<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 2151 to 2165.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/gni-annual-report-mentions-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/d-w-april-15-2013-untangling-the-web-of-indias-ungovernable-net"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ndtv-video-april-11-2013-the-social-network-regulating-social-media-unrealistic-impossible-necessary"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/wall-street-journal-april-15-2013-r-jai-krishna-vote-will-social-media-impact-the-election"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indian-express-april-6-2013-nishant-shah-off-the-record"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison">
    <title>IT (Amendment) Act, 2008, 69A Rules: Draft and Final Version Comparison</title>
    <link>https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison</link>
    <description>
        &lt;b&gt;Jadine Lannon has performed a clause-by-clause comparison of the 69A draft rules and 69A rules for Section 69A of the IT Act in order to better understand how the two differ. While there has been reshuffling of the clauses in the official rules, the content itself has not changed significantly. Notes have been included on some changes we deemed to be important.&lt;/b&gt;
        &lt;p&gt;Below is a chart depicting the 69A Draft Rules and the 69A Rules:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy5_of_pc1.png" alt="c1" class="image-inline" title="c1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc2.png" alt="c2" class="image-inline" title="c2" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc3.png" alt="c3" class="image-inline" title="c3" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc4.png" alt="c4" class="image-inline" title="c4" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy3_of_pc5.png" alt="c5" class="image-inline" title="c5" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_pc6.png" alt="c6" class="image-inline" title="c6" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;There was a lot of structural change between the draft rules and the official rules—many of the draft clauses were shuffled around and combined—but not a lot of change in content. Many of the changes that appear in the official rules serve to clarify parts of the draft rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three definitions were added under clause (2), two to clarify later references to a “designated officer” and a “nodal officer” and the third to indicate a form appended to the official Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (3) of the official rules then clarifies who shall be named the “designated officer”, which was not done in the draft rules as there was no inclusion of an official title of the officer who would have the responsibilities of the “designated officer”. Interestingly, clause (3) of the draft rules requires the Secretary of the Department of Information Technology, Ministry of Communications &amp;amp; Information Technology, Government of India to name an officer, whereas clause (3) of the official rules states that the “Central Government” shall designate an officer, a change in language that allows for much more flexibility on the government's part.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (5) in the draft rules and clause (4) in the official rules deal with the designation of a Nodal Officer, but omitted in the official rules are responsibilities of the designated officer, which includes acting on the “direction of the indian competent court”. This responsibility does not appear in any part of the official rules. Further, clause (4) of the official rules requires the organizations implicated in the rules to publish the name of the Nodal Officer on their website; this is an addition to the draft rules, and a highly useful one at that. This is an important move towards some form of transparency in this contentious process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (5) of the official rules significantly clarifies clause (4) of the draft rules by stating that the designated officer may direct any Agency of the Government or intermediary to block access &lt;i&gt;once a request from the Nodal Officer has been received&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (7) of the official rules uses the word “information” instead of “computer resource”, which is used in the corresponding clause (12) in the draft rules, when referring to the offending object. This change in language significantly widens the scope of what can be considered offending under the rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sub-sections (2), (3) and (4) of clause (9) of the official rules are additions to the draft rules. Sub-section (2) is a significant addition, as it deals with the ability of the Secretary of the Department of Information Technology's ability to block for public access any information or part thereof without granting a hearing to the entity in control of the offending information &lt;i&gt;in a case of emergency nature. &lt;/i&gt;The request for blocking will then be brought before the committee of examination of request &lt;i&gt;within 48 hours of the issue of direction&lt;/i&gt;, meaning that the offending information could be blocked for two days without giving notice to the owner/controller of the information of the reason for the blockage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An important clarification has been included in clause (15) of the official rules, which differs from clause (23) of the draft rules through the inclusion of the following phrase: “The Designated Officer shall maintain complete record of the &lt;i&gt;request received and action taken thereof &lt;/i&gt;[...] of the cases of blocking for public access”. This is a significant change from clause (23), which simply states that the “Designated Officer shall maintain complete &lt;i&gt;record&lt;/i&gt; [...] of the cases of blocking”. This could be seen as an important step towards transparency and accountability in the 69B process of blocking information for public access if clause (16) of the official rules did not state that all requests and complaints received and all actions taken thereof must be kept confidential, so the maintenance of records mentioned in clause (15) of the official rules appears to be only for internal record-keeping. However, just the fact that this information is being recording is a significant change from the draft rules, and may, if the sub-rules relating to confidentiality were to be changed, be useful data for the public.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison'&gt;https://cis-india.org/internet-governance/blog/it-amendment-act-69-a-rules-draft-and-final-version-comparison&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-30T10:10:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/gni-annual-report-mentions-cis">
    <title>CIS in GNI Annual Report</title>
    <link>https://cis-india.org/news/gni-annual-report-mentions-cis</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) joined the Global Network Intiative (GNI) in March 2012. Recently, GNI brought out its Annual Report. Sunil Abraham is quoted in it.&lt;/b&gt;
        &lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;h3&gt;&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/CISGNI.png/@@images/386c032d-ef13-4f28-ae35-6aca5d3a0da8.png" alt="CIS-GNI" class="image-inline" title="CIS-GNI" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;&lt;span class="discreet"&gt;GNI participants Sunil Abraham - Centre for Internet and Society (second from left) and Cynthia Wong - Center for Democracy and Technology (right) at the Google Internet at Liberty 2012 Conference, May 23, 2012. Also pictured (left to right): Dunja Mijatovic´ - OSCE Representative on Freedom of the Media, Judy Woodruff (Moderator) - Senior Correspondent, PBS Newshour, Mohamed El Dahshan - writer, journalist.&lt;/span&gt;&lt;br /&gt;&lt;b&gt;&lt;span class="discreet"&gt;Credit: Tony Powell&lt;/span&gt;&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;An increasingly global network&lt;/h3&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"Technological  development happens too quickly for us to purely depend on govern­ment  regulation. Self-regulation has an important role to play in keeping up  with these rapid changes … we will influence GNI norms using our Indian  perspective."&lt;br /&gt;&lt;b&gt;Sunil Abraham&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A  key objective for GNI is increasing its membership across all  constituencies with a focus on developing countries and emerging  markets. In 2012, GNI welcomed Azerbaijani press freedom organization the  Institute for Reporters’ Freedom and Safety as the global Internet  governance community gathered in Baku, Azerbaijan for the Internet  Governance Forum. Their participation, alongside other new civil society  participant, the Centre for Internet &amp;amp; Society based in Bangalore,  India represents a step toward further internationalizing the GNI  network. Other new members include the George Washington University Law  School and Christine Bader from the Kenan Institute for Ethics at Duke  University.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/gni-annual-report.pdf" class="internal-link"&gt;Click to read the GNI Annual Report&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/gni-annual-report.pdf" class="internal-link"&gt;&lt;span class="external-link"&gt; &lt;/span&gt;&lt;/a&gt;&lt;a class="external-link" href="http://www.globalnetworkinitiative.org/newsandevents/CIS_Joins.php"&gt;Click to read the news&lt;/a&gt; of CIS joining the GNI in 2012&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/gni-annual-report-mentions-cis'&gt;https://cis-india.org/news/gni-annual-report-mentions-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-25T07:31:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009">
    <title>Information Technology (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009</title>
    <link>https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009</link>
    <description>
        &lt;b&gt;Draft Rules under section 69B of the Information Technology (Amendment) Act, 2008 as notified by the Central Government. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;G.S.R. 782 (E).&lt;/b&gt;—&lt;b&gt; &lt;/b&gt;In exercise of the power conferred y clause (za) of sub-section (2) of section 87, read with sub-section (3) of section 69B of the Information Technology Act 2000 (21 of 2000), the Central Government hereby makes the following rules, namely:—&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. Short title and commencement.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) These rules may be called the Information Technology (Procedure and safeguard for Monitoring and Collecting Traffic Data or Information) Rules, 2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) They shall come into force on the date of their publication in the Official Gazette.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. Definitions.&lt;/b&gt;— In these rules, unless the context otherwise requires,—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) “Act” means the Information Technology Act, 2000 (21 of 2000);&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) “communication” means dissemination, transmission, carriage of information or signal in come manner and include both a direct communication and an indirect communication;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) “communication link” means the use of satellite, microwave, radio, terrestrial line, wire, wireless or any other communication media to inter-connect computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d) “competent authority” means the Secretary to the Government of India in the Department of Information Technology under the Ministry of Communications and Information Technology;&lt;/p&gt;
&lt;p&gt;(e) “computer resource” means computer resource as defined in clause (k) of sub-section (1) of section 2 of the Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) “cyber security incident” means any real or suspected adverse event in relation to cyber security that violates an explicitly or implicitly applicable security policy resulting in unauthorised access, denial of service/disruption, unauthorised use of a computer resource for processing or storage of information or changes to data, information without authorisation;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) “cyber security breaches” means unauthorised acquisition or unauthorised use by a person of data or information that compromises the confidentiality, integrity or availability of information maintained in a computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(h) “information” means information as defined in clause (v) of sub-section (1) of section 2 of the Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) “information security practices” means implementation of security policies and standards in order to minimize the cyber security incidents and breaches;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(j) “intermediary” means an intermediary as defined by clause (w) of sub-section (1) of section 2 of the Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(k) “monitor” with its grammatical variations and cognate expressions, includes to view or inspect or to record or collect traffic data or information generated, transmitted, received or stored in a computer resource by means of a monitoring device;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(l) “monitoring device” means any electronic, mechanical, electro-mechanical, electro-magnetic, optical or other instrument, device, equipment or apparatus which is used or can be used, whether by itself or in combination with any other instrument, device, equipment or apparatus, to view or inspect or record or collect traffic data or information;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(m) “port” or “application port” means a set of software rules which identifies and permits communication between application to application, network to network, computer to computer, computer system to computer system;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(n) “Review Committee” means the Review Committee constituted under rule 419A of Indian Telegraph Rules, 1951;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(o) “security policy” means documented business rules and processes for protecting information and the computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(p) “traffic data” means traffic data as defined in &lt;i&gt;Explanation (ii) &lt;/i&gt;to section 69B of the Act.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;3. Directions for monitoring.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) No directions for monitoring and collection of traffic data or information under sub-section (3) of section 69B of the Act shall be issued, except by an order made by the competent authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The competent authority may issue directions for monitoring for any or all of the following purposes related to cyber security, namely:-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) forecasting of imminent cyber incidents;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) monitoring network application with traffic data or information on computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) identification and determination of viruses or computer contaminant;&lt;/p&gt;
&lt;p&gt;(d) tracking cyber security breaches or cyber security incidents;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) tracking computer resource breaching cyber security or spreading virus or computer contaminants;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) identifying or tracking of any person who has breached, or is suspected of having breached or being likely to breach cyber security;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(g) undertaking forensic of the concerned computer resource as a part of investigation or internal audit of information security practices in the computer resources;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(h) accessing a stored information for enforcement of any provisions of the laws relating to cyber security for the time being in force;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) any other matter relating to cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Any direction issued by the competent authority under sub-rule (2) shall contain reasons for such direction and a copy of such direction shall be forwarded to the Review Committee withing a period of seven working days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The direction of the competent authority for monitoring and collection of traffic data or information may include the monitoring and collection of traffic data or information from any person or class of persons or relating to any particular subject whether such traffic data or information, or class of traffic data of information, are received with one or more computer resources, being a computer resource likely to be used for generation, transmission, receiving, storing of traffic data or information from or to one particular person or one or many set of premises.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4. Authorised agency of government for monitoring and collection of traffic data or information.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) The competent authority may authorise any agency of the government for monitoring and collection of traffic data or information generated, transmitted, received or stored in any computer resource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The agency authorised by the competent authority under sub-rule (1) shall designated one or more nodal officer, not below the rank of Deputy Secretary to the Government of India, for the purpose to authenticate and send the requisition conveying direction issued under rule 3 to the designated officers of the concerned intermediary or person in-charge of computer resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The requisition under sub-rule (2) shall specify the name and designation of the officer or the agency to whom the monitored or collected traffic data or information is to be disclosed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The intermediaries or person in-charge of computer resource shall designate one or more officers to receive requisition and to handle such requisition from the nodal officer for monitoring or collection of traffic data or information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(5) The requisition conveying directions for monitoring shall be conveyed to the designated officers of the intermediary or person in-charge of computer resources, in writing through letter or fax by the nodal officer or delivered, (including delivery by email signed with electronic signature), by an officer not below the rank of Under Secretary or officer of the equivalent rank.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(6) The nodal officer issuing the requisition conveying directions for monitoring under sub=rule (2) shall also make a request in writing to the designated officer of intermediary or person in-charge of computer resource for monitoring in accordance with the format indicated in such requisition and report the same to the officer designated under sub-rule (3).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(7) The nodal officer shall also make a request to the officer of intermediary or person in-charge of computer resource designated under sub-rule (4) to extend all facilities, co-operation and assistance in installation, removal and testing of equipment and also enable online access or to secure and provide online access to the computer resource for monitoring and collecting traffic data or information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(8) On receipt of requisition under sub-rule (2) conveying the direction issued under sub-rule (2) of rule 3 the designated officer of the intermediary or person in-charge of computer resource designated under sub-rule (4) shall acknowledge the receipt of requisition by way of letter or fax or electronically signed e-mail to the nodal officer within a period of two hours from the time of receipt of such requisition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(9) The officer of the intermediary or person in-charge of computer resource designed under sub-rule (4) shall maintain proper records of the requisitions received by him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(10) The designated officer of the intermediary or person in-charge of computer resource shall forward in every fifteen days a list of requisition conveying direction for monitoring or collection of traffic data or information to the nodal officer which shall include details such as the reference and date of requisition conveying direction of the concerned competent authority.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. Intermediary to ensure effective check in handling monitoring or collection of traffic data or information.&lt;/b&gt;— The intermediary or person in-charge of computer resources shall put in place adequate and effective internal checks to ensure that unauthorised monitoring or collection of traffic data or information does not take place and extreme secrecy is maintained and utmost care and precaution is taken in the matter of monitoring or collection of traffic data or information as it affects privacy of citizens and also that this matter is handled only by the designated officer of the intermediary or person in-charge of computer resource.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. Responsibility of intermediary.&lt;/b&gt;— The intermediary or person in-charge of computer resource shall be responsible for the actions of their employees also, and in case of violation of the provision of the Act and rules made thereunder pertaining to maintenance of secrecy and confidentiality of information or any unauthorised monitoring or collection of traffic data or information, the intermediary or person in-charge of computer resource shall be liable for any action under the relevant provision of the laws for the time being in force.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. Review of directions of competent authority.&lt;/b&gt;— The Review Committee shall meet at least once in two months and record its finding whether the directions issued under sub-rule (2) of rule 3 are in accordance with the provisions of sub-section (3) of section 69B of the Act and where the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above, it may set aside the directions and issue order for destruction of the copies, including corresponding electronic record of the monitored or collected traffic data or information.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;8. Destruction of records.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Every record, including electronic records pertaining to such directions for monitoring or collection of traffic data shall be destroyed by the designated officer after the expiry of a period of nine months from the receipt of direction or creation of record, whichever is later, except in a case where the traffic data or information is, or likely to be, required for functional requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Save as otherwise required for the purpose of any ongoing investigation, criminal complaint or legal proceedings the intermediary or the person in-charge of computer resource shall destroy records pertaining to directions for monitoring or collection of information within a period of six months of discontinuance of the monitoring or collection of traffic data and in doing so they shall maintain extreme secrecy.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9. Prohibition of monitoring or collection of traffic data or information without authorisation.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Any person who, intentionally or knowingly, without authorisation under sub-rule (2) of rule 3 or sub-rule (1) of rule 4, monitors or collects traffic data or information, or attempts to monitor or collect traffic data or information, or authorises or assists any person to monitor or collect traffic data or information in the course of its occurrence or transmission at any place within India, shall be proceeded against, punished accordingly under the relevant provisions of the law for the time being in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) the monitoring or collection of traffic data or information in computer resource by the employee of an intermediary or person in-charge of computer resource or a person duly authorised by the intermediary, may be undertaken in course of his duty relating to the services provided by that intermediary, if such activities are reasonably necessary for the discharge his duties as per the prevailing industry practices, in connection with the following matters, namely:—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) installation of computer resource or any equipment to be used with computer resource; or&lt;/p&gt;
