<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 951 to 965.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/do-we-need-the-aadhar-scheme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/google-move-is-not-good-for-netizens-say-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/google2019s-privacy-policy-raises-hackles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/google-to-change-privacy-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/whose-data-is-it"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/keeping-it-private"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/constitution-of-group-of-experts"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/indecent-proposals"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/caught-in-web"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/right-to-privacy-bill-conference"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/interview-with-anne-cavoukian"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/privacy-symposium"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/ace-7-french-charter-cis-comment"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/do-we-need-the-aadhar-scheme">
    <title>Do we need the Aadhar scheme?</title>
    <link>https://cis-india.org/internet-governance/do-we-need-the-aadhar-scheme</link>
    <description>
        &lt;b&gt;"Decentralisation and privacy are preconditions for security. Digital signatures don’t require centralised storage and are much more resilient in terms of security", Sunil Abraham in the Business Standard on 1 February 2012.&lt;/b&gt;
        
&lt;p&gt;We don’t need Aadhar because we already have a much more robust identity management and authentication system based on digital signatures that has a proven track record of working at a “billions-of-users” scale on the internet with reasonable security. The Unique Identification (UID) project based on the so-called “infallibility of biometrics” is deeply flawed in design. These design disasters waiting to happen cannot be permanently thwarted by band-aid policies.&lt;/p&gt;
&lt;p&gt;Biometrics are poor authentication factors because once they are compromised they cannot be re-secured unlike digital signatures. Additionally, an individual’s biometrics can be harvested remotely without his or her conscious cooperation. The iris can be captured remotely without a person’s knowledge using a high-res digital camera.&lt;/p&gt;
&lt;p&gt;Biometrics are poor identification factors in a country where the registrars have commercial motivation to create ghost identities. For example, bank managers trying to achieve targets for deposits by opening benami accounts. Biometrics for these ghost identities can be imported from other countries or generated endlessly using image processing software. The de-duplication engine at the Unique Identification Authority of India (UIDAI) will be fooled into thinking that these are unique residents.&lt;/p&gt;
&lt;p&gt;An authentication system does not require a centralised database of authentication factors and transaction details. This is like arguing that the global system of e-commerce needs a centralised database of passwords and logs or, to use an example from the real world, to secure New Delhi, all citizens must deposit duplicate keys to their private property with the police.&lt;/p&gt;
&lt;p&gt;Decentralisation and privacy are preconditions for security. The “end-to-end principle” used to design internet security is also in compliance with Gandhian principles of Panchayat Raj. Digital signatures don’t require centralised storage of private keys and are, therefore, much more resilient in terms of security.&lt;/p&gt;
&lt;p&gt;Biometrics as authentication factors require the government to store biometrics of all citizens but citizens are not allowed to store biometrics of politicians and bureaucrats. The state authenticates the citizen but the citizen cannot conversely authenticate the state. Digital signatures as an authentication factor, on the other hand, does not require this asymmetry since citizens can store public keys of state actors and authenticate them. The equitable power relationship thus established allows both parties to store a legally non-repudiable audit trail for critical transactions like delivery of welfare services. Biometrics exacerbates the exiting power asymmetry between citizens and state unlike digital signatures, which is peer authentication technology.&lt;/p&gt;
&lt;p&gt;Privacy protections should be inversely proportional to power. The transparency demanded of politicians, bureaucrats and large corporations cannot be made mandatory for ordinary citizens. Surveillance must be directed at big-ticket corruption, at the top of the pyramid and not retail fraud at the bottom. Even for retail fraud, the power asymmetry will result in corruption innovating to circumvent technical safeguards. Government officials should be required by law to digitally sign the movement of resources each step of the way till it reaches a citizen. Open data initiatives should make such records available for public scrutiny. With support from civil society and the media, citizens will themselves address retail fraud. To solve corruption, the state should become more transparent to the citizen and not vice versa.&lt;/p&gt;
&lt;p&gt;UIDAI’s latest 23-page biometrics report is supposed to dispel the home ministry’s security anxieties. It says “biometric data is collected by software provided by the UIDAI, which immediately encrypts and applies a digital signature.” Surely, what works for UIDAI, that is digital signatures, should work for citizens too. The report does not cover even the most basic attack — for example, the registrar could pretend that UIDAI software is faulty and harvest biometrics again using a parallel set-up. If biometrics are infallible, as the report proclaims, then sections in the draft UID Bill that criminalise attempts to defraud the system should be deleted.&lt;/p&gt;
&lt;p&gt;The compromise between UIDAI and the home ministry appears to be a turf battle for states where security concerns trump developmental aspirations. This compromise does nothing to address the issues raised by the Parliamentary Standing Committee on Finance, headed by the Bharatiya Janata Party’s Yashwant Sinha.&lt;/p&gt;
&lt;p&gt;Read the &lt;a class="external-link" href="http://www.business-standard.com/india/news/do-we-needaadhar-scheme/463324/"&gt;original published in the Business Standard&lt;/a&gt; on 1 February 2012&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/do-we-need-the-aadhar-scheme'&gt;https://cis-india.org/internet-governance/do-we-need-the-aadhar-scheme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-02-03T10:11:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/google-move-is-not-good-for-netizens-say-experts">
    <title>Google move is not good for netizens, say experts</title>
    <link>https://cis-india.org/news/google-move-is-not-good-for-netizens-say-experts</link>
    <description>
        &lt;b&gt;Google's plan to merge data across 60 of its properties, which was announced last week, has drawn criticism from experts on the Internet, who are saying that this is detrimental to privacy. Balaji Narasimhan wrote this in the Hindu Business Line. The article was published on 31 January 2012.&lt;/b&gt;
        
&lt;p&gt;"Google is doing what is good for shareholders. This is not positive for netizens,” said Mr Sunil Abraham, Executive Director, Centre for Internet and Society. “People like you and me have to either accept it or leave."&lt;/p&gt;
&lt;p&gt;But what are the alternatives? Mr Somick Goswami, Director Consulting, PwC India, didn't want to comment directly on Google, but in the larger context of data privacy, he asked, "Do users want a free Internet or control over content? There is a lot of advocacy going around it. End of the day, when using the Internet, there has to be trust."&lt;/p&gt;
&lt;p&gt;One way that Google could build trust could be by using something pertaining to loyalty, which retailers use in the real world in order to woo customers.&lt;/p&gt;
&lt;p&gt;Mr Ram Menon, Executive Vice-President and Chief Technology Officer of Tibco, said that many of his clients make offers that are in context with what users want.&lt;/p&gt;
&lt;p&gt;"For example, if you like cappuccino and this knowledge is known to a vendor, he can offer you a cappuccino when you walk past the store." He said that in such cases, there was no affront to privacy because the offer is relevant and in context. "You are a member and have opted in," he said.&lt;/p&gt;
&lt;p&gt;Perhaps, the fact that all of Google's services are free has something to do with the privacy issue, pointed out the Australian Privacy Foundation. As its site privacy.org.au noted, "The company's business model is based on advertising revenue. Users pay no fees for their use of the services."&lt;/p&gt;
&lt;p&gt;And the merger of its 60 policies apart, there is another issue worrying users — new acquisitions. As Mr Abraham pointed out, “When I was browsing Silk Smitha before YouTube was acquired by Google, I had no idea that one day this information would be known to Google."&lt;/p&gt;
&lt;p&gt;And the issue becomes more serious in the context of a growing mobile workforce. As the Australian Privacy Foundation said, "Android mobile phones effectively trap users into having a Google user account."&lt;/p&gt;
&lt;p&gt;Using Google services on a mobile – especially Google Latitude, a service that allows you to enable your friends to view your current location – allows Google to track your movements.&lt;/p&gt;
&lt;p&gt;And since Google is predominantly an advertising-driven company, it could be argued that one day they might share information about you with a third party, enabling them to market to you more effectively, though this may not necessarily be done with your explicit permission – and this means that you may get an offer for products even if you have not opted in for such a service.&lt;/p&gt;
&lt;p&gt;What can be done? Mr Abraham rued the fact that there are no specific laws to safeguard users.&lt;/p&gt;
&lt;p&gt;"India needs privacy laws. In the US, law makers will create a fuss. In India, we are at the mercy of companies."&lt;/p&gt;
&lt;p&gt;The original was published in the &lt;a class="external-link" href="http://www.thehindubusinessline.com/industry-and-economy/info-tech/article2848166.ece"&gt;Hindu Business Line&lt;/a&gt;. Sunil Abraham is quoted in this article. &lt;a class="external-link" href="http://www.thehindubusinessline.com/industry-and-economy/info-tech/article2848166.ece"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/google-move-is-not-good-for-netizens-say-experts'&gt;https://cis-india.org/news/google-move-is-not-good-for-netizens-say-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-02-03T10:03:17Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/google2019s-privacy-policy-raises-hackles">
    <title>Google’s privacy policy raises hackles</title>
    <link>https://cis-india.org/news/google2019s-privacy-policy-raises-hackles</link>
    <description>
        &lt;b&gt;Have you ever used Google to search for a restaurant while you were logged in its network using your Google id? Or shared information about your trip to Goa with your friends on Google +? Or watched belly dance on YouTube? Or looked for Sunny Leone pictures on Google images? If yes, Google knows about it. Javed Anwer wrote on article on this. It is published in the Times of India on 26 January 2012.&lt;/b&gt;
        
&lt;p&gt;And according to its new &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/privacy-policy"&gt;privacy policy&lt;/a&gt; it is going to put this information to some use.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The &lt;a class="external-link" href="http://timesofindia.indiatimes.com/topic/web-giant"&gt;web giant&lt;/a&gt; says the new privacy policy will allow it to offer better services, including more relevant search results. But web experts have raised concerns over potential &lt;a href="https://cis-india.org/news/timesofindia.indiatimes.com/topic/misuse" class="external-link"&gt;misuse&lt;/a&gt; of data and breach of privacy. According to Google's new privacy policy that will come into effect from March 1, the company is "getting rid of over 60 different privacy policies across Google services and replacing them with one that's shorter, easier to read" and something that will enable it to "create intuitive experience across Google" . Unlike in the past when Google had allowed users to choose personalized services, this time there is no option to opt out.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;For an end-user this means that whatever information he shares through Google searches, Gmail, Google +, Picassa etc will be used to customize Google services for him. That the move is significant can be gauged from the fact that Google has provided a link to the new policy directly under its search engine on main page, something that the company rarely does. Google users will also be notified about the policy change through an email. "Our new privacy policy makes clear that, if you're signed in, we may combine information you've provided from one service with information from other services. In short, we'll treat you as a single user across all our products, which will mean a simpler, more intuitive Google experience," said Alma Whitten, Google's director of privacy, in a post on the company's official blog.&lt;/p&gt;
&lt;p&gt;Whitten gave some example of how this information will be used. "We can make search better - figuring out what you really mean when you type in Apple, Jaguar or Pink. We can provide more relevant ads too," she wrote. "We can provide reminders that you're going to be late for a meeting based on your location , your calendar and an understanding of what the traffic is like that day. Or ensure that our spelling suggestions, even for your friends' names, are accurate because you've typed them before."&lt;br /&gt;&lt;br /&gt;The privacy policy from Google is at the heart of its new business strategy as it works to keep the search engine relevant and its services fresh in the face of social networking websites like Twitter and Facebook. It is also prompted by the proliferation of devices like smartphones and tablets. However, privacy experts are not amused. Sunil Abraham, director of Centre for Internet and Society, said the new changes are not good for a consumer's privacy.&lt;br /&gt;&lt;br /&gt;"I understand that Google collects the data so that it can build a 360 degree profile of a user and based on the information serve relevant advertisements . But there is no reason for them to store this data for long. Storing data makes it prone to misuse by authorities as well as corporations," said Abraham. Another, problem, he said is that different services are used for different purposes. "I don't want my bakery shop owner to know what kind of medicines Ibuy from the nearby medical store," said Abraham.&lt;/p&gt;
&lt;p&gt;Are you being watched?&lt;br /&gt;&lt;br /&gt;What |&lt;br /&gt;&lt;br /&gt;For an end-user the new policy means that whatever information he shares through Google searches, Gmail, Google+, Picassa, etc will be used to customize Google services for him&lt;br /&gt;&lt;br /&gt;Why |&lt;br /&gt;&lt;br /&gt;The privacy policy is at the heart of Google's business strategy as it tries to keep the search engine relevant in the face of social networking websites like Twitter and Facebook&lt;br /&gt;&lt;br /&gt;Concerns |&lt;br /&gt;&lt;br /&gt;It's instrusive as online activity is tracked; storing data makes it prone to misuse by authorities as well as corporations&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://timesofindia.indiatimes.com/business/india-business/Googles-privacy-policy-raises-hackles/articleshow/11635794.cms"&gt;The original was published in the Times of India&lt;/a&gt;. Sunil Abraham has been quoted in it.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/google2019s-privacy-policy-raises-hackles'&gt;https://cis-india.org/news/google2019s-privacy-policy-raises-hackles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-01-30T03:58:57Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill">
    <title>Privacy Matters — Analyzing the Right to "Privacy Bill" </title>
    <link>https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill</link>
    <description>
        &lt;b&gt;On January 21, 2012 a public conference “Privacy Matters” was held at the Indian Institute of Technology in Mumbai. It was the sixth conference organised in the series of regional consultations held as “Privacy Matters”. The present conference analyzed the Draft Privacy Bill and the participants discussed the challenges and concerns of privacy in India.&lt;/b&gt;
        
