<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 871 to 885.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-to-national-security-council-on-national-cybersecurity-strategy-2020"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-communications-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-proposed-amendments-to-the-consumer-protection-e-commerce-rules-2020"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-on-indea-2.0"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/comments-on-ecourts-phase-iii-3"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/ict-in-school-education"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/vidya-venkat-the-hindu-september-7-2014-colonial-yoke-or-bureaucratic-insouciance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ians-july-4-2014-coai-cis-to-hold-pan-india-meetings-on-privacy-issues"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/cloudy-jurisdiction-addressing-the-thirst-for-cloud-data-in-domestic-legeal-processes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019">
    <title> Comments to the Personal Data Protection Bill 2019</title>
    <link>https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019</link>
    <description>
        &lt;b&gt;The Personal Data Protection Bill, 2019 was introduced in the Lok Sabha on December 11, 2019. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Please view our general comments below, or download as PDF &lt;a href="https://cis-india.org/accessibility/blog/cis-general-comments-to-the-pdp-bill-2019" class="internal-link" title="CIS' General Comments to the PDP Bill 2019"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Our comments and recommendations can be downloaded as PDF &lt;a href="https://cis-india.org/accessibility/blog/cis-comments-pdp-bill-2019" class="internal-link" title="CIS Comments PDP Bill 2019"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;We have also prepared an annotated version of the Bill, where our detailed comments and recommendations can be viewed alongside the Bill, available as PDF &lt;a href="https://cis-india.org/accessibility/blog/annotated-ver-pdp-bill-2019" class="internal-link" title="Annotated ver PDP Bill 2019"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2&gt;General Comments&lt;/h2&gt;
&lt;h3&gt;1. Executive notification cannot abrogate fundamental rights &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;In 2017, the Supreme Court in K.S. Puttaswamy v Union of India [1] held the right to privacy to be a fundamental right. While this right is subject to reasonable restrictions, the restrictions have to meet a three fold requirement, namely (i) existence of a law; (ii) legitimate state aim; (iii) proportionality.Under the 2018 Bill, the exemption to government agencies for processing of personal data from the provisions of the Bill in the ‘interest of the security of the State’ [2] was subject to a law being passed by Parliament. However, under Clause 35 of the present Bill, the Central Government is merely required to pass a written order exempting the government agency from the provisions of the Bill.Any restriction on the right to privacy will have to comply with the conditions prescribed in Puttaswamy I. An executive order issued by the central government authorising any agency of the government to process personal data does not satisfy the first requirement laid down by the Supreme Court in Puttaswamy I — as it is not a law passed by Parliament. The Supreme Court while deciding upon the validity of Aadhar in K.S. Puttaswamy v Union of India [3] noted that “an executive notification does not satisfy the requirement of a valid law contemplated under Puttaswamy. A valid law in this case would mean a law passed by Parliament, which is just, fair and reasonable. Any encroachment upon the fundamental right cannot be sustained by an executive notification.”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;2. Exemptions under Clause 35 do not comply with the legitimacy and proportionality test&lt;/h3&gt;
&lt;p&gt;The lead judgement in Puttaswamy I while formulating the three fold test held that the restraint on privacy emanate from the procedural and content based mandate of Article 21 [4]. The Supreme Court in Maneka Gandhi v Union India [5] had clearly established that “mere prescription of some kind of procedure cannot ever meet the mandate of Article 21. The procedure prescribed by law has to be fair, just and reasonable, not fanciful,  oppressive and arbitrary” [6]. The existence of a law is the first requirement; the second requirement is that of ‘legitimate state aim’. As per the lead judgement this requirement ensures that “the nature and content of the law which imposes the restriction falls within the zone of reasonableness mandated by Article 14, which is  a guarantee against arbitrary state action” [7]. It is established that for a provision which confers upon the executive or administrative authority discretionary powers to be regarded as non-arbitrary, the provision should lay down clear and specific guidelines for the executive to exercise  the power [8]. The third test to be complied with is that the restriction should be ‘proportionate,’ i.e. the means that are adopted by the legislature are proportional to the object and needs sought to be fulfilled by the law. The Supreme Court in Modern Dental College &amp;amp; Research Centre v State of Madhya Pradesh [9] specified the components of proportionality standards —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;A measure restricting a right must have a legitimate goal;&lt;/li&gt;
&lt;li&gt;It must be a suitable means of furthering this goal;&lt;/li&gt;
&lt;li&gt;There must not be any less restrictive, but equally effective alternative; and&lt;/li&gt;
&lt;li&gt;The measure must not have any disproportionate impact on the right holder&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Clause 35 provides extensive grounds for the Central Government to exempt any agency from the requirements of the bill but does not specify the procedure to be followed by the agency while processing personal data under this provision. It merely states that the ‘procedure, safeguards and oversight mechanism to be followed’ will be prescribed in  the rules.The wide powers conferred on the central government without clearly specifying the procedure may be contrary to the three fold test laid down in Puttaswamy I, as it is difficult to ascertain whether a legitimate or proportionate objective is being fulfilled [10].&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;3. Limited powers of Data Protection Authority in comparison with the Central Government&lt;/h3&gt;
&lt;p&gt;In comparison with the last version of the Personal Data Protection Bill, 2018 prepared by the Committee of Experts led by Justice Srikrishna, we witness an abrogation of powers of the Data Protection Authority (Authority), to be created, in this Bill. The powers and functions that were originally intended to be performed by the Authority have now been allocated to the Central Government. For example:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;In the 2018 Bill, the Authority had the power to notify further categories of sensitive personal data. Under the present Bill, the Central Government in consultation with the sectoral regulators has been conferred the power to do so.&lt;/li&gt;
&lt;li&gt;Under the 2018 Bill, the Authority had the sole power to determine and notify significant data fiduciaries, however, under the present Bill, the Central Government has in consultation with the Authority been given the power to notify social media intermediaries as significant data fiduciaries.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;In order to govern data protection effectively, there is a need for a responsive market regulator with a strong mandate and resources. The political nature of the personal data also requires that the governance of data, particularly the rule-making and adjudicatory functions performed by the Authority are independent of the Executive.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;4. No clarity on data sandbox&lt;/h3&gt;
&lt;p&gt;The Bill contemplates a sandbox for “ innovation in artificial intelligence, machine-learning or any other emerging technology in public interest.” A Data Sandbox is a non-operational environment where the analyst can model and manipulate data inside the data management system. Data sandboxes have been envisioned as a secure area where only a copy of the company’s or participant companies’ data is located [11]. In essence, it refers to the scalable and creation platform which can be used to explore an enterprise’s information sets. On the other hand, regulatory sandboxes are controlled environments where firms can introduce innovations to a limited customer base within a relaxed regulatory framework, after which they may be allowed entry into the larger market after meeting certain conditions. This purportedly encourages innovation through the lowering of entry barriers by protecting newer entrants from unnecessary and burdensome regulation. Regulatory sandboxes can be interpreted as a form of responsive regulation by governments that seek to encourage innovation – they allow selected companies to experiment with solutions within an environment that is relatively free of most of the cumbersome regulations that they would ordinarily be subject to, while still subject to some appropriate safeguards and regulatory requirements. Sandboxes are regulatory tools which may be used to permit companies to innovate in the absence of heavy regulatory burdens. However, these ordinarily refer to burdens related to high barriers to entry (such as capital requirements for financial  and banking companies), or regulatory costs. In this Bill, however, the relaxing of data protection provisions for data fiduciaries would lead to restrictions of the privacy of individuals. Limitations to a fundamental rights on grounds of ‘fostering innovation’ is not a constitutional tenable position, and contradict the primary objectives of a data protection law.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;5. The primacy of ‘harm’ in the Bill ought to be reconsidered&lt;/h3&gt;
&lt;p&gt;While a harms based approach is necessary for data protection frameworks, such approaches should be restricted to the positive obligations, penal provisions and responsive regulation of the Authority. The Bill does not provide any guidance on either the interpretation of the term ‘harm,’ [12] or on the various activities covered within the definition of the term. Terms such as ‘loss of reputation or humiliation’ ‘any discriminatory treatment’ are a subjective standard and are open to varied interpretations. This ambiguity in the definition will make it difficult for the data principal to demonstrate harm and for the DPA to take necessary action as several provisions are based upon harm being caused or likely to be caused.Some of the significant provisions where ‘harm’ is a precondition for the provision to come into effect are —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Clause 25: Data Fiduciary is required to notify the Authority about the breach of personal data processed by the data fiduciary, if such breach is likely to cause harm to any data principal. The Authority after taking into account the severity of the harm that may be caused to the data principal will determine whether the data principal should be notified about the breach.&lt;/li&gt;
&lt;li&gt;Clause 32 (2): A data principal can file a complaint with the data fiduciary for a contravention of any of the provisions of the Act, which has caused or is likely to cause ‘harm’ to the data principal.&lt;/li&gt;&lt;li&gt;Clause 64 (1): A data principal who has suffered harm as a result of any violation of the provision of the Act by a data fiduciary, has the right to seek compensation from the data fiduciary.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Clause 16 (5): The guardian data fiduciary is barred from profiling, tracking or undertaking targeted advertising directed at children and undertaking any other processing of personal data that can cause significant harm to the child.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;6. Non personal data should be outside the scope of this Bill&lt;/h3&gt;
&lt;p&gt;Clause 91 (1) states that the Act does not prevent the Central Government from framing a policy for the digital economy, in so far as such policy does not govern personal data. The Central Government can, in consultation with the Authority, direct any data fiduciary  to provide any anonymised personal data or other non-personal data to enable better targeting of delivery of services or formulation of evidence based policies in any manner as may be prescribed.It is concerning that the data protection bill has specifically carved out an exception for the Central Government to frame policies for the digital economy and seems to indicate that the government plans to freely use any and all anonymized and/or non-personal data that rests with any data fiduciary that falls under the ambit of the bill to support the digital economy including for its growth, security, integrity, and prevention of misuse. It is unclear how the government, in practice, will be able to compel organizations to share this data. Further, there is a lack of clarity on the contours of the definition of non-personal data and the Bill does not define the term. It is also unclear whether the Central Government can compel the data fiduciary to transfer/share all forms of non-personal data and the rights and obligations of the data fiduciaries and data principals over such forms of data. Anonymised data refers to data which has ‘ irreversibly’ been converted into a form in which the data principal cannot be identified. However, as several instances have shown ‘ irreversible’ anonymisation is not possible. In the United States, the home addresses of taxi drivers were uncovered and in Australia individual health records were mined from anonymised medical bills [13]. In September 2019, the Ministry of Electronics and Information Technology, constituted an expert committee under the chairmanship of Kris Gopalkrishnan to study various issues relating to non-personal data and to deliberate over a data governance framework for the regulation of such data.The provision should be deleted and the scope of the bill should be limited to protection of personal data and to provide a framework for the protection of individual privacy. Until the report of the expert committee is published, the Central Government should not frame any law/regulation on the access and monetisation of non-personal/ anonymised data nor can they create a blanket provision allowing them to request such data from any data fiduciary that falls within the ambit of the bill. If the government wishes to use data resting with a data fiduciary; it must do so on a case to case basis and under formal and legal agreements with each data fiduciary.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;7. Steps towards greater decentralisation of power&lt;/h3&gt;
&lt;p&gt;We propose the following steps towards greater decentralisation of powers and devolved jurisdiction —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Creation of State Data Protection Authorities: A single centralised body may not be the appropriate form of such a regulator. We propose that on the lines of central and state commissions under the Right to Information Act, 2005, state data protection authorities are set up which are in a position to respond to local complaints and exercise jurisdiction over entities within their territorial jurisdictions.&lt;/li&gt;
&lt;li&gt;More involvement of industry bodies and civil society actors: In order to lessen the burden on the data protection authorities it is necessary that there is active engagement with industry bodies, sectoral regulators and civil society bodies engaged in privacy research. Currently, the Bill provides for involvement of industry or trade association, association representing the interests of data principals, sectoral regulator or statutory Authority, or an departments or ministries of the Central or State Government in the formulation of codes of practice. However, it would be useful to also have a more active participation of industry associations and civil society bodies in activities such as promoting  awareness among data fiduciaries of their obligations under this Act, promoting measures and undertaking research for innovation in the field of protection of personal data.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;8. The Authority must be empowered to exercise responsive regulation&lt;/h3&gt;
&lt;p&gt;In a country like India, the challenge is to move rapidly from a state of little or no data protection law, and consequently an abysmal state of data privacy practices to a strong data protection regulation and a powerful regulator capable of enabling a state of robust data privacy practices. This requires a system of supportive mechanisms to the stakeholders in the data ecosystem, as well as systemic measures which enable the proactive detection of breaches. Further, keeping in mind the limited regulatory capacity in India, there is a need for the Authority to make use of different kinds of inexpensive and innovative strategies.We recommend the following additional powers for the Authority to be clearly spelt out in the Bill —&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Informal Guidance: It would be useful for the Authority to set up a mechanism on the lines of the Security and Exchange Board of India (SEBI)’s Informal Guidance Scheme, which enables regulated entities to approach the Authority for non-binding advice on the position of law. Given that this is the first omnibus data protection law in India, and there is very little jurisprudence on the subject from India, it would be extremely useful for regulated entities to get guidance from  the regulator.&lt;/li&gt;
&lt;li&gt;Power to name and shame: When a DPA makes public the names of organisations that have seriously contravened data protection legislation, this is a practice known as “naming and shaming.”  The UK ICO and other DPAs recognise the power of publicity, as evidenced by their willingness to co-operate  with the media. The ICO does not simply post monetary penalty notices (MPNs or fines) on its websites for journalists to find, but frequently issues press releases, briefs journalists and uses social media. The ICO’s publicity statement on communicating enforcement activities states that the “ICO aims to get media coverage for  enforcement activities.”&lt;/li&gt;
&lt;li&gt;Undertakings: The UK ICO has also leveraged the threats of fines into an alternative enforcement mechanism seeking contractual undertakings from data controllers to take certain remedial steps. Undertakings have significant advantages for the regulator. Since an undertaking is a more “co-operative”solution, it is less likely that a data controller will change it. An undertaking is simpler and easier to put in place. Furthermore, the Authority can put an undertaking in place quickly as opposed to legal proceedings which are longer.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;9. No clear roadmap for the implementation of the Bill&lt;/h3&gt;
&lt;p&gt;The 2018 Bill had specified a roadmap for the different provisions of the Bill to come into effect from the date of the Act being notified [14]. It specifically stated the time period within which the Authority had to be established and the subsequent rules and regulations notified.The present Bill does not specify any such blueprint; it does not provide any details on either when the Bill will be notified or the time period within within which the Authority shall be established and specific rules and regulations notified. Considering that 25 provisions have been deferred to rules that have to be framed by the Central Government and a further 19 provisions have been deferred to the regulations to be notified by the Authority the absence and/or delayed notification of such rules and regulations will impact the effective functioning of the Bill.The absence of any sunrise or sunset provision may disincentivise political or industrial will to support or enforce the provisions of the Bill. An example of such a lack of political will was the establishment of the Cyber Appellate Tribunal. The tribunal was established in 2006 to redress cyber fraud. However, it was virtually a defunct body from 2011 onwards when the last chairperson retired. It was eventually merged with the Telecom Dispute Settlement and Appellate Tribunal in 2017.We recommend that Bill clearly lays out a time period for the implementation of the different provisions of the Bill, especially a time frame for the establishment of the Authority. This is important to give full and effective effect to the right of privacy of the &lt;br /&gt;individual. It is also important to ensure that individuals have an effective mechanism  to enforce the right and seek recourse in case of any breach of obligations by the  data fiduciaries.For offences, we suggest a system of mail boxing where provisions and punishments are enforced in a staggered manner, for a period till the fiduciaries are aligned with the provisions of the Act. The Authority must ensure that data principals and fiduciaries have sufficient awareness of the provisions of this Bill before bringing the provisions for punishment are brought into force. This will allow the data fiduciaries to align their practices with the provisions of this new legislation and the Authority will also have time to define and determine certain provisions that the Bill has left the Authority to define. Additionally enforcing penalties for offences initially must be in a staggered process, combined with provisions such as warnings, in order to allow first time and mistaken offenders from paying a high price. This will relieve the fear of smaller companies and startups who might fear processing data for the fear of paying penalties for offences.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;10. Lack of interoperability&lt;/h3&gt;
