<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 51 to 65.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india">
    <title>Analysis of the Report of the Group of Experts on Developments in the Field of Information and Telecommunications in the Context of International Security and Implications for India</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india</link>
    <description>
        &lt;b&gt;This paper analyses the report of the Group of Experts and and India’s compliance with its recommendations based on existing laws and policies. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Experts and similar international forums are useful and important forums for India to actively engage with.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The United Nations Group of Experts on ICT issued their report on Developments in the Field of Information and Telecommunications in the Context of International Security in June, 2015. This paper analyses the report of the Group of Experts and and India’s compliance with its recommendations based on existing laws and policies. CIS believes that the report of the Group of Experts provides important minimum standards that countries could adhere to in light of challenges to international security posed by ICT developments. Given the global nature of these challenges and the need for nations to holistically address such challenges from a human rights and security perspective, CIS believes that the Group of Experts and similar international forums are useful and important forums for India to actively engage with.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Download: &lt;a href="https://cis-india.org/internet-governance/files/ict-paper.pdf" class="internal-link"&gt;PDF&lt;/a&gt; (627 kb)&lt;/strong&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;1. &lt;a href="#1"&gt;Introduction&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2. &lt;a href="#2"&gt;Analysis of the Recommendations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2a. &lt;a href="#2a"&gt;Consistent with the purposes of the United Nations, including to maintain international
peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2b. &lt;a href="#2b"&gt;In case of ICT incidents, States should consider all relevant information, including the
larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2c. &lt;a href="#2c"&gt;States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs; of the Recommendations&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2d. &lt;a href="#2d"&gt;States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2e. &lt;a href="#2e"&gt;States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2f. &lt;a href="#2f"&gt;A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2g. &lt;a href="#2g"&gt;States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2h. &lt;a href="#2h"&gt;States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating from their territory, taking into account due regard for sovereignty&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2i. &lt;a href="#2i"&gt;States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2j. &lt;a href="#2j"&gt;States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2k. &lt;a href="#2k"&gt;States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cyber security incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;3. &lt;a href="#3"&gt;Conclusion&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3 id="1"&gt;1. Introduction&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Cyberspace&lt;a name="_ftnref1" href="#_ftn1"&gt;[1]&lt;/a&gt; touches every aspect of our lives, has enormous benefits, but is also accompanied by a number of risks. The international community at large has realized that cyberspace can be made stable and secure only through international cooperation. 	Traditionally, though there are a number of bilateral agreements and forms of cooperation the foundation of this cooperation has been the international law and the principles of the Charter of the United Nations.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;To this end, on December 27, 2013 the United Nations General Assembly adopted Resolution No. 68/243 requesting the" &lt;em&gt; Secretary General, with the assistance of a group of governmental experts,…… to continue to study, with a view to promoting common understandings, existing and potential threats in the sphere of information security and possible cooperative measures to address them, including 		norms, rules or principles of responsible behaviour of States and confidence-building measures, the issues of the use of information and communications technologies in conflicts and how international law applies to the use of information and communications technologies by States……. and to submit to the General Assembly at its seventieth session a report on the results of the study.&lt;/em&gt; "In pursuance of this resolution the Secretary General established a Group of Experts on Developments in the Field of Information and Telecommunications in the Context of International Security; the report was agreed upon by the Group of Experts in June, 2015. On 23 December 2015, the UN General Assembly unanimously adopted resolution 70/237&lt;a name="_ftnref2" href="#_ftn2"&gt;[2]&lt;/a&gt; which welcomed the outcome of the Group of Experts and requested the Secretary-General to establish a new GGE that would report to the General Assembly in 2017.