<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 21 to 35.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dna-amber-sinha-march-10-2016-are-we-losing-right-to-privacy-and-freedom-of-speech-on-indian-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/transparency-in-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-26-09-2015-sunil-abraham-hits-and-misses-with-draft-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/free-speech-and-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016">
    <title>Right to Food Campaign, Ranchi Convention, 2016</title>
    <link>https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016</link>
    <description>
        &lt;b&gt;The Right to Food Campaign held its 2016 Convention in Ranchi during September 23-25, 2016. While three years have elapsed since the passage of the National Food Security Act, despite improvements in the Public Distribution System (PDS), large implementation gaps remain. This is what the Convention focused on, and gathered researchers and campaigners from across the country to share experiences and case studies on effectiveness and exclusions from the PDS. Sumandro Chattapadhyay took part in a session of the Convention to discuss how UID-linked welfare delivery is being rolled out across key programmes like provision of pension and rationed distribution of essential commodities, and their impact on people's right to welfare services.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Right to Food Campaign: &lt;a href="http://www.righttofoodcampaign.in/"&gt;Website&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Right to Food Campaign: &lt;a href="https://docs.google.com/viewer?a=v&amp;amp;pid=sites&amp;amp;srcid=ZGVmYXVsdGRvbWFpbnxoYXFyb3ppcm90aXxneDo3MmQ3MTMyZjU2N2FjOGU"&gt;Cash Transfers and UID: Our Main Demands&lt;/a&gt;.&lt;/h4&gt;
&lt;h4&gt;Ranchi Convention, 2016: &lt;a href="https://docs.google.com/document/d/110_asJ1t14IWALbhWN1RjDiOV8WE-fIK2xJC5Yltyc4/edit"&gt;Programme&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016'&gt;https://cis-india.org/internet-governance/news/right-to-food-campaign-ranchi-convention-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Welfare Governance</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    
    
