauthorized use of a computer resource for processing or storage of information or changes to date, information without authorization”. Rule 2(f) of the Monitoring and Collecting of Traffic Data Rules 2009. &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="20"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="20"&gt;&lt;/a&gt;&lt;a name="21"&gt;[21].Rule 7 of the Interception Rules 2009; Rule 3(3) of the Monitoring and Collecting of Traffic Data Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="22"&gt;[22].Rule 8 of the Interception Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="23"&gt;[23]. Rule 9 of the Interception Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="24"&gt;[24].Rule 10 of the Interception Rules 2009; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="25"&gt;[25].Rule 11 of the Interception Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="26"&gt;[26].Rule 7 of the Interception Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="27"&gt;[27].Rule 22 of the Interception Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="28"&gt;[28]. Ibid&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="29"&gt;[29].Section 69 of the IT Act.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="30"&gt;[30].The intermediary is required to assist in the decryption only to the extent that the intermediary has control over the decryption key. See Sub-Rule 13(3) of the Interception Rules 2009. Rule 17 enjoins the holder of a decryption key to provide decryption assistance when directed to by the competent authority. &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="31"&gt;[31].Rule 16 of the Interception Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="32"&gt;[32].Rule 18 of the Interception Rules 2009&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="33"&gt;[33]. Rule 20 of the Interception Rules 2009; Rules 10 &amp;amp; 11 of the Monitoring and Collecting of Traffic Data Rules 2009. Failure to maintain secrecy of data may attract punishment under Section 72 of the Information Technology Act.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="34"&gt;[34].Supra n. 6 for definition&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="35"&gt;[35].Section 43A defines "'body corporate" as any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="36"&gt;[36].This does not necessarily mean that these entitles are exempt from taking reasonable care to safeguard information that they collect, maintain or control – only that remedies against the government must be sought under general common law, rather than under the IT Act. &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="37"&gt;[37].Anon, 2005. The MphasiS Scandal – And How it Concerns U.S. Companies Considering Offshore BPO. Carretek. Available at: http://www.carretek.com/main/news/articles/MphasiS_scandal.htm [Accessed March 29, 2011]. See also Anon, 2005. MphasiS case: BPOs feel need to tighten security. Indian Express. Available at: http://www.expressindia.com/news/fullstory.php?newsid=44856 [Accessed March 29, 2011].&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="38"&gt;[38]. The Information Technology (Reasonable security practices and procedures and sensitive personal information) Rules, 2011. Available at http://www.mit.gov.in/sites/upload_files/dit/files/senstivepersonainfo07_02_11.pdf, last accessed February 15th, 2011.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="39"&gt;[39].Rule 5 of the Draft Rules.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="39"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="39"&gt;&lt;/a&gt;&lt;a name="40"&gt;[40]. This is perhaps a bit vague, since the potential ‘lawful uses’ are numerous and could be inexhaustible. It is unclear whether “lawful usage” is coterminous with “the uses which are disclosed to the individual at the time of collection”. In addition, this rule is framed rather weakly since it does not impose a positive obligation (although this is implied) to destroy information that is no longer required or in use.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="41"&gt;[41].“Provider of data” is not the same as individuals to whom the data pertains, and could possibly include intermediaries who have custody over the data. We feel this privacy policy should be made available for view generally – and not only to providers of information. In addition, it might be advisable to mandate registration of privacy policies with designated data controllers.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="42"&gt;[42]. This is well framed since it does not permit body corporates to frame privacy policies that detract from Rule 6. &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="43"&gt;[43].One wonders about the convoluted language used here when a simpler phrase like “take reasonable steps” alone might have sufficed - reasonableness has generally been interpreted by courts contextually. As the Supreme Court has remarked, “`Reasonable’ means prima facie in law reasonable in regard to those circumstances of which the actor, called upon to act reasonably, knows or ought to know. See Gujarat Water Supply and Sewage Board v. Unique Erectors (Guj) AIR 1989 SC 973.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="44"&gt;[44].Sub-Rule 5(7).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="45"&gt;[45].Sub-Rule 5(6). It is unclear what would count as a ‘necessary’ circumstance and who would be the authority to determine such necessity. &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="46"&gt;[46].Sub-Rule 5(8).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="47"&gt;[47].Sub-Rule 5(5).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="48"&gt;[48].Sub-Rule 5(9).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="49"&gt;[49]. Sub-Rule 6(1) There are two problems with this rule. First, it requires prior permission only from the provider of information, and not the individual to whom the data pertains. In effect this whittles down the agency of the individual in being able to control the manner in which information pertaining to her is used. Second, it is not clear whether this information includes “sensitive personal information”. The proviso to this rule includes the phrase “sensitive information”, which would suggest that such information would be included. This makes it even more important that the rule require that prior permission be obtained from the individual to whom the data pertains and not merely from the provider of information. &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="50"&gt;[50].Sub-Rule 6(3).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="51"&gt;[51].Sub-Rule 6(4).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="52"&gt;[52].This is a curious insertion since it begs the question as to the utility of such a statement issued by the requesting agency. What are the sanctions under the IT Act that may be attached to a government agencies that betrays this statement? Why not instead, insert a peremptory prohibition on government agencies from disclosing such information (with the exception, perhaps, of securing conviction of offenders)?&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="53"&gt;[53].This sub-rule does not distinguish between orders issued by a court and those issued by an administrative/quasi-judicial body.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="54"&gt;[54]. “Wrongful loss” and “wrongful gain” have been defined by Section 23 of the Indian Penal Code. Accordingly, "Wrongful gain" is gain by unlawful means of property which the person gaining is not legally entitled. "Wrongful loss"- "Wrongful loss" is the loss by unlawful means of property to which the person losing it is legally entitled.” The section also includes this interesting explanation “Gaining wrongfully, losing wrongfully- A person is said to gain wrongfully when such person retains wrongfully, as well as when such person acquires wrongfully. A person is said to lose wrongfully when such person is wrongfully kept out of any property as well as when such person is wrongfully deprived of property”. Following this, it could be possible to argue that the retention of data beyond the period of its use would amount to a “wrongful gain”.