&lt;p&gt;(ii) operation or maintenance of computer resource; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) installation of any communication link or software either at the end of the intermediary or subscriber, or installation of user account on the computer resource of intermediary and testing of the same for its functionality;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) accessing stored information from computer resource relating to the installation, connection or maintenance of equipment, computer resource or a communication link or code; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) accessing stored information from computer resource for the purpose of--&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) implementing information security practices in the computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b) determining any security breaches, computer contaminant or computer virus;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) undertaking forensic of the concerned computer resource as a part of investigation or internal audit; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) accessing or analysing information from a computer resource for the purpose of tracing a computer resource of any person who has contravened, or is suspected of having contravened or being likely to contravene, any provision of the Act that is likely to have an adverse impact on the services provided by the intermediary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The intermediary or the person in-charge of computer resource and its employees shall maintain strict secrecy and confidentiality of information while performing the actions as specified under sub-rule (2).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) The details of monitored or collected traffic data or information shall not be used or disclosed by intermediary or person in-charge of computer resource or any of its employees to any person other than the intended recipient of the said information under sub-rule (2) of rule 4. Any intermediary or its employees of person in-charge of computer resource who contravenes the provisions of this rule shall be proceeded against and punished accordingly under the relevant provisions of the Act or any other law for the time being in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10. Prohibition of disclosure of traffic data or information by authorised agency.&lt;/b&gt;— The details of monitored or collected traffic data or information shall not be used or disclosed by the agency authorised under sub-rule (1) of rule 4 for any other purpose, except for forecasting imminent cyber threats or general trend of port-wise traffic on Internet, or general analysis of cyber incidents, or for investigation or in judicial proceedings before the competent court in India.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11. Maintenance of confidentiality.&lt;/b&gt;— Save as otherwise provided in rule 10, strict confidentiality shall be maintained in respect of directions for monitoring or collection of traffic data or information issued by the competent authority under these rules.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009'&gt;https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-25T04:49:05Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009">
    <title>Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009</title>
    <link>https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009</link>
    <description>
        &lt;b&gt;Rules under section 69(2) of the Information Technology Act, 2008 (after the 2008 amendment).&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;G.S.R. 780 (E).— In exercise of the powers conferred by clause (y) of sub-section (2) of section 87, read with sub-section (2) of section 69 of the Information Technology Act, 2000 (21 of 2000), the Central Government hereby makes the following rules, namely:&lt;/p&gt;
&lt;p&gt;1. &lt;b&gt;Short title and commencement.&lt;/b&gt;—&lt;/p&gt;
&lt;p&gt;(1) These rules may be called the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;p&gt;(2)   They shall come into force on the date of their publication in the Official Gazette.&lt;/p&gt;
&lt;p&gt;2. &lt;b&gt;Definitions.&lt;/b&gt;— In these rules, unless the context otherwise requires,--&lt;/p&gt;
&lt;p&gt;(a) “Act” means the Information Technology Act, 2000 (21 of 2000);&lt;/p&gt;
&lt;p&gt;(b) “communication” means dissemination, transmission, carriage of information or signal in some manner and include both a direct communication and an indirect communication”;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c)   “communication link” means the use of satellite, microwave, radio, terrestrial line, wire, wireless or any other communication media to inter-connect computer resource;&lt;/p&gt;
&lt;p&gt;(d)   “competent authority” means--&lt;/p&gt;
&lt;p&gt;(i)     the Secretary in the Ministry of Home Affairs, in case of the Central Government; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii)   the Secretary in charge of the Home Department, in case of a State Government or Union territory, as the case may be;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) “computer resource” means computer resource as defined in clause (k) of sub-section (1) of section 2 of the Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) “decryption” means the process of conversion of information in non-intelligible form to an intelligible form via a mathematical formula, code, password or algorithm or a combination thereof;&lt;/p&gt;
&lt;p&gt;(g) “decryption assistance” means any assistance to--&lt;/p&gt;
&lt;p&gt;(i)     allow access, to the extent possible, to encrypted information; or&lt;/p&gt;
&lt;p&gt;(ii)   facilitate conversion of encrypted information into an intelligible form;&lt;/p&gt;
&lt;p&gt;(h) “decryption direction” means a direction issued under Rule (3) in which a decryption key holder is directed to--&lt;/p&gt;
&lt;p&gt;(i)     disclose a decryption key; or&lt;/p&gt;
&lt;p&gt;(ii)   provide decryption assistance in respect of encrypted information&lt;/p&gt;
&lt;p&gt;(i)   “decryption key” means any key, mathematical formula, code, password, algorithm or any other data which is used to--&lt;/p&gt;
&lt;p&gt;(i) allow access to encrypted information; or&lt;/p&gt;
&lt;p&gt;(ii) facilitate the conversion of encrypted information into an intelligible form;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(j) “decryption key holder” means any person who deploys the decryption mechanism and who is in possession of a decryption key for purposes of subsequent decryption of encrypted information relating to direct or indirect communications;&lt;/p&gt;
&lt;p&gt;(k) “information” means information as defined in clause (v) of sub-section (1) of section 2 of the Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(l)  “intercept” with its grammatical variations and cognate expressions, means the aural or other acquisition of the contents of any information through the use of any means, including an interception device, so as to make some or all of the contents of an information available to a person other than the sender or recipient or intended recipient of that communication, and includes--&lt;/p&gt;
&lt;p&gt;(a) monitoring of any such information by means of a monitoring device;&lt;/p&gt;
&lt;p&gt;(b) viewing, examination or inspection of the contents of any direct or indirect information; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) diversion of any direct or indirect information from its intended destination to any other destination to any other destination;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(m) “interception device” means any electronic, mechanical, electro-mechanical, electro-magnetic, optical or other instrument, device, equipment or apparatus which is used or can be used, whether by itself or in combination with any other instrument, device, equipment or apparatus, to intercept any information; and any reference to an “interception device” includes, where applicable, a reference to a “monitoring device”;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(n) “intermediary” means an intermediary as defined in clause (w) of sub-section (1) of section 2 of the Act;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(o) “monitor” with its grammatical variations and cognate expressions, includes to view or to inspect or listen to or record information by means of a monitoring device;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(p) “monitoring device” means any electronic, mechanical, electro-mechanical, electro-magnetic, optical or other instrument, device, equipment or apparatus which is used or can be used, whether by itself or in combination with any other instrument, device, equipment or apparatus, to view or to inspect or listen to or record any information;&lt;/p&gt;
&lt;p&gt;(q) “Review Committee” means the Review Committee constituted under rule 419A of Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;b&gt;Direction for interception or monitoring or decryption of any information.&lt;/b&gt;— No person shall carry out the interception or monitoring or decryption of any information generated, transmitted, received or stored in any computer resource under sub-section (2) of section 69 of the Act, except by an order issued by the competent authority;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that in an unavoidable circumstances, such order may be issued by an officer, not below the rank of Joint Secretary of the Government of India, who has been duly authorised by the competent authority;&lt;/p&gt;
&lt;p&gt;Provided further that in a case of emergency--&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i)     in remote areas, where obtaining of prior directions for interception or monitoring or decryption of information is not feasible; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii)   for operational reasons, where obtaining of prior directions for interception or monitoring or decryption of any information generation, transmitted, received or stored in any computer resource is not feasible,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;the interception or monitoring of decryption of any information generated, transmitted, received or stored in any computer resource may be carried out with the prior approval of the Head or the second senior most officer of the security and law enforcement agency (hereinafter referred to as the said security agency) at the Central level and the officer authorised in this behalf, not below the rank of the inspector General of Police or an officer of equivalent rank, at the State or Union territory level;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided also that the officer, who approved such interception or monitoring or decryption of information in case of emergency, shall inform in writing to the competent authority about the emergency and of such interception or monitoring or decryption within three working days and obtain the approval of the competent authority thereon within a period of seven working days and if the approval of competent authority is not obtained within the said period of seven working days, such interception or monitoring or decryption shall cease and the information shall not be intercepted or monitored or decrypted thereafter without the prior approval of the competent authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. &lt;b&gt;Authorisation of agency of Government.&lt;/b&gt;— The competent authority may authorise an agency of the Government to intercept, monitor or decrypt information generated, transmitted received or stored in any computer resource for the purpose specified in sub-section (1) of section 69 of the Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. &lt;b&gt;Issue of decryption direction by competent authority.&lt;/b&gt;— The competent authority may, under Rule (3), give any decryption direction to the decryption key holder for decryption of any information involving a computer resource or part thereof.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. &lt;b&gt;Interception or monitoring or decryption of information by a State beyond its jurisdiction.&lt;/b&gt;— Notwithstanding anything contained in Rule (3), if a State Government or Union territory Administration requires any interception or monitoring or decryption of information beyond its territorial jurisdiction, the Secretary in-charge of the Home Department in that State or Union territory, as the case may be, shall make a request to the Secretary in the Ministry of Home Affairs, Government of India for issuing direction to the appropriate authority for such interception or monitoring or decryption of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. &lt;b&gt;Contents for direction.&lt;/b&gt;— Any direction issued by the competent authority under Rule (3) shall contain reasons for such direction and a copy of such direction shall be forwarded to the Review Committee within a period of seven working days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. &lt;b&gt;Competent authority to consider alternative means in acquiring information.&lt;/b&gt;— The competent authority shall, before issuing any direction under Rule (3), consider possibility of acquiring the necessary information by other means and the direction under Rule (3) shall be issued only when it is not possible to acquire the information by any other reasonable means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. &lt;b&gt;Direction of interception or monitoring or decryption of any specific information.&lt;/b&gt;— The direction of interception or monitoring or decryption of any information generation, transmitted, received or stored in any computer resource shall be of any information as is sent to or from any person or class of persons or relating to any particular subject whether such information or class of information are received with one or more computer resources, or being a computer resource likely to be used for the generation, transmission, receiving, storing of information from or to one particular person or one or many set of premises, as may be specified or described in the direction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10. &lt;b&gt;Direction to specify the name and designation of the officer to whom information to be disclosed.&lt;/b&gt;— Every directions under Rule (3) shall specify the name and designation of the officer of the authorised agency to whom the intercepted or monitored or decrypted or stored information shall be disclosed and also specify that the use of intercepted or monitored or decrypted information shall be subject to the provisions of sub-section (1) of section 69 of the said Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;11. &lt;b&gt;Period within which direction shall remain in force.&lt;/b&gt;— The direction for interception or monitoring or decryption shall remain in force, unless revoked earlier, for a period not exceeding sixty days from the date of its issue and may be renewed from time to time for such period not exceeding the total period of one hundred and eighty days.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;12. &lt;b&gt;Authorised agency to designate nodal officer.&lt;/b&gt;— The agency authorised by the competent authority under Rule (4) shall designate one or more nodal officer, not below the rank of Superintendent of Police or Additional Superintendent of Police or the officer of the equivalent rank to authenticate and send the requisition conveying direction issued under Rule (3) for interception or monitoring or decryption to the designated officers of the concerned intermediaries or person in-charge of computer resource;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provided that an officer, not below the rank of Inspector of Police or officer of equivalent rank, shall deliver the requisition to the designated officer of the intermediary.&lt;/p&gt;
&lt;p&gt;13. &lt;b&gt;Intermediary to provide facilities, etc.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) The officer issuing the requisition conveying direction issued under Rule (3) for interception or monitoring or decryption of information shall also make a request in writing to the designated officers of intermediary or person in-charge of computer resources, to provide all facilities, co-operation and assistance for interception or monitoring or decryption mentioned in the directions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) On the receipt of request under sub-rule (1), the designated officers of intermediary or person in-charge of computer resources, shall provide all facilitates, co-operation and assistance for interception or monitoring or decryption of information mentioned in the direction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Any direction of decryption of information issued under Rule (3) to intermediary shall be limited to the extent the information is encrypted by the intermediary or the intermediary has control over the decryption key.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;14. &lt;b&gt;Intermediary to designate officers to receive and handle.&lt;/b&gt;— Every intermediary or person in-charge of computer resource shall designate an officer to receive requisition, and another officer to handle such requisition, from the nodal officer for interception or monitoring or decryption of information generation, transmitted, received or stored in any computer resource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;15. &lt;b&gt;Acknowledgement of instruction.&lt;/b&gt;— The designated officer of the intermediary or person in-charge of computer resources shall acknowledge the instructions received by him through letters or fax or e-mail signed with electronic signature to the nodal officer of the concerned agency within two hours on receipt of such intimation or direction for interception or monitoring or decryption of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;16. &lt;b&gt;Maintenance of records by designated officer.&lt;/b&gt;— The designated officer of intermediary or person in-charge of computer resource authorised to intercept or monitor or decrypt any information shall maintain proper records mentioning therein, the intercepted or monitored or decrypted information, the particulars of persons, computer resource, e-mail account, website address, etc. whose information has been intercepted or monitored or decrypted, the name and other particulars of the officer or the authority to whom the intercepted or monitored or decrypted information has been disclosed, the number of copies, including corresponding electronic records of the intercepted or monitored or decrypted information made and the mode of the method by which such copies, including corresponding electronic records are made, the date of destruction of the copies, including corresponding electronic record and the duration within which the directions remain in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;17. &lt;b&gt;Decryption key holder to disclose decryption key or provide decryption assistance.&lt;/b&gt;— If a decryption direction or a copy thereof is handed to the decryption key holder to whom the decryption direction is addressed by the nodal officer referred to in Rule (12), the decryption key holder shall within the period mentioned in the decryption direction--&lt;/p&gt;
&lt;p&gt;(a) disclose the decryption key; or&lt;/p&gt;
&lt;p&gt;(b) provide the decryption assistance,&lt;/p&gt;
&lt;p&gt;specified in the decryption direction to the concerned authorised person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;18. &lt;b&gt;Submission of the list of interception or monitoring or decryption of information.&lt;/b&gt;—                             &lt;br /&gt;(1) The designated officers of the intermediary or person in-charge of computer resources shall forward in every fifteen days a list of interception or monitoring or decryption authorisations received by them during the preceding fortnight to the nodal officers of the agencies authorised under Rule (4) for confirmation of the authenticity of such authorisations.                                                                     &lt;br /&gt;(2) The list referred to in sub-rule (1) shall include details, such as the reference and date of orders of the concerned competent authority including any order issued under emergency cases, date and time of receipt of such order and the date and time of implementation of such order.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;19. &lt;b&gt;Intermediary to ensure effective check in handling matter of interception or monitoring or decryption of information.&lt;/b&gt;— The intermediary or the person in-charge of the computer resource so directed under Rule (3), shall provide technical assistance and the equipment including hardware, software, firmware, storage, interface and access to the equipment wherever requested by the agency authorised under Rule (4) for performing interception or monitoring or decryption including for the purposes of--&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) the installation of equipment of the agency authorised under Rule (4) for the purposes of interception or monitoring or decryption or accessing stored information in accordance with directions by the nodal officer; or&lt;/p&gt;
&lt;p&gt;(ii) the maintenance, testing or use of such equipment; or&lt;/p&gt;
&lt;p&gt;(iii) the removal of such equipment; or&lt;/p&gt;
&lt;p&gt;(iv) the performance of any action required for accessing of stored information under the direction issued by the competent authority under Rule (3).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20. &lt;b&gt;Intermediary to ensure effective check in handling matter of interception or monitoring or decryption of information.&lt;/b&gt;— The intermediary or person in-charge of computer resources shall put in place adequate and effective internal checks to ensure the unauthorised interception of information does not take place and extreme secrecy is maintained and utmost care and precaution shall be taken in the matter of interception or monitoring or decryption of information as it affects privacy of citizens and also that it is handled only by the designated officers of the intermediary and no other person of the intermediary or person in-charge of computer resources shall have access to such intercepted or monitored or decrypted information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;21. &lt;b&gt;Responsibility of intermediary.&lt;/b&gt;— The intermediary or person in-charge of computer resources shall be responsible for any action of their employees also and in case of violation pertaining to maintenance of secrecy and confidentiality of information or any unauthorised interception or monitoring or decryption of information, the intermediary or person in-charge of computer resources shall be liable for any action under the relevant provisions of the laws for the time being in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;22. &lt;b&gt;Review of directions of competent authority.&lt;/b&gt;— The Review Committee shall meet at least once in two months and record its findings whether the directions issued under Rule (3) are in accordance with the provisions of sub-section (2) of section 69 of the Act and where the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above, it may set aside the directions and issues order for destruction of the copies, including corresponding electronic record of the intercepted or monitored or decrypted information.&lt;/p&gt;
