<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1 to 15.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/raw/your-econonomy-our-livelihoods-a-policy-brief-by-the-all-india-gigi-workers-union"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/wiki-source-handbook-for-indian-communities"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/welcome-to-raw-blog"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/user-experiences-of-digital-financial-risks-and-harms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/university-of-mysore-releases-kannada-vishwakosha-under-cc-license"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/train-the-trainer-program"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/technology-behind-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/the-platform-economys-gatekeeping-of-class-and-caste-dominance-in-urban-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/raw/your-econonomy-our-livelihoods-a-policy-brief-by-the-all-india-gigi-workers-union">
    <title>Your economy, our livelihoods: A policy brief by the All India Gig Workers’ Union</title>
    <link>https://cis-india.org/raw/your-econonomy-our-livelihoods-a-policy-brief-by-the-all-india-gigi-workers-union</link>
    <description>
        &lt;b&gt;In this policy brief, the All India Gig Workers’ Union (AIGWU) presents its critique on NITI Aayog’s report on India’s platform economy. Through experiences from over 3 years of organising gig workers across India, they highlight fallacies in the report that disregard workers’ experiences and realities. They present alternative recommendations that are responsive to these realities, and offer pathways towards rights-affirming futures for workers in the platform economy.
&lt;/b&gt;
        &lt;p&gt;&lt;span style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/raw/files/your-economy-our-livelihoods.pdf"&gt;Click to download&lt;/a&gt; the full report&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Alternative recommendations towards rights-affirming futures for workers in the platform economy&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Regulating the unchecked rise of platforms and the platform workforce&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The rise of platforms will not only affect workers in blue collar or grey collar jobs but also engulf other service sectors that currently provide permanent and dignified employment. The platform and gig work paradigm must not be used as a way to further deregulate the Indian economy by subterfuge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Robust regulatory mechanisms and worker protections must be extended to the gig economy and other forms of perennial employment threatened by the new Central labour codes. Gig workers must be recognised as employees with a clear test of employment enshrined in law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A stronger push towards better paradigms of work can only come from alternative models of platform work. It is essential that the government foster the creation of platform cooperatives in certain service sectors. Such platform cooperatives will mitigate market concentration that results from the network effects of large private platforms, offer greater stability than profit-oriented private platforms, and offer genuine pro-people alternatives.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Securing data rights and employment security&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Gig workers must be guaranteed individual and collective rights to their data collected and stored by platforms. Workers’ data should belong to the workers. Workers should be able to access verified records of their training (if any) and work contributions. The government should prescribe standards to ensure that these records are machine-readable and universally inter-operable. In addition, workers must have easy access to verified receipts for each successful task performed on the platform.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;strong&gt;Centering gender-responsive protections for workers facing intersectional vulnerabilities&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Platform work is uncritically accepted as a panacea for women without taking a deeper look at labour practices, and how women workers may be particularly vulnerable to workplace risks and exploitation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Considering these vulnerabilities, there must be legal and regulatory measures enabling women to participate in the gig economy more fully—for example, creches, sexual harassment prevention measures, equal wages, and proper hours and working conditions. Crucially, there should be safety provisions for all gig workers, especially for women who face greater dangers of harassment. Importantly, accessible and efficient enforcement mechanisms must be introduced to operationalise schemes and rights for women workers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Securing minimum social protection guarantees for all workers on digital platforms&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Effective minimum wages of INR 26,000 per month must be enforced as demanded by the Joint Platform of Central Trade Unions in India. This figure must be used to determine the minimum earnings for an hour’s worth of work on a platform.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Provision for Provident Fund (PF) must be introduced, and a bank account that does not require minimum balances or related charges must also be guaranteed. Social insurance measures must be guaranteed including health insurance, personal accident insurance, pension, maternity benefits, and disability benefits. In addition, the state government must consider waiving off charges relating to fuel surcharges and parking expenses/ penalties for gig workers, while on duty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security and safety for women workers must be addressed by issuing government ID cards for gig workers. Gig workers are required to travel to unknown localities, where residents tend to be suspicious of them. The government ID card will help workers establish their identity and increase their credibility among the residents.&lt;/p&gt;
&lt;p&gt;Social security legislation and a tripartite board (with representation of workers and worker organisations, government, and platforms) must be constituted to ensure registration of all platform-based gig workers and facilitate their access to social security. The law should cover all those persons who are engaged in professions that are using digital platforms for their last mile delivery.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Building accountability mechanisms for financial inclusion measures on platforms&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;While including gig workers into the formal banking system is essential, this must not be used as a pretext to ensnare them into debt traps. Should the government wish to use platforms as a lever for financial inclusion, it must mandate platforms to deposit a minimum amount above and beyond workers’ existing incomes towards their consumption. For platforms, existing schemes must be rejigged—Firstly, the burden of credit schemes must not be borne only by public sector banks; the private sector must also be directed to take on some of the lending. Secondly, interest rates may be lowered for such loans, but this reduced rate must be made conditional on ensuring a certain threshold of working conditions to gig workers.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Developing workforce estimation strategies that reflect workers’ realities&lt;/strong&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Workers in the gig economy must not blindly be lumped with the unorganised sector without an understanding of nuances within the broad definition of the gig economy. Assumptions that workers in the gig economy have alternate sources of income must be refuted. Rather, in the case of gig workers in the Indian context, ground realities show that this work actually constitutes primary sources of income.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Primary data must be collected across the country where platform work is seen as a clear option for individuals to choose as a profession. Thus, one can estimate the percentage of the population that depends on the gig economy in a consistent manner. Digital platforms must provide adequate data to state governments on the number of workers registered on the platform in every region (along with work time data) in order for governments to actively prepare for public infrastructure requirements required for such employment generation.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 dir="ltr" style="text-align: justify; "&gt;Contributors&lt;/h3&gt;
&lt;p dir="ltr"&gt;Authors: W.C. Shukla, Rikta Krishnaswamy, Rohin Garg, Gunjan Jena, and S.B. Natarajan&lt;/p&gt;
&lt;p dir="ltr"&gt;Images: All India Gig Workers’ Union (AIGWU)&lt;/p&gt;
&lt;p dir="ltr"&gt;Design: Annushka Jaliwala&lt;/p&gt;
&lt;h3&gt;About the All India Gig Workers’ Union (AIGWU)&lt;/h3&gt;
&lt;p dir="ltr"&gt;The All India Gig Workers’ Union (AIGWU) is a registered trade union for all food delivery, logistics, and service workers that work on any app-based platforms in India.&lt;/p&gt;
&lt;p dir="ltr"&gt;Contact: &lt;a href="mailto:contactaigwu@gmail.com"&gt;contactaigwu@gmail.com&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Connect: &lt;a href="https://twitter.com/aigwu_union"&gt;Twitter&lt;/a&gt;; &lt;a href="https://www.facebook.com/aigwu"&gt;Facebook&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The views and opinions expressed on this page are those of their individual authors. Unless the opposite is explicitly stated, or unless the opposite may be reasonably inferred, CIS does not subscribe to these views and opinions which belong to their individual authors. CIS does not accept any responsibility, legal or otherwise, for the views and opinions of these individual authors. For an official statement from CIS on a particular issue, please contact us directly.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/your-econonomy-our-livelihoods-a-policy-brief-by-the-all-india-gigi-workers-union'&gt;https://cis-india.org/raw/your-econonomy-our-livelihoods-a-policy-brief-by-the-all-india-gigi-workers-union&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>W.C. Shukla, Rikta Krishnaswamy, Rohin Garg, Gunjan Jena, and S.B. Natarajan</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Labour Futures</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Gig Work</dc:subject>
    
    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Reserve Bank of India</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2024-01-31T00:02:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/wiki-source-handbook-for-indian-communities">
    <title>Wikisource Handbook for Indian Communities</title>
    <link>https://cis-india.org/a2k/blogs/wiki-source-handbook-for-indian-communities</link>
    <description>
        &lt;b&gt;Wikisource is one of the trending Wikimedia projects. Many new editors and new books to Indic language Wikisource's get added over a period of time. However, new editors as well as existing editors face numerous problems while working with the content online. The Centre for Internet &amp; Society's Access to Knowledge (CIS-A2K) team, to help the editors, has created this Handbook. CIS invites feedback to the first draft of this Handbook. CIS-A2K will continue to work with the Wikipedia communities to improve their efforts towards developing Wikisource. &lt;/b&gt;
        &lt;h2&gt;Preface&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Currently, CIS-A2K is working with five Indian-languages Wikimedia communities (Kannada, Konkani, Marathi, Odia, and Telugu) and one focus project area (Wikisource with punjabi community). While working with the above mentioned Indic Wikimedia communities, we noticed that there are many similarities between the issues and challenges faced by these communities. So, we decided to create this “Wikisource Handbook for Indian Communities”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At first, we went through the Wikisource of each language and noted the status. Then we talked to Indic Wikipedians to know more about the Wikisource related issues that they are facing. We also asked for the feedback on the first draft of this handbook. Our actual work will start after the release of this book, when we’ll work with the communities to improve their efforts towards developing Wikisource.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Click to download the &lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/a2k/files/wikisource-handbook-for-indian-communities"&gt;Wikisource Handbook for Indian Communities&lt;/a&gt;&lt;/b&gt; co-authored by Bodhisattwa Mandal and Ananth Subray P V. with graphics support from Saumya Naidu.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/wiki-source-handbook-for-indian-communities'&gt;https://cis-india.org/a2k/blogs/wiki-source-handbook-for-indian-communities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Bodhisattwa Mandal and Ananth Subray P. V.</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>CIS-A2K</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2018-09-19T02:18:40Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway">
    <title>Whose Change is it Anyway?</title>
    <link>https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway</link>
    <description>
        &lt;b&gt;This thought piece is an attempt to reflect critically on existing practices of “making change” and its implications for the future of citizen action in information and network societies. It observes that change is constantly and explicitly invoked at different stages in research, practice, and policy in relation to digital technologies, citizen action, and network societies. &lt;/b&gt;
        
&lt;p&gt;The White Paper by Nishant Shah was &lt;a class="external-link" href="http://www.hivos.net/Hivos-Knowledge-Programme/Themes/Civic-Explorations/Publications/Whose-Change-is-it-anyway"&gt;published by Hivos recently&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify;"&gt;However, we do not have adequate frameworks to address the idea of change. What constitutes change? What are the intentions that make change possible? Who are the actors involved? Whose change is&amp;nbsp; it, anyway?&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Drawing on the Hivos Knowledge Programme and on knowledge frameworks  around youth, technology, and change from the last four years, this  thought piece introduces new ways of defining, locating, and figuring  change. In the process, it also helps understand the role that digital&amp;nbsp;  technologies play in shaping and amplifying our processes and practices  of change, and to understand actors of change who are not necessarily  confined to the category of “citizen”, which seems to be understood as  the de facto agent of change in contemporary social upheavals,&amp;nbsp;  political uprisings, and cultural innovations.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Methodologically, this thought piece attempts to make three discursive  interventions: It locates digital activism in historical trajectories,  positing that digital activism has deep ties to traditional activism,  when it comes to the core political cause. Simultaneously, it recognises  that new modes of political engagement are demanding and producing  novel practices and introducing new actors and stakeholders. It looks at  contemporary digital and network theories, but also draws on older  philosophical lineages to discuss the crises that we seek to address. It  tries to interject these abstractions and theoretical frameworks back  into the field by producing two case studies that show how engagement  with these questions might help us reflect critically on our past  practices and knowledge as well as on visions for and speculations about  the future, and how these shape contemporary network societies. It  builds a theoretical framework based on knowledge gleaned from  conversations, interviews, and on-the-ground action with different  groups and communities in emerging information societies, and integrates  with new critical theory to&amp;nbsp; build an interdisciplinary and accessible  framework that seeks to inform research, development-based  interventions, and policy structures at the intersection of digital  technologies, citizen action, and change by introducing questions around  change into existing discourse.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/digital-natives/blog/whose-change-is-it-anyway.pdf" class="internal-link"&gt;Click to download the full White Paper here&lt;/a&gt; (PDF, 321 Kb)&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway'&gt;https://cis-india.org/digital-natives/blog/hivos-knowledge-programme-june-14-2013-nishant-shah-whose-change-is-it-anyway&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital Activism</dc:subject>
    
    
        <dc:subject>RAW Publications</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Youth</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Publications</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-04-17T10:56:47Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2">
    <title>White Paper on RTI and Privacy V1.2</title>
    <link>https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2</link>
    <description>
        &lt;b&gt;This white paper explores the relationship between privacy and transparency in the context of the right to information in India. Analysing pertinent case law and legislation - the paper highlights how the courts and the law in India address questions of transparency vs. privacy. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Although the right to information is not specifically spelt out in the Constitution of India, 1950, it has been read into Articles 14 (right to equality), 19(1)(a) (freedom of speech and expression) and 21 (right to life) through cases such as &lt;i&gt;Bennet Coleman&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; &lt;i&gt;Tata Press Ltd. &lt;/i&gt;v.&lt;i&gt; Maharashtra Telephone Nigam Ltd.&lt;/i&gt;,&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; etc. The same Articles of the Constitution were also interpreted in &lt;i&gt;Kharak Singh&lt;/i&gt; v.&lt;i&gt;State of U.P.&lt;/i&gt;,&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; &lt;i&gt;Govind&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;,	&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; and a number of other cases, to include within their scope a right to privacy. At the very outset it 	appears that a right to receive information -though achieving greater transparency in public life - could impinge on the right to privacy of certain 	people. The presumed tension between the right to privacy and the right to information has been widely recognized and a framework towards balancing the two 	rights, has been widely discussed across jurisdictions. In India, nowhere is this conflict and the attempt to balance it more evident than under the Right 	to Information Act, 2005 (the "&lt;b&gt;RTI Act&lt;/b&gt;").&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supporting the constitutional right to information enjoyed by the citizens, is the statutorily recognized right to information granted under the RTI Act. 	Any potential infringement of the right to privacy by the provisions of the RTI Act are sought to be balanced by section 8 which provides that no 	information should be disclosed if it creates an unwarranted invasion of the privacy of any individual. This exception states that there is no obligation 	to disclose information which relates to personal information, the disclosure of which has no relationship to any public activity or interest, or which would cause unwarranted invasion of the privacy of the individual unless the larger public interest justifies the disclosure of such information.	&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; The Act further goes on to say that where any information relating to or supplied by a third party and 	treated by that party as confidential, is to be disclosed, the Central Public Information Officer or State Public Information Officer has to give written 	notice to that party within five days of receiving such a request inviting such third party (within ten days) to make its case as to whether such 	information should or should not be disclosed.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A plain reading of section 11 suggests that for the section to apply the following three conditions have to be satisfied, i.e. (i) if the PIO is 	considering disclosing the information (ii) the information relates to the third party or was given to a Public Authority by the third party in confidence; 	and (iii) the third party treated the information to be a confidential. It has been held that in order to satisfy the third part of the test stated above, 	the third party has to be consulted and therefore a notice has to be sent to the third party. Even if the third party claims confidentiality, the proviso 	to the section provides that the information cannot be withheld if the public interest in the disclosure outweighs the possible harm or injury that may be 	caused to the third party, except in cases of trade or commercial secrets.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; The Courts have also held that section 11 should be read keeping in mind the exceptions contained in section 8 (discussed in detail later) and the exceptions contained therein.	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This principle of non disclosure of private information can be found across a number of common law jurisdictions. The United Kingdom's Freedom of 	Information Act, 2000 exempts the disclosure of information where it would violate the data protection principles contained in the Data Protection Act, 	1998 or constitute an actionable breach of confidence.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; The Australian Freedom of Information Act, 1982 	categorizes documents involving unreasonable disclosure of personal information as conditionally exempt i.e. allows for their disclosure unless such 	disclosure would be contrary to public interest.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; The Canadian Access to Information Act also has a provision which allows the authorities to refuse to disclose personal information except in accordance with the provisions of the Canadian Privacy Act.	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An overview of the RTI Act, especially sections 6 to 8 seems to give the impression that the legislature has tried to balance and harmonize conflicting public and private rights and interests by building sufficient safeguards and exceptions to the general principles of disclosure under the Act.	&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; This is why it is generally suggested that section 8, when applied, should be given a strict interpretation as it is a fetter on not only a statutory right granted under the RTI Act but also a pre-existing constitutional right.	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; Logical as this argument may seem and appropriate in some circumstances, it does present a problem 	when dealing with the privacy exception contained in section 8(1)(j). That is because the right to privacy envisaged in this section is also a pre-existing 	constitutional right which has been traced to the same provisions of the Constitution from which the constitutional right of freedom of information 	emanates.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; Therefore there is an ambiguity regarding the treatment and priority given to the privacy 	exception vs. the disclosure mandate in the RTI Act, as it requires the balancing of not only two competing statutory rights but also two constitutional 	rights.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;The Privacy Exception &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As discussed earlier, the purpose of the RTI Act is to increase transparency and ensure that people have access to as much public information as possible. 	Such a right is critical in a democratic country as it allows for accountability of the State and allows individuals to seek out information and make 	informed decisions. However, it seems from the language of the RTI Act that at the time of its drafting the legislature did realize that there would be a 	conflict between the endeavor to provide information and the right to privacy of individuals over the information kept with public authorities, which is 	why a privacy exception was carved into section 8(1)(j) of the Right to Information Act. The Act does not only protect the privacy of the third party who's 	information is at risk of being disclosed, but also the privacy of the applicant. In fact it has now been held that a private respondent need not give 	his/her ID or address as long as the information provided by him/her is sufficient to contact him/her.