        <dc:subject>UID</dc:subject>
    

   <dc:date>2019-03-16T04:40:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dna-amber-sinha-march-10-2016-are-we-losing-right-to-privacy-and-freedom-of-speech-on-indian-internet">
    <title>Are we Losing the Right to Privacy and Freedom of Speech on Indian Internet?</title>
    <link>https://cis-india.org/internet-governance/blog/dna-amber-sinha-march-10-2016-are-we-losing-right-to-privacy-and-freedom-of-speech-on-indian-internet</link>
    <description>
        &lt;b&gt;The article was published in DNA on March 10, 2016.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Last month, it was reported that National Security Council Secretariat (NSCS) had proposed the &lt;a href="http://www.dnaindia.com/scitech/report-watch-what-you-post-soon-govt-to-install-media-cell-to-track-counter-negative-content-online-2181460"&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;setting up of a National Media Analytics Centre&lt;/span&gt;&lt;/strong&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/a&gt;(NMAC).  This centre’s mandate would be to monitor blogs, media channels, news  outlets and social media platforms. Sources were quoted as stating that  the centre would rely upon a tracking software built by Ponnurangam  Kumaraguru, an Assistant Professor at the Indraprastha Institute of  Information Technology in Delhi. The NMAC seems to mirror other similar  efforts in countries such as &lt;strong&gt;&lt;a rel="nofollow" href="https://www.govtrack.us/congress/bills/114/hr3654/text" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;US&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;, &lt;strong&gt;&lt;a rel="nofollow" href="https://www.thestar.com/news/canada/2013/11/29/social_media_to_be_monitored_by_federal_government.html" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;Canada&lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;, &lt;strong&gt;&lt;a rel="nofollow" href="http://www.smh.com.au/technology/technology-news/data-retention-and-the-end-of-australians-digital-privacy-20150827-gj96kq.html" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;Australia&lt;/span&gt;&lt;/a&gt;&lt;a rel="nofollow" href="http://www.smh.com.au/technology/technology-news/data-retention-and-the-end-of-australians-digital-privacy-20150827-gj96kq.html" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt; &lt;/span&gt;&lt;/a&gt;&lt;/strong&gt;and &lt;strong&gt;&lt;a rel="nofollow" href="http://www.independent.co.uk/news/uk/politics/government-awards-contracts-to-monitor-social-media-and-give-whitehall-real-time-updates-on-public-10298255.html" target="_blank"&gt;&lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;UK&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/strong&gt;,  to monitor online content for the reasons as varied as prevention of  terrorist activities, disaster relief and criminal investigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The NSCS, the parent body that this centre will fall under, is a part of the National Security Council, India’s highest agency looking to integrate policy-making and intelligence analysis, and advising the Prime Minister’s Office on strategic issues as well as domestic and international threats. The NSCS represents the Joint Intelligence Committee and its duties include the assessment of intelligence from the Intelligence Bureau, Research and Analysis Wing (R&amp;amp;AW) and Directorates of Military, Air and Naval Intelligence, and the coordination of the functioning of intelligence agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From limited reports available, it appears that the tracking software used by NMAC will generate tags to classify post and comments on social media into negative, positive and neutral categories, paying special attention to “belligerent” comments. The reports say that the software will also try to determine if the comments are factually correct or not. The idea of a government agency systematically tracking social media, blogs and news outlets and categorising content as desirable and undesirable is bound to create a chilling effect on free speech online. The most disturbing part of the report suggested that the past pattern of writers’ posts would be analysed to see how often her posts fell under the negative category, and whether she was attempting to create trouble or disturbance, and appropriate feedback would be sent to security agencies based on it. Viewed alongside the recent events where actors critical of the government and holding divergent views have expressed concerns about attempts to suppress dissenting opinions, this initiative sounds even more dangerous, putting at risk individuals categorised as “negative” or “belligerent”, for exercising their constitutionally protected right to free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/copy2_of_FB.jpg" alt="FB" class="image-inline" title="FB" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Getty Images&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has been argued that the Internet is a public space, and should be treated as subject to monitoring by the government as any other space. Further, this kind of analysis does not concern itself with private communication between two or more parties but only with publicly available information. Why must we raise eyebrows if the government is accessing and analysing it for the purposes of legitimate state interests? There are two problems with this argument. First, any surveillance of communication must always be limited in scope, specific to individuals, necessary and proportionate, and subject to oversight. There are no laws passed by the Parliament in India which allow for mass surveillance measures. Such activities are being conducted through bodies like NSC which came into existence through an Executive Order and have no clear oversight mechanisms built into its functioning. A quick look at the history of intelligence and surveillance agencies in India will show that none of them have been created through a legislation. A host of surveillance agencies have come up in the last few years including the Central Monitoring System, which was set up to monitor telecommunications, and the absence of legislative pedigree translates into lack of appropriate controls and safeguards, and zero public accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second and the larger issue is that the scale and level of granularity of personal information available now is unprecedented. Earlier, our communications with friends and acquaintances, our movements, our association, political or otherwise, were not observable in the manner it is today. It would be remiss to underestimate the importance of personal information merely because it exists in the public domain. The ability to act without being subject to monitoring and surveillance is key to the right to free speech and expression. While we accept the importance of free speech and the value of an open internet and newer technologies to enable it, we do not give sufficient importance to how these technologies are affecting the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Tweets.jpg" alt="Tweets" class="image-inline" title="Tweets" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Getty Images&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the last few years, the social media scene in India has been characterised by extreme polemic with epithets such as ‘bhakt’, ‘sanghi’, ‘sickular’ and ‘presstitutes’ thrown around liberally, turning political discussions into a mess of ugliness. It remains to be seen whether the NMAC intends to deal with the professional trolls who rely on a barrage of abuse to disrupt public conversations online. However, the appropriate response would not be greater surveillance, let alone a body like NMAC, with a sweeping mandate and little accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Link to the original &lt;a class="external-link" href="http://www.dnaindia.com/scitech/column-are-we-losing-the-right-to-privacy-and-freedom-of-speech-on-indian-internet-2187527"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dna-amber-sinha-march-10-2016-are-we-losing-right-to-privacy-and-freedom-of-speech-on-indian-internet'&gt;https://cis-india.org/internet-governance/blog/dna-amber-sinha-march-10-2016-are-we-losing-right-to-privacy-and-freedom-of-speech-on-indian-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-16T14:44:19Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/transparency-in-surveillance">
    <title>Transparency in Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/transparency-in-surveillance</link>
    <description>
        &lt;b&gt;Transparency is an essential need for any democracy to function effectively. It may not be the only requirement for the effective functioning of a democracy, but it is one of the most important principles which need to be adhered to in a democratic state.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A democracy involves the state machinery being 	accountable to the citizens that it is supposed to serve, and for the citizens to be able to hold their state machinery accountable, they need accurate and 	adequate information regarding the activities of those that seek to govern them. However, in modern democracies it is often seen that those in governance 	often try to circumvent legal requirements of transparency and only pay lip service to this principle, while keeping their own functioning as opaque as 	possible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This tendency to not give adequate information is very evident in the departments of the government which are concerned with surveillance, and merit can be 	found in the argument that all of the government's clandestine surveillance activities cannot be transparent otherwise they will cease to be "clandestine" 	and hence will be rendered ineffective. However, this argument is often misused as a shield by the government agencies to block the disclosure of all types 	of information about their activities, some of which may be essential to determine whether the current surveillance regime is working in an effective, 	ethical, and legal manner or not. It is this exploitation of the argument, which is often couched in the language of or coupled with concerns of national 	security, that this paper seeks to address while voicing the need for greater transparency in surveillance activities and structures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the first section the paper examines the need for transparency, and specifically deals with the requirement for transparency in surveillance. In the 	next part, the paper discusses the regulations governing telecom surveillance in India. The final part of the paper discusses possible steps that may be 	taken by the government in order to increase transparency in telecom surveillance while keeping in mind that the disclosure of such information should not 	make future surveillance ineffective.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Need for Transparency&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In today's age where technology is all pervasive, the term "surveillance" has developed slightly sinister overtones, especially in the backdrop of the 	Edward Snowden fiasco. Indeed, there have been several independent scandals involving mass surveillance of people in general as well as illegal 	surveillance of specific individuals. The fear that the term surveillance now invokes, especially amongst those social and political activists who seek to 	challenge the status quo, is in part due to the secrecy surrounding the entire surveillance regime. Leaving aside what surveillance is carried out, upon 	whom, and when - the state actors are seldom willing and open to talk about how surveillance is carried out, how decisions regarding who and how to target, 	are reached, how agency budgets are allocated and spent, how effective surveillance actions were, etc. While there may be justified security based 	arguments to not disclose the full extent of the state's surveillance activities, however this cloak of secrecy may be used illegally and in an 	unauthorized manner to achieve ends more harmful to citizen rights than the maintenance of security and order in the society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance and interception/collection of communications data can take place under different legal processes in different countries, ranging from 	court-ordered requests of specified data from telecommunications companies to broad executive requests sent under regimes or regulatory frameworks 	requiring the disclosure of information by telecom companies on a pro-active basis. However, it is an open secret that data collection often takes place 	without due process or under non-legal circumstances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is widely believed that transparency is a critical step towards the creation of mechanisms for increased accountability through which law enforcement 	and government agencies access communications data. It is the first step in the process of starting discussions and an informed public debate regarding how 	the state undertakes activities of surveillance, monitoring and interception of communications and data. Since 2010, a large number of ICT companies have 	begun to publish transparency reports on the extent that governments request their user data as well as requirements to remove content. However, 	governments themselves have not been very forthcoming in providing such detailed information on surveillance programs which is necessary for an informed 	debate on this issue.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; Although some countries currently report limited information on their surveillance 	activities, e.g. the U.S. Department of Justice publishes an annual Wiretap Report (U.S. Courts, 2013a), and the United Kingdom publishes the Interception 	of Communications Commissioner Annual Report (May, 2013), which themselves do not present a complete picture, however even such limited measures are 	unheard of in a country such as India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is obvious that Governments can provide a greater level of transparency regarding the limits in place on the freedom of expression and privacy than 	transparency reports by individual companies. Company transparency reports can only illuminate the extent to which any one company receives requests and 	how that company responds to them. By contrast, government transparency reports can provide a much greater perspective on laws that can potentially restrict the freedom of expression or impact privacy by illustrating the full extent to which requests are made across the ICT industry.	&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, the courts and the laws have traditionally recognized the need for transparency and derive it from the fundamental right to freedom of speech and 	expression guaranteed in our Constitution. This need coupled with a sustained campaign by various organizations finally fructified into the passage of the 	Right to Information Act, 2005, (RTI Act) which amongst other things also places an obligation on the sate to place its documents and records online so 	that the same may be freely available to the public. In light of this law guaranteeing the right to information, the citizens of India have the fundamental 	right to know what the Government is doing in their name. The free flow of information and ideas informs political growth and the freedom of speech and 	expression is the lifeblood of a healthy democracy, it acts as a safety valve. People are more ready to accept the decisions that go against them if they 	can in principle seem to influence them. The Supreme Court of India is of the view that the imparting of information about the working of the government on 	the one hand and its decision affecting the domestic and international trade and other activities on the other is necessary, and has imposed an obligation 	upon the authorities to disclose information.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court, in &lt;i&gt;Namit Sharma&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;,&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; while discussing the importance of 	transparency and the right to information has held:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The Right to Information was harnessed as a tool for promoting development; strengthening the democratic governance and effective delivery of 	socio-economic services. 	&lt;i&gt; Acquisition of information and knowledge and its application have intense and pervasive impact on the process of taking informed decision, resulting in 		overall productivity gains &lt;/i&gt; .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;……..&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government procedures and regulations shrouded in the veil of secrecy do not allow the litigants to know how their cases are being handled. They shy away 	from questioning the officers handling their cases because of the latters snobbish attitude. Right to information should be guaranteed and needs to be given real substance. In this regard, the Government must assume a major responsibility and mobilize skills to ensure flow of information to citizens.	&lt;i&gt;The traditional insistence on secrecy should be discarded.&lt;/i&gt;"&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although these statements were made in the context of the RTI Act the principle which they try to illustrate can be understood as equally applicable to the 	field of state sponsored surveillance. Though Indian intelligence agencies are exempt from the RTI Act, it can be used to provide limited insight into the 	scope of governmental surveillance. This was demonstrated by the Software Freedom Law Centre, who discovered via RTI requests that approximately 7,500 - 	9,000 interception orders are sent on a monthly basis.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While it is true that transparency alone will not be able to eliminate the barriers to freedom of expression or harm to privacy resulting from overly broad 	surveillance,, transparency provides a window into the scope of current practices and additional measures are needed such as oversight and mechanisms for 	redress in cases of unlawful surveillance. Transparency offers a necessary first step, a foundation on which to examine current practices and contribute to 	a debate on human security and freedom.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is no secret that the current framework of surveillance in India is rife with malpractices of mass surveillance and instances of illegal surveillance. 	There have been a number of instances of illegal and/or unathorised surveillance in the past, the most scandalous and thus most well known is the incident 	where a woman IAS officer was placed under surveillance at the behest of Mr. Amit Shah who is currently the president of the ruling party in India 	purportedly on the instructions of the current prime minister Mr. Narendra Modi.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; There are also a number 	of instances of private individuals indulging in illegal interception and surveillance; in the year 2005, it was reported that Anurag Singh, a private 	detective, along with some associates, intercepted the telephonic conversations of former Samajwadi Party leader Amar Singh. They allegedly contacted 	political leaders and media houses for selling the tapped telephonic conversation records. The interception was allegedly carried out by stealing the genuine government letters and forging and fabricating them to obtain permission to tap Amar Singh's telephonic conversations.	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; The same individual was also implicated for tapping the telephone of the current finance minister Mr. 	Arun Jaitely.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is therefore obvious that the status quo with regard to the surveillance mechanism in India needs to change, but this change has to be brought about in 	a manner so as to make state surveillance more accountable without compromising its effectiveness and addressing legitimate security concerns. Such changes 	cannot be brought about without an informed debate involving all stakeholders and actors associated with surveillance, however the basic minimum 	requirement for an "informed" debate is accurate and sufficient information about the subject matter of the debate. This information is severely lacking in 	the public domain when it comes to state surveillance activities - with most data points about state surveillance coming from news items or leaked 	information. Unless the state becomes more transparent and gives information about its surveillance activities and processes, an informed debate to 	challenge and strengthen the status quo for the betterment of all parties cannot be started.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Current State of Affairs&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Surveillance laws in India are extremely varied and have been in existence since the colonial times, remnants of which are still being utilized by the 	various State Police forces. However in this age of technology the most important tools for surveillance exist in the digital space and it is for this 	reason that this paper shall focus on an analysis of surveillance through interception of telecommunications traffic, whether by tracking voice calls or 	data. The interception of telecommunications actually takes place under two different statutes, the Telegraph Act, 1885 (which deals with interception of 	calls) as well as the Information Technology Act, 2000 (which deals with interception of data).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently, the telecom surveillance is done as per the procedure prescribed in the Rules under the relevant sections of the two statutes mentioned above,	&lt;i&gt;viz. &lt;/i&gt;Rule 419A of the Telegraph Rules, 1951 for surveillance under the Telegraph Act, 1885 and the Information Technology (Procedure and 	Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 for surveillance under the Information Technology Act, 2000. These Rules put in place various checks and balances and try to ensure that there is a paper trail for every interception request.	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; The assumption is that the generation of a paper trail would reduce the number of unauthorized 	interception orders thus ensuring that the powers of interception are not misused. However, even though these checks and balances exist on paper as 	provided in the laws, there is not enough information in the public domain regarding the entire mechanism of interception for anyone to make a judgment on 	whether the system is working or not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As mentioned earlier, currently the only sources of information on interception that are available in the public domain are through news reports and a 	handful of RTI requests which have been filed by various activists.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; The only other institutionalized 	source of information on surveillance in India is the various transparency reports brought out by companies such as Google, Yahoo, Facebook, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indeed, Google was the first major corporation to publish a transparency report in 2010 and has been updating its report ever since. The latest data that 	is available for Google is for the period between January, 2015 to June, 2015 and in that period Google and Youtube together received 3,087 requests for 	data which asked for information on 4,829 user accounts from the Indian Government. Out of these requests Google only supplied information for 44% of the 	requests.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; Although Google claims that they "review each request to make sure that it complies with both 	the spirit and the letter of the law, and we may refuse to produce information or try to narrow the request in some cases", it is not clear why Google 	rejected 56% of the requests. It may also be noted that the number of requests for information that Google received from India were the fifth highest 	amongst all the other countries on which information was given in the Transparency Report, after USA, Germany, France and the U.K.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook's transparency report for the period between January, 2015 to June, 2015 reveals that Facebook received 5,115 requests from the Indian Government 	for 6,268 user accounts, out of which Facebook produced data in 45.32% of the cases.&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; Facebook's 	transparency report claims that they respond to requests relating to criminal cases and "Each and every request we receive is checked for legal sufficiency 	and we reject or require greater specificity on requests that are overly broad or vague." However, even in Facebook's transparency report it is unclear why 	55.68% of the requests were rejected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Yahoo transparency report also gives data from the period between January 1, 2015 to June 30, 2015 and reveals that Yahoo received 831 requests for 	data, which related to 1,184 user accounts from the Indian Government. The Yahoo report is a little more detailed and also reveals that 360 of the 831 	requests were rejected by Yahoo, however no details are given as to why the requests were rejected. The report also specifies that in 63 cases, no data was found by Yahoo, in 249 cases only non content data&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; was disclosed while in 159 cases content	&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; was disclosed. The Yahoo report also claims that "We carefully scrutinize each request to make sure 	that it complies with the law, and we push back on those requests that don't satisfy our rigorous standards."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Vodafone Transparency Report gives information regarding government requests for data in other jurisdictions,	&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; it does not give any information on government requests in India. This is because Vodafone interprets 	the provisions contained in Rule 25(4) of the IT (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 	(Interception Rules) and Rule 11 of the IT (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009 as well as Rule 	419A(19) of the Indian Telegraph Rules, 1954 which require service providers to maintain confidentiality/secrecy in matters relating to interception, as 	being a legal prohibition on Vodafone to reveal such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the four major companies discussed above, there are a large number of private corporations which have published transparency reports in order to 	acquire a sense of trustworthiness amongst their customers. Infact, the Ranking Digital Rights Project has been involved in ranking some of the biggest 	companies in the world on their commitment to accountability and has brought out the Ranking Digital Rights 2015 Corporate Accountability Index that has 	analysed a representative group of 16 companies "that collectively hold the power to shape the digital lives of billions of people across the globe".