&lt;p&gt;In its current form, a number of the provisions in the Bill will make it difficult for India’s framework to be interoperable with other frameworks globally and in the region. For example, differences between the draft Bill and the GDPR can be found in the grounds for processing,&amp;nbsp; data localization frameworks, the framework for cross border transfers, definitions of sensitive personal data, inclusion of&amp;nbsp; the undefined category of ‘critical&amp;nbsp; data’, and the roles of the authority and the central government.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;11. Legal Uncertainty&lt;/h3&gt;
&lt;p&gt;In its current structure, there are a number of provisions in the Bill that, when implemented, run the risk of creating an environment of legal uncertainty. These include: lack of definition of critical data, lack of clarity in the interpretation of the terms ‘harm’ and ‘significant harm’, ability of the government to define further categories of sensitive personal data,&amp;nbsp; inclusion of requirements for ‘social media intermediaries’, inclusion of ‘non-personal data’, framing of the requirements for data transfers, bar on processing of certain forms of biometric data as defined by the Central Government, the functioning between a consent manager and another data fiduciary, the inclusion of an AI sandbox and the definition of state. To ensure the greatest amount of protection of individual privacy rights and the protection of personal data while also enabling innovation, it is important that any data protection framework is structured and drafted in a way to provide as much legal certainty as possible.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Endnotes&lt;/h3&gt;
&lt;p&gt;1. (2017) 10 SCC 641 (“Puttaswamy I”).&lt;/p&gt;
&lt;p&gt;2. Clause 42(1) of the 2018 Bill states that “Processing of personal data in the interests of the security of the State shall not be permitted unless it is authorised pursuant to a law, and is in accordance with the procedure established by such law, made by Parliament and is necessary for, and proportionate to such interests being achieved.”&lt;/p&gt;
&lt;p&gt;3. (2019) 1 SCC 1 (“Puttaswamy II”)&lt;/p&gt;
&lt;p&gt;4. Puttaswamy I, supra, para 180.&lt;/p&gt;
&lt;p&gt;5. (1978) 1 SCC 248.&lt;/p&gt;
&lt;p&gt;6. Ibid para 48.&lt;/p&gt;
&lt;p&gt;7. Puttaswamy I supra para 180.&lt;/p&gt;
&lt;p&gt;8. State of W.B. v. Anwar Ali Sarkar, 1952 SCR 284; Satwant Singh Sawhney v A.P.O AIR 1967 SC1836.&lt;/p&gt;
&lt;p&gt;9. (2016)7 SCC 353.&lt;/p&gt;
&lt;p&gt;10. Dvara Research “Initial Comments of Dvara Research dated 16 January 2020 on the Personal Data Protection Bill, 2019 introduced in Lok Sabha on 11 December 2019”, January 2020, https://www.dvara.com/blog/2020/01/17/our-initial-comments-on-the-personal-data-protection-bill-2019/ (“Dvara Research”).&lt;/p&gt;
&lt;p&gt;11. “A Data Sandbox for Your Company”, Terrific Data, last accessed on January 31, 2019, http://terrificdata.com/2016/12/02/3221/.&lt;/p&gt;
&lt;p&gt;12. Clause 3(20) — “harm” includes (i) bodily or mental injury; (ii) loss, distortion or theft of identity; (ii) financial loss or loss of property; (iv) loss of reputation or humiliation; (v) loss of employment; (vi) any discriminatory treatment; (vii) any subjection to blackmail or extortion; (viii) any denial or withdrawal of service,benefit or good resulting from an evaluative decision about the data principal; (ix) any restriction placed or suffered directly or indirectly on speech, movement or any other action arising out of a fear of being observed or surveilled; or (x) any observation or surveillance that is not reasonably expected by the data principal.&lt;/p&gt;
&lt;p&gt;13. Alex Hern “Anonymised data can never be totally anonymous, says study”, July 23, 2019 https://www.theguardian.com/technology/2019/jul/23/anonymised-data-never-be-anonymous-enough-study-finds.&lt;/p&gt;
&lt;p&gt;14. Clause 97 of the 2018 Bill states“(1) For the purposes of this Chapter, the term ‘notified date’ refers to the date notified by the Central Government under sub-section (3) of section 1. (2)The notified date shall be any date within twelve months from the date of enactment of this Act. (3)The following provisions shall come into force on the notified date-(a) Chapter X; (b) Section 107; and (c) Section 108. (4)The Central Government shall, no later than three months from the notified date establish the Authority. (5)The Authority shall, no later than twelve months from the notified date notify the grounds of processing of personal data in respect of the activities listed in sub-section (2) of section 17. (6)The Authority shall no, later than twelve months from the date notified date issue codes of practice on the following matters-(a) notice under section 8; (b) data quality under section 9; (c) storage limitation under section 10; (d) processing of personal data under Chapter III; (e) processing of sensitive personal data under Chapter IV; (f ) security safeguards under section 31; (g) research purposes under section 45; (h) exercise of data principal rights under Chapter VI; (i) methods of de-identification and anonymisation; (j) transparency and accountability measures under Chapter VII. (7)Section 40 shall come into force on such date as is notified by the Central Government for the purpose of that section.(8)The remaining provision of the Act shall come into force eighteen months from the notified date.”&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019'&gt;https://cis-india.org/internet-governance/blog/comments-to-the-personal-data-protection-bill-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Elonnai Hickok, Pallavi Bedi, Shweta Mohandas, Tanaya Rajwade</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2020-02-21T10:13:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019">
    <title>Comments to The PDP Bill 2019</title>
    <link>https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019'&gt;https://cis-india.org/internet-governance/comments-to-the-pdp-bill-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>akash</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-02-12T11:52:11Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-to-national-security-council-on-national-cybersecurity-strategy-2020">
    <title>Comments to National Security Council on National Cybersecurity Strategy 2020</title>
    <link>https://cis-india.org/internet-governance/blog/comments-to-national-security-council-on-national-cybersecurity-strategy-2020</link>
    <description>
        &lt;b&gt;CIS submitted brief  comments to the National Security Council on the National Cybersecurity Strategy within the 5000 character limit provided. CIS will continue producing outputs building on these ideas.&lt;/b&gt;
        
&lt;h2&gt;Approach and Key Principles:&lt;/h2&gt;
&lt;h2&gt;&lt;/h2&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;India’s 2020 strategy will need to account for key vectors that have come to define cyberspace including:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Increased power held by non-state actors - both private corporations and terrorist groups&lt;/li&gt;&lt;li&gt;Augmented capacity of states to use cyberspace as a tool of external power projection-both through asymmetric warfare, and alleged interference via the spread of misinformation&lt;/li&gt;&lt;li&gt;The  progression of norms formulation processes in cyberspace that have failed to attain consensus due to disagreement on the application of specific standards of International Law to cyberspace.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The 2020 framework should&amp;nbsp; be grounded in:&lt;/div&gt;
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Legality&lt;/strong&gt;: Capabilities, measures, and processes for cyber security must be&amp;nbsp; legally defined and backed.&amp;nbsp; &lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Necessity and Proportionality&lt;/strong&gt;: Any measure taken for the purpose of&amp;nbsp; ‘cyber security’ that might have implications for fundamental rights&amp;nbsp; must be necessary, and proportionate to the infringement.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Transparency&lt;/strong&gt;: Transparency must be a key principle with clear standards to resolve&amp;nbsp; situations where there is a conflict of interests. &lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Accountability and Oversight: Capabilities&lt;/strong&gt;, measures and processes must be held accountable through capable and funded bodies and mechanisms. &lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Human Rights&lt;/strong&gt;:&amp;nbsp; Security of the individual, the community, society, and the nation must be achieved through through promoting a ‘feeling of being secure’ that must stem from a rights-respecting framework.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Free and fair digital economy&lt;/strong&gt;: Pursue both domestic and geo-strategic policies and actions that enable a free and fair digital economy.&amp;nbsp;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The strategy should be based on the following:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Evidence based&lt;/strong&gt;: Regular audits of the state of cyber security in India to inform action and policy.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Appropriate metrics:&lt;/strong&gt; Key metrics are needed to measure, track, and communicate&amp;nbsp; cyber security in India. &lt;/li&gt;&lt;li&gt;&lt;strong&gt;Funding:&lt;/strong&gt; Funding for cyber security needs to be built into the budget.&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h2&gt;Pillars of Strategy&lt;/h2&gt;
&lt;h3&gt;Secure &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Key Defensive Measures: &lt;/strong&gt;Technical defense measures such as:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Testing and auditing of hardware and software&lt;/li&gt;&lt;li&gt;Identification of threat intelligence vectors and existing vulnerabilities, particularly in systems designated as Critical Information Infrastructure (CII)&lt;/li&gt;&lt;li&gt;Outline scenarios in which retaliatory operations may be taken and their nature,scope and limits&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Designing a credible deterrence strategy, &lt;/strong&gt;which includes:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Articulation of the nature, scale and permissible limits of retaliatory or escalatory measures undertaken AND&lt;/li&gt;&lt;li&gt;An exposition of how this matches with&amp;nbsp; the application of key tenets of International Law in cyberspace&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&lt;strong&gt;Offensive Measures: &lt;/strong&gt;If India pursues cyber offensive capabilities, this must be done in accordance with the principles&amp;nbsp; articulated above. This includes ensuring that the surveillance regime in India is inline with international human rights norms.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Emerging Technologies&lt;/strong&gt;: Emerging technologies must meet high security standards before they are scaled and deployed.&amp;nbsp; Creation of sandboxes should not be an exception.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Developing attribution capabilities&lt;/strong&gt;: If India pursues attribution capabilities,&amp;nbsp; this must be through multi-stakeholder collaboration, should not risk military escalation, and must demonstrate compliance with evidentiary requirements of Indian criminal law and requirements in International Law on State Responsibility.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Process for response&lt;/strong&gt;: Define clear roles for the response protocol to a cyber attack including detection, mitigation and response.&lt;/p&gt;
&lt;h3&gt;Strengthen&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Regulatory Requirements&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Legal and Technical Security Standards: Develop harmonised and robust legal and technical security standards across sectors for crucial issues - encryption and breach notifications etc. Promote industry wide adoption of standards developed by BIS and encourage participation at standard setting fora.&lt;/li&gt;&lt;li&gt;Cross border sharing of data: Focus on a solution to the MLAT process - potentially including the negotiation of an executive agreement under the CLOUD Act.&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;Coordinated Vulnerability Disclosure&lt;/strong&gt;: Improve the processes for disclosing security vulnerabilities to the Government by stakeholders outside the government.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Incentives&lt;/strong&gt;: Develop incentives for strong cyber security practices such as cyber insurance programmes, certifications and seals, and tax incentives.&amp;nbsp;&lt;/p&gt;
&lt;/div&gt;
&lt;p&gt;&lt;strong&gt;Education and End User Awareness&lt;/strong&gt;: Develop solutions to aid users to understand and manage their digital security.&lt;/p&gt;
&lt;div&gt;
&lt;p&gt;&lt;strong&gt;Harmonization and interoperability&lt;/strong&gt;: Harmonize legislation, legal provisions, and department mandates and processes related to cyber security.&lt;/p&gt;
&lt;h3&gt;Synergise&lt;/h3&gt;
&lt;p&gt;Engage in processes at the regional and global level to prevent potential misunderstandings, define shared understandings, and identify areas of collaboration. This can take place through:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Norms&lt;/strong&gt;: Clarify India’s understanding of the applicability of international law to cyber space and engage in norms processes and contribute to the articulation of&amp;nbsp; a development dimension for cyber norms.&lt;/li&gt;&lt;li&gt;&lt;strong&gt;CBMs&lt;/strong&gt;: Focus on political and legal&amp;nbsp; measures around transparency, cooperation, and stability in the region and globally. &lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div class="pullquote"&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-to-national-security-council-on-national-cybersecurity-strategy-2020'&gt;https://cis-india.org/internet-governance/blog/comments-to-national-security-council-on-national-cybersecurity-strategy-2020&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Arindrajit Basu</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2020-01-13T09:18:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10">
    <title>Comments on the Draft Outcome Document of the UN General Assembly’s Overall Review of the Implementation of WSIS Outcomes (WSIS+10)</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10</link>
    <description>
        &lt;b&gt;Following the comment-period on the Zero Draft, the Draft Outcome Document of the UN General Assembly's Overall Review of implementation of WSIS Outcomes was released on 4 November 2015. Comments were sought on the Draft Outcome Document from diverse stakeholders. The Centre for Internet &amp; Society's response to the call for comments is below.&lt;/b&gt;
        &lt;p class="Normal1" style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p class="Normal1" style="text-align: justify; "&gt;The WSIS+10 Overall Review of the Implementation of WSIS Outcomes, scheduled for December 2015, comes as a review of the WSIS process initiated in 2003-05. At the December summit of the UN General Assembly, the WSIS vision and mandate of the IGF are to be discussed. The Draft Outcome Document, released on 4 November 2015, is towards an outcome document for the summit. Comments were sought on the Draft Outcome Document. Our comments are below.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The Draft Outcome Document of the UN General Assembly’s Overall Review of the Implementation of WSIS Outcomes (“&lt;i&gt;the current Draft&lt;/i&gt;”) stands considerably altered from the Zero Draft. With references to development-related challenges, the Zero Draft covered areas of growth and challenges of the WSIS. It noted the persisting digital divide, the importance of innovation and investment, and of conducive legal and regulatory environments, and the inadequacy of financial mechanisms. Issues crucial to Internet governance such as net neutrality, privacy and the mandate of the IGF found mention in the Zero Draft.&lt;/li&gt;
&lt;li&gt;The current Draft retains these, and adds to them. Some previously-omitted issues such as surveillance, the centrality of human rights and the intricate relationship of ICTs to the Sustainable Development Goals, now stand incorporated in the current Draft. This is most commendable. However, the current Draft still lacks teeth with regard to some of these issues, and fails to address several others. &lt;/li&gt;
&lt;li&gt;In our comments to the Zero Draft, CIS had called for these issues to be addressed. We reiterate our call in the following paragraphs.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;strong&gt;(1) &lt;/strong&gt;&lt;strong&gt;ICT for Development&lt;/strong&gt;&lt;/h2&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;In the current Draft, paragraphs 14-36 deal with ICTs for development. While the draft contains rubrics like ‘Bridging the digital divide’, ‘Enabling environment’, and ‘Financial mechanisms’, the following issues are unaddressed:&lt;/li&gt;
&lt;li&gt;Equitable development for all;&lt;/li&gt;
&lt;li&gt;Accessibility to ICTs for persons with disabilities;&lt;/li&gt;
&lt;li&gt;Access to knowledge and open data.&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Equitable development&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;In the &lt;a class="external-link" href="http://www.itu.int/net/wsis/docs/geneva/official/dop.html"&gt;Geneva Declaration of Principles&lt;/a&gt; (2003), two goals are set forth as the Declaration’s “ambitious goal”: (a) the bridging of the digital divide; and (b) equitable development for all (¶ 17). The current Draft speaks in detail about the bridging of the digital divide, but the goal of equitable development is conspicuously absent. At WSIS+10, when the WSIS vision evolves to the creation of inclusive ‘knowledge societies’, equitable development should be both a key principle and a goal to stand by.&lt;/li&gt;
&lt;li&gt;Indeed, inequitable development underscores the persistence of the digital divide. The current Draft itself refers to several instances of inequitable development; for ex., the uneven production capabilities and deployment of ICT infrastructure and technology in developing countries, landlocked countries, small island developing states, countries under occupation or suffering natural disasters, and other vulnerable states; lack of adequate financial mechanisms in vulnerable parts of the world; variably affordable (or in many cases, unaffordable) spread of ICT devices, technology and connectivity, etc. &lt;/li&gt;
&lt;li&gt;What underscores these challenges is the inequitable and uneven spread of ICTs across states and communities, including in their production, capacity-building, technology transfers, gender-concentrated adoption of technology, and inclusiveness. &lt;/li&gt;
&lt;li&gt;As such, it is essential that the WSIS+10 Draft Outcome Document reaffirm our commitment to equitable development for all peoples, communities and states.&lt;/li&gt;
&lt;li&gt;We suggest the following inclusion to &lt;strong&gt;paragraph 5 of the current Draft&lt;/strong&gt;:&lt;/li&gt;
&lt;/ol&gt; 