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is interesting to note that although the RTI Act gives every citizen a right to information, it does not limit this right with a stipulation as to how the information shall be used by the applicant or the reason for which the applicant wants such information.	&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; This lack of a purpose limitation in the Act may have privacy implications as non sensitive personal 	information could be sought from different sources and processed by any person so as to convert such non-sensitive or anonymous information into 	identifiable information which could directly impact the privacy of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The exception in S. 8(1)(j) prohibits the disclosure of personal information for two reasons (i) its disclosure does not relate to any public activity or 	interest or (ii) it would be an unwarranted invasion into privacy. The above two conditions however get trumped if a larger public interest is satisfied by 	the disclosure of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One interesting thing about the exception contained in section 8(1)(j) is that this exception itself has an exception to it in the form of a proviso. The 	proviso says that any information which cannot be denied to the central or state legislature shall not be denied to any person. Since the proviso has been 	placed at the end of sub-section 8(1) which is also the end of clause 8(1)(j), one might be tempted to ask whether this proviso applies only to the privacy 	exception i.e. clause 8(1)(j) or to the entire sub-section 8(1) (which includes other exceptions such as national interest, etc.). This issue was put to 	rest by the Bombay High Court when it held that since the proviso has been put only after clause 8(1)(j) and not before each and every clause, it would not 	apply to the entire sub-section 8(1) but only to clause 8(1)(j), thus ensuring that the exceptions to disclosure other than the right to privacy are not 	restricted by this proviso.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Scope of Proviso to section 8(1)(j)&lt;/b&gt;&lt;br /&gt;Though the courts have agreed that the proviso is applicable only to section 8(1)(j), the import of the proviso to section 8(1)(j) is a little more 	ambiguous and there are conflicting decisions by different High Courts on this point. Whereas the Bombay High Court has laid emphasis on the letter of the proviso and derived strength from the objects and overall scheme of the Act to water down the provisions of section 8(1)(j),	&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; the Delhi High Court has disagreed with such an approach which gives "undue, even overwhelming 	deference" to Parliamentary privilege in seeking information. Such an approach would render the protection under section 8(1)j) meaningless, and the basic 	safeguard bereft of content.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; In the words of the Delhi High Court:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;" 	&lt;i&gt; The proviso has to be only as confined to what it enacts, to the class of information that Parliament can ordinarily seek; if it were held that all 		information relating to all public servants, even private information, can be accessed by Parliament, Section 8(1)(j) would be devoid of any substance, 		because the provision makes no distinction between public and private information. Moreover there is no law which enables Parliament to demand all such 		information; it has to be necessarily in the context of some matter, or investigation. If the reasoning of the Bombay High Court were to be accepted, 		there would be nothing left of the right to privacy, elevated to the status of a fundamental right, by several judgments of the Supreme Court. &lt;/i&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The interpretation given by the Delhi High Court thus ensures that section 8(1)(j) still has some effect, as otherwise the privacy exception would have 	gotten steamrolled by parliamentary privilege and all sorts of information such as Income Tax Returns, etc. of both private and public individuals would 	have been liable to disclosure under the RTI Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, the RTI Act does not describe the terms "personal information" or "larger public interest" used in section 8(1)(j), which leaves some amount 	of ambiguity in interpreting the privacy exception to the RTI Act. Therefore the only option for anyone to understand these terms in greater depth is to 	discuss and analyse the case laws developed by the Hon'ble Supreme Court and the High Courts which have tried to throw some light on this issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We shall discuss some of these landmark judgments to understand the interpretations given to these terms and then move on to specific instances where 	(applying these principles) information has been disclosed or denied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Personal Information&lt;/b&gt;&lt;br /&gt;The RTI Act defines the term information but does not define the term "personal information". Therefore one has to rely on judicial pronouncements to 	understand the term a more clearly. Looking at the common understanding and dictionary meaning of "personal" as well as the definition of "information" 	contained in the RTI Act it could be said that personal information would be information, information that pertains to a person and as such it takes into 	its fold possibly every kind of information relating to the person. Now, such personal information of the person may, or may not, have relation to any public activity, or to public interest. At the same time, such personal information may, or may not, be private to the person.	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Delhi High Court has tried to draw a distinction between the term "private information" which encompasses the personal intimacies of the home, the 	family, marriage, motherhood, procreation, child rearing and of the like nature and "personal information" which would be any information that pertains to an individual. This would logically imply that all private information would be part of personal information but not the other way round.	&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; The term 'personal information' has in other cases, been variously described as "identity particulars 	of public servants, i.e. details such as their dates of birth, personal identification numbers",&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt; and as 	including tax returns, medical records etc.&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; It is worth noting that just because the term used is 	"personal information" does not mean that the information always has to relate to an actual person, but may even be a juristic entity such as a trust or 	corporation, etc.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Larger Public Interest&lt;/b&gt;&lt;br /&gt;The term larger public interest has not been discussed or defined in the RTI Act, however the Courts have developed some tests to determine if in a given 	situation, personal information should be disclosed in the larger public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whenever a Public Information Officer is asked for personal information about any person, it has to balance the competing claims of the privacy of the 	third party on the one hand and claim of public interest on the other and determine whether the public interest in such a disclosure satisfies violating a 	person's privacy. The expression "public interest" is not capable of a precise definition and does not have a rigid meaning. It is therefore an elastic 	term and takes its colors from the statute in which it occurs, the concept varying with the time and the state of the society and its needs. This seems to 	be the reason why the legislature and even the Courts have shied away from a precise definition of "public interest". However, the term public interest 	does not mean something that is merely interesting or satisfies the curiosity or love of information or amusement; but something in which a class of the 	community have some interest by which their rights or liabilities are affected.&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have been suggestions that the use of the word "larger" before the term "public interest" denotes that the public interest involved should serve a 	large section of the society and not just a small section of it, i.e. if the information has a bearing on the economy, the moral values in the society; the 	environment; national safety, or the like, the same would qualify as "larger public interest".&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; However 	this is not a very well supported theory and the usage of the term "larger public interest" cannot be given such a narrow meaning, for example what if the 	disclosure of the information could save the lives of only 10 people or even just 5 children? Would the information not be released just because it 	violates one person's right to privacy and there is not a significant number of lives at stake? This does not seem to be what all the cases on the right to privacy, right from &lt;i&gt;Kharak Singh&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;b&gt;[27]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; all the way to &lt;i&gt;Naz Foundation&lt;/i&gt;,	&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt; seem to suggest. Infact, in the very same judgment where the above interpretation has been suggested, 	the Court undermines this argument by giving the example of a person with a previous crime of sexual assault being employed in an orphanage and says that 	the interest of the small group of children in the orphanage would outweigh the privacy concerns of the individual thus requiring disclosure of all 	information regarding the employee's past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In light of the above understanding of section 8(1)(j), there seem to be two different tests that have been proposed by the Courts, which seem to connote 	the same principle although in different words:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. The test laid down by &lt;i&gt;Union Public Service Commission&lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) The information sought must relate to „Personal information‟ as understood above of a third party. Therefore, if the information sought 	does not qualify as personal information, the exemption would not apply;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Such personal information should relate to a third person, i.e., a person other than the information seeker or the public authority; AND&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) (a) The information sought should not have a relation to any public activity qua such third person, or to public interest. If the information sought 	relates to public activity of the third party, i.e. to his activities falling within the public domain, the exemption would not apply. Similarly, if the 	disclosure of the personal information is found justified in public interest, the exemption would be lifted, otherwise not; OR (b) The disclosure of the information would cause unwarranted invasion of the privacy of the individual, and that there is no larger public interest involved in such disclosure.	&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. The other test was laid down in &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, but in the specific circumstances of disclosure of personal 	information relating to a public official:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) whether the information is deemed to comprise the individual's private details, unrelated to his position in the organization;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) whether the disclosure of the personal information is with the aim of providing knowledge of the proper performance of the duties and tasks assigned 	to the public servant in any specific case; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) whether the disclosure will furnish any information required to establish accountability or transparency in the use of public resources.	&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Constitutional Restrictions&lt;/b&gt;&lt;br /&gt;Since there is not extensive academic discussion on the meaning of the term "larger public interest" or "public interest" as provided in section 8(1)(j), 	one is forced to turn to other sources to get a better idea of these terms. One such source is constitutional law, since the right to privacy, as contained in section 8(1)(j) has its origins in Articles 14,&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; 19(1)(a)	&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt; and 21&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; of the Constitution of India. The 	constitutional right to privacy in India is also not an absolute right and various cases have carved out a number of exceptions to privacy, a perusal of 	which may give some indication as to what may be considered as 'larger public interest', these restrictions are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) Reasonable restrictions can be imposed on the right to privacy in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence;	&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) Reasonable restrictions can be imposed upon the right to privacy either in the interests of the general public or for the protection of the interests of 	any Scheduled Tribe;&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c) The right to privacy can be restricted by procedure established by law which procedure would have to satisfy the test laid down in the	&lt;i&gt;Maneka Gandhi case&lt;/i&gt;.&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d) The right can be restricted if there is an important countervailing interest which is superior;	&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e) It can be restricted if there is a compelling state interest to be served by doing so;	&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;f) It can be restricted in case there is a compelling public interest to be served by doing so;	&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;g) The &lt;i&gt;Rajagopal tests - &lt;/i&gt;This case lays down three exceptions to the rule that a person's private information cannot be published, &lt;i&gt;viz. &lt;/i&gt; i) person voluntarily thrusts himself into controversy or voluntarily raises or invites a controversy, ii) if publication is based on public records other 	than for sexual assault, kidnap and abduction, iii) there is no right to privacy for public officials with respect to their acts and conduct relevant to 	the discharge of their official duties. It must be noted that although the Court talks about public records, it does not use the term 'public domain' and 	thus it is possible that even if a document has been leaked in the public domain and is freely available, if it is not a matter of public record, the right 	to privacy can still be claimed in regard to it.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Section 8(1)(j) in Practice &lt;br /&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussion in the previous chapter regarding the interpretation of section 8(1)(j), though (hopefully) helpful still seems a little abstract without 	specific instances and illustrations to drive home the point. In this chapter we shall endeavor to briefly discuss some specific cases regarding 	information disclosure where the issue of violation of privacy of a third party was raised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Private Information of Public Officials&lt;/b&gt;&lt;br /&gt;Some of the most common problems regarding section 8(1)(j) come up when discussing information (personal or otherwise) regarding public officers. The issue 	comes up because an argument can be made that certain information such as income tax details, financial details, medical records, etc. of public officials 	should be disclosed since it has a bearing on their public activities and disclosure of such information in case of crooked officers would serve the 	interests of transparency and cleaner government (hence serving a larger public interest). Although section 8(1)(j) does not make any distinction between a 	private person and a public servant, a distinction in the way their personal information is treated does appear in reality due to the inherent nature of a public servant. Infact it has sometimes been argued that public servants must waive the right to privacy in favour of transparency.&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt; However this argument has been repeatedly rejected by the Courts,	&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt; just because a person assumes public office does not mean that he/she would automatically lose their 	right to privacy in favour of transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If personal information regarding a public servant is asked for, then a distinction must be made between the information that is inherently personal to the 	person and that which has a connection with his/her public functions. The information exempted under section 8(1)(j) is personal information which is so 	intimately private in nature that the disclosure of the same would not benefit any other person, but would result in the invasion of the privacy of the 	third party.&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt; In short, the Courts have concluded that there can be no blanket rule regarding what 	information can and cannot be disclosed when it comes to a public servant, and the disclosure (or lack of it) would depend upon the circumstances of each 	case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the earlier thinking of the CIC as well as various High Courts of the country was that information regarding disciplinary proceedings and service 	records of public officials is to be treated as public information in order to boost transparency,&lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt; however this line of thinking took almost a U-turn in 2012 after the decision of the Supreme Court in &lt;i&gt;Girish Ramchandra Deshpande &lt;/i&gt;v.	&lt;i&gt;Central Information Commissioner,&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;b&gt;[45]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; and now the prevailing principle is that 	such information is personal information and should not be disclosed unless a larger public interest is would be served by the disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would also be helpful to look at a list of the type of information regarding public servants which has been disclosed in the past, gleaned from various 	cases, to get a better understanding of the prevailing trends in such cases:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Details of postings of public servants at various points of time, since this was not considered as personal information;	&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Copies of posting/ transfer orders of public servants, since it was not considered personal information;	&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Information regarding transfers of colleagues cannot be exempted from disclosure, since disclosure would not cause any unwarranted invasion of 	privacy and non disclosure would defeat the object of the RTI Act;&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Information regarding the criteria adopted and the marks allotted to various academic qualifications, experience and interview in selection process 	for government posts by the state Public Service Commission;&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Information regarding marks obtained in written test, interview, annual confidential reports of the applicant as well as the marks in the written test and interview of the last candidate selected, since this information was not considered as personal information;	&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Information relating to the appointment and educational certificates of teachers in an educational institution (which satisfies the requirements of being a public authority) was disclosed since this was considered as relevant to them performing their functions.	&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The performance of an employee/officer in an organization is primarily a matter between the employee and the employer and normally those aspects are 	governed by the service rules which fall under the expression "personal information", the disclosure of which has no relationship to any public activity or 	public interest. To understand this better below is a brief list of the type of information that has been considered by the Courts as personal information 	which is liable to be exempt from disclosure under section 8(1)(j):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) (a) Salary details, (b) show cause notice, memo and censure, (c) return of assets and liabilities, (d) details of investment and other related details, 	(e) details of gifts accepted, (f) complete enquiry proceedings, (g) details of income tax returns;&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) All memos issued, show cause notices and orders of censure/punishment etc. are personal information. Cannot be revealed unless a larger public 	interest justifies such disclosure;&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Disciplinary information of an employee is personal information and is exempt under section 8(1)(j);	&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Medical records cannot be disclosed due to section 8(1)(j) as they come under "personal information", unless a larger public interest can be shown 	meriting such disclosure;&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Copy of personnel records and service book (containing Annual Confidential Reports, etc.) of a public servant is personal information and cannot be 	disclosed due to section 8(1)(j);&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Information regarding sexual disorder, DNA test between an officer and his surrogate mother, name of his biological father and step father, name of 	his mother and surrogate step mother and such other aspects were denied by the Courts as such information was considered beyond the perception of decency 	and was an invasion into another man's privacy.