&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Suggestions on Transparency&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is clear from the discussions above, as well as a general overview of various news reports on the subject, that telecom surveillance in India is 	shrouded in secrecy and it appears that a large amount of illegal and unauthorized surveillance is taking place behind the protection of this veil of 	secrecy. If the status quo continues, then it is unlikely that any meaningful reforms would take place to bring about greater accountability in the area of 	telecom surveillance. It is imperative, for any sort of changes towards greater accountability to take place, that we have enough information about what 	exactly is happening and for that we need greater transparency since transparency is the first step towards greater accountability.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Transparency Reports&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In very simplistic terms transparency, in anything, can best be achieved by providing as much information about that thing as possible so that there are no 	secrets left. However, it would be naïve to say that all information about interception activities can be made public on the altar of the principle of 	transparency, but that does not mean that there should be no information at all on interception. One of the internationally accepted methods of bringing 	about transparency in interception mechanisms, which is increasingly being adopted by both the private sector as well as governments, is to publish 	Transparency Reports giving various details of interception while keeping security concerns in mind. The two types of transparency reports that we require 	in India and what that would entail is briefly discussed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;By the Government&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The problem with India's current regime for interception is that the entire mechanism appears more or less adequate on paper with enough checks and 	balances involved in it to prevent misuse of the allotted powers. However, because the entire process is veiled in secrecy, nobody knows exactly how good 	or how rotten the system has become and whether it is working to achieve its intended purposes. It is clear that the current system of interception and 	surveillance being followed by the government has some flaws, as can be gathered from the frequent news articles which talk about incidents of illegal 	surveillance. However, without any other official or more reliable sources of information regarding surveillance activities these anecdotal pieces of 	evidence are all we have to shape the debate regarding surveillance in India. It is only logical then that the debate around surveillance, which is 	informed by such sketchy and unreliable news reports will automatically be biased against the current mechanism since the newspapers would also only be 	interested in reporting the scandalous and the extraordinary incidents. For example, some argue that the government undertakes mass surveillance, while 	others argue that India only carries out targeted surveillance, but there is not enough information publicly available for a third party to support or 	argue against either claim. It is therefore necessary and highly recommended that the government start releasing a transparency report such as the one's 	brought out by the United States and the UK as mentioned above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no need for a separate department or authority just to make the transparency report and this task could probably be performed in-house by any 	department, but considering the sector involved, it would perhaps be best if the Department of Telecommunications is given the responsibility to bring out 	a transparency report. These transparency reports should contain certain minimum amount of data for them to be an effective tool in informing the public 	discourse and debate regarding surveillance and interception. The report needs to strike a balance between providing enough information so that an informed 	analysis can be made of the effectiveness of the surveillance regime without providing so much information so as to make the surveillance activities 	ineffective. Below is a list of suggestions as to what kind of data/information such reports should contain:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Reports should contain data regarding the number of interception orders that have been passed. This statistic would be extremely useful in 	determining how elaborate and how frequently the state indulges in interception activities. This information would be easily available since all 	interception orders have to be sent to the Review Committee set up under Rule 419A of the Telegraph Rules, 1954.&lt;/li&gt;
&lt;li&gt;The Report should contain information on the procedural aspects of surveillance including the delegation of powers to different authorities and 	individuals, information on new surveillance schemes, etc. This information would also be available with the Ministry of Home Affairs since it is a 	Secretary or Joint Secretary level officer in the said Ministry which is supposed to authorize every order for interception.&lt;/li&gt;
&lt;li&gt;The report should contain an aggregated list of reasons given by the authorities for ordering interception. This information would reveal whether 	the authorities are actually ensuring legal justification before issuing interception or are they just paying lip service to the rules to ensure a proper 	paper trail. Since every order of interception has to be in writing, the main reasons for interception can easily be gleaned from a perusal of the orders.&lt;/li&gt;
&lt;li&gt;It should also reveal the percentage of cases where interception has actually found evidence of culpability or been successful in prevention of 	criminal activities. This one statistic would itself give a very good review of the effectiveness of the interception regime. Granted that this information 	may not be very easily obtainable, but it can be obtained with proper coordination with the police and other law enforcement agencies.&lt;/li&gt;
&lt;li&gt;The report should also reveal the percentage of order that have been struck down by the Review Committee as not following the process envisaged 	under the various Rules. This would give a sense of how often the Rules are being flouted while issuing interception orders. This information can easily be 	obtained from the papers and minutes of the meetings of the Review Committee.&lt;/li&gt;
&lt;li&gt;The report should also state the number of times the Review Committee has met in the period being reported upon. The Review Committee is an 	important check on the misuse of powers by the authorities and therefore it is important that the Review Committee carries out its activities in a diligent 	manner.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;It may be noted here that some provisions of the Telegraph Rules, 1954 especially sub-Rules 17 and 18 of Rule 419A as well as Rules 22, 23(1) and 25 of the 	Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009 may need to be amended so as to 	make them compliant with the reporting mechanism proposed above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;By the Private Sector&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We have already discussed above the transparency reports published by certain private companies. Suffice it to say that reports from private companies 	should give as much of the information discussed under government reports as possible and/or applicable, since they may not have a large amount of the 	information that is sought to be published in the government reports such as whether the interception was successful, the reasons for interception, etc. It 	is important to have ISPs provide such transparency reports as this will provide two different data points for information on interception and the very 	existence of these private reports may act as a check to ensure the veracity of the government transparency reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As in the case of government reports, for the transparency reports of the private sector to be effective, certain provisions of the Telegraph Rules, 1954 	and the Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data or Information) Rules, 2009, viz. sub-Rules 14, 15 and 	19 of Rule 419A of the Telegraph Rules, 1954 and Rules 20, 21, 23(1) and 25 of the Information Technology (Procedure and Safeguards for Monitoring and 	Collecting Traffic Data or Information) Rules, 2009.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Overhaul of the Review Committee&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Review Committee which acts as a check on the misuse of powers by the competent authorities is a very important cog in the entire process. However, it 	is staffed entirely by the executive and does not have any members of any other background. Whilst it is probably impractical to have civilian members in 	the Review Committee which has access to potentially sensitive information, it is extremely essential that the Committee has wider representation from 	other sectors specially the judiciary. One or two members from the judiciary on the Review Committee would provide a greater check on the workings of the 	Committee as this would bring in representation from the judicial arm of the State so that the Review Committee does not remain a body manned purely by the 	executive branch. This could go some ways to ensure that the Committee does not just "rubber stamp" the orders of interception issued by the various 	competent authorities.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is not in dispute that there is a need for greater transparency in the government's surveillance activities in order to address the problems associated 	with illegal and unauthorised interceptions. This paper is not making the case that greater transparency in and by itself will be able to solve the 	problems that may be associated with the government's currency interception and surveillance regime, however it is not possible to address any problem 	unless we know the real extent of it. It is essential for an informed debate and discussion that the people participating in the discussion are "informed", 	i.e. they should have accurate and adequate information regarding the issues which are being discussed. The current state of the debate on interception is 	rife with individuals using illustrative and anecdotal evidence which, in the absence of any other evidence, they assume to be the norm.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A more transparent and forthcoming state machinery which regularly keeps its citizens abreast of the state of its surveillance regime would be likely to 	get better suggestions and perhaps less criticisms if it does come out that the checks and balances imposed in the regulations are actually making a 	difference to check unauthorized interceptions, and if not, then it is the right of the citizens to know about this and ask for reforms.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; James Losey, "Surveillance of Communications: A Legitimization Crisis and the Need for Transparency",			&lt;i&gt;International Journal of Communication 9(2015)&lt;/i&gt;, Feature 3450-3459, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Namit Sharma v. Union of India,			&lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=39566&lt;/a&gt; . Although the judgment was overturned on review, however this observation quoted above would still hold as it has not been specifically 			overturned.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;a href="http://sflc.in/wp-content/uploads/2014/09/SFLC-FINAL-SURVEILLANCE-REPORT.pdf"&gt; http://sflc.in/wp-content/uploads/2014/09/SFLC-FINAL-SURVEILLANCE-REPORT.pdf &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; James Losey, "Surveillance of Communications: A Legitimization Crisis and the Need for Transparency",			&lt;i&gt;International Journal of Communication 9 (2015)&lt;/i&gt;, Feature 3450-3459, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;a href="http://gulail.com/the-stalkers/"&gt;http://gulail.com/the-stalkers/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; &lt;a href="http://timesofindia.indiatimes.com/india/Amar-Singh-phone-tap-accused-tracked-Arun-Jaitleys-mobile/articleshow/18582508.cms"&gt; http://timesofindia.indiatimes.com/india/Amar-Singh-phone-tap-accused-tracked-Arun-Jaitleys-mobile/articleshow/18582508.cms &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; &lt;a href="http://ibnlive.in.com/news/arun-jaitley-phonetapping-case-all-accused-get-bail/394997-37-64.html"&gt; http://ibnlive.in.com/news/arun-jaitley-phonetapping-case-all-accused-get-bail/394997-37-64.html &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; For a detailed discussion of the Rules of interception please see Policy Paper on Surveillance in India, by Vipul Kharbanda, 			&lt;a href="http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india"&gt; http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-india &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; As an example please see 			&lt;a href="http://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india"&gt; http://cis-india.org/internet-governance/resources/rti-on-officials-and-agencies-authorized-to-intercept-telephone-messages-in-india &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;a href="https://www.google.com/transparencyreport/userdatarequests/countries/"&gt; https://www.google.com/transparencyreport/userdatarequests/countries/ &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; &lt;a href="https://govtrequests.facebook.com/country/India/2015-H1/"&gt;https://govtrequests.facebook.com/country/India/2015-H1/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Non-content data (NCD) such as basic subscriber information including the information captured at the time of registration such as an alternate 			e-mail address, name, location, and IP address, login details, billing information, and other transactional information (e.g., "to," "from," and 			"date" fields from email headers).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Data that users create, communicate, and store on or through Yahoo. This could include words in a communication (e.g., Mail or Messenger), photos 			on Flickr, files uploaded, Yahoo Address Book entries, Yahoo Calendar event details, thoughts recorded in Yahoo Notepad or comments or posts on 			Yahoo Answers or any other Yahoo property.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;a href="https://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement/country_by_country.html"&gt; https://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement/country_by_country.html &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/transparency-in-surveillance'&gt;https://cis-india.org/internet-governance/blog/transparency-in-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Transparency</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2016-01-23T15:11:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology">
    <title>Communication Rights in the Age of Digital Technology </title>
    <link>https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) invites you to a conference to discuss the evolution of privacy and surveillance in India on Friday, October 30, 2015 at Deck Suite Hall, 5th Floor, Habitat Centre, Lodhi Road, Near Air Force Bal Bharti School, New Delhi - 110003, from 11 a.m. to 5 p.m.&lt;/b&gt;
        &lt;p&gt;The conference will be conducted in a round-table format. Topics to be discussed shall include, among others, the Human DNA Profiling Bill, 2012, the PIL questioning the data collection under the UID scheme, the draft National Encryption Policy and the Supreme Court judgement in Shreya Singhal v. Union of India, in the context of privacy and surveillance in India. The conference will be a forum for discussion, knowledge exchange and agenda building.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;Background Note&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In India, the Right to Privacy has been interpreted to mean an individuals’ right to be left alone. In the age of massive use of Information and Communications Technology, it has become imperative to have this right protected. The Supreme Court has held in a number of its decisions that the right to privacy is implicit in the fundamental right to life and personal liberty under Article 21 of the Indian Constitution, though Part III does not explicitly mention this right. Since the 1960s, the Apex Court has been dealing with this issue, primarily with respect to privacy being recognised as a fundamental or common law right and the standards that need to be satisfied in order to impose any restrictions on it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the year 2012, the Planning Commission constituted a Group of Experts under the chairmanship of Justice AP Shah, Former Chief Justice of the Delhi High Court to recommend a &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;potential privacy framework&lt;/a&gt; for  privacy in India. Previously in 2011 the Department of Personnel and Training had prepared a &lt;a href="https://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf"&gt;draft Bill on Right to Privacy &lt;/a&gt;which has yet to materialize into a comprehensive legislation on privacy. In 2014, a version of the revised Right to Privacy Bill was &lt;a href="http://cis-india.org/internet-governance/blog/leaked-privacy-bill-2014-v-2011"&gt;leaked&lt;/a&gt;. Amendments to the Bill  aim to protect individuals against misuse of their data by the government or private agencies, and is in the process of being &lt;a href="http://www.newindianexpress.com/nation/Centre-Giving-Final-Touches-to-Right-to-Privacy-Bill/2015/03/17/article2717271.ece"&gt;finalized by the Indian Government&lt;/a&gt;&lt;a href="http://www.newindianexpress.com/nation/Centre-Giving-Final-Touches-to-Right-to-Privacy-Bill/2015/03/17/article2717271.ece"&gt;. &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Of late, privacy concerns have gained importance in India due to the initiation of national programmes like the UID Scheme, DNA Profiling, the National Encryption Policy, etc. attracting criticism for their impact on the right to privacy. For example, DeitY introduced a draft National Encryption Policy in September this year to prescribe methods for encryption. However, the policy would have posed significant restriction on the ability of citizens to encrypt online communication. Backlash from the citizens, industry, social media and privacy experts led the Government to withdraw  the policy as the measures included made the information system vulnerable in every sense.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier this year, the Apex Court gave a &lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt;historical&lt;/a&gt;&lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt; judgement&lt;/a&gt; by striking down section 66A of the IT (Amendment) Act 2008. The Court upheld section 69A and the Information Technology  (Procedure &amp;amp; Safeguards for Blocking for Access of Information by Public) Rules 2009 to be constitutionally valid, which accords the government with the authority to block transmission of information and websites when it deems it as necessary for reasons like sovereignty and integrity of India, public order, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another government initiative which has generated considerable controversy for its threat to privacy is the UID project which aims to issue a unique identification number to all citizens by the Unique Identification Authority of India, which can be authenticated and verified online. In August this year, the Supreme Court, &lt;a href="http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841"&gt;vide an interim order&lt;/a&gt;, restricted the use of Aadhaar by declaring it to be optional for availing government benefits and services. Though the Government contended the right to privacy as a fundamental right in India, the Court deferred this issue to a larger Constitutional Bench, and the Supreme Court upheld its decision yet again in the month of October.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the &lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;d&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;raft&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt; Human DNA &lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;P&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;rofiling &lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;B&lt;/a&gt;&lt;a href="http://www.dbtindia.nic.in/wp-content/uploads/Human-DNA-Profiling-Bill.pdf"&gt;ill 2015&lt;/a&gt; is being questioned on grounds of privacy invasion on  a massive scale as it aims to collect and store the DNA samples of criminals, suspects, volunteers, and victims and regulate DNA laboratories and DNA sampling for use by law enforcement agencies. The Bill also fails to include comprehensive privacy safeguards and provisions regarding collection of DNA samples with or without the consent of an individual, making individual privacy an important concern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Going by these ongoing debates, one can say that Privacy as a right has primarily evolved by way of judicial interpretation and continues to evolve in light of several controversial Government policies, projects and schemes. However its development is often undermined by tension between several competing national interests which calls for clear guidelines to protect this inviolable right of the citizens.&lt;/p&gt;
&lt;h3&gt;&lt;a href="https://cis-india.org/internet-governance/blog/gsma-conference-invite.pdf" class="internal-link"&gt; 
&lt;hr /&gt;
&lt;b&gt;Download the Invite&lt;/b&gt;&lt;/a&gt;&lt;/h3&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology'&gt;https://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-10-24T07:45:26Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception">
    <title>Indian PM Narendra Modi’s digital dream gets bad reception</title>
    <link>https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception</link>
    <description>
        &lt;b&gt;As Indian Prime Minister Narendra Modi told Silicon Valley’s most powerful chief executives this week how his government “attacked poverty by using the power of networks and mobile phones’’, the entire population of the state of Kashmir remained offline — by order of the state.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Amanda Hodge was published in &lt;a class="external-link" href="http://www.theaustralian.com.au/news/world/indian-pm-narendra-modis-digital-dream-gets-bad-reception/story-e6frg6so-1227547929688"&gt;the Australian&lt;/a&gt; on September 29, 2015. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“I see technology as a means to empower and as a tool that bridges the distance between hope and opportunity,” Mr Modi said yesterday on a trip in which he will also discuss development at the UN.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Earlier, in a “town hall” meeting with Facebook chief Mark Zuckerberg Mr Modi hailed the power of social media networks that gave governments the opportunity to correct themselves “every five minutes”, rather than every five years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His remarks during his Digital India tour of the US west coast sparked a storm of Twitter protest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The northern state’s former chief minister Omar Abdullah, who noted the “irony of listening to Prime Minister Modi lecturing about connected digital India, while we are totally disconnected”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ban on mobile and broadband internet in Jammu and Kashmir was imposed last Friday, the beginning of the Muslim holiday of Eid-ul-Zuha during which animals are slaughtered and the meat fed to the poor, for fear social media could inflame tensions over the state government’s decision to enforce a beef ban.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was to have lasted 24 hours but — notwithstanding Twitter feedback — was extended twice as a “precautionary” measure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Mr Modi outlined his dreams of a broadband network connecting the country’s most remote communities, millions of New Delhi mobile phone users continued their daily wrestle with line dropouts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We are bringing technology, transparency, efficiency, ease and effectiveness in governance,” he said, as in New Delhi the government talked of pulling down more mobile towers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Centre for Internet and Society director Sunil Abraham said yesterday: “Schizophrenia between rhetoric and reality (on digital policy) is the global standard for all world leaders.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Politicians in opposition are invariably opposed to surveillance and in favour of free speech but the very day that politician assumes office even if it is someone as splendid as Barack Obama, they change their opinions on these topics and become pro-surveillance and pro-censorship.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Certainly successive Indian governments have had a patchy record on such issues. Last March India’s activist Supreme Court struck down a controversial section of the Information Technology Act which made posting information of a “grossly offensive or menacing character” punishable by up to three years’ jail.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That month police in northern Uttar Pradesh arrested a teenager for a Facebook post, which they said “carried derogatory language against a community”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous cases under the former Congress-led government include that of a university professor detained for posting a cartoon about the chief minister of West Bengal and the arrest of two young women over a Facebook post criticising the shutdown of Mumbai following the death of a Hindu right politician.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Mr Modi’s government welcomed the Supreme Court ruling as a “landmark day for freedom of speech and expression”, last month it attempted to block 857 random porn sites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notwithstanding the gulf between Mr Modi’s digital dream rhetoric and the reality at home, his second US visit in 17 months has reaped dividends. Google has committed to a joint initiative to roll out free Wi-Fi to 500 railway stations across the country, and Qualcomm has pledged a $US150 million ($213m) tech startup fund.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But Mr Abraham warned of the potential for such investments to compromise net neutrality — the principle of allowing internet users access to all content and applications.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception'&gt;https://cis-india.org/internet-governance/news/the-australian-amanda-hodge-september-29-2015-indian-pm-narendra-modi-digital-dream-gets-bad-reception&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2015-09-29T15:23:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-26-09-2015-sunil-abraham-hits-and-misses-with-draft-encryption-policy">
    <title>Hits and Misses With the Draft Encryption Policy</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-26-09-2015-sunil-abraham-hits-and-misses-with-draft-encryption-policy</link>
    <description>
        &lt;b&gt;Most encryption standards are open standards. They are developed by open participation in a publicly scrutable process by industry, academia and governments in standard setting organisations (SSOs) using the principles of “rough consensus” – sometimes established by the number of participants humming in unison – and “running code” – a working implementation of the standard. The open model of standards development is based on the Free and Open Source Software (FOSS) philosophy that “many eyes make all bugs shallow”.