&lt;p&gt;23. &lt;b&gt;Destruction of records of interception or monitoring or decryption of information&lt;/b&gt;.—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Every record, including electronic records pertaining to such directions for interception or monitoring or decryption of information and of intercepted or monitored or decrypted information shall be destroyed by the security agency in every six months except in a case where such information is required, or likely to be required for functional requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Save as otherwise required for the purpose of any ongoing investigation, criminal complain or legal proceedings, the intermediary or person in-charge of computer resources shall destroy records pertaining to directions for interception of information within a period of two months of discontinuance of the interception or monitoring or decryption of such information and in doing so they shall maintain extreme secrecy.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;24. &lt;b&gt;Prohibition of interception or monitoring or decryption of information without authorisation.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) Any person who intentionally or knowingly, without authorisation under Rule (3) or Rule (4), intercepts or attempts to intercept, or authorises or assists any other person to intercept or attempts to intercept any information in the course of its occurrence or transmission at any place within India, shall be proceeded against and punished accordingly under the relevant provisions of the laws for the time being in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) Any interception, monitoring or decryption of information in computer resource by the employee of an intermediary or person in-charge of computer resource or a person duly authorised by the intermediary, may be undertaken in course of his duty relating to the services provided by that intermediary, if such activities are reasonably necessary for the discharge his duties as per the prevailing industry practices, in connection with the following matters, namely--&lt;/p&gt;
&lt;p&gt;(i) installation of computer resource or any equipment to be used with computer resource; or&lt;/p&gt;
&lt;p&gt;(ii) operation or maintenance of computer resource; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) installation of any communication link or software either at the end of the intermediary or subscriber, or installation of user account on the computer resource of intermediary and testing of the same for its functionality;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) accessing stored information from computer resource relating to the installation, connection or maintenance of equipment, computer resource or a communication link or code; or&lt;/p&gt;
&lt;p&gt;(v) accessing stored information from computer resource for the purpose of--&lt;/p&gt;
&lt;p&gt;(a) implementing information security practices in the computer resource;&lt;/p&gt;
&lt;p&gt;(b) determining any security breaches, computer contaminant or computer virus;&lt;/p&gt;
&lt;p&gt;(c) undertaking forensic of the concerned computer resource as a part of investigation or internal audit; or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) accessing or analysing information from a computer resource for the purpose of tracing a computer resource of any person who has contravened, or is suspected of having contravened or being likely to contravene, any provision of the Act that is likely to have an adverse impact on the services provided by the intermediary.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) The intermediary or the person in-charge of computer resource and its employees shall maintain strict secrecy and confidentiality of information while performing the actions specified under sub-rule (2).&lt;/p&gt;
&lt;p&gt;25. &lt;b&gt;Prohibition of disclosure of intercepted or monitored decrypted information.&lt;/b&gt;—&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) The contents of intercepted or monitored or stored or decrypted information shall not be used or disclosed by intermediary or any of its employees or person in-charge of computer resource to any person other than the intended recipient of the said information under Rule (10).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The contents of intercepted or monitored or decrypted information shall not be used or disclosed by the agency authorised under Rule (4) for any other purpose, except for investigation or sharing with other security agency for the purpose of investigation or in judicial proceedings before the competent court in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) Save as otherwise provided in sub-rule (2), the contents of intercepted or monitored or decrypted information shall not be disclosed or reported in public by any means, without the prior order of the competent court in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(4) Save as otherwise provided in sub-rule (2), strict confidentiality shall be maintained in respect of direction for interception, monitoring or decryption issued by concerned competent authority or the nodal officers.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009'&gt;https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>jdine</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-07-06T01:51:58Z</dc:date>
   <dc:type>Page</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table">
    <title>Report on the 2nd Privacy Round Table meeting</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table</link>
    <description>
        &lt;b&gt;This post entails a report on the second Privacy Round Table meeting which took place on 20th April 2013. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In furtherance of Internet Governance multi-stakeholder Initiatives and Dialogue in 2013, the Centre for Internet and Society (CIS) in collaboration with the Federation of Indian Chambers of Commerce and Industry (FICCI), and the Data Security Council of India (DSCI), is holding a series of six multi-stakeholder round table meetings on “privacy” from April 2013 to August 2013. The CIS is undertaking this initiative as part of their work with Privacy International UK on the SAFEGUARD project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the CIS and DSCI were members of the Justice AP Shah Committee which created the “Report of Groups of Experts on Privacy”. The CIS has recently drafted a Privacy (Protection) Bill 2013, with the objective of contributing to privacy legislation in India. The CIS has also volunteered to champion the session/workshops on “privacy” in the meeting on Internet Governance proposed for October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the roundtables the Report of the Group of Experts on Privacy, DSCI´s paper on “Strengthening Privacy Protection through Co-regulation” and the text of the Privacy (Protection) Bill 2013 will be discussed. The discussions and recommendations from the six round table meetings will be presented at the Internet Governance meeting in October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dates of the six Privacy Round Table meetings are enlisted below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;New Delhi Roundtable: 13 April 2013&lt;/li&gt;
&lt;li&gt;Bangalore Roundtable: 20 April 2013&lt;/li&gt;
&lt;li&gt;Chennai Roundtable: 18 May 2013&lt;/li&gt;
&lt;li&gt;Mumbai Roundtable: 15 June 2013&lt;/li&gt;
&lt;li&gt;Kolkata Roundtable: 13 July 2013&lt;/li&gt;
&lt;li&gt;New Delhi Final Roundtable and National Meeting: 17 August 2013&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the first Privacy Round Table in Delhi, this &lt;a href="https://cis-india.org/internet-governance/blog/report-on-bangalore-privacy-meeting" class="internal-link"&gt;report&lt;/a&gt; entails an overview of the discussions and recommendations of the second Privacy Round Table meeting in Bangalore, on 20&lt;sup&gt;th&lt;/sup&gt; April 2013.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Overview of DSCI´s paper on “Strengthening Privacy Protection through Co-regulation”&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting began with a brief summary of the first Privacy Round Table meeting which took place in Delhi on 13&lt;sup&gt;th&lt;/sup&gt; April 2013. Following the summary, the Data Security Council of India (DSCI) presented the paper “Strengthening Privacy Protection through Co-regulation”. In particular, DSCI presented the regulatory framework for data protection under the IT (Amendment) Act 2008, which entails provisions for sensitive personal information, privacy principles and “reasonable security practices”. It was noted that the privacy principles, as set out in the Justice AP Shah Report, refer to: data collection limitation, data quality, purpose specification, use limitation, security safeguards, openness and individual participation. The generic definitions of identified privacy principles refer to: notice, choice and consent, collection limitation, purpose specification, access and correction, disclosure of information, security, openness/transparency and accountability. However, the question which prevailed is what type of regulatory framework should be adopted to incorporate all these privacy principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DSCI suggested a co-regulatory framework which would evolve from voluntary self-regulation with legal recognition. The proposed co-regulatory regime could have different types of forms based on the role played by the government and industry in the creation and enforcement of rules. DSCI mentioned that the Justice AP Shah Committee recommends: (1) the establishment of the office of the Privacy Commissioner, both at the central and regional levels, (2) a system of co-regulation, with emphasis on SROs and (3) that SROs would be responsible for appointing an ombudsman to receive and handle complaints.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion points brought forward by DSCI were:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;What role should government and industry respectively play in developing and enforcing a regulatory framework? &lt;/li&gt;
&lt;li&gt;How can the codes of practice developed by industry be enforced in a co-regulatory regime? How will the SRO check the successful implementation of codes of practice? How can the SRO penalize non-compliances?&lt;/li&gt;
&lt;li&gt;How can an organization be incentivized to follow the codes of practice under the SRO?&lt;/li&gt;
&lt;li&gt;What should be the role of SROs in redressal of complaints?&lt;/li&gt;
&lt;li&gt;What should be the business model for SROs?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;DSCI further recommended the establishment of “light weight” regulations based on global privacy principles that value economic beliefs of data flow and usage, while guaranteeing privacy to citizens. DSCI also recommended that bureaucratic structures that could hinder business interests be avoided, as well as that the self-regulatory framework of businesses adapts technological advances to the privacy principles. Furthermore, DSCI recommended that self-regulatory bodies are legally recognised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion on the draft Privacy (Protection) Bill 2013&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Discussion of definitions and preamble: Chapter I &amp;amp; II&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The second session began with a discussion of definitions used in the Bill. In particular, many participants argued that the term ´personal data´ should be more specific, especially since the vague definition of the term could create a potential for abuse. Other participants asked who the protection of personal data applies to and whether it covers both companies and legal persons. Furthermore, the question of whether the term ´personal data´ entails processed and stored data was raised, as well as whether the same data protection regulations apply to foreign citizens residing in India. A participant argued that the preamble of the Bill should be amended to include the term ´governance´ instead of ´democracy´, as this privacy legislation should be applicable in all cases in India, regardless of the current political regime.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Sensitive Personal Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The meeting proceeded with a discussion of the term ´sensitive personal data´ and many participants argued that the term should be broadened to include more categories, such as religion, ethic group, race, caste, financial information and others. Although the majority of the participants agreed that the term ´sensitive personal data´ should be redefined, they disagreed in regards to what should be included in the term. In particular, the participants were not able to reach a consensus on whether religion, caste and financial information should be included in the definition of the term ´sensitive personal data´. Other participants argued that passwords should be included within the scope of ´sensitive personal data´, as they can be just as crucial as financial information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information vs. Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;During the discussion, a participant argued that there is a subtle difference between the term ´information´ and ´data´ and that this should be pointed out in the Bill to prevent potential abuse. Another participant argued that ´sensitive personal data´ should be restricted to risk factors, which is why unique identifiers, such as passwords, should be included in the definition of the term. Other participants argued that the context of data defines whether it is ´sensitive´ or not, as it may fall in the category of ´national security´ in one instance, but may not in another. Thus, all types of data should be considered within their context, rather than separately. The fact that privacy protection from several financial services already exists was pointed out and the need to exclude pre-existing protections from the Bill was emphasised. In particular, a participant argued that banks are obliged to protect their customers´ financial information either way, which is why it should not be included in the definition of the term ´sensitive personal data´.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Exemptions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Several exemptions to the right to privacy were discussed throughout the meeting. A participant asked whether the right to privacy would also apply to deceased persons and to unborn infants.  Another participant asked whether the term ´persons´ would be restricted to natural persons or if it would also apply to artificial persons. The fact that children should also have privacy rights was discussed in the meeting and in particular, participants questioned whether children´s right to privacy should be exempted in cases when they are being surveilled by their own parents.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion of “Protection of Personal Data”: Chapter III&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Following the discussion of definitions used in the Bill, the meeting proceeded with a discussion on the protection of personal data. A participant emphasized that the probability of error in data is real and that this could lead to major human rights violations if not addressed appropriately and in time. The fact that the Bill does not address the element of error within data was pointed out and suggested that it be included in draft Privacy (Protection) Bill. Another participant recommended an amendment to the Bill which would specify the parties, such as the government or companies, which would be eligible to carry out data collection in India. As new services are been included, the end purpose of data collection should be taken into consideration and, in particular, the ´new purposes´ for data collection would have to be specified at every given moment.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Collection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In terms of data collection, a participant emphasized that the objectives and purposes are different from an individual and an industry perspective, which should be explicitly considered through the Bill. Furthermore, the participant argued that the fact that multiple purposes for data collection may arise should be taken into consideration and relevant provisions should be incorporated in the in Bill. Another participant argued that the issue of consent for data collection may be problematic, especially since the purpose of data collection may change in the process and while an individual may have given consent to the initial purpose for data collection, he/she may not have given consent to the purposes which evolved throughout the process. Thus, explicitly defining the instances for data collection may not be feasible.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On the issue of consent, several participants argued that it would be important to distinguish between ´mandatory´ and ´optional´ information, as, although individuals may be forced by the government to hand over certain cases, in other cases they &lt;i&gt;choose &lt;/i&gt;to disclose their personal data. Thus participants argued that the Bill should provide different types of privacy protections for these two separate cases. Other participants argued that the term ´consent´ varies depending on its context and that this should too be taken into consideration within the draft Privacy (Protection) Bill. It was also argued that a mechanism capable of gaining individual consent prior to data collection should be developed. However, a participant emphasized upon the fact that, in many cases, it is very difficult to gain individual consent for data collection, especially when individuals cannot read or write. Thus the need to include provisions for uneducated or disabled persons within the Bill was highly emphasized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further questions were raised in regards to the withdrawal of consent. Several participants argued that the draft Privacy (Protection) Bill should explicitly determine that all data is destroyed once an individual has withdrawn consent. Participants also argued that consent should also be a prerequisite to the collection, processing, sharing and retention of secondary users´ data, such as the data of individuals affiliated to the individual in question. A participant argued that there are two problematic areas of consent: (1) financial distribution (such as loans) and (2) every financial institution must store data for a minimum of seven to eight years. Having taken these two areas in consideration, the participant questioned whether it is feasible to acquire consent for such cases, especially since the purpose for data retention may change in the process. Participants also referred to extreme cases through which consent may not be acquired prior to the collection, processing, sharing and retention of data, such as in disastrous situations (e.g. earthquake) or in extreme medical cases (e.g. if a patient is in a coma), and suggested that relevant provisions are included in the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Disclosure&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In terms of data disclosure, several participants argued that the disclosure of data can potentially be a result of blackmail and that the Bill does not provide any provisions for such extreme cases. Furthermore, participants argued that although consent may be taken from an individual for a specific purpose, such data may be used in the process for multiple other purposes by third parties and that it is very hard to prevent this. It was recommended that the Bill should incorporate provisions to prevent the disclosure of data for purposes other than the ones for which consent was given.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant recommended that individuals are informed of the name of the Data Processor prior to the provision of consent for the disclosure of data, which could potentially increase transparency. Many participants raised questions in regards to the protection of data which goes beyond the jurisdiction of a country. It remains unclear how data will be processed, shared, retained when it is not handled within India and several participants argued that this should be encountered within the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Destruction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In terms of data destruction, a participant emphasized upon the fact that the draft Privacy (Protection) Bill lacks provisions for the confirmation of the destruction of data. In particular, although the Bill guarantees the destruction of data in certain cases, it does not provide a mechanism through which individuals can be assured that their data has actually been deleted from databases. Another individual argued that since the purposes for data collection may change within the process, it is hard to determine the cases under which data can be destroyed. Since the purposes for data collection and data retention may change in time, the participant argued that it would be futile to set a specific regulatory framework for data destruction. Another participant emphasized upon the value of data and stated that although some data may appear to have no value today, it may in the future, which is why data should not be destroyed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Processing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In terms of data processing, participants argued that privacy protection complications have arisen in light of the social media. In particular, they argued that social media develop and expand technologically constantly and that it is very difficult to regulate the processing of data that may be conducted by such companies. A participant emphasized the difference between (1) the processing of data when it is being read and (2) the processing of data when it is being analysed. Such a distinction should be considered within the Bill, as well as the use of data which is being processed. Many participants distinguished between the primary and secondary use of data and argued that the secondary use of data should also be included in the privacy statements of companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, participants also pointed out that purposes for the collection of data may overlap and that it may be difficult to distinguish between primary and secondary purposes for data collection. A participant disagreed with this argument and stated that it is possible to distinguish between primary and secondary purposes of data collection, as long as companies are transparent about why they are collecting information and about the purpose of its processing. This argument was seconded by another participant who argued that the specific purposes for the processing of data should be incorporated in the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In brief, the following questions with regards to chapter III of the bill were raised during the meeting:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Should consent be required prior to the collection of data?&lt;/li&gt;
&lt;li&gt;Should consent be acquired prior and after the disclosure of data? &lt;/li&gt;
&lt;li&gt;Should the purpose of data collection be the same as the purpose for the disclosure of data?&lt;/li&gt;
&lt;li&gt;Should an executive order or a court order be required to disclose data?&lt;/li&gt;
&lt;li&gt;At the background of national security, anyone´s data can be under the ´suspicion list´. How can the disclosure of data be prevented in such circumstances? Non-criminals may have their data in the ´suspicion list´ and under national security, the government can disclose information; how can their information be protected in such cases?&lt;/li&gt;
&lt;li&gt;An individual may not be informed of the collection, analysis, disclosure and retention of his/her data; how can an individual prevent the breach of his/her data?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Should companies notify individuals when they share their (individuals´) data with international third parties?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In brief, the following recommendations with regards to chapter III of the bill were raised during the meeting:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The data subject has to be informed, unless there is a model contract. &lt;/li&gt;
&lt;li&gt;The request for consent should depend on the type of data that is to be disclosed.&lt;/li&gt;
&lt;li&gt;Some exceptions need to be qualified (for example, in instances of medical patients different exceptions may apply).&lt;/li&gt;
&lt;li&gt;The shared data may be considered private data (need of a relevant regulatory framework).&lt;/li&gt;
&lt;li&gt;An international agreement should deal with the sharing of data with international third parties - incorporating such provisions in Indian law would probably be inadequate.&lt;/li&gt;
&lt;li&gt;If any country is not data-secure, there should be an approval mechanism for the transfer of data to such a country. &lt;/li&gt;