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;&lt;span style="text-align: justify; "&gt;“5. We reaffirm our common desire and commitment to the WSIS vision to build &lt;/span&gt;&lt;i style="text-align: justify; "&gt;&lt;span&gt;an equitable,&lt;/span&gt;&lt;/i&gt;&lt;span style="text-align: justify; "&gt; people-centred, inclusive, and development-oriented Information Society…”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Accessibility for persons with disabilities&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;10. Paragraph 13 of the Geneva Declaration of Principles (2003) pledges to “pay particular attention to the special needs of marginalized and vulnerable groups of society” in the forging of an Information Society. Particularly, ¶ 13 recognises the special needs of older persons and persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;11. Moreover, ¶ 31 of the Geneva Declaration of Principles calls for the special needs of persons with disabilities, and also of disadvantaged and vulnerable groups, to be taken into account while promoting the use of ICTs for capacity-building. Accessibility for persons with disabilities is thus core to bridging the digital divide – as important as bridging the gender divide in access to ICTs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;12. Not only this, but the &lt;a class="external-link" href="http://www.itu.int/net/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;WSIS+10 Statement on the Implementation of WSIS Outcomes&lt;/a&gt; (June 2014) also reaffirms the commitment to “provide equitable access to information and knowledge for all… including… people with disabilities”, recognizing that it is “crucial to increase the participation of vulnerable people in the building process of Information Society…” (¶8).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;13. In our previous submission, CIS had suggested language drawing attention to this. Now, the current Draft only acknowledges that “particular attention should be paid to the specific ICT challenges facing… persons with disabilities…” (paragraph 11). It acknowledges also that now, accessibility for persons with disabilities constitutes one of the core elements of quality (paragraph 22). However, there is a glaring omission of a call to action, or a reaffirmation of our commitment to bridging the divide experienced by persons with disabilities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;14. We suggest, therefore, the addition of the following language the addition of &lt;strong&gt;paragraph 24A to the current Draft&lt;/strong&gt;. Sections of this suggestion are drawn from ¶8, WSIS+10 Statement on the Implementation of WSIS Outcomes.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"24A. &lt;span style="text-align: justify; "&gt;Recalling the UN Convention on the rights of people with disabilities, the Geneva principles paragraph 11, 13, 14 and 15, Tunis Commitment paras 20, 22 and 24, and reaffirming the commitment to providing equitable access to information and knowledge for all, building ICT capacity for all and confidence in the use of ICTs by all, including youth, older persons, women, indigenous and nomadic peoples, people with disabilities, the unemployed, the poor, migrants, refugees and internally displaced people and remote and rural communities, it is crucial to increase the participation of vulnerable people in the building process of information Society and to make their voice heard by stakeholders and policy-makers at different levels. It can allow the most fragile groups of citizens worldwide to become an integrated part of their economies and also raise awareness of the target actors on the existing ICTs solution (such as tolls as e- participation, e-government, e-learning applications, etc.) designed to make their everyday life better. We recognise need for continued extension of access for people with disabilities and vulnerable people to ICTs, especially in developing countries and among marginalized communities, and reaffirm our commitment to promoting and ensuring accessibility for persons with disabilities. In particular, we call upon all stakeholders to honour and meet the targets set out in Target 2.5.B of the Connect 2020 Agenda that enabling environments ensuring accessible telecommunication/ICT for persons with disabilities should be established in all countries by 2020.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Access to knowledge and open data&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;15. The Geneva Declaration of Principles dedicates a section to access to information and knowledge (B.3). It notes, in ¶26, that a “rich public domain” is essential to the growth of Information Society. It urges that public institutions be strengthened to ensure free and equitable access to information (¶26), and also that assistive technologies and universal design can remove barriers to access to information and knowledge (¶25). Particularly, the Geneva Declaration advocates the use of free and open source software, in addition to proprietary software, to meet these ends (¶27).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;16. It was also recognized in the WSIS+10 Statement on the Implementation of WSIS Outcomes (‘Challenges-during implementation of Action Lines and new challenges that have emerged’) that there is a need to promote access to all information and knowledge, and to encourage open access to publications and information (C, ¶¶9 and 12).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;17. In our previous submission, CIS had highlighted the importance of open access to knowledge thus: “…the implications of open access to data and knowledge (including open government data), and responsible collection and dissemination of data are much larger in light of the importance of ICTs in today’s world. As Para 7 of the Zero Draft indicates, ICTs are now becoming an indicator of development itself, as well as being a key facilitator for achieving other developmental goals. As Para 56 of the Zero Draft recognizes, in order to measure the impact of ICTs on the ground – undoubtedly within the mandate of WSIS – it is necessary that there be an enabling environment to collect and analyse reliable data. Efforts towards the same have already been undertaken by the United Nations in the form of ‘Data Revolution for Sustainable Development’. In this light, the Zero Draft rightly calls for enhancement of regional, national and local capacity to collect and conduct analyses of development and ICT statistics (Para 56). Achieving the central goals of the WSIS process requires that such data is collected and disseminated under open standards and open licenses, leading to creation of global open data on the ICT indicators concerned.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;18. This crucial element is missing from the current Draft of the WSIS+10 Outcome Document. Of course, the current Draft notes the importance of access to information and free flow of data. But it stops short of endorsing and advocating the importance of access to knowledge and free and open source software, which are essential to fostering competition and innovation, diversity of consumer/ user choice and ensuring universal access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;19. We suggest the following addition – of &lt;strong&gt;paragraph 23A to the current Draft&lt;/strong&gt;:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"23A. &lt;span style="text-align: justify; "&gt;We recognize the need to promote access for all to information and knowledge, open data, and open, affordable, and reliable technologies and services, while respecting individual privacy, and to encourage open access to publications and information, including scientific information and in the research sector, and particularly in developing and least developed countries.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;strong&gt;(2) &lt;/strong&gt;&lt;strong&gt;Human Rights in Information Society&lt;/strong&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;20. The current Draft recognizes that human rights have been central to the WSIS vision, and reaffirms that rights offline must be protected online as well. However, the current Draft omits to recognise the role played by corporations and intermediaries in facilitating access to and use of the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;21. In our previous submission, CIS had noted that “the Internet is led largely by the private sector in the development and distribution of devices, protocols and content-platforms, corporations play a major role in facilitating – and sometimes, in restricting – human rights online”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;22. We reiterate our suggestion for the inclusion of &lt;strong&gt;paragraph 43A to the current Draft&lt;/strong&gt;:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"43A. &lt;span style="text-align: justify; "&gt;We recognize the critical role played by corporations and the private sector in facilitating human rights online. We affirm, in this regard, the responsibilities of the private sector set out in the Report of the Special Representative of the Secretary General on the issue of human rights and transnational corporations and other business enterprises, A/HRC/17/31 (21 March 2011), and encourage policies and commitments towards respect and remedies for human rights.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;strong&gt;(3) &lt;/strong&gt;&lt;strong&gt;Internet&lt;/strong&gt; &lt;strong&gt;Governance&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;The support for multilateral governance of the Internet&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;23. While the section on Internet governance is not considerably altered from the zero draft, there is a large substantive change in the current Draft. The current Draft states that the governance of the Internet should be “multilateral, transparent and democratic, with full involvement of all stakeholders” (¶50). Previously, the zero draft recognized the “the general agreement that the governance of the Internet should be open, inclusive, and transparent”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;24. A return to purely ‘multilateral’ Internet governance would be regressive. Governments are, without doubt, crucial in Internet governance. As scholarship and experience have both shown, governments have played a substantial role in shaping the Internet as it is today: whether this concerns the availability of content, spread of infrastructure, licensing and regulation, etc. However, these were and continue to remain contentious spaces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;25. As such, it is essential to recognize that a plurality of governance models serve the Internet, in which the private sector, civil society, the technical community and academia play important roles. &lt;strong&gt;We recommend returning to the language of the zero draft in ¶32: “open, inclusive and transparent governance of the Internet”.&lt;/strong&gt;&lt;/p&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Governance of Critical Internet Resources&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;26. It is curious that the section on Internet governance&lt;strong&gt; &lt;/strong&gt;in both the zero and the current Draft makes no reference to ICANN, and in particular, to the ongoing transition of IANA stewardship and the discussions surrounding the accountability of ICANN and the IANA operator. The stewardship of critical Internet resources, such as the root, is crucial to the evolution and functioning of the Internet. Today, ICANN and a few other institutions have a monopoly over the management and policy-formulation of several critical Internet resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;27. While the WSIS in 2003-05 considered this a troubling issue, this focus seems to have shifted entirely. Open, inclusive, transparent and &lt;i&gt;global&lt;/i&gt; Internet are misnomer-principles when ICANN – and in effect, the United States – continues to have monopoly over critical Internet resources. The allocation and administration of these resources should be decentralized and distributed, and should not be within the disproportionate control of any one jurisdiction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;28. Therefore, we reiterate our suggestion to add &lt;strong&gt;&lt;span&gt;paragraph 53A&lt;/span&gt;&lt;/strong&gt; after Para 53:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"53A. &lt;span style="text-align: justify; "&gt;We affirm that the allocation, administration and policy involving critical Internet resources must be inclusive and decentralized, and call upon all stakeholders and in particular, states and organizations responsible for essential tasks associated with the Internet, to take immediate measures to create an environment that facilitates this development.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;&lt;i&gt;&lt;span&gt;Inclusiveness and Diversity in Internet Governance&lt;/span&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;29. The current Draft, in ¶52, recognizes that there is a need to “promote greater participation and engagement in Internet governance of all stakeholders…”, and calls for “stable, transparent and voluntary funding mechanisms to this end.” This is most commendable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30. The issue of inclusiveness and diversity in Internet governance is crucial: today, Internet governance organisations and platforms suffer from a lack of inclusiveness and diversity, extending across representation, participation and operations of these organisations. As CIS submitted previously, the mention of inclusiveness and diversity becomes tokenism or formal (but not operational) principle in many cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;31. As we submitted before, the developing world is pitifully represented in standards organisations and in ICANN, and policy discussions in organisations like ISOC occur largely in cities like Geneva and New York. For ex., 307 out of 672 registries listed in ICANN’s registry directory are based in the United States, while 624 of the 1010 ICANN-accredited registrars are US-based.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;32. Not only this, but 80% of the responses received by ICANN during the ICG’s call for proposals were male. A truly global and open, inclusive and transparent governance of the Internet must not be so skewed. Representation must include not only those from developing countries, but must also extend across gender and communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;33. We propose, therefore, the addition of a &lt;strong&gt;&lt;span&gt;paragraph 51A&lt;/span&gt;&lt;/strong&gt; after Para 51:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th style="text-align: justify; "&gt;&lt;span&gt;"51A. &lt;span style="text-align: justify; "&gt;We draw attention to the challenges surrounding diversity and inclusiveness in organisations involved in Internet governance, including in their representation, participation and operations. We note with concern that the representation of developing countries, of women, persons with disabilities and other vulnerable groups, is far from equitable and adequate. We call upon organisations involved in Internet governance to take immediate measures to ensure diversity and inclusiveness in a substantive manner.”&lt;/span&gt;&lt;/span&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;hr size="1" style="text-align: justify; " width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;Prepared by Geetha Hariharan, with inputs from Sunil Abraham and Japreet Grewal. All comments submitted towards the Draft Outcome Document may be found &lt;a class="external-link" href="http://unpan3.un.org/wsis10/Preparatory-Process-Roadmap/Comments-on-Draft-Outcome-Document"&gt;at this link&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-draft-outcome-document-of-the-un-general-assembly2019s-overall-review-of-the-implementation-of-wsis-outcomes-wsis-10&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>ICT4D</dc:subject>
    
    
        <dc:subject>Call for Comments</dc:subject>
    
    
        <dc:subject>WSIS+10</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Open Source</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2015-11-18T06:33:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-communications-policy">
    <title>Comments on the Draft Digital Communications Policy</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-communications-policy</link>
    <description>
        &lt;b&gt;This submission presents comments by the Centre for Internet &amp; Society, India (“CIS”) on the Draft Digital Communications Policy which was released to the public by the Department of Telecommunications of the Ministry of Communications on 1st May 2018 for comments and views.

&lt;/b&gt;
        
&lt;h2&gt;Preliminary&lt;/h2&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;On 1st May 2018, the Department of Telecommunications of the Ministry
 of Communications released the Draft Digital Communications Policy for 
comments and feedback.&amp;nbsp; We laud the Government’s attempts to realise the
 socio-economic potential of India by increasing&amp;nbsp; access to Internet, 
and drafting a comprehensive policy while adequately keeping in mind the
 various security and privacy concerns that arise due to online 
communication. On behalf of the Centre for Internet &amp;amp; Society (CIS),
 we thank the Department of Telecommunications for the opportunity to 
submit its comments on the draft policy.&lt;/p&gt;
&lt;p&gt;We would like to point out two concerns with the consultation 
process: (i) a character-limit imposed on the comments to each section, 
due to which this submission has to sacrifice on providing comprehensive
 references to research; and (ii) issues with signing in on the MyGov 
where this consultation was hosted. We strongly recommend that the 
consultation process be liberal in accepting content, and allow for 
multiple types of submissions.&lt;/p&gt;
&lt;h2&gt;Comments&lt;/h2&gt;
&lt;h3&gt;Connect India: Creating a Robust Digital Communication Infrastructure&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;On 2022 Goals&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;a. Provide Universal broadband coverage at 50 Mbps to every citizen&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;According to UNICEF’s 2017 report, &lt;a class="external-link" href="https://www.unicef.org/publications/files/SOWC_2017_ENG_WEB.pdf"&gt;Children in a Digital World&lt;/a&gt;, 
only 29% of the internet users in India are female.&amp;nbsp; It is essential 
that the policy recognise the wide digital gender gap and other 
differences in internet access that result from traditional 
sociocultural barriers. Therefore, we recommend that the goal read as: 
“Provide Universal broadband coverage at 50 Mpbs to every citizen, with 
special focus on increasing internet access for women, people with 
disabilities, and historically-marginalised communities.”&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;g. Ensure connectivity to all uncovered areas&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;The term “connectivity” should be changed to “active internet 
connectivity”. As per the current norms, a gram panchayat may be 
considered “connected” if the fibre infrastructure exists, but this does
 not necessarily mean an active internet connection being serviced in 
the area. For example, &lt;a class="external-link" href="http://indianexpress.com/article/business/four-years-of-modi-government-telecom-and-it-ravi-shankar-prasad-5188871/"&gt;as on May 20&lt;/a&gt;, “of 1.22 lakh gram panchayats with 
fibre connectivity, 1.09 lakh had active internet.”&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;On Strategies&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;1.1 (a) i. BharatNet – Providing 1 Gbps to Gram Panchayats upgradeable to 10 Gbps&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;The Central Government, under the “State-led” implementation of the
 BharatNet initiative, has allowed certain state governments to 
implement the program in their respective states. This has allowed State
 Governments to take misplaced liberty with the core objective of the 
program, which originally was to increase access to internet services. 
For example, after the Telecom Commission’s approval of Andhra Pradesh’s
 “State-led” implementation of the program, the state government set up a
 body corporate Andhra Pradesh State FiberNet Limited. This body then 
went on to &lt;a class="external-link" href="https://164.100.158.235/question/annex/245/Au4554.pdf"&gt;exceed&lt;/a&gt; its mandate by venturing into the television 
broadcasting and distribution business by offering Internet Protocol 
Television (IPTV) services.&amp;nbsp; This is deeply problematic a it indicates 
that central government funds meant for increasing internet access are 
being used for IPTV services, despite the TRAI’s repeated 
&lt;a class="external-link" href="http://www.trai.gov.in/notifications/press-release/trai-issues-recommendations-%E2%80%9Cissues-related-entry-certain-entities"&gt;recommendations&lt;/a&gt; (since 2012) that state-owned entities should not be 
allowed to enter broadcasting and distribution activities ; allowing 
state entities in the business is against fair play and competition, 
runs contrary to the principle of independent and free media, and has 
chilling effects on the freedom of expression.&lt;/div&gt;
&lt;div&gt;Additionally, this has created a problem for aggregated data 
availability on the expenditure on the program. While the central 
government should ideally have all data pertaining to state-wise 
expenditure of funds for the program, data regarding the states 
implementing the initiative on their own is &lt;a class="external-link" href="http://164.100.47.190/loksabhaquestions/annex/14/AU4334.pdf"&gt;generally&lt;/a&gt; &lt;a class="external-link" href="http://164.100.47.190/loksabhaquestions/annex/14/AS73.pdf"&gt;excluded&lt;/a&gt; from the 
data provided by the Ministry. The goals of the program need to be 
specifically defined so that funds are directed effectively. The program
 needs stricter monitoring mechanisms to ensure that the intended 
objectives are met.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;1.1 (a) iv. JanWiFi – Establishing 2 Million Wi-Fi Hotspots in rural areas&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Under present regulations, resale of communication data logged by 
WiFi hotspots is not permitted. However, &lt;a class="external-link" href="https://www.livemint.com/Industry/T4c6JlgpofYfHODmuQUjJP/Govt-may-allow-data-resale-in-boost-to-public-WiFi-plan.html"&gt;recent&lt;/a&gt; news &lt;a class="external-link" href="https://www.livemint.com/Industry/1jJ6MGWuQM7RiBNhPOb4zI/Data-resale-should-be-allowed-to-boost-public-WiFi-hotspots.html"&gt;reports&lt;/a&gt; suggest
 that the DoT may change these norms to permit (virtual network) 
operators to further sell this information. We understand that while 
changing such norms may incentivise the operators to set up WiFi 
hotspots, however, the proliferation of internet access cannot come at 
the cost of privacy of users. The data available to the operators of 
these hotspots includes all browsing data, which is sensitive private 
information, and thus, should be restricted from sale. We strongly 
recommend that in compatibility with the security &amp;amp; privacy goals 
for consumers envisioned in the latter sections of this draft policy, 
the DoT ensure that strong privacy measures are in place for public WiFi
 hotspots made available through programs like JanWiFi.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;1.1 (f) Enabling Infrastructure Convergence of IT, telecom and broadcasting sectors&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;The policy proposes a convergence of the infrastructure 
administration currently performed by three central Government 
departments: IT, Broadcasting and Telecom. As admitted in the draft, 
this will require amendments, amongst many Acts, to the Telegraph Act. 