&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://thewire.in/2015/09/26/hits-and-misses-with-the-draft-encryption-policy-11708/"&gt;published in the Wire&lt;/a&gt; on September 26, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This model has largely been a success but as Edward Snowden in his revelations has told us, the US with its large army of mathematicians has managed to compromise some of the standards that have been developed under public and peer scrutiny. Once a standard is developed, its success or failure depends on voluntary adoption by various sections of the market – the private sector, government (since in most markets the scale of public procurement can shape the market) and end-users. This process of voluntary adoption usually results in the best standards rising to the top. Mandates on high quality encryption standards and minimum key-sizes are an excellent idea within the government context to ensure that state, military, intelligence and law enforcement agencies are protected from foreign surveillance and traitors from within. In other words, these mandates are based on a national security imperative.&lt;br /&gt;&lt;br /&gt;However, similar mandates for corporations and ordinary citizens are based on a diametrically opposite imperative – surveillance. Therefore these mandates usually require the use of standards that governments can compromise usually via a brute force method (wherein supercomputers generate and attempt every possible key) and smaller key-lengths for it is generally the case that the smaller the key-length the quicker it is for the supercomputers to break in. These mandates, unlike the ones for state, military, intelligence and law enforcement agencies, interfere with the market-based voluntary adoption of standards and therefore are examples of inappropriate regulation that will undermine the security and stability of information societies.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Plain-text storage requirement&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;First, the draft policy mandates that Business to Business (B2B) users and Consumer to Consumer (C2C) users store equivalent plain text (decrypted versions) of their encrypted communications and storage data for 90 days from the date of transaction. This requirement is impossible to comply with for three reasons. Foremost, encryption for web sessions are based on dynamically generated keys and users are not even aware that their interaction with web servers (including webmail such as Gmail and Yahoo Mail) are encrypted. Next, from a usability perspective, this would require additional manual steps which no one has the time for as part of their daily usage of technologies. Finally, the plain text storage will become a honey pot for attackers. In effect this requirement is as good as saying “don’t use encryption”.&lt;br /&gt;&lt;br /&gt;Second, the policy mandates that B2C and “service providers located within and outside India, using encryption” shall provide readable plain-text along with the corresponding encrypted information using the same software/hardware used to produce the encrypted information when demanded in line with the provisions of the laws of the country. From the perspective of lawful interception and targeted surveillance, it is indeed important that corporations cooperate with Indian intelligence and law enforcement agencies in a manner that is compliant with international and domestic human rights law. However, there are three circumstances where this is unworkable: 1) when the service providers are FOSS communities like the TOR project which don’t retain any user data and as far as we know don’t cooperate with any government; 2) when the service provider provides consumers with solutions based on end-to-end encryption and therefore do not hold the private keys that are required for decryption; and 3) when the Indian market is too small for a foreign provider to take requests from the Indian government seriously.&lt;br /&gt;&lt;br /&gt;Where it is technically possible for the service provider to cooperate with Indian law enforcement and intelligence, greater compliance can be ensured by Indian participation in multilateral and multi-stakeholder internet governance policy development to ensure greater harmonisation of substantive and procedural law across jurisdictions. Options here for India include reform of the Mutual Legal Assistance Treaty (MLAT) process and standardisation of user data request formats via the Internet Jurisdiction Project.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Regulatory design&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Governments don’t have unlimited regulatory capability or capacity. They have to be conservative when designing regulation so that a high degree of compliance can be ensured. The draft policy mandates that citizens only use “encryption algorithms and key sizes will be prescribed by the government through notification from time to time.” This would be near impossible to enforce given the burgeoning multiplicity of encryption technologies available and the number of citizens that will get online in the coming years. Similarly the mandate that “service providers located within and outside India…must enter into an agreement with the government”, “vendors of encryption products shall register their products with the designated agency of the government” and “vendors shall submit working copies of the encryption software / hardware to the government along with professional quality documentation, test suites and execution platform environments” would be impossible for two reasons: that cloud based providers will not submit their software since they would want to protect their intellectual property from competitors, and that smaller and non-profit service providers may not comply since they can’t be threatened with bans or block orders.&lt;br /&gt;&lt;br /&gt;This approach to regulation is inspired by license raj thinking where enforcement requires enforcement capability and capacity that we don’t have. It would be more appropriate to have a “harms”-based approach wherein the government targets only those corporations that don’t comply with legitimate law enforcement and intelligence requests for user data and interception of communication.&lt;br /&gt;&lt;br /&gt;Also, while the “Technical Advisory Committee” is the appropriate mechanism to ensure that policies remain technologically neutral, it does not appear that the annexure of the draft policy, i.e. “Draft Notification on modes and methods of Encryption prescribed under Section 84A of Information Technology Act 2000”, has been properly debated by technical experts. According to my colleague Pranesh Prakash, “of the three symmetric cryptographic primitives that are listed – AES, 3DES, and RC4 – one, RC4, has been shown to be a broken cipher.”&lt;br /&gt;&lt;br /&gt;The draft policy also doesn’t take into account the security requirements of the IT, ITES, BPO and KPO industries that handle foreign intellectual property and personal information that is protected under European or American data protection law. If clients of these Indian companies feel that the Indian government would be able to access their confidential information, they will take their business to competing countries such as the Philippines.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;And the good news is…&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the second objective of the policy, which encourages “wider usage of digital Signature by all entities including Government for trusted communication, transactions and authentication” is laudable but should have ideally been a mandate for all government officials as this will ensure non-repudiation. Government officials would not be able to deny authorship for their communications or approvals that they grant for various applications and files that they process.&lt;br /&gt;&lt;br /&gt;Second, the setting up of “testing and evaluation infrastructure for encryption products” is also long overdue. The initiation of “research and development programs … for the development of indigenous algorithms and manufacture of indigenous products” is slightly utopian because it will be a long time before indigenous standards are as good as the global state of the art but also notable as an important start.&lt;br /&gt;&lt;br /&gt;The more important step for the government is to ensure high quality Indian participation in global SSOs and contributions to global standards. This has to be done through competition and market-based mechanisms wherein at least a billion dollars from the last spectrum auction should be immediately spent on funding existing government organisations, research organisations, independent research scholars and private sector organisations. These decisions should be made by peer-based committees and based on publicly verifiable measures of scientific rigour such as number of publications in peer-reviewed academic journals and acceptance of “running code” by SSOs.&lt;br /&gt;&lt;br /&gt;Additionally the government needs to start making mathematics a viable career in India by either employing mathematicians directly or funding academic and independent research organisations who employ mathematicians. The basis of all encryptions standards is mathematics and we urgently need the tribe of Indian mathematicians to increase dramatically in this country.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-26-09-2015-sunil-abraham-hits-and-misses-with-draft-encryption-policy'&gt;https://cis-india.org/internet-governance/blog/the-wire-26-09-2015-sunil-abraham-hits-and-misses-with-draft-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Standards</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>FOSS</dc:subject>
    
