<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 861 to 875.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/summary-of-cis-workshop-on-dna-profiling-bill-2012"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/rt-march-1-2013-icelands-proposed-porn-ban"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/computer-world-india-feature-shubra-rishi-feb-25-2013-all-indian-enterprises-should-be-very-worried"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/february-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/who-minds-the-maxwells-demon"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-dog-is-watching-you"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/eff-feb-13-2013-katitza-rodriguez-and-elonnai-hickok-surveillance-camp-iv-disproportionate-state-surveillance-a-violation-of-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy-highlights-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/about/newsletters/january-2013-bulletin"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/data-retention-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/internet-democracy-richa-kaul-padte-jan-22-2013-cyber-security-surveillance-and-the-right-to-privacy"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/summary-of-cis-workshop-on-dna-profiling-bill-2012">
    <title>Summary of the CIS workshop on the Draft Human DNA Profiling Bill 2012</title>
    <link>https://cis-india.org/internet-governance/blog/summary-of-cis-workshop-on-dna-profiling-bill-2012</link>
    <description>
        &lt;b&gt;On March 1st, 2013, the Centre for Internet and Society organized a workshop which analysed the April 2012 draft Human DNA Profiling Bill and its potential implications on human rights in India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Think you control who has access to your DNA data? That might just be a myth of the past. Today, clearly things have changed, as draft Bills with the objective of creating state, regional, and national DNA databases in India have been leaked over the last years. Plans of profiling certain residents in India are being unravelled as, apparently, the new policy when collecting, handling, analysing, sharing and storing DNA data is that all personal information is welcome; the more, the merrier!&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;Who is behind all of this? The Centre for DNA Fingerprinting and Diagnostics in India created the 2007 draft DNA Profiling Bill&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn1"&gt;[1]&lt;/a&gt;, with the aim of regulating the use of DNA for forensic and other purposes. In February 2012 another draft of the Bill was leaked which was created by the Department of Biotechnology. The most recent version of the Bill was drafted in April 2012 and seeks to create DNA databases at the state, regional and national level in India&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn2"&gt;[2]&lt;/a&gt;. According to the latest 2012 draft Human DNA Profiling Bill, each DNA database will contain profiles of victims, offenders, suspects, missing persons and volunteers for the purpose of identification in criminal and civil proceedings. The Bill also establishes a process for certifying DNA laboratories, and a DNA Profiling Board for overseeing the carrying out of the Act.&lt;/p&gt;
&lt;p&gt;However, the 2012 draft Human DNA Profiling Bill lacks adequate safeguards and its various loopholes and overreaching provisions could create a potential for abuse. The creation of DNA databases is currently unregulated in India and although regulations should be enacted to prevent data breaches, the current Bill raises major concerns in regards to the collection, use, analysis and retention of DNA samples, DNA data and DNA profiles. In other words, the proposed DNA databases would not only be restricted to criminals…&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;DNA databases...and Justice for All?&lt;/b&gt;&lt;/h2&gt;
&lt;p&gt;&lt;img src="http://farm8.staticflickr.com/7197/6959954129_fefd0f928a.jpg" /&gt;&lt;/p&gt;
&lt;p class="italized"&gt;Source: &lt;span&gt; &lt;/span&gt;&lt;a href="http://www.flickr.com/photos/libertasacademica/"&gt;Libertas Academica&lt;/a&gt; on flickr&lt;/p&gt;
&lt;p class="italized"&gt;&lt;a class="external-link" href="http://dnaphenomena.blogspot.in/2011/05/dna-profiling.html"&gt;&lt;/a&gt;Du&lt;span&gt;ring the workshop &lt;/span&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn3"&gt;[3]&lt;/a&gt;&lt;span&gt;on the 2012 draft Human DNA Profiling Bill, DNA&lt;/span&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn4"&gt;[4]&lt;/a&gt;&lt;span&gt; was defined as a material that determines a persons´ hereditary traits, whilst DNA profiling&lt;/span&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn5"&gt;[5]&lt;/a&gt;&lt;span&gt; was defined as the processing and analysis of unique sequences of parts of DNA. Thus the uniqueness of DNA data is clear and the implications that could potentially occur through its profiling could be tremendous. The 2007 DNA Profiling Bill has been amended, yet its current 2012 version appears not only to be more intrusive, but to also be extremely vague in terms of protecting data, whilst very deterministic in regards to the DNA Profiling Board´s power. A central question in the meeting was:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;Should DNA databases be created at all? &lt;/i&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;The following concerns were raised and discussed during the workshop:&lt;/p&gt;
&lt;h3&gt;●      The myth of the infallibility of DNA evidence&lt;/h3&gt;
&lt;p&gt;The Innocence Project&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn6"&gt;[6]&lt;/a&gt;, which was presented at the workshop, appears to provide an appeal towards the storage of DNA samples and profiles, as it represents clients seeking post-conviction DNA testing to prove their innocence. According to statistics presented at the workshop, there have been 303 post-conviction exonerations in the United States, as a result of individuals proving their innocence through DNA testing. Though post-conviction exonerations can be useful, they cannot be the basis and main justification for creating DNA databases. Although DNA testing could enable post-conviction exonerations, errors in matching data remain a high probability and could result in innocent people being accused, arrested and prosecuted for crimes they did not commit. Thus, arguments towards the necessity and utility of the creation of DNA databases in India appear to be weak, especially since DNA evidence is &lt;i&gt;not &lt;/i&gt;infallible&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn7"&gt;[7]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;False matches can occur based on the type of profiling system used, and errors can take place in the chain of custody of the DNA sample, all of which indicate the weakness of DNA evidence being used. DNA data only provides&lt;i&gt; probabilities&lt;/i&gt; of potential matches between DNA profiles and the larger the amount of DNA data collected, the larger the probability of an error in matching profiles&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn8"&gt;[8]&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;●      &lt;b&gt;The non-criteria of DNA data collection&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;How and when can DNA data be collected? The amended draft 2012 Bill remains extremely vague and broad. In particular, the Bill states that &lt;i&gt;all&lt;/i&gt; offences under the Indian Penal Code and other laws, such as the Immoral Traffic (Prevention) Act, 1956, are applicable instances of human DNA profiling. Section B(viii) of the Schedule states that human DNA profiling will be applicable for offences under &lt;i&gt;´any other law as may be specified by the regulations made by the Board´&lt;/i&gt;. This incredibly vague section empowers the DNA Profiling Board with the ultimate power to decide upon the offences under which DNA data will be collected. The issue is this: most laws have loopholes. A Bill which lists applicable instances of human DNA profiling, under the umbrella of a potentially indefinite number of laws, exposes individuals to the collection of their DNA data, which could lead to potential abuse.&lt;/p&gt;
&lt;h3&gt;●      &lt;b&gt;The DNA Profiling Board´s power&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;The DNA Profiling Board has ´absolute´ power, especially according to the 2012 draft Human DNA Profiling Bill. Some of the Board´s functions include providing recommendations for provision of privacy protection laws, regulations and practices relating to access to, or use of, stored DNA samples or DNA analyses&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn9"&gt;[9]&lt;/a&gt;.  The Board is also required to advise on all ethical and human rights issues, as well as to take ´necessary steps´ to protect privacy. However, it remains unclear how a Board which lacks human rights expertise will carry out such tasks.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;No human rights experts&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Despite the various amendments&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn10"&gt;[10]&lt;/a&gt; to the section on the composition of the Board, no privacy or human rights experts have been included. According to the Bill, the Board will be comprised of many molecular biologists and other scientists, while human rights experts have not been included to the list. This can potentially be problematic as a lack of expertise on privacy and human rights laws can lead to the regulation of DNA databases without taking civil liberties into consideration.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Vague authorisation for communication of DNA profiles&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The Bill also empowers the Board to ´authorise procedures for communication of DNA profiles for&lt;i&gt; civil proceedings&lt;/i&gt; and for crime investigation by law enforcement and &lt;i&gt;other agencies&lt;/i&gt;´&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn11"&gt;[11]&lt;/a&gt;. Although the 2007 Bill &lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn12"&gt;[12]&lt;/a&gt;restricted the Boards´ authorisation to crime investigation by law enforcement agencies, its 2012 amendment extends such authorisation to ´civil proceedings´ which can also be carried out by so-called ´other agencies´.&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn13"&gt;[13]&lt;/a&gt; This amendment raises concerns, as the ´other agencies´ and the term ´civil proceedings´ remain vague.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Protecting the public&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The Board is also authorised to ´assist law enforcement agencies in using DNA techniques to protect the public´&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn14"&gt;[14]&lt;/a&gt;. Over the last years, laws are being enacted that enable law enforcement agencies to use technologies for surveillance purposes in the name of ´public security´, and the 2012 draft Bill is no exception. Many security measures have been applied to ´protect the public´, such as CCTV cameras and other technologies, but their actual contribution to public safety still remains a controversial debate&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn15"&gt;[15]&lt;/a&gt;. DNA techniques which would effectively protect the public have not been adequately proven, thus it remains unclear how the Board would assist law enforcement agencies.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Sharing data with international agencies…and regulating DNA laboratories&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;In addition to the above, the Board would also encourage cooperation between Indian investigation agencies and international agencies&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn16"&gt;[16]&lt;/a&gt;. This would potentially enable the sharing of DNA data between third parties and would enhance the probability of data being leaked to unauthorised third parties.&lt;/p&gt;
&lt;p&gt;The Board would &lt;i&gt;also &lt;/i&gt;be authorised to regulate the standards, quality control and quality assurance obligations of the DNA laboratories&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn17"&gt;[17]&lt;/a&gt;. The draft 2012 Bill ultimately gives &lt;i&gt;monopolistic control&lt;/i&gt; to the DNA Profiling Board over&lt;i&gt; all&lt;/i&gt; the procedures related to the handling of DNA data!&lt;/p&gt;
&lt;h3&gt;●      &lt;b&gt;The DNA Data Bank Manager&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;According to the 2012 draft Human DNA Profiling Bill&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn18"&gt;[18]&lt;/a&gt;, it is the DNA Data Bank Manager who would carry out ´all operations of and concerning the National DNA Data Bank´. All such operations are not clearly specified. The powers and duties that the DNA Data Bank Manager would be expected to have are not specified in the Bill, which merely states that they would be specified by regulations made by the DNA Profiling Board.&lt;/p&gt;
&lt;p&gt;The Bill also empowers the Manager to determine appropriate instances for the communication of information&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn19"&gt;[19]&lt;/a&gt;. In other words, law enforcement agencies and DNA laboratories can request the disclosure of information from the DNA Data Bank Manager, without prior authorisation. The DNA Data Bank Manager is empowered to decide the requested data.&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;DNA access restrictions&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Are you a victim or a cleared suspect? You better be, if you want access to your data to be restricted! The 2012 draft Human DNA Profiling Bill &lt;/span&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn20"&gt;[20]&lt;/a&gt;&lt;span&gt;states that access to information will be restricted in cases when a DNA profile derives from a victim or a person who has been excluded as a suspect. The Bill is unclear as to how access to the data of non-victims or suspects is regulated.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;●      Availability of DNA profiles and DNA samples&lt;/h3&gt;
&lt;p&gt;According to the amended draft 2012 Bill&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftn21"&gt;[21]&lt;/a&gt;, DNA profiles and samples can be made available in criminal cases, judicial proceedings and for defence purposes among others. However, ´criminal cases´ are loosely defined and could enable the availability of DNA data in low profile cases. Furthermore, the availability of DNA data is also enabled for the ´creation and maintenance of a&lt;i&gt; population statistics database&lt;/i&gt;´. This is controversial because it remains unclear how such a database would be used.&lt;/p&gt;
&lt;h3&gt;●      Data destruction&lt;/h3&gt;
&lt;p&gt;According to an amendment to section 37, DNA data will be kept on a ´permanent basis´ and the DNA Data Bank Manager will expunge a DNA profile only once the court has certified that an individual is no longer a suspect. This raises major concerns, as it does not clarify under what conditions individuals can have access to their data during its retention, nor does it give volunteers and missing persons the opportunity to have their data deleted from the data bank.&lt;/p&gt;
&lt;h2&gt;Workshop conclusions&lt;/h2&gt;
&lt;p&gt;&lt;img src="http://farm4.staticflickr.com/3235/3080247531_bf04a5cbe5.jpg" /&gt;&lt;/p&gt;
&lt;p&gt;Source: &lt;span&gt; &lt;/span&gt;&lt;a href="http://www.flickr.com/photos/micahb37/"&gt;micahb37&lt;/a&gt; on flickr&lt;/p&gt;
&lt;p&gt;The various loopholes in the Bill which can create a potential for abuse were discussed throughout the workshop, as well as various issues revolving around DNA data retention, as previously mentioned.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;During the workshop, some participants questioned the creation of DNA databases to begin with, while others argued that they are inevitable and that it is not a question of whether they should exist, but rather a question of how they should be regulated. All participants agreed upon the need for further safeguards to protect individuals´ right to privacy and other human rights. Further research on the necessity and utility of the creation of DNA databases in regards to human rights was recommended. In addition to all the above, the Ministry of Law and Justice was recommended to pilot the draft DNA Profiling Bill to ensure better provisions in regards to privacy and data protection.&lt;/p&gt;
&lt;p&gt;A debate on the use of DNA data in civil cases versus criminal cases was largely discussed in the workshop, with concerns raised in regards to DNA sampling being enabled in civil cases. The fact that the terms ´civil cases´ and ´criminal cases´ remain broad, vague and not legally-specified, raised huge concerns in the workshop as this could enable the misuse of DNA data by authorities. Thus, the members attending the workshop recommended the creation of two separate Bills regulating the use of DNA data: a DNA Profiling Bill for Criminal Investigation and a DNA Profiling Bill for Research. The creation of such Bills would restrict the access to, collection, analysis, sharing of and retention of DNA data to strictly criminal investigation and research purposes.&lt;/p&gt;
&lt;p&gt;However, even if separate Bills were created, who is to say that when implemented DNA in the database would not be abused? Criminal investigations can be loosely defined and research purposes can potentially cover anything and everything. So the question remains:&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;Should DNA databases be created at all? &lt;/i&gt;&lt;/blockquote&gt;
&lt;p&gt;&lt;br clear="all" /&gt;&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref1"&gt;[1]&lt;/a&gt; Draft DNA Profiling Bill 2007, &lt;a href="http://dbtindia.nic.in/DNA_Bill.pdf"&gt;http://dbtindia.nic.in/DNA_Bill.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref2"&gt;[2]&lt;/a&gt; Human DNA Profiling Bill 2012: Working draft versión – 29th April 2012,&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref3"&gt;[3]&lt;/a&gt; Centre for Internet and Society, &lt;i&gt;Analyzing the Draft Human DNA Profiling Bill 2012, &lt;/i&gt;25 February 2013, &lt;a href="https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill"&gt;http://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref4"&gt;[4]&lt;/a&gt; Genetics Home Reference: Your Guide to Understanding Genetic Conditions, &lt;i&gt;What is DNA?, &lt;/i&gt;&lt;a href="http://ghr.nlm.nih.gov/handbook/basics/dna"&gt;&lt;i&gt;http://ghr.nlm.nih.gov/handbook/basics/dna&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref5"&gt;[5]&lt;/a&gt; Shanna Freeman, &lt;i&gt;How DNA profiling Works, &lt;/i&gt;&lt;a href="http://science.howstuffworks.com/dna-profiling.htm"&gt;&lt;i&gt;http://science.howstuffworks.com/dna-profiling.htm&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref6"&gt;[6]&lt;/a&gt; Innocence Project, &lt;i&gt;DNA exoneree case profiles, &lt;/i&gt;&lt;a href="http://www.innocenceproject.org/know/"&gt;&lt;i&gt;http://www.innocenceproject.org/know/&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref7"&gt;[7]&lt;/a&gt; Australian Law Reform Commission (ALRC), &lt;i&gt;Essentially Yours: The Protection of Human Genetic Information in Australia (ALRC Report 96), &lt;/i&gt;´Criminal Proceedings: Reliability of DNA evidence´, Chapter 44, &lt;a href="http://www.alrc.gov.au/publications/44-criminal-proceedings/reliability-dna-evidence"&gt;http://www.alrc.gov.au/publications/44-criminal-proceedings/reliability-dna-evidence&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref8"&gt;[8]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref9"&gt;[9]&lt;/a&gt; Human DNA Profiling Bill 2012: Working draft version – 29th April 2012, Section 12(o, p, t), &lt;a href="https://cis-india.org/internet-governance/blog/draft-dna-profiling-bill-2012.pdf"&gt;http://cis-india.org/internet-governance/blog/draft-dna-profiling-bill-2012.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref10"&gt;[10]&lt;/a&gt; Ibid: Section 4(q)&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref11"&gt;[11]&lt;/a&gt; Ibid: Section 12(j)&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref12"&gt;[12]&lt;/a&gt; Draft DNA Profiling Bill 2007, Section 13, &lt;a href="http://dbtindia.nic.in/DNA_Bill.pdf"&gt;http://dbtindia.nic.in/DNA_Bill.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref13"&gt;[13]&lt;/a&gt; : Human DNA Profiling Bill 2012: Working draft version – 29&lt;sup&gt;th&lt;/sup&gt; April 2012, Sections 12(j), &lt;a href="https://cis-india.org/internet-governance/blog/draft-dna-profiling-bill-2012.pdf"&gt;http://cis-india.org/internet-governance/blog/draft-dna-profiling-bill-2012.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref14"&gt;[14]&lt;/a&gt; Ibid: Section 12(l)&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref15"&gt;[15]&lt;/a&gt; Schneier, B.(2008), &lt;i&gt;Schneier on Security, &lt;/i&gt;´CCTV cameras´, &lt;a href="http://www.schneier.com/blog/archives/2008/06/cctv_cameras.html"&gt;http://www.schneier.com/blog/archives/2008/06/cctv_cameras.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref16"&gt;[16]&lt;/a&gt; Human DNA Profiling Bill 2012: Working draft version – 29&lt;sup&gt;th&lt;/sup&gt; April 2012, Sections 12(u) and 12(v), &lt;a href="https://cis-india.org/internet-governance/blog/draft-dna-profiling-bill-2012.pdf"&gt;http://cis-india.org/internet-governance/blog/draft-dna-profiling-bill-2012.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref17"&gt;[17]&lt;/a&gt; Ibid: Section on the ´Standards, Quality Control and Quality Assurance Obligations of DNA Laboratories´&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref18"&gt;[18]&lt;/a&gt; Ibid: Section 33&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref19"&gt;[19]&lt;/a&gt; Ibid: Section 35&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref20"&gt;[20]&lt;/a&gt; Ibid: Section 43&lt;/p&gt;
&lt;p&gt;&lt;a href="file:///C:/Users/Owner/Documents/Documents/CIS%20blog%20on%20DNA%20Bills.docx#_ftnref21"&gt;[21]&lt;/a&gt; Ibid: Section 40&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/summary-of-cis-workshop-on-dna-profiling-bill-2012'&gt;https://cis-india.org/internet-governance/blog/summary-of-cis-workshop-on-dna-profiling-bill-2012&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Workshop</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>SAFEGUARDS</dc:subject>
    

   <dc:date>2013-07-12T15:33:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/rt-march-1-2013-icelands-proposed-porn-ban">
    <title>Iceland’s proposed porn ban ‘like repression in Iran, N. Korea’ – activists</title>
    <link>https://cis-india.org/news/rt-march-1-2013-icelands-proposed-porn-ban</link>
    <description>
        &lt;b&gt;A group of 40 human rights activists from around the world fear that Iceland could become “a role model for Internet censorship” if it introduces Internet filters blocking online content deemed pornographic.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This blog post was published in&lt;a class="external-link" href="http://rt.com/news/iceland-porn-ban-censorship-665/"&gt; RT&lt;/a&gt; on March 1, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;“The act of censoring pornography in Iceland differs in no way from repression of speech in Iran, China or North Korea,”&lt;/i&gt; human rights advocates wrote in an open letter to Icelandic Interior Minister Ögmundur Jónasson.&lt;br /&gt;&lt;br /&gt; Activists from nearly 20 countries, including the UK, America, Austria and Finland, said that Iceland’s moral reasons for the push to censor Internet pornography is &lt;i&gt;“justifying rather than condemning the actions of totalitarian regimes.”&lt;/i&gt;&lt;br /&gt;&lt;br /&gt; Critics – including Jillian C. York, Director for International Freedom of Expression, Electronic Frontier Foundation, Sunil Abraham, Executive Director for India’s Internet and Society Center, and Ot van Daalen, head of the Dutch Bits of Freedom Center – have described the controversial measure as &lt;i&gt;“an affront to basic principles of the society.”&lt;/i&gt;&lt;br /&gt;&lt;br /&gt; They also argued that those advocating the Web porn ban have offered &lt;i&gt;“no definition, no evidence, and suggested no technology.”&lt;/i&gt;&lt;br /&gt;&lt;br /&gt; The authors of the letter warned that the prohibition of pornographic content could create demand for an underground porn industry, unregulated and most certainly affiliated with other illegal activities, “as we have seen in the case of drugs or alcohol prohibition. Hiding the problem is not a solution and may in fact make things worse.”&lt;br /&gt;&lt;br /&gt; The solution, according to the activists, could be better sex education at home and schools: &lt;i&gt;“Sex education that deals not only with conception, contraception and sexually transmitted diseases, but also relationships, communication and respect.”&lt;/i&gt;&lt;br /&gt;&lt;br /&gt; Iceland, known for its feminist policies, could become the first Western country to censor online pornography, despite concerns over who will be given the authority to choose what is banned.&lt;br /&gt;&lt;br /&gt;&lt;i&gt;“It is tempting to regard filtering the Internet as a quick and easy way to restrict unwanted speech, opinions, or media, which the government regards as harmful for either them or the people,&lt;/i&gt;” the letter said. “&lt;i&gt;The right to see the world as it is, is critical to the very tenets and functions of a democracy and must be protected at all costs.”&lt;/i&gt;&lt;br /&gt;&lt;br /&gt; The activists claimed that it is technically impossible to censor the Internet without monitoring all telecommunications with automated machines: &lt;i&gt;“This level of government surveillance directly conflicts with the idea of a free society.”&lt;/i&gt;&lt;br /&gt;&lt;br /&gt; Iceland is not the only European country that has tried to implement such a ban. In December, the UK proposed blocking access to all pornographic websites, but UK ministers rejected the idea over a lack of public support.&lt;br /&gt;&lt;br /&gt; According to supporters of the Icelandic ban, pornography has unquestionably damaging effects on both children and women.&lt;br /&gt;&lt;i&gt;&lt;br /&gt; "We have to be able to discuss a ban on violent pornography, which we all agree has a very harmful effects on young people and can have a clear link to incidences of violent crime,"&lt;/i&gt; Interior Minister Jonasson, the author of the proposed ban, was quoted as saying.&lt;br /&gt;&lt;br /&gt; While Iceland has already passed a law banning the distribution and printing of pornography, the proposed ban would eventually restrict access to pornographic websites in the country, and make it impossible to use Icelandic credit cards on X-rated sites.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/rt-march-1-2013-icelands-proposed-porn-ban'&gt;https://cis-india.org/news/rt-march-1-2013-icelands-proposed-porn-ban&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-03-21T03:56:30Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/computer-world-india-feature-shubra-rishi-feb-25-2013-all-indian-enterprises-should-be-very-worried">
    <title>"All Indian Enterprises should Be Very Worried": Centre for Internet and Society</title>
    <link>https://cis-india.org/news/computer-world-india-feature-shubra-rishi-feb-25-2013-all-indian-enterprises-should-be-very-worried</link>
    <description>
        &lt;b&gt;The DoT’s CERT team has successfully censored more than 70 URLs that didn’t particularly contain praises of IIPM. Amusingly, a URL containing a public notice issued by the University Grants Commission (UGC) in July 2012 was also blocked. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This blog post by Shubhra Rishi was&lt;a class="external-link" href="http://www.computerworld.in/feature/%E2%80%9Call-indian-enterprises-should-be-very-worried%E2%80%9D-centre-internet-and-society-75742013"&gt; published&lt;/a&gt; in Computer World on February 25, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The chairman of the Indian Institute of Planning and Management (IIPM) is having a Barbara Streisand moment.&lt;br /&gt;&lt;br /&gt;The American entertainer Barbra Streisand, in 2003, attempted to suppress photographs of her residence, involuntarily and indirectly fuelling further publicity. Arindam Chaudhuri’s order from a Gwalior Court has unfortunately resulted in more or less the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DoT’s CERT team has successfully censored more than 70 URLs that didn’t particularly contain praises of IIPM. Amusingly, a URL containing a public notice issued by the University Grants Commission (UGC) in July 2012 was also blocked. The UGC notice said that IIPM cannot be recognized as a university according to the provisions of a particular section.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So while this issue has managed to hold our attention, it has also fervently highlighted the misappropriation of section 69 of India’s Information Technology (IT) Act 2000. According to this act, if the Director of Controller is satisfied that it is necessary or expedient so, he/she may order or direct any agency of the Government to intercept any information transmitted through any computer resource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In short, intercepting or blocking is counter-productive in today’s scenario and is often seen as a direct infringement of people’s online freedom. “The Constitution of India does not put so many restrictions on the freedom of speech and expression that IT Act puts under a particular section,” says cyber law expert, Pavan Duggal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legal experts are also of the opinion that several provisions of the IT Act are unconstitutional. “It does not have built-in safeguards, especially transparency-related ones, around surveillance and censorship. Censorship in India, especially under the IT (Intermediary Guidelines) Rules 2011, is completely opaque and results in invisible censorship, meaning that we don't even get to find out that censorship has happened and thus cannot challenge it,” says Pranesh Prakash, policy director, Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;In the past, independent activists such as Binayak Sen, Assem Trivedi, and Arundhati Roy, or even commoners such as Shaheen Dhadha have come under fire of the said Act.&lt;br /&gt;&lt;br /&gt;Frankly, if this loophole in the IT Act is not addressed, even Indian corporations could face a similar problem.&lt;br /&gt;&lt;br /&gt;“I believe all intermediaries (websites that host user content, and networks that carry user traffic among others) are threatened now. Their executives can be dragged to court without any protection; thanks to the broad wording of the IT (Intermediary Guidelines) Rules 2011, despite the IT Act itself granting them some protections. This is dangerous, and all Indian enterprises should be very worried,” says Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CorporateIndiawill have to tighten its belts. Despite the fact that the entire IT Act needs to be overhauled and employees need to be sensitized, currently, the first thing that corporate India needs to do is ensure that its operations in electronic format comply with the IT Act and its rules. “There's a lack of awareness about compliances in the corporate sector. Any kind of “jugaad” may not help a company get out of a potential exposure under the IT Act. An effective implementation of these compliances will relieve companies of the IT Act’s potential liabilities, both civil and criminal,” advises Duggal.&lt;br /&gt;&lt;br /&gt;So the Streisand effect in the IIPM case will slowly wear off, but the potential threat of the IT Act will continue to haunt enterprises.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/computer-world-india-feature-shubra-rishi-feb-25-2013-all-indian-enterprises-should-be-very-worried'&gt;https://cis-india.org/news/computer-world-india-feature-shubra-rishi-feb-25-2013-all-indian-enterprises-should-be-very-worried&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-02-28T09:21:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/february-2013-bulletin">
    <title>February 2013 Bulletin</title>
    <link>https://cis-india.org/about/newsletters/february-2013-bulletin</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) wishes you a great year ahead and welcomes you to the second issue of its newsletter for the year 2013. In this issue we bring you an overview of our research programs, updates of events organised by us, events we participated in, news and media coverage, and videos of some of our recent events.&lt;/b&gt;
        &lt;h3&gt;Memorial&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/people/fellow"&gt;Rahul Cherian&lt;/a&gt;, an expert and policy activist in disability law, intellectual property and technology law passed away due to an illness while on a visit to Goa on February 7, 2013. Rahul was the founder of the Inclusive Planet Centre for Disability and Policy, and a fellow at CIS. He was also a partner at IndoJuris Law Offices in Chennai and was one of the experts who drafted the Treaty for the Visually Impaired currently being negotiated at the World Intellectual Property Organization. The &lt;a href="https://cis-india.org/news/the-hindu-february-8-2013-rahul-cherian-passes-away"&gt;Hindu&lt;/a&gt; (February 8, 2013), &lt;a href="https://cis-india.org/news/first-post-feb-8-2013-rahul-cherian-founder-of-ngo-inclusive-planet-passes-away"&gt;First Post&lt;/a&gt; (February 8, 2013), &lt;a href="https://cis-india.org/news/legally-india-feb-7-2013-rip-rahul-cherian-human-rights-activist-inclusive-planet-co-founder"&gt;Legally India&lt;/a&gt; (February 7, 2013), and &lt;a href="https://cis-india.org/news/bar-and-bench-feb-8-2013-inclusive-planet-co-founder-disability-law-activist-and-cancer-survivor-rahul-cherian-passes-away"&gt;Bar &amp;amp; Bench&lt;/a&gt; (February 8, 2013) covered this story. Lawrence Liang wrote an obituary page, &lt;a href="https://cis-india.org/accessibility/blog/the-hindu-op-ed-lawrence-liang-feb-9-a-lightness-of-spirit"&gt;A Lightness of Spirit&lt;/a&gt; (The Hindu, February 9, 2013) and Nishant Shah wrote a column &lt;a href="https://cis-india.org/accessibility/blog/indian-express-feb-17-2013-nishant-shah-one-for-all"&gt;One For All&lt;/a&gt; (Indian Express, February 17, 2013).&lt;/p&gt;