However, the draft policy has not clearly delineated the new proposed 
responsibilities for each department, and avoids elaborating on the 
nuance that will be required to address the multiple legal and 
administrative concerns stemming from the proposed convergence. The 
document also fails to detail how infrastructure (say internet access 
through 4G) will be regulated differently services (say IPTV operating 
on 4G). Further clarity is also required (i) how department-specific 
concerns (which are unsuited for a larger body) will be handled; and 
(ii) regarding the auspices under which the new converged body will 
operate.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;1.2 (a) Making adequate spectrum available to be equipped for the new broadband era&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;TRAI’s &lt;a class="external-link" href="https://www.trai.gov.in/sites/default/files/Consultation-Paper_Final%2028-3-14.pdf"&gt;consultation paper&lt;/a&gt;, Allocation and Pricing of Microwave 
Access (MWA) and Microwave Backbone (MWB) RF carriers (March 2014), 
recommends the exploration of the usage of the E-band (71 - 76 / 81-86 
GHz) and V-band (57-64 MHz),&amp;nbsp; and for the allocation of the same to 
telecom service providers.&amp;nbsp; We recommend that the Ministry accept TRAI’s
 recommendations, and reflect it in this policy.&lt;/div&gt;
&lt;div&gt;While the draft policy aims to decrease regulation of the spectrum,
 including liberalising spectrum “sharing, leasing and trading” regime, 
in addition, the policy should clear the government’s stance on 
unlicensed spectrum usage. CIS has written earlier (&lt;a class="external-link" href="https://cis-india.org/telecom/unlicensed-spectrum-policy-brief-for-govt-of-india"&gt;June 2012&lt;/a&gt;) about the
 demonstrable need for unlicensed spectrum to create a path for 
inexpensive connectivity in rural and remote areas.&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;1.2 (a) v. Optimal Pricing of Spectrum to ensure sustainable and affordable access to Digital Communications&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;The draft policy should review existing approach to spectrum 
pricing in India. The Indian telecom sector is under heavy debt, and if 
rejuvenating this sector is a purported goal of this policy via “optimal
 pricing of spectrum”, auctions with a view to revenue maximisation 
should no longer remain the preferred method of assigning spectrum. The 
National Telecom Policy, 1999 which adopted a revenue-sharing approach 
to license fees, showed good results for the sector and translated into 
huge benefits for consumers. The government should adopt a similar 
approach to rescue the industry.&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;h3&gt;Propel India: Enabling Next Generation Technologies and Services 
through Investments, Innovation, Indigenous Manufacturing and IPR 
Generation&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;On Strategies&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;2.2 (a) ii. Simplifying&amp;nbsp; licensing&amp;nbsp; and regulatory frameworks 
whilst&amp;nbsp; ensuring&amp;nbsp; appropriate security&amp;nbsp; frameworks&amp;nbsp; for&amp;nbsp; IoT/&amp;nbsp; M2M&amp;nbsp; /&amp;nbsp; 
future services&amp;nbsp; and&amp;nbsp; network&amp;nbsp; elements incorporating international best
 practices&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The process of “simplifying” licensing and regulatory regime is 
currently vague, and the intentions remain unclear. Simplifying licences
 without clear intentions can lead to losing the necessary nuance in the
 license agreements required to maintain competitive markets. In recent 
months, the industry has already witnessed a dilution of provisions 
which were placed to ensure healthy competition in the sector. For 
example, on May 31st, new norms were &lt;a class="external-link" href="https://telecom.economictimes.indiatimes.com/news/dot-amends-licence-rule-to-allow-higher-spectrum-holding/64406115"&gt;announced&lt;/a&gt; by DoT under which now 
allow an operator to hold 35% of the total spectrum&amp;nbsp; as opposed to the 
earlier regulation which only allowed for holding a maximum 25% of the 
total spectrum.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;2.3 (d) (iii) Providing financial incentives for the 
development of Standard Essential Patents(SEPs) in the field of digital 
communications technologies&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;This is a welcome step by the government to incentivise the 
development of SEPs in the country. However, this appreciable step will 
only yield results in the long term - and realistically speaking, not 
before a decade. It is equally necessary to improve the environment of 
licensing of SEPs in the short-term. The government should take 
initiative for creation of government-controlled patent pools for SEPs, 
which will solve issues of licensing for SEP holders, and also improve 
transparency of information relating to SEPs. Specifically, we recommend
 that the government initiate the &lt;a class="external-link" href="https://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi"&gt;formation of a patent pool&lt;/a&gt; of critical
 mobile technologies and apply a five percent compulsory license.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Secure India: Ensuring Digital Sovereignty, Safety and Security of Digital Communications&lt;/h3&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;On Strategies&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;3.1 Harmonising communications law and policy with the evolving
 legal framework and jurisprudence relating to privacy and data 
protection in India&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;We welcome the Ministry’s intention to amend licence agreements to 
include data protection and privacy provisions. In the same vein, the 
Ministry should also consider removing provisions from licenses that 
prevent the operator from using certain encryption methods in its 
network. For example, Clause 2.2 (vii) of the &lt;a class="external-link" href="http://www.dot.gov.in/isplicense/template-agreement-between-internet-service-provider-isp-and-vendor-equipment-product-and"&gt;License Agreement between 
DoT &amp;amp; ISP&lt;/a&gt; prohibits bulk encryption.&amp;nbsp; Additionally, in the License 
Agreement, encryption with only up to 40-bit in RSA (or equivalent) is 
normally permitted.&amp;nbsp; Similarly, Clause 37.1 of the &lt;a class="external-link" href="http://www.dot.gov.in/sites/default/files/Unified%20Licence_0.pdf"&gt;Unified Service 
License Agreement&lt;/a&gt; prohibits bulk encryption.&amp;nbsp; These provisions must be 
revised to ensure that ISPs and other service providers can employ more 
cryptographically secure methods.&lt;/p&gt;
&lt;p&gt;When regulating on encryption, we recommend that the government only 
set positive minimum mandates for the storage and transmission of data, 
and not set upper limits on the number of bits or on the quality of 
cryptographical method. In pursuance of the same goals, we also 
recommend adding point ‘iii’ to 3.1 (b): “promoting the use of 
encryption in private communication by providing positive minimum 
mandates for strong encryption in (or along with) the data protection 
framework.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;3.2 (a) Recognising the need to uphold the core principles of net neutrality&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Like other goals of the draft policy, the target for ensuring and 
enforcing net neutrality principles has been set as 2022. However, this 
goal is achievable by as early as December 2018. We suggest that the 
Government take the first step towards this goal by accepting the net 
neutrality principles proposed by the TRAI and its recommendations to 
the government which have been pending with the Ministry since November 
2017. The government may additionally take into consideration &lt;a class="external-link" href="https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"&gt;CIS’ 
position&lt;/a&gt; on &lt;a class="external-link" href="https://cis-india.org/internet-governance/resources/net-neutrality/2015-06-29_PositionPaperonNetNeutralityinIndia/view"&gt;net neutrality&lt;/a&gt;.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The vaguely worded “appropriate exclusions and exceptions” carved out
 to net-neutrality principles in the policy need urgent elaboration. 
Given the vague boundaries between different control layers in digital 
communication, content regulation is very easy to slip into, and needs 
to be consciously avoided by the government.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;&lt;em&gt;3.3 (f) ii. Facilitating lawful interception agencies with 
state of the art lawful intercept and analysis systems for 
implementation of law and order and national security&lt;/em&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;There is no clarity in policy on how the government plans to meet the
 goal of “[f]acilitating lawful interception agencies with state of the 
art lawful intercept and analysis systems for implementation of law and 
order and national security.”&amp;nbsp; It has been &lt;a class="external-link" href="https://ajayshahblog.blogspot.com/2018/05/indias-communication-surveillance.html"&gt;recently suggested&lt;/a&gt; that some 
legal provisions that enable targeted communication surveillance might 
be violative of the privacy guidelines laid out in the recent Supreme 
Court judgment that affirmed the Right to Privacy.&amp;nbsp; Additionally, mass 
surveillance, prime facie, does not meet the “proportionality test.” 
Therefore, the policy documents needs details as to how the Ministry 
will aid intelligence agencies, and whether these interception details 
will be known to ISPs, TSPs and the public via reflection in the various
 License Agreements.&lt;/p&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-communications-policy'&gt;https://cis-india.org/internet-governance/blog/comments-on-the-draft-digital-communications-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anubha Sinha, Gurshabad Grover and Swaraj Barooah</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2018-06-14T12:43:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-proposed-amendments-to-the-consumer-protection-e-commerce-rules-2020">
    <title>Comments on proposed amendments to the Consumer Protection (E-Commerce) Rules, 2020</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-proposed-amendments-to-the-consumer-protection-e-commerce-rules-2020</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p style="text-align: justify;" dir="ltr"&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The Consumer Protection (E-commerce) Rules, 2020 were first introduced in an attempt to ensure that consumers were granted adequate protections and to prevent the adoption of unfair trade practices by E-commerce entities. The amendments have proposed several rules which will protect the consumer with a restriction on misleading advertisements and appointment of grievance officers based in India. However, while on this path, the proposed rules have created hurdles in the operations of e-commerce, reducing the ease of business and increasing the costs of operations especially for smaller players; which could eventually pass on to the consumers.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In our submission to the Ministry of Consumer Affairs, we focussed our analysis on eight points: Definitions and Registration, Compliance, Data Protection and Surveillance, Flash Sales, Unfair Trade Practices, Jurisdictional Issues with Competition Law, Compliance with International Trade Law and Liabilities of Marketplace E-commerce Entities.&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A snapshot of our recommendations and analysis is listed out below. To read our full submission, please click&amp;nbsp;&lt;a href="https://cis-india.org/internet-governance/centre-for-internet-society-ecommerce-amendments"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Definitions and Registrations&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The registration of entities with the DPIIT must be made as smooth as possible especially considering the wide definition of E-commerce entities in the rules, which may include smaller businesses as well. In particular, we suggested doing away with physical office visits.&amp;nbsp;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Compliance&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;As a general observation, compliance obligations should be differentiated based on the size of the entity and the volume of transactions rather than adopting a ‘one size fits all’ approach which may harm smaller businesses, especially those that are just starting up. Before these rules come into force, further consultations with small and medium-sized business enterprises would be vital in ensuring that the regulation is in line with their needs and does not hamper their growth. Excessive compliance requirements may end up playing into the hands of the largest players as they would have larger financial coffers and institutional mechanisms to comply with these obligations.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;There is some confusion in the law as to whether the Chief Compliance officer mentioned in the amended rules is the same as the “nodal person of contact or an alternate senior designated functionary who is resident of India” under Rule 5(1).&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The safe harbour should therefore refer to due diligence by the CCO and not the e-commerce entity itself. The requirement for the compliance officer to be an Indian citizen who is a resident and a senior officer or managerial employee may place an undue burden on small E-commerce players not located in India.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;span style="text-align: justify;"&gt;Data Protection and Surveillance&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;In the absence of a Personal Data protection bill these rules do not adequately protect consumers’ personal data and reduce the powers given to the Central Government to access data or conduct surveillance&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Flash Sales&amp;nbsp;&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Conventional flash sales should be defined. Clear distinction must be made between conventional flash sales and fraudulent flash sales. The definition should not be limited to interception of business “using technological means”, which limits the scope of the fraudulent flash sales. Further parameters must be provided for when a flash sale will be considered a fraudulent flash sale.&amp;nbsp;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Unfair Trade Practices&amp;nbsp;&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;The rules place restrictions on marketplace E-commerce entities from selling their own goods or services or from listing related enterprises as sellers on their platforms. No such restriction applies to brick and mortar stores, and this blanket ban must be rethought.&amp;nbsp;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&amp;nbsp;Jurisdictional Issues with Competition Law&amp;nbsp;&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;This rule brings the issue of ‘abuse of dominant power’ under the fora of the Consumer Protection Authority or the Consumer Disputes Redressal Commissions.&amp;nbsp; Overlapping jurisdiction of this nature could introduce regulatory delays into the dispute resolution process and&amp;nbsp; can be a source of tension for the parties and regulatory authorities. The intention behind importing a competition law concept such as “abuse of dominant position” in the consumer protection regulations may be understandable, such a step might be effective in jurisdictions which have a common regulatory authority for both competition law as well as consumer protection issues, such as Australia, Finland, Ireland, Netherlands. However, in a country such as India which has completely separate regulatory mechanisms for competition and consumer law issues, such a provision may lead to logistical difficulties.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Compliance with International Trade Law&amp;nbsp;&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;A robust framework on ranking with transparent disclosure of parameters for the same would also go a long way towards addressing concerns with discrimination and national treatment under WTO law. Further, the obligation to provide domestic alternatives should be clarified and amended to ensure that it does not cause uncertainty and open India up to a national treatment challenge&amp;nbsp; at the WTO.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Liabilities of Marketplace E-commerce Entities&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Fallback liability is an essential component of consumers’ protection in the E-commerce space. However, as currently envisioned there is a lack of clarity surrounding the extent to which fallback liability is applicable on E-commerce entities as well as exemptions to this liability. We have recommended alternate approaches adopted in other jurisdictions, which include&lt;/p&gt;
&lt;ol&gt;&lt;li style="list-style-type: lower-alpha;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Liability through negligence&lt;/p&gt;
&lt;/li&gt;&lt;li style="list-style-type: lower-alpha;" dir="ltr"&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Liability as an exemption to safe harbour&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;div style="text-align: justify;"&gt;&amp;nbsp;&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-proposed-amendments-to-the-consumer-protection-e-commerce-rules-2020'&gt;https://cis-india.org/internet-governance/blog/comments-on-proposed-amendments-to-the-consumer-protection-e-commerce-rules-2020&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vipul Kharbanda, Rajat Misra, Arindrajit Basu and Aman Nair</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>E-Commerce</dc:subject>
    
    
        <dc:subject>Consumer Rights</dc:subject>
    

   <dc:date>2021-07-27T14:45:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017">
    <title>Comments on Information Technology (Security of Prepaid Payment Instruments) Rules, 2017</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society submitted comments on the Information Technology (Security of Prepaid Payment Instruments) Rules, 2017. The comments were prepared by Udbhav Tiwari, Pranesh Prakash, Abhay Rana, Amber Sinha and Sunil Abraham. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;1. Preliminary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;1.1. This submission presents comments by the Centre for Internet and Society&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; in response to the Information Technology (Security of Prepaid Payment Instruments) Rules 2017 (“the Rules”).&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; The Ministry of Electronics and Information Technology (MEIT) issued a consultation paper (pdf) which calls for developing a framework for security of digital wallets operating in the country on March 08, 2017. This proposed rules have been drafted under provisions of Information Technology Act, 2000, and comments have been invited from the general public and stakeholders before the enactment of these rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;2. The Centre for Internet and Society&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;2.1. The Centre for Internet and Society, (“CIS”), is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, and open access), internet governance, telecommunication reform, digital privacy, and cyber-security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.2. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved, especially the privacy and data security of citizens. CIS is thankful to the MEIT for this opportunity to provide feedback to the draft rules.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;3. Comments&lt;/h3&gt;
&lt;h4 style="text-align: justify; "&gt;3.1  General Comments&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Penalty&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no penalty for not complying with these rules.  Even the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 doesn’t have penalties.  Under section 43A of the Information Technology Act (under which the 2011 Rules have been promulgated), a wrongful gain or a wrongful loss needs to be demonstrated.  This should not be a requirement for financial sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Expansion to Contractual Parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A majority of these rules, in order to be effective and realistically protect consumer interest, should also be expanded to third parties, agents, contractual relationships and any other relevant relationship an e-PPI issuer may delegate as a part of their functioning.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.2  Rule 2: Definitions&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Certain key words relevant to the field of e-PPI based digital payments such as authorisation, metadata, etc. are not defined in the rules and should both be defined and accounted for in the rules to ensure modern developments such as big data and machine learning, digital surveillance, etc. do not violate human rights and consumer interest.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.2  Rule 7: Definition of personal information&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 7 provides an exhaustive list of data that will be deemed to be personal information for the purposes of the Rules. While &lt;b&gt;information collected&lt;/b&gt; at the time of issuance of the pre-paid payment instrument and during its use is included within the scope of Rule 7, it makes no reference to metadata generated and collected by the e-PPI issuer.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.3 Rule 4: Inadequate privacy protections&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 4(2) specifies the details that the privacy policies of each e-PPI issuer must contain. However, these specifications are highly inadequate and fall well below the recommendations under the National Privacy Principles in Report of the Group of Experts on Privacy chaired by Justice A P Shah.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: The Rules should include include clearly specified rights to access, correction and opt in/opt out, continuing obligations to seek consent in case of change in policy or purpose and deletion of data after purpose is achieved. Additionally, it must be required that a log of each version of past privacy policies be maintained along with the relevant period of applicability.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.4 Rule 10: Reasonable security practices&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Financial information (“such as bank account or credit card or debit card or other payment instrument details”) is already invoked in an inclusive manner in the definition of ‘personal information’ in Rule 7.  Given this there is no need to make the Reasonable Security Practices Rules applicable to financial data through this provisions: it already is, and it is best to avoid unnecessary redundancy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solution: This entire rule should be removed.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.5  Rule 12: Traceability&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: There is a requirement created under this rule that payment-related interactions with customers or other service providers be “appropriately trace[able]”.  But it is unclear what that would practically mean: would IP logging suffice? would IMEI need to be captured for mobile transactions? what is “appropriately” traceable? — none of those questions are answered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion: The NPCI’s practices and RBI regulations, for instance, seek to limit the amount of information that entities like e-PPI providers have.  These rules need to be brought in line with those practices and regulations.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.6 Rule 5: Risk Assessment&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 5 requires e-PPI issuers to carry out risk assessments associated with the security of the payments systems at least once a year and after any major security incident. However, there are no transparency requirements such as publications of details of such review, a summary of the analysis, any security vulnerabilities discovered etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Broaden the scope of this provision to include not just risk assessments but also security audits.&lt;/li&gt;