&lt;li&gt;India could have an export law which would monitor which data is sensitive and should not be shared with international third parties.&lt;/li&gt;
&lt;li&gt;The problem with disclosure is when there is an exception for certain circumstances &lt;/li&gt;
&lt;li&gt;Records should be kept on individuals who disclose data; there should be a trail of disclosure, so that there can be more transparency and accountability. &lt;/li&gt;
&lt;li&gt;Ownership of data is a controversial issue and so is the disclosure of data; consumers give up the ownership of their data when they share it with third parties and ergo cannot control its disclosure (or non-disclosure).&lt;/li&gt;
&lt;li&gt;´Data ownership´ should be included in the definitions of the Bill. &lt;/li&gt;
&lt;li&gt;What is the ´quality´ of data? The definition for ´quality´ under section 11 of the Bill is not well defined and should be improved.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion of “Interception of Communications”: Chapter IV&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on the interception of communications started off with a statement that 70 percent of the citizens in India are enrolled on “voice”, which means that the interception of communications affects a large proportion of the population in the country. A participant asked whether the body corporate in India should be treated as a telecommunications provider and whether it should be responsible for the interception of communications. Another participant argued that the disclosure of information should be closely regulated, even when it is being intercepted for judicial purposes. Many participants agreed that data which is collected and intercepted should not be used for other purposes other than the original purpose, as well as that such information should not be shared with third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions were raised in regards to who should authorise the interception of communications and a participant recommended that a judicial warrant should be a prerequisite to the interception of communications in India. Some participants argued that the Bill should clearly specify the instances under which communications can be intercepted, as well as the legitimate purposes for interception. It was also argued that some form of ´check and balance´ should exist for the interception of communications and that the Bill should provide mechanisms to ensure that interception is carried out in a legal way. Several participants recommended that the Privacy Commissioner is mandated to approve the interception of communications, while questions were raised in regards to the sharing of intercepted data.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion on self-regulation and co-regulation&lt;/h2&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The final session of the meeting consisted of a debate on self-regulation and co-regulation. Questions were raised in regards to how self-regulation and co-regulation could be enforced. Some participants recommended the establishment of sector regulations which would mandate the various forms of surveillance, such as a separate regulation for the UID scheme. However, this recommendation was countered by participants who argued that the government would probably not approve every sector regulation and that this would leave large areas of surveillance unregulated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The participants who supported the self-regulation framework argued that the government should not intervene in the industry and that the industry should determine its own rules in terms of handling its customers´ data. Other participants supported the co-regulatory framework and argued that companies should cooperate with the Privacy Commissioner in terms of handling customers´ data, especially since this would increase transparency on how the industry regulates the use of customers´ data. The supporters of co-regulation supplemented this statement by arguing that the members of the industry should comply with regulations and that if they do not, there should be sanctions. Such arguments were countered by supporters of self-regulation, who stated that the industry should create its own code of conduct and that the government should not regulate its work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, it was argued that although government regulations for the handling of data could make more sense in other countries, in India, the industry became aware of privacy far sooner than what the government did, which is why a self-regulatory regime should be established in terms of handling data. Such arguments were countered by supporters of co-regulation who argued that the industry has vested interest in self-regulation, which should be countered by public policy. This argument was also countered by participants arguing that, given the high levels of corruption in India, the Privacy Commissioner in India may be corrupt and co-regulation may end up being ineffective. Other participants questioned this argument by stating that if India lacks legal control over the use of data by companies, individuals are exposed to potential data breaches. Supporters of co-regulation stated that the Privacy Commissioner should formulate a set of practices and both the industry and the government should comply with them.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Meeting conclusion&lt;/h2&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second Privacy Round Table entailed a discussion of the definitions used in the draft Privacy (Protection) Bill 2013, as well as of chapters II, III and IV on the right to privacy, the protection of personal data and the interception of communications. The majority of the participants agreed that India needs a privacy legislation and that individuals´ data should be legally protected. However, participants disagreed in regards to how data would be safeguarded and the extent to which data collection, processing, sharing, disclosure, destruction and retention should be regulated. This was supplemented by the debate on self-regulation and co-regulation which concluded the meeting; participants disagreed on whether the industry should regulate the use of customers´ data autonomously from government regulation or whether the industry should co-operate with the Privacy Commissioner for the regulation of the use of data. Though a consensus was not reached in regards to co-regulation and self-regulation, the majority of the participants agreed upon the establishment of a privacy legislation which would safeguard individuals´ personal data. The major issue, however, with the creation of a privacy legislation in India would probably be its adequate enforcement.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table'&gt;https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:54:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting">
    <title>Report on the 1st Privacy Round Table meeting</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting</link>
    <description>
        &lt;b&gt;This report entails an overview of the discussions and recommendations of the first Privacy Round Table meeting in New Delhi, on 13th April 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In furtherance of Internet Governance multi-stakeholder Initiatives and Dialogue in 2013, the Centre for Internet and Society (CIS) in collaboration with the Federation of Indian Chambers of Commerce and Industry (FICCI), is holding a series of six multi-stakeholder round table meetings on “privacy” from April 2013 to August 2013. DSCI will be joining the CIS as a co-organizer on 20 April 2013. The CIS is undertaking this initiative as part of their work with Privacy International UK on the SAFEGUARD project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the CIS was a member of the Justice AP Shah Committee which created the “Report of Groups of Experts on Privacy”. The CIS has recently drafted a Privacy (Protection) Bill 2013, with the objective of contributing to privacy legislation in India. The CIS has also volunteered to champion the session/workshops on “privacy” in the final meeting on Internet Governance proposed for October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the roundtables the Report of the Group of Experts on Privacy and the text of the Privacy (Protection) Bill 2013 will be discussed. The discussions and recommendations from the six round table meetings will be presented at the Internet Governance meeting in October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The dates of the six Privacy Round Table meetings are enlisted below:&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;New Delhi Roundtable: 13 April 2013&lt;/li&gt;
&lt;li&gt;Bangalore Roundtable: 20 April 2013&lt;/li&gt;
&lt;li&gt;Chennai Roundtable: 18 May 2013&lt;/li&gt;
&lt;li&gt;Mumbai Roundtable: 15 June 2013&lt;/li&gt;
&lt;li&gt;Kolkata Roundtable: 13 July 2013&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;New Delhi Final Roundtable and National Meeting: 17 August 2013&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;This &lt;a href="https://cis-india.org/internet-governance/blog/report-on-delhi-privacy-round-table.pdf" class="internal-link"&gt;report &lt;/a&gt;entails an overview of the discussions and recommendations of the first Privacy Round Table meeting in New Delhi, on 13th April 2013.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Overview of Justice A P Shah Report: Purpose, Principles and Framework&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Delhi Privacy Round Table meeting began with an overview of the Report of the Group of Experts on Privacy, by the Justice AP Shah Committee. The report recommends a potential framework for privacy in India, including detailing nine privacy principles and a regulatory framework. India currently lacks a privacy legislation and during the meeting it was pointed out that the protection of personal data in India is a highly significant issue, especially in light of the UID scheme. The Report of the Group of Experts on Privacy has guided the draft of the Privacy (Protection) Bill 2013 by CIS and will potentially guide the creation of privacy legislation by the Government of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the discussion on the report, a participant stated that, although a privacy legislation should be enacted in India to protect individuals´ personal data, commercial interests should not be endangered in the name of privacy. In particular, he called upon the need for the creation of a comprehensive privacy law in India and argued that although privacy should be protected, it should not have a negative impact on cloud computing, social media and on online businesses. Thus, the participant emphasized upon the creation of “light-weight” privacy legislation, which would protect individual´s right to privacy, without infringing upon the interests of the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the presentation of the privacy principles of the Justice AP Shah Report, the participants of the meeting made many comments on the feasibility of applying these principles within privacy legislation. In particular, a participant stated that setting a specific data retention framework is a very complicated issue, since the storage of data depends on many factors, some of which are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The purpose of the collection of data&lt;/li&gt;
&lt;li&gt;The purpose behind the collection of data may change within the process and may require a longer retention period, depending on the case&lt;/li&gt;
&lt;li&gt;Data is shared with third parties and it is hard to control how long they retain the data for&lt;/li&gt;
&lt;li&gt;Every type of data serves a different purpose and it is hard to set a universal data retention regulatory framework for all different types of data&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Some participants argued that the nature of technological evolution should be considered within the privacy principles framework, in the sense that privacy is a fundamental human right to the extent that it does not disrupt other human rights and interests, such as those of companies. Many questions were raised in regards to data collection, one of them being: When data is collected for two different purposes, should an individual be eligible to single access of both types of data? Many other questions were raised in regards to co-regulation and self-regulation. In particular, a participant argued that, based on international experience, India will not be able to enforce self-regulation. On self-regulation in the United States, a participant stated that there are fifty laws which deal with certain aspects of privacy. The participant suggested that India follows the U.S. model, since self-regulation is more effective when the industry is involved, rather than when the government just imposes laws in a top-down manner. The United States enables the involvement of the industry in self-regulation and a participant recommended the same for India, as well as that the standards for co-regulation and self-regulation are approved by the Privacy Commissioner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While identifying the clash between the right to privacy and the right to information, participants argued that safeguards are essential in a co-regulation framework, to ensure transparency. It was emphasized that India has a history of corruption and abuse of government power, which increases the probability of self-regulation in the country not being successful. India is currently facing serious problems of accountability and lack of transparency, and participants argued that a solid legal privacy framework would have to be reached, which would not require a legal amendment every other month. Participants pointed out that, within the privacy context, it is highly significant to identify where incentives lie and to regulate the Privacy Commissioner. Currently, if an officer denies access to information, it could take at least a year and a half before being authorised access to information. Participants argued that IT companies and law enforcement agencies should be enabled to access information and that the denial of access to information by the Privacy Commissioner should be regulated. In particular, participants referred to examples from the UK and questioned whether Privacy Commissioners should be considered public authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need to find a mechanism which would inform individuals of how their data is used was discussed during the meeting. A debate revolved around the question of whether the Indian government should inform an individual, once that individual´s personal information has been collected, used, processed and retained. Many participants argued that since customers decide to use their products, they should comply with the companies´ method of handling data and they should trust that the company will not misuse that data. This argument was countered by other participants, who argued that companies should be accountable as to how they handle customers´ data and that the sharing of customer data without the individual´s prior knowledge or consent could lead to data breaches and human rights violation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first hour of the meeting concluded that self-regulation should be considered in regards to IT companies dealing with customers´ data, but a consensus on whether companies should inform individuals of how their data is being used was not reached. Nonetheless, everyone in the meeting agreed upon the need to introduce privacy legislation in India, especially since phone tapping and the interception of communications is a widespread phenomenon in the country. India currently lacks rules for CDRs and the introduction of procedures and laws which would regulate the interception of communications in India was generally agreed upon throughout the first session of the meeting, even though the technical details of how data would be used by the private sector remained controversial.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Discussion Highlights:&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The pros and cons of self-regulation and co-regulation&lt;/li&gt;
&lt;li&gt;The national privacy principles – and how to build in insurance for technology&lt;/li&gt;
&lt;li&gt;The role of the Privacy Commissioner&lt;/li&gt;
&lt;li&gt;The definition of terms used in the draft Privacy (Protection) Bill 2013 &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Overview, explanation and discussion on the Privacy (Protection) Bill 2013&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The second session of the meeting began with an overview of the Privacy (Protection) Bill 2013, which was drafted by the Centre for Internet and Society (CIS) and represents a citizen´s version of a privacy legislation for India. The Bill entails chapters on the definition of privacy, personal data, interception, surveillance and the Privacy Commissioner. The surveillance chapter was not thoroughly discussed during the meeting, as it is primarily handled from a criminal law perspective and the majority of the participants were from the IT sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the meeting, the possibility of splitting the Bill was discussed. In particular, if separated, one Bill would focus on personal data and interception, while the second would focus on the criminal justice system. This would broadly be along the lines of the Canadian regime, which has two separate legislations to deal with privacy in the private and public sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participants discussed the possibility of narrowing down the scope of the exceptions to the right to privacy, and made the critique that the Bill does not include any provisions for co-regulation and self-regulation. Many participants insisted that self-regulation should be included in the Bill, while other participants pointed out that the Bill does not provide protection for very several types of data, such as sexual orientation, caste and religion, which may be problematic in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the draft Privacy (Protection) Bill 2013 may possibly clash with pre-existing laws, such as the IT Act, participants recommended that new definitions be created, to ensure that the proposed privacy legislation coincides with other contradicting legislation. Many questions were raised in regards to how personal data in the public sector would be distinguished by personal data in the private sector. Other questions were raised on the harmonization of the Privacy Bill with the Right to Information Act, as well as on the redefinition of surveillance and interception, their changing nature and the difficulties of regulating them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many participants agreed that India´s proposed Privacy Law should meet &lt;i&gt;global standards &lt;/i&gt;in order to attract more customers to Indian IT companies. However, a participant disagreed with this notion and argued that privacy principles generally differ depending on the social, economic, political and cultural status of a country and that the same universal privacy principles should not be imposed upon all countries. The participant argued that India should not copy global standards, but should instead create parallel legislation which would be interoperable with global standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue of to whom privacy laws would apply to was thoroughly discussed during the meeting. In particular, questions were raised in regards to whether privacy legislation would only apply to Indian individuals, or if it would also apply to international individuals using services and/or products by Indian IT companies. The data protection of customers beyond India remains vague and this was thoroughly discussed, while participants disagreed upon this issue. According to the draft Privacy (Protection) Bill 2013, consent needs to be taken from the individual, but it remains unclear whether that would be applicable to international customers. Questions were raised on how Indian IT companies would gain consent on the use of data by customers of foreign countries, especially since different laws apply to each country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second session of the meeting also entailed a debate on the disclosure of data to intelligence agencies by IT companies. Public authorities often request data from IT companies, on the grounds of national security and the prevention of crime and terrorism. However, questions were raised on whether companies should inform the individual prior to disclosing data to public authorities, as well as on whether certain terms, such as ´data´, should be reconceptualised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The term ´sensitive personal data´ was analysed in the meeting and it was argued that it entails data such as sexual orientation, religion, caste and health records among others. The participants emphasized the significance of the Bill explicitly including the protection of all sensitive personal data, as well as the need to provide requirements for using personal data in both the private and public sphere. Some participants suggested that the Privacy Commissioner in India be empowered with the authority to define the term ´sensitive personal data´ and that he/she not only ensures that all such data is legally protected, but also that health data is included within the definition of the term. A participant backed up the need to closely define the term ´sensitive personal data´, by arguing that a loose definition of the term, which would not include ethnic origin, could lead to social violence and tension and thus the necessity to strictly define the term is highly essential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Throughout the meeting it was pointed out that the Bill only deals with three aspects of privacy: personal data, surveillance and interception of communications. According to the draft Privacy (Protection) Bill 2013, an individual has the right to install surveillance technology in his/her private property, as long as that technology does not monitor other individuals in private areas. A participant asked about the balance between internet freedom and privacy, whether that should be included in the Bill and whether exemptions to privacy should be included within those lines. Other participants asked whether CDR records should be placed under privacy exemptions and whether the public disclosure of surveillance should be prohibited by the Bill. The need to redefine ´public figures´ was also emphasized in the meeting, as the threshold for public disclosure of data remains unclear. Some participants argued that the public disclosure of data should be prohibited, as this may potentially have severe effects on vulnerable groups of people, such as victims of violence. However, several participants disagreed by arguing that disclosure of data in the name of public interest should be enabled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the meeting several participants argued that the fact that many social networking sites and other online social media enable individuals to publicize their personal data makes it even harder to protect their online privacy. A participant emphasized the need to take freedom of expression into consideration, as it significantly enables individuals to disclose their personal data and increases the probability of online data breaches. Thus, it was argued that the draft Bill should distinguish between private data and private data being made publicly available. However, a participant argued that publicly available data depends on &lt;i&gt;where &lt;/i&gt;it is being broadcasted. To support this argument, an example was brought forward of an individual uploading a video on YouTube and that same video being broadcasted on national television. Thus the context in which data is made publicly available is highly significant and should be outlined within the draft Privacy Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting proceeded to a discussion on the interception of communications and a participant claimed that a major privacy abuse is to intercept communications without a warrant or a legal order, and to request for authorisation once the interception has already being conducted. It was argued that, in any case, legal authorisation prior to any interception should be a prerequisite and should be highlighted in the draft Privacy Bill. However, another participant argued that currently, the interception of communications needs to be legally authorised within seven days and that prior authorisation should not be a prerequisite. This argument was supported by the statement that in extreme cases, the conditions may not enable prior authorisation. Many participants then questioned this practice by asking what happens in cases when authorisation is not granted within seven days after an interception and whether the agencies conducting the interception would be accountable. An assertive answer was not given, but the majority of the participants appeared to agree upon the need for legal authorisation prior to any interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second session of the meeting concluded to the significance of the principles of notice and consent, which should apply in every case, prior to every interception of communications and in regards to the handling of all individuals´ personal data.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Discussion Highlights:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;If the draft Privacy (Protection) Bill 2013 should be split to two separate Bills&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Definition for the term ´sensitive personal data´ (to include broader categories, such as health data)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;If personal data should be distinguished in the private and public sector&lt;/li&gt;