&lt;p&gt;The conference was organized by Privacy India in partnership with the Centre for Internet &amp;amp; Society, International Development Research Centre, Indian Institute of Technology, Bombay, the Godrej Culture Lab and Tata Institute of Social Sciences. Participants included a wide range of stakeholders that included the civil society, NGO representatives, consumer activists, students, educators, local press, and advocates.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/high-level-summary-and-critique-to-the-leaked-right-to-privacy-bill-2011" class="internal-link" title="High Level Summary and Critique to the Leaked Right to Privacy Bill 2011"&gt;Comments to the Right to Privacy Bill&lt;/a&gt;&lt;/p&gt;
&lt;h2&gt;Welcome&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Prashant Iyengar&lt;/strong&gt; was the Lead Researcher with Privacy India, opened the conference with an explanation of Privacy India’s mandate to raise awareness, spark civil action and promote democratic dialogue around privacy challenges and violations in India. He summarized the five “Privacy Matters” series previously organised across India in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-nujsconference-summary" class="external-link"&gt;Kolkata&lt;/a&gt; on January 23, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-conferencebanglaore" class="external-link"&gt;Bangalore&lt;/a&gt; on February 5, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-matters-report-from-ahmedabad" class="external-link"&gt;Ahmedabad&lt;/a&gt; on March 26, 2011, in &lt;a href="https://cis-india.org/internet-governance/blog/privacy/privacy-guwahati-report" class="external-link"&gt;Guwahati&lt;/a&gt; on June 23, 2011 and in&lt;a href="https://cis-india.org/internet-governance/privacy-chennai-report.pdf/view" class="external-link"&gt; Chennai &lt;/a&gt;on August 6, 2011.&lt;/p&gt;
&lt;h2&gt;Keynote Address&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Na. Vijayashankar&lt;/strong&gt; (popularly known as &lt;strong&gt;Naavi&lt;/strong&gt;), a Bangalore based e-business consultant, delivered the key note address on the quest of a good privacy law in India.&amp;nbsp;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Naavi.jpg/image_mini" title="Naavi" height="171" width="155" alt="Naavi" class="image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;He described the essential features of good privacy legislation. In 
analyzing the Draft Privacy Bill’s definition of the right to privacy, 
he suggested it should be defined through the “right to personal 
liberty” rather than through what constitutes “infringements”.&amp;nbsp; Mr. 
Vijayashankar went on to explain that the “privacy right” should be 
taken beyond “information protection” and defined as a “personal privacy
 or a sense of personal liberty without constraints by the society”. He 
explained the various classifications and levels of protection 
associated with the availability and disclosure of data. He expressed 
concerns regarding monitoring of data processors and suggested that data
 controllers have contractual agreements between data processors, so as 
to ensure an obligation of data security practices. He also called for 
the simplification and division of offences and suggested numerous 
reasons as to why the Cyber Appellate Tribunal would not be an ideal 
monitoring mechanism or authority. See Naavi's presenation &lt;a href="https://cis-india.org/internet-governance/proposed-privacy-bill" class="internal-link" title="Proposed Privacy Bill"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Session I: Privacy and the Legal System&lt;/h2&gt;
&lt;p&gt;&amp;nbsp;&lt;strong&gt;Dr. Sudhir Krishnaswamy&lt;/strong&gt;, Assistant Professor at the National Law School of India&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Dr. Krishnaswamy started off the presentation by questioning the 
normative assumptions the Draft Privacy Bill makes. He referred to the 
controversy of Newt Gingrich's second marriage, to question the range of
 moral interests that were involved. The Bill falls short in accounting 
for dignity in relation to privacy.&lt;br /&gt;&lt;br /&gt;He described the Draft Privacy Bill as a reasonable advance, given where
 privacy laws were before. Although, he feels that it does fall short, 
in terms of a narrow position, on what privacy law should do. He also 
questioned if it satisfies constitutional standards. He stressed the 
importance of philosophical work around the Draft Privacy Bill 
considering that the nature of privacy is not neat and over-arching.&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/sudhir.jpg/image_mini" title="Sudhir Krishnaswamy" height="144" width="152" alt="Sudhir Krishnaswamy" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Privacy and the Constitutional Law&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;N S Nappinai&lt;/strong&gt;, Advocate, High Court, Mumbai,&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/nappinai.jpg/image_preview" title="Nappinai" height="172" width="157" alt="Nappinai" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;Nappinai spoke on the constitutional right to privacy. She explained the
 substantial development of Article 21 of the Constitution of India to 
include the ‘right to privacy’ with regards to its interpretation and 
application. She described the different shift of the application of the
 right to privacy in the West in comparison to India. The West has moved
 from the right to privacy pertaining to property to the right to 
privacy concerning personal rights, whereas India moved from personal 
rights to property rights. She outlined three aspects of privacy: 
dignity, liberty and property rights. &lt;br /&gt;&lt;br /&gt;Ms. Nappinai dissected the Bill in its major components: interception, 
surveillance, method and manner of personal data, health information, 
collection, processing and use of personal data. Using these components,
 she questioned what precedence exists? What should be further protected
 or reversed? What lessons should legislators draw from?&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Shortcomings of the Draft Right to Privacy Bill falls include:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;The objects and reasons section in the Draft Privacy Bill declares the right to privacy to every citizen as well as delineates the collection and dissemination of data. Nappinai dismisses the need for this delineation on the grounds that data protection is an inherent part of the right to privacy, it is not exclusive.&lt;/li&gt;&lt;li&gt;Large focus on transmission of data. The provisions do not account for property rights pertaining to the right to privacy. Therefore, the ‘knock-and-enter’ rule, the ‘right to be left alone’ and the ‘right to happiness’ should be included.&lt;/li&gt;&lt;li&gt;Applicability of the Bill should extend to all persons as well as data residing within the territory. It would be self-defeating if it only includes citizens, considering that the Constitution extends to all persons within the territory.&lt;/li&gt;&lt;li&gt;The right to dignity is unaccounted for.&lt;br /&gt;&lt;br /&gt;See Nappinai's presentation &lt;a href="https://cis-india.org/internet-governance/privacy-and-the-constitution" class="internal-link" title="Privacy and the Constitution"&gt;here&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;Session II: Privacy and Freedom of Expression&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Apar Gupta&lt;/strong&gt;, Advocate, Delhi&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Apar Gupta is an advocate based in Delhi who specializes in IP and 
electronic commerce law, spoke predominantly on the interplay between 
privacy and freedom of expression. He used the example of an advocate 
tweeting about his criticism of a judges’ ruling, to illustrate how 
different realms of online anonymity enable freedom of speech. He went 
beyond the traditional realm of journalistic architecture such as 
television channels or newspapers and explained online community 
disclosure.
&lt;p&gt;Mr. Gupta provided a practical example of Indian Kanoon, a popular 
online database of Indian court decisions. Because Indian Kanoon is 
linked to the Google search engine, many individuals involved in civil 
and criminal matters have requested Indian Kanoon to remove the court 
judgments, under privacy claims. This particularly occurs with 
individuals involved in matrimonial cases. However, as court judgment 
constitute public records India Kanoon only removes court judgments when
 requested by a court order.&lt;/p&gt;
&lt;p&gt;He described the several ways legislators can define privacy and 
freedom of expression. Considering that the privacy of an individual may
 border upon freedom of speech and expression, he questioned whether or 
not privacy should override the right to freedom of speech and 
expression. In addition, Mr. Gupta discussed the debate on whether or 
not the Privacy Bill should override all existing provisions in other 
laws.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/Gupta.jpg/image_preview" alt="Apar Gupta" class="image-inline image-inline" title="Apar Gupta" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Additionally, he analyzed the provisions of the Draft Privacy Bill 
using three judgments. In these judgments, different entities sought of 
various forms of speech to be blocked under privacy claims. He spoke 
about the dangers of a statutory right for privacy that does not 
safeguard freedom of speech and expression. Considering that the privacy
 statute may allow for a form of civil action permitting private parties
 to approach courts to stop certain publications, he stressed the 
importance for legislators to ensure balanced privacy legislation 
inclusive of freedom of speech and expression.&lt;/p&gt;
&lt;h3&gt;Sexual Minorities and Privacy&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Danish Sheikh&lt;/strong&gt;, researcher at Alternative Law Forum&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/danish.jpg/image_preview" alt="Danish " class="image-inline image-inline" title="Danish " /&gt;&lt;/td&gt;
&lt;td&gt;Danish examined the status of sexual minorities in the light of privacy 
framework in India. The tag of decriminalization has served to greatly 
alter the way institutions approach the question of privacy when it 
comes to sexual minorities. He used the Naz Foundation judgment as a 
chronological marker to map the developments in the right to privacy and
 sexual minorities over the years.
&lt;p&gt;He outlined four key effects on the right to privacy due to the Naz Foundation judgment:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Prepared the understanding of privacy as a positive right and placed obligations on the state,&lt;/li&gt;&lt;li&gt;Discussed privacy as dealing with persons and not just places, it took into account decisional privacy as well as zonal privacy,&lt;/li&gt;&lt;li&gt;Connected privacy with dignity and the valuable worth of individuals, and&lt;/li&gt;&lt;li&gt;Included privacy on one’s autonomous identity.&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;He described various incidents that took place before the Naz Foundation judgment, pre-Naz, that altered the way we conceived of queer rights in general and privacy in particular, including the Lucknow incidents, transgender toilets, passport forms, the medical establishment and lesbian unions. Post-Naz, he described two incidents including the Allahabad Muslim University sting operation as well as the TV9 “Expose” that captured public imagination.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;He concluded by asking: “What do these stories tell us about privacy?” The issues faced by the transgender community tell us that privacy doesn’t necessarily encompass a one-size-fits-all approach, and can raise as many questions as it answers. The issues faced by the Lucknow NGOs display the institutionalized disrespect for privacy and that has marginally more devastating consequences for the homosexual community by the spectre of outing. The issues faced by lesbian women evidence yet another need for breaching the public/private divide, demonstrating how the protection of the law might be welcome in the family sphere. Alternate sexual orientation and gender identity might bring the community under a common rubric, but distilling the components of that rubric is essential for engaging in any kind of useful understanding of the community and the kind of privacy violations it suffers – or engage with situations when the lack of privacy is empowering.&lt;/p&gt;
&lt;h2&gt;Session III: Privacy and National Security&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;Menaka Guruswamy&lt;/strong&gt;, Advocate, Supreme Court of India&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Menaka explored national security and its relationship to privacy. In
 her presentation, she compared the similar manner in which the courts 
approach national security and privacy issues. The courts feel national 
security and privacy issues are too complex to define, therefore, they 
take a case-by-case approach.&lt;br /&gt;
&lt;br /&gt;
&lt;p&gt;Ms. Guruswamy described three incidents that urged her to question 
national security and privacy. First, she was interested in the lack of 
regulation surrounding intelligence agencies and was involved in the 
introduction of the Regulations of Intelligence Agencies Bill as a 
private members bill. Second, national security litigation between the 
Salwa Judum judgment and the State of Chhattisgarh is an example of how 
national security triumphs constitutional rights and values. Third, 
privacy in the context of the impending litigation of Naz Foundation in 
the Supreme Court. She described the larger conversation of national security focus on 
values of equality and privacy. She discussed the following questions 
that serve in advancing certain conception of rights:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;How do we posit privacy which necessarily, philosophically as 
well as judicially, is carved out as the right of an individual to be 
left alone?&lt;/li&gt;&lt;li&gt;What are the consequences when national security, 
which is posited as the rights of the nation, is in conflict with the 
right of the individual to be left alone?&lt;/li&gt;&lt;li&gt;Considering that 
constitutional rights are posited as a public facet of citizenship how 
does a right to privacy play in that context?&lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_menaka.jpg/image_preview" alt="Menaka" class="image-inline image-inline" title="Menaka" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Privacy and UID&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;R. Ramakumar&lt;/strong&gt;, professor at the Tata Institute of Social Sciences&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/ramkumar.jpg/image_preview" title="Ramakumar" height="171" width="202" alt="Ramakumar" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;Prof. Ramakumar spoke on UID, its collection of information and the 
threat to individual privacy. First, he provided a historical trajectory
 of national security that has led to increased identity card schemes. 
He described the concrete connection between UID and national security.
&lt;p&gt;&lt;br /&gt;He briefed the gathering on the objectives of the UID project. He 
described several false claims as proposed by the UIDAI. He explicitly 
disproved the UIDAI claim that Aadhaar is voluntary. He did this by 
comparing various legislations associated with the National Population 
Registrar that had provisions mandating the inclusion of the UID number.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;He went on to explain that the misplaced emphasis of technology to 
handle large populations remains unproven. He described two specific 
violations of privacy inherent in the UID system: convergence of 
information and consent. The UID database makes it possible for the 
linking or convergence of information across silos. In addition, consent
 is unaccounted for in the UID system. The UID enrollment form requires 
consent from a person to share their information. However, the software 
of the enrollment form automatically checks ‘yes’, therefore you are not
 asked. Even if you disagree, it automatically checks ‘yes’. Default 
consent raises the important question, “to what extent are we the owners
 of our information?” and “what are the privacy implications?”&lt;/p&gt;
&lt;p&gt;Mr. Ramakumar was once asked, by Yashwant Sinha in a Parliamentary Standing Committee meeting, “Is the Western concept of privacy important in developing country like India?”. Using this question posed to him, he stressed the importance of privacy to be understood as a globally valued right, entitlement and freedom. He also referred to Amartya Sen’s work on individual freedoms.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;During the daylong consultation numerous questions and themes relating to privacy were discussed:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;ul&gt;&lt;li&gt;How is the right to privacy defined?&lt;/li&gt;&lt;li&gt;How can the &lt;a href="https://cis-india.org/internet-governance/draft-bill-on-right-to-privacy" class="internal-link" title="Draft Bill on Right to Privacy"&gt;Draft Privacy Bill&lt;/a&gt; redefine the right to privacy?&lt;/li&gt;&lt;li&gt;How can reasonable deterrence mechanisms be included?&lt;/li&gt;&lt;li&gt;Does duplication of the right to privacy exists in different statutes?&lt;/li&gt;&lt;li&gt;Is the Cyber Appellate Tribunal an ideal monitoring mechanism or authority? &lt;br /&gt;&lt;/li&gt;&lt;li&gt;What are the circumstances under which authorized persons can exercise the Right of privacy invasion?&lt;/li&gt;&lt;li&gt;How can the Draft Privacy Bill account for the right to dignity?&lt;/li&gt;&lt;li&gt;How much information should the State be allowed to collect?&lt;/li&gt;&lt;li&gt;How can citizens become more informed about the use of their information and the privacy implications involved?&lt;/li&gt;&lt;li&gt;What would be the appropriate balance or trade-off between security and civil liberties?&lt;/li&gt;&lt;li&gt;What are the dangers with permitting the needs of national security to trump competing values?&lt;/li&gt;&lt;li&gt;What are the consequences for the homosexual community, when faced with institutionalized disregard for privacy? &lt;/li&gt;&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/copy_of_usha.jpg/image_preview" alt="Usha " class="image-inline image-inline" title="Usha " /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &amp;nbsp; &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;img src="https://cis-india.org/home-images/contests.jpg/image_preview" alt="Participants" class="image-inline image-inline" title="Participants" /&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/proposed-privacy-bill" class="internal-link" title="Proposed Privacy Bill"&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill'&gt;https://cis-india.org/internet-governance/privacy-matters-analyzing-the-right-to-privacy-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>natasha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    