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="55"&gt;[55]. Section 3(39) of the General Clauses Act defines a person to include “any company or association or body of individuals whether incorporated or not”. An interesting question here would be whether the State can be considered “a person” so that it can be held liable for unauthorized disclosure of personal information. In an early case of Shiv Prasad v. Punjab State AIR 1957 Punj 150, the Punjab High Court had excluded this possibility. However, the case law on this point has not been consistent. In Ramanlal Maheshwari v.Municipal Committee, the MP High Court held that the Municipal Council could be treated as a ‘person’ for the purpose of levying a fine attached to a criminal offence. Statutory corporate bodies (such as the proposed UID Authority of India) have been held to be ‘persons’ for purposes of law . See Commissioners, Port of Calcutta v. General Trading Corporation, AIR 1964 Cal 290. Here under the Calcutta Port Act, Port Commissioners were declared to be a “body corporate”, and hence were held to be a ‘person’.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="56"&gt;[56].See supra n. 44.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="57"&gt;[57]. See G.S.R.240(E) New Delhi, the 25th March, 2003 available at &amp;lt; http://www.mit.gov.in/content/it-act-notification-no-240&amp;gt; .&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="58"&gt;[58].See Section 46(1A).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="59"&gt;[59].Schedule I, Part X of the Limitation Act “Suits for which there is no prescribed period.”&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="60"&gt;[60].The powers of the Cyber Appellate Tribunal under Section 58 include the powers of (a) summoning and enforcing the attendance of any person and examining him on oath; (b) requiring the discovery and production of documents or other electronic records; (c) receiving evidence on affidavits; (d) issuing commissions for the examination of witnesses or documents; (e) reviewing its decisions; (f) dismissing an application for default or deciding it ex parte.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="61"&gt;[61].Information Technology (Qualification and Experience of Adjudicating Officers and Manner of holding Enquiry) Rules, 2003 [GSR 220(E)] Available at &amp;lt;http://cca.gov.in/rw/resource/notification-gsr220e.pdf?download=true&amp;gt;.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="62"&gt;[62]. Ibid Rule 4(b).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="63"&gt;[63]. Section 75.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="64"&gt;[64]. Ibid, Rule 4(k).&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="65"&gt;[65]. Section 63 of the Act.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="66"&gt;[66].Prior to amendment in 2008, contraventions listed in Section 43 were only liable to be compensated by damages through civil proceedings. Thus in 2007, the Madras High Court annulled an FIR lodged in a police station which listed an activity mentioned in 43(g). See S. Sekar vs The Principal General Manager &amp;lt; http://indiankanoon.org/doc/182565/&amp;gt; This position has however been changed with the new Section 66 which makes all actions listed in Section 43 an offence when committed with dishonest or fraudulent intent. Thus an FIR can be lodged with respect to these activities as well.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="67"&gt;[67].An incomplete list of cyber crime cells of police in different states can be viewed at &amp;lt;http://infosecawareness.in/cyber-crime-cells-in-india&amp;gt;.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="68"&gt;[68]. Home and Transport3 Secretariat, Notification no. HD 173 POP 99 Bangalore, Dated 13th September 2001 Available at &amp;lt; http://cyberpolicebangalore.nic.in/pdf/notification_1.pdf&amp;gt;.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="69"&gt;[69]. Sections 468 and 469 of the Code of Criminal Procedure, 1973.&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="70"&gt;[70]. Section 77A of the Information Technology Act.&lt;/a&gt;&lt;/p&gt;
&lt;p class="callout"&gt;&lt;span class="Apple-style-span"&gt;Click below to download files of your choice:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span class="Apple-style-span"&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-it-act.pdf" class="internal-link" title="Privacy IT Act"&gt;PDF &lt;/a&gt; [347 kb]&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-it-act.odt" class="internal-link" title="Privacy and IT Act (ODT)"&gt;Open Office&lt;/a&gt; [51 kb]&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-it-act.docx" class="internal-link" title="Privacy Act and IT"&gt;Word File&lt;/a&gt; [55 kb]&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy'&gt;https://cis-india.org/internet-governance/blog/privacy/safeguards-for-electronic-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Prashant Iyengar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-14T10:29:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-copyright-act">
    <title>Privacy and the Indian Copyright Act</title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-copyright-act</link>
    <description>
        &lt;b&gt;India's Copyright Act was established in 1957, and is in the process of being placed before the Parliament in 2010. The provisions in the proposed Bill will work to make the Act WIPO Copyright Treaty (WCT) compliant. When looking at privacy in the context of copyright four key questions arise, says Elonnai Hickock as she analyses privacy in the context of the Indian Copyright Act. &lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;How do DRM technologies undermine privacy and what safeguards are present in the Indian law to protect citizens’ right to privacy?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Technologies such as digital rights management technologies were developed to be used by hardware manufacturers, publishers, copyright holders and individuals to control the mode of use of certain digital devices and contents. DRM technologies pose as a privacy threat, because in their ability to monitor what is happening to a copyrighted work, they are also able to collect personal information and send it back to a host without knowledge of the user. The host is then able to use that data for marketing or commercial purposes. In the Copyright Act, 1957 there are no current provisions against DRM circumvention. In the proposed Copyright Bill 2010 there are two proposed provisions: to prevent anti circumvention of DRM technologies and one provision that clarifies what is a DRM technology.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Proposed Legislation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Section 2 (xa)&lt;/b&gt;: Defines Rights Management Information – it is important to note that within the definition of RMI the provision specifically excludes any device or procedure intended to identify the user from the definition.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Section 65A (1)&lt;/b&gt; : Protection of Technological Measures - Any person who circumvents an effective technological measure applied for the purpose of protecting any of the rights conferred by this Act, with the intention of infringing such rights, shall be punishable with imprisonment which may extend to two years and shall also be liable to fine includes that any person facilitating circumvention by another person of a technological measure, shall  maintain a complete record of such other persons including his name, address and all relevant particulars necessary to identify him.