&lt;li&gt;If the draft Privacy (Protection) Bill 2013 should comply with global privacy standards&lt;/li&gt;
&lt;li&gt;The nuances of consumer consent&lt;/li&gt;
&lt;li&gt;Various ways to define ´public figures´&lt;/li&gt;
&lt;li&gt;Freedom of expression in the context of the draft Privacy (Protection) Bill 2013 &lt;/li&gt;
&lt;li&gt;The distinction between exemptions and exceptions&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h2&gt;&lt;b&gt;In depth explanation and discussions regarding the Privacy (Protection)&lt;/b&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;b&gt; Bill 2013&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third and final session of the Privacy Round Table began with a discussion on data collection. In particular, a participant stated that data collection should not be defined for a specific purpose, as the purposes for data collection constantly change. This argument was supported by the statement that privacy provisions can negatively affect a company and reduce its earnings, since restricting the instances for data collection ultimately restricts the services a company can provide (such as advertising). Thus it was strongly argued that data collection should not be restricted to ´specific purposes´, because such purposes can constantly change and all such restrictions can have a negative impact on both the industry and on intelligence agencies carrying out crime investigations. Other participants countered this argument by stating that the term ´necessary information´ is too broad and vague and could create a potential for abuse, which is why data collection should be restricted to specific instances which are legally justified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The idea that Internet users should be given the right or the option not to be tracked was emphasized during the meeting. It was suggested that the draft Privacy Bill entails provisions which would oblige IT companies and intelligence agencies to inform an individual prior to the tracking of data and to request consent. This argument was supported by the statement that IT companies should protect the interest of the people, especially in terms of data mining and analytics. All such arguments were countered by a participant who stated that the collateral damage surrounding privacy needs to be acknowledged. This statement was supported by the argument that, although it is important to safeguard individuals´ right to privacy, regulations should not infringe upon the rights and interests of companies. In particular, it was argued that a deterrent law should not be created and that it should be acknowledged that individuals &lt;i&gt;choose&lt;/i&gt; to disclose a large amount of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting proceeded to the discussion of the disclosure of data to third parties, and many participants argued that they should not be obliged to disclose the names of the parties they are sharing data with. It was argued that businesses prefer not to reveal the names of the third parties to which they are disclosing data to, as this would affect their competitive advantage in the market. This argument was supplemented by the statement that it would not be feasible to inform individuals every time their data is being shared and that not only would this affect a company´s competitive advantage in the market, but it would also be costly and time consuming. Instead of informing individuals every time their data is being shared, it was argued that companies are responsible for protecting their customers´ data and that those customers should trust companies with their data. A participant strongly argued that while companies are obliged to protect their customers´ data, they are not obliged to reveal the parties with whom they are sharing information with, as this would be highly inconvenient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many participants strongly reacted to these statements by arguing that customers should have the right to be informed of how their data is being used and with which parties it is being shared. A participant argued that a customer may not trust the parties that the company chooses to trust and thus every customer should be informed of the sharing of their data. The customer should be respected and should be informed about the sharing of his/her personal data with third parties, because when data is being outsourced, the customer can only hope that the third parties handling his/her data will not misuse it. Thus, customers ultimately lose control over their data and over their personal lives. In order to avoid potential privacy breaches and to empower individuals with control over their personal data and their lives, it was argued that companies should be obliged to inform individuals of the sharing of their data and that this provision should be included in the draft Privacy Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant countered this argument by stating that when data is being automated, it is hard to identify the source of the data and that by providing transparency on which parties share customer data, companies would be put out of business. A  participant responded to this argument by stating that companies only protect users´ data when they have an incentive to do so, which is why a liability element should be added to the Bill. Other participants supported the argument of not informing customers of the handling of their data by stating that even some of the biggest IT companies, such as Gmail, share customers data with third parties without informing individuals or gaining prior consent. Such arguments were supported by other participants who emphasized upon the futility of informing customers of the handling of their data, especially since the average customer would not understand the security setting of a server. Since the majority of online users lack the technological expertise to understand the security settings, all companies should do is provide a security assurance to their customers in regards to how their data is being used.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In terms of data retention, a participant repeated the argument that a specific regulatory framework for data retention should not be established, especially since the purpose of data collection may change within time. Thus it was emphasized that no data retention period should be included within the draft Privacy Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In terms of transparency, some participants argued that IT companies should submit detailed reports on how they are using customers’ data to the Privacy Commissioner, but not to the public. In particular, many participants emphasized that a co-regulation framework should be implemented for the use of data, through which IT companies would regulate the use of data in co-operation with the Privacy Commissioner. Under a co-regulation framework, the public would be excluded from the right to receive detailed reports on how data is being used. Yet, participants emphasized that companies would be in compliance with regulations on data protection and security, which would ensure that customers´ data is not breached.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such arguments were countered by other participants, who argued that a tremendous amount of significance lies in informing online users of what type of data is being collected, whether it is being analysed and processed, why it is being collected and with which parties it is being shared with. Such questions are considered to be crucial elements of privacy, especially since privacy means that individuals are able to share some data with some individuals, and choose not to share the same or other data with other individuals. The practices of non-disclosure supported by some participants appear to be infringing upon the core of privacy. The participants emphasized that privacy cannot be protected if companies are not accountable in regards to how they handle data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fact that companies can use meta-data for research purposes was mentioned in the meeting, which called upon the need to redefine the term ´data´. Questions were raised in regards to how data can be deleted once used within analytics. Some participants referred to the ´Right to be Forgotten´ debate and stated that the deletion of data, in many cases, is not feasible.  A participant stated that some data is very sensitive and that companies should be responsible for deciding on how such data should be handled. Data should not be disclosed for the sake of being disclosed, but companies should decide upon the disclosure, retention and destruction of data based on how sensitive its content is. The participant emphasized that customers directly or indirectly give their consent to their data being handled by companies when they use their products and if they do not agree with the security assurances provided by the companies, then they should use a different product or service. However, this argument was countered by several participants who argued that online consumers do not always have an alternative choice and that there is a difference between the bargaining powers of consumers around the world. Some consumers may be socially pressured into using a specific product or service, or may not have an alternative option and the example of Facebook was brought up. Participants argued that given that consumers do not always have a choice to use or not use a specific online service, their data should be protected regardless of consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The debate on the destruction of data continued with participants arguing that companies should not have to destroy all personal data and that such restrictions should only apply to ´sensitive personal data´. The need for the redefinition of the term ´sensitive personal data´ in the draft Privacy Bill was emphasized again, as well as participants´ concern that the purpose behind the collection of data may change within the process and that the regulations which apply in such cases remain vague. In response to issues revolving around the collection of data, a participant recommended the regulation of instances under which data should &lt;i&gt;not &lt;/i&gt;be used. In terms of consent, several participants argued that it is not rational to expect consumers to give consent for the future (indefinite) use of their data, as this may expose them to future threats which they may have not considered when granting initial consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting proceeded to discuss the processing of data and several participants emphasized upon the need to gain consent, whilst others disagreed for the reasons mentioned above. On the disclosure of data, a participant stated that companies can be approached by law enforcement agencies for multiple purposes and that it is usually hard for companies to define the cases under which information is disclosed. Other participants disagreed with the disclosure of data when it is being collected and analysed for investigatory purposes and argued that regulations on the disclosure of data should not be applicable to intelligence agencies. &lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Discussion Highlights:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;The different instances of data collection and consumer consent&lt;/li&gt;
&lt;li&gt;The nuances of data sharing &lt;/li&gt;
&lt;li&gt;The issue of consumer consent and security assurances offered by companies&lt;/li&gt;
&lt;li&gt;The pros and cons of having a data retention regulatory framework&lt;/li&gt;
&lt;li&gt;How transparency is incorporated into the draft Privacy Protection Bill 2013 &lt;/li&gt;
&lt;li&gt;What is needed in provisions that speak to data destruction&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Meeting conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The general conclusion of the meeting was that self-regulation should be encouraged, as IT companies should provide security assurances to their consumers and regulate the collection, use, analysis, sharing and retention of their data. There was some discussion on the possibility of introducing co-regulation between IT companies and the Privacy Commissioner, but most participants appeared to prefer self-regulation. All participants in the meeting agreed upon the necessity to introduce a Privacy Bill in India which would safeguard individuals´ right to privacy and other human rights. However, the debate revolved around the definition of terms used in the Bill, whether consent should be a prerequisite to the collection, use, analysis, processing and retention of data, as well as whether companies should be obliged to inform consumers of the sharing, disclosure and destruction of their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the first Privacy Round Table meeting on the Privacy (Protection) Bill 2013, the discussion between various stakeholders will continue in the next national round table meetings throughout the year 2013. Following the Delhi Privacy Round Table, corrections have been incorporated into the &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback" class="internal-link"&gt;Privacy Protection Bill, 2013&lt;/a&gt; based on participants´ feedback, concerns, comments and ideas.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting'&gt;https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-30T11:11:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/d-w-april-15-2013-untangling-the-web-of-indias-ungovernable-net">
    <title>Untangling the web of India's 'ungovernable' Net</title>
    <link>https://cis-india.org/news/d-w-april-15-2013-untangling-the-web-of-indias-ungovernable-net</link>
    <description>
        &lt;b&gt;India sells itself as a tech hub, outsourcing IT experts to the world. At home, it dreams of "equity on the Net." But millions remain unconnected and digital surveillance is on the rise. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This was &lt;a class="external-link" href="http://www.dw.de/untangling-the-web-of-indias-ungovernable-net/a-16740896"&gt;published in Deutsche Welle&lt;/a&gt; on April 15, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Indian government has a dream. It dreams of the "Equinet" - a time when "there shall be equity on the Net."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Internet must not just be a platform for the privileged - the  Internet must become an inclusive platform," India's communications  minister Kapil Sibal says. "In fact, my vision is that the Internet  should ultimately become the Equinet. In other words, all those, no  matter which station in life they belong to, should have access to the  Internet, and that can only happen if all the elements of the Internet  are such that people can access them at affordable costs."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has the third highest number of people on the Net, with about 150 million people connected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But with a population of 1.2 billion, 150 million is not that many.  Internet penetration languishes at around 10 percent, while in the  United States and China - the top two countries in world rankings -  Internet penetration is at 78 and 40 percent, respectively.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Like in America… in 1994&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It's a fact that Google chairman Eric Schmidt highlighted on a recent tour of India, among other Asian countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Internet feels [in India] like in America in 1994," he says. "It is  crucial for India to invest and enable fast fiber Internet connectivity  within the country, between the country and the other countries."&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Schmidt.png" alt="Schmidt" class="image-inline" title="Schmidt" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;While touring Asia, Schmidt said India seemed to have "rested on its laurels" after early success in the IT sector &lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;You would think that connectivity would be better in India. The country  prides itself on being a tech hub, with its centers of excellence in  places like Bangalore. It has outsourced information technology  specialists globally for over ten years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Communications minister Sibal insists the government is investing where  it can, saying India will connect 250,000 villages with fiber optics in  the "next year or so."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The networks should be in place, the fiber optics should be in place,  [connectivity] should be efficient and of high speed, and above all, the  access to handsets, which is really the key - unless handsets are  affordable and accessible to ordinary people, you will not get the kind  of penetration that you want from the Internet," he adds.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, for some, there are even greater challenges for India than poor connectivity and bad infrastructure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;All eyes on you&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In mid-March, police in India's financial capital Mumbai launched the country's first "Social Media Lab."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Mumbai police say they will use it to monitor and track "which topics  are trending among the youth so [they] can plan law and order in a good  way."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Mumbai Social Media Lab comes amid concerns over "moral policing" of  the Net by Indian authorities, and censorship - especially where  comments involve political figures. The Times of India reports numerous  requests by authorities to have content removed by Google and Twitter.  There have also been arrests under the remit of a controversial section -  66A - of India's IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sibal denies India wants to censor the Net. If people have been arrested  under Section 66A of the IT Act, it's because police officials have  either misread the law, or acted independently, he says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Yes, but I would say, from where does this emanate? Does it emanate  with a complete understanding at the top?" asks V.C. Vivekanandan,  director of the Institute of Global Internet Governance and Advocacy.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Kapil.png" alt="Kapil Sibal" class="image-inline" title="Kapil Sibal" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;Indian communications minister Kapil Sibal says "Internet governance is an oxymoron"&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;"There are various, multiple layers of governance in a huge country like  India, where people could be enthusiastic in their own way about  thinking what is right and wrong," says Vivekanandan. "So, I don't  really see censorship as such, but they would like to have discourse in a  model which was pre-Internet."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Tracking private lives&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But in other areas, India is showing itself to be very comfortable in  the Internet age - and where it has its eyes fixed on the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"From what I can tell, the social media monitoring cell in Mumbai is  perhaps one of the more benign components because it isn't keeping track  of private communications," says Sunil Abraham, executive director of  the Centre for Internet and Society (CIS) in Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the Indian government plans to track everybody's online  activities - that means anything that uses the Internet as a  communication network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"There are very many other projects like the unique identification (UID)  and the National Intelligence Grid (NATGRID) that will keep track of  private communications," says Abraham.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID is the Indian government's centralized biometric identity  management system, which will connect more than 20 databases that 12  intelligence and law enforcement agencies will be able to access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"These databases include banking records, telecommunications records and  travel records [among other things]," says Abraham. "So, it's a very  large scale attempt by the Indian government to place citizens under 360  degree blanket surveillance."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet governance is an oxymoron&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But how these moves square with Sibal's vision of the Equinet is hard to see.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Mohit.png" alt="Mohit Sharma" class="image-inline" title="Mohit Sharma" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span&gt;This Delhi laywer, Mohit Sharma, is one of only 11 percent of Indians who are connected to the Internet &lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The communications minister believes Indians will not be dissuaded from using the Net.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The fact that 150 million people are on the Net is evidence of the fact  that they are not scared, and if you go to Twitter today, there are  more abuses on Twitter than perhaps you can find anywhere else in the  world," says Sibal.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That doesn't necessarily mean that the government thinks this is a good  thing. But Sibal insists he is against Internet governance - in fact, he  says "Internet governance is an oxymoron."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"How can you govern something that cannot be governed? Because anybody  can say anything on the Net," says Sibal. "So, there should be an  element of self-regulation. Just as we interact with each other in  civilized society, similarly people on the Net should also interact with  each other with self-restraint."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But the CIS's Sunil Abraham isn't convinced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"If one listens very carefully to what the minister says, he says you  cannot regulate the Internet. But you can regulate what citizens do on  the Internet," he says. "You can regulate what corporations do on the  Internet. And you can also regulate what the government does on the  Internet."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/d-w-april-15-2013-untangling-the-web-of-indias-ungovernable-net'&gt;https://cis-india.org/news/d-w-april-15-2013-untangling-the-web-of-indias-ungovernable-net&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-16T06:06:20Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni">
    <title>Or-bits.com — A Talk by Marialaura Ghidini</title>
    <link>https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni</link>
    <description>
        &lt;b&gt;On Friday, April 19, 2013, at the Centre for Internet and Society,  Marialaura Ghidini will give a talk about the creation and activities of or-bits.com, a web-based curatorial platform that she founded in 2009.