&lt;p&gt;CIS organised a &lt;a href="https://cis-india.org/accessibility/events/in-memoriam-of-rahul-cherian"&gt;memorial function&lt;/a&gt; for Rahul Cherian at the TERI, Southern Regional Centre in Bangalore on February 28, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;br /&gt;CIS invites applications for the posts of &lt;a href="https://cis-india.org/jobs/vacancy-for-developer"&gt;Developer&lt;/a&gt; (NVDA Screen Reader Project), &lt;a href="https://cis-india.org/jobs/programme-officer-access-to-knowledge-and-openness"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge and Openness), and &lt;a href="https://cis-india.org/jobs/programme-officer-internet-governance"&gt;Programme Officer&lt;/a&gt; (Internet Governance). To apply send your resume to &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; and &lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS is doing two projects in partnership with the &lt;b&gt;Hans Foundation&lt;/b&gt;. One of this is to create a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India and another is for developing a screen reader and text-to- speech synthesizer for Indian languages. CIS is also working with the World Blind Union and many other organisations to develop a Treaty for the Visually Impaired helped by the WIPO:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;National Resource Kit for Persons with Disabilities&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Anandhi Viswanathan from CIS and Manojna Yeluri from the Centre for Law and Policy Research are working in this project. Draft chapters have been published. Feedback and comments are invited from readers for the chapters on Bihar and West Bengal:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-bihar-chapter-call-for-comments"&gt;The Bihar Chapter&lt;/a&gt; (by Manojna Yeluri, February 14, 2013): The state of Bihar is in the process of formulating a comprehensive state policy on disability. The Bihar State Policy on Disability is an extension of the National Policy for Persons with Disabilities and is currently in a draft form awaiting government approval and notification.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/accessibility/blog/the-west-bengal-chapter"&gt;The West Bengal Chapter&lt;/a&gt; (by Anandhi Viswanathan, February 28, 2013): The state of West Bengal has issued the West Bengal Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Rules, 1999 to implement the provisions under the central Persons with Disabilities (Protection of Rights, Equal Opportunities and Full Participation) Act, 1995.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/ip-watch-feb-16-2013-catherine-saez-indian-users-perspective-on-wipo-negotiations-on-treaty-for-visually-impaired"&gt;Indian Users’ Perspective On WIPO Negotiations On Treaty For Visually Impaired&lt;/a&gt; (by Catherine Saez, Intellectual Property Watch, February 16, 2013). Nirmita Narasimhan is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/a2k"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Wikimedia Foundation &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two year grant of INR 26,000,000 to support and develop the growth of Indic language communities and projects by community collaborations and partnerships. This is being carried out by the Access to Knowledge team based in Delhi. CIS is also doing a project (Pervasive Technologies) on examining the relationship between production of pervasive technologies and intellectual property. The project researches upon the noteworthy opportunities of the new types of low cost mobile devices, content and services as available in the market.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Wikipedia&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Beginning from September 1, 2012, Wikimedia Foundation &lt;a href="https://cis-india.org/a2k/access-to-knowledge-program-plan"&gt;awarded&lt;/a&gt; CIS a two-year grant of INR 26,000,000 to support and develop free knowledge in India. The &lt;a href="http://meta.wikimedia.org/wiki/Access_To_Knowledge/Team" title="Access To Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of four members based in Delhi: &lt;a href="https://cis-india.org/about/people/our-team"&gt;T. Vishnu Vardhan&lt;/a&gt;, &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Nitika Tandon&lt;/a&gt;, &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Subhashish Panigrahi&lt;/a&gt; and &lt;a href="https://cis-india.org/about/newsletters/people/our-team"&gt;Noopur Raval&lt;/a&gt;, and one new team member &lt;a href="https://cis-india.org/about/people/our-team"&gt;Dr. U.B. Pavanaja&lt;/a&gt; who works from Bangalore office.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;New Team Member&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/people/our-team"&gt;Dr. U.B. Pavanaja&lt;/a&gt; joined the A2K team as Programme Officer, India Language Initiatives on February 19, 2013. Dr. Pavanaja holds a Master’s degree from Mysore University and Ph.D. from Mumbai University. He was a scientist at Bhabha Atomic Research Centre, Mumbai, for about 15 years. He is one of the earliest editors of Kannada Wikipedia.  He has to his credit many firsts, viz., first Kannada website, first Kannada online magazine, first Indian language (Kannada) website to receive Golden Web Award, first Indian language (Kannada) editor for Palm OS, first Indian language (Kannada) editor for WinCE device (HP Jornado 720), first Indian language version (Kannada) of universally popular Logo (programming language for children) software, etc. His Kannada logo won the Manthan Award for the year 2006. He was a member of the technical advisory committee setup by the Govt. of Karnataka for Standardization of Kannada on Computers (2000). He is also a member of the Kannada Software Committee of Govt. of Karnataka (2008-current).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/knowledge-sharing-through-glam"&gt;Knowledge Sharing through GLAM at Bangalore&lt;/a&gt; (Karnataka Chitrakala Parishad, Kumara Krupa Road, Bangalore, February 25, 2013). Dr. U.B. Pavanaja, Subhashish Panigrahi and Nitika Tandon participated in this event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/wikimedia-bangalore-meetup-at-iimb"&gt;Wikimedia Bangalore Meetup @ Indian Institute of Management&lt;/a&gt; (Indian Institute of Management, Bangalore (organized in partnership with Wikispeed and NASSCOM). Vishnu Vardhan spoke on the Access to Knowledge project. Noopur Raval participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/creative-commons-comes-to-india"&gt;Creative Commons comes to India&lt;/a&gt; (by Subhashish Panigrahi, February 28, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/fifty-fourth-bangalore-wikimedia-meetup"&gt;Fifty-fourth Bangalore Wikimedia Meet-up at IIM, Bangalore&lt;/a&gt; (by Noopur Raval, February 28, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/odia-wikipedia-education-program-iimc-dhenkanal"&gt;Odia Wikipedia Community Brings Wikipedia Education Program to IIMC, Dhenkanal&lt;/a&gt; (by Subhashish Panigrahi, February 28, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/foss-wikimedia-under-one-roof-gnunify"&gt;FOSS, Wikimedia and Mozilla Under One Roof at GNUnify 2013, Pune&lt;/a&gt; (by Subhashish Panigrahi, February 28, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Reports&lt;/b&gt;&lt;br /&gt;CIS organised one Wiki workshop in the month of February 2013. We also bring you the report from an event organised in the month of January:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/celebrating-odia-wikipedias-ninth-anniversary"&gt;Celebrating Odia Wikipedia's Ninth Anniversary&lt;/a&gt; (organized by the Odia Wiki Community with support from CIS and Academy for Media Learning, January 29, 2013, Bhubaneswar). Few glimpses of the event are available as audio podcasts.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/blog/digital-literacy-workshop"&gt;Digital Literacy Workshop at Department of Arts, Delhi University&lt;/a&gt; (by Nitika Tandon, February 5, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://odishan.com/?p=2534"&gt;ଓଡ଼ିଆ ଉଇକିପିଡ଼ିଆର ନ‌ବମ ଜନ୍ମତିଥି ଅବସରରେ କର୍ମଶାଳା: ଇମିଡ଼ିଆରେ ଓଡ଼ିଆ ଭାଷାର ପ୍ର‌ୟୋଗ&lt;/a&gt; (Odishan.com, February 4, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ସମ୍ବାଦ:&lt;/b&gt;&lt;a href="http://sambadepaper.com/Details.aspx?id=36615&amp;amp;boxid=23625437"&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;ଲିପି ବ୍ୟାକରଣ ଓ ମାନକ ଭାଷାର ପ୍ରୟୋଗ ଜରୁରୀ&lt;/a&gt;. (Sambad, February, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.eindiadiary.com/content/odisha-workshop-organized-9th-anniversary-odia-language-application-odia-language-e-media"&gt;Odisha: Workshop organized on 9th Anniversary of Odia language: Application of Odia language in e-media&lt;/a&gt; (e India Bureau, March 2, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://news.fullorissa.com/odia-wikipedias-9th-anniversary/"&gt;Odia Wikipedia’s 9th anniversary&lt;/a&gt; (fullOrissa News, February 13, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://indiaeducationdiary.in/Orissa/Shownews.asp?newsid=19485"&gt;Odisha: Workshop organized on 9th Anniversary of Odia language: Application of Odia language in e-media&lt;/a&gt; (India Education Diary.com, March 2, 2013). Subhashish Panigrahi is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://www.odishaviews.com/odia-language-workshop-organized-on-9th-anniversary-of-odia-wikipedia-application-of-odia-language-in-e-media/"&gt;Odia language workshop organized on 9th Anniversary of Odia Wikipedia: Application of Odia language in e-media&lt;/a&gt; (Odishaviews.com, February 5, 2013). Subhashish Panigrahi is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt; Ongoing Events&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-workshop-bits-goa"&gt;Wikipedia Workshop @ BITS Goa&lt;/a&gt; (BITS Pilani K K Birla Goa Campus, March 7, 2013, 5.30 p.m. to 8.00 p.m.). &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/openness/events/wikipedia-editing-workshop-in-goa"&gt;A Wikipedia Editing Workshop in Goa&lt;/a&gt; (Nirmala Institute of Education, Goa, March 8, 2013, 3 p.m. to 5 p.m.).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Announcement&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/sanskrit-wikiquote"&gt;Sanskrit Wikiquote — Now Available&lt;/a&gt;: The Access to Knowledge team at CIS is happy to announce the availability of Sanskrit Wikiquote. Shiju Alex, an ex-team member played an active role in bringing this out. For more info see &lt;a href="http://bit.ly/Y9OY9R"&gt;http://bit.ly/Y9OY9R&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Pervasive Technologies&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Event Participated In&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/international-conference-on-contours-of-media"&gt;International Conference on Contours of Media Governance: Teaching, Disciplinarity, Methodology&lt;/a&gt; (organised by Jamia Millia Islamia University with support from Ford Foundation and ICSSR, Centre for Culture, Media &amp;amp; Governance, Jamia Millia Islamia University, New Delhi, February 25 – 27, 2013). Sunil Abraham presented preliminary findings from the Pervasive Technologies project.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Other &lt;a href="https://cis-india.org/openness"&gt;Openness&lt;/a&gt; Updates&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Announcements from Other Organizations&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://epublishingtrust.net/ept-2nd-annual-oa-award/"&gt;Iryna Kuchma wins the second EPT award&lt;/a&gt;: The Electronic Publishing Trust for Development announced the winner of its 2nd Annual Award in recognition of the effort made by individuals working in the developing and emerging countries in the furtherance of Open Access (OA) to scholarly publications. Dr. Francis Jayakanth won the inaugural award last year. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;HasGeek&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;HasGeek creates discussion spaces for geeks and has organised conferences like the &lt;a href="http://fifthelephant.in/2012/"&gt;Fifth Elephant&lt;/a&gt;, &lt;a href="http://droidcon.in/2011"&gt;Droidcon India 2011&lt;/a&gt;, &lt;a href="http://androidcamp.hasgeek.com/"&gt;Android Camp&lt;/a&gt;, etc. HasGeek is supported by CIS and works from the CIS office in Bengaluru.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Event Report &amp;amp; Video&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/openness/blog/hasgeek-blog-zainab-bawa-feb-6-2013-report-of-aaron-swartz-memorial-hacknight"&gt;Report of Aaron Swartz Memorial Hacknight&lt;/a&gt; (by Zainab Bawa, February 6, 2013). On January 19 and 20, 2013, HasGeek organized a hacknight to commemorate the life and work of Aaron Swartz. Zainab Bawa shares the developments.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/about/internet-governance"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS has an agreement with &lt;b&gt;Privacy International&lt;/b&gt;, London to facilitate the implementation of activities related to surveillance and freedom of speech and expression. We are also doing a project on examining the indicators of female economic empowerment in the IT industry in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Gender&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/women-in-indias-it-industry"&gt;Women in India’s IT Industry&lt;/a&gt; (by Jadine Lannon, February 27, 2013)&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/women-in-the-it-industry"&gt;Women in the IT Industry: Request for Data&lt;/a&gt; (by Jadine Lannon, February 28, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Free Speech &amp;amp; Expression&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/analyzing-latest-list-of-blocked-urls-by-dot"&gt;Analyzing the Latest List of Blocked URLs by Department of Telecommunications (IIPM Edition)&lt;/a&gt; (by Snehashish Ghosh, February 14, 2013). The analysis was quoted in &lt;a href="https://cis-india.org/news/first-post-feb-19-2013-danish-raza-why-was-the-gwalior-court-in-such-a-hurry-to-block-iipm-urls"&gt;FirstPost&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/tehelka-sunil-abraham-feb-3-2013-dont-slap-free-speech"&gt;Don’t SLAPP free speech&lt;/a&gt; (by Sunil Abraham with inputs from Snehashish Ghosh, Tehelka, February 3, 2013, Issue 9, Volume 10).&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/the-hindubusinessline-feb-15-2013-chinmayi-arun-freedom-of-expression-gagged"&gt;Freedom of Expression Gagged&lt;/a&gt; (by Chinmayi Arun, Hindu Business Line, February 15, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Media Coverage&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ndtv-video-the-social-network-feb-5-2013-hate-speech-ban-or-ignore"&gt;Hate speech: ban or ignore?&lt;/a&gt; (NDTV, February 5, 2013). Pranesh Prakash, Shivam Vij, and Sanjay Rajoura gave their expert views on the impact of hate speech.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-national-feb-6-2013-samanth-subramanian-censorship-and-sensibility-in-india"&gt;Censorship and sensibility in India&lt;/a&gt; (by Samanth Subramanian, February 6, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/ny-times-feb-8-2013-betwa-sharma-online-abuse-of-teen-girls-in-kashmir-leads-to-arrests"&gt;Online Abuse of Teen Girls in Kashmir Leads to Arrests&lt;/a&gt; (by Betwa Sharma, New York Times, February 8, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks"&gt;Indian net service providers too play censorship tricks&lt;/a&gt; (by T Ramachandran, The Hindu, February 9, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/economic-times-feb-12-2013-indu-nandakumar-anonymous-joins-protests-against-internet-shutdown-in-kashmir"&gt;Anonymous joins protests against Internet shutdown in Kashmir&lt;/a&gt; (by Indu Nandakumar, Economic Times, February 12, 2013). Sunil Abraham is quoted. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/first-post-feb-19-2013-danish-raza-why-was-the-gwalior-court-in-such-a-hurry-to-block-iipm-urls"&gt;Why was the Gwalior court in such a hurry to block IIPM URLs?&lt;/a&gt; (by Danish Raza, FirstPost, February 19, 2013). Snehashish Ghosh’s analysis on blocked website is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/outlook-feb-22-2013-arindam-mukherjee-stop-press-counsel"&gt;Stop Press Carousel&lt;/a&gt; (by Arindham Mukherjee, Outlook, February 22, 2013). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/computer-world-india-feature-shubra-rishi-feb-25-2013-all-indian-enterprises-should-be-very-worried"&gt;"All Indian Enterprises should Be Very Worried": Centre for Internet and Society&lt;/a&gt; (by Shubhra Rishi, Computer World, February 25, 2013). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Participated In&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/wilton-park-feb-13-15-2013-freedom-of-expression-online"&gt;Freedom of expression online: identifying and addressing challenges and developing a shared vision and a working partnership&lt;/a&gt;: (organized by Wilton Park, Wiston House, Sussex, UK, February 13 – 15, 2013). Pranesh Prakash participated in the event.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/itech-law-india-ninth-intl-asian-conference"&gt;9th International Asian Conference&lt;/a&gt; (organized by ITech Law, Bangalore, February 14 -15, 2013). Sunil Abraham was a panelist in the session on Censorship of Online Content. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Privacy&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-highlights-in-india"&gt;2012: Privacy Highlights in India&lt;/a&gt; (by Elonnai Hickok, February 12, 2013): Elonnai summarizes the top privacy moments of 2012 in India.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/eff-feb-13-2013-katitza-rodriguez-and-elonnai-hickok-surveillance-camp-iv-disproportionate-state-surveillance-a-violation-of-privacy"&gt;Surveillance Camp IV: Disproportionate State Surveillance - A Violation of Privacy&lt;/a&gt; (by Elonnai Hickok and Katitza Rodriguez of Electronic Frontier Foundation February 19, 2013).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/big-dog-is-watching-you"&gt;BigDog is Watching You! The Sci-fi Future of Animal and Insect Drones&lt;/a&gt; (by Maria Xynou, February 25, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Events Organized&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/analyzing-draft-human-dna-profiling-bill"&gt;Analyzing the Draft Human DNA Profiling Bill 2012&lt;/a&gt; (March 1, 2013, CIS, Bangalore).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/uid-and-npr"&gt;Unique Identity Number (UID), National Population Register (NPR), and Governance&lt;/a&gt; (March 2, 2013, TERI Southern Regional Centre, Bangalore).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event Participated In&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/omnishambles-of-uid-shrouded-in-its-rti-opacity"&gt;The Omnishambles of UID, shrouded in its RTI opacity&lt;/a&gt;: CIS sponsored Colonel Mathew Thomas to hold a workshop at the fourth National Right to Information (RTI) organized by the National Campaign for People's Right to Information, held in Hyderabad from February 15 to 18, 2013.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Upcoming Event&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/events/dml-conference-2013"&gt;DML Conference 2013&lt;/a&gt; (co-organised by CIS and Digital Media &amp;amp; Learning Research Hub Central, Sheraton Chicago Hotel &amp;amp; Towers - Chicago, Illinois, March 14 – 16, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Internet Access – Knowledge Repository&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS in partnership with the Ford Foundation was executing the telecom knowledge repository project which included producing and disseminating modules on various aspects of telecommunications including policy, regulations, infrastructure and market. However, from November 2012 there was a change in the mandate of the project. The new repository will cover the history of the internet, technologies involved, principle and values of internet access, broadband market and universal access. It will also touch upon various polices and regulations which has an impact on internet access and bodies and mechanism which are responsible for formulation policies related to internet access. The blog posts and modules will be published in a new website: &lt;a href="http://www.internet-institute.in"&gt;www.internet-institute.in&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We are hosting an “Institute on Internet and Society” in collaboration with the Ford Foundation India, which is to be held from June 8, 2013 to June 14, 2013. Call for registration and relevant details will be announced soon on our website.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/about/telecom"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While the potential for growth and returns exist for telecommunications in India, a range of issues need to be addressed. One aspect is more extensive rural coverage and the other is a countrywide access to broadband which is low. Both require effective and efficient use of networks and resources, including spectrum:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Newspaper Column&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/organizing-india-blogspot-shyam-ponappa-feb-14-2013-the-supreme-court-and-spectrum-management"&gt;The Supreme Court &amp;amp; Spectrum Management&lt;/a&gt; (by Shyam Ponappa, Organizing India Blogspot, February 14, 2013, originally published in the Business Standard, February 6, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Blog Entry&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/telecom/blog/who-minds-the-maxwells-demon"&gt;Who Minds the Maxwell's Demon: Revisiting Communication Networks through the Lens of the Intermediary&lt;/a&gt; (by Sharath Chandra Ram, February 28, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Natives&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Digital Natives with a Cause? examines the changing landscape of social change and political participation in light of the role that young people play through digital and Internet technologies, in emerging information societies. Consolidating knowledge from Asia, Africa and Latin America, it builds a global network of knowledge partners who critically engage with discourse on youth, technology and social change, and look at alternative practices and ideas in the Global South:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Events Participated In&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/news/humlab-umea-university-d-coding-digital-natives"&gt;D:coding Digital Natives - Seminar with Nishant Shah&lt;/a&gt; (organized by HUMlab, February 26, 2013). Nishant Shah gave a talk on D:coding Digital Natives at Samhällsvetarhuset.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/news/video-vortex-9-net-re-assemblies-of-video"&gt;Video Vortex # 9 Re:assemblies of Video&lt;/a&gt; (organized by the Institute of Network Cultures, Post Media Lab, Moving Image Lab, Leuphana, et.al, February 28 – March 2, 2013). Nishant Shah delivered a &lt;a href="http://videovortex9.net/ai1ec_event/reassemblies/?instance_id=292"&gt;key note&lt;/a&gt; at this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="https://cis-india.org/raw/digital-humanities"&gt;Digital Humanities&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;From 2012 to 2015, the Researchers At Work series is focusing on building research clusters in the field of Digital Humanities. We organised the first Habits of Living workshops in Bangalore last year. The next workshop is being held in Brown University.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Upcoming Event&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/raw/digital-humanities/blogs/habits-of-living/habits-of-living-networked-affects-glocal-effects"&gt;Habits of Living: Networked Affects, Glocal Effects&lt;/a&gt; (organised by CIS and Brown University, March 21 – 23, 2013, Brown University, Rhode Island). Nishant Shah will be speaking at this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://cis-india.org/about/newsletters/"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;CIS was registered as a society in Bangalore in 2008. As an independent, non-profit research organisation, it runs different policy research programmes such as Accessibility, Access to Knowledge, Openness, Internet Governance, and Telecom. The policy research programmes have resulted in outputs such as the &lt;a href="https://cis-india.org/about/advocacy/accessibility/blog/e-accessibility-handbook"&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;/a&gt; with ITU and G3ict, and &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/dnbook"&gt;Digital Alternatives with a Cause?&lt;/a&gt;, &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/position-papers"&gt;Thinkathon Position Papers&lt;/a&gt; and the &lt;a href="https://cis-india.org/about/digital-natives/front-page/blog/digital-natives-with-a-cause-a-report"&gt;Digital Natives with a Cause? Report&lt;/a&gt; with Hivos, etc. We have conducted policy research for the Ministry of Communications &amp;amp; Information Technology, Ministry of Human Resource Development, Ministry of Personnel, Public Grievances and Pensions, Ministry of Social Justice and Empowerment, etc., on &lt;a href="https://cis-india.org/about/a2k/blog/cis-analysis-july2011-treaty-print-disabilities"&gt;WIPO Treaties&lt;/a&gt;, &lt;a href="https://cis-india.org/about/a2k/blog/analysis-copyright-amendment-bill-2012"&gt;Copyright Bill&lt;/a&gt;, &lt;a href="https://cis-india.org/about/internet-governance/front-page/blog/cis-feedback-to-nia-bill"&gt;NIA Bill&lt;/a&gt;, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS is accredited as an observer at WIPO. CIS staff participates in the Standing Committee for Copyright and Related Rights (SCCR) meetings regularly held in Geneva, and participate in the discussions and comments on them from a public interest perspective. Our Policy Director, Nirmita Narasimhan won the &lt;a href="https://cis-india.org/about/accessibility/blog/national-award"&gt;National Award for Empowerment of Persons with Disabilities&lt;/a&gt; from the Government of India and also received the &lt;a href="https://cis-india.org/about/news/nirmita-nivh-award"&gt;NIVH Excellence Award&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;Follow us elsewhere&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Get short, timely messages from us on &lt;a href="https://twitter.com/cis_india"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Join the CIS group on &lt;a href="http://www.facebook.com/groups/28535315687/"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Visit us at &lt;a href="https://cis-india.org/"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Support Us&lt;/h3&gt;
&lt;p&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;h3&gt;Request for Collaboration&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society and improve our understanding of this new field. To discuss the research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/february-2013-bulletin'&gt;https://cis-india.org/about/newsletters/february-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-03-11T05:35:46Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/who-minds-the-maxwells-demon">
    <title>Who Minds the Maxwell's Demon (Revisiting Communication Networks through the Lens of the Intermediary)</title>
    <link>https://cis-india.org/telecom/blog/who-minds-the-maxwells-demon</link>
    <description>
        &lt;b&gt;A holistic reflection on information networks and it’s regulatory framework is possible only when the medium-specific boundary that has often separated the Internet and Telecom networks begins to dissolve, to objectively reveal points of contention in the communication network where the dynamics of network security and privacy are at large – namely, within the historic role of the intermediary at data/signal switching and routing nodes. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It is  unfair to contextualize the history of the Internet without looking at  how analog information networks like cable and wireless telegraph and  later, the telephone, almost coincidentally necessitated the invention  of automated networks for remote machine control and peer-to- peer  communication over the Internet that promised to drastically reduce  intermediary overheads. While the whole world was fraught in patent wars  over wired private networks, the first nodes of the ‘open’ internet  were built in a two-week global meeting of computer scientists who were  flown down to simply prepare for ‘a public exhibition’ of the ARPANET in  1971.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While India only received it’s first telephone in New Delhi late into the 20&lt;sup&gt;th&lt;/sup&gt; century, “Telegraph Laws” to most of the Indian working class always  remained an ominously urgent telegram that brought the news of a dear  one who had taken seriously ill. And so, on a lateral note, it is apt to  bring to light the life of one Mr Almond Brown Strowger, wherein the  idea of an automatic telephone exchange was given birth to by the &lt;b&gt;‘business of death’.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;h3&gt;The Automatic Telephone Exchange&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Almond  Strowger was an undertaker based in Missouri, in a town where there was  yet another undertaker, who’s wife incidentally was an operator in the  then manual telephone exchange. Strowger came to believe the reason he  received fewer phone calls was that his business competitor’s wife ended  up preferentially routing all callers seeking Strowger’s funeral  services to her undertaker husband instead. Strowger conceived the  initial idea in 1888 and patented ‘The Automatic Telephone Exchange’ in  1891. &lt;a href="http://goo.gl/oieIJ"&gt;http://goo.gl/oieIJ&lt;/a&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img class="image-inline" src="../../internet-governance/blog/resolveuid/8ec6c81ad81940739eb4fcaa67ad1da2" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Popularly  known as the ‘Strowger Switch’, the Step-by Step switch (SXS switch)  consisted of two interfaces – One at the customer’s end that used  telegraph keys (and later a rotary dial) to send a train of electric  current pulses corresponding to the digits 0 -9 all the way to the  exchange. The actual Strowger switch at the exchange, used an  electromechanical device that could move vertically to select one of 10  contacts, and then rotated to select one of another 10 in each row – a  total of 100 choices. Consequently was formed in 1892, the Strowger  Automatic Telephone Exchange Company at Indiana with about 75  subscribers. Strowger later sold his patents for $10,000 in 1898 to the  Automatic Electric Company, a competitor of Bell System’s Western  Electric. His patents were eventually acquired by Bell systems for $2.5  million in 1916, showing just how much growth and investor interest the  telephone industry had gained by then.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Switching Paradigms&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The  architecture of global communication was headed towards different ideals  and directions. Most media historians contrast these methodologies into  ‘circuit switching’ and ‘packet switching’, or a connection-oriented  fault intolerant system on one hand and another connection-less fault  tolerant protocol respectively, both of which were being developed  concurrently. In reality however, a major driving factor were the  stakeholders backing the infrastructure of the rapidly growing  communication industry, who were looking for growing returns on their  investments. And hence these parallel ramifications may also be looked  at through the lens of closed proprietary and medium specific networks  versus an open, shared, medium in-specific paradigm of information  theory.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Circuit  switching relied on an assured dedicated connection between 2 nodes,  and was especially patronized by the industry that saw telecommunication  as the latest fad in urban luxury (a key factor in the distinction of  suburban areas as the affluent moved into urban areas that were  ‘connected’ by telephone). Owners and manufacturers of the hardware  infrastructure became the most significant stakeholders. The revenue  model was based on the amount of time the network was used and hence was  popular in analog voice telephone networks.&lt;b&gt; &lt;/b&gt;The entire bandwidth  of the channel was made available for the duration of the session along  with a fixed delay between communicating nodes. Therefore, even if  there was no information being transmitted during a session, the channel  would not be made available to anyone else waiting to use it unless  released by the previous party. Early telephone exchanges relied on  manual labour to facilitate switching until the automated exchange came  about.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Packet  switching on the other hand, leaned towards the paradigm of shared  bandwidth and resources, and more importantly approached communication  with complete disregard to the medium of transmission, be it wired or  wireless. Furthermore, it also disregarded the content, modality and  form of communication with an objectified data-centric approach.  Information to be transmitted was divided into structured “packets” or  “capsules”. These packets were all ‘thrown’ into the shared network pool  consisting of numerous other such packets, each with its own  destination, to be carefully buffered, stored and forwarded by  intermediary routers in the network. Apart from occasional packet loss,  the time taken to send a message is indeterminate and is dependent on  the overall traffic load on the network at any given time.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;INTERFACE MESSAGE PROCESSOR and the ICCC ‘Hackathon’&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Plans  forged on into the early 1960s towards the development of an open  architecture to enable network communication between computer systems,  culminating in the invention of the ‘interface message processor’ that  promised to herald the coming of an era of packet switching by enabling  the ARPANET (Advanced Research Projects Agency Network), the first wide  area packet switched network – and precursor to the world wide web as we  know it today.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While  the Information Processing Techniques Office (IPTO) had previously  contracted Larry Roberts who in 1965 developed the first packet switched  network between two computers , the TX-2 at MIT with a Q-32 in  California, a growing need was felt to have a centralized terminal with  access to multiple sites that would enable any computer to connect to  any site. The first IMP was commissioned to be built by the engineering  firm BBN (Bolt, Beranek and Newman, a professor student trio from MIT).&lt;/p&gt;
&lt;table class="listing grid"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img class="image-inline" src="../../internet-governance/blog/resolveuid/b1a67e16e3314a0e854294ab95758314" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;(The very first Interface Message Processor by BBN: Courtesy: &lt;a class="external-link" href="http://goo.gl/tvo8n"&gt;http://goo.gl/tvo8n&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By  1971, the four original nodes that connected the ARPANET (viz, UCLA,  Stanford Research Institute, University of Utah and University of  California at Santa Barbara) had expanded to 15 nodes, but the lack of a  common host protocol meant that a full-scale implementation and  adoption of the ARPANET was far from complete. The time had come to  allow the public to engage with the promising future that the Internet  held. What entailed was the organization of first public International  Conference on Computer Communication (1972) (&lt;a href="http://goo.gl/PFhtL"&gt;http://goo.gl/PFhtL&lt;/a&gt;)  under the umbrella of the IEEE Computer Society at the Hilton Hotel,  Washington D.C. In many ways the event was the original version of a  modern day new media art ‘hackathon’ and involved about 50 computer  scientists who were flown in from around the globe alongside the likes  of Vint Cerf and Bob Metcalfe. The deadline of a public demonstration  provided the much-needed impetus to drive the network to functional  completion. Exhibits included a variety of networked applications like  the famed dialogue between the ‘paranoid patient’ chatbot PARRY and  doctor ELIZA, motion control of the LOGO ‘Turtle’ across the network and  remote access of digital files that were printed on paper locally. A  milestone in distributed packet switching had been achieved and the  stage had been set to compete with the archaic paradigm of circuit  switched networks, even as delegates from AT&amp;amp;T (incidentally one of  the funders of the event) watched on with the hope that the  demonstration would run into a fatal glitch.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Who Minds the Maxwell's Demon&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It may  not be boldly evident from the vast corpus of policy research  surrounding the regulation of communication networks (be it the issues  of network security, privacy, anonymity, surveillance or billing  systems) that key-points in the control system where dynamics play at  large, are at the interfacing nodes and data/signal switches at either  transceiver nodes as well as intermediary nodes. This is further  underlined by the historical fact that the invention of the automatic  telephone exchange was fuelled by the necessity to ensure a paradigm of  unbiased circuit switching within the context of a networked business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Just a  glimpse at the number of patents that directly or indirectly refer to  the Automatic Telephone Exchange patent shall bring to light myriad  applications that range from “Linking of Personal Information Management  Data”, “Universal Data Aggregation”, “Flexible Billing Architecture”,  ”Multiple Data Store Authentication” , “Managing User to User Contact  using Inferred Presence Detection” to various paradigms surrounding  distributed systems for cache defeat detection, most of which are part  of PUSH technology services that manage networked smartphone  applications from instant messaging to email access. Other proposed  systems for spectrum management and dynamic bandwidth allocation, such  as policy alternatives to spectrum auction that entail frequency hopping  at the transmitter level shall invariably depend on a centralized  automated intermediary who shall in theory have transparent access to  data flow. The role of routing intermediaries with specialized access,  poses many interesting questions with regards to policy issues that  surround network privacy and security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This  brings us back to the seemingly comical reference that this article  makes to a mysterious entity named the ‘Maxwell’s Demon’. A thought  experiment proposed by James Clerk Maxwell, involved a chamber of gas  molecules at equilibrium that was divided into two halves along with a  ‘door’ controlled by the “Maxwell’s Demon”. The demon had the ability to  ‘open’ the door to allow faster than average molecules to enter one  side of the chamber while slower molecules ended up on the other side of  the chamber, causing the former side to heat up while the other side  gradually cooled down, thereby establishing a temperature difference  without doing any work, and thus violating the 2&lt;sup&gt;nd&lt;/sup&gt; Law of  Thermodynamics.  The parallel drawn in this article between networked  switching intermediaries and the Maxwell’s demon does not go beyond this  simple functional similarity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However  for the ambitious reader, it maybe interesting to note that ever since  the invention of digital computers, scientists have actively pursued the  paradox of Maxwell’s demon to revisit physical fundamentals governing  information theory and information processing, which has involved  analyzing the thermodynamic costs of elementary information manipulation  in digital circuits – A study that probably constantly engages Google  as they pump water through steel tubes to cool their million servers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We  shall save all this for another day, but on yet another related note,  everytime say an email sent to an invalid address bounces back to your  inbox as a “Mailer Daemon”, let it be known that the “Daemon” in  Operating System terminology that refers to an invisible background  process that the user has no control over, infact directly owes it’s  etymology to the paradox of ‘Maxwell’s Demon’.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/who-minds-the-maxwells-demon'&gt;https://cis-india.org/telecom/blog/who-minds-the-maxwells-demon&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sharath</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2013-03-05T07:37:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-dog-is-watching-you">