   <dc:date>2012-02-15T04:27:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/google-to-change-privacy-policy">
    <title>Google to change privacy policy to use personal info of users</title>
    <link>https://cis-india.org/news/google-to-change-privacy-policy</link>
    <description>
        &lt;b&gt;It is a warning for users of Google and other Social Networking sites. Who are using these sites for searching anything they want to know and sharing their personal life with friends, colleagues and relatives. If you have ever used Google for searching any place, restaurant or shared information about your personal life with your friends on Google and other social networking sites, or you have watched adult stuff on YouTube, if your answer is yes, Google knows about it. And according to its new privacy policy Google is going to put this information to some use. Sheetal Ranga's article was published in Punjab Newsline on 27 January 2012.&lt;/b&gt;
        
&lt;p&gt;It is claimed by the web enormous that according to new privacy policy, better service will be provided to its users, including more relevant search results. And other side the web experts have expressed their concerns over potential misuse of data and defy of privacy. Google's new privacy policy will come into effect from 1 March 2012, said by Google.&lt;/p&gt;
&lt;p&gt;Google provide service which will be shorter and easier to read and something that will enable it to create spontaneous experience across Google. Google had allowed users to choose personalized services; “unlike” this time there is no option to pick for the users.&lt;/p&gt;
&lt;p&gt;The new policy of Google has made some people anxious over their privacy issues. The new policy is being adopted by Google, SafeGov monitors security issues for federal, state and local government is not happy with it.&lt;/p&gt;
&lt;p&gt;A security analyst, Jeff ( SafeGov) said, "Google should not be data-mining information in e-mails, text messages, searches and documents that workers are putting into Google services. It’s a matter of not making government workers unnecessarily exposed to hackers and to inadvertent disclosures of information."&lt;/p&gt;
&lt;p&gt;The Vice President of Google ,Amit Singh claims that Google’s new privacy policy for consumer data is antiquated by data privacy provisions in contracts with government agencies and other organization that use the paid version of Google Apps. Google will maintain our endeavor customers’ data in conformity with the confidentiality and security obligations provided to their domain, he said.&lt;/p&gt;
&lt;p&gt;The new policy of Google has made some people edgy over their privacy issues. SafeGov monitors security issues for federal, state and local government agencies are very unhappy with the new policy of Google. It is also said by Sunil Abraham, director of Centre for Internet and Society that the new changes are not good for a consumer's privacy.&lt;/p&gt;
&lt;p&gt;Director of privacy Alma Whitten has given some example of how this information will be used. "We can make search better - figuring out what you really mean when you type in Apple, Jaguar or Pink. We can provide more relevant ads too," she wrote. "We can provide reminders that you're going to be late for a meeting based on your location, your calendar and an understanding of what the traffic is like that day. Or ensure that our spelling suggestions, even for your friends' names, are accurate because you've typed them before."&lt;/p&gt;
&lt;p&gt;Other side after the cross-checked the contract between Google and the city of Los Angele by Gould, claimed that he didn’t think through the consequences for government users.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.punjabnewsline.com/content/google-change-privacy-policy-use-personal-info-users/36333"&gt;Punjab Newsline published this story&lt;/a&gt;. Sunil Abraham was quoted in it.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/google-to-change-privacy-policy'&gt;https://cis-india.org/news/google-to-change-privacy-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-01-30T05:03:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/whose-data-is-it">
    <title> Whose Data is it Anyway?</title>
    <link>https://cis-india.org/internet-governance/whose-data-is-it</link>
    <description>
        &lt;b&gt;Tactical Technology Collective and the Centre for Internet &amp; Society invite you to the second round of discussions of the Exposing Data Series at the CIS office in Bangalore on 24 January 2012. Siddharth Hande and Hapee de Groot will be speaking on this occasion.&lt;/b&gt;
        
&lt;p&gt;Like countless others, this title is a convenient adaptation of a 1972 play by Brian Clark, Whose Life is it Anyway?, a meditation on 'euthanasia' and the extent to which governments or the law can determine the private life of an individual. In a similar sense we use the title to help frame the second set of conversations in the Exposing Data Series, to zero in on the idea of data and who has the right to decide what happens with it. Philosophically, and also at the level of code, computing and the law, the ownership of data can be a somewhat odd and a contentious thing to grapple with. The only other understandings of 'ownership' we really have are those of property and identity and these get imputed onto the intangibility of data. And, in some senses now, many aspects of one's identity exist as data.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;There are a range of experiences of data ownership that we talk about and experience daily. On the one hand you can hoard hard disks with favourite content to retrieve memories and experiences. On the other end of things, you can aggregate your experiences and memories with that of thousands of others, that then gets treated almost like a private hard disk belonging to some mysterious X. Who is this Mysterious X? Is there a Y? Or an XY? What is the trajectory of data in its movement from the individual to a larger, shadowy infrastructure that harvests it? What happens to our idea of data in its reconfiguration from intangible code to an idea of politics and rights? To introduce another provocation, do our existing ideas of data ownership objectify individuals? What does this objectification imply for the notion of personal privacy? For example, does the fetishization of 'things' called data obfuscate the idea of personal privacy?&lt;/p&gt;
&lt;p&gt;One of the ways in which we may consider looking at open data initiatives for transparency and accountability is to assess it as discourse, and in relation to what happens when communities aggregate data. Open Government Data usually involves a top-down approach in terms of how it is aggregated, collated, shared, whilst community based approaches are more particular, contextual and local. What do these different approaches give us when we bring them to the same table?&lt;/p&gt;
&lt;p&gt;The second event in the Exposing Data Series will focus on data ownership, looking into open government data and community-based data aggregation, to explore the various levels of data collection, the movement of data and its exchange, its representation, and dissemination in different contexts.&lt;/p&gt;
&lt;h2&gt;Speakers&lt;br /&gt;&lt;/h2&gt;
&lt;ol&gt;&lt;li&gt;Siddharth Hande, Transparent Chennai&lt;/li&gt;&lt;li&gt;Hapee de Groot, Hivos, Netherlands&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;This event is free and open to everyone. However, we would appreciate a confirmation of attendance ahead of time so as to ensure that your space is reserved. To confirm your attendance please write to:&amp;nbsp; &lt;a class="external-link" href="mailto:yelena.gyulkhandanyan@gmail.com"&gt;yelena.gyulkhandanyan@gmail.com &lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Photo Source:&lt;a class="external-link" href="http://www.freedigitalphotos.net/images/view_photog.php?photogid=2000"&gt; http://www.freedigitalphotos.net/images/view_photog.php?photogid=2000&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.freedigitalphotos.net/images/view_photog.php?photogid=2000"&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLsxhgA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLsxhgA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLsxj8A.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLsxj8A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLsxwAA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLsxwAA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLsxxUA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLsxxUA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/whose-data-is-it'&gt;https://cis-india.org/internet-governance/whose-data-is-it&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-04-28T04:12:15Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/keeping-it-private">
    <title>Keeping it Private</title>
    <link>https://cis-india.org/internet-governance/keeping-it-private</link>
    <description>
        &lt;b&gt;As we disclose more information online, we must ask who might access it and why. This article by Nishant Shah was published in the Indian Express on Sunday, 15 January 2012. &lt;/b&gt;
        
&lt;p&gt;As a researcher of the blink-and-change cyberspaces, I am often asked 
about the future of all things digital. I generally refuse to answer 
such questions because researchers are happier talking about things past
 than things present. Also, when people ask questions of the future, 
they are more interested in gadgets and platforms. Will Facebook survive
 the next year? Will more people use Twitter? Is the mobile the new 
weapon of protest? Shall we all soon talk only on FaceTime? I shrug my 
shoulders at these questions. However private information and privacy 
ties all these questions.&lt;/p&gt;
&lt;p&gt;I pronounce that 2012 is going to be the year of Personal Information Management and the need for increased privacy, where more than anything else, people will realise that what they do online is not only significant to their present, but that it might bite them in their digital futures. We have heard stories that have hinted at management of information and reputations online. Young people put compromising pictures and videos online, severely damaging their social and professional relationships; people express opinions on public forums, which might not necessarily reflect them well; users reveal personal information, which can be abused by those with malice. These instances should remind us that unlike in the physical worlds, where our foot-in-the-mouth moments, youthful indiscretions or embarrassing behaviour quickly runs through the grapevine and is forgotten, in the digital worlds, the things that we say and do, stay long after we have forgotten them.&lt;/p&gt;
&lt;p&gt;And this is where privacy kicks in. Many people in India, when they encounter the idea of “privacy”, raise their eyebrows. Culturally, we are not very private people. We celebrate our triumphs and sorrows in public, freely part with information to strangers on train rides, and don’t have qualms asking about age, marital status or salary. In the age of ubiquitous computing, we must remember that once something has been committed to the online world, it will be etched somewhere and will be available for somebody else to look at. The internet, specially with increasing bandwidth, expanded spectrum and cloud-based distributed data storage, is an unforgiving space that never lets go.&lt;/p&gt;
&lt;p&gt;Privacy, in this brave new world, is not about disclosure. It is becoming increasingly clear that we will need to disclose more and more of our private information if we want services — from government public delivery systems to private credit and education — online. However, once we have disclosed our private information, then what? Who uses it? Who reads it? Who stores it for what purpose? What are the implications of having that private information out there?&lt;/p&gt;
&lt;p&gt;In the digital world, privacy is about having more control over the personal information that we have disclosed, the right to know who, where, when, how and for what purposes information that we have willingly disclosed is used. And as the country finalises privacy bills, this right of the individual, whose private information is going to feed government and business ecologies, is at stake.&lt;/p&gt;
&lt;p&gt;There is a need to institute better regulation around data protection, data mining, data retention and data retrieval that is still in the limbo in our country, at the mercy of privately crafted terms of service that we blindly accept while signing into the digital world.&lt;/p&gt;
&lt;p&gt;It is time to move away from understanding privacy as disclosure to privacy as control of information — to know who is doing what with your private information and how you should have a say in it. And it is time to realise that just because you don’t have anything to hide, does not mean that you need to be in a state of disclosure. There is a reason why you have curtains in your house, or do not allow strangers to look into your bags.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.indianexpress.com/news/keeping-it-private/899804/1"&gt;The article was originally published in the Indian Express&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/keeping-it-private'&gt;https://cis-india.org/internet-governance/keeping-it-private&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-01-27T03:50:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme">
    <title>NGO questions people's privacy in UID scheme</title>
    <link>https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme</link>
    <description>
        &lt;b&gt;Taking a leaf out of the recommendations of the parliamentary standing committee on finance (SCF) that raised objections on the National Identification Authority of India Bill 2010, Delhi-based NGOs have called upon the Jharkhand government to stay the execution of UID projects in the state.  Jaideep Deogharia's article was published in the Times of India on 11 January 2012.&lt;/b&gt;
        