&lt;li&gt;Mandate publication of risk assessment and security audit reports.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.7 Rule 11: End-to-End Encryption&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The rule concerning end-to-end encryption (E2E) needs significantly greater detailing to be effective in ensuring the the protection of information at both storage and transit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: Elements such as Secure Element or a Secured Server and Trusted User Interface, both concepts to enable secure payments, can be detailed in the rule and a timeline can be established to require hardware, e-PPI practices and security standards to realistically account for such best practices to ensure modern, secure and industry accepted implementation of the rule.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.8 Rule 13: Retention of Information&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 13 leaves the question of retention entirely unanswered by deferring the future rulemaking to the Central Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestions: Rule 13 should be expanded to include the various categories of information that can be stored, guidelines for the short-term (fast access) and long-term storage of the information retained under the rule and other relevant details. The rule should also include the security standards that should be followed in the storage of such information, require access logs be maintained for whenever this information is accessed by individuals, detail secure destruction practices at the end of the retention period  and finally mandate that end users be notified by the e-PPI issuer of when such retained information is accessed in all situations bar exceptional circumstances such as national security, compromising an ongoing criminal investigations, etc.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.9 Rule 14: Reporting of Cyber Incidents&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Rule 14 is an excellent opportunity to uphold transparency, accountability and consumer rights by mandating time- and information-bound notification of cyber incidents to customers, including intrusions, database breaches and any other compromise of the integrity of the financial system. While the requirement of reporting such incidents to CERT-In is already present in the Rule 12 of the CERT Rules, the rule retains the optional nature of notifying customers. The rule should include an exhaustive list of categories or kinds of cyber incidents that should be reported to affected end users without compromising the investigation of such breaches by private organisations and public authorities. Further, the rule should also include penalties for non-compliance of this requirement (both to CERT-In and the consumer) to serve as an incentive for e-PPI issuers to uphold consumer public interest. The rule should be expanded to include a detailed mechanism for such reporting, including when e-PPI issuers and the CERT-In can withhold information from consumers as well as requiring the withheld information be disclosed when the investigation has been completed. Finally, the rule should also require that such disclosures be public in nature and consumers not be required to not disseminate such information to enable informed choice by the end user community.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Suggestion:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) In Rule 14(3) “may” should be substituted by “shall”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Penalties of up to 5 lakh rupees may be imposed for each day that the e-PPI issuer fails to report any severe vulnerability that could likely result in harm to customers.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.10 Rule 15: Customer Awareness and Education&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 15 on Customer Awareness and Education by e-PPI issuers does not take into account the vast lingual diversity and varied socio-economic demographic that makes up the end users of e-PPI providers in India, by mandating the actions under the rule must account for these factors prior to be propagated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: The rule must ensure that e-PPI issuers track record in carrying out awareness is regularly held accountable by both the government and public disclosures on their websites. Further, the rule can be made more concrete and effective by including mobile operating systems in their scope (along with equipments), mandating awareness for best practices for inclusive technologies like USSD banking, specifying notifications to include SMS reports of financial transactions, etc.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.11 Rule 16: Grievance Redressal&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 16 lays down the requirement of grievance redressal, without specifying appellate mechanisms (both within the organisation and at the regulatory level), accountability (via penalties) for non-compliance of the rule nor requiring a clear hierarchy of responsibility within the e-PPI organisation. These factors seriously compromise the efficacy of a grievance redressal framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: Similar rules for grievance redressal that have been enacted by the Insurance Regulatory and Development Authority for the insurance sector and the Telecom Regulatory Authority of India for the telecom sector can and should serve as a reference point for this rule. Their effectiveness and real world operation should also be monitored by the relevant authorities while ensuring sufficient flexibility exists in the rule to uphold consumer rights and the public interest. Proper appellate mechanisms at the regulatory level are essential along with penalties for non-compliance.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;3.12 Rule 17: Security Standards&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Problem: Rule 17 empowers the Central Government to mandate security standards to be followed by e-PPI issuers operating in India. While appreciable in its overall outlook on ensuring a minimum standard of security, the Rule needs be improved upon to make it more effective. This can be in done by specifying certain minimum security standards to ensure all e-PPI issuers have a minimal level of security, instead of leaving them open to being intimated at a later date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Solutions: Standards that can either be made mandatory or be used as a reference point to create a new standard under Rule 17(2) are ISO/IEC 14443, IS 14202, ISO/IEC 7816, PCI DSS, etc. Further, the Rule should include penalties for non-compliance of these standards, to make them effectively enforceable by both the government and end users alike. Additional details like the maximum time period in which such security standards should be implemented post their notification, requiring regular third party audits to ensure continuing compliance and effectiveness and requiring updated standards be used upon their release will go a long way in ensuring e-PPI issuers fulfil their mandate under these Rules.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://meity.gov.in/sites/upload_files/dit/files/draft-rules-security%20of%20PPI-for%20public%20comments.pdf"&gt;http://meity.gov.in/sites/upload_files/dit/files/draft-rules-security%20of%20PPI-for%20public%20comments.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017'&gt;https://cis-india.org/internet-governance/blog/comments-on-information-technology-security-of-prepaid-payment-instruments-rules-2017&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Information Technology</dc:subject>
    

   <dc:date>2017-03-23T01:54:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/comments-on-indea-2.0">
    <title>Comments on InDEA 2.0</title>
    <link>https://cis-india.org/internet-governance/comments-on-indea-2.0</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-on-indea-2.0'&gt;https://cis-india.org/internet-governance/comments-on-indea-2.0&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2022-03-22T06:26:39Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/comments-on-ecourts-phase-iii-3">
    <title>Comments on eCourts phase III</title>
    <link>https://cis-india.org/internet-governance/comments-on-ecourts-phase-iii-3</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/comments-on-ecourts-phase-iii-3'&gt;https://cis-india.org/internet-governance/comments-on-ecourts-phase-iii-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>aman</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2021-06-03T12:15:17Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/ict-in-school-education">
    <title>Comments on Draft National Policy on ICT in School Education</title>
    <link>https://cis-india.org/openness/blog-old/ict-in-school-education</link>
    <description>
        &lt;b&gt;The Department of School Education &amp; Literacy under the Ministry of Human Resources Development invited comments on its latest draft of the National Policy on ICT in School Education. CIS' comments are listed in this post.&lt;/b&gt;
        &lt;p align="JUSTIFY"&gt;The Department of School
Education &amp;amp; Literacy under the Ministry of Human Resources
Development has invited comments on its latest draft of the National
Policy on ICT in School Education. We, at the Centre for Internet and
Society (CIS) have the following comments on the latest draft:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Digital content and
	resources already available in the public domain must be leveraged
	by the Government and this intention must be specifically expressed
	in the policy.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;The provision in the
	copyright law providing for fair use of copyrighted material must be
	completely taken advantage of in developing, sharing, disseminating
	and exchanging digital content and resources. Material already part
	of the public domain should be included in the pool of resources to
	be utilised by the Government under the policy.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;It is not enough for
	the State to provide “open and free access” to ICT and
	ICT-enabled tools and resources to all students. It is important
	that the Government adopts the concept of global Open Educational
	Resources (OER) and license Indian content appropriately. OER refers
	to digitised materials offered freely and openly for educators,
	students and self-learners to use and reuse for teaching, learning
	and research.&lt;a class="sdfootnoteanc" name="sdfootnote1anc" href="#sdfootnote1sym"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt;
	OER materials are being increasingly integrated into open and
	distance education. The policy should mandate the State to license
	all digital content under OER.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;It is commedable
	that the policy mandates use of Open Standards for the State to
	maintain and share  digitsed content. However, we recommend that the
	policy uses the same definition for “Open Standards” as that
	incorporated in the Government's Open Standards policy so that the
	same phrase is defined uniformly across all national policies.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;The policy should
	not foreclose the option of including freeware or resources obtained
	gratis in the educational material for students. It should allow the
	State to make efforts to obtain freely available educational
	material and incoporate it as part of the educational material.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Course developed by
	the State should be licensed under a Creative Commons License,
	preferably an attribution-only&lt;a class="sdfootnoteanc" name="sdfootnote2anc" href="#sdfootnote2sym"&gt;&lt;sup&gt;2&lt;/sup&gt;&lt;/a&gt;
	or sharealike&lt;a class="sdfootnoteanc" name="sdfootnote3anc" href="#sdfootnote3sym"&gt;&lt;sup&gt;3&lt;/sup&gt;&lt;/a&gt;
	CC license 3.0. Similarly, software used as part of educational
	resource must be licensed under a GPL or a BSD license.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Teachers and
	students should be sensitised towards the fair use exception in the
	Indian copyright law  so that maximum utilisation of the provision
	is facilitated.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;School libraries
	should be encouraged to exercise their right to the fair use
	exception applicable to libraries. Even though the law on fair use
	in respect of public libraries seems restricted in terms of the
	number of copies of a book that can be made (and thus, leading to
	staggered borrowing) and making it a prerequisite for the book to be
	unavailable for sale in India. However, there is significant room
	for interpretation of these ambiguous provisions and take advantage
	of the fair use exception to provide greater access to educational
	materials available in school libraries. Other statutes such as the
	Public Libraries Act govern the operations of State libraries and
	this, in addition to the fair use provision, would allow for greater
	flexibility in operation for the libraries. The State should
	endeavour to make the most of these provisions and interpret them to
	enable greater access to learning material for the students.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;The policy should
	require libraries to follow an anonymisation policy which ensures
	that the details of books borrowed by the students remain private
	and the students' privacy is adequately safeguarded in this regard.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;As far as ICT for
	children for special needs is concerned, it is recommended that the
	State use the DAISY format to make documents accessible and comply
	with WCAG guidelines to ensure accesssibility of web content.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;Indian law on fair
	use exception applicable for distance education is still unclear.
	Therefore, we recommend that this policy be used test the
	feasibility of fair use in case of distance education in India.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;The results and
	findings from the monitoring, evaluation and research should be
	declared Open Government Data (OGD) and shared or disseminated
	accordingly. A piece of data is open if anyone is free to use, reuse
	and redistribute it – subject only, at most, to the requirement of
	attribute and share-alike.&lt;a class="sdfootnoteanc" name="sdfootnote4anc" href="#sdfootnote4sym"&gt;&lt;sup&gt;4&lt;/sup&gt;&lt;/a&gt;
	Open data commissioned or produced by the government or government
	controlled entities constitutes OGD.&lt;sup&gt;&lt;a class="sdfootnoteanc" name="sdfootnote5anc" href="#sdfootnote5sym"&gt;5&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;As far as use of
	software for education is concerned, students need to read code
	before they write code, just as in the case of books. Therefore,
	Free and Open Source Software (FOSS) has to be made available so
	that the source code is accessible for the students to read and
	improve upon. De facto proprietary software could be made available
	where budget exists so that students can learn in a
	technology-neutral fashion and are exposed to multiple
	implementations of an idea. However, proprietary software
	availability will be inapplicable for domains which operate
	exclusively on free software.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;The present draft
	recommends educating students and teachers on use of firewalls and
	other security measures to be used to block “inappropriate
	websites”. We feel that there is no requirement for a centralised
	policy on blocking websites. We recommend community-based blocking
	wherein each school can decide the criteria on which they want to
	block a website.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;It is very critical
	to ensure that there is no surveillance done on children so that
	there is a free environment for children to use the digitised
	content and the internet for their educational purposes.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;We recommend that
	the State is mandated to have all Indian language content be encoded
	using Unicode standards.&lt;/p&gt;
&lt;/li&gt;&lt;li&gt;
&lt;p align="JUSTIFY"&gt;We have gone through
	the comments made on the draft version by IT for Change and Free
	Software Foundation (FSF) and we are broadly in agreement with the
	points made by them.  We would like to reiterate that use of FOSS
	must be made mandatory.&lt;/p&gt;
&lt;h3&gt;Notes&lt;/h3&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;div id="sdfootnote1"&gt;
&lt;p class="sdfootnote"&gt;&lt;a class="sdfootnotesym" name="sdfootnote1sym" href="#sdfootnote1anc"&gt;1&lt;/a&gt;&amp;nbsp;OECD
	(2007), &lt;em&gt;Giving Knowledge for Free: The Emergence of Open
	Educational Resources&lt;/em&gt;, OECD Publishing.&lt;br /&gt;doi:
	&lt;a href="http://dx.doi.org/10.1787/9789264032125-en" target="_blank"&gt;10.1787/9789264032125-en&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote2"&gt;
&lt;p class="sdfootnote"&gt;&lt;a class="sdfootnotesym" name="sdfootnote2sym" href="#sdfootnote2anc"&gt;2&lt;/a&gt;&amp;nbsp;&lt;a href="http://creativecommons.org/licenses/by/3.0/legalcode"&gt;http://creativecommons.org/licenses/by/3.0/legalcode&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote3"&gt;
&lt;p class="sdfootnote"&gt;&lt;a class="sdfootnotesym" name="sdfootnote3sym" href="#sdfootnote3anc"&gt;3&lt;/a&gt;&amp;nbsp;&lt;a href="http://creativecommons.org/licenses/by-sa/3.0/legalcode"&gt;http://creativecommons.org/licenses/by-sa/3.0/legalcode&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote4"&gt;
&lt;p class="sdfootnote"&gt;&lt;a class="sdfootnotesym" name="sdfootnote4sym" href="#sdfootnote4anc"&gt;4&lt;/a&gt;&amp;nbsp;&lt;a href="http://www.opendefinition.org/"&gt;http://www.opendefinition.org/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="sdfootnote5"&gt;
&lt;p class="sdfootnote"&gt;&lt;a class="sdfootnotesym" name="sdfootnote5sym" href="#sdfootnote5anc"&gt;5&lt;/a&gt;&amp;nbsp;&lt;a href="http://www.opendefinition.org/government/"&gt;http://www.opendefinition.org/government/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/ict-in-school-education'&gt;https://cis-india.org/openness/blog-old/ict-in-school-education&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>krithika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Submissions</dc:subject>
    

   <dc:date>2011-08-30T14:23:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/vidya-venkat-the-hindu-september-7-2014-colonial-yoke-or-bureaucratic-insouciance">
    <title>Colonial yoke or bureaucratic insouciance?</title>
    <link>https://cis-india.org/internet-governance/news/vidya-venkat-the-hindu-september-7-2014-colonial-yoke-or-bureaucratic-insouciance</link>
    <description>
        &lt;b&gt;‘Blame the British’ is an oft-invoked argument when the subject of India’s outdated laws comes up for discussion. But 68 years since Independence, can we still afford to parrot that old line? &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Vidya Venkat &lt;i&gt;(With additional reporting by K.T. Sangameswaran in Chennai) &lt;/i&gt;was &lt;a class="external-link" href="http://www.thehindu.com/sunday-anchor/sunday-anchor-colonial-yoke-or-bureaucratic-insouciance/article6386714.ece"&gt;published in the Hindu&lt;/a&gt; on September 7, 2014. Pranesh Prakash gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Moiz Tundawala, a doctoral researcher in law at the London School of  Economics and Political Science, feels that it is unfair to blame just  the colonial hangover when several opportunities for reforming the legal  system in India have been wasted by bureaucrats and judges. He points  to Section 377 of the Indian Penal Code (IPC) as an example.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This law pronounces illegal carnal intercourse against the order of  nature, making criminals of gays and transgender persons. But why was a  progressive judgment of the Delhi High Court, which struck off this  section, upturned later by the Supreme Court? If we continue to bear the  burden of colonial era laws, we only have ourselves to blame,” he said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the Constitution-making exercise in India was inspired by the British and other western systems, it was nevertheless an independent process. But the same did not happen with the laws in India that were handed down from the British, Mr. Tundawala said. He felt that several laws enacted in the post-colonial era smacked of a colonial mindset. “Take for instance laws such as the Terrorist and Disruptive Activities (Prevention) Act, the Unlawful Activities Prevention Act, or the Armed Forces Special Powers Act. All of them aim to control and subjugate a population with little regard for their democratic aspirations. So what this country needs is a radical overhaul of the judicial and criminal justice system.”&lt;/p&gt;