    <title>BigDog is Watching You! The Sci-fi Future of Animal and Insect Drones</title>
    <link>https://cis-india.org/internet-governance/blog/big-dog-is-watching-you</link>
    <description>
        &lt;b&gt;Do you think robotic aeroplanes monitoring us are scary enough? Wait until you read about DARPA´s new innovative and subtle way to keep us all under the microscope! This blog post presents a new reality of drones which is depicted in none other than animal and insect-like robots, equipped with cameras and other surveillance technologies. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Just when we thought we had seen it all, the US Defence Advanced Research Projects Agency (DARPA) funded another controversial surveillance project which makes even the most bizarre sci-fi movie seem like a pleasant fairy-tale in comparison to what we are facing: animal and insect drones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Up until recently, unmanned aerial vehicles (UAVs), otherwise called drones, depicted the scary reality of surveillance, as robotic pilot-less planes have been swarming the skies, while monitoring large amounts of data without people´s knowledge or consent. Today, DARPA has come up with more subtle forms of surveillance: animal and insect drones. Clearly animal and insect-like drones have a much better camouflage than aeroplanes, especially since they are able to go to places and obtain data that mainstream UAVs can not.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;India´s ´DARPA´, the Defence Research and Development Organisation (DRDO), has been creating &lt;a href="http://www.indiastrategic.in/topstories1369_Unmanned_Aerial_Vehicle.htm"&gt;&lt;span&gt;UAVs&lt;/span&gt;&lt;/a&gt; over the last ten years, while the Indian Army first acquired UAVs from Israel in the late 1990s. Yet the use of all UAVs in India is still poorly regulated! Drones in the U.S. are regulated by the &lt;a href="http://www.faa.gov/"&gt;&lt;span&gt;Federal Aviation Administration (FAA)&lt;/span&gt;&lt;/a&gt;, whilst the &lt;a href="https://www.easa.europa.eu/what-we-do.php"&gt;&lt;span&gt;European Aviation Safety Agency (EASA)&lt;/span&gt;&lt;/a&gt; regulates drones in the European Union. In India, the &lt;a href="http://www.civilaviation.gov.in/MocaEx/faces/index.html;jsessionid=BLvyRvDp2NJzl4Q264fTNkXdynJkvJGF6bK1rSJtCrcJzwq1pym2!-750232318?_adf.ctrl-state=buu3l8xph_4"&gt;&lt;span&gt;Ministry of Civil Aviation&lt;/span&gt;&lt;/a&gt; regulates drones, whilst the government is moving ahead with plans to&lt;a href="http://indiatoday.intoday.in/story/aviation-ministry-moots-to-replace-dgca-with-a-super-regulator/1/224097.html"&gt;&lt;span&gt; replace the Directorate General of Civil Aviation (DGCA)&lt;/span&gt;&lt;/a&gt; with a Civil Aviation Authority. However, current Indian aviation laws are vague in regards to data acquired, shared and retained, thus not only posing a threat to individual´s right to privacy and other human rights, but also enabling the creation of a secret surveillance state.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The DRDO appears to be following DARPA´s footsteps in terms of surveillance technologies and the questions which arise are: will animal and insect drones be employed in India in the future? If so, how will they be regulated?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;BigDog/LS3&lt;/span&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/40gECrmuCaU" width="250"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Apparently having UAVs flying above us and monitoring territories and populations without our knowledge or consent was not enough. DARPA is currently funding the &lt;a href="http://defensetech.org/2012/02/08/video-the-latest-terrifying-drone-dog/"&gt;BigDog project&lt;/a&gt;, which is none other than a drone dog, a four-legged robot equipped with a camera and capable of surveillance in disguise. DARPA and Boston Dynamics are working on the latest version of BigDog, called the &lt;a href="http://www.darpa.mil/Our_Work/TTO/Programs/Legged_Squad_Support_System_%28LS3%29.aspx"&gt;Legged Squad Support System (LS3)&lt;/a&gt;, which can carry 400 pounds of gear for more than 20 miles without refuelling. Not only can the LS3 walk and run on all types of surfaces, including ice and snow, but it also has ´vision sensors´ which enable it to autonomously maneuver around obstacles and follow soldiers in the battle field. The LS3 is expected to respond to soldiers' voice commands, such as 'come', 'stop' and 'sit', as well as serve as a battery charger for electronic devices.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;BigDog/LS3 is undoubtedly an impressive technological advancement in terms of aiding squads with surveillance, strategic management and a mobile auxiliary power source, as well as by carrying gear. Over the last century most technological developments have manifested through the military and have later been integrated in societies. Many questions arise around the BigDog/LS3 and its potential future use by governments for non-military purposes. Although UAVs were initially used for strictly military purposes, they are currently also being used by governments on an international level for &lt;a href="http://www.nasa.gov/centers/dryden/pdf/111760main_UAV_Assessment_Report_Overview.pdf"&gt;civil purposes&lt;/a&gt;, such as to monitor climate change and extinct animals, as well as to surveille populations. Is it a matter of time before BigDog is used by governments for ´civil purposes´ too? Will robotic dogs swarm cities in the future to provide ´security´?&lt;/p&gt;
&lt;p align="JUSTIFY"&gt; &lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Like any other surveillance technology, the LS3 should be legally regulated and current lack of regulation could create a potential for abuse. Is authorisation required to use a LS3? If so, who has the legal right to authorise its use? Under what conditions can authorisation be granted and for how long? What kind of data can legally be obtained and under what conditions? Who has the legal authority to access such data? Can data be retained and if so, for how long and under what conditions? Do individuals have the right to be informed about the data withheld about them? Just because it´s a ´dog´ should not imply its non-regulation. This four-legged robot has extremely intrusive surveillance capabilities which may breach the right to privacy and other human rights when left unregulated.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Humming Bird Drone&lt;/span&gt;&lt;/h2&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;span&gt;&lt;img src="https://cis-india.org/home-images/hummingbirddronepic.png/@@images/f6c4be7f-597d-4909-914e-6470256cb1c9.png" style="text-align: justify; " title="Humming bird drone" class="image-inline" alt="Humming bird drone" /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Source:&lt;a class="external-link" href="http://www.hightech-edge.com/aerovironment-nano-humming-bird-flapping-wing-uav-video-clip/10309/"&gt; HighTech Edge&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;TIME magazine recognised DARPA for its Hummingbird nano air vehicle (NAV) and named the drone bird&lt;a href="http://www.darpa.mil/newsevents/releases/2011/11/24.aspx"&gt;&lt;span&gt; one of the 50 best inventions of 2011&lt;/span&gt;&lt;/a&gt;. True, it is rather impressive to create a robot which looks like a bird, behaves like a bird, but serves as a secret spy.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;During the presentation of the humming bird drone, &lt;a href="http://www.ted.com/talks/regina_dugan_from_mach_20_glider_to_humming_bird_drone.html"&gt;&lt;span&gt;Regina Dugan&lt;/span&gt;&lt;/a&gt;, former Director of DARPA, stated:&lt;/p&gt;
&lt;p class="callout" dir="ltr" style="text-align: justify; "&gt;&lt;i&gt;"&lt;/i&gt;Since we took to the sky, we have wanted to fly faster and farther. And to do so, we've had to believe in impossible things and we've had to refuse to fear failure&lt;i&gt;."&lt;/i&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Although believing in 'impossible things' is usually a prerequisite to innovation, the potential implications on human rights of every innovation and their probability of occurring should be examined. Given the fact that drones already exist and that they are used for both military and non-military purposes, the probability is that the hummingbird drone will be used for civil purposes in the future. The value of data in contemporary information societies, as well as government's obsession with surveillance for ´national security´ purposes back up the probability that drone birds will not be restricted to battlefields.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;So should innovation be encouraged for innovation’s sake, regardless of potential infringement of human rights? This question could open up a never-ending debate with supporters arguing that it´s not technology itself which is harmful, but its use or misuse. However the current reality of drones is this: UAVs and NAVs are poorly regulated (if regulated at all in many countries) and their potential for abuse is enormous, given that &lt;a href="http://www.wired.com/politics/security/commentary/securitymatters/2008/05/securitymatters_0515"&gt;&lt;span&gt;´what happens to our data happens to ourselves....who controls our data controls our lives.´&lt;/span&gt;&lt;/a&gt; If UAVs are used to surveille populations, why would drone birds not be used for the same purpose? In fact, they have an awesome camouflage and are potentially capable of acquiring much more data than any UAV! Given the surveillance benefits, governments would appear irrational not to use them.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;MeshWorms and Remote-Controlled Insects&lt;/span&gt;&lt;/h2&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/picofmeshworm.png" alt="MeshWorm" class="image-inline" title="MeshWorm" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Source: &lt;a class="external-link" href="http://www.nydailynews.com/news/national/scientists-create-resilient-robot-worm-medicine-electronics-spy-missions-roboticists-leading-universities-wroking-pentagon-grant-created-super-durable-synthetic-worm-call-meshworm-robot-article-1.1134361"&gt;NY Daily News&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Think insects are creepy? Now we can have a real reason to be afraid of them. Clearly robotic planes, dogs and birds are not enough.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;DARPA´s &lt;a href="http://www.bbc.co.uk/news/technology-19200285"&gt;&lt;span&gt;MeshWorm project&lt;/span&gt;&lt;/a&gt; entails the creation of earthworm-like robots that crawl along surfaces by contracting segments of their bodies. The MeshWorm can squeeze through tight spaces and mold its shape to rough terrain, as well as absorb heavy blows. This robotic worm will be used for military purposes, while future use for ´civil purposes´ remains a probability.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Robots, however, are not only the case. Actual insects are being wirelessly controlled, such as &lt;a href="http://www.technologyreview.com/news/411814/the-armys-remote-controlled-beetle/"&gt;&lt;span&gt;beetles with implanted electrodes&lt;/span&gt;&lt;/a&gt; and a radio receiver on their back. The giant flower beetle´s size enables it to carry a small camera and a heat sensor, which constitutes it as a reliable mean for surveillance.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;Other&lt;/span&gt;&lt;a href="http://www.wired.com/dangerroom/2012/06/ff_futuredrones/"&gt; drone insects&lt;/a&gt;&lt;span&gt; look and fly like ladybugs and dragonflies. Researchers at the Wright State University in Dayton, Ohio, have been working on a butterfly drone since 2008. Former software engineer Alan Lovejoy has argued that the US is developing &lt;/span&gt;&lt;a href="http://www.businessinsider.com/the-future-of-micro-drones-is-getting-pretty-scary-according-to-alan-lovejoy-2012-6"&gt;mosquito drones&lt;/a&gt;&lt;span&gt;. Such a device could potentially be equipped with a camera and a microphone, it could use its needle to abstract a DNA sample with the pain of a mosquito bite and it could also inject a micro RFID tracking device under peoples´ skin. All such micro-drones could potentially be used for both military and civil purposes and could violate individuals´ right to privacy and other civil liberties.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;Security vs. Privacy: The wrong debate&lt;/span&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;09/11 was not only a pioneering date for the U.S., but also for India and most countries in the world. The War on Terror unleashed a global wave of surveillance to supposedly enable the detection and prevention of crime and terrorism. Governments on an international level have been arguing over the last decade that the use of surveillance technologies is a prerequisite to safety. However, security expert, &lt;a href="http://www.schneier.com/blog/archives/2008/01/security_vs_pri.html"&gt;&lt;span&gt;Bruce Schneier&lt;/span&gt;&lt;/a&gt;, argues that the trade-off of privacy for security is a false dichotomy.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Everyone can potentially be a suspect within a surveillance state. Analyses of Big Data can not only profile individuals and populations, but also identify ‘branches of communication’ around every individual. In short, if you know someone who may be considered a suspect by intelligence agencies, you may also be a suspect. The mainstream argument &lt;a href="http://www.youtube.com/watch?v=GMN2360LM_U"&gt;&lt;span&gt;“I have nothing to hide, I am not a terrorist’&lt;/span&gt;&lt;/a&gt; is none other than a psychological coping mechanism when dealing with surveillance. The reality of security indicates that when an individual’s data is being intercepted, the probability is that those who control that data can also control that individual’s life. Schneier has argued that&lt;a href="http://www.schneier.com/blog/archives/2008/01/security_vs_pri.html"&gt;&lt;span&gt; privacy and security are not on the opposite side of a seesaw&lt;/span&gt;&lt;/a&gt;, but on the contrary, the one is a prerequisite of the other. Governments should not expect us to give up our privacy in exchange for security, as loss of privacy indicates loss of individuality and essentially, loss of freedom. We can not be safe when we trade-off our personal data, because privacy is what protects us from abuse from those in power. Thus the entire War on Terror appears to waged through a type of phishing, as the promise of ´security´ may be bait to acquire our personal data.&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Since the &lt;a href="http://www.thenational.ae/news/world/south-asia/mumbai-police-to-get-aerial-drones-to-help-fight-crime"&gt;2008 Mumbai terrorist attacks&lt;/a&gt;, India has had more reasons to produce, buy and use  surveillance technologies, including drones. Last New Year´s Eve, the &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2012-12-31/mumbai/36078903_1_surveillance-cameras-terror-outfits-netra"&gt;Mumbai police used UAVs&lt;/a&gt; to monitor hotspots, supposedly to help track down revellers who sexually harass women. The Chennai police recently procured &lt;a class="external-link" href="http://www.thehindu.com/news/cities/chennai/it-flies-it-swoops-it-records-and-monitors/article4218683.ece"&gt;three UAVs from Anna University &lt;/a&gt;to assist them in keeping an eye on the city´s vehicle flow. Raj Thackeray´s rally marked&lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2012-08-22/news/33322409_1_mumbai-police-uav-unmanned-aerial-vehicle"&gt; the biggest surveillance exercise ever launched for a single event&lt;/a&gt;, which included UAVs. The Chandigarh police are the first Indian police force to use the &lt;a class="external-link" href="http://www.indianexpress.com/news/UAV--Chandigarh-police-spread-wings-with--Golden-Hawk-/779043/"&gt;´Golden Hawk´&lt;/a&gt; - a UAV which will keep a ´bird´s eye on criminal activities´. This new type of drone was manufactured by the &lt;span&gt;Aeronautical Development Establishment (one of DRDO's premier laboratories based in Bangalore) and as of 2011 is being used by Indian law enforcement agencies.&lt;/span&gt;&lt;/p&gt;
&lt;p align="JUSTIFY"&gt;Although there is no evidence that India currently has any animal or insect drones, it could be a probability in the forthcoming years. Since India is currently using many UAVs either way, why would animal and/or insect drones be excluded? What would prevent India from potentially using such drones in the future for ´civil purposes´? More importantly, how are ´civil purposes´ defined? Who defines ´civil purposes´and under what criteria? Would the term change and if so, under what circumstances? The term ´civil purposes´ varies from country to country and is defined by many political, social, economic and cultural factors, thus potentially enabling extensive surveillance and abuse of human rights.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Drones can potentially be as intrusive as other communications surveillance technologies, depending on the type of technology they´re equipped with, their location and the purpose of their use. As they can potentially violate individuals´ right to privacy, freedom of expression, freedom of movement and many other human rights, they should be strictly regulated. In&lt;a href="http://www.uavs.org/regulation"&gt;&lt;span&gt; Europe UAVs&lt;/span&gt;&lt;/a&gt; are regulated based upon their weight, as unmanned aircraft with an operating mass of less than 150kg are exempt by the EASA Regulation and its Implementation Rules. This should not be the case in India, as drones lighter than 150kg can potentially be more intrusive than other heavier drones, especially in the case of bird and insect drones.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Laws which explicitly regulate the use of all types of drones (UAVs, NAVs and micro-drones) and which legally define the term ´civil purposes´ in regards to human rights should be enacted in India. Some thoughts on the authorisation of drones include the following: A Special Committee on the Use of All Drones (SCUAD) could be established, which would be comprised of members of the jury, as well as by other legal and security experts of India. Such a committee would be the sole legal entity responsible for issuing authorisation for the use of drones, and every authorisation would have to comply with the constitutional and statutory provisions of human rights.  Another committee, the Supervisory Committee on the Authorisation of the Use of Drones (lets call this ´SCAUD´), could also be established, which would also be comprised by (other) members of the jury, as well as by (other) legal and security experts of India. This second committee would supervise the first and it would ensure that SCUAD provides authorisations in compliance with the laws, once the necessity and utility of the use of drones has been adequately proven.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;&lt;span&gt;It´s not about ´privacy vs. security´. Nor is it about ´privacy or security´. In every democratic state, it should be about ´privacy and security´, since the one cannot exist without the other. Although the creation of animal and insect drones is undoubtedly technologically impressive, do we really want to live in a world where even animal-like robots can be used to spy on us? Should we be spied on at all? How much privacy do we give up and how much security do we gain in return through drones? If drones provided the ´promised security´, then India and all other countries equipped with these technologies should be extremely safe and crime-free; however, that is not the case.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In order to ensure that the use of drones does not infringe upon the right to privacy and other human rights, strict regulations are a minimal prerequisite. As long as people do not require that the use of these spying technologies are strictly regulated, very little can be done to prevent a scary sci-fi future. That´s why this blog has been written.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-dog-is-watching-you'&gt;https://cis-india.org/internet-governance/blog/big-dog-is-watching-you&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:38:33Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/eff-feb-13-2013-katitza-rodriguez-and-elonnai-hickok-surveillance-camp-iv-disproportionate-state-surveillance-a-violation-of-privacy">
    <title>Surveillance Camp IV: Disproportionate State Surveillance - A Violation of Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/eff-feb-13-2013-katitza-rodriguez-and-elonnai-hickok-surveillance-camp-iv-disproportionate-state-surveillance-a-violation-of-privacy</link>
    <description>
        &lt;b&gt;This is the fourth in a series of posts mapping global surveillance challenges discussed at EFF's State Surveillance and Human Rights Camp in Rio de Janeiro, Brazil. This article has been co-written with Elonnai Hickok — Centre for Internet and Society India, and a speaker at EFF's Camp.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Katitza Rodriguez and Elonnai Hickok was originally &lt;a class="external-link" href="https://www.eff.org/deeplinks/2013/02/disproportionate-state-surveillance-violation-privacy"&gt;published by the Electronic Frontier Foundation&lt;/a&gt; on February 13, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;States around the world are faced daily with the challenge of  protecting their populations from potential and real threats. To detect  and respond to them, many governments surveil communication networks,  physical movements, and transactional records. Though surveillance by  its nature compromises individual privacy, there are exceptional  situations where state surveillance is justified. Yet, if state  surveillance is unnecessary or overreaching, with weak legal safeguards  and a failure to follow due process, it can become disproportionate to  the threat—infringing on people's privacy rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Internationally, regulations concerning government surveillance of  communications vary in approach and effectiveness, often with &lt;a href="https://www.eff.org/deeplinks/2012/12/2012-in-review-state-surveillance-around-globe" target="_blank"&gt;very weak or nonexistent legal safeguards&lt;/a&gt;.  Some countries have strong regulations for the surveillance of  communications, yet these regulations may be largely ineffective or  unenforceable in practice. Other countries have no legal safeguards or  legal standards differing vastly according to the type of communication  data targeted. This is why, EFF organized at the end of last year a &lt;a href="https://www.eff.org/issues/surveillance-human-rights" target="_blank"&gt;State Surveillance and Human Rights Camp&lt;/a&gt; in Brazil to build upon this discussion and focused on how states are  facilitating unnecessary and disproportionate surveillance of  communications in ways that lead to privacy violations.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;State-Mandated Identity Verification&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 2012 the Constitutional Court in South Korea &lt;a href="https://www.nytimes.com/2012/08/24/world/asia/south-korean-court-overturns-online-name-verification-law.html?_r=1&amp;amp;" target="_blank"&gt;declared&lt;/a&gt; that country's "real-name identification system" unconstitutional. The  system had mandated that any online portal with more than 100,000 daily  users had to verify the identity of their users.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;This meant that the individual has to provide their real name before  posting comments online. The legal challenge to this system was raised  by &lt;a href="https://en.wikipedia.org/wiki/People%E2%80%99s_Solidarity_for_Participatory_Democracy" target="_blank"&gt;People's Solidarity for Participatory Democracy&lt;/a&gt; (PSPD)'s Public Law Center and &lt;a href="https://en.wikipedia.org/wiki/Korean_Progressive_Network_%28Jinbonet%29%20" target="_blank"&gt;Korean Progressive Network&lt;/a&gt;—Jinbonet among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Korea University professor Kyung-shin Park, Chair of PSPD's Law  Center told EFF that portals and phone companies would disclose  identifying information about six million users annually—in a country of  only 50 million people. The South Korean Government was using perceived  online abuses as a convenient excuse to discourage political criticism,  professor Park told EFF:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;The user information shared with the police most commonly has been used  by the government to monitor the anti-governmental sentiments of  ordinary people. All this has gone on because the government, the  legislature, and civil society have not clearly understood the privacy  implications of turning over identifying information of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The decision by the South Korean Constitutional Court to declare the "real identification system" unconstitutional was a win for user privacy and anonymity because it clearly showed that blanket mandates for the disclosure of identifying information, and the subsequent sharing of that data without judicial authorization, are a disproportionate measure that violates the rights of individuals.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;States Restrict Encryption and Demand Backdoors&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some States are seeking to block, ban, or discourage the use of  strong encryption and other privacy enhancing tools by requiring  assistance in decrypting information. In India service providers are  required to ensure that bulk encryption is not deployed. Additionally,  no individual or entity can employ encryption with a key longer than 40  bits. If the  encryption equipments is higher than this limit, the  individual or entity will need prior written permission from the  Department of Telecommunications and &lt;a href="https://www.dot.gov.in/isp/internet-licence-dated%2016-10-2007.pdf" target="_blank"&gt;must deposit&lt;/a&gt; the decryption keys with the Department.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;The limitation on encryption in India means that technically any encrypted material over 40 bits &lt;a href="http://www.dot.gov.in/isp/internet-licence-dated%2016-10-2007.pdf" target="_blank"&gt;would be accessible&lt;/a&gt; by the State. Ironically, the Reserve Bank of India&lt;b&gt; &lt;/b&gt;&lt;a href="http://www.rbi.org.in/scripts/NotificationUser.aspx?Id=414&amp;amp;Mode=0" target="_blank"&gt;issued security recommendations&lt;/a&gt; that banks should use strong encryption as higher as 128-bit for securing browser.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;In the United States, under the &lt;a href="http://wiki.surveillancehumanrights.org/Background_on_lawful_interception_mandates_and_government_access_to_encryption_keys" target="_blank"&gt;Communications Assistance for Law Enforcement Act&lt;/a&gt;,  telecommunication carriers are required to provide decryption  assistance only if they already possess the keys (and in many  communications system designs, there's no reason carriers should need to  possess the keys at all). In 2011, the &lt;a href="https://www.eff.org/pages/legal-struggles-over-interception-rules-united-states" target="_blank"&gt;US Government proposed a bill&lt;/a&gt; that would place new restrictions on domestic development or use of  cryptography, privacy software, and encryption features on devices. The  bill has not been adopted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Allowing only low levels of encryption and requiring service  providers to assist in the decryption of communications, facilitates  surveillance by enabling States easier access to data and preventing  individuals from using crypto tools to protect their personal  communications.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;States Establish Blanket Interception Facilities&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In Colombia, telecommunications network and service providers carrying out business within the national territory &lt;a href="https://www.eff.org/pages/mapping-laws-government-access-citizens-data-colombia" target="_blank"&gt;must implement&lt;/a&gt; and ensure that interception facilities are available at all times to  state agencies as prescribed by law. This is to enable authorized state  agencies to intercept communications at any point of time. In addition  to providing interception facilities, service providers must also retain  subscriber data for a period of five years, and  provide information  such as subscriber identity, invoicing address, type of connection on  request, and geographic location of terminals when requested.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though Colombia has put in place regulations for the surveillance of  communications, these regulations allow for broad surveillance and do  not afford the individual clear rights in challenging the same.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The examples above demonstrate that, although state surveillance of  communications can be justified in exceptional instances, it leads to  the violation of individual privacy when implemented without adequate  legal safeguards. Clearly there is a need for international principles  articulating critical and necessary components of due process for the  surveillance of communications. Those strong legal safeguards are  necessary not only in countries that don't have laws in place, but also  in countries where laws are lacking and fail to adequately protect  privacy. Last year, EFF &lt;a href="https://www.eff.org/deeplinks/2012/12/tackling-state-surveillance-and-human-rights-protecting-universal-freedoms" target="_blank"&gt;organized the State Surveillance and Human Rights Camp&lt;/a&gt; to discuss a set of &lt;a href="http://necessaryandproportionate.net/" target="_blank"&gt;International Principles on State Surveillance of Communications&lt;/a&gt;,  a global effort led by EFF and Privacy International, to define,  articulate, and promote legal standards to protect individual privacy  when the state carries out surveillance of communications.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].Constitutional Court's Decision 2010 Hunma 47, 252 (consolidated) announced August 28, 2012.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].The illegality of this practice was proved by a High Court decision  handed down 2 months after the Constitutional Court's decision in August  2012. Seoul Appellate Court 2011 Na 19012, Judgment Announced October  18, 2012. This case &lt;a href="http://www.peoplepower21.org/English/955480" target="_blank"&gt;was prepared and followed singularly&lt;/a&gt; by PSPD Public Interest Law Center.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;].&lt;a href="http://www.dot.gov.in/isp/internet-licence-dated%2016-10-2007.pdf"&gt;License Agreement for Provision of Internet Services Section 2.2 (vii)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;].Reserve Bank of India. &lt;a href="http://www.rbi.org.in/scripts/NotificationUser.aspx?Id=414&amp;amp;Mode=0" target="_blank"&gt;Internet Banking Guidelines&lt;/a&gt;. Section (f (2)).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/eff-feb-13-2013-katitza-rodriguez-and-elonnai-hickok-surveillance-camp-iv-disproportionate-state-surveillance-a-violation-of-privacy'&gt;https://cis-india.org/internet-governance/blog/eff-feb-13-2013-katitza-rodriguez-and-elonnai-hickok-surveillance-camp-iv-disproportionate-state-surveillance-a-violation-of-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-02-19T12:37:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks">
    <title>Indian net service providers too play censorship tricks </title>
    <link>https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks</link>
    <description>
        &lt;b&gt;The study by a Canadian university has found that some major Indian ISPs have deployed web-censorship and filtering technology.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The article by T Ramachandran was &lt;a class="external-link" href="http://www.thehindu.com/news/national/indian-net-service-providers-too-play-censorship-tricks/article4394415.ece"&gt;published in the Hindu&lt;/a&gt; on February 9, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;Your internet service provider (ISP) could be blocking some content. A  study conducted by a Canadian university has found that some major  Indian ISPs have deployed web-censorship and filtering technology widely  used in China and some West Asian countries.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The findings, published on January 15, were the result of a search for  censorship software and hardware on public networks like those operated  by ISPs.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A research team at Citizen Lab, an interdisciplinary laboratory based at  the Munk School of Global Affairs, University of Toronto, found a  software-hardware combo package called PacketShaper being used in many  parts of the world, including India.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The study identified the presence of four PacketShaper installations on  the networks of three major ISPs in India during the period of study in  late 2012. These ISPs had been earlier “implicated in filtering to some  degree,” the report said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The deployment of such traffic management technologies by ISPs could  threaten privacy, freedom of expression and competition, said Sunil  Abraham, Executive Director of the Bangalore-based NGO, Centre for  Internet and Society.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;He said tools like PacketShaper could be used by ISPs for two types of  censorship —“to block entire websites or choke traffic on certain  services or destinations in a highly granular fashion.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The U.S.-based producers of the technology, Blue Coat Systems, are quite  open about the product features on the company’s website. They say it  could be used to control and weed out undesirable content. It could also  be used to slow down or speed up the operation of programmes and  content flow to achieve the goals set by the operators of the networks.&lt;/p&gt;
&lt;h3 class="body" style="text-align: justify; "&gt;Transparency is the key&lt;/h3&gt;
&lt;p class="body" style="text-align: justify; "&gt;Technology experts said such products could be used to exercise  legitimate control over the internet traffic and prioritise the use of  bandwidth and resources, if used ethically.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“If done in a transparent manner that does not discriminate against  different actors within a class it does benefit the collective interest  of the ISP’s clients. However, it could also be used to engage in hidden  censorship against legitimate speech and also for anti-competitive  behaviour,” said Mr. Abraham.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The study focussed on countries where concerns exist over “compliance  with international human rights law, legal due process, freedom of  speech, surveillance, and censorship.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks'&gt;https://cis-india.org/news/the-hindu-feb-9-2013-t-ramachandran-indian-net-service-providers-too-play-censorship-tricks&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-02-13T04:20:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy-highlights-in-india">
    <title>2012: Privacy Highlights in India</title>
    <link>https://cis-india.org/internet-governance/privacy-highlights-in-india</link>
    <description>