&lt;p&gt;Citing excerpts from the recommendations of the SCF, headed by BJP MP Yashwant Sinha, the NGO activists asserted that the MoU signed by the government on June 25, 2010, was without any legal and constitutional mandate.&lt;/p&gt;
&lt;p&gt;This claim, however, remains unfounded as the UIDAI is functioning under an executive order of the department of planning and has no links with the NIDAI Bill. The issue was recently clarified by the director general and mission director of UIDAI when he addressed the media in the capital during his three-day visit.&lt;br /&gt;&lt;br /&gt;Organizing a round table, report on SCF and its implications for Aadhaar project and National Population register for multipurpose National ID Card (MNIC),&lt;br /&gt;&lt;br /&gt;Citizens Forum for Civil Liberties member Gopal Krishna said given the fact that the Election Commission had shortlisted 15 documents as evidence of identity and citizenship, there was no need to have the 16th instrument (read UID).&lt;br /&gt;&lt;br /&gt;"It violates citizens' basic and constitutional right to privacy because collecting biometric information of an individual was limited to criminals," he said clarifying that even in case of prisoners, the fingerprint data is supposed to be deleted after acquittal under the Prisoner Identification Act.&lt;br /&gt;&lt;br /&gt;JT D'Souza, an expert in biometrics technology, Mumbai, gave a presentation on how biometric information was vulnerable to exploitation. Using a finger print reader, he demonstrated fake finger prints being read by the machine. He said a fingerprint on a semi solid wax slab can be filled up with adhesive and allowed to set for eight hours. "Once the adhesive block is removed, it takes up the exact marks of finger prints using which any finger print reader can be fooled," he said.&lt;/p&gt;
&lt;p&gt;Another participant, Sunil Abraham, director, Centre for Internet and Society, Bangalore, said there is no data protection or privacy law in place. "The UID project was allowed to march on without any protection being put in place," he said.&lt;br /&gt;&lt;br /&gt;"On one hand, the government wants its citizens to be transparent by giving all their biometric and demographic data, but on the other hand, people in higher authorities are making every bid to conceal facts and function in a non-transparent manner," he said.&lt;br /&gt;&lt;br /&gt;D' Souza also raised questions about the uniqueness of fingerprints as it has never been tested on a vast population. Citing examples from foreign countries where fingerprint studies have proved to be ineffectual in establishing non duplication, he said biometric data if hacked could be misused.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://timesofindia.indiatimes.com/city/ranchi/NGO-questions-peoples-privacy-in-UID-scheme/articleshow/11452679.cms"&gt;Read the original published in the Times of India&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme'&gt;https://cis-india.org/news/ngo-questions-peoples-privacy-in-uid-scheme&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-01-12T11:45:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/constitution-of-group-of-experts">
    <title>Constitution of Group of Experts to Deliberate on Privacy Issues</title>
    <link>https://cis-india.org/news/constitution-of-group-of-experts</link>
    <description>
        &lt;b&gt;It has been decided to constitute a Small Group of Experts under the Chairmanship of Justice A.P. Shah, Former Chief Justice, Delhi High Court, to identify the privacy issues and prepare a paper to facilitate authoring the Privacy Bill. The constitution of the proposed group and ToR are as follows: &lt;/b&gt;
        
&lt;ol&gt;&lt;li&gt;Constitution of the Group&lt;br /&gt;&lt;br /&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;strong&gt;S.No.&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Name&lt;/strong&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Designation&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Justice A.P. Shah, Former Chief Justice, Delhi High Court&amp;nbsp;&amp;nbsp; &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Chairman&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Shri. R S Sharma, DG UIDAI&lt;/td&gt;
&lt;td&gt;Member&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3&lt;/td&gt;
&lt;td&gt;Dr. Gulshan Rai, Director General CERT-In, DIT&lt;/td&gt;
&lt;td&gt;Member&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4&lt;/td&gt;
&lt;td&gt;Sh. Rajiv Kapoor, JS, DOPT&lt;/td&gt;
&lt;td&gt;Member&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5&lt;/td&gt;
&lt;td&gt;Representative,&amp;nbsp; Department of Legal Affairs &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Member&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6&lt;/td&gt;
&lt;td&gt;Sh. Som Mittal, President, NASSCOM &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Member&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7&lt;/td&gt;
&lt;td&gt;Ms. Barkha Dutt, NDTV&lt;/td&gt;
&lt;td&gt;Member&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8&lt;/td&gt;
&lt;td&gt;Dr. (Ms) Usha Ramanathan, Researcher &amp;amp; Advocate &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Member&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9&lt;/td&gt;
&lt;td&gt;Sh. PraneshPrakash, Programme Manager, Centre for Internet &amp;amp; Society &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Member&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10&lt;/td&gt;
&lt;td&gt;Dr. Kamlesh Bajaj, CEO, Data Security Council of India (DSCI)&lt;/td&gt;
&lt;td&gt;Member&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11&lt;/td&gt;
&lt;td&gt;Dr. Nagesh Singh, Adviser, Planning Commission&lt;/td&gt;
&lt;td&gt;Member&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12&lt;/td&gt;
&lt;td&gt;Sh. R K Gupta, Adviser (CIT&amp;amp;I), Planning Commission&lt;/td&gt;
&lt;td&gt;Member&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/li&gt;&lt;li&gt;Terms of Reference&lt;br /&gt;
&lt;ul&gt;&lt;li&gt;To study the Privacy laws and related bills promulgated by various countries.&lt;/li&gt;&lt;li&gt;To make an in-depth analysis of various programmes being implemented by GoI from the point of view of their impact on Privacy. &lt;br /&gt;&lt;/li&gt;&lt;li&gt;To make specific suggestions for consideration of the DOPT for incorporation in the proposed draft Bill on Privacy.&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;/li&gt;&lt;li&gt;The Chairman may co-opt other Members to the group for their specific inputs.&lt;/li&gt;&lt;li&gt;The expenditure towards TA/DA in connection with the meetings of the Group in respect of the official members will be borne by their respective Ministries/Departments.&amp;nbsp; Domestic travel in respect of non-Official Members of the group would be permitted by Air India (economy class) and the expenditure would be met by the Planning Commission.&lt;/li&gt;&lt;li&gt;The group will be serviced by the CIT &amp;amp; I Division, Planning Commission.&lt;/li&gt;&lt;li&gt;The group shall submit its report by 31st March 2012.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p align="right"&gt;&lt;img src="https://cis-india.org/home-images/bose.jpg/image_preview" title="S Bose" height="33" width="69" alt="S Bose" class="image-inline image-inline" /&gt;&lt;strong&gt;(S Bose)&lt;/strong&gt;&lt;br /&gt;Under Secretary to the Government of India&lt;/p&gt;
&lt;div align="left"&gt;To:&lt;br /&gt;&lt;strong&gt;The Chairman and all Members of the Group of Experts &lt;/strong&gt;&lt;br /&gt;Copy forwarded to:&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;PS to Deputy Chairman, Planning Commission&lt;/li&gt;&lt;li&gt;PS to MOS (Planning, PA, S&amp;amp;T and ES), Planning Commission&amp;nbsp;&lt;/li&gt;&lt;li&gt;PS to all Members of the Planning Commission&amp;nbsp;&lt;/li&gt;&lt;li&gt;PS to Member Secretary, Planning Commission&amp;nbsp;&lt;/li&gt;&lt;li&gt;Director (PC), IFA unit,Deputy Secretary (Admn.),Planning Commission&amp;nbsp;&lt;/li&gt;&lt;li&gt;Administration/Accounts/General Branches, Library, CIT &amp;amp; I Division, Planning Commission&amp;nbsp;&lt;/li&gt;&lt;li&gt;Information Officer, Planning Commission &lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;div align="right"&gt;&lt;img src="https://cis-india.org/home-images/bose.jpg/image_preview" title="S Bose" height="33" width="69" alt="S Bose" class="image-inline image-inline" /&gt;&lt;strong&gt;(S Bose)&lt;/strong&gt;&lt;br /&gt;Under Secretary to the Government of India&lt;/div&gt;
&lt;/div&gt;
&lt;a href="https://cis-india.org/internet-governance/constitution-of-group-of-experts.pdf" class="internal-link" title="Constitution of Group of Experts to Deliberate on Privacy Issues"&gt;Download the PDF &lt;/a&gt;we got from the Planning Commission.
&lt;p align="left"&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/constitution-of-group-of-experts'&gt;https://cis-india.org/news/constitution-of-group-of-experts&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-01-04T07:49:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/indecent-proposals">
    <title>Indecent Proposals</title>
    <link>https://cis-india.org/news/indecent-proposals</link>
    <description>
        &lt;b&gt;If Kapil Sibal’s attempts to police net content fructify, it may even lead to a reversal of some of the forward-looking provisions of the Information Technology (IT) Act, 2000. The new proposal, for instance, will reverse Section 79 which protects intermediaries (websites and carriers) from being prosecuted or made liable for any objectionable content published. Says Pranesh Prakash, programme manager, Centre for Internet and Society: “Unfortunately, what Sibal says turns this upside down as they would now be held responsible for e-content.” Sibal wants to monitor content prior to publication.&lt;/b&gt;
        
&lt;p&gt;&lt;a class="external-link" href="http://www.outlookindia.com/article.aspx?279281"&gt;The article by Arindam Mukherjee was published in Outlook Magazine on December 19, 2011&lt;/a&gt;. Pranesh Prakash was quoted in it.&lt;/p&gt;
&lt;p&gt;While there are privacy concerns, any attempt to do real-time monitoring could pose serious legal complications. Says cyber law expert Pavan Duggal: “This proposition could be ultra vires of the Constitution which guarantees fundamental rights under Article 19, which is about freedom of speech and expression subject to reasonable restrictions.” And the reasonable restrictions for monitoring, blocking and interception of internet content are already built into the IT Act.&lt;br /&gt;&lt;br /&gt;Says Rajya Sabha MP Rajeev Chandrasekhar: “If Sibal was really serious about protecting people, he should have read the IT Act that has a section which allows a victim to legally pursue his/her claim of defamation. If Sibal has his way, DoT bureaucrats will decide what content is ‘appropriate’ or ‘inappropriate’.”&lt;/p&gt;
&lt;div class="pullquote"&gt;“If Sibal was really serious, he should have read the IT Act...it has a section on how victims can pursue defamation claims.”&lt;/div&gt;
&lt;p&gt;Moreover, the IT Intermediary Guideline Rules, 2011, though still provisional, mandate that once service providers receive instructions, they have to remove objectionable content within 36 hours. The Act also has other specific provisions like Section 69, which provides safeguards for interception, monitoring/decryption of information; Section 69A which gives procedures and safeguards for blocking access of information by the public; Section 69B for monitoring and collecting traffic data or information. There are also provisions for obscenity and defamation, with steep fines prescribed. Following these, the state has blocked 11 websites since ’09&lt;/p&gt;
&lt;p&gt;However, what Sibal and his men would have seen is the Act’s inability to act on the content freely flowing in social media sites. Says Duggal: “The IT Act, 2000, was amended in ’08, but doesn’t talk about social media which came up only around that time. There is a need to bring social media within the ambit of the Act. What Sibal is suggesting doesn’t exist anywhere in the world.” Monitoring social media websites would also be a huge challenge as crores of messages and tweets are generated from India everyday.&lt;br /&gt;&lt;br /&gt;And privacy? Experts say since India does not have dedicated legislation on privacy, the government could escape any attack on that front. Although some privacy elements were added to the IT Act in 2008, its scope is limited and the concept of data privacy is missing. In fact, the law doesn’t even recognise a person’s right to data privacy!.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/indecent-proposals'&gt;https://cis-india.org/news/indecent-proposals&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-02-14T06:13:22Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/caught-in-web">
    <title>Caught in the Web</title>
    <link>https://cis-india.org/caught-in-web</link>
    <description>
        &lt;b&gt;Do we need a cyber Big Brother watching us? A look at both sides of the coin.&lt;/b&gt;
        