 &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Or-bits.com is devoted to supporting and developing practices, critical dialogues and audience engagement around artistic production, display and distribution online. Through presenting online group exhibitions and critical writing on its blog, the development of offsite gallery projects, print publishing and workshops, or-bits.com aims to instigate an exploration of the phenomena related to the spread and simplification of web-based technology across disciplines. It aims to propagate a model of artistic work that uses and reflects on the web as a language and a medium of production, display and distribution of contemporary art, both online and offline.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Marialaura's talk will then open up to present some issues related to  curatorial/artistic work online and its relationship with offline  activities of production, display and distribution in order to trigger  further discussion in the form of a Q&amp;amp;A session.&lt;/p&gt;
&lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/CISImageTalk.png" alt="Orbit.com" class="image-inline" title="Orbit.com" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;Marialaura Ghidni&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Marialaura Ghidini is a curator, writer and researcher based in the UK. She is founder director of &lt;a class="external-link" href="http://www.or-bits.com/"&gt;or-bits.com&lt;/a&gt; and an AHRC-funded PhD researcher with &lt;a href="http://www.crumbweb.org/"&gt;CRUMB&lt;/a&gt; at the University of Sunderland, where she explores the field of online curation with a specific interest in the theory and practice of artists and curators operating through web-based platforms and in-between online and offline dimensions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She has been in India since January as an International Research Fellow at SARAI/CSDS in Delhi and now as a curatorial resident with T.A.J. Residency &amp;amp; SKE Projects in Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also see &lt;a class="external-link" href="http://marialaura-ghidini.hotglue.me"&gt;http://marialaura-ghidini.hotglue.me&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni'&gt;https://cis-india.org/internet-governance/events/a-talk-by-marialaura-ghidni&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-16T14:34:36Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ndtv-video-april-11-2013-the-social-network-regulating-social-media-unrealistic-impossible-necessary">
    <title>Regulating Social Media: Unrealistic, Impossible, Necessary?</title>
    <link>https://cis-india.org/news/ndtv-video-april-11-2013-the-social-network-regulating-social-media-unrealistic-impossible-necessary</link>
    <description>
        &lt;b&gt;The Press Council of India Chairperson Justice Markandey Katju calls for regulating social media, saying it will prevent offensive material coming into the public domain. But is it really necessary to regulate the social media? If yes, is it possible to do it?&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://www.ndtv.com/video/player/the-social-network/regulating-social-media-unrealistic-impossible-necessary/271183"&gt;published by NDTV&lt;/a&gt; on April 11, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;NDTV aired a discussion by Ashwin S Kumar, Co-editor, Columnist, The Unreal Times; Kunal Majumder, Assitant Editor, Tehelka.com and Pranesh Prakash, Policy Director, Centre for Internet and Society on April 11, 2013 in response to Justice Katju's comments on bringing 'social media' under the Press Council of India.&lt;/p&gt;
&lt;p&gt;Pranesh Prakash laid out four brief points:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;'Social media' allows coffee house discussion and toilet wall scrawls to seem like print publications, but it's a mistake to treat it the same way we do print publications.  The UK is now planning on using prosecutorial flexibility to refrain from prosecuting simple offensive speech on social media. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The same laws should apply online as they do offline (but how the apply, can differ), and that is currently the case.  Most content-related offences in the IPC, etc., are offences online as well as offline. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Editors and journalists exist for most print publications and broadcast programmes, while that isn't true for most 'social media'.  So guidelines applicable to the press mostly won't be applicable online.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Electronic publications (like Medianama, The Daily Dish, Huffington Post) which consider themselves engaged in a journalistic venture present a special problem that we &lt;b class="moz-txt-star"&gt;do&lt;span class="moz-txt-tag"&gt; &lt;/span&gt;&lt;/b&gt; need to have a public conversation about.&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Video&lt;/h3&gt;
&lt;p&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/wzTJO3Vvmhk" width="320"&gt;&lt;/iframe&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ndtv-video-april-11-2013-the-social-network-regulating-social-media-unrealistic-impossible-necessary'&gt;https://cis-india.org/news/ndtv-video-april-11-2013-the-social-network-regulating-social-media-unrealistic-impossible-necessary&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Social Networking</dc:subject>
    

   <dc:date>2013-04-30T16:50:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/wall-street-journal-april-15-2013-r-jai-krishna-vote-will-social-media-impact-the-election">
    <title>Vote: Will Social Media Impact the Election?</title>
    <link>https://cis-india.org/news/wall-street-journal-april-15-2013-r-jai-krishna-vote-will-social-media-impact-the-election</link>
    <description>
        &lt;b&gt;As India enters election mode, social media has become one of many platforms where possible prime ministerial candidates are being scrutinized. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by R. Jai Krishna was &lt;a class="external-link" href="http://blogs.wsj.com/indiarealtime/2013/04/15/vote-will-social-media-impact-the-election/"&gt;published in the Wall Street Journal&lt;/a&gt; on April 15, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;On top of the list are &lt;a href="http://blogs.wsj.com/indiarealtime/2013/04/04/rahul-gandhi-speech-hits-some-dud-notes/%20and%20http://blogs.wsj.com/indiarealtime/2013/04/08/modi-steps-closer-to-new-delhi/"&gt;Rahul Gandhi&lt;/a&gt; and Narendra Modi, who recently acquired the Twitter monikers &lt;a href="https://twitter.com/search?q=%23Pappu&amp;amp;src=hash"&gt;#Pappu&lt;/a&gt; (“naïve”) and &lt;a href="https://twitter.com/search?q=%23Feku&amp;amp;src=hash"&gt;#Feku&lt;/a&gt; (“boastful”), respectively, following a string of public appearances  observers saw as evidence they will be leading their respective parties  in the upcoming national election.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A recent &lt;a href="http://online.wsj.com/public/resources/documents/SocialMediaStudy.pdf"&gt;study&lt;/a&gt; found that social media could influence the electoral outcome in as  many as 160 out of 543 seats in the Lok Sabha, the lower house of  Parliament.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(These are constituencies where 10% of the voting population uses  Facebook, or where the number of Facebook users is higher than the  winning candidate’s margin of victory at the last election.) &lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Social.png" alt="Social Media" class="image-inline" title="Social Media" /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;“No contestant can afford to ignore social media in the next Lok  Sabha elections,” argued the study, put together by IRIS Knowledge  Foundation, a Mumbai-based research group, and the Internet and Mobile  Association of India, a trade body.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Others are more skeptical. “The study assumes that users will behave  homogenously, which isn’t true,” says Sunil Abraham, executive director  at the Bangalore-based Centre for Internet and Society.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While calling the study’s findings “ambitious,” Mr. Abraham said it  was important to recognize the political power of Facebook, which could  be used as a social platform but also to “plan a revolution.”&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But India’s Internet penetration is low: only 150 million people out a  population of 1.2 billion go online, according to the IRIS-IAMAI study.  The study estimates the number of social media users in the country is  around 62 million, and that it may increase up to 80 million by time of  national elections, which have to happen by May 2014.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Indian political parties have started wising up to the power of online campaigning. Ahead of &lt;a href="http://blogs.wsj.com/indiarealtime/2012/02/13/parties-go-tech-savvy-for-u-p-elections/"&gt;state elections in Uttar Pradesh&lt;/a&gt; last year, for instance, parties including the winning Samajwadi Party,  Congress and the Bharatiya Janata Party turned to social media ranging  from Facebook to YouTube as well as to blogs and smartphone apps to  promote their candidates and their agenda.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/wall-street-journal-april-15-2013-r-jai-krishna-vote-will-social-media-impact-the-election'&gt;https://cis-india.org/news/wall-street-journal-april-15-2013-r-jai-krishna-vote-will-social-media-impact-the-election&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-15T08:30:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014">
    <title>Social media may influence 160 LS seats in 2014</title>
    <link>https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014</link>
    <description>
        &lt;b&gt;Social media is likely to influence politics and elections in 160 of India’s 543 Parliament constituencies, making Facebook and Twitter users the nation’s newest voting bloc, a new study suggests.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Zia Haq was &lt;a class="external-link" href="http://www.hindustantimes.com/India-news/NewDelhi/Social-media-may-play-decisive-role-in-2014-polls/Article1-1042982.aspx"&gt;published in the Hindustan Times&lt;/a&gt; on April 12, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In these mostly urbanizing constituencies, social-media usage is now  “sufficiently widespread” to influence the outcome of a general election  slated for 2014, the study by IRIS Knowledge Foundation and supported  by the Internet and Mobile Association of India (IAMAI), indicates.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On April 4, Congress scion Rahul Gandhi’s high-profile address to the  Confederation of Indian Industry, a leading business forum, was trending  topmost on Twitter in India that day, some posts by rivals mocking him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A series of lectures by Gujarat chief minister Narendra Modi, a  presumptive PM, this week too garnered strong social-media attention,  with his and Gandhi’s supporters competing online to run the other down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A deeply polarizing figure still, Modi is often accused of watching  over a carnage that killed nearly 2000 people in 2002, mostly Muslims.  Yet, he has pulled off a stunning online strategy to showcase Gujarat as  India’s Guandong, a south China province with top GDP rankings and  investment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Research shows that social media is more persuasive than television  ads. Nearly 100 million Indians, or more than Germany’s population, use  the Internet each day. Of this, 40 million have assured broadband, the  ones most likely to have at least one social media account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Unlike Obama, who used social media directly for votes, Indian  politicians have tended to use it more to mould public discourse,” says  Sunil Abraham, the CEO of The Centre for Internet and Society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That is likely to change in 2014. Not surprisingly, Modi became the  third politician globally, a fter Obama and Australian PM Julia Gillard,  to host a political conference on Google+ hangout.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chief ministers in states are also leveraging social media. Bihar has  unveiled a re-branded campaign called, “Bihar ka haq” or Bihar’s  Rightful Cause, on Facebook.&lt;/p&gt;
&lt;p&gt;Social-media-impacted  constituencies, according to the study, are those where Facebook users  are more than the victory margin of the winner in the last Lok Sabha  election, or where such users account for over 10% of the voting  population.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014'&gt;https://cis-india.org/news/hindustan-times-zia-haq-april-12-2013-social-media-may-influence-160-lok-sabha-seats-in-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-15T07:13:52Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation">
    <title>India takes its first serious step toward privacy regulation – but it may be misguided </title>
    <link>https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation</link>
    <description>
        &lt;b&gt;The world’s second-most populous nation may be on the cusp of embracing privacy legislation. After several false starts the Indian government appears ready to accept the need for some form of regulation.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This blog post by Simon Davies was &lt;a class="external-link" href="http://www.privacysurgeon.org/blog/incision/india-takes-its-first-serious-step-toward-privacy-regulation-but-it-may-be-misguided/"&gt;published in the Privacy Surgeon&lt;/a&gt; on April 9, 2013. The Centre for Internet and Society recently published a draft Citizens privacy bill which is mentioned in this post.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Well, maybe this is a slightly optimistic view. A more accurate  portrayal might be “the Indian government appears ready to accept the &lt;i&gt;principle&lt;/i&gt; of some form of regulation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is actually no agreed policy position across government on the  question of privacy and data protection, but the Planning Commission  last year established an Expert Group under the chairmanship of the  former Chief Justice of the Delhi High Court, A.P.Shah. Justice Shah’s  subsequent &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf" target="_blank" title="justice shah report"&gt;report&lt;/a&gt; is being considered and a draft Bill has been created.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Shah’s report provided a convincing body of evidence – both at the  domestic and the international level – for the creation of national  regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It called for the formation of a regulatory framework and set out nine  principles that could form a foundation for the next stage. These  principles – reflecting the basis of law in other countries – have been  generally accepted by Indian stakeholders as a sound frame of reference  for progress.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However although the nine principles are supported, the precise nature of any possible regulation is still very much in flux.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;There’s a long way to go before consensus is established on a overall  type of regulatory framework. Having said that, India is closer than  ever to seeing real legislation – and the international community needs  to put its weight behind the activity.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Debate over the merits of data protection and privacy law stretch back  beyond a decade but reform was constantly hampered by perceptions that  regulation would stifle economic growth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some industry lobbies have been as keen as government to ensure that privacy proposals are stillborn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even with the nine principles as a bedrock the path to privacy law must overcome two extremely difficult hurdles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first of these is that a substantial number of Indian opinion  leaders continue to express an instinctive view that there is no  cultural history for respect of privacy in India. That is, people don’t  want or expect privacy protection and Western notions of privacy are  alien to Indian society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In support of this assertion these critics often cite an analogy about  conversation on Indian trains. It is well known that many Indians will  disclose their life story to strangers on the Indian rail network,  discussing their personal affairs with people they have never before  met. This trait is construed as evidence that Indians do not value their  privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I spoke last week at an important &lt;a href="https://cis-india.org/news/future-of-privacy-in-india-on-april-5-2013-at-oberoi-hotel-new-delhi" target="_blank" title="India privacy meeting 2013"&gt;meeting&lt;/a&gt; in New Delhi where this exact point was repeatedly made. The meeting, organised by the Data Security &lt;a href="http://www.dsci.in/" target="_blank" title="dsci"&gt;Council&lt;/a&gt; of India and &lt;a href="http://www.i-comp.org/" target="_blank" title="icomp"&gt;ICOMP&lt;/a&gt; India was well attended by industry, government, academics and NGOs.  Speakers made constant reference to the matter of public disclosure of  personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response, noted commentator Vickram Crishna expressed the view that  the train anecdote had no relevance and was a convenient ruse for people  who for their own self interest opposed privacy regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In reality this circumstance is like Vegas”, he said. “What happens on  Indian trains, stays on Indian trains. People will talk about their  lives because they will never see these passengers again and there is no  record of the disclosures.