    
        <dc:subject>B2B</dc:subject>
    

   <dc:date>2015-09-26T16:46:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance">
    <title>Mastering the Art of Keeping Indians Under Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance</link>
    <description>
        &lt;b&gt;In its first year in office, the National Democratic Alliance government has been notably silent on the large-scale surveillance projects it has inherited. This ended last week amidst reports the government is hastening to complete the Central Monitoring System (CMS) within the year.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://thewire.in/2015/05/30/mastering-the-art-of-keeping-indians-under-surveillance-2756/"&gt;the Wire&lt;/a&gt; on May 30, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a statement to the Rajya Sabha in 2009, Gurudas Kamat, the  erstwhile United Progressive Alliance’s junior communications minister,  said the CMS was a project to enable direct state access to all  communications on mobile phones, landlines, and the Internet in India.  He meant the government was building ‘backdoors’, or capitalising on  existing ones, to enable state authorities to intercept any  communication at will, besides collecting large amounts of metadata,  without having to rely on private communications carriers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not new. Legally sanctioned backdoors have existed in Europe  and the USA since the early 1990s to enable direct state interception of  private communications. But the laws of those countries also subject  state surveillance to a strong regime of state accountability,  individual freedoms, and privacy. This regime may not be completely  robust, as Edward Snowden’s revelations have shown, but at least it  exists on paper. The CMS is not illegal by itself, but it is coloured by  the compromised foundation of Indian surveillance law upon which it is  built.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Surveillance and social control&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS is a technological project. But technology does not exist in  isolation; it is contextualised by law, society, politics, and history.  Surveillance and the CMS must be seen in the same contexts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The great sociologist Max Weber claimed the modern state could not  exist without monopolising violence. It seems clear the state also  entertains the equal desire to monopolise communications technologies.  The state has historically shaped the way in which information is  transmitted, received, and intercepted. From the telegraph and radio to  telephones and the Internet, the state has constantly endeavoured to  control communications technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Law is the vehicle of this control. When the first telegraph line was  laid down in India, its implications for social control were instantly  realised; so the law swiftly responded by creating a state monopoly over  the telegraph. The telegraph played a significant role in thwarting the  Revolt of 1857, even as Indians attempted to destroy the line; so the  state consolidated its control over the technology to obviate future  contests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This controlling impulse was exercised over radio and telephones,  which are also government monopolies, and is expressed through the  state’s surveillance prerogative. On the other hand, because of its open  and decentralised architecture, the Internet presents the single  greatest threat to the state’s communications monopoly and dilutes its  ability to control society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interception in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The power to intercept communications arises with the regulation of  telegraphy. The first two laws governing telegraphs, in 1854 and 1860,  granted the government powers to take possession of telegraphs “on the  occurrence of any public emergency”. In 1876, the third telegraph law  expanded this threshold to include “the interest of public safety”.  These are vague phrases and their interpretation was deliberately left  to the government’s discretion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This unclear formulation was replicated in the Indian Telegraph Act  of 1885, the fourth law on the subject, which is currently in force  today. The 1885 law included a specific power to wiretap. Incredibly,  this colonial surveillance provision survived untouched for 87 years  even as countries across the world balanced their surveillance powers  with democratic safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Constitution requires all deprivations of free speech to  conform to any of nine grounds listed in Article 19(2). Public  emergencies and public safety are not listed. So Indira Gandhi amended  the wiretapping provision in 1972 to insert five grounds copied from  Article 19(2). However, the original unclear language on public  emergencies and public safety remained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indira Gandhi’s amendment was ironic because one year earlier she had  overseen the enactment of the Defence and Internal Security of India  Act, 1971 (DISA), which gave the government fresh powers to wiretap.  These powers were not subject to even the minimal protections of the  Telegraph Act. When the Emergency was imposed in 1975, Gandhi’s  government bypassed her earlier amendment and, through the DISA Rules,  instituted the most intensive period of surveillance in Indian history.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although DISA was repealed, the tradition of having parallel  surveillance powers for fictitious emergencies continues to flourish.  Wiretapping powers are also found in the Maharashtra Control of  Organised Crime Act, 1999 which has been copied by Karnataka, Andhra  Pradesh, Arunachal Pradesh, and Gujarat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Procedural weaknesses&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, the Telegraph Act with its 1972 amendment continued to  weather criticism through the 1980s. The wiretapping power was largely  exercised free of procedural safeguards such as the requirements to  exhaust other less intrusive means of investigation, minimise  information collection, limit the sharing of information, ensure  accountability, and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This changed in 1996 when the Supreme Court, on a challenge brought  by PUCL, ordered the government to create a minimally fair procedure.  The government fell in line in 1999, and a new rule, 419A, was put into  the Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike the United States, where a wiretap can only be ordered by a  judge when she decides the state has legally made its case for the  requested interception, an Indian wiretap is sanctioned by a bureaucrat  or police officer. Unlike the United Kingdom, which also grants  wiretapping powers to bureaucrats but subjects them to two additional  safeguards including an independent auditor and a judicial tribunal, an  Indian wiretap is only reviewed by a committee of the original  bureaucrat’s colleagues. Unlike most of the world which restricts this  power to grave crime or serious security needs, an Indian wiretap can  even be obtained by the income tax department.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 419A certainly creates procedure, but it lacks crucial  safeguards that impugn its credibility. Worse, the contours of rule 419A  were copied in 2009 to create flawed procedures to intercept the  content of Internet communications and collect metadata. Unlike rule  419A, these new rules issued under sections 69(2) and 69B(3) of the  Information Technology Act 2000 have not been constitutionally  scrutinised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Three steps to tap&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite its monopoly, the state does not own the infrastructure of  telephones. It is dependent on telecommunications carriers to physically  perform the wiretap. Indian wiretaps take place in three steps: a  bureaucrat authorises the wiretap; a law enforcement officer serves the  authorisation on a carrier; and, the carrier performs the tap and  returns the information to the law enforcement officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are many moving parts in this process, and so there are leaks.  Some leaks are cynically motivated such as Amar Singh’s lewd  conversations in 2011. But others serve a public purpose: Niira Radia’s  conversations were allegedly leaked by a whistleblower to reveal serious  governmental culpability. Ironically, leaks have created accountability  where the law has failed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS will prevent leaks by installing servers on the transmission  infrastructure of carriers to divert communications to regional  monitoring centres. Regional centres, in turn, will relay communications  to a centralised monitoring centre where they will be analysed, mined,  and stored. Carriers will no longer perform wiretaps; and, since this  obviates their costs of compliance, they are willing participants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its annual report of 2012, the Centre for the Development of  Telematics (C-DOT), a state-owned R&amp;amp;D centre tasked with designing  and creating the CMS, claimed the system would intercept 3G video, ILD,  SMS, and ISDN PRI communications made through landlines or mobile phones  – both GSM and CDMA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are unclear reports of an expansion to intercept Internet data,  such as emails and browsing details, as well as instant messaging  services; but these remain unconfirmed. There is also a potential  overlap with another secretive Internet surveillance programme being  developed by the Defence R&amp;amp;D Organisation called NETRA, no details  of which are public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Culmination of surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its present state, Indian surveillance law is unable to bear the  weight of the CMS project, and must be vastly strengthened to protect  privacy and accountability before the state is given direct access to  communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there is a larger way to understand the CMS in the context of  Indian surveillance. Christopher Bayly, the noted colonial historian,  writes that when the British set about establishing a surveillance  apparatus in colonised India, they came up against an established system  of indigenous intelligence gathering. Colonial rule was at its most  vulnerable at this point of intersection between foreign surveillance  and indigenous knowledge, and the meeting of the two was riven by  suspicion. So the colonial state simply co-opted the interface by  creating institutions to acquire local knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS is also an attempt to co-opt the interface between government  and the purveyors of communications; because if the state cannot  control communications, it cannot control society. Seen in this light,  the CMS represents the natural culmination of the progression of Indian  surveillance. No challenge against it that does not question the  construction of the modern Indian state will be successful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance'&gt;https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-23T12:26:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india">
    <title>Paper-thin Safeguards and Mass Surveillance in India</title>
    <link>https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india</link>
    <description>
        &lt;b&gt;The Indian government's new mass surveillance systems present new threats to the right to privacy. Mass interception of communication, keyword searches and easy access to particular users' data suggest that state is moving  towards unfettered large-scale monitoring of communication. This is particularly ominous given that our privacy safeguards remain inadequate even for targeted surveillance and its more familiar pitfalls.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;This need for better safeguards was made apparent when the Gujarat government illegally placed a young  woman  under surveillance  for obviously illegitimate purposes, demonstrating that the current system is prone to egregious misuse.  While the lack of proper safeguards is problematic even in the context of targeted surveillance, it threatens the health of our democracy in the context of mass surveillance. The proliferation of mass surveillance means that vast amounts of data are collected easily using information technology, and lie relatively unprotected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This paper examines the right to privacy and surveillance in India, in an effort to highlight more clearly the problems that are likely to emerge with mass surveillance of communication by the Indian Government. It does this by teasing out Indian privacy rights jurisprudence and the concerns underpinning it, by considering its utility in the context of mass surveillance and then explaining the kind of harm that might result if mass surveillance continues unchecked.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first part of this paper threads together the evolution of Indian constitutional principles on privacy in the context of communication surveillance as well as search and seizure. It covers discussions of privacy in the context of our fundamental rights by the draftspersons of our constitution, and then moves on to the ways in which the Supreme Court of India has been reading the right to privacy into the constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second part of this paper discusses the difference between mass surveillance and targeted surveillance, and international human rights principles that attempt to mitigate the ill effects of mass surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The concluding part of the paper discusses mass surveillance in India, and makes a case for expanding our existing privacy safeguards to protect the right to privacy in a meaningful manner in face of state surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/paper-thin-safeguards.pdf" class="external-link"&gt;Download the paper here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india'&gt;https://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-06-20T10:17:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance">
    <title>Targeting surveillance</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance</link>
    <description>
        &lt;b&gt;In the fall of 2005, Scotland Yard raided a flat in west London and arrested a suspected al-Qaeda militant known by a teasing Arabic nickname, Irhabi (“Terrorist”) 007.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article by Ajai Sreevatsan was &lt;a class="external-link" href="http://www.thehindu.com/sunday-anchor/targeting-surveillance/article6731202.ece"&gt;published in the Hindu&lt;/a&gt; on December 28, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The similarities between Irhabi 007, later identified as Younis Tsouli, and India’s Mehdi Masoor Biswas are uncanny.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Neither  participated in any terror attack. Their reputation stems from an  alleged involvement as cyber propagandists for proto-terror groups —  Irhabi was distributing manuals and teaching online seminars on behalf  of the emerging al-Qaeda faction in Iraq, while Mehdi is alleged to be  an IS sympathiser. Both in their early 20s with cover identities during  the day, and separated by a decade in technological evolution.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Such  expertise within terror groups is hardly surprising, says Sunil Abraham  of the Centre for Internet and Society. “Any organisation engaged in a  war for hearts and minds and oil fields will exploit contemporary  technology to its fullest potential,” he says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Irhabi  currently serves a 16-year jail term, while Mehdi awaits his trial.  What their cases highlight is that the phenomenon of young, tech-savvy  armchair radicals is nothing new.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Research done at  Israel’s Haifa University, which tracks the proliferation of terrorist  websites, shows that the number of such sites went up from fewer than  100 in the late-1990s to more than 4,800 in just a decade. There is also  credible evidence that an al-Qaeda website posted a sketched-out  proposal for the 2004 Madrid bombings three months before the attack.  Another macabre example is the crowd-sourcing effort launched in 2005 by  the Victorious Army Group to build its website. By the competition’s  rules, the winner would get to fire a rocket at an American base.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As  Indian agencies gear up to respond to similar online threats in this  part of the world, Mr. Abraham says India should not repeat the mistakes  made by the West over the previous decade. “We should not get caught up  in big data surveillance,” he says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Surveillance is  like salt. It could be counter-productive even if slightly in excess.  Ideally, surveillance must be targeted. Indiscriminate surveillance just  increases the size of the haystack, making it difficult to find the  needles,” Mr. Abraham says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Even in the case of  Mehdi, his identity was uncovered not by online spying but by Channel 4  which did some old-fashioned detective work,” he says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In  any case, recent events show that the threat of online terror  propaganda might be overblown. Much like online activism, it is subject  to the law of diminishing returns.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A set of letters sent by newly recruited volunteers of IS was leaked to the French newspaper &lt;i&gt;Le Figaro &lt;/i&gt;earlier  this month and it shows youngsters complaining about being made to do  the dishes or the Iraqi winter. One of them wrote: “I’m fed up to the  back teeth. My iPod no longer works out here. I have got to come home.”  Of the estimated 1,100 young French who are believed to have joined the  IS, more than 100 have already returned.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The IS may  have Twitter on its side. But the harsh realities of Iraq and the  gruesome ideology behind the slick doctrinal videos are a lot harder to  sell.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Mr. Abraham says there is no such thing as a  Twitter revolution or a social media terror group. “Such statements  underestimate the role of ideology and human beings,” he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance'&gt;https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-30T14:10:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights">
    <title>Security and Surveillance: A public discussion on Optimizing Security while Safeguarding Human Rights</title>
    <link>https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to a public discussion on optimizing security and safeguarding human rights at its Bangalore office on Friday, December 19th, 2014, 16:00 to 18:00.&lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society, in collaboration with Privacy International UK, has undertaken exploratory research into surveillance, security, and the security market in India.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Through this research, we hope to understand and document policy and law associated with security, surveillance, and the security market in India and learn about the regulation of security and related technologies such as encryption, filtering, monitoring software, and interception equipment. We also hope to understand the import and export policy regime for dual use technologies.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Such findings will be critical in creating evidence based research to inform security policy and regulation in India and work towards enabling regulatory frameworks that optimize the nation’s security while protecting the rights of citizens.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights'&gt;https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-19T08:46:34Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/free-speech-and-surveillance">
    <title>Free Speech and Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/free-speech-and-surveillance</link>
    <description>
        &lt;b&gt;Gautam Bhatia examines the constitutionality of surveillance by the Indian state. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Indian surveillance regime has been the subject of &lt;a href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/?_php=true&amp;amp;_type=blogs&amp;amp;_r=0"&gt;discussion&lt;/a&gt; for quite some time now. Its nature and scope is controversial. The Central Monitoring System, through which the government can obtain direct access to call records, appears to have the potential to be used for bulk surveillance, although official claims emphasise that it will only be implemented in a targeted manner. The &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/Govt-to-launch-internet-spy-system-Netra-soon/articleshow/28456222.cms"&gt;Netra system&lt;/a&gt;, on the other hand, is certainly about dragnet collection, since it detects the communication, via electronic media, of certain “keywords” (such as “attack”, “bomb”, “blast” and “kill”), no matter what context they are used in, and no matter who is using them.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance is quintessentially thought to raise concerns about &lt;i&gt;privacy&lt;/i&gt;. Over a &lt;a href="http://indiankanoon.org/doc/845196/"&gt;series&lt;/a&gt; of &lt;a href="http://news.rediff.com/report/2010/apr/26/phone-tapping-what-1997-supreme-court-verdict-says.htm"&gt;decisions&lt;/a&gt;, the Indian Supreme Court has read in the right to privacy into Article 21’s guarantee of the right to life and personal liberty. Under the Supreme Court’s (somewhat cloudy) precedents, privacy may only be infringed if there is a compelling State interest, and if the restrictive law is narrowly tailored – that is, it does not infringe upon rights to an extent greater than it needs to, in order to fulfill its goal. It is questionable whether bulk surveillance meets these standards.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance, however, does not only involve privacy rights. It also implicated Article 19 – in particular, the Article 19(1)(a) guarantee of the freedom of expression, and the 19(1)(c) guarantee of the freedom of association.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Previously on this blog, we have discussed the “chilling effect” in relation to free speech. The chilling effect evolved in the context of defamation cases, where a combination of exacting standards of proof, and prohibitive damages, contributed to create a culture of self-censorship, where people would refrain from voicing even legitimate criticism for fear of ruinous defamation lawsuits. The chilling effect, however, is not restricted merely to defamation, but arises in free speech cases more generally, where vague and over-broad statutes often leave the border of the permitted and the prohibited unclear.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Indeed, a few years before it decided &lt;/span&gt;&lt;i&gt;New York Times v. Sullivan&lt;/i&gt;&lt;span&gt;, which brought in the chilling effect doctrine into defamation and free speech law, the American Supreme Court applies a very similar principle in a surveillance case. In &lt;/span&gt;&lt;a href="http://supreme.justia.com/cases/federal/us/357/449/case.html"&gt;&lt;i&gt;NAACP v. Alabama&lt;/i&gt;&lt;/a&gt;&lt;span&gt;, the National Association for the Advancement of Coloured People (NAACP), which was heavily engaged in the civil rights movement in the American deep South, was ordered by the State of Alabama to disclose its membership list. NAACP challenged this, and the Court held in its favour. It specifically connected freedom of speech, freedom of association, and the impact of surveillance upon both:&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; “Effective advocacy of both public and private points of view, particularly controversial ones, is undeniably enhanced by group association, as this Court has more than once recognized by remarking upon the close nexus between the freedoms of speech and assembly. It is beyond debate that freedom to engage in association for the advancement of beliefs and ideas is an inseparable aspect of the “liberty” assured by the Due Process Clause of the Fourteenth Amendment, which embraces freedom of speech. Of course, it is immaterial whether the beliefs sought to be advanced by association pertain to political, economic, religious or cultural matters, and state action which may have the&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;effect of curtailing the freedom to associate is subject to the closest scrutiny… it is hardly a novel perception that &lt;span&gt;compelled disclosure&lt;/span&gt; of affiliation with groups engaged in advocacy may constitute&lt;/i&gt; [an]&lt;i&gt; effective a restraint on freedom of association… this Court has recognized the vital relationship between freedom to associate and privacy in one’s associations. &lt;span&gt;Inviolability of privacy in group association may in many circumstances be indispensable to preservation of freedom of association, particularly where a group espouses dissident beliefs&lt;/span&gt;.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;In other words, if persons are not assured of privacy in their association with each other, they will tend to self-censor both who they associate with, and what they say to each other, especially when unpopular groups, who have been historically subject to governmental or social persecution, are involved. Indeed, this was precisely the &lt;a href="https://www.aclu.org/national-security/aclu-v-clapper-challenge-nsa-mass-phone-call-tracking"&gt;argument&lt;/a&gt; that the American Civil Liberties Union (ACLU) made in its constitutional challenge to PRISM, the American bulk surveillance program. In addition to advancing a Fourth Amendment argument from privacy, the ACLU also made a First Amendment freedom of speech and association claim, arguing that the knowledge of bulk surveillance had made – or at least, was likely to have made – politically unpopular groups wary of contacting it for professional purposes (the difficulty, of course, is that any chilling effect argument effectively requires proving a negative).&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If this argument holds, then it is clear that Articles 19(1)(a) and 19(1)(c) are &lt;i&gt;prima facie&lt;/i&gt; infringed in cases of bulk – or even other forms of – surveillance. Two conclusions follow: &lt;i&gt;first&lt;/i&gt;, that any surveillance regime needs statutory backing. Under &lt;a href="http://indiankanoon.org/doc/493243/"&gt;Article 19(2),&lt;/a&gt; reasonable restrictions upon fundamental rights can only be imposed by &lt;i&gt;law&lt;/i&gt;, and not be executive fiat (the same argument applies to Article 21 as well).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Assuming that a statutory framework &lt;i&gt;is&lt;/i&gt; brought into force, the crucial issue then becomes whether the restriction is a reasonable one, in service of one of the stated 19(2) interests. The relevant part of Article 19(2) permits reasonable restrictions upon the freedom of speech and expression “in the interests of… the security of the State [and] public order.” The Constitution does not, however, provide a test for determining when a restriction can be legitimately justified as being “in the interests of” the security of the State, and of public order. There is not much relevant precedent with respect to the first sub-clause, but there happens to be an extensive – although conflicted – jurisprudence dealing with the public order exception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One line of cases – characterised by &lt;a href="http://indiankanoon.org/doc/553290/"&gt;&lt;i&gt;Ramji Lal Modi v. State of UP&lt;/i&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;and &lt;a href="http://indiankanoon.org/doc/1475436/"&gt;&lt;i&gt;Virendra v. State of Punjab&lt;/i&gt;&lt;/a&gt; – has held that the phrase “for the interests of” is of very wide ambit, and that the government has virtually limitless scope to make laws ostensibly for securing public order (this extends to prior restraint as well, something that Blackstone, writing in the 18&lt;sup&gt;th&lt;/sup&gt; century, found to be illegal!). The other line of cases, such as &lt;a href="http://indiankanoon.org/doc/1386353/"&gt;&lt;i&gt;Superintendent v. Ram Manohar Lohia&lt;/i&gt;&lt;/a&gt; and &lt;a href="http://www.indiankanoon.org/doc/341773/"&gt;&lt;i&gt;S. Rangarajan v. P. Jagjivan Ram&lt;/i&gt;&lt;/a&gt;, have required the government to satisfy a stringent burden of proof. In &lt;i&gt;Lohia&lt;/i&gt;, for instance, Ram Manohar Lohia’s conviction for encouraging people to break a tax law was reversed, the Court holding that the relationship between restricting free speech and a public order justification must be “proximate”. In &lt;i&gt;Rangarajan&lt;/i&gt;, the Court used the euphemistic image of a “spark in a powder keg”, to characterise the degree of proximity required. It is evident that under the broad test of &lt;i&gt;Ramji Lal Modi&lt;/i&gt;, a bulk surveillance system is likely to be upheld, whereas under the narrow test of &lt;i&gt;Lohia&lt;/i&gt;, it is almost certain not to be.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, if the constitutionality of surveillance comes to Court, three issues will need to be decided: &lt;i&gt;first&lt;/i&gt;, whether Articles 19(1)(a) and 19(1)(c) have been violated. &lt;i&gt;Secondly&lt;/i&gt; – and if so – whether the “security of the State” exception is subject to the same standards as the “public order” exception (there is no reason why it should not be). And &lt;i&gt;thirdly&lt;/i&gt;, which of the two lines of precedent represent the correct understanding of Article 19(2)?&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;i&gt;Gautam Bhatia — @gautambhatia88 on Twitter — is a graduate of the National Law School of India University (2011), and has just received an LLM from the Yale Law School. He blogs about the Indian Constitution at &lt;a class="moz-txt-link-freetext" href="http://indconlawphil.wordpress.com/"&gt;http://indconlawphil.wordpress.com&lt;/a&gt;. Here at CIS, he blogs on issues of online freedom of speech and expression.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/free-speech-and-surveillance'&gt;https://cis-india.org/internet-governance/blog/free-speech-and-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Gautam Bhatia</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Netra</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Article 19(1)(a)</dc:subject>
    