&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is not just the issue of disclosure of personal details of public officials that raises complicated questions regarding the right to information, but 	the opposite is equally true, i.e. what about seemingly "public" details of private individuals. A very complicated question arose with regard to 	information relating to the passport details of private individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Passport Information of Private Individuals&lt;/b&gt;&lt;br /&gt;The disclosure of passport details of private individuals is complicated because for a long time there was some confusion because of the treatment to be 	given to passport details, i.e. would its disclosure cause an invasion of privacy since it contains personally identifying information, specially because 	photocopies of the passport are regularly given for various purposes such as travelling, getting a new phone connection, etc. The Central Information 	Commission used a somewhat convoluted logic that since a person providing information relating to his residence and identity while applying for a passport 	was engaging in a public activity therefore such information relates to a public activity and should be disclosed. This view was rejected by the Delhi High Court in the case of &lt;i&gt;Union of India&lt;/i&gt; v. &lt;i&gt;Hardev Singh&lt;/i&gt;,&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt; and the view taken in&lt;i&gt;Hardev Singh&lt;/i&gt; was later endorsed and relied upon in &lt;i&gt;Union of India &lt;/i&gt;v. &lt;i&gt;Rajesh Bhatia&lt;/i&gt;,	&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt; while hearing a number of petitions to decide what details of a third party's passport should be 	disclosed and what should be exempt from disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A list of the Courts conclusions is given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;Information that can be revealed:&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Name of passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Whether a visa was issued to a third party or not;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Details of the passport including dates of first issue, subsequent renewals, dates of application for renewals, numbers of the new passports and date 	of expiry;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Nature of documents submitted as proof;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Name of police station from where verification for passport was done;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Whether any report was called for from the jurisdictional police;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vii) Whether passport was renewed through an agent or through a foreign embassy;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(viii) Whether it was renewed in India or any foreign country;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ix) Whether tatkal facility was availed by the passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;Information that cannot be revealed:&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Contents of the documents submitted with the passport application;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Marital status and name and address of husband;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Whether person's name figures as mother/guardian in the passport of any minor;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Copy of passport application form;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Residential address of passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Details of cases filed/pending against passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vii) Copy of old passport;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(viii) Report of the police and CID for issuing the passport;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ix) Copy of the Verification Certificate, if any such Verification Certificate was relied upon for the issue of the passport.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Instances &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the above two broad categories of information that has been the subject of intense judicial discussion, certain other situations have also 	arisen where the Courts have had to decide the issue of disclosure under section 8(1)(j), a brief summary of such situations is given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) names and details of people who received money as donations from the President out of public funds was considered as information which has a definite 	link to public activities and was therefore liable to be disclosed;&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) information regarding the religion practiced by a person, who is alleged to be a public figure, collected by the Census authorities was not disclosed since it was held that the quest to obtain the information about the religion professed or not professed by a citizen cannot be in any event;	&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) information regarding all FIRs against a person was not protected under section 8(1)(j) since it was already a matter of public record and Court 	record and could not be said to be an invasion of the person's privacy;&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) information regarding the income tax returns of a public charitable trust was held not to be exempt under section 8(1)(j), since the trust involved 	was a public charitable trust functioning under a Scheme formulated by the District Court and registered under the Bombay Public Trust Act as such due to 	its character and activities its tax returns would be in relation to public interest or activities.&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A discussion of the provisions of section 8 and 11 of the RTI Act as well as the case laws under it reveals that the legislature was aware of the dangers 	posed to the privacy of individuals from such a powerful transparency law. However, it did not want the exceptions carved out to protect the privacy of 	individuals to nullify the objects of the RTI Act and therefore drafted the legislation to incorporate the principle that although the RTI Act should not 	be used to violate the privacy of individuals, such an exception will not be applicable if a larger public interest is to be served by the disclosure. This 	principle is in line with other common law jurisdictions such as the U.K, Austalia, Canada, etc. which have similar exceptions based on privacy or 	confidentiality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However it is disappointing to note that the legislature has only left the legislation at the stage of the principle which has left the language of the 	exception very wide and open to varied interpretations. It is understandable that the legislature would try to keep specifics out of the scope of the 	section to make it future proof. It is obvious that it would be impossible for the legislature or the courts to imagine every single circumstance that 	could arise where the right to information and the right to privacy would be at loggerheads. However, such wide and ambiguous drafting has led to cases 	where the Courts and the Central Information Commission have taken opposing views, with the views of the Court obviously prevailing in the end. This was 	illustrated by the issue of disclosure of passport details of private individuals with a large number of CIC cases taking different views till the High 	Court of Delhi gave categorical findings on the issue in the &lt;i&gt;Hardev Singh&lt;/i&gt; and &lt;i&gt;Rajesh Bhatia&lt;/i&gt; cases. Similar was the issue of service 	details of public officials since before the decision of the Supreme Court in the case of &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; in 2012 the prevailing 	thinking of the CIC was that details of disciplinary proceedings against public officials are not covered by section 8(1)(j), however this thinking has now 	taken a U-turn as the Supreme Court's understanding of the right to privacy has taken stronger roots and such information is now outside the scope of the 	RTI Act, unless a larger public interest in the disclosure can be shown.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ambiguity that arises in application when trying to balance the right to privacy against the right to information is a drawback in incorporating only a 	principle and leaving the language ambiguous in any legislation. This paper does not advocate that the legislature try to list out all the instances of 	this problem that are possibly imaginable, this would be too time consuming and may even be counterproductive. However, it is possible for the legislature 	to adopt an accepted practice of legislative drafting and list certain instances where there is an obvious balancing required between the two rights and 	put them as "&lt;i&gt;Illustrations&lt;/i&gt;" to the section. This device has been utilised to great effect by some of the most fundamental legislations in India 	such as the Contract Act, 1872 and the Indian Penal Code, 1860. An alternative to this approach could be to utilize the approach taken in the Australian 	Freedom of Information Act, where the Act itself gives certain factors which should be considered to determine whether access to a particular document 	would be in the public interest or not.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;List of References&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Primary Sources&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Australia Freedom of Information Act, 1982.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;i&gt;Bennet Coleman&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, AIR 1973 SC 106.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;i&gt;Bhagat Singh &lt;/i&gt;v. &lt;i&gt;Chief Information Commissioner, &lt;/i&gt;2008 (64) AIC 284 (Del).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Calcutta High Court, WP (W) No. 33290 of 2013, dated 20-11-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Canadian Access to Information Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Constitution of India, 1950.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. &lt;i&gt;Govind&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. &lt;i&gt;Haryana Public Service Commission &lt;/i&gt;v. &lt;i&gt;State Information Commission, &lt;/i&gt;AIR 2009 P &amp;amp; H 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10. &lt;i&gt;Jamia Millia Islamia v. Sh. Ikramuddin&lt;/i&gt;, Delhi High Court, WP(C) 5677 of 2011 dated 22-11-2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;11. &lt;i&gt;Jitendra Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, 2008 (66) AIC 685 (All).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;12. &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, AIR 1963 SC 129.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;13. &lt;i&gt;Maneka Gandhi &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;, Supreme Court of India, WP No. 231 of 1977, dated 25-01-1978.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;14. &lt;i&gt;Naz Foundation&lt;/i&gt; Delhi High Court, WP(C) No.7455/2001 dated 02-07-2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;15. &lt;i&gt;P.C. Wadhwa&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, Punjab and Haryana High Court, LPA No. 1252 of 2009 dated 29-11-2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;16. &lt;i&gt;Paardarshita Public Welfare Foundation&lt;/i&gt; v. &lt;i&gt;Union of India and others&lt;/i&gt;, AIR 2011 Del 82.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;17. &lt;i&gt;President's Secretariat&lt;/i&gt; v. &lt;i&gt;Nitish Kumar Tripathi&lt;/i&gt;, Delhi High Court, WP (C) 3382 of 2012, dated 14-06-2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;18. &lt;i&gt;Public Information Officer&lt;/i&gt; v. &lt;i&gt;Andhra Pradesh Information Commission&lt;/i&gt;,2009 (76) AIC 854 (AP).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;19. &lt;i&gt;R. Rajagopal v. Union of India&lt;/i&gt;, Supreme Court of India, dated 7-10-1994.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20. &lt;i&gt;Rajendra Vasantlal Shah&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner, New Delhi&lt;/i&gt;, AIR 2011 Guj 70.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;21. &lt;i&gt;Rajinder Jaina&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, 2010 (86) AIC 510 (Del. H.C.).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;22. Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;23. &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;24. &lt;i&gt;Srikant Pandaya&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, AIR 2011 MP 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;25. &lt;i&gt;Surendra Singh &lt;/i&gt;v. &lt;i&gt;State of U.P&lt;/i&gt;, AIR 2009 Alld. 106.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;26. &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;27. &lt;i&gt;Tata Press Ltd. &lt;/i&gt;v.&lt;i&gt; Maharashtra Telephone Nigam Ltd.&lt;/i&gt;, (1995) 5 SCC 139.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;28. U.K. Freedom of Information Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;29. &lt;i&gt;UCO Bank&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner and another&lt;/i&gt;, 2009 (79) AIC 545 (P&amp;amp;H).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30. &lt;i&gt;Union Centre for Earth Science Studies &lt;/i&gt;v. &lt;i&gt;Anson Sebastian, &lt;/i&gt;AIR 2010 Ker. 151&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;31. &lt;i&gt;Union of India&lt;/i&gt; v. &lt;i&gt;Hardev Singh&lt;/i&gt; WP(C) 3444 of 2012 dated 23-08-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;32. &lt;i&gt;Union of India &lt;/i&gt;v. &lt;i&gt;Rajesh Bhatia&lt;/i&gt; WP(C) 2232/2012 dated 17-09-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;33. &lt;i&gt;Union Public Service Commission &lt;/i&gt;v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 	13-07-2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;34. &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Secondary Sources&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. "Country Report for U.K.", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/united-kingdom"&gt;https://www.privacyinternational.org/reports/united-kingdom&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. "Country Report for Australia", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/australia"&gt;https://www.privacyinternational.org/reports/australia&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. "Country Report for Canada", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/canada"&gt;https://www.privacyinternational.org/reports/canada&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; AIR 1973 SC 106. This case held that the freedom of the press embodies in itself the right of the people to read.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; (1995) 5 SCC 139.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; AIR 1963 SC 129.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Section 8(1) in its entirety states as follows:&lt;/p&gt;
&lt;p&gt;(1) Notwithstanding anything contained in this Act, there shall be no obligation to give any citizen,-&lt;/p&gt;
&lt;p&gt;(a) information, disclosure of which would prejudicially affect the sovereignty and integrity of India, the security, strategic, scientific or 			economic interests of the State, relation with foreign State or lead to incitement of an offence;&lt;/p&gt;
&lt;p&gt;(b) information which has been expressly forbidden to be published by any court of law or tribunal or the disclosure of which may constitute 			contempt of court;&lt;/p&gt;
&lt;p&gt;(c) information, the disclosure of which would cause a breach of privilege of Parliament or the State Legislature;&lt;/p&gt;
&lt;p&gt;(d) information including commercial confidence, trade secrets or intellectual property, the disclosure of which would harm the competitive 			position of a third party, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;/p&gt;
&lt;p&gt;(e) information available to a person in his fiduciary relationship, unless the competent authority is satisfied that the larger public interest 			warrants the disclosure of such information;&lt;/p&gt;
&lt;p&gt;(f) information received in confidence from foreign Government;&lt;/p&gt;
&lt;p&gt;(g) information, the disclosure of which would endanger the life or physical safety of any person or identify the source of information or 			assistance given in confidence for law enforcement or security purposes;&lt;/p&gt;
&lt;p&gt;(h) information which would impede the process of investigation or apprehension or prosecution of offenders;&lt;/p&gt;
&lt;p&gt;(i) cabinet papers including records of deliberations of the Council of Ministers, Secretaries and other officers:&lt;/p&gt;
&lt;p&gt;Provided that the decisions of Council of Ministers, the reasons thereof, and the material on the basis of which the decisions were taken shall be 			made public after the decision has been taken, and the matter is complete, or over:&lt;/p&gt;
&lt;p&gt;Provided further that those matters which come under the exemptions specified in this section shall not be disclosed;&lt;/p&gt;
&lt;p&gt;(j) information which relates to personal information the disclosure of which has no relationship to any public activity or interest, or which 			would cause unwarranted invasion of the privacy of the individual unless the Central Public Information Officer or the State Public Information 			Officer or the appellate authority, as the case may be, is satisfied that the larger public interest justifies the disclosure of such information:&lt;/p&gt;
&lt;p&gt;Provided that the information which cannot be denied to the Parliament or a State Legislature shall not be denied to any person.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Section 11 of the RTI Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;i&gt;The Registrar General&lt;/i&gt; v. &lt;i&gt;A. Kanagaraj&lt;/i&gt;, (Madras High Court, 14 June 2013, available at http://www.indiankanoon.org/doc/36226888/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Arvind Kejriwal v. Central Public Information Officer, (Delhi High Court, 30 September 2011, available at http://www.indiankanoon.org/doc/1923225/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Sections 40 and 41 of the U.K. Freedom of Information Act, 2000.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Section 11A read with section 47-F of the Australia Freedom of Information Act, 1982.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Section 19 of the Canadian Access to Information Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;i&gt;Public Information Officer&lt;/i&gt; v. &lt;i&gt;Andhra Pradesh Information Commission&lt;/i&gt;,2009 (76) AIC 854 (AP).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; &lt;i&gt;Bhagat Singh &lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner, &lt;/i&gt;2008 (64) AIC 284 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Articles 14, 19(1)(a) and 21 of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Calcutta High Court, WP(W) No. 33290 of 2013, dated 20-11-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;i&gt;Jitendra Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, 2008 (66) AIC 685 (All).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom), para 14. Where the Court held that since the medical records of a convict cannot be 			denied to Parliament or State legislature therefore they cannot be exempted from disclosure under the Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; &lt;i&gt;Jamia Millia Islamia v. Sh. Ikramuddin&lt;/i&gt; , Delhi High Court, WP(C) 5677 of 2011 dated 22-11-2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; AIR 1963 SC 129.&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Delhi High Court, WP(C) No.7455/2001 dated 02-07-2009.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 (for stay), dated 13-07-2012. This ruling was overturned by a 			Division Bench of the High Court relying upon a subsequent Supreme Court ruling, however, it could be argued that the Division Bench did not per se 			disagree with the discussion and the principles laid down in this case, but only the way they were applied.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; Right to equality.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Freedom of speech and expression.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Right to life.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Article 19(2) of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; Article 19(5) of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; &lt;i&gt;Maneka Gandhi &lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, Supreme Court of India, WP No. 231 of 1977, dated 25-01-1978. The test laid down in this case is universally considered 			to be that the procedure established by law which restricts the fundamental right should be just, fair and reasonable.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975. However the Court later used phrases such as 			"reasonable restriction in public interest" and "reasonable restriction upon it for compelling interest of State" interchangeably which seems to 			suggest that the terms "compelling public interest" and "compelling state interest" used by the Court are being used synonymously and the Court 			does not draw any distinction between them. It is also important to note that the wider phrase "countervailing interest is shown to be superior" 			seems to suggest that it is possible, atleast in theory, to have other interests apart from public interest or state interest also which could 			trump the right to privacy.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; &lt;i&gt;R. Rajagopal v. Union of India&lt;/i&gt; , Supreme Court of India, dated 7-10-1994. These tests have been listed as one group since they are all applicable in the specific context of 			publication of private information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010. Also see &lt;i&gt;Vijay Prakash&lt;/i&gt; v.			&lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667. This case also held that information cannot be denied on the ground that it 			would be too voluminous.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; &lt;i&gt;Union Centre for Earth Science Studies &lt;/i&gt; v. &lt;i&gt;Anson Sebastian, &lt;/i&gt;AIR 2010 Ker. 151; &lt;i&gt;Union Public Service Commission &lt;/i&gt;v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 			&amp;amp; C.M. No. 2618/2011 (for stay), dated 13-07-2012&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; &lt;i&gt;Haryana Public Service Commission &lt;/i&gt; v. &lt;i&gt;State Information Commission, &lt;/i&gt;AIR 2009 P &amp;amp; H 14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; &lt;i&gt;UCO Bank&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner and another&lt;/i&gt;, 2009 (79) AIC 545 (P&amp;amp;H).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; &lt;i&gt;Surendra Singh &lt;/i&gt; v. &lt;i&gt;State of U.P&lt;/i&gt;, AIR 2009 Alld. 106.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; &lt;i&gt;R.K. Jain&lt;/i&gt; v. &lt;i&gt;Union Public Service Commission&lt;/i&gt;, Delhi High Court, LPA No. 618 of 2012, dated 12-11-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; &lt;i&gt;Srikant Pandaya&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, AIR 2011 MP 14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; &lt;i&gt;Paardarshita Public Welfare Foundation&lt;/i&gt; v. &lt;i&gt;Union of India and others&lt;/i&gt;, AIR 2011 Del 82. It must be mentioned that this case was not exactly under the procedure prescribed under 			the RTI Act but was a public interest litigation although the courts relied upon the provisions of the RTI Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; WP(C) 3444 of 2012 dated 23-08-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; WP(C) 2232/2012 dated 17-09-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; &lt;i&gt;President's Secretariat&lt;/i&gt; v. &lt;i&gt;Nitish Kumar Tripathi&lt;/i&gt;, Delhi High Court, WP (C) 3382 of 2012, dated 14-06-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; &lt;i&gt;P.C. Wadhwa&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, Punjab and Haryana High Court, LPA No. 1252 of 2009 dated 29-11-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; &lt;i&gt;Rajinder Jaina&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, 2010 (86) AIC 510 (Del. H.C.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; &lt;i&gt;Rajendra Vasantlal Shah&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner, New Delhi&lt;/i&gt;, AIR 2011 Guj 70.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2'&gt;https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-09T02:53:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp">
    <title>What’s up with WhatsApp?</title>
    <link>https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp</link>
    <description>