&lt;br /&gt;&lt;br /&gt;&lt;b&gt;Section 65B&lt;/b&gt;: Protection of Rights Management Information – Any person who removes, or distributes, copies, or broadcasts any rights management information without authority shall be by punishable with imprisonment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Recommendation&lt;/i&gt;:  We find, not just exclusively to the Copyright Act, but that in all Indian legislation the privacy of an individual is brought into question, because there are no safeguards against the commercialization of information, and no formal process of redress if an individual discovers that his information is being used without his consent/prior knowledge. We would recommend that (perhaps appropriately in legislation on data protection) a provision be included to clearly articulate that the collection and commercialization of information and personal data is prohibited by DRM technologies and host companies, and a method of redress be put in place.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Under the copyright, does a person have the ability to expose privacy infringement?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Because DRM technologies have the ability to collect user information, which could potentially be done through the use of spyware, it is important that an individual has the ability to know if and when their information is being collected. To do this an individual can discover the technological principles of a device, object, or system through a process known as reverse engineering.  Currently reverse engineering is permitted under provision 52 (ac). It is further supported by provision 65A (2) (f).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Current Legislation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Provision 52 (ac): Certain acts not to be in infringement of copyright include: the observation, study or test of functioning of the computer programs in order to determine the ideas and principles which underlie any elements of the program while performing such acts necessary for the functions for which the computer program was supplied. The following acts shall not constitute an infringement of copyright, namely:&lt;br /&gt;65A (2) (f): Nothing in sub-section (1) shall prevent any person from, doing anything necessary to circumvent technological measures intended for identification or surveillance of a user.&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Recommendation&lt;/i&gt;: We have no recommendation, but see this as a positive provision.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;How does the proposed exception for the disabled undermine privacy?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In India under the current Copyright Act, 1957 there are no provisions for the benefit of disabled persons, thus currently permission from copyright holders needs to be exclusively sought every time the visually challenged person requires access. Under the Constitution of India and the Bernes Convention, India has committed to enshrining the rights of the disabled.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Proposed Legislation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 31B:  will grant compulsory license in respect of publication of any copyrighted works not covered by the exception under section 52 (1) (zb). For this a registered intermediary organization that is recognized under The Persons with Disability Act shall apply to the Copyright Board for approval. The board will evaluate the applicant and application, and grant permission if it sees fit. The intermediary will then be responsible for monitoring the usage of the copyrighted work to ensure that copyright law is not violated.&lt;br /&gt;&lt;br /&gt;&lt;i&gt;Recommendation&lt;/i&gt;: Though currently the Indian legislation does not threaten the privacy of the disabled, we find it concerning that under the WIPO copyright treaty – the anonymity of the disabled would be compromised.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What is On the Horizon?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;As copyright and IP is a constantly evolving issue, countries are consistently amending and changing their laws. With the flow of peoples across borders increasing, Indians will be affected by different international policies that could pose to infringe upon their privacy, for example cross-border checks or three strike regimes, which will punish a person if caught infringing copyright three times. For example: France has proposed cutting off Internet to those caught infringing on copyright three times.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Examples of Proposed Legislation: The Anti-Counterfeiting Trade Agreement:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;ACTA is a proposed legislation. Its objective is to combat counterfeiting and piracy. Partners in the negotiations include: The United States, Australia, Canada, the European Union, Japan, Mexico, Morocco, New Zealand, Singapore, South Korea, and Switzerland. The treaty will oblige each contracting party to adopt, in accordance with its legal system, the measures necessary to ensure the application of the treaty. Though ACTA has not been enacted, many worry that ACTA would facilitate privacy violations by trademark and copyright holders against private citizens suspected of infringement activities without any sort of legal due process. The Act could allow for random searches of laptops, MP3 players, and cellular phones for illegally downloaded or ripped music and movies.&lt;br /&gt;&lt;i&gt;&lt;br /&gt;Recommendation&lt;/i&gt;: We find that copyright infringement does not appear to justify cross border searches or other forms of regulating.  ACTA and other international treaties raise the question that if India became compliant with certain international standards, would the standards would be too stringent without safeguards, and pose as a risk to a person’s privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-copyright-act'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-copyright-act&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    

   <dc:date>2013-08-06T13:37:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications">
    <title>Privacy and Telecommunications: Do We Have the Safeguards? </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications</link>
    <description>
        &lt;b&gt;All of you often come across unsolicited and annoying telemarketing calls/ SMS's, prank calls,  pestering calls for payment, etc. Do we have any safeguards against them? This blog post takes a look at the various rules and regulations under Indian law to guard our privacy and confidentiality.&lt;/b&gt;
        
&lt;h2&gt;1 Introduction&amp;nbsp; &lt;br /&gt;&lt;/h2&gt;
&lt;p&gt;With a subscriber base that stands at just over 700 million (TRAI, August 2010) the telecom industry has enjoyed spectacular success at absorbing Indians into its fold. Tele-density which, even as recently as in 2002 was stagnant in the low single-digits, today stands at a proud 59%. However far one could go today, it would seem one would never be too distant from a mobile phone.&lt;/p&gt;
&lt;p&gt;While this extensive penetration has heralded an era of unprecedented access – truly a ‘communications revolution’ whose full effects it may still be too early to grasp – it has also led to the exposure of individuals to risks on a magnitude never before witnessed. Firstly, in the ordinary course of their business, telecom companies accumulate vast volumes of personal information about their customers including photocopies of identity documents, biographical information etc, which could potentially be misused;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Secondly, the fact that a vast amount of our communication now occurs with the involvement of electronic media has rendered us more susceptible to invasive surveillance - whether lawful or not;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Thirdly, much of our communication is now not merely ephemeral, but is stored in digital form for indefinite periods in corporate ‘data centers’.;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;Lastly, owning a mobile phone not only enables us to communicate with our business partners and loved ones, but also forces us to engage with an incessant stream of ‘noise’ – telemarketing calls and SMSes, prank/hoax calls, calls pestering us for the payment of bills and offensive/threatening calls.&lt;/p&gt;