   <dc:date>2014-07-07T04:59:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law">
    <title>The Constitutionality of Indian Surveillance Law: Public Emergency as a Condition Precedent for Intercepting Communications</title>
    <link>https://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law</link>
    <description>
        &lt;b&gt;Bedavyasa Mohanty analyses the nuances of interception of communications under the Indian Telegraph Act and the Indian Post Office Act. In this post he explores the historical bases of surveillance law in India and examines whether the administrative powers of intercepting communications  are Constitutionally compatible.&lt;/b&gt;
        &lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;State authorised surveillance in India derives its basis from two colonial legislations; §26 of the Indian Post Office Act, 1898 and §5 of the Telegraph     Act, 1885 (hereinafter the Act) provide for the interception of postal articles&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; and messages transmitted     via telegraph&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; respectively. Both of these sections, which are analogous, provide that the powers laid down     therein can only be invoked on the occurrence of a public emergency or in the interest of public safety. The task of issuing orders for interception of     communications is vested in an officer authorised by the Central or the State government. This blog examines whether the preconditions set by the     legislature for allowing interception act as adequate safeguards. The second part of the blog analyses the limits of discretionary power given to such     authorised officers to intercept and detain communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance by law enforcement agencies constitutes a breach of a citizen’s Fundamental Rights of privacy and the Freedom of Speech and Expression. It     must therefore be justified against compelling arguments against violations of civil rights. Right to privacy in India has long been considered too ‘broad     and moralistic’&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; to be defined judicially. The judiciary, though, has been careful enough to not assign an unbound interpretation to it. It has recognised that the breach of privacy has to be balanced against a compelling public interest    &lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; and has to be decided on a careful examination of the facts of a certain case. In the same breath, Indian courts have also legitimised surveillance by the state as long as such surveillance is not illegal or unobtrusive and is within bounds    &lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;. While determining what constitutes legal surveillance, courts have rejected “prior judicial scrutiny” as a mandatory requirement and have held that administrative safeguards are sufficient to legitimise an act of surveillance.    &lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Conditions Precedent for Ordering Interception&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;§§5(2) of the Telegraph Act and 26(2) of the Indian Post Office Act outline a two tiered test to be satisfied before the interception of telegraphs or     postal articles. The first tier consists of sine qua nons in the form of an “occurrence of public emergency” or “in the interests of public safety.” The     second set of requirements under the provisions is “the interests of the sovereignty and integrity of India, the security of the State, friendly relations     with foreign States or public order or for preventing incitement to the commission of an offence.” While vesting the power of interception in     administrative officials, the sections contemplate a legal fiction where a public emergency exists and it is in the interest of sovereignty, integrity,     security of the state or for the maintenance of public order/ friendly relations with foreign states. The term “public emergency,” however, has not been     clearly defined by the legislature or by the courts. It thus vests arbitrary powers in a delegated official to order the interception of communication     violating one’s Fundamental Rights.&lt;/p&gt;
&lt;h3&gt;Tracing the History of the Expression “Public Emergency”&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The origins of the laws governing interception can be traced back to English laws of the late 19th Century; specifically one that imposed a penalty on a     postal officer who delayed or intercepted a postal article.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; This law guided the drafting of the Indian     Telegraph Act in 1885 that legitimised interception of communications by the state. The expression “public emergency” appeared in the original Telegraph     Act of 1885 and has been adopted in that form in all subsequent renderings of provisions relating to interception. Despite the contentious and vague nature     of the expression, no consensus regarding its interpretation seems to have been arrived at. One of the first post-independence analyses of this provision     was undertaken by the Law Commission in 1968. The 38th Law Commission in its report on the Indian Post Office Act, raised concerns about the     constitutionality of the expression. The Law Commission was of the opinion that the term not having been defined in the constitution cannot serve as a     reasonable ground for suspension of Fundamental Rights.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; It further urged that a state of public emergency     must be of such a nature that it is not secretive and is apparent to a reasonable man.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; It thus challenged     the operation of the act in its then current form where the determination of public emergency is the discretion of a delegated administrative official. The     Commission, in conclusion, implored the legislature to amend the laws relating to interception to bring them in line with the Constitution. This led to the     Telegraph (Amendment) Act of 1981. Questions regarding the true meaning of the expression and its potential misuse were brought up in both houses of the     Parliament during passing of the amendment. The Law Ministry, however, did not issue any additional clarifications regarding the terms used in the Act. Instead, the Government claimed that the expressions used in the Act are “exactly those that are used in the Constitution.”    &lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; It may be of interest to note here that the Constitution of India, neither uses nor defines the term “public emergency.” Naturally, it is not contemplated as a ground for reasonably restricting Fundamental Rights provided under Article 19(1).    &lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; Similarly, concerns regarding the potential misuse of the powers were defended with the logically     incompatible and factually inaccurate position that the law had not been misused in the past.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Locating “Public Emergency” within a Proclamation of Emergency under the Constitution (?)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Public emergency in not equivalent to a proclamation of emergency under Article 352 of the Constitution simply because it was first used in legislations     over six decades before the drafting of the Indian Constitution began. Besides, orders for interception of communications have also been passed when the     state was not under a proclamation of emergency. Moreover, public emergency is not the only prerequisite prescribed under the Act. §5(2) states that an     order for interception can be passed either on the occurrence of public emergency or in the interest of public safety. Therefore, the thresholds for the     satisfaction of both have to be similar or comparable. If the threshold for the satisfaction of public emergency is understood to be as high as a     proclamation of emergency then any order for interception can be passed easily under the guise of public safety. The public emergency condition will then     be rendered redundant. Public emergency is therefore a condition that is separate from a proclamation of emergency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a similar vein the Supreme Court has also clarified&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; that terms like “public emergency” and “any     emergency,” when used as statutory prerequisites, refer to the occurrence of different kinds of events. These terms cannot be equated with one another     merely on the basis of the commonality of one word.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court in Hukam Chand v. Union of India,&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; correctly stated that the terms public emergency     and public safety must “take colour from each other.” However, the court erred in defining public emergency as a situation that “raises problems concerning     the interest of the public safety, the sovereignty and integrity of India, the security of the State, friendly relations with foreign States or public     order or the prevention of incitement to the commission of an offence.” This cyclic definition does not lend any clarity to the interpretive murk     surrounding the term. The Act envisages public emergency as a sine qua non that must exist prior to a determination that there is a threat to public order     and sovereignty and integrity of the state. The court’s interpretation on the other hand would suggest that a state of public emergency can be said to     exist only when public order, sovereignty and integrity of the state are already threatened. Therefore, while conditions precedent exist for the exercise     of powers under §5(2) of the Act, there are no objective standards against which they are to be tested.&lt;/p&gt;
&lt;h3&gt;Interpretation of Threshold Requirements&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A similar question arose before the House of Lords in Liversidge v. Anderson.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; The case examined the     vires of an Act that vested an administrative authority with the conditional power to detain a person if there was reasonable cause to believe that the     person was of hostile origin. Therein, Lord Atkin dissenting with the majority opinion stated in no unclear terms that power vested in the secretary of     state was conditional and not absolute. When a conditional authority is vested in an administrative official but there aren’t any prescriptive guidelines     for the determination of the preconditions, then the statute has the effect of vesting an absolute power in a delegated official. This view was also upheld     by the Supreme Court in State of Madhya Pradesh v. Baldeo Prasad.&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; The court was of the opinion that a     statute must not only provide adequate safeguards for the protection of innocent citizens but also require the administrative authority to be satisfied as     to the existence of the conditions precedent laid down in the statute before making an order. If the statute failed to do so in respect of any condition     precedent then the law suffered from an infirmity and was liable to be struck down as invalid.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; The     question of the existence of public emergency, therefore being left to the sole determination of an administrative official is an absolute and arbitrary     power and is ultra vires the Constitution&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, in its original unamended form, §5 contained a provisio stating that a determination of public emergency was the sole authority of the     secretary of state and such a finding could not be challenged before a court of law. It is this provision that the government repealed through the     Telegraph (Amendment) Act of 1981 to bring it in line with Constitutional principles. The preceding discussion shows that the amendment did not have the     effect of rectifying the law’s constitutional infirmities. Nonetheless, the original Telegraph Act and its subsequent amendment are vital for understanding     the compatibility of surveillance standards with the Constitutional principles. The draconian provisio in the original act vesting absolute powers in an     administrative official illustrates that the legislative intent behind the drafting of a 130 year law cannot be relied on in today’s context. Vague terms     like public emergency that have been thoughtlessly adopted from a draconian law find no place in a state that seeks to guarantee to its citizens rights of     free speech and expression.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Interception of communications under the Telegraph Act and the Indian Post office act violate not only one’s privacy but also one’s freedom of speech and     expression. Besides, orders for the tapping of telephones violate not only the privacy of the individual in question but also that of the person he/she is     communicating with. Considering the serious nature of this breach it is absolutely necessary that the powers enabling such interception are not only     constitutionally authorised but also adequately safeguarded. The Fundamental Rights declared by Article 19(1) cannot be curtailed on any ground outside the     relevant provisions of Cls. 2-6.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; The restrictive clauses in Cls. (2)-(6) of Article 19 are exhaustive     and are to be strictly construed.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; Public emergency is not one of the conditions enumerated under     Article 19 for curtailing fundamental freedoms. Moreover, it lacks adequate safeguards by vesting absolute discretionary power in a non-judicial     administrative authority. Even if one were to ignore the massive potential for misuse of these powers, it is difficult to conceive that the interception     provisions would stand a scrutiny of constitutionality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Over the course of the last few years, India has been dangerously toeing the line that keeps it from turning into a totalitarian surveillance state.    &lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; In 2011, India was the third most intrusive state&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; with 1,699 requests for removal made to Google; in 2012 that number increased to 2529&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;. The media is abuzz with reports about the Intelligence Bureau wanting Internet Service Providers to log all customer details    &lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; and random citizens being videotaped by the Delhi Police for “looking suspicious.” It becomes     essential under these circumstances to question where the state’s power ends and a citizens’ privacy begins. Most of the information regarding projects     like the CMS and the CCTNS is murky and unconfirmed. But under the pretext of national security, government officials have refused to divulge any     information regarding the kind of information included within these systems and whether any accountability measures exist. For instance, there have been conflicting opinions from various ministers regarding whether the internet would also be under the supervision of the CMS    &lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;. Even more importantly, citizens are unaware of what rights and remedies are available to them in     instances of violation of their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The intelligence agencies that have been tasked with handling information collected under these systems have not been created under any legislation and     therefore not subject to any parliamentary oversight. Attempts like the Intelligence Services (Powers and Regulation) Bill, 2011 have been shelved and not     revisited since their introduction. The intelligence agencies that have been created through executive orders enjoy vast and unbridled powers that make     them accountable to no one&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;. Before, vesting the Indian law enforcement agencies with sensitive     information that can be so readily misused it is essential to ensure that a mechanism to check the use and misuse of that power exists. A three judge bench     of the Supreme Court has recently decided to entertain a Public Interest Litigation aimed at subjecting the intelligence agencies to auditing by the     Comptroller and Auditor General of India. But the PIL even if successful will still only manage to scratch the surface of all the wide and unbridled powers     enjoyed by the Indian intelligence agencies. The question of the constitutionality of interception powers, however, has not been subjected to as much     scrutiny as is necessary. Especially at a time when the government has been rumoured to have already obtained the capability for mass dragnet surveillance     such a determination by the Indian courts cannot come soon enough.&lt;/p&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Indian Post Office Act, 1898, § 26&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Indian Telegraph Act, 1885 § 5(2)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; PUCL v. Union of India, AIR 1997 SC 568&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Govind vs. State of Madhya Pradesh, (1975) 2 SCC 148&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Malak Singh vs. State Of Punjab &amp;amp; Haryana, AIR 1981 SC 760&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 3&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Law Commission, Indian Post Office Act, 1898 (38&lt;sup&gt;th&lt;/sup&gt; Law Commission Report) para 84&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; id&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; &lt;i&gt;Lok Sabha Debates&lt;/i&gt; , Minister of Communications, Shri H.N. Bahuguna, August 9, 1972&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; The Constitution of India, Article 358- Suspension of provisions of Article 19 during emergencies&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;i&gt;Lok Sabha Debates&lt;/i&gt; , Minister of Communications, Shri H.N. Bahuguna, August 9, 1972&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Hukam Chand v. Union of India, AIR 1976 SC 789&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Liversidge v. Anderson [1942] A.C. 206&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; State of M.P. v. Baldeo Prasad, AIR 1961 (SC) 293 (296)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Ghosh O.K. v. Joseph E.X. Air 1963 SC 812; 1963 Supp. (1) SCR 789&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Sakal Papers (P) Ltd. v. Union of India, AIR 1962 SC 305 (315); 1962 (3) SCR 842&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; &lt;i&gt;See&lt;/i&gt; Notable Observations- July to December 2012, Google Transparency Report, available at            &lt;a href="http://www.google.com/transparencyreport/removals/government/"&gt;http://www.google.com/transparencyreport/removals/government/&lt;/a&gt; (last             visited on July 2, 2014) (a 90% increase in Content removal requests by the Indian Government in the last year)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Willis Wee, &lt;i&gt;Google Transparency Report: India Ranks as Third ‘Snoopiest’ Country&lt;/i&gt;, July 6, 2011 available at            &lt;a href="http://www.techinasia.com/google-transparency-report-india/"&gt;http://www.techinasia.com/google-transparency-report-india/&lt;/a&gt; (last visited             on July 2, 2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; &lt;i&gt;See&lt;/i&gt; Notable Observations- July to December 2012, Google Transparency Report, available at            &lt;a href="http://www.google.com/transparencyreport/removals/government/"&gt;http://www.google.com/transparencyreport/removals/government/&lt;/a&gt; (last             visited on July 2, 2014) (a 90% increase in Content removal requests by the Indian Government in the last year)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; Joji Thomas Philip, &lt;i&gt;Intelligence Bureau wants ISPs to log all customer details, &lt;/i&gt;December 30, 2010             &lt;a href="http://articles.economictimes.indiatimes.com/2010-12-30/news/27621627_1_online-privacy-internet-protocol-isps"&gt; http://articles.economictimes.indiatimes.com/2010-12-30/news/27621627_1_online-privacy-internet-protocol-isps &lt;/a&gt; (last visited on July 2, 2014)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Deepa Kurup, &lt;i&gt;In the dark about ‘India’s Prism’&lt;/i&gt; June 16, 2013 available at             &lt;a href="http://www.thehindu.com/sci-tech/technology/in-the-dark-about-indias-prism/article4817903.ece"&gt; http://www.thehindu.com/sci-tech/technology/in-the-dark-about-indias-prism/article4817903.ece &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; Saikat Dutta, We, The Eavesdropped May 3, 2010 available at            &lt;a href="http://www.outlookindia.com/article.aspx?265191"&gt;http://www.outlookindia.com/article.aspx?265191&lt;/a&gt; (last visited on July 2, 2014)&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law'&gt;https://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bedaavyasa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>surveillance technologies</dc:subject>
    