        &lt;b&gt;In 2016, WhatsApp Inc announced it was rolling out end-to-end encryption, but is the company doing what it claims to be doing?&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Aayush Rathi and Sunil Abraham was published in &lt;a class="external-link" href="http://www.atimes.com/article/whats-up-with-whatsapp/"&gt;Asia Times&lt;/a&gt; on April 20, 2018.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Back in April 2016, when WhatsApp Inc announced it was rolling out end-to-end encryption (E2EE) for its billion-plus strong user base as a default setting, the messaging behemoth signaled to its users it was at the forefront of providing technological solutions to protect privacy.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Emphasized in the security white paper explaining the implementation of the technology is the encryption of both forms of communication – one-to-one and group and also of all types of messages shared within such communications – text as well as media.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Simply put, all communication taking place over WhatsApp would be decipherable only to the sender and recipient – it would be virtual gibberish even to WhatsApp.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;This announcement came in the backdrop of &lt;a href="https://www.theguardian.com/us-news/2016/feb/17/apple-ordered-to-hack-iphone-of-san-bernardino-shooter-for-fbi"&gt;Apple locking horns with the FBI&lt;/a&gt; after being asked to provide a backdoor to unlock the San Bernardino mass shooter’s iPhone. This further reinforced WhatsApp Inc’s stand on the ensuing debate between the interplay of privacy and security in the digital age.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Kudos to WhatsApp, for there is &lt;a href="http://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/CallForSubmission.aspx"&gt;growing discussion&lt;/a&gt; around how encryption and anonymity is central to enabling secure online communication which in turn is integral to essential human rights such as those of freedom of opinion and expression.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;WhatsApp may have taken encryption to the masses, but here we outline why WhatsApp’s provisioning of privacy and security measures needs a more granular analysis – is the company doing what it claims to be doing? Security issues with WhatsApp’s messaging protocol certainly are not new.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Man-in-the-middle attacks&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;A &lt;a href="https://eprint.iacr.org/2017/713.pdf"&gt;study&lt;/a&gt; published by a group of German researchers from Ruhr University highlighted issues with WhatsApp’s implementation of its E2EE protocol to group communications. Another &lt;a href="https://courses.csail.mit.edu/6.857/2016/files/36.pdf"&gt;paper&lt;/a&gt; points out how WhatsApp’s session establishment strategy itself could be problematic and potentially be targeted for what are called man-in-the-middle (MITM) attacks.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;An MITM attack takes the form of a malicious actor, as the term suggests, placing itself between the communicating parties to eavesdrop or impersonate. The Electronic Frontier Foundation also &lt;a href="https://www.eff.org/deeplinks/2016/10/where-whatsapp-went-wrong-effs-four-biggest-security-concerns"&gt;highlighted&lt;/a&gt; other security vulnerabilities, or trade-offs, depending upon ideological inclinations, with respect to WhatsApp allowing for storage of unencrypted backups, issues with WhatsApp’s web client and also with its approach to cryptographic key change notifications.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Much has been written questioning WhatsApp’s shifting approach to ensuring privacy too. Quoting straight from &lt;a href="https://www.whatsapp.com/legal/#privacy-policy-affiliated-companies"&gt;WhatsApp’s Privacy Policy:&lt;/a&gt; “We joined the Facebook family of companies in 2014. As part of the Facebook family of companies, WhatsApp receives information from, and shares information with, this family of companies.” Speaking of Facebook …&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Culling out larger issues with WhatsApp’s privacy policies is not the intention here. What we specifically seek to explore is right at the nexus of WhatsApp’s security and privacy provisioning clashing with its marketing strategy: the storage of data on WhatsApp’s servers, or ‘blobs,’ as they are referred to in the technical paper. Facebook’s rather. In WhatsApp’s words: “Once your messages (including your chats, photos, videos, voice messages, files and share location information) are delivered, they are deleted from our servers. Your messages are stored on your own device.”&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;In fact, this non-storage of data on their ‘blobs’ is emphasizes at several other points on the official website. Let us call this the deletion-upon-delivery model.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;A simple experiment&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;While drawing up a rigorous proof of concept, made near-impossible thanks to WhatsApp being a closed source messaging protocol, a simple experiment is enough to raise some very pertinent questions about WhatsApp’s outlined deletion-upon-delivery model. It should, however, be mentioned that the Signal Protocol developed by Open Whisper Systems and pivotal in WhatsApp’s rolling out of E2EE is &lt;a href="https://github.com/signalapp"&gt;open source&lt;/a&gt;. Here is how the experiment proceeds:&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick sends Morty an attachment.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Morty then switches off the data on her mobile device.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick downloads the attachment, an image.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Subsequently, Rick deletes the image from his mobile device’s internal storage.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Rick then logs into a WhatsApp’s web client on his browser. (Prior to this experiment, both Rick and Morty had logged out from all instances of the web client)&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;&lt;i&gt;Upon a fresh log-in to the web client and opening the chat with Morty, the option to download the image is available to Rick.&lt;/i&gt;&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The experiment concludes with bewilderment at WhatsApp’s claim of deletion-upon-delivery as outlined earlier. The only place from which Morty could have downloaded the image would be from Facebook’s ‘blobs.’ The attachment could not have been retrieved from Morty’s mobile device as it had no way of sending data and neither from Rick’s mobile device as it no longer existed in the device’s storage.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As per the Privacy Policy, the data is stored on the ‘blobs’ for a period of 30 days after transmission of a message only when it can’t be delivered to the recipient. Upon delivery, the deletion-upon-delivery model is supposed to kick in.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Another straightforward experiment that leads to a similar conclusion is seeing the difference in time taken for a large attachment to be forwarded as opposed to when the same large attachment is uploaded. Forwarding is palpably quicker than uploading afresh: non-storage of attachments on the ‘blob’ would entail that the same amount should be taken for both.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The plot thickens. WhatsApp’s Privacy Policy goes on to state: “To improve performance and deliver media messages more efficiently, such as when many people are sharing a popular photo or video, we may retain that content on our servers for a longer period of time.”  The technical paper offers no help in understanding how WhatsApp systems assess frequently shared encrypted media messages without decrypting it at its end.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;A possible explanation could be the usage of metadata by WhatsApp, which it discloses in its Privacy Policy while simultaneously being sufficiently vague about the specifics of it. That WhatsApp may be capable of reading encrypted communication through the inclusion of a backdoor bodes well for law enforcement, but not so much for unsuspecting users.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The weakest link in the chain&lt;/h3&gt;
&lt;p class="p4" style="text-align: justify; "&gt;Concerns about backdoors in WhatsApp’s product have led the French government to start developing their &lt;a href="https://www.reuters.com/article/us-france-privacy/france-builds-whatsapp-rival-due-to-surveillance-risk-idUSKBN1HN258"&gt;own encrypted messaging service&lt;/a&gt;. This will be built using Matrix – an open protocol designed for real-time communication. Indeed, the Privacy Policy lays out that the company “may collect, use, preserve, and share your information if we have a good-faith belief that it is reasonably necessary to respond pursuant to applicable law or regulations, to legal process, or to government requests.”&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;The Signal Protocol is the undisputed gold standard of E2EE implementations. It is the integration with the surrounding functionality that WhatsApp offers which leads to vulnerabilities. After all, a chain is only as strong as its weakest link. Assuming that the attachments stored on the ‘blobs’ are in encrypted form, indecipherable to all but the intended recipients, this does not pose a privacy risk for the users from a technological point of view.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;However, it is easy lose sight of the fact that the Privacy Policy is a legally binding document and it specifically states that messages are not stored on the ‘blobs’ as a matter of routine. As a side note, WhatsApp’s Privacy Policy and Terms of Service are refreshing in their readability and lack of legalese.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As we were putting the final touches to this piece, &lt;a href="https://wabetainfo.com/whatsapp-allows-to-redownload-deleted-media/#more-2781"&gt;news from &lt;i&gt;WABetaInfo&lt;/i&gt;&lt;/a&gt;, a well-reputed source of information on WhatsApp features, has broken that newer updates of WhatsApp for Android are permitting users to re-download media deleted up to three months back. WhatsApp cannot possibly achieve this without storing the media in the ‘blobs,’ or in other words, in violation of its Privacy Policy.&lt;/p&gt;
&lt;p class="p4" style="text-align: justify; "&gt;As the aphorism goes: “When the service is free, you are the product.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp'&gt;https://cis-india.org/internet-governance/blog/asia-times-april-20-2018-aayush-rathi-sunil-abraham-what-s-up-with-whatsapp&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Sunil Abraham</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>WhatsApp</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2018-04-23T16:45:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/welcome-to-raw-blog">
    <title>Welcome to r@w blog!</title>
    <link>https://cis-india.org/raw/welcome-to-raw-blog</link>
    <description>
        &lt;b&gt;We from the researchers@work programme at the Centre for Internet and Society (CIS) are delighted to announce the launch of our new blog, hosted on Medium. It will feature works by researchers and practitioners working in India and elsewhere at the intersections of internet, digital media, and society; and highlights and materials from ongoing research and events at the researchers@work programme.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;r@w blog: &lt;a href="https://medium.com/rawblog" target="_blank"&gt;Visit&lt;/a&gt; (Medium)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;A space for reflections on internet and society, r@w blog is also an attempt to facilitate conversations around contemporary debates and foster creative engagement with research and practice through text, images, sounds, videos, code, and other media forms offered by the internet.&lt;br /&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;r@w blog opens with  an essay on ‘&lt;a href="https://medium.com/rawblog/information-offline-labour-surveillance-and-activism-in-the-indian-it-ites-industry-903c71567d1a" target="_blank"&gt;Information Offline: Labour, Surveillance, and Activism in the Indian IT &amp;amp; ITES Industry&lt;/a&gt;’ by Rianka Roy - as part of an &lt;a href="https://cis-india.org/raw/call-for-essays-offline" target="_blank"&gt;essay series&lt;/a&gt; exploring social, economic, cultural, political, infrastructural, and aesthetic dimensions of the "offline" - and audio recording from a session titled &lt;a href="https://medium.com/rawblog/iloveyou-167665a5145a" target="_blank"&gt;#ILoveYou&lt;/a&gt; by Dhiren Borisa and Dhrubo Jyoti, which was part of the &lt;a href="https://cis-india.org/raw/irc18" target="_blank"&gt;Internet Researchers’ Conference 2018 - #Offline&lt;/a&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/h3&gt;
&lt;h3&gt;We will publish our (including commissioned/supported) writings and works on this blog, as well as submitted and compiled materials. Please write to raw[at]cis-india[dot]org to submit your works to be considered for publication. Copyright to all material published on this blog are owned by CIS and author(s) concerned, and they are shared under Creative Commons Attribution 4.0 International license.&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/welcome-to-raw-blog'&gt;https://cis-india.org/raw/welcome-to-raw-blog&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sneha-pp</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Studies</dc:subject>
    

   <dc:date>2019-01-02T11:48:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/user-experiences-of-digital-financial-risks-and-harms">
    <title>User Experiences of Digital Financial Risks and Harms </title>
    <link>https://cis-india.org/raw/user-experiences-of-digital-financial-risks-and-harms</link>
    <description>
        &lt;b&gt;The reach and use of digital financial services has risen in recent years without a commensurate increase in digital literacy and access. Through this project, supported by a grant from Google(.)org, we will examine the landscape of potential risks and harms posed by digital financial services, and the disproportionate risk that information asymmetry and barriers to access pose for users, especially certain marginalised communities. &lt;/b&gt;
        
&lt;h3&gt;Project Background&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;There is a big evidence gap in the understanding of the financial risks and harms experienced by users of digital financial services. Consequently, adequate consumer protection frameworks and processes to address these harms have been lagging. A survey of 32,000 Indian consumers found &lt;a href="https://www.businessinsider.in/india/news/42-indians-experienced-financial-fraud-in-last-3-years-report/articleshow/93341725.cms"&gt;only 17%&lt;/a&gt; who lost money through banking frauds were able to recoup their funds. Filling this gap is crucial to inform responsive policy making, platform design and data governance.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;While a lot more attention is paid to financial frauds and scams, through this study, we aim to situate these alongside experiences of harms that are understudied and sometimes overlooked. Users may also experience financial harm, when negatively impacted by:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Financial misinformation&lt;/li&gt;
&lt;li&gt;Loss of control over their assets&lt;/li&gt;
&lt;li&gt;Loss of potential income&lt;/li&gt;
&lt;li&gt;Difficulty accessing social protection&lt;/li&gt;
&lt;li&gt;Financial abuse perpetrated alongside other forms of domestic and family abuse &lt;/li&gt;
&lt;li&gt;Unsustainable levels of debt, i.e. over-indebtedness, and &lt;/li&gt;
&lt;li&gt;Exclusion from financial services&lt;/li&gt;&lt;/ol&gt;
&lt;ol dir="ltr"&gt;&lt;/ol&gt;
&lt;p dir="ltr"&gt;The Centre for Internet and Society is undertaking a mixed methods study to better understand user awareness, perceptions and experiences of digital financial risks and harms.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;For this study, we will survey nearly 4000 users, with differing levels of access to digital devices, digital services and the internet, and undertake semi-structured interviews and focus group discussions with specific target groups and stakeholders. We aim to highlight the experiences of persons with disabilities, gender and sexual minorities, the elderly, women, and regional language first users; to better understand how discrimination and exclusion may increase their&amp;nbsp; burden of risk when using digital financial services.&lt;/p&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;&lt;strong&gt;Key research questions guiding our project are:&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;How are digital financial risks understood and experienced by users of digital financial services? Which socioeconomic factors amplify risks for different user groups?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;What concerns have emerged relating to data privacy, misinformation, identity theft and other forms of social engineering and mobile app based fraud?&lt;/li&gt;
&lt;li&gt;How accessible are providers’ and government’s platform based reporting and grievance redressal systems?&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;What role can fintech platforms, social media platforms, banking institutions, and regulatory bodies play in reducing digital financial risks across the ecosystem?&lt;/li&gt;&lt;/ol&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Project Aims&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;Through this study, we aim to:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify;"&gt;Assess the financial risks and harms users are exposed to when using social media, digital banking, and fintech platforms. While looking at general users, we will also specifically explore this experience for the elderly, gender and sexual minorities, regional language users and persons with visual disabilities.&lt;/li&gt;
&lt;li&gt;Develop a framework to categorise the nature of vulnerabilities, risks and harms faced by the concerned user groups&lt;/li&gt;
&lt;li&gt;Create a credible evidence base for key stakeholders with regards to experiences of digital financial risks and harm.&lt;/li&gt;
&lt;li style="text-align: justify;"&gt;Provide recommendations for better policy and platform design to address harms, specifically those arising from lack of accessibility and information asymmetry.&lt;/li&gt;
&lt;li&gt;Identify best practices to respond to digital risks and foster safety and equity in digital financial services&lt;/li&gt;&lt;/ol&gt;
&lt;h3 style="text-align: justify;" dir="ltr"&gt;Come Talk to Us:&lt;/h3&gt;
&lt;p style="text-align: justify;" dir="ltr"&gt;If you have experiences or insights to share, or if you're interested in learning more about our study, please reach out.&lt;br /&gt;&lt;br /&gt;We also invite researchers, financial service providers, developers and designers of fintech platforms, and civil society organisations working on digital safety, to speak to us and help inform the study. You may contact &lt;a class="mail-link" href="mailto:garima@cis-india.org"&gt;garima@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;Research Team&lt;/strong&gt;: Amrita Sengupta, Chiara Furtado, Garima Agrawal, Nishkala Sekhar, Puthiya Purayil Sneha, and Yesha Tshering Paul&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/user-experiences-of-digital-financial-risks-and-harms'&gt;https://cis-india.org/raw/user-experiences-of-digital-financial-risks-and-harms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amrita Sengupta, Chiara Furtado, Garima Agrawal, Nishkala Sekhar, Puthiya Purayil Sneha, and Yesha Tshering Paul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Financial Technology</dc:subject>
    
    
        <dc:subject>Financial Platforms</dc:subject>
    
    
        <dc:subject>Digital Financial Harms</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>RAW Blog</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Digital Lending</dc:subject>
    
    
        <dc:subject>RAW Research</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2023-12-22T16:05:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/university-of-mysore-releases-kannada-vishwakosha-under-cc-license">
    <title>University of Mysore Re-releases Kannada Vishwakosha (Encyclopaedia) under Creative Commons Free License</title>
    <link>https://cis-india.org/openness/blog-old/university-of-mysore-releases-kannada-vishwakosha-under-cc-license</link>
    <description>
        &lt;b&gt;The University of Mysore and the Centre for Internet and Society co-organized the Open Knowledge Day in Mysore on July 15, 2014. On this occasion Mysore University released six volumes of Kannada Vishwakosha under the Creative Commons (CC) license. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Kannada Vishwakosha brought out by the &lt;a class="external-link" href="http://www.uni-mysore.ac.in/"&gt;University of Mysore&lt;/a&gt; can easily be termed as the best     encyclopaedia in Kannada. It has been modelled after the famous Britannica encyclopaedia. Mysore University Vishwakosha has 14 volumes having a total of 13802     pages. The very first volume was brought out in the year 1969 and the final volume was released in 2004. Many famous Kannada authors, scientists,     academicians and stalwarts from other fields have worked on creating this encyclopaedia. The print volumes of the first version of the encyclopaedia are     out of stock now. Recently UoM has started revising and reprinting the encyclopaedia. So far 4 volumes have been revised, enhanced and published.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UoM believes in Open Access to Knowledge. It has put up the research outputs from its departments online for &lt;a class="external-link" href="http://eprints.uni-mysore.ac.in/"&gt;free access to the public&lt;/a&gt;. UoM has done these as a subscriber to the &lt;a class="external-link" href="http://www.budapestopenaccessinitiative.org/read"&gt;idea of Budapest Open Access Initiative&lt;/a&gt;. The Open Access Institutional Repository, of UoM, covers scholarly publications covering journal     articles, conference papers, books, book reviews, presentations, reports and patents ever since UoM was established in 1916. Extending the philosophy of     open knowledge to the Kannada encyclopaedia published by UoM becomes a natural extension. UoM is in the verge of celebrating its centenary soon and has     taken many initiatives in that direction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K has been in negotiations with UoM towards releasing of its high quality Kannada Vishwakosha (Kannada Encyclopaedia) under Creative Commons license.     CIS and UoM signed a MoU on February 22, 2014. Here is the relevant extract from the MoU: "They will work together to digitize all encyclopaedic     publications for which the copyright is owned by UoM, and re-release them under the Creative Common license (CC-BY-SA 3.0). The digitized content will be     made available for everyone through free content distribution platforms like Wikipedia and Wikisource. The digitization will be done employing the global     standard Unicode so that the content has longevity, is universally portable and is easily searchable. Both parties have joined hands to undertake the above     in order to enhance digital literacy in the Kannada language and facilitate collaborative production and free dissemination of knowledge in Kannada to the     students, academics, researchers and the wider public. The parties also believe that by reintroducing the knowledge in digital and openly accessible     formats could significantly enhance the production of knowledge in Kannada and give a new lease of life to Kannada language in the digital era. The parties     will co-design and jointly implement relevant programmes to achieve this objective." As part of this MoU, UoM agreed to release the first six volumes of     Kannada Vishwakosha under CC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Volume numbers 1, 2, 4 and 6 of Kannada Vishwakosha of UoM have been revised and published recently. A project page has been created in Kannada Wikipedia     &lt;a class="external-link" href="http://bit.ly/mysoreunivwp"&gt;for this project&lt;/a&gt;. Kannada Wikipedians joined hands in the project. The project involved extracting the     text from the soft copies of the files, converting them into Unicode, extracting articles from these files and uploading them to Kannada Wikisource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A team of interns from Christ University had a major role to play in this development. These were students from the Wikipedia in Education Program that     was conducted in Christ University during the academic period of 2013-14. These students took active part in the current project and uploaded about 1200     articles so far (till July 21, 2014).&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The event attracted very good media coverage. Leading English and Kannada dailies like Andolana Kannada, City Today, Deccan Herald, Hosa Diganta, Kannada Jana Mana, Kannada Prabha, Rajya Dharma, Samyukta Karnataka, The Hindu, The New Indian Express, Udayavani, Vijaya Karnataka, and Vijaya Vani published about this. Scanned versions of the published articles can be &lt;a href="https://cis-india.org/openness/blog-old/open-knowledge-day-mysore-media-coverage-zip" class="external-link"&gt;downloaded here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Other Links:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;UoM Kannada Vishwakosha conversion project page in Kannada Wikipedia - &lt;a href="http://bit.ly/mysoreunivwp"&gt;http://bit.ly/mysoreunivwp&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Articles from UoM Kannada Vishwakosha in Kannada Wikisource - &lt;a href="http://bit.ly/mysoreuniv"&gt;http://bit.ly/mysoreuniv&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Category UoM Kannada Vishwakosha in Kannada Wikisource - &lt;a href="http://bit.ly/mysoreunivws"&gt;http://bit.ly/mysoreunivws&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;For pictures from the Open Knowledge Day event in Mysore - &lt;a class="external-link" href="https://commons.wikimedia.org/wiki/Category:Mysore_University_Open_Knowledge_Day"&gt;https://commons.wikimedia.org/wiki/Category:Mysore_University_Open_Knowledge_Day&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/university-of-mysore-releases-kannada-vishwakosha-under-cc-license'&gt;https://cis-india.org/openness/blog-old/university-of-mysore-releases-kannada-vishwakosha-under-cc-license&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pavanaja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Kannada Wikipedia</dc:subject>
    