&lt;p&gt;In the summer of 2009, a hue and cry was raised by netizens when the Government blocked a hugely popular adult-oriented cartoon site called Savitabhabhi.com. The site was blocked after complaints that Savita Bhabhi's lurid tales were highly offending to the sensibilities of those grounded in Indian traditions. Those who opposed the move said that this was done without granting the creators an opportunity to defend their right to freedom of expression.&lt;br /&gt;Recent ruffles&lt;br /&gt;&lt;br /&gt;A similar brouhaha erupted recently when Communication and IT Minister Kapil Sibal, in a hurriedly called press conference, announced that the Government will bring in a law to pre-filter content posted on social networking Web sites. The trigger for this was certain pictures, with religious connotations, uploaded on various social networking sites including Facebook and Google Plus. Sibal claims that despite Government appeals the Web site refused to remove the content.&amp;nbsp; If the new law is implemented, your status updates or videos will be screened by the internet company for objectionable content before it is published.&lt;br /&gt;&lt;br /&gt;The move has angered Internet users, promoters of free speech and social networking companies. “As it is the status of freedom of speech in India is in a bad shape. Sibal's new rules will only make it worse,” says Sunil Abraham, Executive Director, Centre for Internet and Society.&lt;br /&gt;&lt;br /&gt;Abraham's point is buttressed by a report from the United Nations Democracy Fund called ‘Freedom on the Net 2011' which gives Indian Internet usage a “partly free” status clubbed along with the likes of Egypt, Jordan, Rwanda and Venezuela.&lt;br /&gt;&lt;br /&gt;“Pressure on private intermediaries to remove certain information in compliance with administrative censorship orders has increased since late 2009, with the implementation of the amended IT Act.&amp;nbsp; While some observers acknowledge that incendiary online content could pose a real risk of violence, particularly given India's history of periodic communal strife, press freedom and civil liberties advocates have raised concerns over the far-reaching scope of the IT Act, its potential chilling effect, and the possibility that the authorities could abuse it to suppress political speech,” the report says.&lt;br /&gt;User content removal&lt;br /&gt;&lt;br /&gt;When Google began reporting government requests for data and content removal in early 2010, India ranked third in the world for removal requests and fourth for data requests. Between July 1, 2009, and December 31, 2009, India had submitted 142 removal requests.&amp;nbsp;&amp;nbsp; By June 2011, the Internet search giant received requests from the Indian government to remove 358 items. In a breakdown of reasons for such requests, 255 items were classified under the “government criticism” category. In May 2008, two men were arrested and charged for posting derogatory comments about Congress party chief Sonia Gandhi on Orkut. There are many other instances of Government intervention over the past 3 years.&lt;br /&gt;&lt;br /&gt;Those who support monitoring argue that content on social media network should be scanned because the users are not responsible enough. California-based media commentator Andrew Keen blames the Internet users in a book called The Cult of the Amateur where he writes that technology has fostered a “dictatorship of idiots”. “.....the masses are liable to be further vulgarised by the overwhelming surfeit of their own voluntary contributions, which are inherently without value (otherwise they wouldn't have been offered freely). Without cultural elites empowered to control public discourse and deify their chosen superstars, the monkeys are running the show,” Keen declares.&lt;br /&gt;&lt;br /&gt;Abraham says this argument is flawed because there is no empirical evidence to determine that people use the Internet for a single purpose. “There is no cause and effect here. People may use the Internet for anything ranging from pornography to science. One cannot generalise user behaviour. If Internet was a tool for the Egypt uprising, the same may not work in some other country,” says Abraham.&lt;br /&gt;Monitoring issues&lt;br /&gt;&lt;br /&gt;Then there are others who want the social network Web sites to take some responsibility. Rajesh Chharia, President of the Internet Service Providers Association thinks that multi-national Internet firms cannot get away by saying that they conform to standards of their country alone.&lt;br /&gt;&lt;br /&gt;But experts feel that it is practically impossible for any social networking Web site to monitor everything that's posted on their site due to sheer volume. For instance, YouTube has 48 hours of videos uploaded every minute and Facebook has 38 million users in India posting thousands of pictures and messages every day. “The Internet is like a sea, you just cannot control everything that's thrown into it unless you man the entire coastline. Even if you block someone from posting content on one site, they will find another way to get in,” said one of major Internet firms.&lt;br /&gt;&lt;br /&gt;Meanwhile the Savita Bhabhi site is back with all new content at a new address. So much for the Government's desire to monitor the Internet.&lt;/p&gt;
&lt;p&gt;This article by Thomas K Thomas was published in the Hindu Business Line. Sunil Abraham was quoted in this article. Read the original &lt;a class="external-link" href="http://www.thehindubusinessline.com/features/eworld/article2704496.ece?ref=wl_features"&gt;here&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/caught-in-web'&gt;https://cis-india.org/caught-in-web&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-12-12T15:32:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/right-to-privacy-bill-conference">
    <title>Privacy Matters — Analyzing the "Right to Privacy Bill"</title>
    <link>https://cis-india.org/internet-governance/right-to-privacy-bill-conference</link>
    <description>
        &lt;b&gt;Privacy India in partnership with International Development Research Centre, Canada, Indian Institute of Technology, Bombay, the Godrej Culture Lab, Tata Institute of Social Sciences, Mumbai and the Centre for Internet and Society, Bangalore is organising "Privacy Matters", a public conference at IIT, Bombay on 21 January 2012. &lt;/b&gt;
        
&lt;p&gt;The conference will focus on the questions and dilemmas posed by privacy in India today, with a concentration on the "Right to Privacy Bill". The right to privacy in India has been a neglected area of study and engagement. Although sectoral legislation deals with privacy issues, India does not as yet have a horizontal legislation that deals comprehensively with privacy across all contexts. The absence of a minimum guarantee of privacy is felt most heavily by marginalized communities, including HIV patients, children, women, sexuality minorities, prisoners, etc. — people who most need to know that sensitive information is protected.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.privacyindia.org"&gt;Privacy India&lt;/a&gt; was established in 2010 with the objective of raising awareness, sparking civil action and promoting democratic dialogue around privacy challenges and violations in India. One of our goals is to build consensus towards the promulgation of comprehensive privacy legislation in India through consultations with the public, legislators and the legal and academic community.&lt;/p&gt;
&lt;p&gt;The event will focus on discussing the challenges and concerns to privacy in India. We invite you to attend the meeting and contribute your views. Please confirm your participation by getting in touch with Natasha (&lt;a class="external-link" href="mailto:natasha@cis-india.org"&gt;natasha@cis-india.org&lt;/a&gt;). We sincerely hope that you will be able to attend and look forward to your participation.&lt;/p&gt;
&lt;h2&gt;Agenda&lt;br /&gt;&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09:30- 10:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00- 10:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Welcome- Privacy in India&lt;/strong&gt;&lt;br /&gt;Prashant Iyengar is a practicing lawyer and lead researcher for Privacy India. He will present who Privacy India is, and the objectives of Privacy India's research. His presentation will focus on&lt;br /&gt;discussing privacy in India.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30- 11:15&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Key Note Address- Draft Privacy Bill Critique&lt;/strong&gt;&lt;br /&gt;Na. Vijayashankar is an e-business consultant. He established the premier Cyber Law information portal in India. He is the founder secretary of Cyber Society of India, Founder Trustee of International Institue of Information Technology Law, and Founder Chairman of Digital Society Foundation. He will present a critique of the Draft Privacy Bill.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:15- 11:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30- 12:15&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Session I&lt;/h3&gt;
&lt;strong&gt;Privacy and the Legal System&lt;/strong&gt;&lt;br /&gt;Sudhir Krishnaswamy is an Assistant Professor at the National law School of India University and is currently writing a Doctoral Thesis at the Faculty of Law, Oxford University on ‘The Basic Structure Doctrine in Indian Constitutional Adjudication’. His presentation will look at the trajectory of privacy through the years from a legal perspective.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:15- 13:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy and Constitutional Law&lt;/strong&gt;&lt;br /&gt;N. Nappinai is an advocate who specializes in IP and technology laws. She is a founder member of Technology Law Forum (TLF). She has spearheaded and driven several initiatives of TLF with various organization including NASSCOM, FICCI, IMC etc., and has also conducted several workshops and training sessions for the Mumbai Police, Public Prosecutors &amp;amp; Industry verticals in Cyber Laws. Her presentation will define the scope of Article 21 under the Indian Constitution, which protects the right to privacy.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00- 13:15&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Discussion&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:15- 14:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:00- 14:45&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Session II&lt;/h3&gt;
&lt;strong&gt;Privacy and Freedom of Expression&lt;/strong&gt;&lt;br /&gt;Apar Gupta is an advocate who specializes in intellectual property, electronic commerce law and technology media and telecoms. He holds a master from Columbia Law School and has authored a Commentary on the Information Technology Act, 2000. His presentation will focus on the limits of a privacy right when it competes and conflicts with the freedom of speech and expression. He will examine certain provisions of the Draft Privacy Bill questioning how privacy arguments may be used to stifle debate or disclosure made in the public interest.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:45- 15:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Sexuality Minorities and Privacy&lt;/strong&gt;&lt;br /&gt;Danish Sheikh graduated from Nalsar University of Law with a B.A., LL.B. (Hons.). Currently, he is a researcher at the Alternative Law Forum in Bangalore. He will examine the status of sexual minorities in the light of privacy framework in India. Culling out some real life examples based on various studies, media reports and judgments from the Supreme Court and the High Courts of Delhi and Allahabad, he&lt;br /&gt;will bring to light the privacy violations being committed by both individuals as we all state authorities.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30-&lt;br /&gt;15:45&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Discussion&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:45-&lt;br /&gt;16:30&lt;/td&gt;
&lt;td&gt;
&lt;h3&gt;Session III&lt;/h3&gt;
&lt;strong&gt;Privacy and National Security&lt;/strong&gt;&lt;br /&gt;Menaka Guruswamy practices law at the Supreme Court of India. She was a Rhodes Scholar at Oxford University, a Gammon Fellow at Harvard Law School, and a gold medalist from the National Law School of India and has law degrees from all three schools. Menaka has advised the United National Development Program and the United Nations Development Fund for Women. She will discuss the relationship between national security and privacy, from the perspective of surveillance by the state etc.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:30-&lt;br /&gt;17:15&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy and UID&lt;/strong&gt;&lt;br /&gt;R. Ramkumar is a Professor at the Tata Institute of Social Sciences. He is advocate as well as a patent and trademark attorney. His presentation will focus on what standards of privacy are afforded within the UID system.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:15- 17:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17:30-&lt;br /&gt;18:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Discussion and Questions&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;h2 align="center"&gt;Organizers&lt;/h2&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&amp;nbsp;&lt;img src="https://cis-india.org/home-images/PrivacyIndia.jpg/image_preview" title="Privacy India" height="51" width="124" alt="Privacy India" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;&amp;nbsp;&lt;strong&gt;Privacy India&lt;/strong&gt;&lt;br /&gt;Privacy India was established in 2010 with the 
objective of raising awareness, sparking civil action and promoting 
democratic dialogue around privacy challenges and violations in India. 
One of our goals is to build consensus towards the promulgation of 
comprehensive privacy legislation in India through consultations with 
the public, legislators and the legal and academic community.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/PrivacyInternational.jpg/image_preview" title="Privacy International" height="97" width="113" alt="Privacy International" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Privacy International&lt;/strong&gt; (&lt;a class="external-link" href="https://www.privacyinternational.org/"&gt;https://www.privacyinternational.org/&lt;/a&gt;)&lt;br /&gt;Privacy International’s mission is to defend the right to privacy across the world, and to fight surveillance and other intrusions into private life by governments and corporations. PI has been providing citizens and policy-makers with the tools and perspectives to enable them to hold to account those who threaten privacy since 1990. PI has active associates and networks in 46 countries.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/IDRC.jpg/image_preview" title="IDRC" height="47" width="145" alt="IDRC" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;The International Development Research Centre&lt;/strong&gt; (&lt;a class="external-link" href="http://www.idrc.ca/EN/Pages/default.aspx"&gt;www.idrc.ca/&lt;/a&gt;)&lt;br /&gt;Canada’s International Development Research Centre (IDRC) is one of the world’s leading institutions in the generation and application of new knowledge to meet the challenges of international development. They help developing countries use science and technology to find practical, long-term solutions to the social, economic, and environmental problems they face. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/CISlogo1.jpg/image_preview" title="CIS_Logo" height="70" width="184" alt="CIS_Logo" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;The Centre for Internet &amp;amp; Society&lt;/strong&gt; (&lt;a href="https://cis-india.org/" class="external-link"&gt;http://cis-india.org/&lt;/a&gt;)&lt;br /&gt;The Centre for Interenet &amp;amp; Society brings together a team of practitioners, theoreticians, researchers and artists to work on the emerging field of Internet and Society to critically engage with concerns of digital pluralism, public accountability and pedagogic practices, with particular emphasis on South-South dialogues and exchange.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;
&lt;h2&gt;&lt;br /&gt;&lt;/h2&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;h2 align="center"&gt;&amp;nbsp;Partners&lt;/h2&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/Godrej.jpg/image_preview" alt="Godrej India Cultural Lab" class="image-inline image-inline" title="Godrej India Cultural Lab" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;The Godrej India Culture Lab&lt;/strong&gt; (&lt;a class="external-link" href="http://www.godrej.com"&gt;www.godrej.com&lt;/a&gt;)&lt;br /&gt;The Godrej India Culture Lab is an interdisciplinary space which aims to build knowledge networks and interpret the changes rapidly taking place in contemporary India by bringing together the best minds from global academia, business and the creative worlds working on different aspects of Indian society.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/IITBombay.jpg/image_preview" title="IIT Bombay" height="142" width="145" alt="IIT Bombay" class="image-inline image-inline" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;IIT, Bombay&lt;/strong&gt; (&lt;a class="external-link" href="http://www.iitb.ac.in/"&gt;www.iitb.ac.in/&lt;/a&gt;)&lt;br /&gt;Established in 1958, IIT is recognised worldwide as a leader in the field of engineering education and research. It is reputed for the quality of its faculty and the outstanding calibre of students graduating from its undergraduate and postgraduate programmes. Over the years, there has been dynamic progress at IIT Bombay in all academic and research activities, and a parallel improvement in facilities and infrastructure, to keep it on par with the best institutions in the world.&lt;br /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td align="center"&gt;&lt;img src="https://cis-india.org/home-images/Tiss.jpg/image_preview" title="Tata Institute of Social Sciences" height="145" width="105" alt="Tata Institute of Social Sciences" class="image-inline image-inline" /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tata Institute of Social Sciences&lt;/strong&gt; (&lt;a class="external-link" href="http://www.tiss.edu/"&gt;http://www.tiss.edu/&lt;/a&gt;)&lt;br /&gt;Tata Institute of Social Sciences (TISS) offers higher professional education in the field of human service and applied social science research. The institute has gone beyond the initial concern of social work education, since its inception in 1936, to consistently contribute to the promotion of sustainable, participatory development and social justice. Through its work, the Institute facilitates strong linkages between education, research, field action and policy advocacy.&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Speakers&lt;/h3&gt;
&lt;p&gt;1.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;Apar Gupta&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;2.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;strong&gt;Danish
Sheikh,&lt;/strong&gt; Alternative Law Forum&lt;/p&gt;
&lt;p&gt;3.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;strong&gt;NA
Vijayashankar,&lt;/strong&gt; E-Business Consultant, Founder Secretary of
Cyber Society of India, Founder Trustee of International Institute of
Information Technology Law, and Founder Chairman of Digital Society Foundation&lt;/p&gt;
&lt;p&gt;4.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;strong&gt;N
S Nappinai,&lt;/strong&gt; Advocate and Founder Member of Technology Law
Forum&lt;/p&gt;
&lt;p&gt;5.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;strong&gt;Prashanth
Iyengar,&lt;/strong&gt; Assistant Professor &amp;amp; Assistant Director,
Centre for Intellectual Property Rights Studies, Lead Researcher with Privacy
India, Bangalore; Legal Aid Manager with Rural Development Institute,
Hyderabad; Researcher &amp;amp; Lawyer with Alternative Law Forum&lt;/p&gt;
&lt;p&gt;6.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;strong&gt;R.
Ramkumar,&lt;/strong&gt; Assistant Professor, School of Social Sciences,
Tata Institute of Social Sciences&lt;/p&gt;
&lt;p&gt;7.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;
&lt;strong&gt;Shishir
Jha, &lt;/strong&gt;Project Lead at Creative Commons India and
Associate Professor at Indian Institute of Technology, Bombay&lt;/p&gt;
&lt;p&gt;8.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;Menaka Guruswamy,&lt;/strong&gt;
practices
law at the Supreme Court of India.&lt;/p&gt;
&lt;p&gt;9.&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; &lt;strong&gt;Sudhir Krishnaswamy, &lt;/strong&gt;is
an Assistant Professor at the National law School of India University.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/analyzing-right-2-privacy-bill.pdf" class="internal-link" title="Analyzing the Right to Privacy Bill"&gt;Download the invitation&lt;/a&gt; [PDF, 988 kb]&lt;/li&gt;&lt;/ul&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-matters-mumbai.pdf" class="internal-link" title="Privacy Matters — Analyzing the &amp;quot;Right to Privacy Bill&amp;quot; Poster"&gt;Download the event poster&lt;/a&gt; [PDF, 2155 kb]&lt;/li&gt;&lt;li&gt;IIT Bombay Map&lt;a class="external-link" href="http://www.iitb.ac.in/campus/howto/howtoget.html"&gt; http://www.iitb.ac.in/campus/howto/howtoget.html&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLr2ysA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr2ysA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLr23oA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr23oA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLr3CEA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr3CEA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLr3U4A.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr3U4A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLr71AA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr71AA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLr8BsA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr8BsA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLr8SMA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr8SMA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLr8h8A.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLr8h8A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/right-to-privacy-bill-conference'&gt;https://cis-india.org/internet-governance/right-to-privacy-bill-conference&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Natasha Vaz</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-04-28T04:10:12Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/interview-with-anne-cavoukian">
    <title>An Interview with Dr. Ann Cavoukian, Information and Privacy Commissioner, Ontario, Canada</title>
    <link>https://cis-india.org/internet-governance/interview-with-anne-cavoukian</link>
    <description>
        &lt;b&gt;Elonnai Hickok interviewed Dr. Ann Cavoukian, Information and Privacy Commissioner, Ontario, Canada. The full interview is reproduced below.&lt;/b&gt;
        