        &lt;b&gt;In this blog post, Elonnai Hickok summarizes the top privacy moments of 2012 in India. In doing so she lists out the major ones like the Report of Group of Experts on Privacy, the RIM Standoff, the Nira Radia controversy, the Centralized Monitoring System, Unmanned Aerial Vehicles, NATGRID, CCTNS, the growth of CCTVs, the leaked DNA Profiling Bill, and the UID project.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;The Report of Group of Experts on Privacy:&lt;/b&gt; In October 2012 the "Report of Group of Experts on Privacy" was published by a governmental committee chaired by Justice A.P. Shah. The report contains recommendations for comprehensive privacy legislation, including defining nine privacy principles, establishing a regulatory framework consisting of privacy commissioners at the regional and central level, and self regulatory organizations, and analyzing the present challenges to privacy in India.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before the report was published, two draft privacy bills had been leaked to the public, and a concept paper drafted in 2010. The report received mixed reviews from the media, including questions about the relationship between the Right to Information and the Right to Privacy. Before the publishing of the Report, Prime Minister Manmohan Singh recognized that disclosures under the RTI Act could, in some instances, violate individual privacy. In a statement to the public, the Prime Minister stated &lt;i&gt;"citizens&lt;ins cite="mailto:Author" datetime="2012-11-16T15:34"&gt;’&lt;/ins&gt; right to know should definitely be circumscribed if disclosure of information encroaches upon someone's personal privacy.  But where to draw the line is a complicated question"&lt;/i&gt;.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three months before the report was published, the EU had publicly stated that current data protection provisions in India are not sufficient enough, and that India is not considered to be 'data secure'.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; If the recommendations in the report are turned into legislation, among other things, individuals in India will have a right to privacy and a right to redress for violations of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Governmental Interception&lt;/b&gt;: In early 2013 it was revealed that the Ministry of Home Affairs ordered interception of 10,000 phones and 1300 email ids during October 2012 to December 2012.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; Continuing its efforts to access all communications, in May 2012, the Government of India gave service providers a month to develop a method for intercepting calls using VoIP services.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; In February 2012 the Telecom Department proposed a new set of security guidelines that would allow for real time interception of communications and the tracking of the location of users. Among other things, the proposal establishes telecom security assurance and testing labs for the purpose of testing and certifying telecom equipment.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; Additionally, in October of 2012, Bharti Airtel refused to wiretap telephones for RAW. The Department of Telecommunications eventually ordered Bharti Airtel to comply with the order, which they did.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; The events around interception in 2012 show that the Indian government is still trying to gain access to as much information as possible. The constant push for real time access by the government is concerning, as many safeguards are missing from the Indian interception regime such as, penalty to security agencies for unauthorized interception and avenues of redress for the individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The RIM Standoff&lt;/b&gt;: Since 2008, the Indian government has been negotiating with RIM access to BlackBerry communications. Over the years, a number of solutions have been proposed by RIM and the GoI, yet a final agreement was never reached. Continuing the negotiations, In October 2012, RIM agreed to set up a server in Mumbai, which would allow security agencies to access Blackberry Messenger services.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; Blackberry also provided a solution that would allow access to Blackberry Internet Services.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; Following this, the Government of India mandated that Telecom Service Providers must incorporate the Blackberry interception solution, or risk being forced to shut their service by December 31, 2012. In compliance with this order, many service providers have set time frames for incorporation of the interception solution including and installed the necessary software.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; It is important to note that the lawful access solutions provided do not extend to the Blackberry Enterprise Server.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; Though it seems that the BlackBerry controversy might be resolved, the solution does not appear to be a long term solution, as BES communications are still not accessible, and the solution is not universal for all international providers. Thus, the Indian government will have to negotiate individually with each provider and service that they currently cannot access communications of.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Nira Radia Controversy:&lt;/b&gt; Continuing the Nira Radia controversy, which began in 2008-2009, in September 2012 the Supreme Court ordered the Income Tax Department to transcribe the 5,831 recorded conversations that were originally intercepted by the department. In January this year, the Supreme Court of India ordered that a "random check" be run through the Radia Tapes to check for instances of possible criminality.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; This case has become an important moment for privacy in India, as it intersects the dilemma between the right to privacy and public interest. Since 2010, Ratan Tata has been claiming that his right to privacy was violated by the publishing of the leaked tapes.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; The Supreme Court’s final decision will be important for drawing another contour of how the right to privacy is shaped in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Centralized Monitoring System&lt;/b&gt;: In 2012 the Telecom Ministry set aside Rs. 400 crore for the Central Monitoring System, which is projected to be finished by August 2014.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; The project, which first began in 2007, is envisioned to allow security agencies to bypass service providers and intercept communications on their own. The system is designed to have regional databases and a central database which will be accessible to law enforcement and security agencies. Privacy concerns related to the project include how the system will incorporate current legal regulations for interception in India, as a system that bypasses service providers essentially means that every communication can be read by law enforcement. Furthermore, it is not clear exactly who, and on what conditions will officials be allowed and authorized to access and use the system. The exact capabilities of the system have also not been identified. For example, will the CMS be able to intercept VoIP calls, will it be able to decrypt messages, and will it employ techniques such as Deep Packet Inspection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Unmanned Aerial Vehicles (UAVs):&lt;/b&gt; Since the late 90’s the Defense Research Development Organisation (DRDO) has been developing UAV’s for military purposes, and before this, India was acquiring UAV’s from Israel.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; Since that time there has been an increase in domestic companies and institutes developing UAVs, and an increase in the procurement of the technology by state police for generic reasons purposes as crowd control, traffic management, and security. For example, in August of 2012 the city of Mumbai used the UAV "Netra", as part of their security protocol during the Raj Thackeray rally to capture and send real time images back to the police. Netra is manufactured by the company Idea Forge.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; The Mumbai police also used the Netra in September 2012 after the Azad Maidan riots, and again on New Year’s Eve to monitor and track crime such as sexual harassment.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt; Similarly, Chennai city police are looking to procure from Anna University a UAV developed by the Madras Institute of Technology. The UAV will be used to assist in traffic monitoring and control.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; The increased procurement and use of UAV’s by state police is concerning as there is no clear legal regulation over the deployment of the vehicles. Thus, they have shifted from being used as a tool by the military, and are being used for monitoring traffic, crowd monitoring, etc. Furthermore, the process for authorization for use of the vehicles is not clear, and it is not clear how the captured information is protected and handled. Though UAV’s are clearly a useful tool for the military, for military purposes, the permitted use of them by other actors should be defined and regulated. The use of UAV’s for generic purposes could place individual privacy at risk, because of the amount of information and the level of detail that the vehicles are able to capture without the knowledge of the individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The National Intelligence Grid (NATGRID):&lt;/b&gt; Plans for the NATGRID project, which was first piloted after the Mumbai attacks, has been continuing forward through 2012 and is envisioned to be operational sometime in 2013. During 2012, a detailed project report was submitted for the project, and in June the government approved Rs. 1,100 crore for purchase of technological equipment.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt; NATGRID is a project that envisions networking 21 databases for purposes of crime investigation including tax, health, and travel information. The information will be accessible to 11 security agencies and law enforcement agencies. Though it has been clarified that NATGRID will ensure that privacy is protected, the design of NATGRID is one that could create potential risks – as it brings together large amounts of personal data for easy access by security agencies. In doing so it could potentially eliminate the steps security agencies must take currently to access information – such as submitting a request and obtaining permission for access. Furthermore, it is unclear how current legal protections such as secrecy clauses in banking legislation will be incorporated and upheld by the NATGRID system. Other questions that the project raises include – though currently there are only eleven agencies listed that will have access to NATGRID – will this list expand? Without a policy in place how will this standard and other standards be enforced?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Crime and Criminal Tracking Network &amp;amp; System (CCTNS): &lt;/b&gt;Though the CCTNS project has been in the works since 2009, a call for companies to develop the technology for the system was taken in early 2012, and pilot projects were launched later that year. The CCTNS is being headed by the National Crime Records Bureau, and will allow for the sharing of crime related information on a national level, in real time. In 2012, the system was allocated 2,000 crores by the government, and currently 2,000 police stations and other offices have been connected under the system.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, police in Chhattisgarh,&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; Uttarakhand&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt; and Odisha have all been connected to the CCTNS system.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt; Though it will be beneficial for the police to have access to a networked system, it has not been made clear yet what type of security system the project will adopt to ensure that the information is not compromised or accessed without authorization. It has also not been clarified what information will be placed on the database, and will all records be accessible to any individual accessing the system. Because the project is still in pilot stages it is hard to tell if it could put individual privacy at risk. Hopefully, before the project is realized in its full, many of the details will be clarified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Growth of CCTVs:&lt;/b&gt; Throughout 2012 the use of CCTV’s has continued to grow across India. For example, the Maharashtra government has undertaken a "CCTV surveillance project" in which it is in the process of taking bids for.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt; The state of Karnataka is also planning on installing CCTV cameras in Bangalore and other major cities to help detect incidents of crime.&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt; While the Delhi Transport Department is contemplating installing CCTVs in buses,&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt; and the Indian Rail Authorities have also decided to install CCTVs throughout stations to increase security.&lt;a href="#fn27" name="fr27"&gt;[27]&lt;/a&gt; There still does not exist regulation of the use of CCTV cameras, thus it is unclear who can operate a CCTV camera, which departments of the government can mandate for the installation of CCTVs, if public notice must be given that a CCTV camera is in use, and who can access the footage from a CCTV.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Study on Privacy Perceptions&lt;/b&gt;: In a study that came out in December 2012 by Ponnurangam K, among other things, it was found that 75 per cent of participants never read the privacy policy on a website – including social networking sites, participants also thought that there was a privacy legislation in place in India, and that individuals in India are most concerned about financial privacy.&lt;a href="#fn28" name="fr28"&gt;[28]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The National Counter Terrorism Centre (NCTC):&lt;/b&gt; The NCTC was originally created in response to the Mumbai terror attacks, under the Unlawful Prevention Act, 1967. The NCTC was meant to be realized in 2012, but in March, plans for the Centre were put on hold, because of the controversial nature of the project.&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt; The Centre was meant to bring Indian intelligence agencies under one umbrella, and analyze and store information related to terrorism. The proposed body has been highly controversial, as states object to the powers given to the Centre and see it as intruding on their powers and jurisdiction. If passed, the NCTC will have the powers of arrest, search and seizure, and the ability to access information from other intelligence agencies.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Leaked DNA Profiling Bill:&lt;/b&gt; In 2012, a version of the DNA Profiling Bill, originally drafted in 2007, was leaked to the public. The Bill is being piloted by the department of biotechnology, and seeks to establish DNA databases at the regional and central level for forensic purposes, yet the Bill does not establish strong protections for the privacy of DNA samples taken and important technical standards for ensuring that DNA samples are not misused or tampered with.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; What will happen to the Bill in 2013 is yet to be seen, but hopefully it will not be passed without the appropriate safeguards incorporated into its provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Unique Identification Project and the National Population Registrar:&lt;/b&gt; Throughout 2012, the UID has continued to carry out enrollments across the country, and sign MoU's with private sector companies for the adoption of the UID platform. Parallel to the UID project, the NPR project is also being implemented. The NPR seeks to provide every citizen of India with an identity that will be stored in an identity database maintained by the Registrar General and Census Commissioner of India.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; According to the NPR scheme, individuals who had already enrolled with the UID and given their biometrics would not need to re-submit their biometrics with the NPR. Yet, this has not been the case, and instead individuals are now being required to provide their biometrics for enrollment with the UID and the NPR.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy has been raised as a concern of the UID since the start of the project. For both the UID and the NPR now the transaction record will be stored by agencies, and whether it will be possible to track individuals across databases using their NPR or UID  identity?&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. The Report of Group of Experts on Privacy. See &lt;a class="external-link" href="http://bit.ly/VqzKtr"&gt;http://bit.ly/VqzKtr&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Tikku, A., "RTI doesn’t trample upon privacy, says expert panel", Hindustan Times, October 29, 2012, available at &lt;a class="external-link" href="http://bit.ly/TNAzRF"&gt;http://bit.ly/TNAzRF&lt;/a&gt;, last accessed on January 8, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Sen, A. India protests European Union study of data laws. Economic Times. July 9, 2012, available at &lt;a class="external-link" href="http://bit.ly/Y9ahHs"&gt;http://bit.ly/Y9ahHs&lt;/a&gt;, last accessed on January 8, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Harismran, J., Thomas, J. "Home Ministry ordered 10k wire taps in last 90 days, order tapping of 1300 email Ids", The Economic Times, January 3,&lt;sup&gt;&lt;/sup&gt; 2013, available at &lt;a class="external-link" href="http://bit.ly/TKk7yN"&gt;http://bit.ly/TKk7yN&lt;/a&gt;, last accessed on January 7th 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;].The Economic Times, "Provide solution to intercept VoIP within a month: Govt", May 6, 2012, available at &lt;a class="external-link" href="http://bit.ly/VQDQ4k"&gt;http://bit.ly/VQDQ4k&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. The Economic Times, "New policy for real time interception to security agencies", February 1, 2012, available at &lt;a class="external-link" href="http://bit.ly/11DrlvB"&gt;http://bit.ly/11DrlvB&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. The Economic Times, "RAW irked as Airtel keeps its request for phone tapping on hold", October 21, 2012, available at &lt;a class="external-link" href="http://bit.ly/12IujhF"&gt;http://bit.ly/12IujhF&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Reyes, D., "RIM installs BlackBerry server in Mumbai", CrackBerry, February 23, 2012, available at &lt;a class="external-link" href="http://bit.ly/yBQsSo"&gt;http://bit.ly/yBQsSo&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Economic Times, "DoT makes telecom operators fall in line on Blackberry issue", December 30, 2012, available at &lt;a class="external-link" href="http://bit.ly/1169ufn"&gt;http://bit.ly/1169ufn&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Economic Times, "MTNL, BSNL fail to give dates for Blackberry interception", October 29, 2012, available at &lt;a class="external-link" href="http://bit.ly/1169ufp"&gt;http://bit.ly/1169ufp&lt;/a&gt;, last accessed on January 7, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The Economic Times, "Telecom companies agreed to provide real-time intercept facilities for BlackBerry smartphones", December 31, 2012, available at &lt;a class="external-link" href="http://bit.ly/Y9gjYt"&gt;http://bit.ly/Y9gjYt&lt;/a&gt;, last accessed on January 7, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Mahapatra, D., "SC to examine Radia tapes for criminality", Times of India, January 9, &lt;sup&gt;&lt;/sup&gt; 2013, available at &lt;a class="external-link" href="http://bit.ly/VD7eWX"&gt;http://bit.ly/VD7eWX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Times of India, "Ratan Tata softens stand on Radia tapes", August 23, 2012, available at &lt;a class="external-link" href="http://bit.ly/158CZxl"&gt;http://bit.ly/158CZxl&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. The Economic Times, "Govt. to place phone tapping system worth Rs. 400 cr by 2014", March 21, 2012, available at &lt;a class="external-link" href="http://bit.ly/V2P9q6"&gt;http://bit.ly/V2P9q6&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Monsonis, G., "UAVs gaining currency with Indian Armed Forces", Indian Defence Review, October 30, 2012, available at &lt;a class="external-link" href="http://bit.ly/KVYyIr"&gt;http://bit.ly/KVYyIr&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Mumbai Mirror, "Raj Thackeray’s mega rally: Unmanned Aerial Vehicle kept an eye on Azed Maidan", Economic Times, August 22, 2012, available at &lt;a class="external-link" href="http://bit.ly/PYTGAG"&gt;http://bit.ly/PYTGAG&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;].Ali, A. &amp;amp; Narayan. V., "Netra cameras to keep a close watch , over New Year’s Eve hotspots", Times of India, December 31, 2012, available at &lt;a class="external-link" href="http://bit.ly/Z7orxt"&gt;http://bit.ly/Z7orxt&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Venugopal, V., "It flies, it swoops, it records and monitors", The Hindu, December 20, 2012, available at &lt;a class="external-link" href="http://bit.ly/V89sLo"&gt;http://bit.ly/V89sLo&lt;/a&gt;, last accessed January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. The Economic Times, "Cabinet Committee on Security approves Rs. 1,100 crore for NATGRID", June 14, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Mohan, V., "Centre launches pilot project to track criminals", The Times of India, January 5, 2013, available at &lt;a class="external-link" href="http://bit.ly/UPk2fh"&gt;http://bit.ly/UPk2fh&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. The Pioneer, "Civil Lines Police Station gets connected with CCTNS", January 2012, available at &lt;a class="external-link" href="http://bit.ly/VRXKGJ"&gt;http://bit.ly/VRXKGJ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. CIOL Bureau, "CCTNS to be made public through internet: Dehradun DGP", January 4, 2012, available at &lt;a class="external-link" href="http://bit.ly/X4JISx"&gt;http://bit.ly/X4JISx&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. The Hindu, "Odisha to launch CCTNS on January 12", January 7, 2013, available at &lt;a class="external-link" href="http://bit.ly/Vd9Ay1"&gt;http://bit.ly/Vd9Ay1&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Padmakshan, M., "Maharashtra plans to invite new bids for CCTV surveillance project", September 18, 2012, available at &lt;a class="external-link" href="http://bit.ly/VRYrQm"&gt;http://bit.ly/VRYrQm&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. Ashoka, R., "Karnataka to install CCTV cameras in Bangalore, major cities", Economic Times. July 26, 2012, available at &lt;a class="external-link" href="http://bit.ly/11Dxt6Z"&gt;http://bit.ly/11Dxt6Z&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Economic Times, "Buses to come with CCTV cameras for safety of women: Delhi government", December 17, 2012, available at &lt;a class="external-link" href="http://bit.ly/158Gtjo"&gt;http://bit.ly/158Gtjo&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. Economic Times, "Railways to step by security apparatus at stations", February 15, 2012, available at &lt;a class="external-link" href="http://bit.ly/11DxSX8"&gt;http://bit.ly/11DxSX8&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Times of India, "Most Indians ignorant about privacy issues on Facebook, Twitter: Study", December 10, 2012, available at &lt;a class="external-link" href="http://bit.ly/X4KVt1"&gt;http://bit.ly/X4KVt1&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Kumar, H., "Does India Need a National Counter Terrorism Center?", The New York Times, India Ink, February 28, 2012, available at &lt;a class="external-link" href="http://nyti.ms/A5VU5P"&gt;http://nyti.ms/A5VU5P&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Times of India. CM to attend National Counter- Terrorism Centre Meet in Delhi. May 4, 2012, available at &lt;a class="external-link" href="http://bit.ly/12IDoH9"&gt;http://bit.ly/12IDoH9&lt;/a&gt;, last accessed on January 8, 2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Hickok, E., "Rethinking DNA Profiling in India", Economic Political Weekly, October 27, 2012, available at &lt;a class="external-link" href="http://bit.ly/TUrH7j"&gt;http://bit.ly/TUrH7j&lt;/a&gt;, last accessed on January 7, 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. Department of Information Technology, "National Population Register", available at &lt;a class="external-link" href="http://bit.ly/12rzyOh"&gt;http://bit.ly/12rzyOh&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. Pandit, A., "NPR must even if you have Aadhar number", Times of India, October 31, 2012, available at &lt;a class="external-link" href="http://bit.ly/Y9oXGq"&gt;http://bit.ly/Y9oXGq&lt;/a&gt;, last accessed on January 8, 2013.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy-highlights-in-india'&gt;https://cis-india.org/internet-governance/privacy-highlights-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-02-12T12:39:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications">
    <title>A Comparison of Indian Legislation to Draft International Principles on Surveillance of Communications</title>
    <link>https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications</link>
    <description>
        &lt;b&gt;This blog post is a comparison of the relevant Indian legislations allowing governmental access to communications and the Draft International Principles on Surveillance of Communications. The principles, first drafted in October 2012 and developed subsequently seeks to establish an international standard for surveillance of communications in the context of human rights. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society is contributing feedback to the drafting of the principles. The principles are still in draft form and the most recent version along with the preamble to the principles can be accessed at: &lt;a class="external-link" href="http://necessaryandproportionate.net/"&gt;http://necessaryandproportionate.net/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The Principles:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt;&lt;b&gt;Principle - Legality&lt;/b&gt;&lt;b&gt;:&lt;/b&gt;&lt;i&gt; Any limitation to the right to privacy must be prescribed by law. Neither the Executive nor the Judiciary may adopt or implement a measure that interferes with the right to privacy without a previous act by the Legislature that results from a comprehensive and participatory process. Given the rate of technological change, laws enabling limitations on the right to privacy should be subject to periodic review by means of a participatory legislative or regulatory process. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In India there are two predominant legislations with subsequent Rules and Licenses that allow for access to communications by law enforcement and the government. Though the basic power of interception of communications are prescribed by law, the Rules and Licenses build off of these powers and create procedural requirements, and requirements for assistance.&lt;/p&gt;
&lt;li&gt;&lt;b&gt;The Indian Telegraph Act, 1885&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; &lt;i&gt;The Indian Telegraph Amendment Rules 2007: &lt;/i&gt;These&lt;i&gt; &lt;/i&gt;Rules are grounded in section 419A of the Indian Telegraph Act and establish procedures and safeguards for the interception of communications. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;License Agreement for Provision of Unified Access Services After Migration from CMTS (UASL)&lt;/i&gt;: This license is grounded in the Telegraph Act, and details what types of assistance service providers must provide to law enforcement and the government. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;License Agreement for Provision of Internet Services&lt;/i&gt;: This license is grounded in the Telegraph Act, and details what types of assistance service providers must provide to law enforcement and the government. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;The Information Technology Act, 2000&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Procedure and Safeguards for Interception, Monitoring, and Decryption of Information Rules 2009:&lt;/i&gt; These Rules were notified in 2009 and allow authorized governmental agencies to intercept, monitor, and decrypt information generated, transmitted, received, or stored in any computer resource. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Procedure and safeguard for Monitoring and Collecting Traffic Data or Information Rules 2009:&lt;/i&gt; These Rules were notified in 2009 and allow authorized agencies to monitor and collect traffic data or information that is generated, transmitted, received or stored in any computer resource.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2. &lt;/b&gt;&lt;b&gt;Principle - Legitimate Purpose&lt;/b&gt;:&lt;i&gt; Laws should only allow access to communications or communications metadata by authorized public authorities for investigative purposes and in pursuit of a legitimate purpose, consistent with a free and democratic society.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are no specific provisions requiring that access by law enforcement must be for a legitimate purpose and consistent with a free and democratic society. Instead, Indian legislation defines and lays out specific circumstances for which access would be allowed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Below are the circumstances for which access is allowed by each Act, Rule, and License:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;The TA Rules 2007&lt;/b&gt;: Interception is allowed in the following circumstances: &lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;On the occurrence of any public emergency&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;In the interest of the public safety&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;In the interests of the sovereignty and integrity of India&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;The security of the state&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Friendly relations with foreign states&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Public order&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Preventing incitement to the commission of an offence&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules&lt;/b&gt;: Interception, monitoring, and decryption of communications is allowed in the following circumstances:&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;In the interest of the sovereignty or integrity of India, &lt;/li&gt;
&lt;li&gt;Defense of India&lt;/li&gt;
&lt;li&gt;Security of the state&lt;/li&gt;
&lt;li&gt;Friendly relations with foreign states&lt;/li&gt;
&lt;li&gt;Public order &lt;/li&gt;
&lt;li&gt;Preventing incitement to the commission of any cognizable offence relating to the above &lt;/li&gt;
&lt;li&gt;For investigation of any offence &lt;/li&gt;
&lt;/ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ITA Monitoring of Traffic Data Rules:&lt;/b&gt; Monitoring of traffic data and collection of information is allowed for the following purposes related to cyber security: &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Forecasting of imminent cyber incidents &lt;/li&gt;
&lt;li&gt;Monitoring network application with traffic data or information on computer resources &lt;/li&gt;
&lt;li&gt;Identification and determination of viruses or computer contaminant &lt;/li&gt;
&lt;li&gt;Tracking cyber security breaches or cyber security incidents &lt;/li&gt;
&lt;li&gt;Tracking computer resource breaching cyber security or spreading virus’s or computer contaminants &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Identifying or tracking of any person who has breached, or is suspected of having breached or being likely to breach cyber security. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Undertaking forensic of the concerned computer resource as a part of investigation or internal audit of information security practices in the computer resource.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accessing stored information for enforcement of any provisions of the laws relating to cyber security for the time being in force.&lt;/li&gt;
&lt;li&gt;Any other matter relating to cyber security. &lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;b&gt;UASL License&lt;/b&gt;: Assistance must be provided to the government for the following reasons and times: &lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;Reasons defined in the Telegraph Act. &lt;b&gt;(Section 41.20 (xix))&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;National Security. &lt;b&gt;(Section 41.20 (xvii))&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;To counteract espionage, subversive act, sabotage, or any other unlawful activity. (Section 41.1)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Trace nuisance, obnoxious or malicious calls, messages or communications transported through his/her equipment. &lt;b&gt;(Section 40.4)&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;In the interests of security. &lt;b&gt;(Section 41.7)&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;For security reasons. &lt;b&gt;(Section 41.20 (iii))&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li&gt;&lt;b&gt;ISP License: &lt;/b&gt;Assistance must be provided to the government for the following reasons and times:&lt;/li&gt;
&lt;ul&gt;
&lt;li&gt;To counteract espionage, subversive act, sabotage, or any other unlawful activity. &lt;b&gt;(Section 34.1)&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;In the interests of security. &lt;b&gt;(Section 34.4)&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;For security reasons. &lt;b&gt;(Section 34.28 (iii))&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Reasons defined in the Telegraph Act. &lt;b&gt;(Section 35.2)&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt;&lt;b&gt;Principle - Necessity&lt;/b&gt;: &lt;i&gt;Laws allowing access to communications or communications metadata by authorized public authorities should limit such access to that which is strictly and demonstrably necessary, in the sense that an overwhelmingly positive justification exists, and justifiable in a democratic society in order for the authority to pursue its legitimate purposes, and which the authority would otherwise be unable to pursue. The onus of establishing this justification, in judicial as well as in legislative processes, is on the government.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; Relevant Indian legislation do not contain provisions mandating that access to communications must be demonstrably necessary, and do not give details of the criteria that authorizing authorities should use to determine if a request is a valid or not. Relevant Indian legislation does require that all directions contain reasons for the direction. Additionally, excluding the ITA &lt;i&gt;Procedure and safeguard for Monitoring and Collecting Traffic Data or Information Rules&lt;/i&gt;, relevant Indian legislation requires that all other means for acquiring the information must be taken into consideration before a direction for access can be granted.&lt;/p&gt;
&lt;p&gt;Below are summaries of the relevant provisions:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;TA Rules 2007&lt;/b&gt;: Any order for interception issued by the competent authority must contain reasons for the direction &lt;b&gt;(Section 2).&lt;/b&gt; While issuing orders for direction, all other means for acquiring the information must be taken into consideration, and directions can only be issued if it is not possible to acquire the information by any other reasonable means &lt;b&gt;(Section 3).&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ITA Interception and Monitoring Rules: &lt;/b&gt;Any direction issued by the competent authority must contain reasons for such direction &lt;b&gt;(Section 7). &lt;/b&gt;The competent authority must consider the possibility of acquiring the necessary information by other means and the direction can be issued only when it is not possible to acquire the information any other reasonable means &lt;b&gt;(Section 8).&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ITA Traffic Monitoring Rules:&lt;/b&gt; Any direction issued by the competent authority must contain reasons for the direction &lt;b&gt;(Section 3(3)).&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;UASL &amp;amp; ISP License: &lt;/b&gt;As laid out in the Telegraph Act and subsequent Rules.&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;4. &lt;/b&gt;&lt;b&gt;&lt;i&gt;Principle - Adequacy&lt;/i&gt;&lt;/b&gt;&lt;i&gt;:&lt;/i&gt; &lt;i&gt;Public authorities should restrain themselves from adopting or implementing any measure of intrusion allowing access to communications or communications metadata that is not appropriate for fulfillment of the legitimate purpose that justified establishing that measure. &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are provisions that require direction for access to be specific, but there are no provisions that specifically prohibit government agencies from collecting and accessing information that is not appropriate for fulfillment of the stated purpose of the direction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt;&lt;b&gt;Principle - Competent Authority&lt;/b&gt;: &lt;i&gt;Authorities capable of making determinations relating to communications or communications metadata must be competent and must act with independence and have adequate resources in exercising the functions assigned to them.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation it is required that directions for access to be authorized by "competent authorities". The most common authority for authorizing orders for access is the Secretary to the Government of India in the Ministry of Home Affairs, but authorization can also come from other officials depending on the circumstance. The fact that authorization for access to communications content is not from a judge has been a contested topic, as in many countries a judicial order is the minimum requirement for access to communication content.  It is unclear from the legislation if adequate resources are assigned to the competent authorities.&lt;/p&gt;