   <dc:date>2014-07-24T07:03:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/train-the-trainer-program">
    <title>Train the Trainer Program</title>
    <link>https://cis-india.org/openness/blog-old/train-the-trainer-program</link>
    <description>
        &lt;b&gt;Wikipedians, about 20 of them, from 10 different cities, speaking 8 different languages, joined together for the first ever four days "Train the Trainer Program" organised by the Centre for Internet and Society's Access to Knowledge (CIS-A2K) team in Bangalore from October 3 to 6, 2013.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Events/TTT"&gt;Read the original published on the Wikipedia meta page&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Programme_Plan"&gt;CIS-A2K&lt;/a&gt; organised the residency training program to build capacities amongst different language Wikimedia communities. A good diversity of Wikipedians from various language communities such as Bengali, Gujarati, Sanskrit, Malayalam, Hindi, Marathi, Telugu, Odia, came over for the event.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K identified two prominent reasons for organizing the event: (1) Limitations of a virtual sphere, and (2) Limited number of Wikipedians leading outreach activities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Limitations of a virtual sphere&lt;/b&gt;&lt;/span&gt;&lt;br /&gt;Most open source communities face problem of a lack of time and space for sharing ideas in a non-virtual sphere. Similary Wikipedians, who are voluntary contributors and authors of the articles posted on Wikipedia merely get time and opportunity to meet fellow editors because of the limitations of a virtual platform on which Wikipedia is built. There are twelve active Indian language Wikimedia communities that are spread across the world and moving the bandwagon of collaborating with each other and carving their historic mark of compiling the world's largest encyclopaedia and its other sister projects. To keep this movement alive there is a need of cross-sharing ideas of working together for a common goal and strengthening the leaders of these communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;Limited number of Wikipedians leading outreach activities&lt;br /&gt; &lt;/b&gt;&lt;/span&gt;Only a handful of Wikipedians devote their time in leading outreach activities and bringing new blood to the community. Indian language Wikimedia communities are in need of empowering Wikipedians who would lead outreach sessions in order to expand their editor community and strengthen their language projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The inception of this program began with the discussion of organizing a training program for the Wikipedians who are willing to conduct more activities in their home cities. Finally on October 3, 2013, Bangalore heard the voices of prominent Wikipedians from Punjab, West Bengal, Odisha, Andhra Pradesh, Gujarat, Maharashtra, Karnataka and Kerala. The Wikipedians delivered presentations on various topics such as — why Wikipedia is needed for the society, why Wikipedia in Indian languages, importance of starting new Wiki projects and so on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Their presentation delivery skills were judged by &lt;a href="https://meta.wikimedia.org/wiki/User:Visdaviva"&gt;Vishnu Vardhan&lt;/a&gt; and &lt;a href="https://meta.wikimedia.org/wiki/User:Nitika.t"&gt;Nitika Tandon&lt;/a&gt; and all other community members present. They gave individual assessments and feedback for improvement towards the end of the day. Personal trainer Sachin Nagarajappa spent time with Wikipedians discussing mistakes that trainers do while conducting workshops and gradual improvement techniques for impactful outreach. Wikipedia is built on the concept of crowdsourcing and Malayalam Wikimedian &lt;a href="https://ml.wikipedia.org/wiki/User:Viswaprabha"&gt;Viswanathan Prabhakaran&lt;/a&gt; carried out a session about “Crowd Sourcing from the Future” explaining the various layers of crowdsourced projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first day ended with a task where different language Wikipedians formed groups to prepare presentations for the following day.&lt;/p&gt;
&lt;hr /&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/copy_of_TraintheTrainer.png" alt="Train the Trainer 1" class="image-inline" title="Train the Trainer 1" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Above: Wikipedians Satdeep Gill, Shyamal Lakshminarayan and Shubha during at the CIS-A2K Train-the-Trainer Program (by Subhashish Panigrahi, CC-BY-SA 3.0)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Groups were given a challenge of imagining the audience as new wikipedians. Five groups presented on the second day. Sachin conducted an advanced presentation skill improvement workshop based on the inputs from the participants and the assessment of the group presentations. Veteran Wikipedian &lt;a href="https://kn.wikipedia.org/wiki/ಸದಸ್ಯ:HPNadig"&gt;Hari Prasad Nadig&lt;/a&gt; shared learnings from Challenges &amp;amp; Opportunities in building an Indian Language Community online. Open source activist and CIS's Executive Director &lt;a href="https://cis-india.org/about/people/our-team"&gt;Sunil Abraham&lt;/a&gt; conducted two sessions — a spectrogram based activity to simplify the "Criticality of Neutral Point of View" and an interactive session called “Speed Geeking” on offline and online outreach followed by a one-on-one discussion on the presentation skill improvement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Typing in Indian languages is not easy especially when it comes to multiple typing layout standards followed in the public and private sectors in India. &lt;a href="https://meta.wikimedia.org/wiki/User:Pavanaja"&gt;Dr. U.B.Pavanaja&lt;/a&gt; conducted a session on Unicode standard for Indian languages and its usefulness with a brief context on the fonts and their different operating systems. Social media expert and Wikimedian &lt;a href="https://en.wikipedia.org/wiki/User:Tinucherian"&gt;Tinu Cherian&lt;/a&gt; shared the secrets of popularizing Indian language Wikipedias and bringing outstanding contributors to the limelight, how media played an important role in showcasing initiatives for free encyclopaedic content contribution in India and tips of social media. With fun activities &lt;a href="https://meta.wikimedia.org/wiki/User:Visdaviva"&gt;Vishnu Vardhan&lt;/a&gt; shared case studies of making Wikipedia workshops interesting. Wikimedia Foundation board member  and writer &lt;a href="https://meta.wikimedia.org/wiki/User:Aprabhala"&gt;Achal Prabhala&lt;/a&gt; shared stories of documenting Oral traditions in Kerala and South Africa for Wikipedia referencing and how copyright laws evolved in the context of copyright issues that Wikipedia contributors face. Achal also threw light on content donation on WikiSource and other platforms that would be useful for people to consume for knowledge production on diverse platforms where Wikipedia could play a central role. Viswanathan and &lt;a href="https://meta.wikimedia.org/wiki/User:Psubhashish"&gt;Subhashish Panigrahi&lt;/a&gt; demonstrated how to set up a handheld digital camera based prop to easily digitize books without using any scanner and then create electronic books.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The most vital part of Wikipedia articles is referencing. Wikimedian &lt;a href="https://en.wikipedia.org/wiki/User:Shyamal"&gt;Shyamal Lakshminarayan&lt;/a&gt; demonstrated how finding sources of references and citing them for the facts on Wikipedia  could be made easier through detailed research and by using several tools available. &lt;a href="https://wiki.wikimedia.in/"&gt;Wikimedia India&lt;/a&gt;'s founding member and veteran Telugu Wikipedian &lt;a href="https://te.wikipedia.org/wiki/వాడుకరి:Arjunaraoc"&gt;Arjuna Rao Chavala&lt;/a&gt; gave a talk about the history and future plans of Wikimedia India. Wikipedians then went to M.G. Road boulevard to see the weaving work by Gandhians, Philately exhibition on Gandhi and spent some time with Namma Metro's staff to know  about the metro operation. Dr. U.B. Pavanaja and Kannada Wikipedian &lt;a href="https://kn.wikipedia.org/wiki/ಸದಸ್ಯ:Omshivaprakash"&gt;Om Shivaprakash&lt;/a&gt; guided Wikipedians to the office of Deccan Herald Prajavani where they got to see the entire newspaper production and spent time with the technical staff to learn about the use of Kannada Unicode fonts for newspaper printing. Editors and staff at Prajavani got to know about the use of WikiCommons as a free image repository.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The four action filled days involved learning new concepts, training on presentation skills, collaborating to create outreach documents, sharing stories from different language communities, understanding new mediums of outreach, meeting Wikipedians from different cities and also having lots of fun. Wikipedians left Bangalore city with happy faces and we hope to cultivate new editors in their communities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;b&gt;List of Participants&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:AbhiSuryawanshi" title="en:user:AbhiSuryawanshi"&gt;Abhishek Suryawanshi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:AnkitaS" title="en:user:AnkitaS"&gt;Ankita Sinha&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Charan_Gill" title="en:user:Charan Gill"&gt;Charan Gill&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:jayantanth" title="en:user:jayantanth"&gt;Jayanta Nath&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Kasyap" title="en:user:Kasyap"&gt;Kasyap&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Niraj_Suryawanshi" title="en:user:Niraj Suryawanshi"&gt;Niraj Suryawanshi&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://te.wikipedia.org/wiki/user:pranayraj1985" title="te:user:pranayraj1985"&gt;pranayraj vangari&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Satdeep_gill" title="en:user:Satdeep gill"&gt;Satdeep Gill&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="https://sa.wikipedia.org/wiki/user:shubha"&gt;Shubha&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Rangilo_Gujarati" title="en:user:Rangilo Gujarati"&gt;Rangilo Gujarati&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://ml.wikipedia.org/wiki/User:Manojk" title="ml:User:Manojk"&gt;Manoj K&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/User:MKar" title="en:User:MKar"&gt;Mrutyunjaya Kar&lt;/a&gt; (&lt;a class="extiw" href="https://or.wikipedia.org/wiki/User:MKar" title="or:User:MKar"&gt;Odia Wiki&lt;/a&gt;)&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://or.wikipedia.org/wiki/User:Subas_Chandra_Rout" title="or:User:Subas Chandra Rout"&gt;Subas Chandra Rout&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:Nikhil.kawale" title="en:user:Nikhil.kawale"&gt;Nikhil Kawale&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://te.wikipedia.org/wiki/%E0%B0%B5%E0%B0%BE%E0%B0%A1%E0%B1%81%E0%B0%95%E0%B0%B0%E0%B0%BF:%E0%B0%B5%E0%B0%BF%E0%B0%B6%E0%B1%8D%E0%B0%B5%E0%B0%A8%E0%B0%BE%E0%B0%A7%E0%B1%8D.%E0%B0%AC%E0%B0%BF.%E0%B0%95%E0%B1%86." title="te:వాడుకరి:విశ్వనాధ్.బి.కె."&gt;Viswanadh.b.k&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://hi.wikipedia.org/wiki/user:Hindustanilanguage" title="hi:user:Hindustanilanguage"&gt;Muzammil&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="extiw" href="https://en.wikipedia.org/wiki/user:John_Noronha" title="en:user:John Noronha"&gt;John Noronha&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/train-the-trainer-program'&gt;https://cis-india.org/openness/blog-old/train-the-trainer-program&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>subha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2013-11-18T07:52:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/technology-behind-big-data">
    <title>The Technology behind Big Data</title>
    <link>https://cis-india.org/internet-governance/blog/technology-behind-big-data</link>
    <description>
        &lt;b&gt;The authors undertakes a high-level literature review of the most commonly used technological tools and processes in the big data life cycle. The big data life cycle is a conceptual construct that can be used to study the various stages that typically occur in collecting, storing and analysing big data, along with the principles that can govern these processes.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/technology-behind-big-data.pdf/view"&gt;Download the Paper&lt;/a&gt; (PDF, 277 kb)&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Defining big data is a disputed area in the field of computer science&lt;a name="_ftnref1" href="#_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, there is some consensus on a basic structure to its definition&lt;a name="_ftnref2" href="#_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. Big data is data that is collected in the form of datasets that has three main criteria: size, variety &amp;amp; velocity, all of which operate at an immense scale&lt;a name="_ftnref3" href="#_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. It is ‘big’ in size, often running into petabytes of information, has vast variety within its components, and is created, captured and analysed at an incredibly rapid velocity. All of this also makes big data difficult to handle using traditional technological tools and techniques.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This paper will attempt to perform a high-level literature review of the most commonly used technological tools and processes in the big data life cycle. The big data life cycle is a conceptual construct that can be used to study the various stages that typically occur in collecting, storing and analysing big data, along with the principles that can govern these processes. The big data life cycle consists of four components, which will also be the key structural points of the paper, namely: Data Acquisition, Data Awareness, Data Analytics &amp;amp; Data Governance.&lt;strong&gt;&lt;sup&gt;4&lt;/sup&gt; &lt;/strong&gt;The paper will focus on the aspects that the author believes are relevant for analysing the technological impact of big data on both technology itself and society at large.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Scope: &lt;/strong&gt;The scope of the paper is to study the technology used in big data using the "Life Cycle of Big Data" as model structure to categorise &amp;amp; study the vast range of technologies that are involved in big data. However, the paper will be limited to the study of technology related directly to the big data life cycle. It shall specifically exclude the use/utilisation of big data from its scope since big data is most often being fed into other, unrelated technologies for consumption leading to rather limitless possibilities.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Goal:&lt;/strong&gt; Goal of the paper is twofold: a.) to use the available literature on the technological aspects of big data, to perform a brief overview of the technology in the field and b.) to frame the relevant research questions for studying the technology of big data and its possible impact on society.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Acquisition&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Acquiring big data has two main sub components to it, the first being sensing the existence of the data’ itself and the second, the stage of collecting and storing this data. Both of these subcomponents are incredibly diverse fields, with lots of rapid change occurring in the technology utilised to carry out these tasks. The section will provide a brief overview of the subcomponents and then discuss the technology used to fulfil the tasks.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Sensing&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data does not exist in a vacuum and is always created as a part of a larger process, especially in the aspect of modern technology. Therefore, the source of the data itself plays a vital role in determining how it can be captured and analysed in the larger scheme of things. Entities constantly emit information into the environment that can be utilised for the purposes of big data, leading to two main kinds of data: data that is “born digital” or “born analogue.”&lt;a name="_ftnref4" href="#_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Born Digital Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Information that is “born digital,” is created, by a user or by a digital system, specifically for use by a computer or data‐processing system. This is a vast range of information and newer fields are being added to this category on a daily basis. It includes, as a short, indicative list: email and text messaging, any form of digital input, including keyboards, mouse interactions and touch screens, GPS location data, data from daily home appliances (Internet of Things), etc. All of this data can be tracked and tagged to users as well as be aggregated to form a larger picture, massively increasing the scope of what may constitute the ‘data’ in big data.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Some indicative uses of how such born digital data is catalogued by technological solutions on the user side, prior to being sent for collection/storage are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a.) Cookies - There are small, often just text, files that are left on user devices by websites in order to that visit, task or action (for example, logging into an email account) with a subsequent event.&lt;a name="_ftnref5" href="#_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (for example, revisiting the website)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b.) Website Analytics&lt;a name="_ftnref6" href="#_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - Various services, such as Google Analytics, Piwik, etc., can use JavaScript and other web development languages to record a very detailed, intimate track of a user's actions on a website, including how long a user hovers above a link, the time spent on the website/application and in some cases, even the time spent specific aspects of the page.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c.) GPS&lt;a name="_ftnref7" href="#_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - With the almost pervasive usage of smartphones with basic location capabilities, GPS sensors on these devices are used to provide regular, minute driven updates to applications, operating systems and even third parties about the user's location. Modern variations such as A-GPS can be used to provide basic positioning information even without satellite coverage, vastly expanding the indoor capabilities of location collection.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;All of these instances of sensing born digital data are common terms, used in daily parlance by billions of people from all over the world, which is a symbolic of just how deeply they have pervaded into our daily lifestyle. Apart from privacy &amp;amp; security concerns this in turn also leads to an exponential increase in the data available to collect for any interested party.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Sensor Data&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Information is said to be&amp;nbsp; “analogue” when it contains characteristics of the physical world, such as images, video, heartbeats, etc.&amp;nbsp; Such information becomes electronic when processed by a “sensor,” a device that can record physical phenomena and convert it into digital information. Some examples to better illustrate information that is born analogue but collected via digital means are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a.) Voice and/or video content on devices - Apart from phone calls and other forms communication, video and voice based interactions have started to regularly be captured to provide enhanced services. These include Google Now&lt;a name="_ftnref8" href="#_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Cortana&lt;a name="_ftnref9" href="#_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and other digital assistants as well as voice guided navigation systems in cars, etc.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b.) Personal health data such as heartbeats, blood pressure, respiration, velocity, etc. - This personal, potentially very powerful information is collected by dedicated sensors on devices such as Fitbit&lt;a name="_ftnref10" href="#_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Mi Band&lt;a name="_ftnref11" href="#_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, etc. as well as by increasingly sophisticated smartphone applications such as Google Fit that can do so without any special device.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c.) Camera on Home Appliances - Cameras and sensors on devices such as video game consoles (Kinect&lt;a name="_ftnref12" href="#_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; being a relevant example) can record detailed human interactions, which can be mined for vast amounts of information apart from carrying out the basic interactions with the devices itself.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While not as vast a category as born digital data, the increasingly lower costs of technology and ubiquitous usage of digital, networked devices is leading to information that was traditionally analogue in nature to be captured for use at a rapidly increasing rate.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Collection &amp;amp; Storage&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Traditional data was normally processed using the Extract, Transform, Load (ETL) methodology, which was used to collect the data from outside sources, modify the data to fit needs, and then upload the data into the data storage system for future use.&lt;a name="_ftnref13" href="#_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Technology such as spreadsheets, RDBMS databases, Structured Query Languages (SQL), etc. were all initially used to carry out these tasks, more often than not manually. &lt;a name="_ftnref14" href="#_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However, for big data, the methodology traditionally followed is both inefficient and insufficient to meet the demands of modern use. Therefore, the Magnetic, Agile, Deep (MAD) process is used to collect and store data&lt;a name="_ftnref15" href="#_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref16" href="#_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The needs and benefits of such a system are: attracting all the data sources regardless of their quality (magnetic), logical and physical contents of storage systems adapting to the rapid data evolution in big data (agile) and complex algorithmic statistical analysis required of big data on a very short notice&lt;a name="_ftnref17" href="#_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. (deep)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The technology used to perform data storage using the MAD process requires vast amount of processing power, which is very difficult to create in a single, physical space/unit for nonstate or research entities, who cannot afford supercomputers. Therefore, most solutions used in big data rely on two major components to store data: distributed systems and Massive Parallel Processing&lt;a name="_ftnref18" href="#_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (MPP) that run on non-relational (in-memory) database systems. Database performance and reliability is traditionally gauged using pure performance metrics (FLOPS per second, etc.) as well as the Atomicity, consistency, isolation, durability (ACID) criteria.