&lt;blockquote class="pullquote" style="text-align: justify; "&gt;If we continue to bear the burden of colonial era laws, we only have ourselves to blame.&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The Indian Telegraph Act, 1885, continues to presume the state to be the primary owner of telecommunications networks, though the sector was privatised long ago. “The provisions on surveillance in this Act are from a colonial era and are heavy-handed, allowing for spying even without a court warrant. Up until 1998, it spoke of ‘the Provinces’ in some provisions instead of ‘India,’” Pranesh Prakash, Policy Director, Centre for Internet and Society, said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Police Act, 1861, is another law that has often been criticised for  perpetuating colonial-era institutional practices. Despite numerous  commissions and Supreme Court orders advocating reform measures,  progress in changing this law has been slow. Lawyer-activist Maja  Daruwala, who heads the Commonwealth Human Rights Initiative, New Delhi,  said those in establishment were very comfortable with the policing law  and the power that it gave them. “When governments find it convenient  to use policing as a means to hold down the population, why would they  bother to amend it?”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Ms. Daruwala said the main fault lay with the definition of police  duties and the overall structure and the spirit of the law itself. “The  police in India are often accused of bias against certain communities,  such as Dalits and tribal people. This is because the issue of need for  diversity in policing in a democratic country such as India has not been  addressed by the law. In the U.K., the design of the policing law  changed gradually with the changing needs of the population, but this  has not been the case here,” she said.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Section 124-A of the IPC on sedition is another provision in the statute  book that is seen as promoting the colonial mindset. Several instances  of the abuse of sedition law exist in independent India. In 2010, for  instance, the BJP government in Chhattisgarh used the law against  activist Binayak Sen for which he was imprisoned, only to be let off by  the Supreme Court later which found him innocent. S. Prabakaran, Member,  Bar Council of India, and president of the Tamil Nadu Advocates’  Association, said it was shameful that India continued to keep the law  that was decried by none other than Mahatma Gandhi. “This law was  brought in by the British to quell the Independence movement in India.  Why have we not bothered to repeal it?”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Efforts to reform the criminal justice system have been fraught with  challenges. The Justice Malimath committee, set up in 2000, had  recommended reforms in the system, which were met with resistance from  the human rights lobby. Cautioning the present government against any  sweeping changes that would tinker with the basic structure of the law,  V. Suresh, national general secretary, People’s Union for Civil  Liberties, said: “The Malimath committee failed in its mission because  it involved an effort to change the entire structure of the law itself,  which upholds presumption of innocence, burden of proof on the state,  and rules on admissible evidence, in order to improve conviction rates.  No doubt, it was met with resistance by the legal fraternity as the idea  was to do away with essential checks and balances in the legal system.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/vidya-venkat-the-hindu-september-7-2014-colonial-yoke-or-bureaucratic-insouciance'&gt;https://cis-india.org/internet-governance/news/vidya-venkat-the-hindu-september-7-2014-colonial-yoke-or-bureaucratic-insouciance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2014-09-08T04:21:23Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ians-july-4-2014-coai-cis-to-hold-pan-india-meetings-on-privacy-issues">
    <title>COAI, Centre for Internet &amp; Society to hold pan-India meetings on privacy issues</title>
    <link>https://cis-india.org/news/ians-july-4-2014-coai-cis-to-hold-pan-india-meetings-on-privacy-issues</link>
    <description>
        &lt;b&gt;In order to discuss possible legal frameworks to enable surveillance of voice and data communications in India, the Cellular Operators' Association of India (COAI) along with the Centre for Internet and Society (CIS) will hold seven roundtable meetings across the country in the coming weeks on privacy and surveillance issues.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Originally &lt;a class="external-link" href="http://www.ianslive.in/index.php?param=news/COAI_Centre_for_Internet_and_Society_to_hold_pan_India_meetings_on_privacy_issues-430974/BUSINESS/5"&gt;published by IANS&lt;/a&gt; on July 4, 2014 the news was mirrored in the &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/COAI-Centre-for-Internet-Society-to-discuss-privacy-issues/articleshow/37776268.cms"&gt;Times of India&lt;/a&gt;, &lt;a class="external-link" href="http://gadgets.ndtv.com/telecom/news/coai-cis-to-discuss-legal-framework-for-voice-and-data-surveillance-553074"&gt;NDTV&lt;/a&gt;, &lt;a class="external-link" href="http://www.business-standard.com/article/news-ians/coai-centre-for-internet-society-to-hold-pan-india-meetings-on-privacy-issues-114070400654_1.html"&gt;Business Standard&lt;/a&gt;, &lt;a class="external-link" href="http://telecom.economictimes.indiatimes.com/news/corporate/industry/coai-centre-for-internet-society-to-discuss-privacy-issues/37776714"&gt;Economic Times&lt;/a&gt;, and &lt;a class="external-link" href="http://article.wn.com/view/2014/07/04/COAI_Centre_for_Internet_Society_to_hold_panIndia_meetings_o/"&gt;World News&lt;/a&gt; on the same day. Bhairav Acharya gave his inputs.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;The recommendations and dialogues from each of these roundtables will be compiled and submitted to the relevant ministries of the government, a statement issued by COAI said here on Friday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The roundtable meetings will take place in Mumbai, Ahmedabad, Hyderabad, Bangalore, Chennai and twice in New Delhi.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These roundtables are closed-door meetings involving multiple stakeholders such as the industry leaders, policy makers, and experts from the legal fraternity and civil society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the era of freedom, when data connectivity via the internet, has emerged as one of the most powerful tools for communications, infringement of customer privacy by government agencies through telecom networks have forced the industry to initiate discussions on the international best practices on communications privacy and surveillance, and the relevant Indian jurisprudence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"COAI, with the Centre for Internet and Society has taken this initiative by bringing the relevant stakeholders on a common platform to discuss the matter to arrive at an acceptable conclusion," COAI Director General Rajan S Mathews said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to Bhairav Acharya, who advises the CIS: "Legal reform is necessary to identify the limits of permissible surveillance, the protection of privacy, the procedure of intercepting communications, the expectations of service providers, and freedom of all Indians. The law must keep up with technological advancements to create a balanced, proportionate and fair mechanism to enable and regulate surveillance. This will serve India’s national interest."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ians-july-4-2014-coai-cis-to-hold-pan-india-meetings-on-privacy-issues'&gt;https://cis-india.org/news/ians-july-4-2014-coai-cis-to-hold-pan-india-meetings-on-privacy-issues&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-07T07:37:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/cloudy-jurisdiction-addressing-the-thirst-for-cloud-data-in-domestic-legeal-processes">
    <title>Cloudy Jurisdiction: Addressing the thirst for Cloud Data in Domestic Legeal Processes</title>
    <link>https://cis-india.org/news/cloudy-jurisdiction-addressing-the-thirst-for-cloud-data-in-domestic-legeal-processes</link>
    <description>
        &lt;b&gt;Elonnai Hickok was a panelist at this workshop held at the IGF in Baku, Azerbaijan on November 7, 2012. The workshop was co-organised by Electronic Frontier Foundation (Peru) and University of Ottawa.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The use of cloud services is rising globally. Cloud computing and  storage are uniquely tailored to take full advantage of our increasingly  networked environment. However, a move to the cloud also entails  tangible challenges as vast repositories of information once kept within  the sacrosanct safety of the home computer are placed on a remote  server in the control of a third party. While the protections of home  storage and processing can be replicated in the cloud, legal norms have  been slow to adopt. Jurisdiction, the classic internet governance  question, is raised in particularly stark contrast in the move to the  cloud, as placing user data can subject that data to the legal access  laws of any (or even many) jurisdictions in the world.&lt;/p&gt;
&lt;p&gt;While  there are indicators that such data is being accessed at increasing and  alarming rates, globally, yet even the dimensions of the problem remain  obscure. What is needed is a set of shared international norms relating  to transparency, data sovereignty and lawful access to private  information. In recent years, however, International forums have  appeared much more eager to adopt international standards for data  access (be it to combat cybercrime, secure critical infrastructure, or  help intellectual property holders uncover alleged infringers of their  rights) than for data sovereignty. Standards need to be developed that  will provide a basis for the special challenges to cross-jurisdictional  privacy that the move to the cloud highlights. This panel will examine  the need for such a cross-jurisdictional framework, what one might look  like, and, importantly, how one might bring such a framework about where  the issue appears to be a low priority for many national governments.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Agenda&lt;/b&gt;&lt;br /&gt; The objective of this panel is to attempt to resolve some of the  trans-border threats to civil liberties that are posed by the move to  the cloud. If a baseline of privacy protection can be assured at the  international level, concerns over limiting data flows on the basis of  jurisdiction will be alleviated. This panel will be divided into two  parts. The first part will discuss some of the challenges raised by the  cloud environment for traditional civil liberties paradigms. The  discussion in part two will be solution-driven—what rules can be put in  place at the international level to alleviate the heightened risk to  privacy and other civil liberties raised by a cloud-centric model.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Part 1: Cloud-based threats to cross-border civil liberties&lt;/b&gt; (45 mins)&lt;br /&gt; This part will discuss some of the challenges to civil liberties arising  from a cross-border cloud-based environment. The panel will be further  sub-divided into 25-30 minutes of panelist input, followed by 15-20  minutes of general discussion. Panelists will be asked to spend 3-5  minutes highlighting what they view as the most pressing of these  challenges may be.&lt;/p&gt;
&lt;p&gt;This might include specific recurring problems that have arisen in  many comparable online contexts, as they relate to the cloud such as,  for example:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; legal obligations to build in intercept capacity into Internet  services (compare CALEA 2.0 efforts in US, Lawful Access in Canada, and  domestic server obligations such as those imposed on RIM by India and  others in order to facilitate access to data that is encrypted in  transit). &lt;/li&gt;
&lt;li&gt; Concerns that many legal regimes permit voluntary conduct without  adequate safeguards for political pressure on companies, particularly  smaller businesses, to comply with requests. &lt;/li&gt;
&lt;li&gt; Inability to challenge surveillance laws because the programs are  shrouded in secrecy, because individuals are never made aware they have  been surveilled, because of standing issues, etc. &lt;/li&gt;
&lt;li&gt; Ability for ‘one-stop access’: cloud centralizes mass amounts of data  in one place. This concentration as well as a general erosion of  traditional criteria designed to ensure surveillance is targeted in a  way that impacts minimally on the general populace. &lt;/li&gt;
&lt;li&gt; Nascent suggestions of informal information sharing arrangements  through MLATs and less transparent more informal arrangements. &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Part 2: Adopting protections at the International level&lt;/b&gt; (45 mins.)&lt;br /&gt; The discussion in Part 2 will focus on how some of these problems can be  addressed at the international level by adoption of a set of principled  protections designed to meet the realities of online and specifically  cloud services. The focus is on problem resolution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Format for Part 2 will mirror that of Part 1. Panelists will be  provided with 3-5 minutes each and asked to present their views on one  or two solutions that can be adopted at the international level to the  problems presented in part 1. The remainder (20-25 minutes) will be  dedicated to general discussion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is hoped that the discussion will explore specific protections  that might be adopted at the international level, how to advance those  solutions, and what strategies can generally advance these objectives,  on the advocacy front, by use of transparency tools to increase  awareness of some of the issues.&lt;/p&gt;
&lt;p&gt;Questions to think about:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt; Historically, interception of communications received the strongest  protection at law, but it relied to a great extent on the act of  interception coinciding with the communication itself. Should we be  expanding this to other means of communications?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Do we have effective mechanisms to immunize private organizations from  political pressure to voluntarily share information? Particularly, a  lot of small companies can now have a lot of information. Are they well  equipped to resist political pressure&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Does the content/traffic data distinction still hold? Do we need a new  framework for analysing the types of data produced as a natural  byproduct of our online activities?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Can the MLAT regime form the basis for ensuring fundamental rights are  respected in legitimate cross-border surveillance activities? If so,  what would it take to have it reflect a baseline of protections?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Is it feasible to develop and formally adopt detailed limitations on state access at the international or regional level?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Is cloud-based info susceptible to unauthorized state access in new  ways? Is this something the law can fix (mandate encryption in storage  or other safeguards)? Social engineering concerns?&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Background Reading:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; The Draft International Principles on Surveillance &amp;amp; Human Rights: &lt;a href="http://necessaryandproportionate.org/"&gt;http://necessaryandproportionate.org/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; Global Network Initiative, "Principles on Freedom of Expression and Privacy", &lt;a href="http://www.globalnetworkinitiative.org/sites/default/files/GNI_-_Principles_1_.pdf"&gt;http://www.globalnetworkinitiative.org/sites/default/files/GNI_-_Principles_1_.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; I. Brown &amp;amp; D. Korff, “Digital Freedoms in International Law”, GNI 2012, &lt;a href="http://wsms1.intgovforum.org/sites/default/files/Digital%20Freedoms%20in%20International%20Law.pdf"&gt;http://wsms1.intgovforum.org/sites/default/files/Digital%20Freedoms%20in%20International%20Law.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; J. McNamee, “Internet Intermediaries: The New Cyberpolice?”, GIS Watch, &lt;a href="http://www.giswatch.org/sites/default/files/gisw_-_internet_intermediaries_-_the_new_cyber_police_.pdf"&gt;http://www.giswatch.org/sites/default/files/gisw_-_internet_intermediaries_-_the_new_cyber_police_.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; A. Escudero-Pascal &amp;amp; G. Hosein, "The Hazards of Technology-Neutral  Policy: Questioning Lawful Access to Traffic Data", (2004) 47(3) ACM  77, &lt;a href="http://web.it.kth.se/%7Eaep/PhD/docs/paper6-acm-1905-reviewed_20021022.pdf"&gt;http://web.it.kth.se/~aep/PhD/docs/paper6-acm-1905-reviewed_20021022.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; HRC, “Protect, Respect and Remedy: A Framework for Business and Human Rights”, April 2008, A/HRC/8/5, &lt;a href="http://198.170.85.29/Ruggie-report-7-Apr-2008.pdf"&gt;http://198.170.85.29/Ruggie-report-7-Apr-2008.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; HRC, “Guiding Principles on Business and Human Rights: Implementing  the United Nations ‘Protect, Respect and Remedy” Framework”, March 2011,  A/HRC/7/31, &lt;a href="http://www.ohchr.org/Documents/Issues/Business/A-HRC-17-31_AEV.pdf"&gt;http://www.ohchr.org/Documents/Issues/Business/A-HRC-17-31_AEV.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; ACLU, “New Justice Department Documents Show Huge Increase in Warrantless Electronic Surveillance”, Sept 2012, &lt;a href="http://www.aclu.org/blog/national-security-technology-and-liberty/new-justice-department-documents-show-huge-increase"&gt;http://www.aclu.org/blog/national-security-technology-and-liberty/new-justice-department-documents-show-huge-increase&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Organiser(s) Name:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Katitza Rodriguez, International Rights Director, Electronic Frontier Foundation (Peru)&lt;/li&gt;
&lt;li&gt; Tamir Israel, Staff Lawyer, Samuelson-Glushko Canadian Internet Policy  and Public Interest Clinic (CIPPIC), University of Ottawa (Canada)&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Previous Workshop(s):&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; &lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposalsReports2010View&amp;amp;wspid=66" title="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposalsReports2010View&amp;amp;wspid=66"&gt;http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=W...&lt;/a&gt;&lt;/li&gt;
&lt;li&gt; &lt;a href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=160" title="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=Workshops2011View&amp;amp;wspid=160"&gt;http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=W...&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Submitted Workshop Panelists:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Chair:&lt;/b&gt; Katitza Rodriguez, International Rights Director, Electronic Frontier Foundation; (US/Peru) (Civil Society) / Confirmed&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Ian Brown, Senior Research Fellow, Oxford Internet Institute (EU) (Academic) / Confirmed&lt;/li&gt;
&lt;li&gt; Bertrand de la Chapelle, Program Director at International Diplomatic Academy (EU) (Civil Society) / Confirmed&lt;/li&gt;
&lt;li style="text-align: justify; "&gt; Marc Crandall, Global Compliance, Google (US) (Private Sector)&lt;/li&gt;
&lt;li&gt; Elonnai Hickok, Policy Associate, Centre for Internet &amp;amp; Society (India) (Civil Society) /Confirmed&lt;/li&gt;
&lt;li&gt; Sophie Kwasny, Head of Data Protection Unit, Data Protection &amp;amp; Cybercrime Division, Council of Europe (IGO) / Confirmed&lt;/li&gt;
&lt;li&gt; Bruce Schneier, Chief Security Technology Officer of BT (US) (Private Sector) / Confirmed&lt;/li&gt;
&lt;li&gt; Wendy Seltzer, Policy Counsel, W3C (US) (Technical Community) / Confirmed&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;Name of Remote Moderator(s):                                        Paul Muchene, iHub Nairobi (Kenya) (Private Sector)                               Assigned Panellists:                                        &lt;a href="http://wsms1.intgovforum.org/2012/panellist/de-la-chapelle-bertrand"&gt;de La Chapelle - Bertrand&lt;/a&gt; &lt;a href="http://wsms1.intgovforum.org/2012/panellist/rodriguez-katitza"&gt;Rodriguez - Katitza&lt;/a&gt; &lt;a href="http://wsms1.intgovforum.org/2012/panellist/brown-ian"&gt;Brown - Ian&lt;/a&gt; &lt;a href="http://wsms1.intgovforum.org/2012/panellist/schneier-bruce"&gt;Schneier - Bruce&lt;/a&gt; &lt;a href="http://wsms1.intgovforum.org/2012/panellist/kwasny-sophie"&gt;KWASNY - Sophie&lt;/a&gt; &lt;a href="http://wsms1.intgovforum.org/2012/panellist/seltzer-wendy"&gt;Seltzer - Wendy&lt;/a&gt; &lt;a href="http://wsms1.intgovforum.org/2012/panellist/crandall-marc"&gt;Crandall - Marc&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/cloudy-jurisdiction-addressing-the-thirst-for-cloud-data-in-domestic-legeal-processes'&gt;https://cis-india.org/news/cloudy-jurisdiction-addressing-the-thirst-for-cloud-data-in-domestic-legeal-processes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance Forum</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-09T01:00:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study">
    <title>Clause 12 Of The Data Protection Bill And Digital Healthcare: A Case Study</title>
    <link>https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study</link>
    <description>
        &lt;b&gt;In light of the state’s emerging digital healthcare apparatus, how does Clause 12 alter the consent and purpose limitation model?&lt;/b&gt;