    
        <dc:subject>Security</dc:subject>
    
    
        <dc:subject>Article 19(1)(a)</dc:subject>
    

   <dc:date>2014-08-04T04:52:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide">
    <title>Models for Surveillance and Interception of Communications Worldwide</title>
    <link>https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide</link>
    <description>
        &lt;b&gt;This is an evaluation of laws and practices governing surveillance and interception of communications in 9 countries. The countries evaluated represent a diverse spectrum not only in terms of their global economic standing but also their intrusive surveillance capabilities. The analysis is limited to the procedural standards followed by these countries for authorising surveillance and provisions for resolving interception related disputes.&lt;/b&gt;
        &lt;table class="grid" style="text-align: justify; "&gt;
&lt;thead&gt;&lt;/thead&gt;
&lt;/table&gt;
&lt;table class="plain" style="text-align: justify; "&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;th&gt;Sl. No.&lt;/th&gt; &lt;th&gt;Country&lt;/th&gt; &lt;th&gt;Legislation&lt;/th&gt; &lt;th&gt;Model&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;1.&lt;/td&gt;
&lt;td&gt;Australia&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Telecommunications (Interceptions and Access) Act, 1979&lt;/b&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;Governs interception of communications&lt;/li&gt;
&lt;li&gt;Relevant provisions: S. 3, 7, 6A, 34, 46&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt; Surveillance Devices Act, 2004 &lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Establishes procedure for obtaining warrants and for use of surveillance devices&lt;/li&gt;
&lt;li&gt;Relevant Provisions: S.13, 14&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;span style="text-align: justify; "&gt;Authorisation for surveillance is granted in the form of a warrant from a &lt;b&gt;Judge or a nominated member of the Administrative Appeals Tribunal&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;The warrant issuing authority must be satisfied that information obtained through interception shall assist in the investigation of a serious crime&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;The Acts provide a list of prescribed offences for which interception of communication may be authorized&lt;/li&gt;
&lt;li&gt;T&lt;span style="text-align: justify; "&gt;he Acts also specify certain federal and state law enforcement agencies that may undertake surveillance&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.&lt;/td&gt;
&lt;td&gt;Brazil&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;Federal Law No. 9,296, 1996&lt;/b&gt;&lt;span style="text-align: justify; "&gt;:&lt;/span&gt; 
&lt;ul&gt;
&lt;li&gt;Regulates wiretapping&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;span style="text-align: justify; "&gt;Authorisation for interception is granted on a &lt;b&gt;Judge’s order&lt;/b&gt; for a period of 15 days at a time&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Interception is only allowed for investigations into serious offences like drug smuggling, corruption murder and kidnapping&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;3.&lt;/td&gt;
&lt;td&gt;Canada&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Criminal Code, 1985&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Governs general rules of criminal procedure including search and seizure protocols&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Relevant Provision: §§ 184.2, 184.4&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Grants power to intercept communication by obtaining authorisation from a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;provincial court judge or a judge of the superior court&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Before granting his authorisation, the judge must be satisfied that either the originator of the communication or the recipient thereof  has given his/her consent to the interception&lt;/li&gt;
&lt;li&gt;Under exceptional circumstances, however, a police officer owing to the exigency of the situation may intercept communication without prior authorisation&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.&lt;/td&gt;
&lt;td&gt;France&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;&lt;i&gt;Loi d'orientation et de programmation pour la performance de la sécurité intérieure&lt;/i&gt;&lt;/b&gt;&lt;b style="text-align: justify; "&gt; (LOPPSI 2), 2011&lt;/b&gt;&lt;span style="text-align: justify; "&gt;:&lt;/span&gt; 
&lt;ul&gt;
&lt;li&gt;Authorises use of video surveillance and interception of communications&lt;/li&gt;
&lt;li&gt;Relevant Provisions: Article 36&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;i&gt;Loi de Programmation Militaire&lt;/i&gt;&lt;/b&gt;&lt;b&gt; (LPM), 2013&lt;/b&gt;: 
&lt;ul&gt;
&lt;li&gt;Authorises&lt;b&gt; &lt;/b&gt;surveillance for protection of national security and prevention of terrorism&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt; &lt;span style="text-align: justify; "&gt;Interception of comm&lt;b&gt;unication under LOPPSI 2 requires previous authorization from an investigating Judge after consultation with the Public Prosecutor&lt;/b&gt;&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;
&lt;div style="text-align: left; "&gt;Such authorization is granted for a period of 4 months which is further extendable by another 4 months&lt;/div&gt;
&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;
&lt;div style="text-align: left; "&gt;&lt;span style="text-align: justify; "&gt;
&lt;div style="text-align: left; "&gt;&lt;span style="text-align: justify; "&gt;Interception of communication &lt;b&gt;under LPM does not require prior sanction from an investigating judge and is instead provided by the &lt;/b&gt;&lt;/span&gt;&lt;span style="text-align: justify; "&gt;&lt;b&gt;Prime Minister’s office&lt;/b&gt;&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/div&gt;
&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Information that can be intercepted under LPM includes not only metadata but also content and geolocation services&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;5.&lt;/td&gt;
&lt;td&gt;Germany&lt;/td&gt;
&lt;td&gt;&lt;span style="text-align: justify; "&gt; &lt;/span&gt;&lt;b style="text-align: justify; "&gt;&lt;i&gt;Gesetz zur Beschränkung des Brief-, Post und Fernmeldegeheimnisses &lt;/i&gt;(G10 Act)&lt;i&gt;, &lt;/i&gt;2001&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Imposes restrictions on the right to privacy and authorizes surveillance for protecting freedom and democratic order, preventing terrorism and illegal drug trade&lt;/li&gt;
&lt;li&gt;Relevant Provisions: §3&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;The German Code of Criminal Procedure (StPO), 2002&lt;/b&gt;&lt;br /&gt; 
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Lays down search and seizure protocol and authorizes interception of telecommunications for criminal prosecutions&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Relevant Provisions: §§ 97, 100a&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorises &lt;/span&gt;&lt;b style="text-align: justify; "&gt;warrantless&lt;/b&gt;&lt;span style="text-align: justify; "&gt; surveillance by specific German agencies like the &lt;/span&gt;&lt;i style="text-align: justify; "&gt;Bundesnachrichtendienst &lt;/i&gt;&lt;span style="text-align: justify; "&gt;(Federal Intelligence Service)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Lays down procedure that must be followed while undertaking surveillance and intercepting communications&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorises sharing of intercepted intelligence for criminal prosecutions&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Mandates &lt;/span&gt;&lt;i style="text-align: justify; "&gt;ex post&lt;/i&gt;&lt;span style="text-align: justify; "&gt; notification to persons whose privacy has been violated but no judicial remedies are available to such persons&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;The Code of Criminal Procedure authorises interception of communication of a person suspected of being involved in a serious offence only on the &lt;b&gt;order of a court&lt;/b&gt; upon &lt;b&gt;application by the public prosecution office&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;6.&lt;/td&gt;
&lt;td&gt;Pakistan&lt;/td&gt;
&lt;td&gt;&lt;b&gt;Pakistan Telecommunications Reorganisation Act, 1996:&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Controls the flow of false and fabricated information and protects national security&lt;/li&gt;
&lt;li&gt;Relevant Provisions: § 54&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;Investigation for Fair Trial Act, 2013:&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Regulates the powers of law enforcement and intelligence agencies regarding covert surveillance and interception of communications&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions:  §§ 6,7, 8, 9&lt;/span&gt;&lt;span style="text-align: left; "&gt; &lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorisation for interception is provided by the &lt;/span&gt;&lt;b style="text-align: justify; "&gt;federal government&lt;/b&gt;&lt;span style="text-align: justify; "&gt;. No formal legal structure to monitor surveillance exists&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Interception can be authorized in the interest of national security and on the apprehension of any offence&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Requests for filtering and blocking of content are routed through the Inter-Ministerial Committee for the Evaluation of Websites, a confidential regulatory body&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Under the Fair Trial Act, interception can only be authorised on application to the &lt;/span&gt;&lt;b style="text-align: justify; "&gt;Fedral Minister for Interior&lt;/b&gt;&lt;span style="text-align: justify; "&gt; who shall then permit the application to be placed before a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;High Court Judge&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The warrant shall be issued by a judge only on his satisfaction that interception will aid in the collection of evidence and that a reasonable threat of the commission of a scheduled offence exists&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;7.&lt;/td&gt;
&lt;td&gt;South Africa&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;The Regulation of Interception of Communications and Provision of Communication-related Information Act, 2002&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Regulates and authorizes monitoring and interception of telecommunications services&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions: §§ 16, 22&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Warrant for intercepting communications and installing surveillance devices is granted by a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;designated judge&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;The warrant is issued on satisfaction of the judge that the investigation relates to a serious offence or that the information gathering is vital to public health or safety, national security or compelling national economic interests&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;8.&lt;/td&gt;
&lt;td&gt;United Kingdom&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;Regulation of Investigatory Powers Act, 2000&lt;/b&gt;&lt;span style="text-align: justify; "&gt;:&lt;/span&gt; 
&lt;ul&gt;
&lt;li&gt;Authorises interception of communications and surveillance&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions: §§ 5, 6, 65&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorisation for interception is granted in the form of a warrant by the &lt;/span&gt;&lt;b style="text-align: justify; "&gt;Secretary of State &lt;/b&gt;&lt;span style="text-align: justify; "&gt;or in certain special cases by a &lt;/span&gt;&lt;b style="text-align: justify; "&gt;‘senior officer’&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;Communications can be intercepted only it is necessary to do so in the interest of national security or for the purpose of preventing and detecting serious crimes&lt;/li&gt;
&lt;li&gt;Complaints of alleged illegal surveillance are heard by the Investigatory Powers Tribunal&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;9.&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;&lt;b style="text-align: justify; "&gt;Electronic Communications Privacy Act, 1986 (Title III, Omnibus Crime Control and Safe Streets Act)&lt;/b&gt; 
&lt;ul&gt;
&lt;li&gt;Governs authorisation for wiretapping and interception&lt;/li&gt;
&lt;li&gt;&lt;span style="text-align: left; "&gt;Relevant Provisions: §18&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;ul&gt;
&lt;li&gt;&lt;span style="text-align: justify; "&gt;Authorisation for interception can be granted by &lt;/span&gt;&lt;b style="text-align: justify; "&gt;a  district court or federal appeals court&lt;/b&gt;&lt;span style="text-align: justify; "&gt; on application by a law enforcement officer duly signed by the attorney general&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;Application mandates obtaining the information through a service provider before invading upon individual’s privacy&lt;/li&gt;
&lt;/ul&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide'&gt;https://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bedaavyasa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>surveillance technologies</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    