&lt;a name="_ftnref19" href="#_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The most commonly used database systems for big data applications are given below. The specific operational qualities and performance of each of these databases is beyond the scope of this review but the common criteria that makes them well suited for big data storage have been delineated below.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Non-relational databases&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Databases traditionally used to be structured entities that operated solely on the ability to correlate information stored in them using explicitly defined relationships. Even prior to the advent of big data, this outlook was turning out to be a limiting factor in how large amounts of stored information could be leveraged, this led to the evolution of non relational database systems. Before going into them in detail, a basic primer on their data transfer protocols will be helpful in understanding their operation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A protocol is a model that structures instructions in a particular manner so that it can be reproduced from one system to another&lt;a name="_ftnref20" href="#_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref21" href="#_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The protocols which govern technology in the case of big data have gone through many stages of evolution, starting off with simple HTML based systems&lt;a name="_ftnref22" href="#_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which then evolved to XML driven SOAP systems&lt;a name="_ftnref23" href="#_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which led to JavaScript Object Notation, or JSON&lt;a name="_ftnref24" href="#_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the currently used form for in most big database systems. JSON is an open format used to transfer data objects, using human-readable text and is the basis for most of the commonly used non-relational database management systems. Examples of Non-relational databases also known as NoSQL databases, include MongoDB&lt;a name="_ftnref25" href="#_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Couchbase&lt;a name="_ftnref26" href="#_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, etc. They were developed for both managing as well as storing unstructured data. They aim for scaling, flexibility, and simplified development. Such databases rather focus on the high-performance scalable data storage, and allow tasks to be written in the application layer instead of databases specific languages, allowing for greater interoperability.&lt;a name="_ftnref27" href="#_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;In-Memory Databases&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In order to overcome performance limitation of traditional database systems, some modern databases now use in-memory databases. These systems manage the data in the RAM memory of the server, thus eliminating storage disk input/output. This allows for almost realtime responses from the database, in comparisons to minutes or hours required on traditional database systems. This improvement in the performance is so massive that, entirely new applications are being developed for using IMDB systems.&lt;a name="_ftnref28" href="#_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These IMDB systems are also being used for advanced analytics on big data, especially to increase the access speed to data and increase the scoring rate of analytic models for analysis.&lt;a name="_ftnref29" href="#_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Examples of IMDB include VoltDB&lt;a name="_ftnref30" href="#_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, NuoDB&lt;a name="_ftnref31" href="#_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, SolidDB&lt;a name="_ftnref32" href="#_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and Apache Spark&lt;a name="_ftnref33" href="#_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Hybrid Systems&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;These are the two major systems used to store data prior to it being processed or analysed in a big data application. However, the divide between data storage and data management is a slim one and most database systems also contain various unique attributes that cater them to specific kinds of analysis. (as can be seen from the IMDB example above) One example of a very commonly used Hybrid system that deals with storage as well as awareness of the data is Apache Hadoop&lt;sup&gt;33&lt;/sup&gt;, which is detailed below.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Apache Hadoop&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Hadoop consists of two main components: the HDFS for the big data storage, and MapReduce for big data analytics, each of which will be detailed in their respective section.&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;The HDFS&lt;a name="_ftnref34" href="#_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;a name="_ftnref35" href="#_ftn35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; storage function in Hadoop provides a reliable distributed file system, stored across multiple systems for processing &amp;amp; redundancy reasons. The file system is optimized for large files, as single files are split into blocks and spread across systems known as cluster nodes.&lt;a name="_ftnref36" href="#_ftn36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Additionally, the data is protected among the nodes by a replication mechanism, which ensures availability even if any node fails. Further, there are two types of nodes: Data Nodes and Name Nodes.&lt;a name="_ftnref37" href="#_ftn37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Data is stored in the form of file blocks across the multiple Data Nodes while the Name Node acts as an intermediary between the client and the Data Node, where it directs the requesting client to the particular Data Node which contains the requested data.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;This operating structure for storing data also has various variations within Hadoop such as HBase for key/value pair type queries (a NoSQL based system), Hive for relational type queries, etc. Hadoop’s redundancy, speed, ability to run on commodity hardware, industry support and rapid pace of development have led to it being almost co-equivalently associated with big data.&lt;a name="_ftnref38" href="#_ftn38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Awareness&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Awareness, in the context of big data, is the task of creating a scheme of relationships within a set of data, to allow different users of the data to determine a fluid yet valid context and utilise it for their desired tasks.&lt;a name="_ftnref39" href="#_ftn39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It is a relatively new field, in which most of the work is currently being done on semantic structures to allow data to gain context in an interoperable format, in contrast to the current system where data is given context using unique, model specific constructs.&lt;a name="_ftnref40" href="#_ftn40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (such as XML Schemes, etc.)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Some of the original work on this field was carried out in the form of utilising the Resource Description Framework (RDF), which was built primarily to allow describing of data in a portable manner, especially being agnostic towards platforms and systems for Semantic Web at the W3C. SPARQL is the language used to implement RDF based designs but both largely remain underutilised in both the public domain as well as big data. Authors such as Kurt&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Cagle&lt;a name="_ftnref41" href="#_ftn41"&gt;&lt;sup&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and Bob DuCharme&lt;a name="_ftnref42" href="#_ftn42"&gt;&lt;sup&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; predict its explosion in the next couple of years. Companies have also started realising the value of interoperable context, with Oracle Spatial&lt;a name="_ftnref43" href="#_ftn43"&gt;&lt;sup&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and IBM’s DB2&lt;a name="_ftnref44" href="#_ftn44"&gt;&lt;sup&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; already including RDF and SPARQL support in the past 3 years.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;While underutilised, the rapid developments taking place in the field will make the impact that data awareness may have on big data as big as Hadoop and maybe even SQL. Some aspects of it are already beginning to be used in Artificial Intelligence, Natural Language Processing, etc. with tremendous scope for development.&lt;a name="_ftnref45" href="#_ftn45"&gt;&lt;sup&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Processing &amp;amp; Analytics&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Processing largely has three primary goals: a. determines if the data collected is internally consistent; b. make the data meaningful to other systems or users using either metaphors or analogy they can understand; and (what many consider most importantly) provide predictions about future events and behaviours based upon past data and trends.&lt;a name="_ftnref46" href="#_ftn46"&gt;&lt;sup&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Being a very vast field with rapidly changing technologies governing its operation, this section will largely concentrate on the most commonly used technologies in data analytics.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Data analytics requires four primary conditions to be met in order to carry out effective processing: fast, data loading, fast query processing, efficient utilisation of storage and adaptivity to dynamic workload patterns. The analytical model most commonly associated with meeting this criteria and with big data in general is MapReduce, detailed below. There are other, more niche models and algorithms (such as Project Voldemort&lt;a name="_ftnref47" href="#_ftn47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; used by LinkedIn), which are used in big data but they are beyond the scope of the review, and more information about them can be read at article linked in the previous citation. (Reference architecture and classification of technologies, products and services for big data system)&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;MapReduce&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;MapReduce is a generic parallel programming concept, derived from the “Map” and “Reduce” of functional programming languages, which makes it particularly suited for big data operations. It is at the core of Hadoop&lt;a name="_ftnref48" href="#_ftn48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and performs the data processing and analytics functions in other big data systems as well.&lt;a name="_ftnref49" href="#_ftn49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The fundamental premise of MapReduce is scaling out rather than scaling up, i.e., (adding more numerical resources, rather than increasing the power of a single system)&lt;a name="_ftnref50" href="#_ftn50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;MapReduce operates by breaking a task down into steps and executing the steps in parallel, across many systems. This comes with two advantages, a reduction in the time needed to finish the task and also a decrease in the amount of resources one has to expend to perform the task, in both power and energy. This model makes it ideally suited for the large data sets and quick response times required of big data operations generally.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The first step of a MapReduce job is to correlate the input values to a set of keys/value pairs as output. The “Map” function then partitions the processing tasks into smaller tasks, and assigns them to the appropriate key/value pairs.&lt;a name="_ftnref51" href="#_ftn51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This allows unstructured data, such as plain text, to be mapped to a structured key/value pair. As an example, the key could be the punctuation in a sentence and the value of the pair could be the number of occurrences of the punctuation overall. This output of the Map function is then passed on “Reduce” function.&lt;a name="_ftnref52" href="#_ftn52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Reduce then collects and combines this output, using identical key/value pairs, to provide the final result of the task.&lt;a name="_ftnref53" href="#_ftn53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These steps are carried using the Job Tracker &amp;amp; Task Tracker in Hadoop but different systems have different methodologies to carry out similar tasks.&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Data Governance&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Data Governance is the act of managing raw big data as well as the processed information that arises from big data in order to meet legal, regulatory and business imposed requirements. While there is no standardized format for data governance, there have been increasing call with various sectors (especially healthcare) to create such a format to ensure reliable, secure and consistent big data utilisation across the board. The following tactics and techniques have been utilised or suggested for data governance, with varying degrees of success:&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Zero-knowledge systems&lt;/strong&gt;: This technological proposal maintains secrecy with respect to the low-level data while allowing encrypted data to be examined for certain higherlevel abstractions.&lt;a name="_ftnref54" href="#_ftn54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For the system to be zero-knowledge, the client’s system will have to encrypt the data and send it to the storage provider. Due to this, the provider stores the data in the encrypted format and cannot decipher the same unless he/she is in possession of the key which will decrypt the data into plaintext. This allows the individual to store his data with a storage provider while also maintaining anonymity of the details contained in such information. However, these are currently just beginning to be used in simple situations. As of now, they are not expandable to unstructured and complex cases and have to be developed marginally before they can be used for research and data mining purposes.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Homomorphic encryption&lt;/strong&gt;: Homomorphic encryption is a privacy preserving technique which performs searches and other computations over data that is encrypted while also protecting the individual’s privacy.&lt;a name="_ftnref55" href="#_ftn55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This technique has however been considered to be impractical and is deemed to be an unlikely policy alternative for near future purposes in the context of preserving privacy in the age of big data.&lt;a name="_ftnref56" href="#_ftn56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Multi-party computation&lt;/strong&gt;: In this technique, computation is done on encrypted distributed data stores.&lt;a name="_ftnref57" href="#_ftn57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This mechanism is closely related to homomorphic encryption where individual data is kept private using encryption algorithms called “collusion-robust” while the same is used to calculate statistics.&lt;a name="_ftnref58" href="#_ftn58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The parties involved are aware of some private data and each of them use a protocol which produces results based on the information they are aware of and the information they are not aware of, without revealing the data they are not already aware of.&lt;a name="_ftnref59" href="#_ftn59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Multi-party computations thus help in generating useful data for statistical and research purposes without compromising the privacy of the individuals.&lt;/li&gt;&lt;/ol&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;Differential Privacy&lt;/strong&gt;: Although this technological development is related to encryption, it follows a different technique. Differential privacy aims at maximizing the precision of computations and database queries while reducing the identifiability of the data owners who have records in the database, usually through obfuscation of query results.&lt;a name="_ftnref60" href="#_ftn60"&gt;&lt;sup&gt;&lt;sup&gt;[60]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; This is widely applied today in the existence of big data in order to ensure preservation of privacy while trying to reap the benefits of large scale data collection.&lt;a name="_ftnref61" href="#_ftn61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Searchable encryption&lt;/strong&gt;: Through this mechanism, the data subject can make certain data searchable while minimizing exposure and maximizing privacy.&lt;a name="_ftnref62" href="#_ftn62"&gt;&lt;sup&gt;&lt;sup&gt;[62]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The data owner can make his information available through search engines by providing the data in an encrypted format but by adding tags consisting of certain keywords which can be deciphered by the search engine. This encrypted data shows up in the search results when searched with these particular keywords but can only be read when the person is in possession of the key which is required for decrypting the information.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;This technique of encryption provides maximum security to the individual’s data and preserves privacy to the greatest possible extent.&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;&lt;strong&gt;K-anonymity&lt;/strong&gt;: The property of k-anonymity is being applied in the present day in order to preserve privacy and avoid re-identification.&lt;a name="_ftnref63" href="#_ftn63"&gt;&lt;sup&gt;&lt;sup&gt;[63]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; A certain data set is said to possess the property of k-anonymity if individual specific data can be released and used for various purposes without re-identification. The analysis of the data should be carried out without attributing the data to the individual to whom it belongs and should give scientific guarantees for the same.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Identity Management Systems&lt;/strong&gt;: These systems enable the individuals to establish and safeguard their identities, explain those identities with the help of attributes, follow the activity of their identities and also delete their identities if they wish to.&lt;a name="_ftnref64" href="#_ftn64"&gt;&lt;sup&gt;&lt;sup&gt;[64]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It uses cryptographic schemes and protocols to make anonymous or pseudonymous the identities and credentials of the individuals before analysing the data.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Privacy Preserving Data Publishing&lt;/strong&gt;: This is a method in which the analysts are provided with the individual’s personal information with the ability to decipher particular information from the database while preventing the inference of certain other information which might lead to a breach of privacy.&lt;a name="_ftnref65" href="#_ftn65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Data which is essential for the analysis will be provided for processing while sensitive data will not be disclosed. This tool primarily focuses on microdata.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Privacy Preserving Data Mining&lt;/strong&gt;: This mechanism uses perturbation methods and randomization along with cryptography in order to permit data mining on a filtered version of the data which does not contain any form of sensitive information. PPDM focuses on data mining results unlike PPDP.&lt;a name="_ftnref66" href="#_ftn66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/li&gt;&lt;/ol&gt;
&lt;h2 style="text-align: justify;"&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Studying the technology surrounding big data has led to two major observations: the rapid pace of development in the industry and the stark lack of industry standards or government regulations directed towards big data technologies. These observations have been the primary motivating factor for framing further research in the field. Understanding how to deal with big data technologically, rather than just the potential regulation of possible harms after the technological processes have been performed might be critical for the human rights dialogue as these processes become even more extensive, opaque and technologically complicated.&lt;/p&gt;
&lt;hr style="text-align: justify;" /&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; EMC: Data Science and Big Data Analytics. In: EMC Education Services, pp. 1–508 (2012)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; Bakshi, K.: Considerations for Big Data: Architecture and Approaches. In: Proceedings of the IEEE Aerospace Conference, pp. 1–7 (2012)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt; Adams, M.N.: Perspectives on Data Mining. International Journal of Market Research 52(1), 11–19 (2010) &lt;sup&gt;4&lt;/sup&gt; Elgendy, N.: Big Data Analytics in Support of the Decision Making Process. MSc Thesis, German University in Cairo, p. 164 (2013)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt; Big Data and Privacy: A Technological Perspective - President’s &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Council of Advisors on Science and&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Technology (May 2014)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt; Chen, Hsinchun, Roger HL Chiang, and Veda C. Storey. "Business Intelligence and Analytics: From Big Data to Big Impact." MIS quarterly 36.4 (2012): 1165-1188.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt; Chandramouli, Badrish, Jonathan Goldstein, and Songyun Duan. "Temporal analytics on big data for web advertising." 2012 IEEE 28th international conference on data engineering. IEEE, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt; Laurila, Juha K., et al. "The mobile data challenge: Big data for mobile computing research." Pervasive Computing. No. EPFL-CONF-192489. 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;[8]&lt;/a&gt; Lazer, David, et al. "The parable of Google flu: traps in big data analysis." &lt;em&gt;Science&lt;/em&gt; 343.6176 (2014): 12031205.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;[9]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;[10]&lt;/a&gt; Banaee, Hadi, Mobyen Uddin Ahmed, and Amy Loutfi. "Data mining for wearable sensors in health monitoring systems: a review of recent trends and challenges." &lt;em&gt;Sensors&lt;/em&gt; 13.12 (2013): 17472-17500.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;[11]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;[12]&lt;/a&gt; Chung, Eric S., John D. Davis, and Jaewon Lee. "Linqits: Big data on little clients." &lt;em&gt;ACM SIGARCH Computer Architecture News&lt;/em&gt;. Vol. 41. No. 3. ACM, 2013.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn13" href="#_ftnref13"&gt;[13]&lt;/a&gt; Kornelson, Kevin Paul, et al. "Method and system for developing extract transform load systems for data warehouses." U.S. Patent No. 7,139,779. 21 Nov. 2006.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn14" href="#_ftnref14"&gt;[14]&lt;/a&gt; Henry, Scott, et al. "Engineering trade study: extract, transform, load tools for data migration." &lt;em&gt;2005 IEEE Design Symposium, Systems and Information Engineering&lt;/em&gt;. IEEE, 2005.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn15" href="#_ftnref15"&gt;[15]&lt;/a&gt; Cohen, Jeffrey, et al. "MAD skills: new analysis practices for big data." &lt;em&gt;Proceedings of the VLDB Endowment&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn16" href="#_ftnref16"&gt;[16]&lt;/a&gt; .2 (2009): 1481-1492.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn17" href="#_ftnref17"&gt;[17]&lt;/a&gt; Elgendy, Nada, and Ahmed Elragal. "Big data analytics: a literature review paper." &lt;em&gt;Industrial Conference on Data Mining&lt;/em&gt;. Springer International Publishing, 2014.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn18" href="#_ftnref18"&gt;[18]&lt;/a&gt; Wu, Xindong, et al. "Data mining with big data." &lt;em&gt;IEEE transactions on knowledge and data engineering&lt;/em&gt; 26.1 (2014): 97-107.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn19" href="#_ftnref19"&gt;[19]&lt;/a&gt; Supra Note 17&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn20" href="#_ftnref20"&gt;[20]&lt;/a&gt; Hu, Han, et al. "Toward scalable systems for big data analytics: A technology tutorial." &lt;em&gt;IEEE Access&lt;/em&gt; 2 (2014):&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn21" href="#_ftnref21"&gt;[21]&lt;/a&gt; -687.