        &lt;p&gt;The blog post was &lt;a class="external-link" href="https://www.medianama.com/2022/02/223-data-protection-bill-digital-healthcare-case-study/"&gt;published in Medianama&lt;/a&gt; on February 21, 2022. This is the second in a two-part series by Amber Sinha.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In the &lt;a href="https://www.medianama.com/2022/02/223-data-protection-bill-consent-clause-state-function/"&gt;previous post&lt;/a&gt;, I looked at provisions on non-consensual data processing for state functions under the most recent version of recommendations by the Joint Parliamentary Committee on India’s Data Protection Bill (DPB). The true impact of these provisions can only be appreciated in light of ongoing policy developments and real-life implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To appreciate the significance of the dilutions in Clause 12, let us consider the Indian state’s range of schemes promoting digital healthcare. In July 2018, NITI Aayog, a central government policy think tank in India released a strategy and approach paper (Strategy Paper) on the formulation of the National Health Stack which envisions the creation of a federated application programming interface (API)-enabled health information ecosystem. While the Ministry of Health and Family Welfare has focused on the creation of Electronic Health Records (EHR) Standards for India during the last few years and also identified a contractor for the creation of a centralised health information platform (IHIP), this Strategy Paper advocates a completely different approach, which is described as a Personal Health Records (PHR) framework. In 2021, the National Digital Health Mission (NDHM) was launched under which a citizen shall have the option to obtain a digital health ID. A digital health ID is a unique ID and will carry all health records of a person.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;A Stack Model for Big Data Ecosystem in Healthcare&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A stack model as envisaged in the Strategy Paper, consists of several layers of open APIs connected to each other, often tied together by a unique health identifier. The open nature of APIs has the advantage that it allows public and private actors to build solutions on top of it, which are interoperable with all parts of the stack. It is however worth considering both the ‘openness’ and the role that the state plays in it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even though the APIs are themselves open, they are a part of a pre-decided technological paradigm, built by private actors and blessed by the state. Even though innovators can build on it, the options available to them are limited by the information architecture created by the stack model. When such a technological paradigm is created for healthcare reform and health data, the stack model poses additional challenges. By tying the stack model to the unique identity, without appropriate processes in place for access control, siloed information, and encrypted communication, the stack model poses tremendous privacy and security concerns. The broad language under Clause 12 of the DPB needs to be looked at in this context.&lt;/p&gt;
&lt;p&gt;Clause 12 allows non-consensual processing of personal data where it is necessary “for the performance of any function of the state authorised by law” in order to provide a service or benefit from the State. In the previous post, I had highlighted the import of the use of only ‘necessity’ to the exclusion of ‘proportionality’. Now, we need to consider its significance in light of the emerging digital healthcare apparatus being created by the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The National Health Stack and National Digital Health Mission together envision an intricate system of data collection and exchange which in a regulatory vacuum would ensure unfettered access to sensitive healthcare data for both the state and private actors registered with the platforms. The Stack framework relies on repositories where data may be accessed from multiple nodes within the system. Importantly, the Strategy Paper also envisions health data fiduciaries to facilitate consent-driven interaction between entities that generate the health data and entities that want to consume the health records for delivering services to the individual. The cast of characters involve the National Health Authority, health care providers and insurers who access the National Health Electronic Registries, unified data from different programmes such as National Health Resource Repository (NHRR), NIN database, NIC and the Registry of Hospitals in Network of Insurance (ROHINI), private actors such as Swasth, iSpirt who assist the Mission as volunteers. The currency that government and private actors are interested in is data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The promised benefits of healthcare data in an anonymised and aggregate form range from Disease Surveillance to Pharmacovigilance as well as Health Schemes Management Systems and Nutrition Management, benefits which have only been more acutely emphasised during the pandemic. However, the pandemic has also normalised the sharing of sensitive healthcare data with a variety of actors, without much thinking on much-needed data minimisation practises.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The potential misuses of healthcare data include greater state surveillance and control, predatory and discriminatory practices by private actors which rely on Clause 12 to do away with even the pretense of informed consent so long as the processing of data is deemed necessary by the state and its private sector partners to provide any service or benefit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Subclause (e) in Clause 12, which was added in the last version of the Bill drafted by MeitY and has been retained by the JPC, allows processing wherever it is necessary for ‘any measures’ to provide medical treatment or health services during an epidemic, outbreak or threat to public health. Yet again, the overly-broad language used here is designed to ensure that any annoyances of informed consent can be easily brushed aside wherever the state intends to take any measures under any scheme related to public health.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Effectively, how does the framework under Clause 12 alter the consent and purpose limitation model? Data protection laws introduce an element of control by tying purpose limitation to consent. Individuals provide consent to specified purposes, and data processors are required to respect that choice. Where there is no consent, the purposes of data processing are sought to be limited by the necessity principle in Clause 12. The state (or authorised parties) must be able to demonstrate necessity to the exercise of state function, and data must only be processed for those purposes which flow out of this necessity. However, unlike the consent model, this provides an opportunity to keep reinventing purposes for different state functions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the absence of a data protection law, data collected by one agency is shared indiscriminately with other agencies and used for multiple purposes beyond the purpose for which it was collected. The consent and purpose limitation model would have addressed this issue. But, by having a low threshold for non-consensual processing under Clause 12, this form of data processing is effectively being legitimised.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study'&gt;https://cis-india.org/internet-governance/blog/medianama-february-21-2022-amber-sinha-data-protection-bill-digital-healthcare-case-study&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-03-01T15:07:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds">
    <title>Clash of the cyberworlds </title>
    <link>https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds</link>
    <description>
        &lt;b&gt;In an increasingly digital world, the issue of Internet freedom and governance has become hugely contested. Censorship and denial of access occur across the political spectrum of nations, even in liberal democracies. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Latha Jishnu, Dinsa Sachan and Moyna was published in &lt;a class="external-link" href="http://www.downtoearth.org.in/content/clash-cyberworlds?page=0,0"&gt;Down to Earth magazine's January 15, 2013 issue&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In run-up to the just-concluded World Conference on International Telecommunications in Dubai, there was a frenzied campaign to ensure that governments kept their hands off the Internet. It was feared the International Telecommunications Union, a UN body, was aiming to take control of the Internet. That hasn’t happened. But the outcome in Dubai has highlighted once again the double speak on freedom by countries that claim to espouse it and by corporations interested in protecting their interests, says Latha Jishnu, who warns that the major threat to the Internet freedom comes from the wide-ranging surveillance measures that all governments are quietly adopting. Dinsa Sachan speaks to institutions and officials to highlight the primacy of cyber security for nations, while Moyna tracks landmark cases that will have a bearing on how free the Net remains in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For months now a little-known UN agency, the International Telecommunication Union (ITU), has been looming large in cyberspace, portrayed as an evil force plotting to take over the Internet and threatening to destroy its freedom by rewriting archaic regulations. ITU, set up in 1865, is primarily a technical body that administers a 24-year-old treaty, International Telecommunication Regulations (ITRs), which are basic principles that govern the technical architecture of the global communication system.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ITU.png" alt="ITU" class="image-inline" title="ITU" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;How did the 193-nation ITU, which regulates radio spectrum, assigns satellite orbits and generally works to improve telecom infrastructure in the developing world, turn into everyone’s favourite monster in the digital world? The provocation was ITU’s World Conference on International Telecommunications (WCIT) in Dubai, where ITRs were proposed to be revised. Leaked documents of the proposals made to ITU had shown that statist countries like Russia and China, known for their crackdown on Internet freedom, had put forward proposals to regulate digital “crime” and “security” aspects that are currently not regulated at the global level for want of consensus on balancing enforcement with protection of individual rights. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Other proposals were about technical coordination and the setting up of  standards that enable all the devices, networks and software across the  Internet to communicate and connect with one another. Although ITU  secretary general Hamadoun I Touré had emphasised that the Dubai WCIT  was primarily attempting to chart “a globally agreed-upon roadmap that  offers future connectivity to all, and ensures sufficient communications  capacity to cope with the exponential growth in voice, video and data”,  there was widespread scepticism among developed countries.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;&lt;span&gt;Online subversion in India&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;AT the seventh annual meeting of the Internet Governance  Forum in Baku, Azerbaijan, last November, Minister for Communications  and Information Technology Kapil Sibal was a star turn. He made an  elevating speech about the need to put in place a “collaborative,  consultative, inclusive and consensual” system for dealing with policies  involving the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India, with 125 million Internet users—a number that “is  likely to grow to about half a billion over the next few years”—would be  a key player in the cyberworld of tomorrow, he promised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the minister, Internet governance was an  oxymoron because the concept of governance was for dealing with the  physical world and had no relevance in cyberspace. These were high  sounding words that crashed against the reality of India’s paranoia over  online subversion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For starters, Sibal flew into a media blitz over Google’s  transparency Report which ranked India second globally in accessing  private details of its citizens. Even if it was a far second behind the  US, it was an embarrassing revelation for the government which appears  to have been rather enthusiastic in seeking information on the users of  its various services. Such user data would include social networking  profiles, complete gmail accounts and search terms used. In the first  half of 2012, India made 2,319 requests related to 3,467 users compared  with 7,969 requests by the US. Globally, Google clocked a total of  20,938 requests for user data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few days down the line there was a public explosion  over the arrest of two young women in Palghar, near Mumbai, for posting a  prosaic comment on Facebook over Bal Thackeray’s death. Thanks to the  deliberately vague wording of Section 66A of the IT Act, such arrests  have become common and Rajya Sabha devoted a whole afternoon to discuss  the impugned legislation and seek its withdrawal. Sibal’s response has  been to issue guidelines on the use of this Section which civil society  organisations say will do nothing to sort out matters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Then there are the IT (Intermediaries Guidelines) Rules,  2011, issued under Section 79 of the IT Act, which have been used  indiscriminately by business interests to shut down websites, resulting  in unbridled censorship of the Internet time and again. Although a  motion for its annulment was moved in Parliament by Rajya Sabha member P  Rajeeve, it was withdrawn after Sibal promised to talk to all  stakeholders. A host of MPs have termed the rules a violation of right  to freedom of speech besides going against the laws of natural justice.  The promised meeting of stakeholders has not yielded any results and  censorship on grounds of possible online piracy continues. In this  regard, India is more restrained than the US which has pulled down huge  numbers of domains on the ground they were violating intellectual  property by selling pirated goods.&lt;/p&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/userdata.png" alt="User Data" class="image-inline" title="User Data" /&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Western global powers, behemoth Internet companies, private telecom corporations and almost the entire pack of civil liberties organisations came together in a frenzied campaign to ensure that ITU kept its hands off the Internet. Massive online petitions were launched, backed by Internet companies such as search engine Google and social networking service Facebook. The Internet, they said, should not become an ITU remit because it would change the multi-stakeholder approach, which currently marks the way the Internet is governed, and replace it with government control that would curb digital freedom. Not only did the US administration oppose the revision of ITRs, the US Congress also passed a rare unanimous resolution against the WCIT proposals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the end, it was an anti-climax: nothing much came of these proposals. Although WCIT was marked by high drama—a walkout by the US and six European countries, a show of hands on a contested but innocuous resolution and an unexpected vote—the “final acts” (&lt;a href="http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf"&gt;http://www.itu.int/en/wcit-12/Documents/final-acts-wcit-12.pdf&lt;/a&gt;) or the changes in ITRs make no mention of the I word. Not once. The 30-page document states at the outset that “these regulations do not address the content-related aspects of telecommunications” —an indirect reference to the Internet.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/32_20130115.jpg" alt="World Internet Usage" class="image-inline" title="World Internet Usage" /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;Ultimately, it was a triumph of the US-led position even if 89 of the 144 eligible countries signed it. Most of the developed countries refused to sign it. Nor, unexpectedly, did India, and thereby hangs a curious tale. Officials who were privy to the negotiations told Down To Earth that India was all set to sign the new ITRs when its delegation got last-minute instructions from Delhi not to endorse them. “It was unexpected and a let-down for India and our global allies,” confesses an official of the Ministry of Communications &amp;amp; IT. “There was nothing in the final document that we had objections to.” According to the grapevine, Minister for Communications and Information Technology Kapil Sibal was facing pressure from two sides: the US Administration and domestically from civil society, Internet service providers and the private telecom players who had objected to India’s proposals on ITRs. The US is known to be keeping a close eye on what India decides to do on the new treaty which it can still ratify.&lt;/p&gt;
&lt;p&gt;In the Dubai treaty, the only ITR that does impinge on the Net is (Article 5B) on unsolicited bulk electronic communications or spam. But even here, what it merely states is that member-states should endeavour to take necessary measures to prevent the “propagation of unsolicited bulk electronic communications and minimize its impact on international telecommunication services.”&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In many ways, what took place during the hectic days before and during the December 3-14 WCIT was in a broad sense a replay of the Cold War scenario of the good (freedom-loving countries) versus evil (authoritarian or autocratic regimes), although alliance may have shifted in the two blocs. What is clear is that a larger geopolitical fight is playing out with the Internet as disputed terrain. American analysts themselves have pointed out that the “US got most of what it wanted. But then it refused to sign the document and left in a huff.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even the innocuous Article 5A, which calls on members “to ensure the security and robustness of international telecommunication networks”, was interpreted by US delegation head Terry Kramer as a means that could be used by some governments to curb free speech!&lt;br /&gt;&lt;br /&gt;As an outraged Saudi delegate said, “It is unacceptable that one party to the conference gets everything they want and everybody else must make concessions. And after having made many concessions, we are then asked to suppress the language which was agreed to. I think that that is dangerous. We are on a slippery slope.” The final outcome: all the contentious issues were relegated to resolutions, which have no legal basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, the US has managed to get its way on most issues: protecting the mammoth profits of its Internet companies and ensuring that control of the Internet address system, now done by a group based in the US, will not be shared with other ITU members. And, the likes of Google (2011 profit: $37.9 billion) and Facebook will not have to pay telecom companies for use of their networks to deliver content.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Challenges of securing cyberworld&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;E-commerce in India, where every tenth person is online, is on the rise—and, consequently, crime on the Internet. In 2011, the country’s nodal agency for handling cyber crime, Indian Computer Emergency Response Team, tackled 13,301 incidences of security breach. The incidents ran the gamut from website intrusions, phishing to network probing and virus attacks. Further, in 2009, 2010, 2011 and 2012 (until October), there were 201, 303, 308 and 294 cyber attacks respectively on sites owned by the Indian government. Most notably, hacker group Anonymous defaced the website of Union Minister of Communications and Information Technology, Kapil Sibal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To beef up cyber security, the Union ministry plans to pump in Rs 45 crore in 2012-13. It also put up a draft cyber security policy for public comments in 2011. Currently, cases involving cyber security and crime are handled under the IT Act of 2000 (Amendment 2008) and the Indian Penal Code.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But will the government go about its business of securing the Net in a responsible manner? There is scepticism. Section 69 of the Act gives any government agency the right to “intercept, monitor or decrypt” information online. Chinmayi Arun, assistant professor of law at National Law University in Delhi, said at the Internet Governance Conference held at FICCI in October that crimes like defamation are not on the same page as cyber terrorism, and “we have to question whether they warranty invasion of privacy”. She added that the workings of the surveillance system has to be made more open to build public trust.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pranesh Prakash, policy director at Centre for Internet and Society (CIS) in Bengaluru, draws attention to a fundamental flaw in the section. “Government is allowed to wire tap under the Telegraph Act, 1885. But the Act lays out specific guidelines for such an action. For example, you can only tap phones in the case of a ‘public emergency’ or ‘public safety’ situation. The IT Act does not put such limitations on interception of information,” he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cyber security and ITU&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A few months prior to the controversial World Conference on International Telecommunications in Dubai, countries, including Russia and Arab states, had proposed measures that would, through International Telecommunication Union (ITU), grant disproportional power to countries to control the Internet in the name of security measures. Several proposals, most notably those of India and Arab States, explicitly stated in the proposed Article 5A that countries should be able to “undertake appropriate measures, individually or in cooperation with other Member States” to tackle issues relating to “confidence and security of telecommunications/ICTs”. It raised alarm among civil society. US-based think tank Center for Democracy and Technology (CDT) said in its report dated September, 2012, that cyber security does not fall under the ambit of International Telecom Regulations, and some countries would misuse such privileges for “intrusive or repressive measures”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposal by African member states recommended that nations should “harmonise their laws” on data retention. In other words, intermediaries would have to retain public data for a long period so that governments can access it whenever they please. With regard to this, CDT noted, “Not only do national laws on data retention vary greatly, but there is ongoing controversy about whether governments should impose data retention mandates at all.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A clause in the Arab proposal on routing said, “A Member State has the right to know how its traffic is routed.” Currently, the way Internet works, senders and recipients do not know how data between their computers travels or is routed. However, enabling countries to have control over routing has its dangers. CDT notes, “(This) would simply not work and could fundamentally disrupt the operation of the Internet.” Internet traffic travels over an IP network. While travelling, it is fragmented into small packets. Packets generally take a different path across interconnected networks in many different countries before reaching the recipient’s computer. CDT notes providing routing information to countries would require “extensive network engineering changes, not only creating huge new costs, but also threatening the performance benefits and network efficiency of the current system”. Although routing was not part of India’s proposal, Ram Narain, deputy director general at the department of telecommunications, told Down To Earth it was one of the country’s concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, to civil society’s partial relief, such draconian cyber security clauses were not adopted in the new itr treaty. Two clauses added to the treaty, Article 5A and 5B, address some cyber security concerns. Titled “Security and robustness of networks”, Article 5A urges countries to “individually and collectively endeavour to ensure the security and robustness of international telecommunication networks”. Article 5B talks about keeping tabs on spam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Prasanth Sugathan, senior advocate with Software Freedom Law Centre, an international network of lawyers, says while he would have preferred that the two clauses were kept out of the new treaty, they do not seem harmful. “They are a much toned down version of what Arab states and Russia had suggested,” he says.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This is one reason India, Brazil and other democracies from the developing world also want a change in ITRs. They want the Internet behemoths to pay for access to their markets so that such revenues can be used to build their own Internet infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the furious debate on keeping the Net free of international control even hawk-eyed civil society organisations prefer to ignore the monetary aspects of Net control. Some analysts believe that maintaining the status quo is not so much about protecting the values of the Internet as about safeguarding interests, both monetary and hegemonistic. Such an assessment may not be wide of the mark if one joins the dots. Google, says a Bloomberg report of December 10, “avoided about $2 billion in worldwide income taxes in 2011 by shifting $9.8 billion in revenues into a Bermuda shell company, almost double the total from three years before”. It also said that the French, Italian, British and Australian governments are probing Google’s tax avoidance in its borderless operations.&lt;/p&gt;