   <dc:date>2014-07-10T07:50:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report">
    <title>WSIS+10 High Level Event: A Bird's Eye Report</title>
    <link>https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report</link>
    <description>
        &lt;b&gt;The WSIS+10 High Level was organised by the ITU and collaborative UN entities on June 9-13, 2014. It aimed to evaluate the progress on implementation of WSIS Outcomes from Geneva 2003 and Tunis 2005, and to envision a post-2015 Development Agenda. Geetha Hariharan attended the event on CIS' behalf.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt;The World Summit on Information Society (WSIS) +10 &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/implementation/2014/forum/"&gt;High Level Event&lt;/a&gt;&lt;span&gt; (HLE) was hosted at the ITU Headquarters in Geneva, from June 9-13, 2014. The HLE aimed to review the implementation and progress made on information and communication technology (ICT) across the globe, in light of WSIS outcomes (&lt;/span&gt;&lt;a href="http://www.itu.int/wsis/index-p1.html"&gt;Geneva 2003&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/index-p2.html"&gt;Tunis 2005&lt;/a&gt;&lt;span&gt;). Organised in three parallel tracks, the HLE sought to take stock of progress in ICTs in the last decade (High Level track), initiate High Level Dialogues to formulate the post-2015 development agenda, as well as host thematic workshops for participants (Forum track).&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The High Level Track:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/internet-governance/blog/copy2_of_HighLevelTrack.jpg/@@images/be5f993c-3553-4d63-bb66-7cd16f8407dc.jpeg" alt="High Level Track" class="image-inline" title="High Level Track" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Opening Ceremony, WSIS+10 High Level Event &lt;/i&gt;(&lt;a class="external-link" href="https://twitter.com/ITU/status/334587247556960256/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The High Level track opened officially on June 10, 2014, and culminated with the endorsement by acclamation (as is ITU tradition) of two &lt;a href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;Outcome Documents&lt;/a&gt;. These were: (1) WSIS+10 Statement on the Implementation of WSIS Outcomes, taking stock of ICT developments since the WSIS summits, (2) WSIS+10 Vision for WSIS Beyond 2015, aiming to develop a vision for the post-2015 global information society. These documents were the result of the WSIS+10 &lt;a href="http://www.itu.int/wsis/review/mpp/"&gt;Multi-stakeholder Preparatory Platform&lt;/a&gt; (MPP), which involved WSIS stakeholders (governments, private sector, civil society, international organizations and relevant regional organizations).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;strong&gt;MPP&lt;/strong&gt; met in six phases, convened as an open, inclusive consultation among WSIS stakeholders. It was not without its misadventures. While ITU Secretary General Dr. Hamadoun I. Touré consistently lauded the multi-stakeholder process, and Ambassador Janis Karklins urged all parties, especially governments, to “&lt;i&gt;let the UN General Assembly know that the multi-stakeholder model works for Internet governance at all levels&lt;/i&gt;”, participants in the process shared stories of discomfort, disagreement and discord amongst stakeholders on various IG issues, not least human rights on the Internet, surveillance and privacy, and multi-stakeholderism. Richard Hill of the Association for Proper Internet Governance (&lt;a href="http://www.apig.ch/"&gt;APIG&lt;/a&gt;) and the Just Net Coalition writes that like NETmundial, the MPP was rich in a diversity of views and knowledge exchange, but stakeholders &lt;a href="http://www.ip-watch.org/2014/06/16/what-questions-did-the-wsis10-high-level-event-answer/"&gt;failed to reach consensus&lt;/a&gt; on crucial issues. Indeed, Prof. Vlamidir Minkin, Chairman of the MPP, expressed his dismay at the lack of consensus over action line C9. A compromise was agreed upon in relation to C9 later.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some members of civil society expressed their satisfaction with the extensive references to human rights and rights-centred development in the Outcome Documents. While governmental opposition was seen as frustrating, they felt that the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;MPP had sought and achieved a common understanding&lt;/span&gt;&lt;/strong&gt;, a sentiment &lt;a href="https://twitter.com/covertlight/status/476748168051580928"&gt;echoed&lt;/a&gt; by the ITU Secretary General. Indeed, even Iran, a state that had expressed major reservations during the MPP and felt itself unable to agree with the text, &lt;a href="https://twitter.com/covertlight/status/476748723750711297"&gt;agreed&lt;/a&gt; that the MPP had worked hard to draft a document beneficial to all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns around the MPP did not affect the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;review of ICT developments&lt;/span&gt;&lt;/strong&gt; over the last decade. High Level Panels with Ministers of ICT from states such as Uganda, Bangladesh, Sweden, Nigeria, Saudi Arabia and others, heads of the UN Development Programme, UNCTAD, Food and Agriculture Organisation, UN-WOMEN and others spoke at length of rapid advances in ICTs. The focus was largely on ICT access and affordability in developing states. John E. Davies of Intel repeatedly drew attention to innovative uses of ICTs in Africa and Asia, which have helped bridge divides of affordability, gender, education and capacity-building. Public-private partnerships were the best solution, he said, to affordability and access. At a ceremony evaluating implementation of WSIS action-lines, the Centre for Development of Advanced Computing (C-DAC), India, &lt;a href="https://twitter.com/covertlight/status/476748723750711297"&gt;won an award&lt;/a&gt; for its e-health application MOTHER.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Outcome Documents themselves shall be analysed in a separate post. But in sum, the dialogue around Internet governance at the HLE centred around the success of the MPP. Most participants on panels and in the audience felt this was a crucial achievement within the realm of the UN, where the Tunis Summit had delineated strict roles for stakeholders in paragraph 35 of the &lt;/span&gt;&lt;a href="http://www.itu.int/wsis/docs2/tunis/off/6rev1.html"&gt;Tunis Agenda&lt;/a&gt;&lt;span&gt;. Indeed, there was palpable relief in Conference Room 1 at the &lt;/span&gt;&lt;a href="http://www.cicg.ch/en/"&gt;CICG&lt;/a&gt;&lt;span&gt;, Geneva, when on June 11, Dr. Touré announced that the Outcome Documents would be adopted without a vote, in keeping with ITU tradition, even if consensus was achieved by compromise.&lt;/span&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The High Level Dialogues:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/internet-governance/blog/HighLevelDialogues.jpg/@@images/3c30d94f-7a65-4912-bb42-2ccd3b85a18d.jpeg" alt="High Level Dialogues" class="image-inline" title="High Level Dialogues" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prof. Vladimir Minkin delivers a statement.&lt;/i&gt; (&lt;a class="external-link" href="https://twitter.com/JaroslawPONDER/status/476288845013843968/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The High Level Dialogues on developing a post-2015 Development Agenda, based on WSIS action lines, were active on June 12. Introducing the Dialogue, Dr. Touré lamented the Millennium Development Goals as a “&lt;i&gt;lost opportunity&lt;/i&gt;”, emphasizing the need to alert the UN General Assembly and its committees as to the importance of ICTs for development.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As on previous panels, there was &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;intense focus on access, affordability and reach in developing countries&lt;/span&gt;&lt;/strong&gt;, with Rwanda and Bangladesh expounding upon their successes in implementing ICT innovations domestically. The world is more connected than it was in 2005, and the ITU in 2014 is no longer what it was in 2003, said speakers. But we lack data on ICT deployment across the globe, said Minister Knutssen of Sweden, recalling the gathering to the need to engage all stakeholders in this task. Speakers on multiple panels, including the Rwandan Minister for CIT, Marilyn Cade of ICANN and Petra Lantz of the UNDP, emphasized the need for ‘smart engagement’ and capacity-building for ICT development and deployment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A crucial session on cybersecurity saw Dr. Touré envision a global peace treaty accommodating multiple stakeholders. On the panel were Minister Omobola Johnson of Nigeria, Prof. Udo Helmbrecht of the European Union Agency for Network and Information Security (ENISA), Prof. A.A. Wahab of Cybersecurity Malaysia and Simon Muller of Facebook. The focus was primarily on building laws and regulations for secure communication and business, while child protection was equally considered.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The lack of laws/regulations for cybersecurity (child pornography and jurisdictional issues, for instance), or other legal protections (privacy, data protection, freedom of speech) in rapidly connecting developing states was noted. But the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;question of cross-border surveillance and wanton violations of privacy went unaddressed&lt;/span&gt;&lt;/strong&gt; except for the customary, unavoidable mention. This was expected. Debates in Internet governance have, in the past year, been silently and invisibly driven by the Snowden revelations. So too, at WSIS+10 Cybersecurity, speakers emphasized open data, information exchange, data ownership and control (the &lt;a href="https://cis-india.org/internet-governance/blog/ecj-rules-internet-search-engine-operator-responsible-for-processing-personal-data-published-by-third-parties"&gt;right to be forgotten&lt;/a&gt;), but did not openly address surveillance. Indeed, Simon Muller of Facebook called upon governments to publish their own transparency reports: A laudable suggestion, even accounting for Facebook’s own undetailed and truncated reports.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a nutshell, the post-2015 Development Agenda dialogues repeatedly emphasized the importance of ICTs in global connectivity, and their impact on GDP growth and socio-cultural change and progress. The focus was on taking this message to the UN General Assembly, engaging all stakeholders and creating an achievable set of action lines post-2015.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Forum Track:&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/internet-governance/blog/copy_of_ForumTrack.jpg/@@images/dfcce68a-18d7-4f1e-897b-7208bb60abc9.jpeg" alt="Forum Track" class="image-inline" title="Forum Track" /&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;Participants at the UNESCO session on its Comprehensive Study on Internet-related Issues&lt;/i&gt; (&lt;a class="external-link" href="https://twitter.com/leakaspar/status/476690921644646400/photo/1"&gt;Source&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The HLE was organized as an extended version of the WSIS Forum, which hosts thematic workshops and networking opportunities, much like any other conference. Running in parallel sessions over 5 days, the WSIS Forum hosted sessions by the ITU, UNESCO, UNDP, ICANN, ISOC, APIG, etc., on issues as diverse as the WSIS Action Lines, the future of Internet governance, the successes and failures of &lt;a href="http://www.internetgovernance.org/2012/12/18/itu-phobia-why-wcit-was-derailed/"&gt;WCIT-2012&lt;/a&gt;, UNESCO’s &lt;a href="http://www.unesco.org/new/internetstudy"&gt;Comprehensive Study on Internet-related Issues&lt;/a&gt;, spam and a taxonomy of Internet governance.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Detailed explanation of each session I attended is beyond the scope of this report, so I will limit myself to the interesting issues raised.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At ICANN’s session on its own future (June 9), Ms. Marilyn Cade emphasized the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;importance of national and regional IGFs&lt;/span&gt;&lt;/strong&gt; for both issue-awareness and capacity-building. Mr. Nigel Hickson spoke of engagement at multiple Internet governance fora: “&lt;i&gt;Internet governance is not shaped by individual events&lt;/i&gt;”. In light of &lt;a href="http://www.internetgovernance.org/2014/04/16/icann-anything-that-doesnt-give-iana-to-me-is-out-of-scope/"&gt;criticism&lt;/a&gt; of ICANN’s apparent monopoly over IANA stewardship transition, this has been ICANN’s continual &lt;a href="https://www.icann.org/resources/pages/process-next-steps-2014-06-06-en"&gt;response&lt;/a&gt; (often repeated at the HLE itself). Also widely discussed was the &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;role of stakeholders in Internet governance&lt;/span&gt;&lt;/strong&gt;, given the delineation of roles and responsibilities in the Tunis Agenda, and governments’ preference for policy-monopoly (At WSIS+10, Indian Ambassador Dilip Sinha seemed wistful that multilateralism is a “&lt;i&gt;distant dream&lt;/i&gt;”).&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This discussion bore greater fruit in a session on Internet governance ‘taxonomy’. The session saw &lt;a href="https://www.icann.org/profiles/george-sadowsky"&gt;Mr. George Sadowsky&lt;/a&gt;, &lt;a href="http://www.diplomacy.edu/courses/faculty/kurbalija"&gt;Dr. Jovan Kurbalija&lt;/a&gt;, &lt;a href="http://www.williamdrake.org/"&gt;Mr. William Drake&lt;/a&gt; and &lt;a href="http://www.itu.int/wsis/implementation/2014/forum/agenda/session_docs/170/ThoughtsOnIG.pdf"&gt;Mr. Eliot Lear&lt;/a&gt; (there is surprisingly no official profile-page on Mr. Lear) expound on dense structures of Internet governance, involving multiple methods of classification of Internet infrastructure, CIRs, public policy issues, etc. across a spectrum of ‘baskets’ – socio-cultural, economic, legal, technical. Such studies, though each attempting clarity in Internet governance studies, indicate that the closer you get to IG, the more diverse and interconnected the eco-system gets. David Souter’s diagrams almost capture the flux of dynamic debate in this area (please see pages 9 and 22 of &lt;a href="http://www.internetsociety.org/sites/default/files/ISOC%20framework%20for%20IG%20assessments%20-%20D%20Souter%20-%20final_0.pdf"&gt;this ISOC study&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There were, for most part, insightful interventions from session participants. Mr. Sadowsky questioned the effectiveness of the Tunis Agenda delineation of stakeholder-roles, while Mr. Lear pleaded that techies be let to do their jobs without interference. &lt;a href="http://internetdemocracy.in/"&gt;Ms. Anja Kovacs&lt;/a&gt; raised pertinent concerns about &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;including voiceless minorities in a ‘rough consensus’ model&lt;/span&gt;&lt;/strong&gt;. Across sessions, &lt;strong&gt;&lt;span style="text-decoration: underline;"&gt;questions of mass surveillance, privacy and data ownership rose&lt;/span&gt;&lt;/strong&gt; from participants. The protection of human rights on the Internet – especially freedom of expression and privacy – made continual appearance, across issues like spam (&lt;a href="http://www.itu.int/ITU-D/CDS/sg/rgqlist.asp?lg=1&amp;amp;sp=2010&amp;amp;rgq=D10-RGQ22.1.1&amp;amp;stg=1"&gt;Question 22-1/1&lt;/a&gt; of ITU-D Study Group 1) and cybersecurity.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion:&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The HLE was widely attended by participants across WSIS stakeholder-groups. At the event, a great many relevant questions such as the future of ICTs, inclusions in the post-2015 Development Agenda, the value of muti-stakeholder models, and human rights such as free speech and privacy were raised across the board. Not only were these raised, but cognizance was taken of them by Ministers, members of the ITU and other collaborative UN bodies, private sector entities such as ICANN, technical community such as the ISOC and IETF, as well as (obviously) civil society.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Substantively, the HLE did not address mass surveillance and privacy, nor of expanding roles of WSIS stakeholders and beyond. Processually, the MPP failed to reach consensus on several issues comfortably, and a compromise had to be brokered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;But perhaps a big change at the HLE was the positive attitude to multi-stakeholder models from many quarters, not least the ITU Secretary General Dr. Hamadoun Touré. His repeated calls for acceptance of multi-stakeholderism left many members of civil society surprised and tentatively pleased. Going forward, it will be interesting to track the ITU and the rest of UN’s (and of course, member states’) stances on multi-stakeholderism at the ITU Plenipot, the WSIS+10 Review and the UN General Assembly session, at the least.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report'&gt;https://cis-india.org/internet-governance/blog/wsis-10-high-level-event-a-birds-eye-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>WSIS+10</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Cybersecurity</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Multi-stakeholder</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>Internet Access</dc:subject>
    
    
        <dc:subject>ITU</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    
    
        <dc:subject>E-Governance</dc:subject>
    
    
        <dc:subject>ICT</dc:subject>
    

   <dc:date>2014-06-20T15:57:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online">
    <title>UN Human Rights Council urged to protect human rights online</title>
    <link>https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online</link>
    <description>
        &lt;b&gt;63 civil society groups urged the UN Human Rights Council to address global challenges to freedom of expression, privacy and other human rights on the Internet. Centre for Internet &amp; Society joined in the statement, delivered on behalf of the 63 groups by Article 19. 
&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The 26th session of the United Nations Human Rights Council (UNHRC) is currently ongoing (June 10-27, 2014). &lt;span&gt;On June 19, 2014, 63 civil society groups joined together to urge the United Nations Human Rights Council to protect human rights online and address global challenged to their realization. Centre for Internet &amp;amp; Society joined in support of the statement ("&lt;strong&gt;the Civil Society Statement&lt;/strong&gt;"), which was delivered by Article 19 on behalf of the 63 groups.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its consensus resolution &lt;a class="external-link" href="http://ap.ohchr.org/documents/dpage_e.aspx?si=A/HRC/RES/20/8"&gt;A/HRC/20/8 (2012)&lt;/a&gt;, the UNHRC affirmed that the "&lt;span&gt;&lt;i&gt;same rights that people have offline must also be protected online, in particular freedom of expression, which is applicable regardless of frontiers and through any media of one’s choice&lt;/i&gt;". India, a current member of the UNHRC, stood in support of resolution 20/8. The protection of human rights online was also a matter of popular agreement at &lt;a class="external-link" href="http://netmundial.br/wp-content/uploads/2014/04/NETmundial-Multistakeholder-Document.pdf"&gt;NETmundial 2014&lt;/a&gt;, which similarly emphasised the importance of protecting human rights online in accordance with international human rights obligations. Moreover, the WSIS+10 High Level Event, organised by the ITU in collaboration with other UN entities, emphasized the criticality of expanding access to ICTs across the globe, including infrastructure, affordability and reach.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Civil Society Statement at HRC26 highlights the importance of retaining the Internet as a global resource - a democratic, free and pluralistic platform. However, the recent record of freedom of expression and privacy online have resulted in a deficit of trust and free, democratic participation. &lt;a class="external-link" href="http://www.nytimes.com/2014/03/21/world/europe/turkish-officials-block-twitter-in-leak-inquiry.html"&gt;Turkey&lt;/a&gt;, &lt;a class="external-link" href="http://www.bbc.com/news/blogs-trending-25756864"&gt;Malaysia&lt;/a&gt;, &lt;a class="external-link" href="http://www.washingtonpost.com/blogs/monkey-cage/wp/2014/05/27/thailands-cybercoup/"&gt;Thailand&lt;/a&gt;, &lt;a class="external-link" href="http://www.theguardian.com/world/2014/jun/02/egypt-police-monitor-social-media-dissent-facebook-twitter-protest"&gt;Egypt&lt;/a&gt; and &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/Facebook-under-fire-for-blocking-pages-in-Pakistan/articleshow/36194872.cms"&gt;Pakistan&lt;/a&gt; have blocked web-pages and social media content, while Edward Snowden's &lt;a class="external-link" href="https://www.eff.org/deeplinks/2014/05/looking-back-one-year-after-edward-snowden-disclosures-international-perspective"&gt;revelations&lt;/a&gt; have heightened awareness of human rights violations on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At a time when governance of the Internet and its institutions is evolving, a human rights centred perspective is crucial. Openness and transparency - both in the governance of Internet institutions and rights online - are crucial to continuing growth of the Internet as a global, democratic and free resource, where freedom of expression, privacy and other rights are respected regardless of location or nationality. In particular, the Civil Society Statement calls attention to &lt;a class="external-link" href="https://en.necessaryandproportionate.org/take-action/EFF"&gt;principles of necessity and proportionality&lt;/a&gt; to regulate targeted interception and collection of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UNHRC, comprising 47 member states, is called upon to address these global challenges. Guided by resolutions A/HRC/20/8 and &lt;a class="external-link" href="http://www.un.org/ga/search/view_doc.asp?symbol=A/C.3/68/L.45/Rev.1"&gt;A/RES/68/167&lt;/a&gt;, the WSIS+10 High Level Event &lt;a class="external-link" href="http://www.itu.int/wsis/implementation/2014/forum/inc/doc/outcome/362828V2E.pdf"&gt;Outcome Documents&lt;/a&gt; (especially operative paragraphs 2, 8 and 11 of the Vision Document) and the &lt;a class="external-link" href="http://www.ohchr.org/EN/Issues/DigitalAge/Pages/DigitalAgeIndex.aspx"&gt;forthcoming report&lt;/a&gt; of the UN High Commissioner for Human Rights regarding privacy in the digital age, the UNHRC as well as other states may gather the opportunity and intention to put forth a strong case for human rights online in our post-2015 development-centred world.&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Civil Society Statement:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The full oral statement can be accessed &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/unhrc-civil-society-statement-26th-session" class="internal-link"&gt;here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online'&gt;https://cis-india.org/internet-governance/blog/un-human-rights-council-urged-to-protect-human-rights-online&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>geetha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Human Rights Online</dc:subject>
    
    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>UNHRC</dc:subject>
    

   <dc:date>2014-06-19T13:28:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