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn22" href="#_ftnref22"&gt;[22]&lt;/a&gt; Kurt Cagle, Understanding the Big Data Lifecycle - LinkedIn Pulse (2015)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn23" href="#_ftnref23"&gt;[23]&lt;/a&gt; Coyle, Frank P. &lt;em&gt;XML, Web services, and the data revolution&lt;/em&gt;. Addison-Wesley Longman Publishing Co., Inc., 2002.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn24" href="#_ftnref24"&gt;[24]&lt;/a&gt; Pautasso, Cesare, Olaf Zimmermann, and Frank Leymann. "Restful web services vs. big'web services: making the right architectural decision." &lt;em&gt;Proceedings of the 17th international conference on World Wide Web&lt;/em&gt;. ACM, 2008.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn25" href="#_ftnref25"&gt;[25]&lt;/a&gt; Banker, Kyle. &lt;em&gt;MongoDB in action&lt;/em&gt;. Manning Publications Co., 2011&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn26" href="#_ftnref26"&gt;[26]&lt;/a&gt; McCreary, Dan, and Ann Kelly. "Making sense of NoSQL." &lt;em&gt;Shelter Island: Manning&lt;/em&gt; (2014): 19-20.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn27" href="#_ftnref27"&gt;[27]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn28" href="#_ftnref28"&gt;[28]&lt;/a&gt; Zhang, Hao, et al. "In-memory big data management and processing: A survey." &lt;em&gt;IEEE Transactions on Knowledge and Data Engineering&lt;/em&gt; 27.7 (2015): 1920-1948.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn29" href="#_ftnref29"&gt;[29]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn30" href="#_ftnref30"&gt;[30]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn31" href="#_ftnref31"&gt;[31]&lt;/a&gt; Supra Note 20&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn32" href="#_ftnref32"&gt;[32]&lt;/a&gt; Ballard, Chuck, et al. &lt;em&gt;IBM solidDB: Delivering Data with Extreme Speed&lt;/em&gt;. IBM Redbooks, 2011.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn33" href="#_ftnref33"&gt;[33]&lt;/a&gt; Shanahan, James G., and Laing Dai. "Large scale distributed data science using apache spark." &lt;em&gt;Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining&lt;/em&gt;. ACM, 2015. &lt;sup&gt;33&lt;/sup&gt; Shvachko, Konstantin, et al. "The hadoop distributed file system." &lt;em&gt;2010 IEEE 26th symposium on mass storage systems and technologies (MSST)&lt;/em&gt;. IEEE, 2010.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn34" href="#_ftnref34"&gt;[34]&lt;/a&gt; Borthakur, Dhruba. "The hadoop distributed file system: Architecture and design." &lt;em&gt;Hadoop Project Website&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn35" href="#_ftnref35"&gt;[35]&lt;/a&gt; .2007 (2007): 21.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn36" href="#_ftnref36"&gt;[36]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn37" href="#_ftnref37"&gt;[37]&lt;/a&gt; &lt;em&gt;ibid&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn38" href="#_ftnref38"&gt;[38]&lt;/a&gt; Zikopoulos, Paul, and Chris Eaton. &lt;em&gt;Understanding big data: Analytics for enterprise class hadoop and streaming data&lt;/em&gt;. McGraw-Hill Osborne Media, 2011.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn39" href="#_ftnref39"&gt;[39]&lt;/a&gt; Bizer, Christian, et al. "The meaningful use of big data: four perspectives--four challenges." &lt;em&gt;ACM SIGMOD Record&lt;/em&gt; 40.4 (2012): 56-60.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn40" href="#_ftnref40"&gt;[40]&lt;/a&gt; Kaisler, Stephen, et al. "Big data: issues and challenges moving forward." &lt;em&gt;System Sciences (HICSS), 2013 46th Hawaii International Conference on&lt;/em&gt;. IEEE, 2013.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn41" href="#_ftnref41"&gt;[41]&lt;/a&gt; Supra Note 21&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn42" href="#_ftnref42"&gt;[42]&lt;/a&gt; DuCharme, Bob. "What Do RDF and SPARQL bring to Big Data Projects?." &lt;em&gt;Big Data&lt;/em&gt; 1.1 (2013): 38-41.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn43" href="#_ftnref43"&gt;[43]&lt;/a&gt; Zhong, Yunqin, et al. "Towards parallel spatial query processing for big spatial data." &lt;em&gt;Parallel and &lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Distributed Processing Symposium Workshops &amp;amp; PhD Forum (IPDPSW), 2012 IEEE 26th International&lt;/em&gt;. IEEE, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn44" href="#_ftnref44"&gt;[44]&lt;/a&gt; Ma, Li, et al. "Effective and efficient semantic web data management over DB2." &lt;em&gt;Proceedings of the 2008 ACM SIGMOD international conference on Management of data&lt;/em&gt;. ACM, 2008.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn45" href="#_ftnref45"&gt;[45]&lt;/a&gt; Lohr, Steve. "The age of big data." &lt;em&gt;New York Times&lt;/em&gt; 11 (2012).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn46" href="#_ftnref46"&gt;[46]&lt;/a&gt; Pääkkönen, Pekka, and Daniel Pakkala. "Reference architecture and classification of technologies, products and services for big data systems." &lt;em&gt;Big Data Research&lt;/em&gt; 2.4 (2015): 166-186.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn47" href="#_ftnref47"&gt;[47]&lt;/a&gt; Sumbaly, Roshan, et al. "Serving large-scale batch computed data with project voldemort." &lt;em&gt;Proceedings of the 10th USENIX conference on File and Storage Technologies&lt;/em&gt;. USENIX Association, 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn48" href="#_ftnref48"&gt;[48]&lt;/a&gt; Bar-Sinai, Michael. "Big Data Technology Literature Review." &lt;em&gt;arXiv preprint arXiv:1506.08978&lt;/em&gt; (2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn49" href="#_ftnref49"&gt;[49]&lt;/a&gt; ibid&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn50" href="#_ftnref50"&gt;[50]&lt;/a&gt; Condie, Tyson, et al. "MapReduce Online." &lt;em&gt;Nsdi&lt;/em&gt;. Vol. 10. No. 4. 2010.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn51" href="#_ftnref51"&gt;[51]&lt;/a&gt; Supra Note 47&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn52" href="#_ftnref52"&gt;[52]&lt;/a&gt; Dean, Jeffrey, and Sanjay Ghemawat. "MapReduce: a flexible data processing tool." &lt;em&gt;Communications of the ACM&lt;/em&gt; 53.1 (2010): 72-77.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn53" href="#_ftnref53"&gt;[53]&lt;/a&gt; ibid&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn54" href="#_ftnref54"&gt;[54]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn55" href="#_ftnref55"&gt;[55]&lt;/a&gt; Tene, Omer, and Jules Polonetsky. "Big data for all: Privacy and user control in the age of analytics." &lt;em&gt;Nw. J. Tech. &amp;amp; Intell. Prop.&lt;/em&gt; 11 (2012): xxvii.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn56" href="#_ftnref56"&gt;[56]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn57" href="#_ftnref57"&gt;[57]&lt;/a&gt; Privacy by design in big data, ENISA&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn58" href="#_ftnref58"&gt;[58]&lt;/a&gt; Big Data &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; and &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Privacy: &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; A &amp;nbsp;&amp;nbsp; Technological Perspective, &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; White &amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; House,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;https://www.whitehouse.gov/sites/default/files/microsites/ostp/PCAST/pcast_big_data_and_privacy__may_2014&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn59" href="#_ftnref59"&gt;[59]&lt;/a&gt; Id&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn60" href="#_ftnref60"&gt;[60]&lt;/a&gt; Id&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn61" href="#_ftnref61"&gt;[61]&lt;/a&gt; Tene, Omer, and Jules Polonetsky. "Privacy in the age of big data: a time for big decisions." &lt;em&gt;Stanford Law Review Online&lt;/em&gt; 64 (2012): 63.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn62" href="#_ftnref62"&gt;[62]&lt;/a&gt; Lane, Julia, et al., eds. &lt;em&gt;Privacy, big data, and the public good: Frameworks for engagement&lt;/em&gt;. Cambridge University Press, 2014.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn63" href="#_ftnref63"&gt;[63]&lt;/a&gt; Crawford, Kate, and Jason Schultz. "Big data and due process: Toward a framework to redress predictive privacy harms." &lt;em&gt;BCL Rev.&lt;/em&gt; 55 (2014): 93.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn64" href="#_ftnref64"&gt;[64]&lt;/a&gt; http://homes.esat.kuleuven.be/~sguerses/papers/DanezisGuersesSurveillancePets2010.pdf&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn65" href="#_ftnref65"&gt;[65]&lt;/a&gt; Seda Gurses and George Danezis, A critical review of 10 years of privacy technology, August 12th 2010, http://homes.esat.kuleuven.be/~sguerses/papers/DanezisGuersesSurveillancePets2010.pdf&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn66" href="#_ftnref66"&gt;[66]&lt;/a&gt; Id&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/technology-behind-big-data'&gt;https://cis-india.org/internet-governance/blog/technology-behind-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Geethanjali Jujjavarapu and Udbhav Tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-12-04T09:53:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/the-platform-economys-gatekeeping-of-class-and-caste-dominance-in-urban-india">
    <title>The Platform Economy’s Gatekeeping of Class and Caste Dominance in Urban India</title>
    <link>https://cis-india.org/raw/the-platform-economys-gatekeeping-of-class-and-caste-dominance-in-urban-india</link>
    <description>
        &lt;b&gt;Ambika Tandon and Aayush Rathi contributed an essay on how gated society management apps like MyGate and NoBrokerHood feed on caste and income inequalities in new datafied forms. The essay features in The Formalization of Social Precarities, an anthology edited by Murali Shanmugavelan and Aiha Nguyen and published with Data &amp; Society.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Ashrit is an experienced platform worker. He has been a delivery worker for three years, job-hopping frequently. Ashrit has worked as a package delivery worker for three platforms: two courier services and a hyperlocal grocery delivery company, which promises compressed ten-minute deliveries over short distances. While navigating the city, he often deals with omnipresent surveillance tools deployed in apartment complexes owned by upper-class and dominant-caste homeowners. Ashrit is used to being screened at every apartment complex he enters, including having his picture taken and verifying details such as his name, mobile number, and the platform he is delivering for. The everydayness of constant identity verification means that Ashrit is not bothered much by it — he said he doesn’t mind the process so much as the delay it causes when customers forget to approve his entry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;MyGate is one such company offering “gated community management,” claiming to service over 25,000 gated societies in India. A competing application, NoBrokerHood, services over 18,000 societies. Apps of this nature have sprung up across urban India in the past five years, offering “society management” services to a niche market of gated societies. Their bouquet of services includes everything from property listings with a commission rate for the platform, security services, accounting services for maintenance and related expenses, and in-app discussion forums for residents. These apps market digital security, which allows residents to regulate entries and exits and make a database of all non-resident visitors in the society. The objective of these apps is to legitimize surveillance as a way of ensuring safety in gated societies. Through a preliminary search online, we found over 20 different companies specializing in digital solutions for gated societies. The industry even had a business exposition in Mumbai on “Housing Society Management,” focused on technology solutions for gated societies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This study uses the framework of platform urbanism to understand surveillance platforms. Platform urbanism analyzes the growing power of digital platforms in cities. Urban geographers have argued that platforms are a symptom of current models of capitalism, which exploit “idle resources” to produce new forms of urban spaces and value where they might not have existed earlier. Airbnb and Uber are often used as examples of this new form of extraction and value creation from existing assets by monetizing empty rooms and car seats. We argue that platforms offering surveillance services are another instance of this wider landscape of platform urbanism, manufacturing the need for surveillance systems in elite urban enclaves. We use this case study to show that platforms monetize not just idle resources but social inequality and stratification to generate value and capital.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;br /&gt;Click to download the &lt;a class="external-link" href="http://cis-india.org/raw/platform-economy-gatekeeping-class-caste.pdf/"&gt;full essay&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/the-platform-economys-gatekeeping-of-class-and-caste-dominance-in-urban-india'&gt;https://cis-india.org/raw/the-platform-economys-gatekeeping-of-class-and-caste-dominance-in-urban-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Ambika Tandon and Aayush Rathi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Labour Futures</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2024-04-19T03:11:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis">
    <title>The Fundamental Right to Privacy: An Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis</link>
    <description>
        &lt;b&gt;Last​ ​month’s​ ​judgment​ ​by​ ​the​ ​nine​ ​judge​ ​referral​ ​bench​ ​was​ ​an​ ​emphatic endorsement​ ​of​ ​the​ ​the​ ​constitutional​ ​right​ ​to​ ​privacy.​ ​In​ ​the​ ​course​ ​of​ ​a​ ​547​ ​page judgment,​ ​the​ ​bench​ ​affirmed​ ​the​ ​fundamental​ ​nature​ ​of​ ​the​ ​right​ ​to​ ​privacy reading​ ​it​ ​into​ ​the​ ​values​ ​of​ ​dignity​ ​and​ ​liberty.​ In the course of a few short papers, we will dissect the various aspects of the right to privacy as put forth by the nine judge constitutional bench in the Puttaswamy matter. The papers will focus on the sources, structure, scope, breadth, and future of privacy. Here are the first three papers, authored by Amber Sinha and edited by Elonnai Hickok.


&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;The​ ​Fundamental​ ​Right​ ​to​ ​Privacy - Part​ ​I:​ ​Sources&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Much​ ​of​ ​the​ ​debate​ ​and​ ​discussion​ ​in​ ​the​ ​hearings​ ​before​ ​the​ ​constitutional​ ​bench was​ ​regarding​ ​where​ ​in​ ​the​ ​Constitution​ ​a​ ​right​ ​to​ ​privacy​ ​may​ ​be​ ​located.​ In​ ​this paper,​ ​we​ ​analyse​ ​the​ ​different​ ​provisions​ ​and​ ​tools​ ​of​ ​interpretations​ ​use​ ​by​ ​the bench​ ​to​ ​read​ ​a​ ​right​ ​to​ ​privacy​ ​in​ ​Part​ ​III​ ​of​ ​the​ ​Constitution.&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-i-sources-pdf/at_download/file"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;The​ ​Fundamental​ ​Right​ ​to​ ​Privacy - ​Part​ ​II:​ Structure&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;​In​ ​the​ ​previous​ ​paper,​ ​we delved​ ​into​ ​the​ ​ ​sources​ ​in​ ​the​ ​Constitution​ ​and​ ​the​ ​interpretive​ ​tools​ ​used​ ​to​ ​locate 
the​ ​right​ ​to​ ​privacy​ ​as​ ​a​ ​constitutional​ ​right.​ ​This​ ​paper​ ​follows​ ​it​ ​up​ ​with​ ​an​ ​analysis of​ ​the​ ​structure​ ​of​ ​the​ ​right​ ​to​ ​privacy​ ​as​ ​articulated​ ​by​ ​the​ ​bench.​ ​We​ ​will​ ​look​ ​at​ ​the various​ ​facets​ ​of​ ​privacy​ ​which​ ​form​ ​a​ ​part​ ​of​ ​the​ ​fundamental​ ​right,​ ​the​ ​basis​ ​for such​ ​dimensions​ ​and​ ​what​ ​their​ ​implications​ ​may​ ​be.&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-ii-structure-pdf/at_download/file"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;The​ ​Fundamental​ ​Right​ ​to​ ​Privacy - Part​ ​III:​ Scope&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;While the previous papers dealt with the sources in the Constitution and the interpretive tools used by the bench to locate the right to privacy as a constitutional right, as well as the structure of the right with its various dimensions, this paper will look at the judgment for guidance on principles to determine what the scope of the right of privacy may be.&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope/at_download/file" class="external-link"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis'&gt;https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-10-04T11:19:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation">
    <title>The Embodiment of the Right to Privacy within Domestic Legislation</title>
    <link>https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation</link>
    <description>
        &lt;b&gt;The Right to Privacy is a pivotal construct, essential to the actualization of justice, fairness and equity within any democratic society. It is an instrument used to secure the boundaries of an individual’s personal space, in his interaction with not only the rest of society but also the State. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It is within this realm of the social transaction that there exists an unending conflict between the Right to Privacy of an individual and the overbearing hand of the State as a facilitator of public interest. This right thus acts as a safety valve providing individuals with a sacred space within which their interactions in their personal capacity have no bearing on their conduct in the public sphere. The preservation of this space is incredibly important in order to ensure a willingness of individuals to engage and cooperate with the State in its fulfillment of public welfare measures that would otherwise be deemed as intrusive. It is in this regard that the Right to Privacy, one of the last sustaining rights that an individual holds against a larger State interest, ought to be protected by the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are numerous dimensions to the idea of the Right to Privacy. These include but are not limited to the privacy of person, privacy of communication, personal privacy, transactional privacy, privacy of information and the privacy of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court of India has come to the rescue of individuals, time and again by construing "Right to Privacy" as an extension of the Fundamental Right to “Protection of Life and Personal liberty” under Article 21 of the Constitution. This has been reflected in the adjudicatory jurisprudence of the Constitutional courts in the country. However, there exists no Constitutional remedy to redress the breach of privacy by a nongovernmental actor, except under tortuous liability. The power and authority of public and private institutions to use an individual’s personal data for larger interests of national security or effectuation of socio-economic policies is still under extensive scrutiny. It is in this regard that we have compiled a number of sectoral legislations, regulating domains ranging from Finance and Telecom to Healthcare, Freedom of Expression, Consumer rights and Procedural codes. The highlighted provisions under each Act pertain to the mechanisms embodied within the legislation for the regulation of privacy within their respective sectors. Through this we aim to determine the threshold for permissible collection of confidential data and regulatory surveillance, provided a sufficient need for the same has been established. The determination of such a threshold is imperative to formulating a consistent and effective regime of privacy protection in India.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Click to download the below resources:&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Legislations&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/master-circulars.zip" class="external-link"&gt;Master Circulars&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/finance-and-privacy.zip" class="external-link"&gt;Finance and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cpc-crpc.zip" class="external-link"&gt;Code of Civil Procedure and Code of Criminal Procedure&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/freedom-of-expression.zip" class="external-link"&gt;Freedom of Expression&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/identity-and-privacy.zip" class="internal-link"&gt;Identity and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/national-security-and-privacy.zip" class="internal-link"&gt;National Security and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/consumer-protection-privacy.zip" class="external-link"&gt;Consumer Protection&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/transparency-and-privacy.zip" class="internal-link"&gt;Transparency and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/healthcare.zip" class="external-link"&gt;Healthcare&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/telecom-chapters.zip" class="external-link"&gt;Telecom&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Case Laws&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/code-of-civil-procedure.zip" class="external-link"&gt;Code of Civil Procedure and Code of Criminal Procedure&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/freedom-expression.zip" class="internal-link"&gt;Freedom of Expression&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/identity-cases.zip" class="external-link"&gt;Identity and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/national-security-cases.zip" class="external-link"&gt;National Security and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/consumer-protection.zip" class="internal-link"&gt;Consumer Protection&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/transparency-privacy.zip" class="internal-link"&gt;Transparency and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/health-care.zip" class="internal-link"&gt;Healthcare&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/telecom-cases.zip" class="internal-link"&gt;Telecom&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt; &lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation'&gt;https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tanvi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-08T02:37:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime">
    <title>Survey on Data Protection Regime</title>
    <link>https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime</link>
    <description>
        &lt;b&gt;We request you to take part in this survey aimed at understanding how various organisations view the changes in the Data Protection Regime in the European Union. Recently the General Data Protection Regulation (EU) 2016/679 was passed, which shall replace the present Data Protection Directive DPD 95/46/EC. This step is likely to impact the way of working for many organisations. We are grateful for your voluntary contribution to our research, and all information shared by you will be used for the purpose of research only. Questions that personally identify you are not mandatory and will be kept strictly confidential. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;The survey form below can also be accessed &lt;a href="https://goo.gl/forms/61d4W0kPQ8SqNaMO2" target="_blank"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;iframe src="https://docs.google.com/forms/d/e/1FAIpQLSepvhTUkkc7s3jFDfJZ90wFJAIuVexrbVSO5icV4kW0-1uyNA/viewform?embedded=true" frameborder="0" marginwidth="0" marginheight="0" height="800" width="600"&gt;Loading...&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime'&gt;https://cis-india.org/internet-governance/blog/survey-on-data-protection-regime&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aditi Chaturvedi and Elonnai Hickok</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>General Data Protection Regulation</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2017-02-10T10:47:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016">
    <title>Submitted Comments on the Telangana State Open Data Policy 2016</title>
    <link>https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016</link>
    <description>