&lt;p&gt;Below are summaries of relevant provisions:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;The TA Rules 2007&lt;/b&gt;: Under the Telegraph Act the authorizing authorities are:            
&lt;ul&gt;
&lt;li&gt;The Secretary to the Government of India in the Ministry of Home Affairs at the Central Level&lt;/li&gt;
&lt;li&gt;The Secretary to the State Government in charge of the Home Department in the case of the State Government. &lt;/li&gt;
&lt;li&gt;In unavoidable circumstances an order for interception may only be made by an officer not below the rank of a Joint Secretary to the Government of India who has been authorized by the Union Home Secretary or the State Secretary.&lt;/li&gt;
&lt;li&gt;In remote areas or for operational reasons where obtaining prior directions for interception is not feasible the head or the second senior most officer of the authorized security agency at the Central level and the officers authorized in this behalf and not below the rank of Inspector of General Police. &lt;b&gt;(Section 1(2))&lt;/b&gt;. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules: &lt;/b&gt;Under the ITA Rules related to the interception, monitoring, and decryption of communications, the competent authorities for authorizing directions are:            
&lt;ul&gt;
&lt;li&gt;The Secretary in the Ministry of Home Affairs in case of the Central Government.&lt;/li&gt;
&lt;li&gt;The Secretary in charge of the Home Department, in case of a State Government or Union Territory. &lt;/li&gt;
&lt;li&gt;In unavoidable circumstances any officer not below the rank of the Joint Secretary to the Government of India who has been authorized by the competent authority. &lt;/li&gt;
&lt;li&gt;In remote areas or for operational reasons where obtaining prior directions is not feasible, the head or the second senior most officer of the security and law enforcement agency at the Central level or the officer authorized and not below the rank of the inspector General of Police or an officer of equivalent rank at the State or Union territory level. &lt;b&gt;(Section 3)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Monitoring and Collecting Traffic Data Rules:&lt;/b&gt; Under the ITA Rules related to the monitoring and collecting of traffic data, the competent authorities who can issue and authorize directions are:           
&lt;ul&gt;
&lt;li&gt;The Secretary to the Government of Indian in the Department of Information Technology under the Ministry of Communications and Information Technology. &lt;b&gt;(Section 2(d))&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;An employee of an intermediary may complete the following if it is in relation to the services that he is providing including: accessing stored information from computer resource for the purpose of implementing information security practices in the computer resource, determining any security breaches, computer contaminant or computer virus, undertaking forensic of the concerned computer resource as a part of investigation or internal audit. Accessing or analyzing information from a computer resource for the purpose of tracing a computer resource or any person who has contravened or is suspected of having contravened or being likely to contravene any provisions of the Act that is likely to have an adverse impact on the services provided by the intermediary. &lt;b&gt;(Section 9 (2))&lt;/b&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;UASL &amp;amp; ISP License: &lt;/b&gt;As laid out in the Telegraph Act and subsequent Rules.&lt;b&gt; &lt;/b&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt;&lt;b&gt;Principle - Proportionality&lt;/b&gt;:&lt;i&gt; Public authorities should only order the preservation and access to specifically identified, targeted communications or communications metadata on a case-by-case basis, under a specified legal basis. Competent authorities must ensure that all formal requirements are fulfilled and must determine the validity of each specific attempt to access or receive communications or communications metadata, and that each attempt is proportionate in relation to the specific purposes of the case at hand. Communications and communications metadata are inherently sensitive and their acquisition should be regarded as highly intrusive. As such, requests should &lt;b&gt;at a minimum&lt;/b&gt; establish a) that there is a very high degree of probability that a serious crime has been or will be committed; b) and that evidence of such a crime would be found by accessing the communications or communications metadata sought; c) other less invasive investigative techniques have been exhausted; and d) that a plan to ensure that the information collected will be only that information reasonably related to the crime and that any excess information collected will be promptly destroyed or returned. Neither the scope of information types, the number or type of persons whose information is sought, the amount of data sought, the retention of that data held by the authorities, nor the level of secrecy afforded to the request should go beyond what is demonstrably necessary to achieve a specific investigation. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation&lt;/b&gt;: In relevant Indian legislation there are no comprehensive provisions that ensure proportionality of the surveillance of communications but there are provisions that contribute to ensuring proportionality. These include provisions requiring: time frames for how long law enforcement can retain accessed and collected material, directions to be issued only after there are no other means for acquiring the information, requests to contain reasons for the order, the duration for which an order can remain in force to be limited, and requests to be for specified purpose based on a particular set of premises. All of these provisions are found in the Telegraph Rules issued in 2007 and the ITA &lt;i&gt;Procedures and Safeguards for Interception, Monitoring, and Decryption of Information Rules&lt;/i&gt;. None of these requirements are found in the UASL or ISP licenses, and many are missing from the ITA &lt;i&gt;Safeguards for Monitoring and Collecting Traffic Data or Information Rules&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the above are steps to ensuring proportionality, Indian legislation does not provide details of how the proportionality of requests would be measured as recommended by the principle. For example, it is not required that requests for access demonstrate that evidence of the crime would be found by accessing the communications or communications metadata sought, and that information only related directly to the crime will be collected. Furthermore, Indian legislation does not place restrictions on the amount of data sought, nor the level of secrecy afforded to the request.&lt;/p&gt;
&lt;p&gt;Below is a summary of the relevant provisions:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;TA Rules 2007: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Service providers shall destroy record pertaining to directions for interception of message within two months of discontinuing the interception. &lt;b&gt;(Section 19)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Directions for interception should only be issued only when it is not possible to acquire the information by any other reasonable means. &lt;b&gt;(Section 3)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The interception must be of a message or class of message from and too one particular person that is specified or described in the order or one particular set of premises specified or described in the order. &lt;b&gt;(Section 4)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The direction for interception will remain in force for a period of 60 days, or 180 days if the directions are renewed. &lt;b&gt;(Section 6)&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt; ITA Interception and Monitoring Rules:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any direction issued by the competent authority must contain reasons for such direction. &lt;b&gt;(Section 7)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The competent authority must consider all other possibilities of acquiring the information by other means, and the direction can only be issued when it is not possible to acquire the information by any other reasonable means. &lt;b&gt;(Section 8)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The direction of interception, monitoring, or decryption of any information generated, transmitted, received, or stored in any computer resource etc., as may be specified or described in the direction. &lt;b&gt;(Section 9)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The directions for interception, monitoring, or decryption will remain in force for a period of 60 days, or 180 days if the directions are renewed. &lt;b&gt;(Section 10)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Traffic and Monitoring Rules&lt;/b&gt;:            
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any direction issued by the competent authority must contain reasons for such direction. &lt;b&gt;(Section 3(3))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Every record including electronic records pertaining to such directions for monitoring or collection of traffic data shall be destroyed after the expiry of nine months by the designated officer. Except when the information is needed for an ongoing investigation, the person in charge of a computer resource shall destroy records within a period of six months of discontinuing the monitoring. &lt;b&gt;(Section 8)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt;&lt;b&gt;Principle - Due process&lt;/b&gt;:&lt;i&gt; Due process requires that governments must respect and guarantee an individual’s human rights, that any interference with such rights must be authorized in law, and that the lawful procedure that governs how the government can interfere with those rights is properly enumerated and available to the general public.(9) While criminal investigations and other considerations of public security and safety may warrant limited access to information by public authorities, the granting of such access must be subject to guarantees of procedural fairness. Every request for access should be subject to prior authorization by a competent authority, except when there is imminent risk of danger to human life.(10)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In the relevant Indian legislation the only guarantee for due process is that every request for access must be subject to prior authorization by a competent authority.&lt;/p&gt;
&lt;li&gt;&lt;b&gt; TA Rules 2007:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;All orders for interception must be issued by the Secretary to the Government of India in the Ministry of Home Affairs. &lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules&lt;/b&gt;:            
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;All orders for interception must be issued by the Secretary to the Government of India in the Ministry of Home Affairs. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Monitoring of Traffic Rules:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The Secretary to the Government of India in the Department of Information Technology under the Ministry of Communications and Information Technology is the competent authority for authorizing orders.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. &lt;/b&gt;&lt;b&gt;Principle - User notification&lt;/b&gt;:&lt;i&gt; Notwithstanding the notification and transparency requirements that governments should bear, service providers should notify a user that a public authority has requested his or her communications or communications metadata with enough time and information about the request so that a user may challenge the request. In specific cases where the public authority wishes to delay the notification of the affected user or in an emergency situation where sufficient time may not be reasonable, the authority should be obliged to demonstrate that such notification would jeopardize the course of investigation to the competent judicial authority reviewing the request. In such cases, it is the responsibility of the public authority to notify the individual affected and the service provider as soon as the risk is lifted or after the conclusion of the investigation, whichever is sooner.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are no provisions that require the government or service providers to notify the user that a public authority has requested his or her communication data.&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9. &lt;/b&gt;&lt;b&gt;Principle - Transparency about use of government surveillance&lt;/b&gt;: &lt;i&gt;The access capabilities of public authorities and the process for access should be prescribed by law and should be transparent to the public. The government and service providers should provide the maximum possible transparency about the access by public authorities without imperiling ongoing investigations and with enough information so that individuals have sufficient knowledge to fully comprehend the scope and nature of the law, and when relevant, challenge it. Service providers must also publish the procedure they apply to deal with data requests from public authorities.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are no requirements that access capabilities of the government and the process for access must be transparent to the public. Nor are service providers required to publish the procedure applied to handle data requests from public authorities.&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10. &lt;/b&gt;&lt;b&gt;&lt;i&gt;Principle - Oversight&lt;/i&gt;&lt;/b&gt;&lt;i&gt;:&lt;/i&gt; &lt;i&gt;An independent oversight mechanism should be established to ensure transparency of lawful access requests. This mechanism should have the authority to access information about public authorities' actions, including, where appropriate, access to secret or classified information, to assess whether public authorities are making legitimate use of their lawful capabilities, and to publish regular reports and data relevant to lawful access. This is in addition to any oversight already provided through another branch of government such as parliament or a judicial authority. This mechanism must provide – at minimum – aggregate information on the number of requests, the number of requests that were rejected, and a specification of the number of requests per service provider and per type of crime. (11)&lt;/i&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are requirements for a review committee to be established.&lt;i&gt; &lt;/i&gt;The review committee must meet on a bi-monthly basis and review directions to ensure that they are in accordance with the prescribed law. Currently, it is unclear from the legislation if the review committees have the authority to access information about public authorities’ actions, and currently the review committee does not publish aggregate information about the number of requests, the number of requests that were rejected, and a specification of the number of requests per service provider and per type of crime. These standards are recommended by the principle.&lt;/p&gt;
&lt;p&gt;The relevant provisions are summarized below:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;TA Rules 2007&lt;/b&gt;:            
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A review committee will be constituted by a state government that consists of a chief secretary, secretary of law, secretary to the state government. The review committee shall meet at least once in two months. If the committee finds that directions are not in accordance with the mandated provisions, then the committee can order the destruction of the directions. &lt;b&gt;(Section 17)&lt;/b&gt;.&lt;b&gt; &lt;/b&gt;Any order issued by the competent authority must contain reasons for such directions and a copy be forwarded to the concerned review committee within a period of seven working days. &lt;b&gt;(Section 2)&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any direction issued by the competent authority must be forwarded to the review committee within a period of seven working days from issuing. The review committee is the same as constituted under rule 419A of the Indian Telegraph Rules, 1951. The review committee must meet bi-monthly and determine whether directions are in accordance with the ITA Act. If the review committee finds that the directions are not in accordance with the Act, it may issue an order for the destruction of the copies of accessed information and set aside the directions. &lt;b&gt;(Section 22)&lt;/b&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Traffic Monitoring Rules: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any direction issued by the competent authority must be forwarded to the review committee within a period of seven working days from issuing. The review committee is the same as constituted under rule 419A of the Indian Telegraph Rules, 1951. The review committee must meet bi-monthly and determine whether directions are in accordance with the ITA Act. If the review committee finds that the directions are not in accordance with the Act, it may issue an order for the destruction of the copies of accessed information and set aside the directions. &lt;b&gt;(Section 7)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11. &lt;/b&gt;&lt;b&gt;Principles - Integrity of communications and systems&lt;/b&gt;: &lt;i&gt;It is the responsibility of service providers to transmit and store communications and communications metadata securely and to a degree that is minimally necessary for operation. It is essential that new communications technologies incorporate security and privacy in the design phases. In order, in part, to ensure the integrity of the service providers’ systems, and in recognition of the fact that compromising security for government purposes almost always compromises security more generally, governments shall not compel service providers to build surveillance or monitoring capability into their systems. Nor shall governments require that these systems be designed to collect or retain particular information purely for law enforcement or surveillance purposes. Moreover, a priori data retention or collection should never be required of service providers and orders for communications and communications metadata preservation must be decided on a case-by-case basis. Finally, present capabilities should be subject to audit by an independent public oversight body.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In relevant Indian legislation there are a number of security measures that must be put in place but these are predominantly actions that must be taken by service providers, and do not pertain to intelligence agencies. Furthermore, many provisions found in the ITA&lt;i&gt; Procedure and Safeguards for Interception, Monitoring, and Decryption of Information Rules&lt;/i&gt;, and the ISP and UASL licenses include requirements for service providers to provide monitoring facilities and technical assistance, require information to be retained specifically for law enforcement purposes, and require service providers to comply with a-priori data retention mandates. In the ISP and UASL license, service providers are audited and inspected to ensure compliance with requirements listed in the license, but it unclear from the legislation if the access capabilities of government or governmental agencies are audited by an independent public oversight body. This standard is recommended by the principle.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Relevant provisions are summarized below:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;TA Rules 2007&lt;/b&gt;: The service provider must put in place internal checks to ensure that unauthorized interception of messages does not take place. &lt;b&gt;(Section 14)&lt;/b&gt; Service providers are also responsible for actions of their employees. In the case of unauthorized interception or a breach in security, service providers can be held liable for up to three years in prison, fines, and revocation of the service providers licenses depending on the nature and scale of the violation. &lt;b&gt;(Section 20, 20A 21, 23).&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; ITA Interception and Monitoring Rules: &lt;/b&gt;The intermediary or person in charge of the computer resources must put in place adequate and effective internal checks to ensure that unauthorized interception of communications does not take place and extreme secrecy is maintained and utmost care and precaution taken in the matter of interception or monitoring or decryption of information as it affects privacy of citizens and also that it is handled only by the designated officers of the intermediary. &lt;b&gt;(Section 20)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; ITA Traffic Monitoring Rules&lt;/b&gt;: The intermediary or person in charge of the computer resources must put in place adequate and effective internal checks to ensure that unauthorized interception of communications does not take place and extreme secrecy is maintained and utmost care and precaution taken in the matter of interception or monitoring or decryption of information as it affects privacy of citizens and also that it is handled only by the designated officers of the intermediary. &lt;b&gt;(Section 5&amp;amp;6)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;UASL License:&lt;/b&gt; The intermediary or service provider is responsible for ensuring the protection of privacy of communication and to ensure that unauthorized interception of messages does not take place. &lt;b&gt;(Section 39.1, Section 39.2, Section 41.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ISP License:&lt;/b&gt; The ISP has the responsibility of ensuring that unauthorized interception of messages does not take place. &lt;b&gt;(Section 32.1)&lt;/b&gt; The ISP must take all necessary steps to safeguard the privacy and confidentiality of an information about a third party and its business and will do its best endeavor to ensure that no information, except what is necessary is divulged, and no employee of the ISP seeks information other than is necessary for the purpose of providing service to the third party. &lt;b&gt;(Section 32.2&lt;/b&gt;) The ISP must also take necessary steps to ensure that any person acting on its behalf observe confidentiality of customer information. &lt;b&gt;(Section 32.3)&lt;/b&gt;.&lt;/li&gt;
&lt;p&gt;Provisions requiring the provision of facilities, assistance, and retention:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;ITA Interception and Monitoring Rules: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The intermediary must provide all facilities, co-operation for interception, monitoring, and decryption of information mentioned in the direction &lt;b&gt;(Section 13(2))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If a decryption direction or copy is handed to the decryption key holder to whom the decryption direction is addressed by the nodal officer, the decryption key holder must disclose the decryption key or provide the decryption assistance. &lt;b&gt;(Section 17)&lt;/b&gt;. &lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ITA Monitoring of Traffic Rules: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The intermediary must extend all facilities, co-operation and assistance in installation, removal and testing of equipment and also enable online access to the computer resource for monitoring and collecting traffic data or information. &lt;b&gt;(Section 4(7))&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;UASL License: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The service provider cannot employ bulk encryption equipment in its network, and any encryption equipment connected to the licensee’s network for specific requirements must have prior evaluation an approval of the licensor. &lt;b&gt;(Section 39.1)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must provide all tracing facilities to trace nuisance, obnoxious or malicious calls, messages or communications transported through the equipment and network to authorized officers of the government for purposes of national security.&lt;b&gt;(Section 40.4)&lt;/b&gt;.&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suitable monitoring equipment as may be prescribed for each type of system used will be provided by the service provider for monitoring as and when required by the licensor. &lt;b&gt;(Section 41.7)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The designated person of the Central/State Government as conveyed to the Licensor from time to time in addition to the licensor or its nominee shall have the right to monitor the telecommunication traffic in every MSC/Exchange/MGC/MG. The service provider must make arrangements for the monitoring of simultaneous calls by Government security agencies. In case the security agencies intend to locate the equipment at the service provider’s premises for facilitating monitoring, the service provider should extend all support in this regard including space and entry of the authorized security personnel. The interface requirements as well as features and facilities as defined by the licensor should be implemented by the service provider for both data and speech. Presently, the service provider should ensure suitable redundancy in the complete chain of monitoring equipment for trouble free operations of monitoring of at least 210 simultaneous calls for seven security agencies. &lt;b&gt;(Section 41.10)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must also make the following records available: called/calling party mobile/PSTN numbers, Time/date and duration of interception, location of target subscribers, telephone numbers if any call-forwarding feature has been invoked by the target subscriber, data records for even failed attempts, and call data record of roaming subscribers. &lt;b&gt;(Section 41.10)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider shall provide the facility to carry out surveillance of Mobile Terminal activity within a specified area. &lt;b&gt;(Section 41.11)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The complete list of subscribers must be made available by the service provider on their website to authorized intelligence agencies. This list must be updated on a regular basis. Hard copies of the list must also be made available to security agencies when requested. &lt;b&gt;(Section 41.14)&lt;/b&gt;. The database of subscribers must also be made available to the licensor or its representatives. &lt;b&gt;(Section 41.16)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must maintain all commercial records with regard to the communications exchanged on the network. All records must be archived for at least one year. &lt;b&gt;(Section 41.17)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Calling Line Identification must be provided and the network should also support Malicious Call Identification.&lt;b&gt; (Section 41.18)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Information about bulk connections must be forwarded to the VTM Cell of DoT, DDG (Security) DoT, and any other officer authorized by the Licensor from time to time as well as Security Agencies on a monthly basis &lt;b&gt;(Section 41.19)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Subscribers having CLIR should be listed in a password protected website with their complete address and details so that authorized Government agencies can view or download for detection and investigation of misuse. &lt;b&gt;(Section 41.19(iv))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must provide traceable identities of their subscribers. If the subscriber is roaming from another foreign company, the Indian Company must try to obtain traceable identities from the foreign company as part of its roaming agreement. &lt;b&gt;(41.20 (ix))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;On request by the licensor or any other agency authorized by the licensor, the licensee must be able to provide the geographical location (BTS location) of any subscriber at any point of time. &lt;b&gt;(41.20 (x))&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suitable technical devices should be made available at the Indian end to designated security agency/licensor in which a mirror image of the remote access information is available on line for monitoring purposes. &lt;b&gt;(41.20 (xiv))&lt;/b&gt;. &lt;/li&gt;
&lt;li&gt;A complete audit trail of the remote access activities pertaining to the network operated in India should be maintained for a period of six months and provided on request to the licensor. &lt;b&gt;(Section 41.20 (xv))&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;For monitoring traffic, the service provider should provide access of their network and other facilities as well as to books of accounts to the security agencies. &lt;b&gt;(Section 41.20 (xx))&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ISP License:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The ISP must ensure that Bulk Encryption is not deployed by ISPs. Individuals/groups /organizations can use encryption up to 40 bit key length without obtaining permission from the licensor. If encryption equipments higher than this limit are deployed, individuals/groups/organizations must obtain prior written permission from the licensor and deposit the decryption key. &lt;b&gt;(Section 2.2(vii))&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP must furnish to the licensor/TRAI on demand documents, accounts, estimates, returns, reports, or other information. &lt;b&gt;(Section 9.1)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP will provide tracing facilities to trace nuisance, obnoxious or malicious calls, messages or communications transported through his equipment and network when such information is necessary for investigations or detection of crimes and in the interest of national security. &lt;b&gt;(Section 33.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP will provide the necessary facilities for continuous monitoring of the system, as required by the licensor or its authorized representatives. &lt;b&gt;(Section 30.1)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP shall provide necessary facilities depending upon the specific situation at the relevant time to the Government to counteract espionage, subversive acts, sabotage or any other unlawful activity. &lt;b&gt;(Section 34.1)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;In the interests of security, suitable monitoring equipment as may be prescribed for each type of system used, which will be provided by the licensee. &lt;b&gt;(Section 34.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The designated person of the Central/State Government or its nominee will have the right to monitor the telecommunication traffic. The ISP will make arrangements for monitoring simultaneous calls by Government security agencies. &lt;b&gt;(Section 34.6)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP must install infrastructure in the service area with respect to: Internet telephony services offered by the ISP for processing, routing, directing, managing, authenticating the internet telephony calls including the generation of Call Details Record (CDR), called IP address, called numbers, date , duration, time and charges of internet telephony calls. &lt;b&gt;(Section 34.7)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;ISPs must maintain a log of all users connected and the service that they are using (mail, telnet, http etc.). The ISPs must log every outward login or telnet through their computers. These logs as well as copies of all the packets originating from the Customer Premises Equipment of the ISP must be made available in real time to the Telecom Authority. &lt;b&gt;(Section 34.8)&lt;/b&gt;.&lt;b&gt; &lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP should provide the facility to carry out surveillance of Mobile Terminal activity within a specified area. &lt;b&gt;(Section 34.9)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The complete list of subscribers must be made available by the ISP on their website so that intelligence agencies can obtain the subscriber list at any time. &lt;b&gt;(Section 34.12)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The list of Internet leased line customers and sub-costumers must be placed on a password protected website with the following information: Name of customer, IP address allotted, bandwidth provided, address of installation, date of installation, contact person with phone number and email. This information should be accessible to authorized Government agencies.&lt;b&gt; (Section 34.13)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Monitoring of high UDP traffic value and to check for cases where upstream UDP traffic is similar to downstream UDP traffic and monitor such customer monthly with physical verification and personal identity. &lt;b&gt;(Section 34.15)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The licensor will have access to the database relating to the subscribers of the ISP. The ISP must make available at any instant the details of the subscribers using the service. &lt;b&gt;(Section 34.22)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP must maintain all commercial records with regard to the communications exchanged on the network for at least one year and will be destroyed unless directed otherwise. &lt;b&gt;(Section 34.23)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Every international gateway with a route/switch having a capacity of 2Mbps must be equipped with a monitoring Centre at the cost of the ISP. The cost of meeting the requirements of the security agencies, the cost of maintenance of the monitoring equipment and infrastructure must be borne by the ISP. &lt;b&gt;(Section 34.27 (a(i))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Office space of 10 by 10 feet with adequate power supply and air-conditioning must be provided by the ISP free of cost. &lt;b&gt;(Section 34.27 (a(ii))&lt;/b&gt; One local exclusive telephone must be made available by the ISP at the monitoring centre at the cost of the ISP. &lt;b&gt;(Section 34.27 (a(iii))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Each route/switch of the ISP should be connected by the LAN operating at the same speed as the router/switch; the monitoring equipment will be connected to this network. &lt;b&gt;(Section 34.27 (a(v))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP must provide traceable identity of their subscribers. In the case of roaming subscribers the ISP must try to obtain the traceable identity of roaming subscribers from the foreign company. &lt;b&gt;(Section 34.27 (ix))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;On request of the licensor or any other authorized agency, the ISP must be able to provide the geographical location of any subscriber (BTS location of wireless subscriber) at a given point of time. &lt;b&gt;(Section 34.27 (x))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suitable technical devices should be made available to designated security agencies in which a mirror image of the remote access information is available on line for monitoring purposes. &lt;b&gt;(Section 34.27 (xiv))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;A complete audit trail of the remote access activities pertaining to the network operated in India should be maintained for a period of six months and provided on request. &lt;b&gt;(Section 34.27 (xv))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;ISPs must provide access of their network and other facilities, as well as books to security agencies. &lt;b&gt;(Section 34.27 (xx))&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12. &lt;/b&gt;&lt;b&gt;Principle - Safeguards for international cooperation&lt;/b&gt;:&lt;i&gt; In response to changes in the flows of information and the technologies and services that are now used to communicate, governments may have to work across borders to fight crime. Mutual legal assistance treaties (MLATs) should ensure that, where the laws of more than one state could apply to communications and communications metadata, the higher/highest of the available standards should be applied to the data. Mutual legal assistance processes and how they are used should also be clearly documented and open to the public. The processes should distinguish between when law enforcement agencies can collaborate for purposes of intelligence as opposed to sharing actual evidence. Moreover, governments cannot use international cooperation as a means to surveil people in ways that would be unlawful under their own laws. States must verify that the data collected or supplied, and the mode of analysis under MLAT, is in fact limited to what is permitted. In the absence of an MLAT, service providers should not respond to requests of the government of a particular country requesting information of users if the requests do not include the same safeguards as providers would require from domestic authorities, and the safeguards do not match these principles. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; India currently has signed 32 MLAT treaties with other countries, each with its own provisions and conditions relating to access to information. The provisions of the Information Technology Act 2000 apply to any contravention of the Act that is committed outside of India, thus the Rules related to interception, monitoring, decryption etc. would apply to any contravention of the Act outside of India. The provisions of the Indian Telegraph Act only apply to communications within India, but the licenses do specify when information held by service providers cannot be transferred across borders.&lt;/p&gt;