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;When Canada weighed a broad privacy legislation against sectoral legislation, was the decision close?&amp;nbsp; What were the most decisive factors?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Canada’s legislative privacy regime consists of both broad and sectoral privacy legislation.&lt;br /&gt;&lt;br /&gt;Broadly, the use of personal information in Canadian commercial activities is regulated by federal legislation under the &lt;em&gt;&lt;a class="external-link" href="http://www.priv.gc.ca/leg_c/leg_c_p_e.cfm"&gt;Personal Information Protection and Electronic Documents Act (PIPEDA)&lt;/a&gt;&lt;/em&gt;, or by provincial legislation that is “substantially similar” to PIPEDA, or by provincial legislation that is “substantially similar” to &lt;em&gt;PIPEDA&lt;/em&gt;.&lt;br /&gt;&lt;br /&gt;Sectorally, a prime example is the protection of personal health information under Ontario's &lt;em&gt;&lt;a class="external-link" href="http://www.e-laws.gov.on.ca/html/statutes/english/elaws_statutes_04p03_e.htm"&gt;Personal Health Information Protection Act, 2004 (PHIPA)&lt;/a&gt;&lt;/em&gt;.&lt;br /&gt;&lt;br /&gt;Regarding the decisive factors surrounding Parliament's passing of a broad private sector privacy statute, you may know that oversight of PIPEDA falls within the jurisdiction of the &lt;a class="external-link" href="http://www.priv.gc.ca/leg_c/leg_c_p_e.cfm"&gt;Office of the Privacy Commissioner of Canada (OPC)&lt;/a&gt;. Accordingly, you may wish to focus your contact with the OPC regarding your question.&amp;nbsp; In addition, &lt;a class="external-link" href="http://www.ic.gc.ca/ic_wp-pa.htm"&gt;Industry Canada&lt;/a&gt; may have some helpful resources regarding the federal government’s decision to enact &lt;em&gt;PIPEDA&lt;/em&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Do you see the different perceptions and cultural understandings of privacy as something to be addressed through legislation?&amp;nbsp; If not, do you think it should be addressed at all?&amp;nbsp; How? &lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;In an era marked by the widespread use of new information technologies, globalization, and the international flow of personal information, the establishment of global privacy standards is required to effectively protect personal privacy. Fortunately, an international community of data protection commissioners is hard at work contributing to the establishment of a set of global privacy principles. At the annual International Data Protection Commissioners Conference in 2005, Dr. Ann Cavoukian, Information and Privacy Commissioner of Ontario, chaired a Working Group of Data Protection Commissioners that led to the &lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/gps.pdf"&gt;Creation of a Global Privacy Standard&lt;/a&gt;. Such a principled but flexible approach can also be seen, for example, in the landmark &lt;a class="external-link" href="http://www.privacybydesign.ca/content/uploads/2010/11/pbd-resolution.pdf"&gt;&lt;em&gt;Privacy by Design&lt;/em&gt; (PbD) resolution&lt;/a&gt; adopted unanimously, in 2010, by the international Privacy Authorities and Regulators at the International Conference of Data Protection and Privacy Commissioners in Jerusalem.&lt;a name="fr1" href="#fn1"&gt;[1]&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The resolution recognizes &lt;em&gt;&lt;a class="external-link" href="http://privacybydesign.ca/about/principles/"&gt;PbD&lt;/a&gt;&lt;/em&gt; as an “essential component of fundamental privacy protection” – an International Standard, and urges its adoption in regulations and legislation around the world. Governments that employ this internationally recognized standard will be able to both protect privacy and address local and national priorities.&lt;a name="fr2" href="#fn2"&gt;[2]&lt;br /&gt;&lt;br /&gt;&lt;/a&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;How does the Canadian model implement self-regulation of privacy standards? How is that balanced against legal enforcement of privacy legislation?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;In Canada, as elsewhere, private sector privacy regulation recognizes the dual purposes of protecting the individual's right to privacy, on the one hand, and recognizing the commercial need for access to personal information, on the other.&lt;a name="fr3" href="#fn3"&gt;[3]&lt;/a&gt;&lt;em&gt;&lt;br /&gt;&lt;br /&gt;PIPEDA&lt;/em&gt; furthers these two purposes by tying a set of flexible, technology-neutral privacy principles to a statutory framework of rules governing the collection, use, and disclosure of personal information.&lt;br /&gt;&lt;br /&gt;In particular, Part I of PIPEDA provides the overarching statutory framework, while Schedule I, which was borrowed from the Canadian Standards Association’s Model Code for the Protection of Personal Information, provides flexible, technology-neutral privacy principles.&amp;nbsp; To accomplish the dual purposes that animate PIPEDA and its Schedule, Canada’s Federal Court of Appeal has directed that the interpretation and application of this regulatory framework should be guided by "flexibility, common sense and pragmatism."&lt;a name="fr4" href="#fn4"&gt;[4]&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;Such an approach allows organizations to address their own goals and priorities within a privacy protective framework.&amp;nbsp; Moreover, by incorporating the flexible principles of PbD, organizations can "go beyond mere legal compliance with notice, choice, access, security and enforcement requirements."&amp;nbsp; Instead, they can be empowered to design their own responsive approaches to risk management and privacy-related innovation, within the context of the relevant regulatory framework.&amp;nbsp; This approach allows organizations to develop doubly-enabling, positive-sum solutions that are win/win in nature and appropriate given the size and nature of the organization, the personal information it manages, and the range of risks, opportunities, and solutions available.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;Does Canada favor private forms of redress or agency/state enforcement to prevent and remedy privacy violations?&amp;nbsp; In what circumstances is one more effective than the other?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Canadian privacy legislation includes both state enforcement and private forms of redress; neither is necessarily favoured.&lt;br /&gt;&lt;br /&gt;For example, under &lt;em&gt;PHIPA&lt;/em&gt;, the Attorney General may impose fines of up to $50,000 for individuals and $250,000 for corporations who are found to be in breach of &lt;em&gt;PHIPA&lt;/em&gt;. Further, our office has broad powers of investigation and can directly order a custodian to comply with its obligations.&amp;nbsp; An individual affected by a Commissioner’s final &lt;em&gt;PHIPA &lt;/em&gt;order may commence a proceeding in the Ontario Superior Court for damages for actual harm suffered.&lt;br /&gt;&lt;br /&gt;Another example is under &lt;em&gt;PIPEDA&lt;/em&gt; where contravention can result in fines of up to $100,000 depending upon the type and severity of the matter. Further, the federal privacy Commissioner has powers to investigate and report findings with respect to privacy complaints.&amp;nbsp; Following the release of the Commissioner’s report, a complainant may apply to the Federal Court to seek remedies that include damages and an order requiring an organization to correct its practices.&lt;br /&gt;&lt;br /&gt;Generally, fines and other penalties imposed on individuals and corporations by the government are effective in deterring certain actions and protecting the public from a variety of harmful practices.&amp;nbsp; On the other hand, a private right of action may be effective when a particular individual is harmed by an individual or corporation and is seeking damages to compensate or redress that particular harm.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;What types of privacy violations are the most common? How have these been addressed?&lt;br /&gt;&lt;/strong&gt;&lt;br /&gt;The most common types of privacy violations are inadvertent disclosures or privacy breaches of personal information, including personal health information.&amp;nbsp; In particular, these violations usually stem from the improper retention, transfer and disclosure of personal information.&lt;br /&gt;&lt;br /&gt;Privacy breaches are addressed in a variety of ways, depending on the type and amount of information disclosed.&amp;nbsp; For example, under &lt;em&gt;PHIPA&lt;/em&gt;, if health information is stolen, lost, or accessed by unauthorized persons, the health information custodian must notify the affected individual at the first reasonable opportunity and should take immediate steps to contain the breach.&amp;nbsp; Further, the Commissioner may order the health information custodian to take corrective action such as requiring the custodian to implement a certain procedure when handling personal health information or conduct privacy training.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;What forms of privacy education has Canada pursued?&amp;nbsp; What audiences have been targeted? Which efforts have been the most successful and why?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;Canadian institutions and organizations have pursued a wide variety of privacy education initiatives including programs that award professional designations (e.g. &lt;a class="external-link" href="https://www.privacyassociation.org/certification/"&gt;IAPP&lt;/a&gt;, &lt;a class="external-link" href="http://capapa.org/"&gt;CAPAPA&lt;/a&gt;, &lt;a class="external-link" href="http://www.ipsi.utoronto.ca/"&gt;University of Toronto Identity, Privacy and Security Initiative&lt;/a&gt;, &lt;a class="external-link" href="http://www.extension.ualberta.ca/study/government-studies/iapp/"&gt;University of Alberta Program&lt;/a&gt;).&lt;br /&gt;&lt;br /&gt;Our Office has led a wide variety of educational initiatives to spread the word about privacy protection and freedom of information under our Ontario legislation. We have focused on a variety of audiences from the general public to individuals who deal with privacy and access to information issues as part of their daily professional role.&lt;br /&gt;&lt;br /&gt;Initiatives include frequent contact between our Information Officers and the public, and dozens of marketing materials geared to providing guidance (e.g. “&lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/circle-care.pdf"&gt;Circle of Care: Sharing of Personal Health Information for Health-Care purposes&lt;/a&gt;”, “&lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/hprivbreach-e.pdf"&gt;What to do When Faced With a Privacy Breach: Guidelines for the Health Sector&lt;/a&gt;”). Our Office has developed Educational Resource Guides (&lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Educational-Material/Educational-Material-Summary/?id=183"&gt;Grade 5&lt;/a&gt;, &lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Educational-Material/Educational-Material-Summary/?id=184"&gt;Grade 10&lt;/a&gt;, &lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Educational-Material/Educational-Material-Summary/?id=1110"&gt;Grades 11/12&lt;/a&gt;), which have been added to the formal Ontario curriculum to help teachers educate about privacy protection. Commissioner Cavoukian participates in extensive presentations and speeches at numerous conferences and events. As well, representatives from our Office reach out into the community to educate about our offerings and role (hospitals, conference, community events etc.). In addition, to educate Ontarians about privacy protection, the IPC also allots significant resources to many marketing initiatives including a &lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Newsletters/Newsletters-Summary/?id=1100"&gt;quarterly e-newsletter&lt;/a&gt;, video production, and social media outreach. Most recently, we circulated an &lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/IPC-Corporate/IPC-Corporate-Summary/?id=482"&gt;online tool kit &lt;/a&gt;(available via USB as well), to assist new Freedom of Information and Protection of Privacy Co-ordinators in the public sector. Most of our resources are available in English and French.&lt;br /&gt;&lt;br /&gt;Without a doubt, the IPC’s most successful educational effort thus far is in the area of PbD, now an international standard. This Ontario-made solution was created by Commissioner Cavoukian who has led the IPC in partnering with global stalwarts such as IBM, Intel, and Nokia to advance Privacy by Design, and to foster innovation in many fields, including &lt;a class="external-link" href="http://www.privacybydesign.ca/content/uploads/2011/02/pbd-olg-facial-recog.pdf"&gt;biometrics&lt;/a&gt;, the &lt;a class="external-link" href="http://www.privacybydesign.ca/content/uploads/2011/02/pbd-ont-smartgrid-casestudy.pdf"&gt;Smart Grid&lt;/a&gt; and even &lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/AVAwhite6.pdf"&gt;Targeted Advertising&lt;/a&gt;. &lt;em&gt;Privacy by Design&lt;/em&gt; knows no boundaries and makes sense for everyone — especially businesses. Not only is it cheaper to build in privacy before a breach occurs, it is also a compelling way to win the trust of clients and build a successful brand.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;strong&gt;What [have] proven to be [the main] challenges or obstacles to protecting privacy in Canada?&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;The most common obstacle to protecting privacy is that key stakeholders hold on to misconceptions about privacy.&amp;nbsp; &lt;br /&gt;Misconception #1 – Privacy is dead or obsolete.&amp;nbsp; &lt;br /&gt;Misconception #2 – Privacy stops us from performing our job.&lt;br /&gt;Misconception #3 – With the massive growth of online social media, you cannot have both widespread connectivity and privacy.&lt;br /&gt;&lt;br /&gt;Not only do these misconceptions contradict each other, they are both dead wrong!&lt;br /&gt;&lt;br /&gt;Privacy is alive and well and more relevant than ever. Consider, for example, that the same technologies that serve to threaten privacy may also be enlisted to support it.&amp;nbsp; Properly understood, privacy is becoming increasingly critical to achieving success in the new economy.&amp;nbsp; In this environment, PbD offers a principled, flexible, and technology-neutral vehicle for engaging with privacy issues, and for resolving them in ways that support multiple outcomes in a full functionality, positive-sum, win-win scenario.&lt;br /&gt;&lt;br /&gt;It does so by ensuring that privacy is built in right up front, directly into the design specifications and architecture of new systems and processes.&amp;nbsp; &lt;em&gt;&lt;br /&gt;&lt;br /&gt;PbD&lt;/em&gt; seeks to accommodate all legitimate interests and objectives in a positive-sum “win-win” manner, not through a dated, zero-sum approach, where unnecessary trade-offs are made. PbD avoids the pretense of false dichotomies or unnecessary trade-offs, such as privacy vs. security, demonstrating that it is possible to have both. For more on PbD, go to &lt;a class="external-link" href="http://www.privacybydesign.ca/"&gt;www.privacybydesign.ca&lt;br /&gt;&lt;br /&gt;&lt;/a&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;Dr. Ann Cavoukian, Ph.D., Information and Privacy Commissioner, Ontario, Canada&lt;/h3&gt;
&lt;p&gt;Dr. Ann Cavoukian is recognized as one of the leading privacy experts in the world. Noted for her seminal work on Privacy Enhancing Technologies (PETs) in 1995, her concept of Privacy by Design seeks to proactively embed privacy into the design specifications of information technology and accountable business practices, thereby achieving the strongest protection possible. In October, 2010, regulators from around the world gathered at the annual assembly of International Data Protection and Privacy Commissioners in Jerusalem, Israel, and unanimously passed a landmark Resolution recognizing &lt;em&gt;Privacy by Design&lt;/em&gt; as an essential component of fundamental privacy protection. This was followed by the U.S. Federal Trade Commission’s inclusion of &lt;em&gt;Privacy by Design&lt;/em&gt; as one of its three recommended practices for protecting online privacy – a major validation of its significance.&lt;/p&gt;
&lt;p&gt;An avowed believer in the role that technology can play in the protection of privacy, Dr. Cavoukian’s leadership has seen her office develop a number of tools and procedures to ensure that privacy is strongly protected, not only in Canada, but around the world. She has been involved in numerous international committees focused on privacy, security, technology and business, and endeavours to focus on strengthening consumer confidence and trust in emerging technology applications.&lt;/p&gt;
&lt;p&gt;Dr. Cavoukian serves as the Chair of the Identity, Privacy and Security Institute at the University of Toronto, Canada. She is also a member of several Boards including, the European Biometrics Forum, Future of Privacy Forum, RIM Council, and has been conferred a Distinguished Fellow of the Ponemon Institute. Dr. Cavoukian was honoured with the prestigious &lt;em&gt;Kristian Beckman Award&lt;/em&gt; in 2011 for her pioneering work on &lt;em&gt;Privacy by Design&lt;/em&gt; and privacy protection in modern international environments. In the same year, Dr. Cavoukian was also named by&lt;em&gt; Intelligent Utility &lt;/em&gt;Magazine as one of the Top 11 Movers and Shakers for the Global Smart Grid industry, received the SC Canada Privacy Professional of the Year Award and was honoured by the University of Alberta Information Access and Protection of Privacy Program for her positive contribution to the field of privacy. Most recently in November 2011, Dr. Cavoukian was ranked by Women of Influence Inc. as one of the top 25 Women of Influence recognizing her contribution to the Canadian and global economy.&amp;nbsp; This award follows her recognition in 2007 by the Women’s Executive Network as one of the Top 100 Most Powerful Women in Canada.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Notes&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a name="fn1" href="#fr1"&gt;1&lt;/a&gt;].Information and Privacy Commissioner/Ontario, Landmark Resolution passed to preserve the Future of Privacy, &lt;a class="external-link" href="http://www.ipc.on.ca/images/Resources/2010-10-29-Resolution-e_1.pdf"&gt;http://www.ipc.on.ca/images/Resources/2010-10-29-Resolution-e_1.pdf&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn2" href="#fr2"&gt;2&lt;/a&gt;].For a discussion of how governments might employ an PbD approach to privacy regulation, see Commissioner Cavoukian’s White Paper, Privacy by Design in Law, Policy, and Practice available at:&lt;br /&gt;&lt;a class="external-link" href="http://www.ipc.on.ca/english/Resources/Discussion-Papers/Discussion-Papers-Summary/?id=1095"&gt;http://www.ipc.on.ca/english/Resources/Discussion-Papers/Discussion-Papers-Summary/?id=1095&lt;/a&gt;&lt;br /&gt;[&lt;a name="fn3" href="#fr3"&gt;3&lt;/a&gt;].See the Personal Information Protection and Electronic Documents Act, S.C. 2000, c. 5 (Can.), &lt;a class="external-link" href="http://www.canlii.org/en/ca/laws/stat/sc-2000-c-5/latest/sc-2000-c-5.html"&gt;http://www.canlii.org/en/ca/laws/stat/sc-2000-c-5/latest/sc-2000-c-5.html&lt;/a&gt;.&lt;br /&gt;[&lt;a name="fn4" href="#fr4"&gt;4&lt;/a&gt;].&lt;em&gt;Englander v. Telus Communications Inc.&lt;/em&gt;, 2004 FCA 387, Locus Para. 38-46.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/interview-with-anne-cavoukian'&gt;https://cis-india.org/internet-governance/interview-with-anne-cavoukian&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-12-03T01:26:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/privacy-symposium">
    <title>All India Privacy Symposium</title>
    <link>https://cis-india.org/internet-governance/privacy-symposium</link>
    <description>
        &lt;b&gt;Privacy India in partnership with the International Development Research Centre, Canada, Society in Action Group, Gurgaon, Privacy International, UK and Commonwealth Human Rights Initiative is organizing the All India Privacy Symposium at the India International Centre, New Delhi on Saturday, February 4, 2012.&lt;/b&gt;
        