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What we are dealing with in the online world is a completely different  matter. There is no correlation between the two environments”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A substantial opinion poll &lt;a href="http://www.privacysurgeon.org/blog/incision/indias-first-major-privacy-survey-reveals-deep-concerns-over-intrusion/" target="_blank" title="India’s first major privacy survey reveals deep concern over intrusion"&gt;published&lt;/a&gt; earlier this year also debunked the myth that Indians don’t care about  privacy. Levels of concern expressed by respondents was roughly the same  as the level of concern identified in other parts of the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A second hurdle facing privacy legislation is the perception -   particularly prevalent in the United States – that legislation will be a  burden on industry and people do not want yet another cumbersome and  costly government structure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are perhaps some grounds for considering this perspective, given the vast scale and complexity of India’s economy.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Government intervention does not enjoy a history of consistent success  in the marketplace, though in many instances intervention has been the  only means to bring industry into compliance with basic safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I made the point at the meeting that support for a purist model of  industry self regulation was simplistic and misguided. Most systems of a  similar nature fail unless someone is mandated to ensure compliance,  transparency, enforceability and consistency. It’s a question of finding  a way to embed accountability in industry self regulation – and this is  where legislation and government could help.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Justice Shah’s report reflected this widespread concern by recommending a  co-regulatory framework in which a privacy commissioner would oversee  industry self regulation. However – as last week’s meeting exemplified –  even this compromise solution is not acceptable to many industry  players. They oppose the idea of an appointed commissioner and believe  that industry self regulation alone will be sufficient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an influential view that cannot be brushed aside. However in a &lt;a href="http://www.youtube.com/watch?v=W0G1jWFp0fs" target="_blank" title="RSTV davies interview youtube"&gt;special programme&lt;/a&gt; aired on19th April on India’s main parliamentary television network – &lt;a href="http://rstv.nic.in/rstv/index.asp" target="_blank" title="rstv india"&gt;RSTV&lt;/a&gt; – I repeatedly make the point that such a view, if successful, would  put Indian industry in danger of winning the battle but losing the war.  Europe is unlikely to accept a model of sole industry regulation, and  the crucial flow of data between the two regions could be imperiled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Conscious of all these challenges the influential &lt;a href="https://cis-india.org/" target="_blank" title="cis india"&gt;NGO&lt;/a&gt; Centre for Internet and Society has published a draft Citizens privacy &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft" target="_blank" title="cis citizens privacy bill"&gt;bill&lt;/a&gt; and has commenced a series of consultation meetings across the country.  These initiatives will provide important input for the emerging  legislation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an important moment for privacy in India, and one that will  require careful thought and sensitive implementation. However no-one in  India should be in any doubt that the current unregulated situation is  unsustainable in a global environment where nations are expected to  protect both their citizens and the safety of data on their systems.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation'&gt;https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-04-15T06:39:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">
    <title>India's 'Big Brother': The Central Monitoring System (CMS)</title>
    <link>https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system</link>
    <description>
        &lt;b&gt;In this post, Maria Xynou looks at India´s Central Monitoring System (CMS) project and examines whether it can target individuals´ communications data, regardless of whether they are involved in illegal activity.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Starting from &lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt;this month&lt;/a&gt;, all telecommunications and Internet communications in India will be analysed by the government and its agencies. What does that mean? It means that everything we say or text over the phone, write, post or browse over the Internet will be centrally monitored by Indian authorities. This totalitarian type of surveillance will be incorporated in none other than the Central Monitoring System (CMS).&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;The Central Monitoring System (CMS)&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Central Monitoring System (CMS) may just be another step in the wrong direction, especially since India currently lacks privacy laws which can protect citizens from potential abuse. Yet, all telecommunications and Internet communications are to be monitored by Indian authorities through the CMS, despite the fact that it remains &lt;/span&gt;&lt;a href="http://www.lossofprivacy.com/index.php/2009/11/india-to-set-up-a-central-monitoring-system/"&gt;unclear how our data will be used&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The CMS was prepared by the Telecom Enforcement, Resource and Monitoring (TREM) and by the Centre for Development of Telematics (C-DoT) and is being manned by the Intelligence Bureau. The CMS project is likely to start operating this month and the &lt;/span&gt;&lt;a href="http://newindianexpress.com/nation/article1300012.ece"&gt;government plans&lt;/a&gt;&lt;span&gt; on creating a platform that will include all the service providers in Delhi, Haryana and Karnataka. The &lt;/span&gt;&lt;a href="http://cactusblog.files.wordpress.com/2010/01/it_act_2008.pdf"&gt;Information Technology Amendment Act 2008&lt;/a&gt;&lt;span&gt; enables e-surveillance and central and regional databases will be created to help central and state level law enforcement agencies in interception and monitoring. Without any manual intervention from telecom service providers, the CMS will equip government agencies with Direct Electronic Provisioning, filters and alerts on the target numbers. The CMS will also enable &lt;/span&gt;&lt;a href="http://www.nextbigwhat.com/indian-government-to-setup-centralized-communication-monitor-system-297/"&gt;Call Data Records (CDR) analysis and data mining&lt;/a&gt;&lt;span&gt; to identify the personal information of the target numbers.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The estimated set up cost of the CMS is&lt;/span&gt;&lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt; Rs. 4 billion&lt;/a&gt;&lt;span&gt; and it will be connected with the Telephone Call Interception System (TCIS) which will help monitor voice calls, SMS and MMS, fax communications on landlines, CDMA, video calls, GSM and 3G networks. Agencies which will have access to the CMS include the Research and Analysis Wing (R&amp;amp;AW), the Central Bureau of Investigation (CBI), the National Investigation Agency (NIA), the Central Board of Direct Taxes (CBDT), the Narcotics Control Bureau, and the Enforcement Directorate (ED). In particular, last October, &lt;/span&gt;&lt;a href="http://www.zdnet.com/in/india-agency-petitions-for-monitoring-system-7000005762/"&gt;the NIA approached the Department of Telecom&lt;/a&gt;&lt;span&gt; requesting its connection with the CMS, which would help it intercept phone calls and monitor social networking sites &lt;/span&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2012-10-15/internet/34471762_1_loknath-behera-nia-dot"&gt;without the cooperation of telcos.&lt;/a&gt;&lt;span&gt; However, the NIA is&lt;/span&gt;&lt;a href="http://newindianexpress.com/nation/article1300012.ece"&gt; currently monitoring eight out of 10,000 telephone lines &lt;/a&gt;&lt;span&gt;and if it is connected with the CMS, the NIA will also get access to e-mails and other social media platforms. Essentially, the CMS will be converging all the interception lines at one location and Indian law enforcement agencies will have access to them. The CMS will also be capable of &lt;/span&gt;&lt;a href="http://www.zdnet.com/in/india-agency-petitions-for-monitoring-system-7000005762/"&gt;intercepting our calls and analyzing our data on social networking sites&lt;/a&gt;&lt;span&gt;. Thus, even our attempts to protect our data from ubiquitous surveillance would be futile.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In light of the CMS being installed soon, the Mumbai police took the initiative of setting up a &lt;/span&gt;&lt;a href="http://www.google.com/hostednews/afp/article/ALeqM5iVMgMkOgpXOTaon2VoLdvu2x5oyg?docId=CNG.6d8f555d3498b94bac2fb1046fc7d3a6.4a1%20,%20http://m.timesofindia.com/articleshow/19040572.cms"&gt;´social media lab´&lt;/a&gt;&lt;span&gt; last month, which aims to monitor Facebook, Twitter and other social networking sites. This lab would be staffed by 20 police officers who would keep an eye on issues being publicly discussed and track matters relating to public security. According to &lt;/span&gt;&lt;a href="http://www.google.com/hostednews/afp/article/ALeqM5iVMgMkOgpXOTaon2VoLdvu2x5oyg?docId=CNG.6d8f555d3498b94bac2fb1046fc7d3a6.4a1%20,%20http://m.timesofindia.com/articleshow/19040572.cms"&gt;police spokesman Satyanarayan Choudhary&lt;/a&gt;&lt;span&gt;, the lab will be used to identify trends among the youth and to plan law and order accordingly. However, fears have arisen that the lab may be used to stifle political debate and freedom of expression. The &lt;/span&gt;&lt;a href="http://www.bbc.co.uk/news/world-asia-india-20405457"&gt;arrest of two Indian women last November over a Facebook post&lt;/a&gt;&lt;span&gt; which criticized the shutdown of Mumbai after the death of politician Bal Thackeray was proof that the monitoring of our communications can potentially oppress our freedom and human rights. And now that all our online activity will be under the microscope...will the CMS security trade-off be worth it?&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Surveillance in the name of Security&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In a digitised world,&lt;/span&gt;&lt;a href="http://www.businessrevieweurope.eu/technology/software/addressing-the-cyber-security-threat"&gt; threats to security have been digitised&lt;/a&gt;&lt;span&gt;. Terrorism is considered to be a &lt;/span&gt;&lt;a href="http://www.rorg.no/Artikler/869.html"&gt;product of globalisation&lt;/a&gt;&lt;span&gt; and as such, the Internet appears to be a tool used by terrorists. Hence governments all around the world are convinced that &lt;/span&gt;&lt;a href="http://www.slate.com/blogs/future_tense/2012/12/13/national_counterterrorism_center_s_massive_new_surveillance_program_uncovered.html"&gt;surveillance is probably one of the most effective methods in detecting and prosecuting terrorists&lt;/a&gt;&lt;span&gt;, as all movement, action, interests, ideas and everything else that could define an individual are closely being monitored under the ´surveillance umbrella´ True; if everything about our existence is being closely monitored and analysed, it seems likely that we will instantly be detected and prosecuted if engaged in illegal activity. But is that the case with big data? According to &lt;/span&gt;&lt;a href="http://www.schneier.com/blog/archives/2006/03/data_mining_for.html"&gt;security expert Bruce Schneier&lt;/a&gt;&lt;span&gt;, searching for a terrorist through data mining is like looking for a needle in a haystack. Generally, the bigger the amount of data, &lt;/span&gt;&lt;a href="http://www.statsoft.com/textbook/data-mining-techniques/"&gt;the bigger the probability of an error in matching profiles&lt;/a&gt;&lt;span&gt;. Hence, when our data is being analysed through data mining of big data, the probability of us being charged for a crime we did not commit is real. Nonetheless, the CMS is going to start operating soon in an attempt to enable law enforcement agencies to tackle crime and terrorism.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A few days ago, I had a very interesting chat with an employee at &lt;/span&gt;&lt;a href="http://www.sas.com/offices/asiapacific/india/company/index_india.html"&gt;SAS Institute (India) Pvt. Ltd.&lt;/a&gt;&lt;span&gt; in Bangalore, which is a wholly owned subsidiary of&lt;/span&gt;&lt;a href="http://www.sas.com/company/about/index.html"&gt; SAS Institute Inc&lt;/a&gt;&lt;span&gt;. SAS is a company which produces &lt;/span&gt;&lt;a href="http://www.sas.com/company/about/index.html"&gt;software solutions and services&lt;/a&gt;&lt;span&gt; to combat fraud in financial services, identify cross-sell opportunities in retail, and all the business issues it addresses are based on three capabilities: information management, analytics and business intelligence. Interestingly enough, SAS also produces&lt;/span&gt;&lt;a href="http://www.sas.com/solutions/fraud/social-network/#section=1"&gt; social network analysis&lt;/a&gt;&lt;span&gt; which ´helps institutions detect and prevent fraud by going beyond individual and account views to analyze all related activities and relationships at a network dimension´. In other words, social network analysis by SAS would mean that, through Facebook, for example, all of an individual's´ interests, activities, habits, relationships and everything else that could be, directly or indirectly, linked to an individual would be mapped out in relation to other individuals. If, for example, several individuals appear to have mutual interests and activities, there is a high probability that an individual will be associated with the same type of organization as the other individuals, which could potentially be a terrorist organization. Thus, an essential benefit of the social network analysis solution is that it &lt;/span&gt;&lt;a href="http://www.sas.com/solutions/fraud/social-network/#section=3"&gt;uncovers previously unknown network connections and relationships&lt;/a&gt;&lt;span&gt;, which significantly enables more efficient investigations.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to the SAS employee I spoke to, the company provides social network analysis to Indian law enforcement agencies and aims at supporting the CMS project in an attempt to tackle crime and terrorism. Furthermore, the SAS employee argued that their social network analysis solution only analyzes open source data which is either way in the public online domain, hence respecting individuals´ online privacy. In support of the Mumbai ´social media lab´, &lt;/span&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;cyber security expert, Vijay Mukhi&lt;/a&gt;&lt;span&gt;, argued:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;´There may be around 60 lakh twitter users in the city and millions of other social media network users. The police will require a budget of around Rs 500 crore and huge resources such as complex software, unique bandwidth and manpower to keep a track of all of them. To an extent, the police can monitor select people who have criminal backgrounds or links with anti-social or anti-national elements...[...]...Even the apprehension that police is reading your tweet is wrong. The volume of networking on social media sites is beyond anybody's capacity. Deleting any user's message is humanly impossible. It is even difficult to find the origin of messages and shares. However, during the recent Delhi gangrape incident such monitoring of data in public domain helped the police gauge the mood of the people.´&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;Another cyber security expert&lt;/a&gt;&lt;span&gt; argued that the idea that the privacy of our messages and online activity would be intercepted is a misconception. The expert stated that:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;´The police are actually looking out for open source intelligence for which information in public domain on these sites is enough. Through the lab, police can access what is in the open source and not the message you are sending to your friend.´&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;Cyber security experts&lt;/a&gt;&lt;span&gt; also argued that the purpose of the creation of the Mumbai social media lab and the CMS in general is to ensure that Indian law enforcement agencies are better informed about current public opinion and trends among the youth, which would enable them to take better decisions on a policy level. It was also argued that, apparently, there is no harm in the creation of such monitoring centres, especially since other countries, such as the U.S., are conducting the same type of surveillance, while have enacted stringent privacy regulations. In other words, the monitoring of our communications appears to be justified, as long as it is in the name of security.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;CMS targeting individuals: myth or reality?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The CMS is not a big deal, because it will not target us individually...or at least that is what &lt;/span&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;cyber security experts&lt;/a&gt;&lt;span&gt; in India appear to be claiming. But is that really the case? Lets look at the following hypothesis:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="quoted"&gt;&lt;i&gt;The CMS can surveille and target individuals, if Indian law enforcement agencies have access to individuals content and non-content data and are simultaneously equipped with the necessary technology to analyse their data.