&lt;p&gt;Below is a summary of the relevant provisions:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ITA 2000&lt;/b&gt;: The Act will extend to the whole of India, and applies to any offence or contravention committed outside India by any person. &lt;b&gt;(Section 1(2))&lt;/b&gt; &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;UASL License:&lt;/b&gt; The service provider cannot transfer any accounting information relating to the subscriber or user information to any person or place outside of India (this does not restrict a statutorily required disclosure of financial nature. &lt;b&gt;(section (41.20 (viii))&lt;/b&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;ISP License:&lt;/b&gt; For security reasons, domestic traffic of such entities as identified by the licensor will not be hauled or route to any place outside of India. &lt;b&gt;(Section 34.28 (iii)) &lt;/b&gt;ISPs shall also not transfer accounting information relating to the subscriber or user information to any person or place outside of India (this does not restrict a statutorily required disclosure of financial nature) &lt;b&gt;(Section 34.28 (viii))&lt;/b&gt;&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13. &lt;/b&gt;&lt;b&gt;&lt;i&gt;Principle - Safeguards against illegitimate access&lt;/i&gt;&lt;/b&gt;&lt;i&gt;: To protect individuals against unwarranted attempts to access communications and communications metadata, governments should ensure that those authorities and organizations who initiate, or are complicit in, unnecessary, disproportionate or extra-legal interception or access are subject to sufficient and significant dissuasive penalties, including protection and rewards for whistleblowers, and that individuals affected by such activities are able to access avenues for redress. Any information obtained in a manner that is inconsistent with these principles is inadmissible as evidence in any proceeding, as is any evidence derivative of such information. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; Though relevant Indian legislation does provide penalty for unauthorized interception or access, the penalty applies only to service providers, and does not hold governmental agencies responsible. Currently there are no avenues of redress for the individual, and there are no protections or rewards for whistleblowers. Both of these safeguards are recommended by the principle.&lt;/p&gt;
&lt;p&gt;The relevant provisions are summarized below:&lt;/p&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;TA Rules 2007:&lt;/b&gt; The Telegraph Act: The service provider must put in place internal checks to ensure that unauthorized interception of messages does not take place. &lt;b&gt;(Section 14)&lt;/b&gt; Service providers are also responsible for actions of their employees. In the case of unauthorized interception or a breach in security on the part of the service provider, service providers can be held liable with penalty of imprisonment from 1 to 3 years and or a fine of rs.500 – 1000 depending on the exact violation&lt;b&gt;. (Section 20, 20A, 23, and  24 Indian Telegraph Act)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; ITA Interception and Monitoring Rules:&lt;/b&gt; The intermediary must be responsible for the actions of their employees and in the case of violation pertaining to the maintenance of secrecy and confidentiality of intercepted material or unauthorized interception, monitoring, or decrypting of information – the intermediary will be held liable under the relevant provisions of the laws in force. &lt;b&gt;(Section 21)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt; ITA Traffic Monitoring Rules:&lt;/b&gt; The intermediary must be responsible for the actions of their employees and in the case of violation pertaining to the maintenance of secrecy and confidentiality of intercepted material or unauthorized interception, monitoring, or decrypting of information – the intermediary will be held liable under the relevant provisions of the laws in force. &lt;b&gt;(Section 6)&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;UASL License: &lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In order to maintain privacy of voice and data, monitoring must be done in accordance with the 2007 Rules established under the Indian Telegraph Act, 1885. &lt;b&gt;(Section 41.20 (xix))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Any damage arising from the failure of the service provider to provider tracing assistance to the government for purposes of national security is payable by the service provider. &lt;b&gt;(Section 40.4)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ISP License:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In order to maintain the privacy of voice and data, monitoring can only be carried out after authorization by the Union Home Secretary or Home Secretaries of the State/Union Territories. &lt;b&gt;(Section 34.28 (xix))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The ISP indemnifies the licensor against all actions brought against the licensor for breach of privacy or unauthorized interruption of data transmitted by the subscribers. &lt;b&gt;(Section 8.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Any damages that occur from non-compliance on the part of the ISP must be paid by the ISP. &lt;b&gt;(Section 33.4)&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;14. &lt;/b&gt;&lt;b&gt;&lt;i&gt;Principle - Cost of surveillance&lt;/i&gt;&lt;/b&gt;&lt;b&gt;&lt;i&gt;:&lt;/i&gt;&lt;/b&gt;&lt;i&gt; The financial cost of providing access to user data should be borne by the public authority undertaking the investigation. Financial constraints place an institutional check on the overuse of orders, but the payments should not exceed the service provider’s actual costs for reviewing and responding to orders, as such would provide a perverse financial incentive in opposition to user’s rights.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Legislation:&lt;/b&gt; In India, the ISP and the UASL licenses specifically state that the cost of providing facilities must be borne by the service provider. Though the ITA Interception and Monitoring Rules do require intermediaries to provide facilities, it is not clear from the Rules where the burden of the cost will fall. Currently, there are no requirements that the cost of access to user data should be borne by the public authority undertaking the investigation. This standard is recommended by the principle.&lt;/p&gt;
&lt;p&gt;Below are summaries of relevant provisions:&lt;/p&gt;
&lt;li&gt;&lt;b&gt;UASL License&lt;/b&gt;:           
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; Any damage arising from the failure of the service provider to provider tracing assistance to the government for purposes of national security is payable by the service provider. &lt;b&gt;(Section 40.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Suitable monitoring equipment as may be prescribed for each type of system used will be provided by the service provider for monitoring as and when required by the licensor. &lt;b&gt;(Section 41.7)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The hardware and software required for the monitoring of calls must be engineered, provided/installed, and maintained by the service provider at the service providers cost. However the respective Government instrumentality must bear the cost of the user end hardware and leased line circuits from the MSC/Exchange/MGC/MG to the monitoring centers to be located as per their choice in their premises. &lt;b&gt;(Section 41.10)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The service provider must ensure that the necessary provision (hardware/software) is available in their equipment for doing the Lawful Interception and monitoring from a centralized location. &lt;b&gt;(Section 41.20 (xvi))&lt;/b&gt;.&lt;/li&gt;
&lt;li&gt;&lt;b&gt;ISP License:&lt;/b&gt; 
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Any damages that occur from non-compliance on the part of the ISP must be paid by the ISP. &lt;b&gt;(Section 33.4)&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The hardware at the ISP end and the software required for monitoring of calls must be engineered, provided/installed, and maintained by the ISP. &lt;b&gt;(Section 34.7)&lt;/b&gt;. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Every international gateway with a route/switch having a capacity of 2Mbps must be equipped with a monitoring Centre at the cost of the ISP. The cost of meeting the requirements of the security agencies, the cost of maintenance of the monitoring equipment and infrastructure must be borne by the ISP. &lt;b&gt;(Section 34.27 (a(i))&lt;/b&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Office space of 10 by 10 feet with adequate power supply and air-conditioning must be provided by the ISP free of cost. &lt;b&gt;(Section 34.27 (a(ii))&lt;/b&gt; One local exclusive telephone must be made available by the ISP at the monitoring centre at the cost of the ISP. &lt;b&gt;(Section 34.27 (a(iii))&lt;/b&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications'&gt;https://cis-india.org/internet-governance/blog/comparison-of-indian-legislation-and-draft-principles-on-surveillance-of-communications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:40:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/about/newsletters/january-2013-bulletin">
    <title>January 2013 Bulletin </title>
    <link>https://cis-india.org/about/newsletters/january-2013-bulletin</link>
    <description>
        &lt;b&gt;We at the Centre for Internet &amp; Society (CIS) wish you all a great year ahead and welcome you to the first issue of our newsletter for the year 2013. This issue brings you an overview of our research programs, events organised and participated, news and media coverage, and videos of recent events.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Jobs&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;CIS is seeking applications for the posts of &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2675&amp;amp;qid=263491" target="_blank"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge — Indic Language Initiatives), &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2676&amp;amp;qid=263491" target="_blank"&gt;Developer&lt;/a&gt; (NVDA Project), &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2677&amp;amp;qid=263491" target="_blank"&gt;Programme Officer&lt;/a&gt; (Access to Knowledge and Openness), and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2678&amp;amp;qid=263491" target="_blank"&gt;Programme Officer&lt;/a&gt; (Internet Governance). To apply send your resume to &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; and &lt;a href="mailto:pranesh@cis-india.org"&gt;pranesh@cis-india.org&lt;/a&gt;.  For our Privacy project, we are seeking applications for the post of  Researcher, Technology/Security Expert, Graphic Designer as well as for  internships. To apply for these posts, please send in your resume to Elonnai Hickok (&lt;a href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;).&lt;/p&gt;
&lt;h2&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2679&amp;amp;qid=263491" target="_blank"&gt;Accessibility&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align:justify; "&gt;CIS is carrying out two projects in partnership with the &lt;b&gt;Hans Foundation&lt;/b&gt;. The first one is to create a national resource kit of state-wise laws, policies and programmes on issues relating to persons with disabilities in India and the second  one is for developing a screen reader and text to speech synthesizer  for Indian languages. We are also working with the World Blind Union to  develop the Treaty for Improved Access for Blind, Visually Impaired and  other Reading Disabled Persons, and assisting in the negotiations at WIPO:&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;National Resource Kit for Persons with Disabilities&lt;/h3&gt;
&lt;p style="text-align:justify; "&gt;Anandhi Viswanathan from CIS and Manojna Yeluri from the Centre for Law and Policy Research are working in this project. Shruti Ramakrishnan has left the project. Draft chapters have been published. Feedback and comments are invited from readers for the chapter on Haryana:&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/accessibility/blog/national-resource-haryana-chapter-call-for-comments" class="external-link"&gt;The Haryana Chapter&lt;/a&gt; (by Anandi Viswanathan,  January 31, 2012): The state implements the provisions under the  central laws, particularly the Persons with Disabilities (Equal  Opportunities, Protection of Rights and Full Participation) Act 1995 and  the National Trust for Welfare of Persons with Autism, Cerebral Palsy,  Mental Retardation and Multiple Disabilities Act 1999.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Submission / Notification&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2681&amp;amp;qid=263491" target="_blank"&gt;Making Public Libraries Accessible to People with Disabilities&lt;/a&gt; (by Rahul Cherian, January 23, 2013): CIS was one of the 20 disability rights groups that wrote to the Ministry of Culture.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2682&amp;amp;qid=263491" target="_blank"&gt;Government of Madhya Pradesh initiates ICT Accessibility in Public Communication&lt;/a&gt; (by Nirmita Narasimhan, January 31, 2013): CIS with Daisy Forum of India member Arushi in Bhopal submitted a request for a notification mandating that all communication by the Government of Madhya Pradesh should be accessible to persons with disabilities.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Report&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2683&amp;amp;qid=263491" target="_blank"&gt;Accessible Broadcasting in India&lt;/a&gt; (by Srividya Vaidyanathan, January 11, 2013): The abridged version of ITU’s report "Making Television Accessible" which was initially put up for comments last year has been updated once again.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Blog Entry&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2684&amp;amp;qid=263491" target="_blank"&gt;Linking Commercial Availability and Exceptions in the Treaty for Visually Impaired/Persons with Disabilities&lt;/a&gt; (by Rahul Cherian, January 23, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2685&amp;amp;qid=263491" target="_blank"&gt;Access to Knowledge&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align:justify; "&gt;In partnership with the &lt;b&gt;International Development Research Centre&lt;/b&gt; we are doing a project on Pervasive Technologies examining the  relationship between production of pervasive technologies and  intellectual property. The &lt;b&gt;Wikimedia Foundation&lt;/b&gt;’s  India Program to support and develop free knowledge in India is now  being executed by us. We are also supporting the Iraq government in  developing an eGovernment Interoperability Framework:&lt;/p&gt;
&lt;h3&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2686&amp;amp;qid=263491" target="_blank"&gt;Wikipedia&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align:justify; "&gt;Beginning from September 1, 2012, Wikimedia Foundation has &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2686&amp;amp;qid=263491" target="_blank"&gt;awarded&lt;/a&gt; CIS a two-year grant of INR 26,000,000 to support and develop free knowledge in India. The &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2687&amp;amp;qid=263491" target="_blank" title="Access To&amp;lt;br &amp;gt;&amp;lt;/a&amp;gt;&amp;lt;br /&amp;gt;   &amp;lt;br /&amp;gt;               Knowledge/Team"&gt;A2K team&lt;/a&gt; consists of four members based in Delhi: &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2688&amp;amp;qid=263491" target="_blank"&gt;T. Vishnu Vardhan&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2689&amp;amp;qid=263491" target="_blank"&gt;Nitika Tandon&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2689&amp;amp;qid=263491" target="_blank"&gt;Subhashish Panigrahi&lt;/a&gt; and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2689&amp;amp;qid=263491" target="_blank"&gt;Noopur Raval&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;New Project Director&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2688&amp;amp;qid=263491" target="_blank"&gt;T. Vishnu Vardhan&lt;/a&gt; is the new Programme Director-Access to Knowledge at CIS.  Vishnu has over the last 11 years  worked in various capacities as researcher, grant manager, teacher,  project consultant, information architect and translator. Vishnu managed  the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2690&amp;amp;qid=263491" target="_blank"&gt;Art, Crafts and Culture&lt;/a&gt; portfolio of &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2691&amp;amp;qid=263491" target="_blank"&gt;Sir Ratan Tata Trust&lt;/a&gt; and also worked as Research Coordinator at the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2692&amp;amp;qid=263491" target="_blank"&gt;Centre for the Study of Culture and Society&lt;/a&gt;.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;New Distinguished Fellow at CIS&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2693&amp;amp;qid=263491" target="_blank"&gt;Tejaswini Niranjana&lt;/a&gt;, a Senior Fellow at the Centre for the Study of Culture and Society (CSCS), Bangalore, and Visiting Professor at the Tata Institute of Social Sciences (TISS), Mumbai is joining our team as an Adviser to the 'Access to Knowledge' project. She will guide the A2K team in expanding the Indian language Wikipedias and in increasing the number of active editors through strategic partnerships with Higher Education institutions across India.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Reports&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2694&amp;amp;qid=263491" target="_blank"&gt;Access to Knowledge Report — September to December 2012&lt;/a&gt; (by Noopur Raval,  January 31, 2013): The report covers an overview of the activities done  by the Access to Knowledge team under the grant provided by the Wikimedia Foundation from September 2012 to December 2012.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2695&amp;amp;qid=263491" target="_blank"&gt;Indic Language Wikipedias — Statistical Report — 2012&lt;/a&gt; (by Shiju Alex, January 21, 2013): A statistical update of the Indic language Wikipedias for the year 2012 providing perspectives on the health of various Indic language communities as well as the state of various Indic language wikipedias.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Wiki Event Reports&lt;br /&gt; &lt;/b&gt;CIS organised a series of Wiki workshops in Goa in the month of December 2012, we bring you the reports from those events.&lt;/p&gt;
&lt;p style="text-align:justify; "&gt;&lt;i&gt;Note: The workshops were held in the month of December 2012 but the reports were published only in the month of January.&lt;/i&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2696&amp;amp;qid=263491" target="_blank"&gt;Two-day Wiki Workshop in Goa University: An Introduction&lt;/a&gt; (by Nitika Tandon, January 15, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2697&amp;amp;qid=263491" target="_blank"&gt;Wikipedia in St. Xavier's College, Mapusa, Goa&lt;/a&gt; (by Nitika Tandon, January 19, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2698&amp;amp;qid=263491" target="_blank"&gt;Bringing Konkani Encyclopedia in Public Domain&lt;/a&gt; (by Nitika Tandon, January 22, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2699&amp;amp;qid=263491" target="_blank"&gt;Promoting GLAM in Goa&lt;/a&gt; (by Nitika Tandon, January 24, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2700&amp;amp;qid=263491" target="_blank"&gt;Konkani in Wikipedia Incubator — Taking it to the Next Level&lt;/a&gt; (by Nitika Tandon, January 25, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;CIS also organised a Wiki workshop in Ghaziabad:&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2701&amp;amp;qid=263491" target="_blank"&gt;A Wiki Workshop at Raj Kumar Goel Institute of Technology, Ghaziabad&lt;/a&gt; (RKGIT, Ghaziabad, January 17, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Wiki Event Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2702&amp;amp;qid=263491" target="_blank"&gt;Celebrating the success of Wikipedia in Wikipedia Summit Pune 2013&lt;/a&gt; (organized by Wikipedia Club, Pune, January 12 – 13, 2013). Subhashish Panigrahi participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Wikipedia News Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2703&amp;amp;qid=263491" target="_blank"&gt;First Odia Wikipedia Education Program concludes at IIMC, Dhenkanal&lt;/a&gt; (Odisha Diary Bureau, Dhenkanal, January 27, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2704&amp;amp;qid=263491" target="_blank"&gt;Odia Wikipedia's 9th Anniversary and Workshop on Application of Odia in Media&lt;/a&gt; (Sambad, January 30, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Wiki Events Organised&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2705&amp;amp;qid=263491" target="_blank"&gt;Odia Education Program&lt;/a&gt; (Indian Institute of Mass Communication, Dhenkanal, Orissa, January 26, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2706&amp;amp;qid=263491" target="_blank"&gt;Odia Wikipedia 9th Anniversary Celebration&lt;/a&gt; (Academy of Media Learning, Samantha Vihar, Bhubaneswar, Orissa, January 29, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Pervasive Technologies&lt;/h3&gt;
&lt;p style="text-align:justify; "&gt;The Pervasive Technologies project carries out research on the  intellectual property implicated in the hardware, software and content  available in low-cost mobile devices.The long-term outcome of this  project is to create a legitimate, legal space for these technologies to  exist on the Indian market.&lt;/p&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Events Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2707&amp;amp;qid=263491" target="_blank"&gt;Pervasive Technologies: Access to Knowledge in the Market Place — A Presentation by Sunil Abraham&lt;/a&gt; (FGV Law School, Rio de Janeiro, December 15, 2012).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2708&amp;amp;qid=263491" target="_blank"&gt;Fifth International IPR Conference&lt;/a&gt; (GIPC 2013) (organised by ITAG Business Solutions, Hotel Lalit Ashok, Bangalore, January 30, 2013): Snehashish Ghosh made a presentation on the Pervasive Technologies Project.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Other &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2709&amp;amp;qid=263491" target="_blank"&gt;Openness&lt;/a&gt; Updates&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Blog Posts / Columns&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;i&gt; &lt;/i&gt;
&lt;li&gt;&lt;i&gt; &lt;/i&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2710&amp;amp;qid=263491" target="_blank"&gt;The Violence of Knowledge Cartels&lt;/a&gt; (by Nishant Shah, Hybrid Publishing Lab, January 17, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2711&amp;amp;qid=263491" target="_blank"&gt;Remembering Aaron Swartz, Taking Up the Fight&lt;/a&gt; (by Nishant Shah, DML Central, January 24, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Interview &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2712&amp;amp;qid=263491" target="_blank"&gt;Aaron Swartz: The First Martyr of the Free Information Movement&lt;/a&gt;: Prabir Purkayastha interviewed Lawrence Liang on Newsclick, January 19, 2013. The video is published.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2713&amp;amp;qid=263491" target="_blank"&gt;Bangalore hackers write code as tribute to Aaron Swartz&lt;/a&gt; (by Deepa Kurup, Hindu, January 21, 2013. Sunil Abraham is quoted.&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;h3 style="text-align: justify; "&gt;HasGeek&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;HasGeek creates discussion spaces for geeks and has organised conferences like the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2714&amp;amp;qid=263491" target="_blank"&gt;Fifth Elephant&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2715&amp;amp;qid=263491" target="_blank"&gt;Droidcon India 2011&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2716&amp;amp;qid=263491" target="_blank"&gt;Android Camp&lt;/a&gt;, etc. HasGeek is supported by CIS and works out from CIS office in Bengaluru.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align:justify; "&gt;Event Organized&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2717&amp;amp;qid=263491" target="_blank"&gt;Aaron Swartz Memorial Hacknight&lt;/a&gt; (CIS, Bangalore, January 19 – 20, 2013): Aaron’s collaborators such as &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2718&amp;amp;qid=263491" target="_blank"&gt;Anand Chitipothu&lt;/a&gt; and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2719&amp;amp;qid=263491" target="_blank"&gt;A S L Devi&lt;/a&gt; participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2720&amp;amp;qid=263491" target="_blank"&gt;Internet Governance&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align:justify; "&gt;With &lt;b&gt;Privacy International&lt;/b&gt;,  London we signed an agreement to facilitate the implementation of  activities related to surveillance and freedom of speech and expression.  In this month we have blog posts on data retention, international  principles of surveillance and human rights and comparitive analysis of Indian legislation vis-à-vis draft of the International Principles on Surveillance of Communications by Ellonai Hickok, and columns by Sunil Abraham and Nishant Shah:&lt;/p&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Privacy Research&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2721&amp;amp;qid=263491" target="_blank"&gt;Data Retention in India&lt;/a&gt; (by Elonnai Hickok,  January 30, 2013): The post provides an insight into the data retention  mandates from the Government of India and data retention practices by  service providers.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2722&amp;amp;qid=263491" target="_blank"&gt;Draft International Principles on Communications Surveillance and Human Rights&lt;/a&gt; (by Elonnai Hickok,  January 16, 2013): These principles were developed by Privacy  International and the Electronic Frontier Foundation and seek to define  an international standard for the surveillance of communications.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2723&amp;amp;qid=263491" target="_blank"&gt;A Comparison of Indian Legislation to Draft International Principles on Surveillance of Communications&lt;/a&gt; (by Elonnai Hickok,  January 31, 2013): The principles, first drafted in October 2012 and  developed subsequently seek to establish an international standard for  surveillance of communications in the context of human rights. CIS is  contributing feedback to the drafting of the principles.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Columns/Op-eds&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2724&amp;amp;qid=263491" target="_blank"&gt;Web of Sameness&lt;/a&gt; (by Nishant Shah, Indian Express, January 18, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2725&amp;amp;qid=263491" target="_blank"&gt;TV versus Social Media: The Rights and Wrongs&lt;/a&gt; (by Sunil Abraham, The Tribune, January 20, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Statement&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2726&amp;amp;qid=263491" target="_blank"&gt;Statement of Solidarity on Freedom of Expression and Safety of Internet Users in Bangladesh&lt;/a&gt; (by Pranesh Prakash, January 15, 2013): This is a statement on the violent attack on blogger Asif Mohiuddin by the participants to the Third South Asian Meeting on the Internet and Freedom of Expression.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Blog Entries&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2727&amp;amp;qid=263491" target="_blank"&gt;No Civil Society Members in the Cyber Regulations Advisory Committee&lt;/a&gt; (by Pranesh Prakash, January 10, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2728&amp;amp;qid=263491" target="_blank"&gt;Five Frequently Asked Questions about the Amended ITRs&lt;/a&gt; (by Chinmayi Arun,  January 28, 2013): The author discusses the five major questions that  have been the subject of debate after the World Conference on  International Telecommunications 2012 (WCIT).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2729&amp;amp;qid=263491" target="_blank"&gt;DML Conference 2013&lt;/a&gt; (co-organised by CIS and Digital Media &amp;amp; Learning Research Hub Central, Sheraton  Chicago Hotel &amp;amp; Towers - Chicago, Illinois, March 14 – 16, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Event Organized&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2730&amp;amp;qid=263491" target="_blank"&gt;An Introduction to Bitfilm and Bitcoin – A Discussion by Aaron Koenig&lt;/a&gt; (CIS, Bangalore, January 23, 2013): Aaron Koenig, Managing Director, Bitfilm Networks of Hamburg, Germany gave a talk.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Events Participated&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2731&amp;amp;qid=263491" target="_blank"&gt;Panel Discussion on E-Commerce at NLSIU&lt;/a&gt; (organised by National Law School of India University, Bangalore, January 7, 2013). Pranesh Prakash was a panelist.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2732&amp;amp;qid=263491" target="_blank"&gt;Mobile Broadband: Leveraging for Business Transformation&lt;/a&gt; (Chancery Pavilion, Bangalore, January 9, 2013): Sunil Abraham was a panelist in this event.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2733&amp;amp;qid=263491" target="_blank"&gt;Third South Asian Meeting on the Internet and Freedom of Expression&lt;/a&gt; (organized by Internet Democracy Project, Voices for Interactive Choice  &amp;amp; Empowerment and Global Partners &amp;amp; Associates, Dhaka, January  14 – 15, 2013): Pranesh Prakash moderated the session on "Understanding cyber security and surveillance in South Asia”.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2734&amp;amp;qid=263491" target="_blank"&gt;Is Freedom of Expression under Threat in the Digital Age?&lt;/a&gt; (organized by Editors Guild of India, Index on Censorship and Sage,  India International Centre, New Delhi, January 15, 2013): Sunil Abraham  was a panelist at this event.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2735&amp;amp;qid=263491" target="_blank"&gt;7th India Digital Summit 2013&lt;/a&gt; (organised by Internet and Mobile Association of India, Lalit Hotel, New Delhi, January 16 – 17, 2013): Sunil Abraham was the  moderator for Plenary Session 3: Discussion on Social Media – Freedom,  Moderation or Regulation.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Upcoming Event&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2736&amp;amp;qid=263491" target="_blank"&gt;9th International Asian Conference&lt;/a&gt; (organised by ITechLaw, February 14 – 15, 2013): Sunil Abraham will be participating as a panelist in the session on “Censorship of Online Content”.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Media Coverage&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2737&amp;amp;qid=263491" target="_blank"&gt;2012 in Review: Biometric ID Systems Grew Internationally...and So Did Concerns about Privacy&lt;/a&gt; (by Rebecca Bowe, Right Side News, January 1, 2013)&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2738&amp;amp;qid=263491" target="_blank"&gt;Cool Jobs | Parmesh Shahani, Head, Godrej India Culture Lab&lt;/a&gt; (LiveMint, January 4, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2739&amp;amp;qid=263491" target="_blank"&gt;Clash of the cyberworlds&lt;/a&gt; (by Latha Jishnu, Dinsa Sachan and Moyna, Down to Earth, January 15, 2013 issue). Pranesh Prakash is quoted.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2740&amp;amp;qid=263491" target="_blank"&gt;Is freedom of expression under threat in digital age?&lt;/a&gt; (originally published by&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2741&amp;amp;qid=263491" target="_blank"&gt; Indo Asian News Service&lt;/a&gt;, January 16, 2013 and also covered in the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2742&amp;amp;qid=263491" target="_blank"&gt;Business Standard&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2743&amp;amp;qid=263491" target="_blank"&gt;Vancouver Desi&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2744&amp;amp;qid=263491" target="_blank"&gt;DNA&lt;/a&gt;, and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2745&amp;amp;qid=263491" target="_blank"&gt;Tech2&lt;/a&gt;). Sunil Abraham is quoted.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2746&amp;amp;qid=263491" target="_blank"&gt;Is freedom of expression under threat in the digital age?&lt;/a&gt; (by Mahima Kaul, Index on Censorship, January 18, 2013).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2747&amp;amp;qid=263491" target="_blank"&gt;Internet Freedom in India – Open to Debate&lt;/a&gt; (by Kirsty Hughes, Index on Censorship, January 22, 2013). CIS research on censorship is quoted.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2748&amp;amp;qid=263491" target="_blank"&gt;Cyber security, surveillance and the right to privacy: country perspectives&lt;/a&gt; (by Richa Kaul Padte, Internet Democracy Project).&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2749&amp;amp;qid=263491" target="_blank"&gt;Surveillance Camp: Privatized State Surveillance&lt;/a&gt; (by Katitza Rodriguez, Electronic Frontier Foundation, January 28, 2013). Elonnai Hickok is quoted.&lt;/li&gt;
&lt;li&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2750&amp;amp;qid=263491" target="_blank"&gt;An innovative concept comes to the fore&lt;/a&gt; (Deccan Herald, January 29, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;h3&gt;Internet Access – Knowledge Repository&lt;/h3&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;In  partnership with Ford Foundation, CIS was tasked to produce and   disseminate modules on various aspects of telecommunications including   policy, regulations, infrastructure and market. However, as on November   9, 2012 there was a change in the mandate of the project. Currently, we   are working on building a knowledge repository on “Internet Access”.   This new repository will cover the history of the internet, technologies   involved, principle and values of internet access, broadband market  and  universal access. It will also touch upon various polices and   regulations which has an impact on internet access and bodies and   mechanism which are responsible for such policy formulation. For this  purpose we will be hosting a new website:&lt;span class="visualHighlight"&gt; &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2751&amp;amp;qid=263491" target="_blank"&gt;www.internet-institute.in&lt;/a&gt;&lt;/span&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;We are  also organizing an “Institute on Internet and Society” in  collaboration  with the Ford Foundation India, which is to be held from  June 8, 2013 to  June 14, 2013. Call for registrations and relevant  details will be soon  announced on our website.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2752&amp;amp;qid=263491" target="_blank"&gt;Telecom&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align:justify; "&gt;While the  potential for growth and returns exist for telecommunications in India,  a range of issues need to be addressed. One aspect is more extensive  rural coverage and the other is a countrywide access to broadband which  is low. Both require effective and efficient use of networks and  resources, including spectrum.:&lt;/p&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Column by Shyam Ponappa&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2753&amp;amp;qid=263491" target="_blank"&gt;What's Needed Is User-Centric Design, Not Good Intentions&lt;/a&gt; (by Shyam Ponappa, Business Standard, January 3, 2013 and Organizing India Blogpost, January 6, 2013).&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;Event(s) Participated &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;21&lt;sup&gt;st&lt;/sup&gt; Convergence Conference Conference India 2013 (organized by Exhibitions  India Group, January 16 – 17, 2013, Pragati Maidan, New Delhi). Snehashish Ghosh participated in the event.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2754&amp;amp;qid=263491" target="_blank"&gt;Digital Humanities&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align:justify; "&gt;From 2012  to 2015, the Researchers At Work series is focusing on building  research clusters in the field of Digital Humanities. We organised the first Habits of Living workshops in Bangalore last year. The next workshop is being held in Brown University:&lt;/p&gt;