&lt;p&gt;This note examines the kinds of safeguards that currently exist under Indian law to protect the privacy of telecom users. Broadly there are three streams of such protection&lt;/p&gt;
&lt;p&gt;1) The Telegraph Act and Rules, which contains provisions that prohibit and penalize unlawful interception of communication. Furthermore, licenses issued to telecom service providers (TSPs) under this Act require TSPs to take measures to safeguard the privacy of their customers and confidentiality of communications.&lt;/p&gt;
&lt;p&gt;2) The Telecom Regulatory Authority of India has issued various guidelines to TSPs many of which pertain to privacy.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;3) The Consumer Protection Act provides customers with an avenue of redress in case of violation of their privacy. &amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;The first two are described in greater detail in the paragraphs that follow. This is followed by a brief analysis of certain international norms&lt;/p&gt;
&lt;h2&gt;2 Indian Regulatory Regime&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;2.1 The Indian Telegraph Act and Rules&lt;/h3&gt;
&lt;p&gt;First enacted in 1885, the Telegraph Act remains today on the statute books as the umbrella legislation governing most forms of electronic communications in India including telephones, faxes, the internet etc. The Act contains several provisions which regulate and prohibit the unauthorized interception or tampering with messages sent over ‘telegraphs’i. The following sections apply:&lt;/p&gt;
&lt;p&gt;&lt;em&gt;1) Section 5 empowers the Government to take possession of licensed telegraphs and to order interception of messages in cases of ‘public emergency’ or ‘in the interest of the public safety’. Interception may only be carried out pursuant to a written order by an officer specifically empowered for this purpose by the State/Central Government. &amp;nbsp;The officer must be satisfied that “it is necessary or expedient so to do in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States or public order or for preventing incitement to the commission of an offence”ii&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;2) Section 23 imposes a fine of Rs. 500 on anyone who enters a telegraph office without proper authorization.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;3) Section 24 makes it a criminal offence for a person to enter a telegraph office “with the intent of unlawfully learning the contents of any message”. Such a person may be punished with imprisonment for a term of up to a year.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;4) Section 25 further imposes a criminal penalty on anyone who damages or tampers with any telegraph with the intent to prevent the transmission of messages or to acquaint himself with the contents of any message or to commit mischief. Punishment in this case could extend to 3 years imprisonment or a fine or both.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;5) Section 26 makes it an offence for a Telegraph Officer to alter, unlawfully disclose or acquaint himself with the content of any message. This is also punishable with up to 3 years imprisonment or a fine or both.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;6) Section 30 criminalizes the fraudulent retention or willful detention of a message which is intended for someone else. Punishment extends to 2 years imprisonment or fine or both.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;2.2 License Agreements&lt;/h3&gt;
&lt;p&gt;Although the statute itself governs the actions of telecom operators in a general way, more detailed guidelines regulating their behavior are contained in the terms of the licenses issued to the telecoms which permit them to conduct businessiii. Frequently, these licenses contain clauses requiring telecom operators to safeguard the privacy of their consumers. A few examples include:&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;1) Clause 21 of the National Long Distance Licenseiv comprehensively covers various aspects of privacy including&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;a. Licensees to be responsible for the protection of privacy of communication, and to ensure that unauthorised interception of message does not take place.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;b. Licensees to take all necessary steps to safeguard the privacy and confidentiality of any information about a third party and their &amp;nbsp;business to whom they provide service and from whom they have acquired such information by virtue of those service and shall use their best endeavors to secure that :&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;i. No person acting on behalf of the Licensees or &amp;nbsp;the Licensees themselves divulge or uses any such information except as may be necessary in the course of providing such service to the Third Party; and&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;ii. No such person seeks such information other than is necessary for the purpose of providing service to the Third Party.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;c. The above safeguard however does not apply where&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;i. The information relates to a specific party and that party has consented in writing to such information being divulged or used, and such information is divulged or used in accordance with the terms of that consent; or&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;ii. &amp;nbsp;The information is already open to the &amp;nbsp;public and otherwise known.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;d. The Licensees shall take necessary steps to ensure that the they and any person(s) acting on their behalf observe confidentiality of customer information.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;2) Clause 39.2 of the Unified Access Service License and clause 42.2 of the Cellular Mobile Telephone Service licence enjoin the licensee to take all necessary steps to safeguard the privacy and confidentiality of any information about a third party, and its business to whom it provides the service. The Licensee is required to use its best endeavors to secure that no person acting on behalf of the licensee or the licensee divulges or uses any such information - except as may be necessary in the course of providing such service to the third party.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;3) The Internet Services License Agreement (which authorizes ISPs to function in India) similarly contains provisions touching on privacy:&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;a) Part VI of the License Agreement gives the Government the right to inspect/monitor the TSPs systems. The TSP is responsible for making facilities available for such interception.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;b) Clause 32 under Part VI contains provisions mandating the confidentiality of information. &lt;/em&gt;These provisions are identical to those described in Clause 21 of the NLD License agreement (see above).&lt;/p&gt;
&lt;p&gt;&lt;em&gt;c) Clause 33.4 makes it the responsibility of the TSP to trace nuisance, obnoxious or malicious calls, messages or communications transported through its equipment.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;d) Clause 34.8 requires ISPs to maintain a log of all users connected and the service they are using (mail, telnet, http etc.). The ISPs must also log every outward login or telnet through their computers. T&lt;/em&gt;hese logs, as well as copies of all the packets originating from the Customer Premises Equipment (CPE) of the ISP, must be available in REAL TIME to Telecom Authority. The Clause forbids logins where the identity of the logged-in user is not known.&lt;/p&gt;