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The two independent variables of the hypothesis are: (1) Indian law enforcement agencies have access to individuals´ content and non-content data, (2) Indian law enforcement agencies are equipped with the necessary technology to analyse individuals´ content and non-content data. The dependent variable of the hypothesis is that the CMS can surveille and target individuals, which can only be proven once the two independent variables have been confirmed. Now lets look at the facts.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://bigbrotherinc.org/v1/India/"&gt;surveillance industry in India&lt;/a&gt;&lt;span&gt; is a vivid reality. &lt;/span&gt;&lt;a href="http://www.clear-trail.com/"&gt;ClearTrail&lt;/a&gt;&lt;span&gt; is an Indian surveillance technology company which provides communication monitoring solutions to law enforcement agencies around the world and which is a regular sponsor of ISS world surveillance trade shows. In fact, ClearTrail &lt;/span&gt;&lt;a href="http://www.issworldtraining.com/iss_mea/sponsors2.html"&gt;sponsored the ISS world surveillance trade show in Dubai &lt;/a&gt;&lt;span&gt;last month - another opportunity to sell its surveillance technologies to law enforcement agencies around the world. ClearTrail´s &lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/111_CLEARTRAIL.pdf"&gt;solutions&lt;/a&gt;&lt;span&gt; include, but are not limited to, mass monitoring of IP and voice networks, targeted IP monitoring, tactical Wi-Fi monitoring and off-the-air interception. Indian law enforcement agencies are equipped with such technologies and solutions and thus have the technical capability of targeting us individually and of monitoring our ´private´ online activity.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.shoghicom.com/"&gt;Shoghi Communications Ltd.&lt;/a&gt;&lt;span&gt; is just another example of an Indian surveillance technology company. WikiLeaks has published a&lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/160_SHOGI-2006-semiactive_gsm_monitoring.pdf"&gt; brochure&lt;/a&gt;&lt;span&gt; with one of Shoghi´s solutions: the Semi Active GSM Monitoring System. This system can be used to intercept communications from any GSM service providers in the world and has a 100% target call monitor rate. The fact that the system is equipped with IMSI analysis software enables it to extract the suspect´s actual mobile number from the network without any help from the service provider. Indian law enforcement agencies are probably being equipped with such systems by Shoghi Communications, which would enable the CMS to monitor telecommunications more effectively.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As previously mentioned, SAS provides Indian law enforcement agencies &lt;/span&gt;&lt;a href="http://www.sas.com/solutions/fraud/social-network/"&gt;social network analysis solutions&lt;/a&gt;&lt;span&gt;. In general, many companies, Indian and international, produce &lt;/span&gt;&lt;a href="http://wikileaks.org/the-spyfiles.html"&gt;surveillance products and solutions&lt;/a&gt;&lt;span&gt; which they supply to law enforcement agencies around the world. However, if such technology is used solely to analyse open source data, how do law enforcement agencies expect to detect criminals and terrorists? The probability of an individual involved in illegal activity to disclose secrets and plans in the public online sphere is most likely significantly low. So given that law enforcement agencies are equipped with the technology to analyse our data, how do they get access to our content data in order to detect criminals? In other words, how do they access our ´private´ online communications to define whether we are a terrorist or not?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Some of the biggest online companies in the world, such as Google and Microsoft, &lt;/span&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html?_r=0"&gt;disclose our content data to law enforcement agencies&lt;/a&gt;&lt;span&gt; around the world. Sure, a lawful order is a prerequisite for the disclosure of our data...but in the end of the day, law enforcement agencies &lt;/span&gt;&lt;i&gt;can &lt;/i&gt;&lt;span&gt;and &lt;/span&gt;&lt;i&gt;do &lt;/i&gt;&lt;span&gt;have access to our content data, such as our personal emails sent to friends, our browsing habits, the photos we sent online and every other content created or communicated via the Internet. &lt;/span&gt;&lt;a href="http://www.engadget.com/tag/transparencyreport/"&gt;Law enforcement requests reports &lt;/a&gt;&lt;span&gt;published by companies, such as Google and &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/microsoft-releases-first-report-on-data-requests-by-law-enforcement-agencies"&gt;Microsoft&lt;/a&gt;&lt;span&gt;, confirm the fact that law enforcement agencies have access to both our&lt;/span&gt;&lt;a href="http://blogs.technet.com/b/microsoft_on_the_issues/archive/2013/03/21/microsoft-releases-2012-law-enforcement-requests-report.aspx"&gt; content and non-content data&lt;/a&gt;&lt;span&gt;, much of which was disclosed to Indian law enforcement agencies. Thus, having access to our ´private´ online data, all Indian law enforcement agencies need is the technology to analyse our data and match patterns. The various surveillance technology companies operating in India, such as &lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/111_CLEARTRAIL.pdf"&gt;ClearTrail&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/160_SHOGI-2006-semiactive_gsm_monitoring.pdf"&gt;Shoghi Communications&lt;/a&gt;&lt;span&gt;, ensure that Indian law enforcement agencies are equipped with the necessary technology to meet these ends.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The hypothesis that the CMS can surveille and target us individually can be confirmed, since Indian law enforcement agencies have access to our content and non-content data, while simultaneously being equipped with the necessary technology to analyse our data. Thus, the arguments brought forth by cyber security experts in India appear to be weak in terms of validity and reliability and the CMS appears to be a new type of ´Big Brother´ upon us. But what does this mean in terms of our privacy and human rights?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://perry4law.org/cecsrdi/?topic=central-monitoring-system-cms-for-telephone-tapping-in-india-2"&gt;telephone tapping laws in India are weak&lt;/a&gt;&lt;span&gt; and violate constitutional protections. The Information Technology Amendment Act 2008 has enabled e-surveillance to reach its zenith, but yet &lt;/span&gt;&lt;a href="http://perry4law.org/cecsrdi/?topic=central-monitoring-system-cms-for-telephone-tapping-in-india-2"&gt;surveillance projects, such as the CMS, lack adequate legal backing&lt;/a&gt;&lt;span&gt;. No privacy legislation currently exists in India which can protect us from potential abuse. The confirmed CMS hypothesis indicates that all individuals can potentially be targeted and monitored, regardless of whether they have been involved in illegal activity. Yet, India currently &lt;/span&gt;&lt;a href="http://perry4law.org/blog/?cat=9"&gt;lacks privacy laws&lt;/a&gt;&lt;span&gt; which can protect individuals from the infringement of their privacy and other human rights. The following questions in regards to the CMS remain vague: Who can authorise the interception of telecommunications and Internet communications? Who can authorise access to intercepted data? Who can have access to data? Can data monitored by the CMS be shared between third parties and if so, under what conditions? Is data monitored by the CMS retained and if so, for how long and under what conditions? Do individuals have the right to be informed about their communications being monitored and about data retained about them?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Immense vagueness revolves around the CMS, yet the project is due to start operating this month. In order to ensure that our right to privacy and other human rights are not breached, &lt;/span&gt;&lt;a href="http://perry4law.org/cecsrdi/?topic=central-monitoring-system-cms-for-telephone-tapping-in-india-2"&gt;parliamentary oversight of intelligence agencies in India&lt;/a&gt;&lt;span&gt; is a minimal prerequisite. E-surveillance regulations should be enacted, which would cover both policy and legal issues pertaining to the CMS project and which would ensure that human rights are not infringed. The overall function of the CMS project and its use of data collected should be thoroughly examined on a legal and policy level prior to its operation, as its current vagueness and excessive control over communications can create a potential for unprecedented abuse.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;The necessity and utility of the CMS remain unclear and thus it has not been adequately proven yet that the security trade-off is worth it. One thing, though, is clear: we are giving up a lot of our data....we are giving up the control of our lives...with the hope that crime and terrorism will be reduced. Does this make sense?&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;a class="external-link" href="http://www.medianama.com/2013/04/223-indian-government-plans-digital-central-monitoring-system-cis-india/"&gt;This was cross-posted in Medianama&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system'&gt;https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-06T09:39:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indian-express-april-6-2013-nishant-shah-off-the-record">
    <title>Off the Record</title>
    <link>https://cis-india.org/internet-governance/blog/indian-express-april-6-2013-nishant-shah-off-the-record</link>
    <description>
        &lt;b&gt;Social networks track our world but not relationships. We live in a world where things happen. And yet, with the presence of digital objects, the things that happen have increased in intensity and volume.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Nishant Shah's &lt;a class="external-link" href="http://www.indianexpress.com/news/off-the-record/1097765/0"&gt;article was published &lt;/a&gt;in the Indian Express on April 6, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Never before have we lived in a world that is so seen,documented,  archived and forgotten. Early Enlightenment philosophers had wondered,  if a tree falls in loneliness and there is nobody there to see it, does  the tree really fall? In the world of instant documentation, chances are  that if the tree falls, there is somebody there to tweet it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We live in a spectacular world. That is not to say that it is the best  or worst of all possible. I want to ponder on the fact that we create  spectacles of things that were otherwise swept under the carpet. Every  little detail of our myriad and mundane life is potentially spectacular.  From medical technologies that can decipher our chemical DNA to the  mobile phone that Instagrams the food we eat and things that we see, we  are surrounded by spectacles of everyday life. Pictures, tweets, blogs,  geolocation services, status updates, likes, shares — the texture of  living has never been this richly and overwhelmingly documented.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the data and information that constitutes the recognition of  our life, have increased to such a scale that we have overturned the  course of human history writing. We identify ourselves as a species that  is able to document, store and relay information from one passing  generation to another. So much so that we have invested a vast amount of  our energies in creating museums, writing histories, building archives,  and obsessively collecting facts and fictions of our origins, from the  big bang to flying reptiles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But big data has made us reach a point where we are trying to manage,  filter the onslaught of data. We have, for the first time, created  information that is no longer intelligible to the human eye or brain.  From machines that can verify god particles to artificial intelligence  which can identify patterns every day we have replaced the human being  from its central position as consumer, producer and subject of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These are conditions of living in information societies that are  producing, archiving and reorganising information for these information  ecosystems. The multiple information streams remind us of the multitude  and diversity of human life which cannot be reduced to a generalising  theory of similarity. The rise of big data brings to focus the promise  of the World Wide Web — a reminder that there are alternatives to the  mainstream and that there are unheard, contradictory voices that deserve  to be heard. Yet, even as the burgeoning information society explodes  on our devices, there is another anxiety which we need to encounter. If  the world of information, which was once supposed to be the alternative,  becomes the central and dominant mode of viewing the world, what does  it hide?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Take friendship, for instance.You can quantify how many friends exist on  your social networks. Algorithms can work out complex proximity  principles and determine who your closer connections are.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data mining tools are able to figure out the similarities and likelihood  of enduring conversations in your social sphere. But these are all  human actions which can be captured by the network and the big data  realities. They may be able to give us new information about what  friends do and how often, but there is still almost no way of figuring  out, which friend might call you in the middle of the night.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Friendship, like many other things, is not made of spectacles. It does  not produce information sets which can be mapped and represented as  information. Friendship cannot be reduced to pictures of being together  or dramatic stories of survival and togetherness. More often than not,  true friendships are made of things that do not happen. Or things, if  they happen, cannot be put in a tweet, captured on Instagram or shared  on Tumblr.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As we take these social networked realities as 'real' realities, it  might be worth asking what is being missed out, what remains unheard and  unrepresented in these information streams. Because if you love  somebody and there is nobody to know it, report it, record it and  convert it into a spectacle, does it make your love any less special?  Any less intense? Any less true?&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indian-express-april-6-2013-nishant-shah-off-the-record'&gt;https://cis-india.org/internet-governance/blog/indian-express-april-6-2013-nishant-shah-off-the-record&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2013-04-26T05:58:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore">
    <title>A Privacy Round Table in Bangalore</title>
    <link>https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Data Security Council of India  and the Federation of Indian Chambers of Commerce and Industry cordially invite you to a "Privacy Round Table" at Jayamahal Palace in Jayamahal Road, Bangalore on Saturday, April 20, 2013, 10.30 a.m. to 4.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013.pdf" class="external-link"&gt;The Privacy Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/strengthening-privacy-protection.pdf" class="internal-link"&gt;Strengthening Privacy Protection through Co-Regulation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-roundtable-bangalore" class="internal-link"&gt;Invitation for the Privacy Roundtable&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;To discuss, in furtherance of Internet Governance Initiatives and Dialogue in 2013, the "Report of the Group of Experts on Privacy" by the Justice AP Shah Committee, the text of the Citizens' Privacy (Protection) Bill 2013, drafted by the Centre for Internet and Society, and the paper "Strengthening Privacy Protection through Co-Regulation" by DSCI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions and recommendations from the meeting will be published  into a compilation, and presented at the Internet Governance meeting  planned for October 2013.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;10.30 &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview, explanation, and discussion: The Report of the Group of Experts on Privacy&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;11.30  &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview, explanation, and discussion: Strengthening Privacy Protection through Co-regulation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;12.15&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Tea&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;12.30&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview, explanation, and discussion: The Citizens (Protection) Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.15&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;14.15  &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;In depth discussions: The Citizens’ Privacy (Protection) Bill 2013 &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Confirmations and RSVP&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Please send your email confirmations for attending the Bangalore Privacy Roundtable on &lt;b&gt;April 20, 2013&lt;/b&gt;, to &lt;b&gt;Snehashish Ghosh&lt;/b&gt; at &lt;a class="mail-link" href="mailto:snehashish@cis-india.org"&gt;snehashish@cis-india.org&lt;/a&gt;, mobile no. +91- 9902763325,latest by end-of-business 5:30 p.m. on Monday &lt;b&gt;April 15, 2013&lt;/b&gt;. As the conference is a roundtable dialogue, we request that attendees  submit a brief introduction about themselves and their interest in the  topic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore'&gt;https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-04-17T06:55:52Z</dc:date>
   <dc:type>Event</dc:type>
   </item>




</rdf:RDF>