&lt;p style="text-align:justify; "&gt;&lt;b&gt;Habits of Living Workshop&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;b&gt; &lt;/b&gt;
&lt;li&gt;&lt;b&gt; &lt;/b&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2755&amp;amp;qid=263491" target="_blank"&gt;Habits of Living: Networked Affects, Glocal Effects&lt;/a&gt; (organised by CIS and Brown University, March 21 – 23, 2013, Brown University, Rhode Island). Nishant Shah will be speaking at this event.&lt;/li&gt;
&lt;/ul&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; 
&lt;hr /&gt;
&lt;h2 style="text-align: center; "&gt;&lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2756&amp;amp;qid=263491" target="_blank"&gt;About CIS&lt;/a&gt;&lt;/h2&gt;
&lt;hr /&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;CIS was registered as a society in Bangalore in 2008. As an independent,  non-profit research organisation, it runs different policy research  programmes such as Accessibility, Access to Knowledge, Openness,  Internet Governance, and Telecom. The policy research programmes have  resulted in outputs such as the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2757&amp;amp;qid=263491" target="_blank"&gt;e-Accessibility Policy Handbook for Persons with Disabilities&lt;/a&gt; with ITU and G3ict, and &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2758&amp;amp;qid=263491" target="_blank"&gt;Digital Alternatives with a Cause?&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2759&amp;amp;qid=263491" target="_blank"&gt;Thinkathon Position Papers&lt;/a&gt; and the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2760&amp;amp;qid=263491" target="_blank"&gt;Digital Natives with a Cause? Report&lt;/a&gt; with Hivos,  etc. We have conducted policy research for the Ministry of   Communications &amp;amp; Information Technology, Ministry of Human  Resource  Development, Ministry of Personnel, Public Grievances  and  Pensions,  Ministry of Social Justice and Empowerment, etc., on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2761&amp;amp;qid=263491" target="_blank"&gt;WIPO Treaties&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2762&amp;amp;qid=263491" target="_blank"&gt;Copyright Bill&lt;/a&gt;, &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2763&amp;amp;qid=263491" target="_blank"&gt;NIA Bill&lt;/a&gt;, etc.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;CIS is accredited as an observer at WIPO. CIS staff participates in the  Standing Committee for Copyright and Related Rights (SCCR)  meetings  regularly held in Geneva, and participate in the discussions  and  comments on them from a public interest perspective. Our Policy   Director, Nirmita Narasimhan won the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2764&amp;amp;qid=263491" target="_blank"&gt;National Award for Empowerment of Persons with Disabilities&lt;/a&gt; from the Government of India and also received the &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2765&amp;amp;qid=263491" target="_blank"&gt;NIVH Excellence Award&lt;/a&gt;.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;/ul&gt;
&lt;h3&gt;Follow us elsewhere&lt;/h3&gt;
&lt;ul style="text-align:justify; "&gt;
&lt;li&gt; Get short, timely messages from us on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2766&amp;amp;qid=263491" target="_blank"&gt;Twitter&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Join the CIS group on &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2767&amp;amp;qid=263491" target="_blank"&gt;Facebook&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Visit us at &lt;a href="http://crm.cis-india.org/administrator/components/com_civicrm/civicrm/extern/url.php?u=2768&amp;amp;qid=263491" target="_blank"&gt;http://cis-india.org&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Support Us&lt;/h3&gt;
&lt;p style="text-align:justify; "&gt;Please help us defend consumer / citizen rights on the Internet! Write a cheque in favour of ‘The Centre for Internet and Society’ and mail it to us at No. 194, 2nd ‘C’ Cross, Domlur, 2nd Stage, Bengaluru – 5600 71.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Request for Collaboration&lt;/h3&gt;
&lt;p style="text-align:justify; "&gt;We invite researchers, practitioners, and theoreticians, both organisationally and as individuals, to collaboratively engage with Internet and society  and improve our understanding of this new field. To discuss the  research collaborations, write to Sunil Abraham, Executive Director, at &lt;a href="mailto:sunil@cis-india.org"&gt;sunil@cis-india.org&lt;/a&gt; or Nishant Shah, Director – Research, at &lt;a href="mailto:nishant@cis-india.org"&gt;nishant@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align:justify; "&gt;&lt;i&gt;CIS is grateful to its donors, Wikimedia Foundation, Ford Foundation, Privacy International, UK, Hans Foundation and the Kusuma Trust which was founded by Anurag Dikshit and Soma Pujari, philanthropists of Indian origin, for its core funding and support for most of its projects.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/about/newsletters/january-2013-bulletin'&gt;https://cis-india.org/about/newsletters/january-2013-bulletin&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2013-06-11T11:56:35Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/data-retention-in-india">
    <title>Data Retention in India</title>
    <link>https://cis-india.org/internet-governance/blog/data-retention-in-india</link>
    <description>
        &lt;b&gt;As part of its privacy research, the Centre for Internet and Society has been researching upon data retention mandates from the Government of India and data retention practices by service providers. Globally, data retention has become a contested practice with regards to privacy, as many governments require service providers to retain more data for extensive time periods, for security purposes. Many argue that the scope of the retention is becoming disproportional to the purpose of investigating crimes. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;The Debate around Data Retention&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the EU, data retention &lt;i&gt;“refers to the storage of traffic and location data resulting from electronic communications (not data on the content of the communications)”&lt;/i&gt;.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The debate around data retention has many sides, and walks a fine line of balancing necessity with proportionality. For example, some argue that the actual retention of data is not harmful, and at least some data retention is necessary to assist law enforcement in investigations. Following this argument, the abuse of information is not found in the retention of data, but instead is found by who accesses the data and how it is used. Others argue that any blanket or &lt;i&gt;a priori &lt;/i&gt;data&lt;i&gt; &lt;/i&gt;retention requirements are increasingly becoming disproportional and can lead to harm and misuse. When discussing data retention it is also important to take into consideration what type of data is being collected and by what standard is access being granted. Increasingly, governments are mandating that service providers retain communication metadata for law enforcement purposes. The type of authorization required to access retained communication metadata varies from context to context. However, it is often lower than what is required for law enforcement to access the contents of communications. The retention and lower access standards to metadata is controversial because metadata can encompass a wide variety of information, including IP address, transaction records, and location information — all of which can reveal a great deal about an individual.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;Furthermore, the definition of metadata changes and evolves depending on the context and the type of information being generated by new technologies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Retention vs. Data Preservation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Countries have taken different stances on what national standards for data retention by service providers should be. For example, in 2006 the EU passed the Data Retention Directive which requires European Internet Service Providers to retain telecom and Internet traffic data from customers' communications for at least six months and upto two years. The stored data can be accessed by authorized officials for law enforcement purposes.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Despite the fact that the Directive pertains to the whole of Europe, in 2010 the German Federal Constitutional Court annulled the law that harmonized German law with the Data Retention Directive.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; Other European countries that have refused to adopt the Directive include the Czech Republic and Romania.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Instead of mandating the retention of data, Germany, along with the US, mandates the 'preservation' of data. The difference being that the preservation of data takes place through a specified request by law enforcement, with an identified data set. In some cases, like the US, after submitting a request for preservation, law enforcement must obtain a court order or subpoena for further access to the preserved information.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Data Retention in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, the government has established a regime of data retention. Retention requirements for service providers are found in the ISP and UASL licenses, which are grounded in the Indian Telegraph Act, 1885.&lt;/p&gt;
&lt;h3&gt;ISP License&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the ISP License,&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; there are eight categories of records that service providers are required to retain for security purposes that pertain to customer information or transactions. In some cases the license has identified how long records must be maintained, and in other cases the license only states that the records must be made available and provided. This language implies that records will be kept.&lt;/p&gt;
&lt;p&gt;According to the ISP License, each ISP must maintain:&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;span&gt; &lt;/span&gt;
&lt;li&gt;&lt;span&gt;&lt;b&gt;&lt;span&gt;Users and Services&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;: A log of all users connected and the service they are using, which must be available in real time to the Telecom Authority. (Section 34.12).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;b&gt;&lt;span&gt;Outward Logins or Telnet&lt;/span&gt;&lt;/b&gt;&lt;/span&gt;: A log of every outward login or telnet through an ISPs computer must be available in real time to the Telecom Authority. (Section 34.12).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Packets&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; Copies of all packets originating from the Customer Premises Equipment of the ISP must be available in real time to the Telecom Authority. (Section 34.12).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Subscribers&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; A complete list of subscribers must be made available on the ISP website with password controlled access, available to authorized Intelligence Agencies at any time. (Section 34.12).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Internet Leased Line Customers&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; A complete list of Internet leased line customers and their sub-customers consisting of the following information: name of customer, IP address allotted, bandwidth provided, address of installation, date of installation/commissioning, and contact person with phone no./email. These must be made available on a password protected website (Section 34.14).  The password and login ID must be provided to the DDG (Security), DoT HQ and concerned DDG(VTM) of DoT on a monthly basis. The information should also be accessible to authorized government agencies (Section 34.14).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Diagram Records and Reasons&lt;/span&gt;:&lt;/span&gt;&lt;/b&gt; A record of complete network diagram of set-up at each of the internet leased line customer premises along with details of connectivity must be made available at the site of the service provider. All details of other communication links (PSTN, NLD, ILD, WLL, GSM, other ISP) plus reasons for taking the links by the customer must be recorded before the activation of the link. These records must be readily available for inspection at the respective premises of all internet leased line customers (Section 34.18).&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; 
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Commercial Records&lt;/span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; All commercial records with regard to the communications exchanged on the network must be maintained for a year (Section 34.23).&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Location&lt;/span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt; The service provider should be able to provide the geographical location of any subscriber at a given point of time (Section 34.28(x).&lt;/p&gt;
&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;span&gt; &lt;/span&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Remote Activities&lt;/span&gt;:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; A complete audit trail of the remote access activities pertaining to the network operated in India. These must be retained for a period of six months, and must be provided on request to the licensor or any other agency authorized by the licensor (Section 34.28 (xv).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;UASL License&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the UASL License&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt;, &lt;span&gt;there are twelve categories of records that ISP’s are required to retain that pertain to costumer information or transactions for security purposes. In some cases the license has identified how long records must be maintained, and in other cases the license only states that the information must be provided and made available when requested. This language implies that records will be kept. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to the license, service providers must maintain and make available: &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Numbers&lt;/span&gt;&lt;/span&gt;&lt;span&gt;: &lt;/span&gt;&lt;/b&gt;&lt;span&gt;Called/calling party mobile/PSTN numbers when required. Telephone numbers of any call-forwarding feature when required (Section 41.10).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Interception records: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;Time, date and duration of interception when required (Section 41.10).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; 
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Location:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; Location of target subscribers. For the present, cell ID should be provided for location of the target subscriber when required (Section 41.10).&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;All call records:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; All call data records handled by the system when required (Section 41.10). This includes:&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Failed call records:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; Call data records of failed call attempts when required. (Section 41.10).&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Roaming subscriber records&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: Call data records of roaming subscribers when required. (Section 41.10)&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Commercial records: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;All commercial records with regards to the communications exchanged on the network must be retained for one year (Section 41.17).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Outgoing call records: &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;A record of checks made on outgoing calls completed by customers who are making large outgoing calls day and night to various customers (Section 41.19(ii)).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Calling line Identification:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; A list of subscribers including address and details using calling line identification should be kept in a password protected website accessible to authorized government agencies (Section 41.19 (iv)).&lt;/span&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; 
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;&lt;span&gt;Location:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt; The service provider must be able to provide the geographical location of any subscriber at any point of time (Section 41.20(x)).&lt;/span&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; &lt;b&gt;&lt;span&gt;&lt;span&gt;Remote access activities:&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;Complete audit trail of the remote access activities pertaining to the network operated in India for a period of six months (Section&lt;span&gt; &lt;/span&gt;41.20 (xv)).&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;RTI Request to &lt;a href="https://cis-india.org/internet-governance/blog/bsnl-rti" class="internal-link"&gt;BSNL&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/blog/mtnl-rti-request.pdf" class="internal-link"&gt;MTNL&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;On September 10,&lt;sup&gt;&lt;/sup&gt; 2012, the Centre for Internet and Society sent an RTI to MTNL and BSNL with the following questions related to the respective data retention practices: &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;ul type="disc"&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Does      MTNL/BSNL store the following information/data:&lt;/span&gt;&lt;/li&gt;
&lt;ul type="circle"&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Text       message detail (To and from cell numbers, timestamps)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Text       message content (The text and/or data content of the SMS or MMS)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Call       detail records (Inbound and outbound phone numbers, call duration)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Bill       copies for postpaid and recharge/top-up billing details for prepaid&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Location       data (Based on cell tower, GPS, Wi-Fi hotspots or any combination       thereof)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;If it      does store data then&lt;/span&gt;&lt;/li&gt;
&lt;ul type="circle"&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;For what       period does MTNL/BSNL store: SMS and MMS messages, cellular and mobile       data, customer data?&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;What       procedures for retention does MTNL/BSNL have for: SMS and MMS messages,       cellular and mobile data, and customer data?&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;What       procedures for deletion of: SMS and MMS messages, cellular and mobile       data, and customer data?&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;What       security procedures are in place for SMS and MMS messages, cellular and       mobile data, and customer data?&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/ul&gt;
&lt;h3&gt;BSNL Response&lt;/h3&gt;
&lt;p&gt;BSNL replied by stating that it stores at least three types of information including:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol type="1"&gt;
&lt;li style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;IP session information -      connection start end time, bytes in and out (three years offline)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;MAC address of the modem/router/device (three years offline)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal"&gt;&lt;span&gt;Bill copies for post paid and recharge/top up billing details      for prepaid. Billing information of post paid Broadband are available in      CDR system under ITPC, prepaid voucher details (last six months).&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;MTNL Response&lt;/h3&gt;
&lt;p&gt;MTNL replied by stating that it stores at least () types of information including:&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol type="1"&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Text message details (to and from cell number, timestamps) in      the form of CDRs&lt;span&gt; &lt;/span&gt;(one year)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Call detail records including inbound and outbound phone      numbers and call duration (one year)&lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Bill copies from postpaid (one year) &lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Recharge details for prepaid (three months) &lt;/span&gt;&lt;/li&gt;
&lt;li class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;Location of the mobile number if it has used the MTNL      GSM/3GCDMA network (one year)&lt;/span&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p class="MsoNormal" style="text-align:justify; "&gt;&lt;span&gt;It is interesting that BSNL stores information that is beyond the required time period required in both the ISP and the UASL licenses. The responses to the RTI showed that each service provider also stores different types of information. This could or could not be the actual case, as each question could have been interpreted differently by the responding officer.&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;span&gt;Conclusion &lt;/span&gt;&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt; &lt;span&gt;The responses to the RTI from BSNL and MTNL are a step towards understanding data retention practices in India, but there are still many aspects about data retention in India which are unclear including:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;What constitutes a ‘commercial record’ which must be stored for one year by service providers?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;How much data is retained by service providers on an annual basis?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;What is the cost involved in retaining data? For the service provider? For the public?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;How frequently is retained information accessed by law enforcement? What percentage of the data is accessed by law enforcement?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;How many criminal and civil cases rely on retained data?&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;What is the authorization process for access to retained records? Are these standards for access the same for all types of retained data?&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;Having answers to these questions would be useful for determining if the Indian data retention regime is proportional and effective. It would also be useful in determining if it would be meaningful to maintain a regime of data retention or switch over to a more targeted regime of data preservation. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;Though it can be simple to say that a regime of data preservation is the most optimal choice as it gives the individual the greatest amount of immediate privacy protection, &lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;A regime of data preservation would mean that all records would be treated like an interception, where the police or security agencies would need to prove that a crime was going to take place or is in the process of taking place and then request the ISP to begin retaining specific records. This approach to solving crime would mean that the police would never use retained data or historical data as part of an investigation – to either solve a case or to take the case to the next level.&lt;span&gt; &lt;/span&gt;If Indian law enforcement is at a point where they are able to concisely identify a threat and then begin an investigation is a hard call to make. It is also important to note that though preservation of data can reduce the risk to individual privacy as it is not possible for law enforcement to track individuals based off of their historical data and access large amounts of data about an individual, preservation does not mean that there is no possibility for abuse. Other factors such as:&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;Any request for preservation and access to records must be legitimate and proportional&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Accessed and preserved records must be used only for the purpose indicated &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;Accessed and preserved records can only be shared with authorized authorities&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;Any access to preserved records that do not pertain to an investigation must be deleted &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align:justify; "&gt;&lt;span&gt;These factors must be enforced through the application of penalties for abuse of the system. These factors can also be applied to not only a data preservation regime, but also a data retention regime and are focused on preventing the actual abuse of data after retained. That said, before an argument for either data retention or data preservation can be made for India it is important to understand more about data retention practices in India and use of retained data by Indian law enforcement and access controls in place. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].&lt;span&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;European Commission – Press  Release. Commission Takes Germany to Court Requesting that Fines be  Imposed. May 31st 2012. Available at:  &lt;a class="external-link" href="http://bit.ly/14qXW6o"&gt;http://bit.ly/14qXW6o&lt;/a&gt;. Last accessed:  January 21st 2013&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;].Draft International Principles on Communications Surveillance and Human Rights: &lt;a class="external-link" href="http://bit.ly/UpGA3D"&gt;http://bit.ly/UpGA3D&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. European Commission – Press Release. Commission Takes Germany to Court Requesting that Fines be Imposed. May 31&lt;sup&gt;st&lt;/sup&gt; 2012. Available at:  &lt;a class="external-link" href="http://bit.ly/14qXW6o"&gt;http://bit.ly/14qXW6o&lt;/a&gt;&lt;a href="http://europa.eu/rapid/press-release_IP-12-530_en.htm"&gt;&lt;/a&gt;. Last accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. European Commission – Press Release. Commission Takes Germany to Court Requesting that Fines be Imposed. May 31&lt;sup&gt;st&lt;/sup&gt; 2012. Available at:  &lt;a class="external-link" href="http://bit.ly/14qXW6o"&gt;http://bit.ly/14qXW6o&lt;/a&gt;. Last accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Tiffen, S. Sweden passes controversial data retention directive. DW. March 22 2012. Available at: &lt;a class="external-link" href="http://bit.ly/WOfzaX"&gt;http://bit.ly/WOfzaX&lt;/a&gt;. Last Accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013.&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;].  Kristina, R. The European Union's Data Retention Directive and the  United State's Data Preservation Laws: Fining the Better Model. 5  Shilder J.L. Com. &amp;amp; Tech. 13 (2009) available at: &lt;a class="external-link" href="http://bit.ly/VoQxQ9"&gt;http://bit.ly/VoQxQ9&lt;/a&gt;. Last accessed: January 21&lt;sup&gt;st&lt;/sup&gt; 2013&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;].  Government of India. Ministry of Communications &amp;amp; IT Department of  Telecommunications. License Agreement for Provision of Internet  Services.&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].  Government of India. Ministry of Communications &amp;amp; IT Department of  Telecommunications. License Agreement for Provision of Unified Access  Services after Migration from CMTS. Amended December 3&lt;sup&gt;rd&lt;/sup&gt; 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/data-retention-in-india'&gt;https://cis-india.org/internet-governance/blog/data-retention-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T15:51:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance">
    <title>Surveillance Camp: Privatized State Surveillance</title>
    <link>https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance</link>
    <description>
        &lt;b&gt;This is the second in a series of posts mapping global surveillance challenges discussed at EFF’s Surveillance Camp in Rio de Janeiro, Brazil.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Katitza Rodriguez's blog post was &lt;a class="external-link" href="https://www.eff.org/deeplinks/2013/01/surveillance-camp-privatize-state-surveillance"&gt;published by the Electronic Frontier Foundation&lt;/a&gt; on their website on January 28, 2013. Elonnai Hickok is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In December 2012, EFF organized a&lt;a href="https://www.eff.org/issues/surveillance-human-rights"&gt; &lt;/a&gt;&lt;a href="https://www.eff.org/issues/surveillance-human-rights"&gt;Surveillance and Human Rights Camp&lt;/a&gt; in Brazil that brought together the expertise of a diverse group of people concerned about state electronic surveillance in Latin American and other countries. Among other concerns, participants spotlighted the many ways in which the private sector is increasingly playing a role in state surveillance. Here are a few examples:&lt;/p&gt;
&lt;h3 class="western"&gt;Voluntary Agreements Between Law Enforcement and Private Companies&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Often law enforcement agencies will approach companies asking for voluntary disclosure of information for investigative purposes. Those requests may look and sound more like &lt;a href="http://blog.privacylawyer.ca/2011/11/dealing-with-police-letters-of-request.html"&gt;threats&lt;/a&gt;, with a great deal of &lt;a href="http://blog.privacylawyer.ca/2011/11/police-pipeda-requests-for-customer.html"&gt;moral pressure&lt;/a&gt; applied on the companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This voluntary assistance remains out of the public eye and shrouded in secrecy, as notification of state access is never given to the individual concerned, is not codified in law, and is not clearly disclosed in the company's terms of service or user agreement. Currently there is minimal, if any, oversight over such voluntary cooperation, so the scope of assistance provided is not well-documented.&lt;/p&gt;
&lt;h4 class="western"&gt;Canada&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Canadian ISPs &lt;a href="http://www.canlii.org/en/on/onca/doc/2012/2012onca660/2012onca660.html"&gt;have jointly decided&lt;/a&gt; to provide identifying data about &lt;a href="http://www.cippic.ca/agents_of_the_state"&gt;Canadian Internet users&lt;/a&gt; to law enforcement in child exploitation investigations. In fact, &lt;a href="http://www.cba.org/cba/newsletters-sections/pdf/2011-11-privacy1.pdf"&gt;several Canadian ISPs&lt;/a&gt; have developed a formal protocol in conjunction with various law enforcement agencies to be used when those authorities are seeking identification information associated with a given IP address at a specific date and time. Since the adoption of this protocol, some ISPs have expanded their information sharing practices to cover customer identification data in other contexts, such as &lt;a href="http://www.cippic.ca/sites/default/files/AgentsoftheState-Roundtable_Presentation.ppt"&gt;online harassment cases&lt;/a&gt;.&lt;/p&gt;
&lt;h3 class="western"&gt;Law Enforcement Approaching Service Providers Without Legally-Required Authorization&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A growing concern is the number of law enforcement officers skirting the law by asking service providers to simply fork over information without any sort of search warrant. Even when legal procedures, such as a search warrant, exist, police increasingly request information without obtaining a legal authorization. Nevertheless, they often expect full compliance from service providers.&lt;/p&gt;
&lt;h4 class="western"&gt;Chile&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;In 2008, a Chilean website called&lt;a href="http://huelga.cl/"&gt; &lt;/a&gt;&lt;a href="http://huelga.cl/"&gt;Huelga.cl&lt;/a&gt; (“strike” in English) was approached by the Cyber Crime Section of the Chilean Police. The site is an online space for coordinating union actions. The agency demanded that the webmaster hand over data related to pseudonymous user accounts, such as IP addresses, records of previous connections, real names, and physical addresses. The targeted users had left comments on a website about an ongoing strike.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this case, because police did not have a court order to back up the request for information,&lt;a href="http://huelga.cl/"&gt; &lt;/a&gt;&lt;a href="http://huelga.cl/"&gt;Huelga.cl&lt;/a&gt; took a stand by resisting police pressure and refusing to hand over the data without a fight. For legal assistance, they turned to Derechos Digitales, a Chilean online human rights nonprofit organization, and managed to resist the request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In another case, the Regional Director of the Chilean Department of Labor, the agency responsible for ensuring the enforcement of labor laws, sent&lt;a href="http://www.derechosdigitales.org/wp-content/uploads/Respuesta-a-DT.pdf"&gt; &lt;/a&gt;&lt;a href="http://www.derechosdigitales.org/wp-content/uploads/Respuesta-a-DT.pdf"&gt;a letter&lt;/a&gt; to Huelga.cl simply demanding the removal of “inappropriate content” from their website along with the disclosure of user information, but it was only for administrative purposes as opposed to serious criminal investigations. Huegal.cl again &lt;a href="http://www.derechosdigitales.org/2010/09/20/huelga-cl-resiste-presion-de-direccion-del-trabajo-por-entregar-informacion-de-usuarios/"&gt;refused to&lt;/a&gt; comply and instead, made the director’s demands public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is not always the case that service providers can resist extralegal government requests, find legal advice or have enough economic resources to fight against those demands as Huelga.cl did. Huelga.cl should be praised for speaking up and managing to make the request from law enforcement public.&lt;/p&gt;
&lt;h3 class="western"&gt;Governments Pressure Private Sector&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Governments frequently impose heavy fines for non-compliance with their requests for data access. This form of coercion acts as a mechanism of enforcement over service providers and can raise serious concerns for free expression. The service provider is left with little incentive or option to resist illegitimate requests from the government when they are threatened with heavy fines.&lt;/p&gt;
&lt;h4 class="western"&gt;Brazil&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;In 2012, a judge from northern Brazil &lt;a href="http://diariodonordeste.globo.com/materia.asp?codigo=1028611"&gt;froze Google's accounts&lt;/a&gt; and imposed a fine on the company for refusing to remove three anonymous blogs or reveal contact details of the bloggers.  The content of the blogs &lt;a href="http://thenextweb.com/la/2011/08/20/google-fined-in-brazil-for-refusing-to-reveal-bloggers-identities/"&gt;state&lt;/a&gt;&lt;a href="http://thenextweb.com/la/2011/08/20/google-fined-in-brazil-for-refusing-to-reveal-bloggers-identities/"&gt;d&lt;/a&gt; the mayor of Varzea Alegre of corruption and embezzlement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While some companies might be able to withstand governmental pressure, alarms were raised that this won’t be the case for smaller companies that lack resources and influence. This is particularly true in contexts where heavy fines for noncompliance are written into legislation, and companies are not given legal avenues to appeal or fight the fine.&lt;/p&gt;