&lt;p&gt;&lt;em&gt;e) Clause 34.12 and 34.13 requires the Licensee to make available a list of all subscribers to its services on a password protected website for easy access by Government authorities.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;f) Clause 34.16 requires the Licensee to activate services only after verifying the bonafides of the subscribers and collecting supporting documentation. There is no regulation governing how long this information is to be retained.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;g) Clause 34.22 makes it mandatory for the Licensee to make available “details of the subscribers using the service” to the Government or its representatives “at any prescribed instant”.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;h) Clause 34.23 mandates that the Licensee maintain “all commercial records with regard to the communications exchanged on the network” for a period of “at least one year for scrutiny by the Licensor for security reasons and may be destroyed thereafter unless directed otherwise by the licensor”.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;i) Clause 34.28 (viii) forbids the licensee from transferring the following information to any person/place outside India:&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;j) Any accounting information relating to subscriber (except for international roaming/billing) (&lt;/em&gt;Note: it does not restrict a statutorily required disclosure of financial nature)&lt;em&gt; ; and&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;k) User information (except pertaining to foreign subscribers using Indian Operator’s network while roaming).&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;l) Clause 34.28(ix) and (x) require the TSP to provide traceable identity of their subscribers and on request by the Government must be able to provide the geographical location of any subscriber at any given time.&amp;nbsp;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;m) Clause 34.28(xix) stipulates that “in order to maintain the privacy of voice and data, monitoring shall only be upon authorisation by the Union Home Secretary or Home Secretaries of the States/Union Territories”.&lt;/em&gt; &amp;nbsp;(It is unclear whether this is to operate as an overriding provision governing all other clauses as well)&lt;/p&gt;
&lt;h3&gt;2.3 TRAI Regulations and Directions&lt;/h3&gt;
&lt;p&gt;The Telecom Regulatory Authority of India was established by statute in 1997 to safeguard interests of consumers while simultaneously nurturing conditions for growth of telecommunications in the country. The Authority has issued several regulations on various subjects which are binding on TSPs. &amp;nbsp;The following regulations touch on the subject of privacy:&lt;/p&gt;
&lt;h3&gt;2.4 Unsolicited Commercial Communications Regulation&lt;/h3&gt;
&lt;p&gt;In 2007, the Authority introduced the Telecom Unsolicited Commercial Communications Regulations which were aimed at creating a mechanism for registering requests of subscribers who did not wish to receive unsolicited commercial communications.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;* The regulations define “unsolicited commercial communication” as any message, through telecommunications service, which is &amp;nbsp;transmitted for the purpose of informing &amp;nbsp;about, or soliciting or promoting any commercial transaction in relation to goods, &amp;nbsp;investments or services &amp;nbsp;which a subscriber opts not to receive,&amp;nbsp;&lt;/p&gt;
&lt;p&gt;* The following categories of message are excluded&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(i) &amp;nbsp;any message under a specific &amp;nbsp;contract between the parties to &amp;nbsp;such contract; or &amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(ii) &amp;nbsp;any messages relating to charities, national campaigns or natural &amp;nbsp;calamities transmitted on the directions of the Government or &amp;nbsp;agencies authorized by it for the said purpose;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(iii) &amp;nbsp;any message transmitted, on the directions of the Government or any &amp;nbsp;authority or agency authorized by it, in the interest of the sovereignty &amp;nbsp;and integrity of India, the security of the State, friendly relations with &amp;nbsp;foreign States, public order, decency or morality;&lt;/p&gt;
&lt;p&gt;* The regulations specified a procedure for initiation of complaints by consumers and for their adjudication and disposal.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;* Telemarketers who initiate unsolicited commercial communication with a person who has opted not to receive such communications face a fine of Rs. 500 per call/SMS as well as disconnection of their telephone services.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;* The regulations require the TSPs to maintain confidentiality of all information submitted by the subscribers for the purposes of the ‘Do not Call Registry’.&lt;/p&gt;
&lt;h3&gt;2.5 Privacy and Confidentiality Direction&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;In February 2010, the TRAI issued a direction seeking to implement the privacy and confidentiality related clauses in the service providers’ licenses (see previous sections). Accordingly by this direction, the TRAI ordered all service providers to “put in place an appropriate mechanisms, so as to prevent the breach of confidentiality on information belonging to the subscribers and privacy of communication”. All service providers were required by this regulation to submit a report to the TRAI giving details of measures so adopted.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;3 International Norms&lt;/h2&gt;
&lt;h3&gt;3.1 Telecommunications in the EU&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;In 2006, the European Union adopted Directive 2006/24/EC which mandated member states to store citizens' telecommunications data for six to 24 months stipulating a maximum time period. The directive permits police and security agencies to request access to details such as IP address and time of use of every email, phone call and text message sent or received. A request to access the information would only be granted through a court order. In 2002 the Directive adopted the Privacy and Electronic Communications Directive. The ECD regulates the electronic communications sector and &amp;nbsp;addresses &amp;nbsp;issues such as: the retention of data, the sending of unsolicited e-mail, the use of cookies and the inclusion of personal data in public directories.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Art 10(1) of the German Constitution holds “The secrecy of letters, as well as of the post and telecommunications, is inviolable”. However, in 1968 an amendment was introduced which permitted (1) &amp;nbsp;surveillance to occur without the affected person ever being informed of it; and (2) surveillance without judicial review, but through “a review of the&lt;/p&gt;
&lt;p&gt;case by bodies and auxiliary bodies appointed by Parliament.”These measures could only be invoked in order to protect “the free democratic basic order or the existence or security of the Federation or a state.”&lt;/p&gt;