&lt;p&gt;Since June 2010, Privacy India has been engaging in discussions with policy makers, the public and sectoral experts about privacy in India. The discussions have ranged from topics of identity and privacy, to minority rights and privacy, and consumer privacy. The findings of our research show that privacy was a neglected area of study for India in the past, however, this is changing. Advancements in technology, the introduction of e-governance initiatives like the National Fibre Optic Network, the introduction of new legislations, and debates surrounding national security, have brought privacy debates to the forefront in India. Although currently sectoral legislation deals with privacy issues, e.g., the Telegraph Act or RBI guidelines for banking, India has just begun to consider a horizontal legislation that deals comprehensively with privacy across all contexts. This conference is an opportunity to look forward to what could be the future scope of privacy in India.&lt;/p&gt;
&lt;p&gt;Privacy India was set up in collaboration with the Centre for Internet and Society, Bangalore and Society in Action Group, Gurgaon, under the auspices of an international organization ‘Privacy International’. Privacy International is a non-profit group that provides assistance to civil society groups, governments, international and regional bodies, the media and the public in a number of countries. For more info, visit its &lt;a class="external-link" href="https://www.privacyinternational.org/"&gt;website. &lt;br /&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;This is a public meeting. For participation in the event, get in touch with Elonnai (&lt;a class="external-link" href="mailto:elonnai@cis-india.org"&gt;elonnai@cis-india.org&lt;/a&gt;)&lt;/p&gt;
&lt;h2&gt;Symposium Advisors&lt;/h2&gt;
&lt;p&gt;Sunil Abraham, Centre for Internet &amp;amp;Society (&lt;a href="https://cis-india.org/" class="external-link"&gt;www.cis-india.org&lt;/a&gt;)&lt;br /&gt;Rajan Gandhi, Society in Action Group&lt;br /&gt;Phet Sayo, IDRC (&lt;a class="external-link" href="http://www.idrc.org/"&gt;www.idrc.org&lt;/a&gt;)&lt;br /&gt;Gus Hosein, Privacy International (&lt;a class="external-link" href="http://www.privacyinternational.org/"&gt;www.privacyinternational.org&lt;/a&gt;)&lt;br /&gt;
Sudhir Krishnaswamy, Centre for Law and Policy Research, Bangalore (&lt;a class="external-link" href="http://www.clpr.org.in/"&gt;www.clpr.org.in&lt;/a&gt;)&lt;br /&gt;
Vickram Crishna, Privacy International (&lt;a class="external-link" href="http://www.privacyinternational.org/"&gt;www.privacyinternational.org&lt;/a&gt;)&lt;/p&gt;
&lt;h2&gt;Agenda &lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/h2&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09:30- &lt;br /&gt;10:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Registration&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00- &lt;br /&gt;10:15&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Welcome &amp;amp; Introduction to Privacy India&lt;/strong&gt;&lt;br /&gt;Elonnai Hickok (Policy Advocate, Privacy India)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:15- &lt;br /&gt;10:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30-&lt;br /&gt;11:30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel I: Privacy and Transparency&lt;/strong&gt;&lt;br /&gt;Moderator: Sunil Abraham (Executive Director, Centre for Internet &amp;amp; Society)&lt;br /&gt;Panelists: Prashant Bhushan (Senior Advocate, New Delhi), Simon Davies (Director General, Privacy International, UK), Ponnurangam K (Assistant Prof, IIIT New Delhi), Chitra Ahanthem (Journalist, Imphal), Aruna Roy (Social &amp;amp; Political Activist), Deepak Maheshwari (Director Corporate Affairs, Microsoft)&lt;br /&gt;Poster:Srishti Goyal (Law Student)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:30- &lt;br /&gt;12:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel II: Privacy and E-Governance Initiatives&lt;/strong&gt;&lt;br /&gt;Moderator: Sudhir Krishnaswamy (Professor, Azim Premji University)&lt;br /&gt;Panelists: Anant Maringanti (Independent Social Researcher), Usha Ramanathan (Advocate&amp;amp;Social Activist), Ram Sewak Sharma (Director General, UIDAI)*, Gus Hosein (Executive Director, Privacy International, UK), R K Singh (Union Home Secretary, New Delhi)*, Apar Gupta (Advocate, Supreme Court of India)&lt;br /&gt;Poster: Adrija Das (Law Student)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:30- &lt;br /&gt;13:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Lunch&lt;/strong&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:30- &lt;br /&gt;14:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel III: Privacy and National Security&lt;/strong&gt;&lt;br /&gt;Moderator: Justice A P Shah (Former Chief Justice, Delhi High Court)*&lt;br /&gt;Panelists: Menaka Guruswamy (Advocate, Supreme Court, New Delhi), Amol Sharma (Journalist, Wall Street Journal)*, Saikat Datta (Journalist, DNA), Eric King (Human Rights and Technology Advisor, Privacy International, UK), Prasanth Sugathan (Legal Counsel, Software Freedom Law Center) and Oxblood Ruffin&amp;nbsp; (Cult of the Dead Cow Security and Publishing Collective)&lt;br /&gt;Poster: Suchithra Menon (Law Student)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30- &lt;br /&gt;15:30&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel IV: Privacy and Banking&lt;/strong&gt;&lt;br /&gt;Moderator: Prashant Iyengar (Associate Professor, Jindal Law University)&lt;br /&gt;Panelists: M R Umarji (Chief Legal Advisor, IBA), N A Vijayashankar (Cyber Law Expert), Sucheta Dalal (Managing Editor, MoneyLife Magazine)*, Malavika Jayaram (Advocate, Bangalore)&lt;br /&gt;Poster: Malavika Chandu (Law Student)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30- &lt;br /&gt;15:45&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Tea Break&lt;/strong&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:45- &lt;br /&gt;16:45&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;Panel V: Privacy and Health&lt;/strong&gt;&lt;br /&gt;Moderator: Ashok Row Kavi (Journalist &amp;amp; LGBT Activist)&lt;br /&gt;Panelists: K K Abraham (President, Indian Network for People with HIV), Shri Sayan Chatterjee (Secretary, National Aids Control Organization)*, Dr V M Katoch (Secretary, Department of Health Research)*, Dr B S Bedi (Advisor, CDAC &amp;amp; Media Lab Asia)&lt;br /&gt;Poster: Danish Sheikh (Alternative Law Forum)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16:45- &lt;br /&gt;17:00&lt;/td&gt;
&lt;td&gt;&lt;strong&gt;The Way Forward&lt;/strong&gt;&lt;br /&gt;Elonnai Hickok (Policy Advocate, Privacy India)&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;&lt;strong&gt;Bios of Speakers&lt;/strong&gt;&lt;/h2&gt;
&lt;h3&gt;Usha Ramanathan&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Usha Ramanathan is an internationally recognized expert on the jurisprudence of law, poverty and rights. She writes and speaks on leading issues like the Bhopal gas leak tragedy, mass displacement, civil liberties, criminal law, environment and the judicial process. She is involved in the UID project and has written and debated extensively on it. She is a member of Amnesty International's Advisory Panel on Economic, Social and Cultural Rights and has been called upon by the World Health Organisation as a expert on mental health on various occasions. Her writings can be found at &lt;a class="external-link" href="http://www.ielrc.org/"&gt;http://www.ielrc.org/&lt;/a&gt;.&lt;/p&gt;
&lt;h3&gt;NA.Vijayashankar&lt;/h3&gt;
&lt;p&gt;NA.Vijayashankar, more popularly known as Naavi, is a Techno Legal Information Security Consultant based in Bangalore, India. Naavi is a pioneer in the field of Cyber Law in India. He is the author of the first book (1999) and first E-Book (2003) on Cyber Laws in India. He has also authored a book titled “Cyber Laws, Corporate Mantra for the Digital Era”, “Cyber Laws Demystified” and “Cyber Laws for Engineers” as well as a book on Cyber Crimes in Kannada.&lt;br /&gt;&lt;br /&gt;Naavi is the founder of &lt;a href="https://cis-india.org/internet-governance/www.cyberlawcollege.com" class="external-link"&gt;www.cyberlawcollege.com&lt;/a&gt; which is the pioneering virtual educational institution in India dedicated to Cyber Law Education. Cyber Law College presently conducts offline and virtual courses on Cyber Laws. It has conducted several courses in association with law colleges in Karnataka such as KLE Law College, Bangalore, JSS Law College, Mysore, SDM law college Mangalore and KLE Law College Hubli.&lt;br /&gt;&lt;br /&gt;Naavi is also the founder of &lt;a href="https://cis-india.org/internet-governance/www.cyberlawcollege.com" class="external-link"&gt;www.naavi.org&lt;/a&gt; the premier Cyber Law Portal in India. Naavi has been engaged in the training of Police in Tamil Nadu and Karnataka and conducts several courses in Cyber Laws for different audiences. He has been a guest faculty in a number of institutions including NPA, IDRBT, DTRI, ISACA, NADT, LBS National Academy, Judicial Academies, NALSAR, etc., as well as several law, engineering and management institutions.&lt;br /&gt;&lt;br /&gt;Naavi has over three decades of senior Corporate executive experience behind him. He has been an ex-Banker and Consultant to several Companies in IT Services. He has conducted hundreds of training sessions to professionals of various disciplines such as bankers, lawyers, chartered accountants, engineers, software professionals, police and judicial officers through workshops and in-house training programmes in cyber laws, cyber crimes, information security and related areas.&lt;/p&gt;
&lt;h3&gt;Chitra Ahanthem&lt;/h3&gt;
&lt;p&gt;Chitra Ahanthem is a features writer with Imphal Free Press, published in Imphal, Manipur. She is also a freelance writer and researcher on issues around HIV/AIDS, child rights, conflict and gender.&lt;/p&gt;
&lt;h3&gt;Baljit Singh Bedi &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Baljit Singh Bedi did his B.Tech and M.Tech. from Indian Institute of Technology (IIT), Delhi.&amp;nbsp;&amp;nbsp;&amp;nbsp; After serving for five years in the Centre for Applied Research in Electronics (CARE) IIT, Delhi he joined the Department of Information Technology (DIT), Ministry of Communication &amp;amp; IT (MCIT), Government of India.&amp;nbsp; The major responsibilities and contributions over the years cover conceptualizing, evolving and implementation of a number of major schemes/programmes and projects in the field of electronics and IT applications with primary role in healthcare. He was instrumental in starting an integrated programme in promoting the area of Electronics, IT and Electronic Medical Records (EMR) Standards in Healthcare in India. As the head of Medical Electronics &amp;amp; Telemedicine division, he was looking after the activity of promotion of e-health &amp;amp; tele–health technology and R&amp;amp;D in medical electronics and launched a number of schemes in India. He was part of the National Task Force Telemedicine in India set up by the Ministry of Health &amp;amp; Family Welfare (MoH&amp;amp;FW), Government of India and headed the Group on Standards. He was a Member of National Knowledge Commission’s Working Group on India-Health Information Network Development (I-HIND) and is part of the Advisory Group for follow-up implementation program under the consideration of MoH&amp;amp;FW.&amp;nbsp; He is actively involved in policy, development and deployment programmes of IT in Health initiatives of DIT, MoH&amp;amp;FW, and Media Lab Asia. He is a member of the National Committee set up by MoH&amp;amp;FW for EMR Standardization and Heading its Task Group on Interoperability.&amp;nbsp; He is also International Telecommunication Union (ITU) Expert for e-Health Standardization. He is Executive Member of Indian Association of Medical Informatics (IAMI) and President, Telemedicine Society of India (TSI). At present, he is an Adviser to the Centre for Development of Advanced Computing (CDAC), Scientific Society of MCIT, Government of India.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Deepak Maheshwari &lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Deepak Maheshwari is Director – Corporate Affairs with Microsoft in India and responsible for interactions with the policymakers &amp;amp; regulators as well as with industry associations &amp;amp; the civil society organizations. An active participant and a keen observer of the interplay between technological innovation and socio-economic development, he has been closely associated with &lt;strong&gt;development &amp;amp; evolution of Information &amp;amp; Communication Technology policy&lt;/strong&gt;, &lt;strong&gt;law &amp;amp; regulation&lt;/strong&gt; for more than a decade and is often invited as a speaker and a contributor of articles &amp;amp; opinions in the media.&lt;br /&gt;&amp;nbsp;&lt;br /&gt;He has been active in several trade associations and served as committee chair &amp;amp; co-chair. He served for two consecutive terms as the elected secretary in the &lt;strong&gt;ISP Association of India&lt;/strong&gt; and co-founded &lt;strong&gt;National Internet eXchange of India (NIXI)&lt;/strong&gt; as well as the &lt;strong&gt;ITU-APT Foundation of India&lt;/strong&gt;. He is also a member on the academic board of the &lt;strong&gt;IIM Ahmedabad- IDEA Telecom Centre of Excellence&lt;/strong&gt;. &lt;br /&gt;&amp;nbsp;&lt;br /&gt;At times mistaken as a lawyer, he was actually awarded degree in engineering by one of India’s leading technical institute&lt;strong&gt; IT-BHU&lt;/strong&gt;. His professional experience of more than 2 decades spans functional responsibilities across sales, marketing, operations and last but not the least, corporate affairs.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;*Participants to be confirmed&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-symposium.pdf" class="internal-link" title="Symposium"&gt;&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/all-india-privacy-symposium.pdf" class="internal-link" title="All India Privacy Symposium"&gt;Download the poster here&lt;/a&gt;&lt;br /&gt;&lt;/li&gt;&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/privacy-symposium.pdf" class="internal-link" title="Symposium"&gt;Download the agenda here&lt;/a&gt;&lt;strong&gt; &lt;/strong&gt;(PDF, 755 KB)&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;VIDEOS&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="http://blip.tv/play/AYLs7gcA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLs7gcA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLtgXAA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLtgXAA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLtgz4A.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLtgz4A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLtrUIA.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLtrUIA" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;