&lt;h3 class="western"&gt;Foreign Governments Access To Individuals’ Data in the Cloud&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Governments are increasingly seeking to negotiate access or interceptation capabilities to user data with companies that do not lie within their jurisdictions. This form of access is complicated because it is not always clear which country’s laws apply or to what extent. Because of the complex nature of these requests, governments often look for "easy" solutions that call for voluntary disclosure of information or simply allow full access to the user data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, government officials in India have been pushing  for real time interception capabilities for all BlackBerry services. In response to the demands from the Indian Government, after a number of unsatisfactory proposals, in 2012 RIM set up a NOC in &lt;a href="http://crackberry.com/rim-installs-blackberry-server-mumbai"&gt;Mumbai&lt;/a&gt;, providing security agencies with access to &lt;a href="http://articles.economictimes.indiatimes.com/2012-12-30/news/36063501_1_lawful-access-lawful-interception-vendors-blackberry-internet-service"&gt;BlackBerry Messenger services&lt;/a&gt;, and created a solution for access to Blackberry Internet Services. In addition to asking RIM for real time access to communications, the Government of India had required Service Providers in India to adopt the solution provided by RIM by end of 2012 or risk being shut down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Elonnai Hickok from the &lt;a href="https://cis-india.org/"&gt;Centre for Internet and Society&lt;/a&gt; in Bangalore, India, the discussions between &lt;a href="http://articles.economictimes.indiatimes.com/2012-10-29/news/34798663_1_interception-solution-blackberry-interception-blackberry-services"&gt;RIM and the Indian Government&lt;/a&gt; is just one example of how governments are trying to negotiate their interests in light of the challenges posed by communications stored in the cloud and in multiple jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Internet is technically borderless, in reality, state actors impose their sovereignty onto online environments with increasing frequency. The &lt;a href="https://www.eff.org/document/cloudy-jurisdiction-addressing-thirst-cloud-data-domestic-legal-processes"&gt;exercise of sovereignty&lt;/a&gt; over shared spaces can subject individuals to the laws of another country without any awareness on their part that this has happened. This in effect transforms the surveillance efforts of one country into privacy risks for all the world’s citizens.&lt;/p&gt;
&lt;h3 class="western"&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;State agencies and law enforcement are increasingly outsourcing investigations to private companies who are not under the same sort of judicial oversight as official law enforcement entities would be. The increasingly close and non-transparent connection between the private sector and law enforcement needs to be addressed, as it poses a risk to the rights and freedoms of the individual.  Of major concern to all Camp participants was the notion that private companies are routinely complying with the requests of law enforcement in the absence of due process. We encourage further research and documentation of this phenomenon. To highlight on this issue, we will be blogging next about the privatization of public security in Latin America.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance'&gt;https://cis-india.org/news/electronic-frontier-foundation-january-28-2013-katitza-rodriguez-surveillance-camp-privatized-state-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-01-29T06:51:39Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs">
    <title>Five Frequently Asked Questions about the Amended ITRs</title>
    <link>https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs</link>
    <description>
        &lt;b&gt;This piece discusses the five major questions that have been the subject of debate after the World Conference on International Telecommunications 2012 (WCIT). The politics surrounding the WCIT are not discussed here but it must be kept in mind that they have played a significant role in the outcome of the conference and in some of the debates about it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Each question is discussed with reference to the text of the treaty, to the minutes of the plenary sessions (which are available via the &lt;a href="http://www.itu.int/en/pages/default.aspx"&gt;ITU website&lt;/a&gt;), a little international law and a few references to other people’s comments on the treaty.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. Do the ITRs apply to content on the internet?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 1.1 (a) has been amended to add the sentence “These Regulations do not address the content-related aspects of telecommunications”. Although some discussions about the &lt;a href="http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf"&gt;International Telecommunication Regulations (ITRs)&lt;/a&gt; and content have ignored this altogether, others seem concerned about its interpretation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ITU Secretary General has issued &lt;a href="http://www.itu.int/en/wcit-12/Pages/statement-toure.aspx"&gt;a statement&lt;/a&gt; in which he has clarified that “The new ITR treaty does NOT cover content issues and explicitly states in the first article that content-related issues are not covered by the treaty”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Commentators like &lt;a href="http://tryingtoreason.wordpress.com/2012/12/15/yes-the-new-itrs-do-cover-content-and-the-internet/"&gt;Chuan-Zheng Lee&lt;/a&gt; however, continue to view the treaty with suspicion, on the basis that it is necessary to examine content in order to tell whether it is spam (Lee and &lt;a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"&gt;Chaparro&lt;/a&gt; differ on this question). However, others like &lt;a href="http://www.nytimes.com/2012/12/15/technology/in-a-huff-a-telling-us-walkout.html?pagewanted=all&amp;amp;_r=0"&gt;Eric Pfanner&lt;/a&gt; have pointed to this paragraph in their skepticism about the US refusal to sign.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman proposed the addition to Article 1.1(a) at the tenth plenary session. He did this to address concerns that the ITRs text could be interpreted to apply to content on the Internet. The original formulation that he proposed was ‘These regulations do not address and cannot be interpreted as addressing content’. This text was suggested in the middle of an extended discussion on Article 5A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many countries were skeptical of this insertion. Sudan argued that content could not be avoided in telecommunication networks “because it will always be in transit.” The United Arab Emirates seemed concerned about international interference in states’ existing regulation of content, and said “maybe we could actually say this in the minutes of the meeting that this regulation should not be interpreted as on alteration to Member States content regulation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns about what the term ‘content’ means and whether it would apply broadly were raised by more than one country, including Saudi Arabia. For instance, it was argued that the text proposed by the Chairman might interfere with parts of the treaty that require operators to send tariff information correspondence. More than one country that felt that the insertion of this text would impact several parts of the treaty, and that it would be difficult to determine what amounted to dealing with content. The primary issue appeared to be that the term ‘content’ was not defined, and it therefore remained unclear what was being excluded. In response to these concerns, the Chairman withdrew his proposal for the amendment excluding content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, several states then spoke up in favour of the Chairman’s proposal, suggesting that the proposed amendment to Article 1.1 influenced their acceptance of Article 5A (on security and robustness of networks – discussed in detail below). Brazil suggested that an answer to the definitional concerns may be found in the work by Study Group 17, which had a definition available.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following this, the next day, at the twelfth plenary, the Chairman brought back the Article 1.1 amendment excluding content. He stated explicitly that this amendment might be the way to get Articles 5A and 5B approved. The text he read out was insertion of the words &lt;i&gt;“&lt;/i&gt;to the exclusion of their content”, after ‘’services’ at the end of 1.1A. Interestingly however, the term ‘content’ was never defined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the next plenary session, Iran raised the objection that this phrase was overbroad, and proposed the following formulation instead: “These Regulations do not address the content-related aspects of telecommunications”. This formulation found its way into the amended ITRs as the treaty stands today.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;2. Does Article 5A on network security legitimize surveillance of Internet content?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5A deals with ‘security and robustness of networks’ and requires member states to “individually and collectively endeavour to ensure the security and robustness of international telecommunication networks...”.  This may have given rise to concerns about interpretations that may extend the security of networks to malware or viruses, and therefore to content on the Internet. However, Article 5A has to be read with Article 1.1(a), and therefore must be interpreted such that it does not ‘address the content-related aspects of telecommunications’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some commentators continue to see Article 5A as problematic. Avri Doria &lt;a href="http://avri.doria.org/post/38641776703/wcit"&gt;has argued&lt;/a&gt; that the use of the word ‘security’ in addition to ‘robustness’ of telecommunication infrastructure suggests that it means Internet security.   However Emma Llansó of the Centre for Democracy and Technology &lt;a href="https://www.cdt.org/blogs/emma-llanso/2012making-sense-wcit-it%E2%80%99s-complicated"&gt;has noted&lt;/a&gt; that the language used in this paragraph is “ far too vague to be interpreted as a requirement or even a recommendation that countries surveil users on their networks in order to maintain security”. Llansó  has suggested that civil society advocates make it clear to countries which attempt to use this article to justify surveillance, that it does not lend itself to such practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5A was one of the most controversial parts of the ITRs and was the subject of much debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On December 11&lt;sup&gt;th&lt;/sup&gt;, in the Chairman’s draft that was being discussed, Article 5A was titled ‘security of networks’, and required members to endeavour to ensure the “security and robustness of international telecommunication networks”.  The Chairman announced that this was the language that came out of Committee 5’s deliberations, and that ‘robustness’ was inserted at the suggestion of CEPT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several countries like Poland, Australia, Germany and the United States of America were keen on explicitly stating that Article 5A was confined to the physical or technical infrastructure, and either wanted a clarification that to this effect or use of the term ‘robustness’ instead of security. Many other countries, such as Russia and China, were strongly opposed to this suggestion and insisted that the term security must remain in the document (India was one of the countries that preferred to have the document use the term ‘security’).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was in the course of this disagreement, during the tenth plenary session, that the Chairman suggested his global solution for Article 1.1 – a clarification that this would not apply to content. This solution was contested by several countries, withdrawn and then reinstated (in the eleventh plenary) after many countries explained that their assent to Article 5A was dependant on the existence of the Article 1 clarification about content (see above for details).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was also some debate about whether Article 5A should use the term ‘robustness’ or the term ‘security’ (eg. The United States clarified that its preference was for the use of ‘resilience and robustness’ rather than security). The Secretary General referred to this disagreement, and said that he was therefore using both terms in the draft. The title of Article 5A was changed, in the eleventh plenary, to use both terms, instead of only referring to security.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3. Does Article 5B apply to spam content on the Internet? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The text of the amended treaty talks of ‘unsolicited bulk electronic communications’ and does not use the term ‘spam’[Article 5B says that ‘Members should endeavour to take necessary measures to prevent the propagation of unsolicited bulk electronic communications and minimize its impact on international telecommunication services’].If this phrase is read in isolation, it may certainly be interpreted as being applicable to spam. Commentators like &lt;a href="http://avri.doria.org/tagged/WCIT/page/2"&gt;Avri Doria&lt;/a&gt; have pointed to sources like&lt;a href="http://www.itu.int/osg/csd/intgov/resoultions_2010/PP-10/RESOLUTION_130.pdf"&gt; Resolution 130 of the Plenipotentiary Conference of the International Telecommunication Union&lt;/a&gt; (Guadalajara, 2010) to demonstrate that ‘unsolicited bulk electronic communications’ ordinarily means spam.  However, others like&lt;a href="http://globalvoicesonline.org/2013/01/02/wcit-and-its-relationship-to-the-internet-what-lies-ahead/"&gt; Enrique A. Chaparro&lt;/a&gt; argue that it cannot possibly extend to content on the Internet given the language used in Article 1.1(a). Chapparo has explained, that given the exclusion of content, Article 5B it authorizes anti-spam mechanisms that do not work on content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5B, which discusses ‘unsolicited bulk electronic communications’, must be read with Article 1, which is the section on purpose and scope of the ITRS. Article 1.1 (a) specifies that the ITRs “do not address the content-related aspects of telecommunications”. Therefore it may be argued that ‘unsolicited bulk electronic communications’ cannot be read as being applicable to content on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, many continue to be concerned about Article 5B’s applicability to spam on the Internet. Although some of them that their fear is that some states may interpret Article 5B as applying to content, despite the contents of Article 1.1(a), many have failed to engage with the issue in the context of Article 1.1(a).&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 5B is inextricably linked with the amendment to Article 1.1. Mexico asked specifically about what the proposed amendment to Article 1.1 would mean for Article 5B: “I’m referring to the item which we’ll deal with later, namely unsolicited bulk electronic communications.  Could that be referred to as content, perhaps?”.  The Chairman responded saying, “This is exactly will solve the second Article 5B, that we are not dealing with content here.  We are dealing with measures to prevent propagation of unsolicited bulk electronic messages”.&lt;sup&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment to Article 1.1 was withdrawn soon after it was introduced. Before it was reintroduced, Sweden said (at the eleventh plenary) that it could not see how Article 5B could apply without looking into the content of messages. The United States agreed with this and went on state that the issue of spam was being addressed at the WTSA level, as well as by other organisations. It argued that the spam issue was better addressed at the technical level than by introducing it in treaty text.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The amendment excluding content was reintroduced during the twelfth plenary. The Chairman explicitly stated that it might be the way to get Articles 5A and 5B approved.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The word ‘spam’ was dropped from the ITRs in the eight plenary, and “unsolicited bulk electronic communications” was used instead.  However, in the eleventh plenary, as they listed their reasons for not signing the newly-amended ITRs, Canada and the United States of America referred to ‘spam’ which suggests that they may have viewed the change as purely semantic.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4. Does the resolution on Internet Governance indicate that the ITU plans to take over the Internet?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much controversy has arisen over the plenary resolution ‘to foster an enabling environment for the greater growth of the Internet’. This controversy has arisen partly thanks to the manner in which it was decided to include the resolution, and partly over the text of the resolution. The discussion here focuses on the text of the resolution and then describes the proceedings that have been (correctly) criticized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The history of this resolution, as &lt;a href="http://www.circleid.com/posts/20121217_wcit_and_internet_governance_harmless_resolution_or_trojan_horse/"&gt;Wolfgang Kleinwächter&lt;/a&gt; has explained, is that it was part of a compromise to appease the countries which were taking positions on the ITU’s role in Internet governance, that were similar to the &lt;a href="http://files.wcitleaks.org/public/Merged%20UAE%20081212.pdf"&gt;controversial Russian proposal&lt;/a&gt;. The controversial suggestions about Internet governance were excluded from the actual treaty and included instead in a non-binding resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The text of the resolution instructs the Secretary General to “to continue to take the necessary steps for ITU to play an active and constructive role in the development of broadband and the multi-stakeholder model of the Internet as expressed in § 35 of the Tunis Agenda”. This paragraph is particularly controversial since of paragraph 35 of the &lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt; says “Policy authority for Internet-related public policy issues is the sovereign right of States. They have rights and responsibilities for international Internet-related public policy issues.” Kleinwächter has pointed out that this selection leaves out later additions that have taken place with progression towards a multi-stakeholder model.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The resolution also resolves to invite member states to “to elaborate on their respective positions on international Internet-related technical, development and public-policy issues within the mandate of ITU at various ITU forums including, inter alia, the World Telecommunication/ICT Policy Forum, the Broadband Commission for Digital Development and ITU study groups”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A little after its introduction, people began expressing concerns such as the &lt;a href="https://www.accessnow.org/blog/2012/12/12/wcit-watch-just-taking-the-temperature-a-late-night-resolution-on-the-inter"&gt;Secretary General may treat the resolution as binding&lt;/a&gt;, While the language may raise cause for concern, it is important to note that resolutions of this nature are not binding and countries are free to opt out of them. Opinions vary about the intentions that have driven the inclusion of this resolution, and what it may mean for the future. However commentators like Milton Mueller have scoffed at these concerns, pointing out that the resolution is harmless and may have been a &lt;a href="http://www.internetgovernance.org/2012/12/13/what-really-happened-in-dubai/"&gt;clever political maneuver&lt;/a&gt; to resolve the basic conflict haunting the WCIT, and that &lt;a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/"&gt;mere discussion of the Internet in the ITU harms no one&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Egypt and Bulgaria suggested that the resolution refer to paragraph 55 of the Tunis agenda instead of paragraph 35, by inserted the following text “”Recognizing that the existing arrangements for Internet Governance have worked effectively to make the Internet the highly robust, dynamic and geographically diverse medium it is today, with the private sector taking the lead in day-to-day operations and with innovation and value creation at the edges.” The US was also quite insistent on this language (although it did also argue that this was the wrong forum to discuss these issues).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman was willing to include paragraph 55 in addition to paragraph 35 but Saudi Arabia objected to this inclusion. Finland suggested that the resolution should be removed since it was not supported by all the countries present and was therefore against the spirit of consensus. The Secretary General defended the resolution, suggesting both that it was harmless and that since it was a key component of the compromise, eliminating it would threaten the compromise. South Africa and Nigeria supported this stand.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was during this debate that the procedural controversy arose. Late into the night, the Chairman said there was a long list of countries that wished to speak and said “I just wanted to have the feel of the room on who will accept the draft resolution”. He proceeded to have countries indicate whether they would accept the draft resolution or not, and then announced that the majority of the countries in the room were in favour of retaining the resolution. The resolution was then retained. Upon Spain’s raising the question, the Chairman clarified that this was not a vote. The next day, other countries raised the same question and the Chairman, while agreeing that the resolution was adopted on the basis of the ‘taking of temperature’ insisted that it was not a vote so much as an effort to see what majority of the countries wanted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Does the human rights language used in the preamble, especially the part about states’ access to the Internet, threaten the Internet in any way?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The preamble says “Member States affirm their commitment to implement these Regulations in a manner that respects and upholds their human rights obligations”, and “These Regulations recognize the right of access of Member States to international telecommunication services”. The text of the preamble can be used as an interpretation aid since it is recognized as providing context to, and detailing the object and purpose of, a treaty. However if the meaning resulting from this appears to be ambiguous, obscure, absurd or unreasonable, then supplementary means such as the preparatory work for the treaty and the circumstances for its conclusion may also be taken into account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore anyone who is concerned about the impact of the text inserted in the preamble must (a) identify text within the main treaty that could be interpreted in an undesirable manner using the text in the preamble; and (b) consider preparatory work for the treaty and see whether it supports this worrying interpretation. For example, if there were concerns about countries choosing to interpret the term ‘human rights’ as subordinating political rights to economic rights, it would be important to take note of the Secretary General’s emphasis on the &lt;a href="http://www.un.org/en/documents/udhr/index.shtml"&gt;UDHR&lt;/a&gt; being applicable to all member states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Initially, only the first insertion about ‘human rights obligations’ was part of the draft treaty. The second insertion, recognizing states’ rights followed after the discussion about human rights language. Some states argued that it was inconsistent to place human rights obligations on states towards their citizens, but to leave out their cross-border obligations. It was immediately after this text was voted into the draft, that the United States, the United Kingdom and other countries refused to sign the ITRs. This particular insertion is phrased as a right of states rather than that of individuals or citizens, which does not align with the language of international human rights. While it may not be strictly accurate to say that human rights have traditionally been individual centric (since collective rights are also recognized in certain contexts), it is certainly very unusual to treat the rights of states or governments as human rights.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Some highlights from the plenary session discussions&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States of America and the Netherlands wanted to include language to state explicitly that states’ international human rights obligations are not altered in anyway. This was to clarify that the inclusion of human rights language was not setting the ITU up as a forum in which human rights obligations are debated. Malaysia objected to the use of human rights language in the preamble right at the outset, on the grounds that the ITRs are the wrong place for this, and that the right place is the ITU Constitution. It even pointed to the fact that jurisprudence is ever-evolving, to suggest that the meaning of human rights obligations might change over time. These were the two major perspectives offered towards the beginning of the discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Chairman underlined the fact that the Universal Declaration of Human Rights is already applicable to all UN countries. He argued that reflection of these principles in the ITRs would help build universal public faith in the conference.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first traces of the states’ access rights can be seen in Cuba’s intervention at the ninth plenary – Cuba argued that limiting states’ access to public information networks amounted to infringement of human rights. At the fourteenth plenary, Nigeria proposed on behalf of the African group that the following text be added to the preamble “And recognize the right of access of all Member States to international telecommunication networks and services." Countries like China which had been ambivalent about the human rights language in the preamble, were happy with this move away from an individual-centric understanding of human rights, to one that sees states as representative of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The United States was express in its dissent, and said “human rights obligations go to the individual”. Sweden was also not happy with the proposal and argued that it moved away from well-established human rights language that affirmed existing commitments to drafting new human rights language.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was an amended version of the African group proposal that finally found its way into the preamble. It was supported by many countries such as China, Nigeria and Sudan, who took the position that group rights are included within human rights, and that governments represent their citizens and therefore have rights on their behalf. This position was strenuously disputed by states like the USA, Switzerland, United Kingdom and Canada.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs'&gt;https://cis-india.org/internet-governance/blog/five-faqs-on-amended-itrs&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WCIT</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2013-01-30T05:36:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/internet-democracy-richa-kaul-padte-jan-22-2013-cyber-security-surveillance-and-the-right-to-privacy">
    <title>Cyber security, surveillance and the right to privacy: country perspectives</title>
    <link>https://cis-india.org/news/internet-democracy-richa-kaul-padte-jan-22-2013-cyber-security-surveillance-and-the-right-to-privacy</link>
    <description>
        &lt;b&gt;This blog post is fourth in a series of eight blog posts to report on the “Third South Asian Meeting on the Internet and Freedom of Expression”  recently concluded in Dhaka, Bangladesh. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This post was published in the &lt;a class="external-link" href="http://www.internetdemocracy.in/2013/01/22/third-south-asian-meeting-on-the-internet-and-freedom-of-expression-blog-4/"&gt;Internet Democracy Project Website&lt;/a&gt; on January 22, 2013. &lt;i&gt;All the blog posts in this series are written by Richa Kaul Padte, the official rapporteur at the meeting. &lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;'The best way to protect people’s rights is to enable people to protect their rights themselves' – Chinmayi Arun&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img alt="Pranesh Prakash" class="wp-image-405 " height="100" src="http://www.internetdemocracy.in/wp-content/uploads/2013/01/IMG_2776-150x150.jpg" width="100" /&gt;&lt;br /&gt;Pranesh Prakash, CIS India&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Opening the session on cyber security, surveillance and privacy, moderator Pranesh Prakash from the &lt;a href="https://cis-india.org/" target="_blank"&gt;Centre for Internet and Society&lt;/a&gt; (India)  frames the debate by talking about how the principles raised by  discussions on security, privacy and surveillance are always in tension  with each other. ‘The boundaries that have been drawn in a pre-digital  era don’t apply online always [and] the classic model of  state-controlled surveillance is not as relevant [today].’&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Taking forward the discussion by setting both a global and national    framework around the issue, Assistant Professor at the Delhi-based &lt;a href="http://nludelhi.ac.in/" target="_blank"&gt;National Law University&lt;/a&gt; Chinmayi  Arun brings to light the ways in which cyber security is   consistently  tabled on several global agendas; however, with little to   no meaningful  parallel discussions around the right to privacy. She   also connects the  idea of surveillance to notions of censorship vis a   vis freedom  of expression, and poignantly states: ‘surveillance is a   lot more  insidious than censorship – [so much] more can take place   before people  realise it is happening.’ Prakash furthers this idea in   his  transition between country perspectives by highlighting the ways in    which surveillance measures are already established and heavily    pervasive, with both Prakash and Arun advocating greater transparency in    areas where these measures are in place. As Arun says, ‘it’s not true    that every instance of surveillance needs to be secret until it’s   done’,  and distinguishing between necessary surveillance measures (in   the case  of crime investigations, for example) and those that position   all  people as criminals who must be monitored, is key to taking the    discussion forward.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;&lt;img alt="Chinmayi Arun" class="wp-image-407 " height="108" src="http://www.internetdemocracy.in/wp-content/uploads/2013/01/IMG_2805-150x150.jpg" width="108" /&gt;&lt;/p&gt;
&lt;p style="text-align: left; "&gt;Chinmayi Arun, National Law University Delhi, India&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img alt="Mohammed Nazmuzzaman Bhuian" class="wp-image-406 " height="100" src="http://www.internetdemocracy.in/wp-content/uploads/2013/01/IMG_2784-150x150.jpg" width="100" /&gt;&lt;br /&gt;Mohammed Nazmuzzaman Bhuian, Dhaka University&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Mohammad Nazmuzzaman Bhuian, an Associate Professor from the &lt;a href="http://www.du.ac.bd//" target="_blank"&gt;University of Dhaka&lt;/a&gt;,   opens a Bangladeshi country perspective with the question, ‘how does a   cyber security act become a surveillance act?’ A cyber crime refers to   any crime that involves a computer or a network, and the crimes under   this can play out in two ways. The computer itself may be a target, or   it may be used to carry out a crime. It is when it is used to carry out  a  crime that the question of online surveillance arises&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Offering another perspective from Bangladesh, Head of the Centre for  IT  Security and Privacy and Assistant Professor, University of Asia   Pacific, Mohammad Shahriar Rahman, discusses the manipulation of   security and surveillance laws by the State in order to create greater   security for itself. He cites the ban of YouTube in the country in   response to a US-produced video ridiculing the Prophet Mohammed and the   attacks on bloggers who have advocated for free speech on the Internet,   including speech that may be anti-authoritarian or anti-religious.  These  examples echo Mariyath Mohamed’s perspectives on the interplay   between religion, politics and censorship from the previous session,   which clearly resound through many South Asian countries.&lt;/td&gt;
&lt;td&gt;&lt;img alt="Mohammad Shahriar Rahman, " class="wp-image-413 " height="100" src="http://www.internetdemocracy.in/wp-content/uploads/2013/01/IMG_2771-150x150.jpg" width="100" /&gt;&lt;br /&gt;Mohammad Shahriar Rahman, University of Asia Pacific, Bangladesh&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img alt="Kailash Prasad Neupane" class="wp-image-414 " height="100" src="http://www.internetdemocracy.in/wp-content/uploads/2013/01/IMG_2793-150x150.jpg" width="100" /&gt;&lt;br /&gt;
&lt;p class="wp-caption-text"&gt;Kailash Prasad Neupane, Nepal Telecommunications Authority&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Perspectives from Nepal, offered by speaker Kailash Prasad Neupane from the &lt;a href="http://www.nta.gov.np/" target="_blank"&gt;Nepal Telecommunications Authority&lt;/a&gt;,   highlight the acute similarities between the laws in different South   Asian countries, which all position the freedom of expression as   ‘subject to certain restrictions’, where the subjectivity of the clause   tends to be interpreted by a powerful and majority State against its   minority citizens, thus undermining both democracy and citizens’ rights.   As Rahman says, ‘if the government wants to be seen as democratic in   these times, they need to realise you can’t jail everyone who is   critical of the Prime Minister.’&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Speaking from the floor, Bishakha Datta, from Mumbai-based women’s media organisation &lt;a href="http://pointofview.org" target="_blank"&gt;Point of View&lt;/a&gt;,   expands on the speakers’ views by highlighting the ways in which,  given  the extensive measures of State security and surveillance,  societies  themselves become structured around a culture of surveillance  that  citizens in turn internalise and see as a necessary part of their   lives. She asks, ‘when we talk about the right to privacy, are we  saying  that we are willing to accept surveillance as long as our  privacy is  maintained, or are we opposing it on the grounds of  privacy?’ Echoing  Prakash’s idea that ‘the way in which security and  privacy are portrayed  as being at loggerheads is false’, Arun responds  to Datta by advocating  privacy as the starting point for  all discussions surrounding security.  In summary she states, ‘we must  underline our right to privacy,and that  right must always dominate. One  must always start with that right, and  then narrow the circumstances  in which, only when it is absolutely  necessary and to the extent  absolutely necessary, it may be violated.’  And it is through this  consistent demand for the right to privacy, and  the placing of citizens  and individuals (rather than the interests of  the State) at the heart  of these conversations, that we can see security  and privacy as  co-existing notions that work to ensure, rather than  suppress, freedom  of expression.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img alt="Bishakha Datta" class="wp-image-416 " height="105" src="http://www.internetdemocracy.in/wp-content/uploads/2013/01/IMG_2735-150x150.jpg" width="105" /&gt;&lt;br /&gt;Bishakha Datta, Point of View, India&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/internet-democracy-richa-kaul-padte-jan-22-2013-cyber-security-surveillance-and-the-right-to-privacy'&gt;https://cis-india.org/news/internet-democracy-richa-kaul-padte-jan-22-2013-cyber-security-surveillance-and-the-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-01-23T12:10:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