&lt;h3&gt;3.2 Telecommunication in the United States&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;In the United States telecommunications are regulated by the Federal Communications Commission. Specifically the FCC regulates how telecommunications carriers and providers of cable television use customer personal information, cable subscriber information, and telemarketing and junk fax activities. Every company that participates in telemarketing must comply with the FCC's &amp;nbsp;rules. The main legislation used to regulate telecommunication carriers is the Federal Communication Act. The Act applies to how carriers may use and disclose “Customer Proprietary Network Information” which includes billing information, type of telecommunications service used, and the types of calls customers tend to make. The Act further requires that carriers must provide customer notice and the opportunity to opt out of marketing. The FCC does though &amp;nbsp;provide, what is known as a “total service approach”, exception to these rules - that allows carriers to use CPNI to market to existing customers. Also, &amp;nbsp;under the Act, &amp;nbsp;cable providers are required to provide to their subscribers detailed notice about the collection and use of information, and gather consent before collecting, distributing, or disclosing information. Additionally, customers are granted &amp;nbsp;access to their information, and information must be destroyed after it has served the purpose for which it is collected. &amp;nbsp;The Act further requires that carriers must provide customer notice and the &amp;nbsp;opportunity to opt out of marketing.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Telephone Consumer Protection Act applies to U.S companies that tele-market to consumers for commercial purposes. The rules require that phone calls are not permitted before 8:00 am or after 9:00 pm, the company must keep an internal record of consumer who ask not to be called again, and the company must refrain from sending commercial faxes without the recipient's consent. Telephone monitoring and recording are regulated in each state. Many states follow a system known as “one-party consent”, which permits a party to record &amp;nbsp;a telephone conversation without the other party's consent. Only eleven states require consent of all parties before a telephone conversation is recorded (ibid Westby, International Guide to Privacy, 2004).&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;4 Discussion&lt;/h2&gt;
&lt;p&gt;The Indian Constitution does not, as in certain other countries (Eg. Germany), contain express language upholding the right to privacy in telecommunications. This absence has not however hindered the Supreme Court from reading in the right to privacy into the Fundamental Right to Life. Various judicial decisions as well as statutes affirm this right to privacy in telecommunications. In conclusion, we would like to provide a quick FAQ on privacy in telecommunications that draws on the foregoing analysis of Indian Law.v&amp;nbsp;&lt;/p&gt;
&lt;p&gt;(1) To what extent is there legal protection for customer information (such as one’s name, address, telephone number, or non-dynamic IP address);&amp;nbsp;&lt;/p&gt;
&lt;p&gt;As mentioned above, it is fairly easy for enforcement agencies to obtain this data. ISPs are required to make available much of this data on a website for the government to access at all times. Such access may be gained without judicial scrutiny and without even any showing of suspicion.&lt;/p&gt;
&lt;p&gt;(2) The extent of legal protection for connection data (such as the telephone numbers called; time and length of connection; one’s dynamic IP address) and the content of telecommunications&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Targeted surveillance or wiretapping is only possible following the procedure laid out in the Telegraph Rules which specify the manner in which such an order may be made, the review procedure and the maximum permissible duration of surveillance.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;(3) the legal requirements placed on telecommunications providers for data retention or data erasure;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The ISP License agreement requires the ISP to maintain “all commercial records with regard to the communications exchanged on the network” for a period of “at least one year for scrutiny. No definition is provided of what these commercial records would include or exclude. There is no information on the extent to which ISPs in India currently comply with this requirement and whether they follow any data erasure procedures.&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Questions:&amp;nbsp;&lt;/h2&gt;
&lt;p&gt;Will a privacy legislation address data retention for the Telecom &amp;nbsp;sector?&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Will a privacy legislation regulate the monitoring and tapping of phones?&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;End Notes&amp;nbsp;&lt;/h3&gt;
&lt;p&gt;&lt;span class="Apple-tab-span"&gt;&lt;/span&gt;i‘Telegraph’ is defined widely in the Act to include any “apparatus used or capable of use for transmission or reception of signs, signals, writing, images and sounds or intelligence of any nature” thus covering most known mediums of communication.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;ii&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; In 1997, the Supreme Court of India held in PUCL v. Union of India that the interception of communications under this section was unlawful unless carried out according to procedure established by law. Since no Rules had been prescribed by the Government specifying the procedure to be followed, the Supreme Court framed guidelines to be followed before tapping of telephonic conversation. These guidelines have been substantially incorporated into the Indian Telegraph Rules in 2007. Rule 419A stipulates the authorities from whom permission must be obtained for tapping, the manner in which such permission is to be granted and the safeguards to be observed while tapping communication. The Rule stipulates that any order permitting tapping of communication would lapse (unless renewed) in two months. In no case would tapping be permissible beyond 180 days. The Rule further requires all records of tapping to be destroyed after a period of two months from the lapse of the period of interception.&lt;/p&gt;
&lt;p&gt;iii&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; Section 4 of the Telegraph Act forbids the establishment of any telegraph service (including, as mentioned earlier, all telephony, internet etc) without obtaining a license from the Central Government.&lt;/p&gt;
&lt;p&gt;iv&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; Issued to TSPs who offer long distance telephony in India&lt;/p&gt;
&lt;p&gt;v&lt;span class="Apple-tab-span"&gt;	&lt;/span&gt; These questions drawn from a template provided in Schwartz, Paul M. “German and U.S. Telecommunications Privacy Law: Legal Regulation of Domestic Law Enforcement Surveillance.” Hastings Law Journal 54 (August 25, 2003): 751.&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-telecommunications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2012-03-21T10:06:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-surveillance.pdf">
    <title>Privacy and Surveillance Talk by Sunil Abraham</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-surveillance.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-surveillance.pdf'&gt;https://cis-india.org/internet-governance/blog/privacy-surveillance.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2013-09-13T09:47:09Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi">
    <title>Privacy and Surveillance Roundtable</title>
    <link>https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and the Cellular Operators Association of India invite you to a roundtable at the India International Centre, New Delhi on July 4, 2014.&lt;/b&gt;