&lt;iframe src="http://blip.tv/play/AYLtrl4A.html?p=1" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;&lt;embed style="display:none" src="http://a.blip.tv/api.swf#AYLtrl4A" type="application/x-shockwave-flash"&gt;&lt;/embed&gt;


        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/privacy-symposium'&gt;https://cis-india.org/internet-governance/privacy-symposium&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Conference</dc:subject>
    
    
        <dc:subject>Event Type</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-02-27T11:08:32Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/ace-7-french-charter-cis-comment">
    <title>Comment by CIS at ACE on Presentation on French Charter on the Fight against Cyber-Counterfeiting</title>
    <link>https://cis-india.org/a2k/blogs/ace-7-french-charter-cis-comment</link>
    <description>
        &lt;b&gt;The seventh session of the World Intellectual Property Organization's Advisory Committee on Enforcement is being held in Geneva on November 30 and December 1, 2011. Pranesh Prakash responded to a presentation by Prof. Pierre Sirinelli of the École de droit de la Sorbonne, Université Paris 1 on 'The French Charter on the Fight against Cyber-Counterfeiting of December 16, 2009' with this comment.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Thank you, Chair.&amp;nbsp; I speak on behalf of the Centre for Internet and Society.&amp;nbsp; First, I would like to congratulate you on your re-election.&lt;br /&gt;&lt;br /&gt;And I would like to congratulate Prof. Sirenelli on his excellent presentation.&lt;br /&gt;&lt;br /&gt;I would like to flag a few points, though:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;One of the benefits of normal laws, as opposed to the soft/plastic laws, which he champions, is that normal laws are bound by procedures established by law, due process requirements, and principles of natural justice.&amp;nbsp; Unfortunately, the soft/plastic laws, which in essence are private agreements, are not.&lt;/li&gt;&lt;li&gt;The report of the UN Special Rapporteur on the Freedom of Expression and Opinion made it clear in his report to the UN Human Rights Council that the Internet is now an intergral part of citizens exercising their right of freedom of speech under national constitutions and under the Universal Declaration of Human Rights.&amp;nbsp; That report highlights that many initiatives on copyright infringement, including that of the French government with HADOPI and the UK, actually contravene the Universal Declaration of Human Rights&lt;/li&gt;&lt;li&gt;The right of privacy is also flagged by many as something that will have to be compromised if such private enforcement of copyright is encouraged.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;I'd like to know Prof. Sirinelli's views on these three issues: due process, right of freedom of speech, and the right to privacy.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/ace-7-french-charter-cis-comment'&gt;https://cis-india.org/a2k/blogs/ace-7-french-charter-cis-comment&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Piracy</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>WIPO</dc:subject>
    

   <dc:date>2011-12-01T11:59:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