&lt;table class="vertical listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Top10Internet.png" alt="Top 10 Internet" class="image-inline" title="Top 10 Internet" /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;What is clear, however, is that a number of countries for reasons springing from different motivations, appear determined to undermine America’s control of the outfits that now define how the Internet works. Although the US maintains that ICANN (Internet Corporation for Assigned Names and Numbers) is a private, non-profit corporation, it is overseen by the US Commerce Department. According to People’s Daily, what the US spouts about Net freedom is so much humbug. In an August 2012 report, the leading Chinese daily claimed the US “controls and owns all cyberspaces in the world, and other countries can only lease Internet addresses and domain names from the US, leading to American hegemonic monopoly over the world’s Internet”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also highlighted a fact that has slipped below the radar. During the Iraq invasion, the US government asked ICANN to terminate services to Iraq’s top-level domain name “.iq” and thereafter all websites with the domain name “.iq” disappeared overnight. It charges the US with having “taken advantage of its control over the Internet to launch an invisible war against disobedient countries and to intimidate and threaten other countries”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this may be true, the irony is that China, with its great firewall of censorship, is in no shape to position itself as a champion of freedom. Like other authoritarian countries, it will do everything to police the Net and control it.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The right of countries and peoples to access the Net was highlighted in Dubai when some African countries raised the issue of US control of the global Internet. Some of these, such as Sudan, have long been complaining about Washington’s sanctions that entail denial of Internet services. ITU officials point out that Resolution 69, first passed in the 2008 meeting, invoked again in 2010 and dusted off once again for the WCIT negotiations, invoked “human rights” to argue for “non-discriminatory access to modern telecom/ ICT facilities, services and applications”. Says Paul Conneally, head of Communications &amp;amp; Partnership Promotion at ITU, “The real target of these resolutions are US sanctions imposed on nations that are deemed bad actors. These sanctions mean that people in those countries—not just the government, mind you, but everyone, innocent and guilty alike—are denied access to Internet services such as Google, Sourceforge, domain name registrars such as GoDaddy, software and services from Oracle, Windows Live Messenger, etc.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The catalogue of Sudan’s complaints shows at least 27 instances in 2012 when companies from Google to Microsoft and Paypal to Oracle cut off their services to the African country. This might explain why major companies would be opposed to the resolution on a right to access Internet services. Such a right would allow countries to use ITRs to compel them to provide services they might otherwise have preferred not to. But so far all such sanctions appear to have been a decision of the US Administration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem of the digital divide, in fact, did not get the headlines it should have. Africa accounts for just 7 per cent of the 2.4 billion people who use the Net worldwide and penetration in the region is just 15.6 per cent of the population. Compare this with North America where over 78 per cent are linked to the digital world and Touré’s logic about the ITU’s mandate appears reasonable.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;&lt;span&gt;When Apple censors the drone war&lt;/span&gt;&lt;/b&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;NETIZENS know that the Internet suffers from the  depredations of government, hackers and viruses. But not many are aware  that companies are as prone to taking legitimate stuff off the Net on  the flimsiest grounds. In the case of Apple it could have been misplaced  patriotism or plain business sense that prompted it to block an app  which monitors drone strike locations in November last year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img align="left" alt="image" class="standalone-image" height="279" src="http://www.downtoearth.org.in/dte/userfiles/images/36_20130115.jpg" width="141" /&gt;The  App Store rejected the product, calling it “objectionable and crude”.  Drones+ (see photo) is an application that simply adds a location to a  map every time a drone strike is reported in the media and added to a  database maintained by the UK’s Bureau of Investigative Journalism. Josh  Begley, a graduate student at New York University, who developed the  app, says it shows no visuals of war or classified information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All it does is to keep its users informed about when and  where drone attacks are taking place in Pakistan and Afghanistan. “This  is behavior I would expect of a company in a repressive country like  China, not an iconic American company in the heart of Silicon Valley,”  says a petition to the company CEO. Did Apple’s censorship have anything  to do with the fact that it received huge contracts from the Pentagon?  US legislators have joined the protests against Apple.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most brazen act of corporate censorship occurred in  August 2012 with NASA’s livestream coverage of the Curiosity rover’s  landing on Mars in the space agency’s $2.5 billion mission. A news  agency, Scripps, coolly claimed as its own the public domain video  posted on NASA’s official YouTube channel that documented the epic  landing (see our opening visuals). “This video contains content from  Scripps Local News, who has blocked it on copyright grounds. Sorry about  that,” said a message on NASA’s blackened screen. So much for the  strict US laws aimed at curbing online piracy!&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Touré noted that the revised ITRs would see greater transparency in global roaming charges, lead to “more investment in broadband infrastructure” and help those with disabilities. But he was hopeful that the new treaty signed in Dubai would make it possible for the 4.5 billion people still offline to be connected. “When all these people come online, we hope they will have enough infrastructure and connectivity so that traffic will continue to flow freely,” Touré said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But should ITU govern the Net? Not in its entirety, according to experts. For one, ITU until the Dubai meeting was far from being transparent and does not allow participation of civil society or other stakeholders in its negotiations unless they are part of the official delegation of the member-states. In fact, even critics of the current system, who think the system is lopsided and hypocritical, believe ITU needs to reform itself and confine to the carrier/infrastructure layer of the Internet. Nor should it get into laying down standards which is done by Internet Engineering Task Force (IETF) and the naming and numbering that is managed by ICANN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Conneally counters this by asking what would happen if the US decided to deny domain name root zone to Iran because of its bad human rights record. “Suppose it ordered Verisign to remove .IR from the DNS root and make it non-functional. Would we want ICANN/the Internet governance regime to be used as a political/strategic tool to reform Iran? What happens to global interoperability when the core infrastructure gets used in that way?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Who then should ensure that the Internet is run in a free and open manner? Should it be the Internet Governance Forum (IGF)? But IGF is to be an open consultative forum that cannot by itself govern. It brings in participation for any or all Internet-related policy processes but it by itself was never supposed to do policy or governance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Parminder Jeet Singh, executive director of ItforChange, says whoever governs is the government for that purpose. “This truism is significant in the present context, because there is an attempt by those who really control/ govern the Internet at present, largely through illegitimate and often surreptitious ways, to confuse issues around Internet governance in all ways possible, including through abuse of established language and political principles and concepts.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ITforChange is a Bengaluru institution working on information society theory and practice, especially from the standpoint of equity, social justice and gender equality, and it is that perspective which informs Singh’s suggestions. “What we need are safeguards as, for instance, with media regulation. The Internet, of course, is much more than media. It is today one of the most important factors that can and will influence distribution of economic, social and political power. Without regulation it will always be that those who currently dominate it will take away the biggest pie.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;&lt;span&gt;Surveillance club&lt;/span&gt;&lt;/b&gt;
&lt;div&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Eight Indian companies are among the 700 members of  European Telecommunications Standards Institute. The group works with  government and law enforcement agencies to integrate surveillance  capabilities into communications infrastructure. It also hosts regular  meetings on lawful interception&lt;/p&gt;
&lt;table&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt; Wipro Technologies &lt;/b&gt;&lt;/td&gt;
&lt;td&gt;&lt;b&gt; Associate Service Providers&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;•  HCL Technologies Limited&lt;/td&gt;
&lt;td&gt;• Associate Consultancy for Co./Partnership&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Accenture Services Pvt Ltd&lt;/td&gt;
&lt;td&gt;• Observers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• CEWiT&lt;/td&gt;
&lt;td&gt;• Associate Research Body&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Saankhya Labs Pvt Ltd&lt;/td&gt;
&lt;td&gt;• Associate Manufacturers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Sasken Communication&lt;/td&gt;
&lt;td&gt;• Associate Manufacturers&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• Technologies&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• SmartPlay Technologies&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Associate Consultancy for Co./Partnership&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;• TEJAS NETWORKS LTD&lt;/td&gt;
&lt;td&gt;• Associate Manufacturers&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Other critics of the current system concede that bringing governments on board, especially authoritarian and statist powers which the digital world threatens, would give them perverse incentives to control it. But this threat should be met not by insisting that the Internet needs no governance or regulation, but by safeguards that ensure equitable access and benefits, Singh stresses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the jury is out on the question whether the new ITRs will make any material difference to the way, and if at all, the Net will come under added government oversight and intervention, developments elsewhere show that ITU is not the main threat to digital freedom.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The irony is that while cyber security is contentious in ITU, other international organisations, such as the UN Office on Drugs and Crime (UNODC) and a clutch of influential telecom industry associations, are pushing for surveillance programmes that ensure policing of a high order with sophisticated infrastructure to monitor online communications. A host of countries already have such systems in place and are pressuring countries like India to fall in line.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A UNODC report, titled ‘The use of the Internet for terrorist purposes’, has detailed how countries can and should use new technology for online surveillance—all in the name of anti-terrorism. The report discusses sensitive issues such as blocking websites and using spyware to bypass encryption and also urges countries to cooperate on an agreed framework for data retention.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the same time, powerful industry bodies, such as ATIS (Alliance for Telecommunications Industry Solutions) and the European Telecommunications Standards Institute (ETSI), are reported to be working with government and law enforcement agencies to integrate surveillance capabilities into communications infrastructure, according to Future Tense, a project which looks at emerging technologies and how these affect society, policy and culture. It says India is under pressure from another industry organisation, the Telecommunications Industry Association (TIA), “to adopt global standards for surveillance”, calling on the country’s government to create a “centralized monitoring system” and “install state-of-the-art legal intercept equipment”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TIA is a Washington-based trade group which brings together companies such as Nokia, Siemens Networks and Verizon Wireless, and is focused on issues related to electronic surveillance and is developing standards for intercepting VOIP and data retention alongside with ETSI and ATIS. At least seven Indian companies are members of ETSI, which is said to hold international meetings on data interception thrice a year.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Add to this chilling list the International Chamber of Commerce. It is reported to be seeking the establishment of surveillance centre hubs of several countries to help governments intercept communications and obtain data that is stored in cloud servers in foreign jurisdictions. Given this backdrop why are the US and its cohorts creating a ruckus on ITRs?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would also mean that by focusing on ITRs and ITU as a major threat to Internet freedom civil society may be jousting at windmills.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Malice and freedom of speech&lt;/h2&gt;
&lt;p&gt;&lt;i&gt;Two suits highlight the challenge of treading between the two&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Among the many legal cases in India related to the use and misuse of the world wide web, two stand out for involving web giants and provoking sharp reaction. These are the cases registered in Delhi district courts in December 2011, objecting to chunks of content—portraying prominent political figures and religious places among others in a certain light—hosted on websites. One was filed by a Delhi journalist, Vinai Rai, requesting the court to press criminal charges against 21 web agencies, including Google, Facebook and Yahoo! India. The other, filed by a social activist, M A A Qasmi, was a civil suit requesting action against 22 web agencies. Both mentioned that the content on the websites was inflammatory, threat to national integrity, unacceptable, and created enmity, hatred and communal discord.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img alt="Source: Google Transparency Report" height="233" src="http://www.downtoearth.org.in/dte/userfiles/images/37_20130115.jpg" title="Source: Google Transparency Report" width="457" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A year on, tangible impact has not been much. The number of accused in the civil case has come down to seven web agencies and in the criminal case the government is yet to issue summons to the companies concerned (see ‘The case so far’). However, these litigations are seen as landmarks in the recent history of the Internet and its interaction with societies and governments. The cases—especially off-the-record comments by the judiciary suggesting blanket ban and pre-screening of all content—provoked a debate on the freedom of expression and Indian cyber laws.&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The case so far &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;JANUARY 13, 2012:&lt;/b&gt; Delhi High Court dismisses petition by Google and Facebook asking to be absolved of criminal charges filed in district court&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;JANUARY 20:&lt;/b&gt; High Court asks for reply from Delhi Police in response to plea by Yahoo! India challenging district court summons&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;FEBRUARY 16:&lt;/b&gt; Court refuses to stay proceedings against Facebook and Google but allows them to be  represented by counsel&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;MARCH:&lt;/b&gt; Court dismisses  criminal charges against Yahoo! India  and Microsoft but says the charges  can be revived if new evidence comes  to light. Sets aside summons&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Malicious content exists on the web and may even need to be taken down, but the laws used to remove malicious content can also be used to curb political speech, thus, infringing on the right to freedom of expression, says Prasanth Sugathan, senior advocate with Software Freedom Law Centre, an international network of lawyers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some like Pranesh Prakash of non-profit Centre for Internet and Society believe the IT Rules are at odds with the IT Act and give powers for censorship. He explains that the IT Act, 2000, provides for protection of intermediaries; web browsers, social networking sites and websites cannot be held responsible for what a third party publishes on their forums—“similar to the way in which we cannot sue a telephone agency or a post office for someone else making use of these platforms to harass or defame another person”. But the IT rules of 2011 watered down this protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supreme Court advocate and cyber law expert Pavan Duggal explains how. The Act states once a complaint is made against certain content, the web agency hosting it must notify the person who put up the content, verify the content and judge whether it needs to be removed. But the rules state that once the web agency is notified it must remove the content within 36 hours or it could be prosecuted for not acting on the complaint. The rules have gone beyond the Act’s scope, especially vis-a-vis privacy and data protection, leaving no scope for hearing out the accused, he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The disjunct between the Act and the rules is being contested in  various spheres, including Parliament. But there is a bright side too.  Duggal believes the cases have brought pertinent issues, like free  speech and privacy concerns, into the public domain. Ramanjeet Chima,  policy adviser for Google, says freedom of expression is paramount for  Google but the recognition of local sentiments is also being given equal  weightage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Senior advocate Sidharth Luthra, who was representing Facebook in the  Delhi High Court, wonders whether the existing Indian laws are in tune  with the ever-changing online world. Unwilling to comment on the case,  he says the law is limited in its scope, while technology is not.  Refusing to comment on the cases, the Google adviser emphasised the need  to use the existing provisions of big web agencies to address  grievances regarding content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Internet “is not the wild wild west”; all content, users and  viewers can be traced, Duggal cautions. Since the Internet can impact  political issues government is increasingly looking for ways to control  it. “There is no ideal solution but it is evident that some monitoring  and regulation are required, and in all parts of the world all regimes  are in the process of addressing this,” he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds'&gt;https://cis-india.org/news/down-to-earth-latha-jishnu-dinsa-sachan-moyna-january-15-2013-clash-of-the-cyber-worlds&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2013-01-15T06:57:48Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