        &lt;h3&gt;Background and Context to the Roundtables&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, lawful interception of communications may be conducted by the state in three ways: firstly, intercepting telephone calls and other telecommunications may take place under powers listed in the Telegraph Act, 1885 and procedure set out in the Telegraph Rules, 1951; secondly, intercepting written communications transmitted through the postal service or by private couriers may occur under the Post Office Act, 1898; and, thirdly, intercepting, de-crypting, and monitoring email messages and other electronic communications may take place under the Information Technology Act, 1950 and two sets of Rules issued in 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government’s intention to create a Central Monitoring System to automate the existing process of telephone tapping is significant for a number of reasons. It will bypass private telephone service providers; currently the active cooperation of TSPs is required and compelled in order to intercept and monitor a telephone conversation. This creates an extra layer of compliance activity for TSPs which is cumbersome and expensive. Interception orders from the state often do not comply with the procedure required by law. This uncertainty is compounded by the lack of an indemnity for TSPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, while the CMS will release TSPs from legal liability, it will leave the government free to conduct telephone interceptions in absolute secrecy and without a credible system of oversight and checks and balances. Amongst the world’s major democratic countries, India is alone in refusing to overhaul its telephone tapping regime. The legal requirements of probable cause, judicial sanction, and warrant-based interception – which are followed with exceptions in democracies around the world – are not adequately protected in India.  The same principles also apply to the interception of postal and electronic communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several intelligence and police agencies in India that conduct interceptions of communications without central coordination. Previous cases in the Supreme Court of India and a few Indian High Courts reveal many cases of improper and even illegal surveillance. The sheer number of interested state agencies, the concerns of inadequate oversight, the lack of a credible legal regime, the constant leaks of private communications, and the poor legal protection given to TSPs and ISPs must be legally addressed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information about the Roundtables&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Privacy and Surveillance Roundtables are a CIS initiative, in partnership with the Cellular Operators Association of India (COAI).  From June 2014 – November 2014, CIS and COAI will host seven Privacy and Surveillance Roundtable discussions across multiple cities in India. The Roundtables will be closed-door deliberations involving multiple stakeholders. Through the course of these discussions we aim to deliberate upon the current legal framework for surveillance in India, and discuss possible frameworks for surveillance in India. The provisions of the draft CIS Privacy Bill 2013, the International Principles on the Application of Human Rights to Communication Surveillance, and the Report of the Group of Experts on Privacy will be used as background material and entry points into the discussion. The recommendations and dialogue from each roundtable will be compiled and submitted to the Department of Personnel and training.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In January 2012 Justice A.P. Shah formed a committee to create a report of recommendations for privacy legislation in India. The committee met seven times from January 2012 to September 2012.  The Report is made up of six chapters and begins by reviewing the international best practices around privacy and the relevant Indian jurisprudence. The Report then recommends nine National Privacy Principles to be adopted by each sector in India. The Nine National Privacy Principles reflect international standards, as well as taking into consideration the Indian context. Along with the National Privacy Principles, the Report lays out a regulatory framework for privacy including privacy commissioners at the regional and national level, self regulating organizations at the industry level, and a system of complaints. Finally the report demonstrates how the National Privacy Principles could be used to harmonize existing legislation and practices.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Draft CIS Citizens Privacy (Protection) Bill 2013&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been researching privacy in India since 2010 with the objective of raising public awareness, completing in depth research, and driving a privacy legislation in India. As part of this work, the Centre for Internet and Society has drafted the Privacy (Protection) Bill 2013. The Citizens Privacy Protection Bill contains provisions that speak to data protection, interception, and surveillance. The Bill also establishes the powers and functions of the privacy commissioner, and lays out offenses and penalties for contravention of the Act. The Bill represents a citizens’ version of a privacy legislation, and will be shared with civil society, industry, and government. It is hoped that the review and revision of the Bill will be a participatory process, and thus comments and feedback to it’s’ provisions will be included as annex’s to the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The International Principles on the Application of Human Rights to Communication Surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These principles were defined in 2013 in response to rapidly changing technologies and surveillance practices. The principles are the outcome of a global consultation with civil society groups, industry and international experts in communications surveillance law, policy and technology, spearheaded by the Electronic Frontier Foundation US and Privacy International UK. As technologies that facilitate State surveillance of communications advance, States are failing to ensure that laws and regulations related to communications surveillance adhere to international human rights and adequately protect the rights to privacy and freedom of expression. These principles attempt to explain how international human rights law applies in the current digital environment, particularly in light of the increase in and changes to communications surveillance technologies and techniques. These principles can provide civil society groups, industry, States and others with a framework to evaluate whether current or proposed surveillance laws and practices are consistent with human rights.&lt;/p&gt;
&lt;h3&gt;Tentative Agenda&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;10.00&lt;br /&gt;11.00&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Introduction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00&lt;br /&gt;11.30&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30&lt;br /&gt;13.00&lt;/td&gt;
&lt;td&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;br /&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00&lt;br /&gt;16.00&lt;/td&gt;
&lt;td&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.00&lt;br /&gt;16.15&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf" class="external-link"&gt;CIS &lt;span class="highlightedSearchTerm"&gt;Privacy&lt;/span&gt; Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights to Communication &lt;span class="highlightedSearchTerm"&gt;Surveillance&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;The Report of the Group of Experts on &lt;span class="highlightedSearchTerm"&gt;Privacy&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi'&gt;https://cis-india.org/internet-governance/events/privacy-and-surveillance-roundtable-new-delhi&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-29T14:50:20Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/privacy-surveillance-roundtable">
    <title>Privacy and Surveillance Roundtable</title>
    <link>https://cis-india.org/events/privacy-surveillance-roundtable</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society and the Cellular Operators Association of India
in collaboration with the Council for Fair Business Practices invite you to a "Privacy Roundtable" at IMC Building, IMC Marg, Churchgate, Mumbai on June 28, 2014, 10.00 a.m. to 4.00 p.m.