        &lt;b&gt;Last month, the Information Technology, Electronics &amp; Communications Department of the Government of Telangana released the first public draft of the Telangana State Open Data Policy 2016, and sought comments from various stakeholders in the state and outside. The draft policy not only aims to facilitate and provide a framework for proactive disclosure of data created by the state government agencies, but also identify the need for integrating such a mandate within the information systems operated by these agencies as well. CIS is grateful to be invited to submit its detailed comments on the same. The submission was drafted by Anubha Sinha and Sumandro Chattapadhyay.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download the submitted document: &lt;a href="http://cis-india.org/openness/files/cis-telangana-state-open-data-policy-v-1-submission/at_download/file"&gt;PDF&lt;/a&gt;.&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;1. Preliminary&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;1.1.&lt;/strong&gt; This submission presents comments and recommendations by the Centre for Internet and Society (“CIS”) &lt;strong&gt;[1]&lt;/strong&gt; on the proposed draft of the Telangana Open Data Policy 2016 (“the draft policy”). This submission is based on Version 1 of the draft policy shared by the Information Technology, Electronics &amp;amp; Communications Department, Government of Telangana (“the ITE&amp;amp;C Department”).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;1.2.&lt;/strong&gt; CIS commends the ITE&amp;amp;C Department for its generous efforts at seeking inputs from various stakeholders to draft an open data policy for the state of Telangana. CIS is thankful for this opportunity to provide a clause-by-clause submission.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;2. The Centre for Internet and Society&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;2.1.&lt;/strong&gt; The Centre for Internet and Society, CIS, is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with diverse abilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa.&lt;/p&gt;
&lt;p&gt;2.2. This submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. The comments in this submission aim to further the principle of citizens’ right to information, instituting openness-by-default in governmental activities, and to realise the various kinds of public goods that can emerge from greater availability of open (government) data. The submission is limited to those clauses that most directly have an impact on these principles.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;3. Comments and Recommendations&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;em&gt;This section presents comments and recommendations directed at the draft policy as a whole, and in certain places, directed at specific clauses of the draft policy.&lt;/em&gt;&lt;/p&gt;
&lt;h3&gt;3.1. Defining the Scope of the Policy in the Preamble&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.1.1.&lt;/strong&gt; CIS observes and appreciates that the ITE&amp;amp;C Department has identified the open data policy as a catalyst for, and as dependent upon, a larger transformation of the information systems implemented in the state, to specifically ensure that these information systems.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.2.&lt;/strong&gt; CIS commends the endeavour of the draft policy to share data in open and machine-readable standards. To further this, it will be useful for the preamble to explicitly mandate proactive disclosure in both human-readable and machine-readable formats, using open standards, and under open license(s).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.3.&lt;/strong&gt; CIS recommends that the draft policy state the scope of the policy at the outset, i.e. in the Preamble section of the document. This will provide greater clarity to the stakeholders who are trying to ascertain applicability of the draft policy to their data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.4.&lt;/strong&gt; CIS commends the crucial mandate of creating data inventory within every state government ministry / department. We further recommend that the draft policy also expressly states the need to make these inventories publicly accessible.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.5.&lt;/strong&gt; CIS commends the draft policy’s aim to build a process to engage with data users for better outcomes. We suggest that the draft policy also enumerates the “outcomes” of such engagement, in order to provide more clarity. We recommend that these “outcomes” include greater public supply of open government data in an effective, well-documented, timely, and responsible manner.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.1.6.&lt;/strong&gt; Further, CIS suggests that the draft policy define “information centric and customer centric data” to provide more clarity to the document, as well as its scope and objectives.&lt;/p&gt;
&lt;h3&gt;3.2. Provide Legal and Policy References&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.2.1.&lt;/strong&gt; Strengthening transparency, predictability, and legal certainty of rules benefits all stakeholders. Thus, as far as possible, terms in the draft policy should use pre-existing legal definitions. In case of ambiguities arising after the implementation of the policy, consistency in definitions will also lead to greater interpretive certainty. It must be noted that good quality public policies which promote legal certainty, lead to better implementation.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.2.&lt;/strong&gt; CIS observes that the draft policy re-defines various terms in Section 4 that have already been defined in National Data Sharing and Accessibility Policy (“NDSAP”) 2012 &lt;strong&gt;[2]&lt;/strong&gt;, the Right to Information 2005 (“RTI Act”) &lt;strong&gt;[3]&lt;/strong&gt;, and IT (Reasonable  security  practices  and  procedures  and sensitive personal data or information) Rules 2011 &lt;strong&gt;[4]&lt;/strong&gt;. We strongly recommend that the draft policy uses the pre-existing definitions in these acts, rules, and policies.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.2.3.&lt;/strong&gt; Further, CIS observes that while certain sections accurately reflect definitions and parts from other acts, rules and policies, such sections are not referenced back to the latter. These sections include, but are not limited to: Sections 3, 7, 8, 4 (definitions of Data set, Data Archive, Negative list, Sensitive Personal data). We strongly recommend that accurate legal references be added to the draft policy after careful study of the language used.&lt;/p&gt;
&lt;h3&gt;3.3. Need for More Focused Objective Statement&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.3.1.&lt;/strong&gt; While the draft policy has a very comprehensive statement of its objectives, including "&lt;em&gt;all issues related to data in terms of the available scope of sharing and accessing spatial and non-spatial data under broad frameworks of standards and interoperability&lt;/em&gt;," it may consider offering a more focused statement of its key objective, which is to provide a policy framework for proactive disclosure of government data by the various agencies of the Government of Telangana.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.3.2.&lt;/strong&gt; Further, the objective statement must clearly state that the policy enables publication of data created by the agencies of the Government of Telangana, and/or by private agencies working in partnership with public agencies, using public funds as open data (that is, using open standards, and under open license). The present version of the objective statement mentions "&lt;em&gt;sharing&lt;/em&gt;" and "&lt;em&gt;accessing&lt;/em&gt;" the data concerned under "&lt;em&gt;broad frameworks of standards and interoperability&lt;/em&gt;" but does not make it clear if such shared data will be available in open standards, under open licenses, and for royalty-free adaptation and redistribution by the users concerned.&lt;/p&gt;
&lt;h3&gt;3.4. Suggestions related to the Definitions&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.4.1.&lt;/strong&gt; The term “Data” has not been defined in accordance with NDSAP 2012. We suggest that the definition provided in NDSAP is followed so as to ensure legal compatibility.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.2.&lt;/strong&gt; The term “Sensitive Personal Data” seems to have been defined on the basis of the definition provided in the IT (Reasonable  security  practices  and  procedures  and sensitive personal data or information) Rules 2011. Please add direct reference so as to make this clear. We further suggest that the term “Personal Information”, also defined in the same IT Rules, is also included and referred to in the draft policy, so that not only Sensitive Personal Data is barred from disclosure under this policy, but also Personal Information (that is "&lt;em&gt;any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be available with a body corporate, is capable of identifying such person&lt;/em&gt;") &lt;strong&gt;[5]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.3.&lt;/strong&gt; The term “Negative List” is defined in a manner that allows the state government ministries and agencies to identify which data are to be considered as non-shareable without any reference to an existing policy framework that list acceptable grounds for such identification. The term must be defined more restrictively, as this definition can allow an agency to avoid disclosure of data that may not be legally justifiable as non-shareable or sensitive. Thus, we recommend a more limited definition which may draw upon the RTI Act 2005, and specifically consider the factors mentioned in Sections 8 and 9 of the Act as the (only) set of acceptable reasons for non-disclosure of government data.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.4.&lt;/strong&gt; The terms “Shareable Data” and “Sensitive Data” are used in several places in the draft policy but are not defined in Section 4. Both these terms are defined in NDSAP 2012. We suggest that both these terms be listed in Section 4, in accordance with the respective definitions provided in NDSAP 2012.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.4.5.&lt;/strong&gt; The terms “Data Archive”, “Data Acquisition”, “Raw Data”, “Standards-Compliant Applications”, and “Unique Data” are defined in Section 4, but none of these terms appear elsewhere in the draft policy. We suggest that these terms are either better integrated into the document, or may not be defined at all.&lt;/p&gt;
&lt;h3&gt;3.5. Rename Section 6 to Focus on Implementation of the Policy&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.5.1.&lt;/strong&gt; Though the Section 6 is named as “Shareable Data”, it instead categorically lists down how the policy is to be implemented. This is a very welcome step, but the Section title should reflect this purpose of the Section.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.2.&lt;/strong&gt; The decision proposed in the draft policy to make it mandatory for "&lt;em&gt;each funding organization&lt;/em&gt;" to "&lt;em&gt;highlight data sharing policy as preamble in its RFPs as well as Project proposal formats&lt;/em&gt;" is much appreciated and commendable. For a clearer and wider applicability of this measure, we recommend that this responsibility should apply to all state government agencies, including agencies where the state government enjoys significant stake, and all public-private partnerships entered into by the state government agencies, and not only to "&lt;em&gt;funding organizations&lt;/em&gt;" (a term that has also not been defined in the draft policy).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.5.3.&lt;/strong&gt; While the Section details out various measures and steps of implementation of the policy, it does not clarify which agency and/or committee would have the authority and responsibility to coordinate, monitor, facilitate, and ensure these measures and steps. Not only governmental representatives but also non-governmental representatives may be considered for such a committee.&lt;/p&gt;
&lt;h3&gt;3.6. Host All Open Government Data in the State Portal&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.6.1.&lt;/strong&gt; We observe that the Section 6 indicates that  , the designated domain for the open government data portal for the state of Telangana, will only store metadata related to the proactive disclosed data sets but not the data sets themselves. This is further clarified in Section 10. We strongly urge the ITE&amp;amp;C Department to reconsider this decision to not to store the actual open data sets in the state open government data portal itself but in the departmental portals. A central archive of the open data assets, hosted by the state open government data portal, will allow for more effective and streamlined management of the open data assets concerned, including their systematic backing-up, better security and integrity, permanent and unique disclosure, and rule-driven updation. This would also reduce the burden upon all the government agencies, especially those that do not have a substantial IT team, to run independent department-specific open data portals.&lt;/p&gt;
&lt;h3&gt;3.7. Reconsider the Section on Data Classification&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.7.1.&lt;/strong&gt; While it is clear that the Section 7 on Data Classification follows the classification of various data sets created, managed, and/or hosted by government agencies offered in the NDSAP 2012, it is not very clear what role this classification plays in functioning and implementation of the draft policy. While Open Access and Registered Access data may both be considered as open government data that is to be proactively disclosed by the state government agencies via the state open government data portal, the Restricted Access data overlaps with the kinds of data already included in the Negative List defined in the draft policy (and elsewhere, like the RTI Act 2005). Further, the final sentence in this Section ensures that all data users provide appropriate attribution of the source(s) of the data set concerned, which (though is an important statement) should not be part of this Section on Data Classification. We suggest reconsideration of inclusion of this Section.&lt;/p&gt;
&lt;h3&gt;3.8. Reconsider the Section on Technology for Sharing and Access&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.8.1.&lt;/strong&gt; While it is clear that the Section 8 on Technology for Sharing and Access is adapted from the Section 9 of the NDSAP 2012, the text in this Section seems to be not fully compatible with other statements in this draft policy. For example, the Section states that "&lt;em&gt;[t]his integrated repository will hold data of current and historical nature and this repository over a period of time will also encompass data generated by various State Government departments&lt;/em&gt;." However, the draft policy states in Section 10 that "&lt;em&gt;data.telangana.gov.in will only have the metadata and data itself will be accessed from the portals of the departments&lt;/em&gt;."&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.8.2.&lt;/strong&gt; We strongly urge the ITE&amp;amp;C Department to revise this Section through close discussion with the NDSAP Project Management Unit, National Informatics Centre, which is the technical team responsible for developing and managing the  portal, since the present version of this Section lists the original feature set of the  portal as envisioned in 2012 but does not reflect the most recent feature set that has been already implemented in the portal concerned.&lt;/p&gt;
&lt;h3&gt;3.9. Current Legal Framework (Section 9) should List to Relevant Acts, Rules, Policies, and Guidelines&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.9.1.&lt;/strong&gt; CIS observes that the draft policy attempts to lay out the applicable legal framework in Section 2 and 9 of the draft policy, and submits that the legal framework is incomplete and recommends that the draft policy lists all the following relevant acts, rules, policies and guidelines:&lt;/p&gt;
&lt;ol type="A"&gt;
&lt;li&gt;National Data Sharing and Accessibility Policy, 2012&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Right to Information Act, 2005&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Information Technology Act, 2002&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;3.9.2.&lt;/strong&gt; CIS submits that apart from the policies mentioned above, the implementation of the draft policy is intricately linked to concepts of "open standards," "open source software," "open API," and "right to information." These concepts are governed by specific acts and policies, and are applicable to government owned data, as follows:&lt;/p&gt;
&lt;ol type="A"&gt;
&lt;li&gt;&lt;strong&gt;Adoption of Open Standards:&lt;/strong&gt; CIS observes that the draft policy draws on the importance of building information systems for interoperability and greater information accessibility. Interoperability is achieved by appropriate implementation of open standards. Thus, CIS submits that the Policy on Open Standards for e-Governance &lt;strong&gt;[6]&lt;/strong&gt; which establishes the guidelines for usage of open standards to ensure seamless interoperability, and the Implementation Guidelines of the National Data Sharing and Accessibility Policy, 2012 &lt;strong&gt;[7]&lt;/strong&gt; should be mentioned in the draft policy.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Adoption of Open Source Software:&lt;/strong&gt; The Policy on Adoption of Open Source Software for Government of India states that the "&lt;em&gt;Government of India shall endeavour to adopt Open Source Software in all e-Governance systems implemented by various Government organizations, as a preferred option in comparison to Closed Source Software&lt;/em&gt; &lt;strong&gt;[8]&lt;/strong&gt;." As the draft policy proposed to guide the development of information systems to share open data is being developed and implemented both by the Government of Telangana and by other agencies (academic, commercial, and otherwise), it must include an explicit reference and embracing of  this mandate for adoption of Open Source Software, for reasons of reducing expenses, avoiding vendor lock-ins, re-usability of software components, enabling public accountability, and greater security of software systems.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Implementation of Open APIs:&lt;/strong&gt; CIS observes that the draft policy refers to Standard compliant applications in Section 4. CIS suggests that final version of the policy refer to and operationalise the Policy on Open Application Programming Interfaces (APIs) for Government of India &lt;strong&gt;[9]&lt;/strong&gt;. This will ensure that the openly available data is available to the public, as well as  to all the government agencies, in a structured digital format that is easy to consume and use on one hand, and is available for various forms of value addition and innovation on the other. Refer to Official Secrets Act, 1923: The Official Secrets Act penalises a person if he/she "&lt;em&gt;obtains, collects, records or publishes or communicates to other person any secret official code or password, or any sketch, plan, model, article or note or other document or information which is calculated to be or might be or is intended to be, directly or indirectly, useful to an enemy for which relates to a matter the disclosure of which is likely to affect the sovereignty and integrity of India, the security of the State or friendly relations with foreign States&lt;/em&gt; &lt;strong&gt;[10]&lt;/strong&gt;." CIS submits that this Act should be referred to in this context of ensuring non-publication of the aforementioned data.&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;
&lt;h3&gt;3.10. Mandate a Participatory Process for Developing the Implementation Guidelines&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.10.1.&lt;/strong&gt; We highly appreciate and welcome the fact that the draft policy emphasises rapid operationalisation of the policy by mandating that the ITE&amp;amp;C Department will prepare a detailed implementation guideline within 6 months of the notification of this policy, and all state government departments will publish at least 5 high value datasets within the next three months. Just as an addition to this mandate, we would like to propose that it can be suggested that the ITE&amp;amp;C Department undertakes a participatory process, with contributions from both government agencies and non-government actors, to develop this implementation guideline document. We believe that opening up government data in an effective and sustainable manner, for most government agencies, involves a systematic change in how the agency undertakes day-to-day data management practices. Hence, to develop productive and practical implementation guidelines, the ITE&amp;amp;C Department needs to gather insights from the other state government agencies regarding their existing data (and metadata) management practices &lt;strong&gt;[11]&lt;/strong&gt;. Further, participation of the non-government actors in this process is crucial to ensure that the implementation guidelines appropriately identify the high value data sets, that is data sets that should be published on a priority basis.&lt;/p&gt;
&lt;h3&gt;3.11. Defer the Decision about Roles of Data Owners, Generators, and Controllers&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;3.11.1.&lt;/strong&gt; As the draft policy does not specifically define the terms “Data Owners”, “Data Generators”, and “Data Controllers”, and the Section 11 only briefly describes some of the roles of these types of actors, we suggest removal of this discussion and the decision regarding the specific roles and functions of the Data Owners / Generators / Controllers from the draft policy itself. It will be perhaps more appropriate and effective to define these terms, as well as their roles and functions, in the implementation guidelines to be prepared by the ITE&amp;amp;C Department after the notification of the open data policy, since these terms relate directly to the final designing of the implementation process.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;3.12.&lt;/strong&gt; CIS is grateful to the ITE&amp;amp;C Department for this opportunity to provide comments, and would be honoured to provide further assistance on the matter.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Endnotes&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/" target="_blank"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://data.gov.in/sites/default/files/NDSAP.pdf" target="_blank"&gt;http://data.gov.in/sites/default/files/NDSAP.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://rti.gov.in/webactrti.htm" target="_blank"&gt;http://rti.gov.in/webactrti.htm&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf" target="_blank"&gt;http://meity.gov.in/sites/upload_files/dit/files/GSR313E_10511(1).pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; See Section 2 (1) (i) of IT (Reasonable security practices and procedures and sensitive personal data or information) Rules 2011.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; See: &lt;a href="https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf" target="_blank"&gt;https://egovstandards.gov.in/sites/default/files/Published%20Documents/Policy_on_Open_Standards_for_e-Governance.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; See: &lt;a href="https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf" target="_blank"&gt;https://data.gov.in/sites/default/files/NDSAP_Implementation_Guidelines_2.2.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf" target="_blank"&gt;http://deity.gov.in/sites/upload_files/dit/files/policy_on_adoption_of_oss.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; See: &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf" target="_blank"&gt;http://deity.gov.in/sites/upload_files/dit/files/Open_APIs_19May2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; See: &lt;a href="http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf" target="_blank"&gt;http://www.archive.india.gov.in/allimpfrms/allacts/3314.pdf&lt;/a&gt;, Sections 2 (2) and 3 (1) (c).&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; A similar process was undertaken by the IT Department of the Government of Sikkim when developing the implementation guideline document. The ITE&amp;amp;C Department may consider discussing the matter with the said department to exchange relevant learnings.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016'&gt;https://cis-india.org/openness/comments-on-the-telangana-state-open-data-policy-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-09-01T05:49:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