&lt;/b&gt;
        &lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Details&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00 – 11:00&lt;/td&gt;
&lt;td&gt;Introduction&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00 - 11:30&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30 - 13:00&lt;/td&gt;
&lt;td&gt;Discussion&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00 - 14:00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00 - 16.00&lt;/td&gt;
&lt;td&gt;Discussion &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.00 - 16.15&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Background and Context to the Roundtables&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, lawful interception of communications may be conducted by the state in three ways: firstly, intercepting telephone calls and other telecommunications may take place under powers listed in the Telegraph Act, 1885 and procedure set out in the Telegraph Rules, 1951; secondly, intercepting written communications transmitted through the postal service or by private couriers may occur under the Post Office Act, 1898; and, thirdly, intercepting, de-crypting, and monitoring email messages and other electronic communications may take place under the Information Technology Act, 1950 and two sets of Rules issued in 2008.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government’s intention to create a Central Monitoring System to automate the existing process of telephone tapping is significant for a number of reasons. It will bypass private telephone service providers; currently the active cooperation of TSPs is required and compelled in order to intercept and monitor a telephone conversation. This creates an extra layer of compliance activity for TSPs which is cumbersome and expensive. Interception orders from the state often do not comply with the procedure required by law. This uncertainty is compounded by the lack of an indemnity for TSPs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, while the CMS will release TSPs from legal liability, it will leave the government free to conduct telephone interceptions in absolute secrecy and without a credible system of oversight and checks and balances. Amongst the world’s major democratic countries, India is alone in refusing to overhaul its telephone tapping regime. The legal requirements of probable cause, judicial sanction, and warrant-based interception – which are followed with exceptions in democracies around the world – are not adequately protected in India.  The same principles also apply to the interception of postal and electronic communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several intelligence and police agencies in India that conduct interceptions of communications without central coordination. Previous cases in the Supreme Court of India and a few Indian High Courts reveal many cases of improper and even illegal surveillance. The sheer number of interested state agencies, the concerns of inadequate oversight, the lack of a credible legal regime, the constant leaks of private communications, and the poor legal protection given to TSPs and ISPs must be legally addressed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information about the Roundtables&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Privacy and Surveillance Roundtables are a CIS initiative, in partnership with the Cellular Operators Association of India (COAI).  From June 2014 – November 2014, CIS and COAI will host seven Privacy and Surveillance Roundtable discussions across multiple cities in India. The Roundtables will be closed-door deliberations involving multiple stakeholders. Through the course of these discussions we aim to deliberate upon the current legal framework for surveillance in India, and discuss possible frameworks for surveillance in India. The provisions of the draft CIS Privacy Bill 2013, the International Principles on the Application of Human Rights to Communication Surveillance, and the Report of the Group of Experts on Privacy will be used as background material and entry points into the discussion. The recommendations and dialogue from each roundtable will be compiled and submitted to the Department of Personnel and training.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Report of the Group of Experts on Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In January 2012 Justice A.P. Shah formed a committee to create a report of recommendations for privacy legislation in India. The committee met seven times from January 2012 to September 2012.  The Report is made up of six chapters and begins by reviewing the international best practices around privacy and the relevant Indian jurisprudence. The Report then recommends nine National Privacy Principles to be adopted by each sector in India. The Nine National Privacy Principles reflect international standards, as well as taking into consideration the Indian context. Along with the National Privacy Principles, the Report lays out a regulatory framework for privacy including privacy commissioners at the regional and national level, self regulating organizations at the industry level, and a system of complaints. Finally the report demonstrates how the National Privacy Principles could be used to harmonize existing legislation and practices.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Draft CIS Citizens Privacy (Protection) Bill 2013&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been researching privacy in India since 2010 with the objective of raising public awareness, completing in depth research, and driving a privacy legislation in India. As part of this work, the Centre for Internet and Society has drafted the Privacy (Protection) Bill 2013. The Citizens Privacy Protection Bill contains provisions that speak to data protection, interception, and surveillance. The Bill also establishes the powers and functions of the privacy commissioner, and lays out offenses and penalties for contravention of the Act. The Bill represents a citizens’ version of a privacy legislation, and will be shared with civil society, industry, and government. It is hoped that the review and revision of the Bill will be a participatory process, and thus comments and feedback to it’s’ provisions will be included as annex’s to the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The International Principles on the Application of Human Rights to Communication Surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These principles were defined in 2013 in response to rapidly changing technologies and surveillance practices. The principles are the outcome of a global consultation with civil society groups, industry and international experts in communications surveillance law, policy and technology, spearheaded by the Electronic Frontier Foundation US and Privacy International UK. As technologies that facilitate State surveillance of communications advance, States are failing to ensure that laws and regulations related to communications surveillance adhere to international human rights and adequately protect the rights to privacy and freedom of expression. These principles attempt to explain how international human rights law applies in the current digital environment, particularly in light of the increase in and changes to communications surveillance technologies and techniques. These principles can provide civil society groups, industry, States and others with a framework to evaluate whether current or proposed surveillance laws and practices are consistent with human rights.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Tentative schedule for the Roundtables:&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;Mumbai – June 28th&lt;/li&gt;
&lt;li&gt;New Delhi – July 4th&lt;/li&gt;
&lt;li&gt;Ahmedabad/Hyderabad – August 1st&lt;/li&gt;
&lt;li&gt;Bangalore – September 5th&lt;/li&gt;
&lt;li&gt;New Delhi – October 3rd&lt;/li&gt;
&lt;li&gt;Chennai – October 24th&lt;/li&gt;
&lt;li&gt;New Delhi – November 7th&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf" class="external-link"&gt;Draft CIS Privacy Bill 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights and Communication Surveillance&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/privacy-surveillance-roundtable'&gt;https://cis-india.org/events/privacy-surveillance-roundtable&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-06-20T05:26:10Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india">
    <title>Privacy and Surveillance in India</title>
    <link>https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india</link>
    <description>
        &lt;b&gt;Sunil Abraham, Executive Director from the Centre for Internet and Society will give a talk on privacy and surveillance in India at this event organised by the Centre for Culture, Media and Governance, Jamia Millia Islamia on September 18, 2013. The talk will be held at Network Governance Lab, CCMG, Jamia Millia Islamia in New Delhi at 11.30 a.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-surveillance.pdf" class="internal-link"&gt;Click to read the brochure&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Abstract&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The talk will cover the development of privacy policy in India over the last 3 years, particularly in relation to projects such as NATGRID, CMS and UID. Special attention will be paid to the Justice A.P. Shah committee report, the last leak of the privacy bill from the DoPT and also the citizen draft of the privacy bill developed by the Centre for Internet and Society. International experiences such as Snowden's disclosures and the development of communication surveillance principles developed by EFF and others will be compared and contrasted with the Indian context.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;About the Speaker&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sunil is the executive director of the Centre for Internet and Society (CIS), Bangalore. CIS is a 4 year old policy and academic research organisation that focuses on accessibility by the disabled, intellectual property rights policy reform, openness [Free/Open Source Software, Open Standards, Open Content, Open Access and Open Educational Resources], internet governance, telecom, digital natives and digital humanities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He is also the founder of Mahiti, a social enterprise aiming to reduce the cost and complexity of information and communication technology for the voluntary sector by using free software. Sunil continues to serve on the board of Mahiti. He is an Ashoka fellow and was elected for a Sarai FLOSS Fellowship. For three years, Sunil also managed the International Open Source Network, a project of United Nations Development Programme's Asia-Pacific Development Information Programme, serving 42 countries in the Asia-Pacific region.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil currently serves on the advisory boards of Open Society Foundations - Information Programme, Mahiti, Samvada and International Centre for Free/Open Source Software.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india'&gt;https://cis-india.org/news/jamia-millia-islamia-new-delhi-september-18-2013-privacy-and-surveillance-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-13T09:49:25Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