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The report developed by governmental experts from 20 States addresses existing and emerging threats from uses of ICTs, by States and non-State actors alike. These threats have the potential to jeopardize international peace and security. The experts gave recommendations which have built on consensus 	reports issued in 2010 and 2013, and offer ideas on norm-setting, confidence-building, capacity-building and the application of international law for the use of ICTs by States. Among other recommendations, the Report lays down recommendations for States for voluntary, non-binding norms, rules or principles of responsible behaviour to promote an open, secure, stable, accessible and peaceful ICT environment.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As larger international dialogues around cross border sharing of information and cooperation for cyber security purposes take place between the US and EU, it is critical that India begin to participate in these discussions.&lt;a name="_ftnref3" href="#_ftn3"&gt;[3]&lt;/a&gt; It is also necessary to take 	cognizance of the importance of implementing internal practices and policies that are recognized and set strong standards at the international level.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This paper marks the beginning of a series of questions we will be asking and processes we will be analysing with the aim of understanding the role of international cooperation for cyber security and the interplay between privacy and security. The report analyses the existing norms in India in the backdrop of the recommendations in the Report of Experts to discover how interoperable Indian law and policy is vis-à-vis the recommendations made in this report as well as making recommendations towards ways India can enhance national policies, practices, and approaches to enable greater collaboration at the international level with respect to issues concerning ICTs and security.&lt;/p&gt;
&lt;h3 id="2"&gt;2. Analysis of the Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Group of Experts took into account existing and emerging threats, risks and vulnerabilities, in the field of ICT and offered the following 	recommendations for consideration by States for voluntary, non-binding norms, rules or principles of responsible behaviour.&lt;/p&gt;
&lt;h4 id="2a"&gt;2a. Consistent with the purposes of the United Nations, including to maintain international peace and security, States should cooperate in developing and applying measures to increase stability and security in the use of ICTs and to prevent ICT practices that are acknowledged to be harmful or that may pose threats to international peace and security&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;1. India has been working with a number of countries such as Belarus, Canada, China, Egypt, and France on a number of ICT-related isues thereby increasing international cooperation in the ICT sector, such as:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(i) setting up the India-Belarus Digital Learning Centre (DLC-ICT) to promote&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;development of ICT in Belarus;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(ii) sending an official business delegation to Canada to attend the 2&lt;sup&gt;nd&lt;/sup&gt;Joint Working Group meeting in ICTE;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iii) holding Joint Working Groups on ICT with China.&lt;a name="_ftnref4" href="#_ftn4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from this, most of the cooperation with other countries is currently government to government (or government institution to government 	institution) cooperation. However, it must be noted that the entire digital revolution, including ICT necessarily involves ICT companies, and thus the role 	of the private sector in participating in these negotiations as well as the responsibilities of private sector ICT companies in cross border cooperation. 	Furthermore, the above examples are a few of the many agreements, Memoranda of Understanding (MOU), and negotiations that India has with other countries on 	cross border cooperation. It is important that, to the extent possible, these negotiations and transparent and easily publicly available.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;2. The primary legislation governing ICT in India is the Information Technology Act, 2000 ("IT Act") which was passed to provide legal recognition for the 	transactions carried out by means of electronic data interchange and other means of electronic communication. The IT Act contains a number of provisions 	that declare illegal activities that threatenICT infrastructure, data, and individuals as illegal and provide for penalties for the same. These activities 	are:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 43 - &lt;/strong&gt; &lt;em&gt;Penalty and Compensation for damage to computer, computer system, etc.: &lt;/em&gt; If any person without permission: (i) accesses a computer, computer system or network; (ii) downloads, copies or extracts any data from such computer, 	computer system or network; (iii) introduces any computer contaminant or computer virus into, destroys, deletes or alters any information on, damages or 	disrupts any computer, computer system or network; (iv) denies or causes the denial of access to any computer, computer system or network by any means; (v) 	helps any person to access a computer, computer system or network in contravention of the Act; (vi) charges the services availed of by a person to the 	account of another person through manipulation; or (vii) Steals, conceals, destroys or alters or causes any person to steal, conceal, destroy or alter any 	computer source code used for a computer resource with an intention to cause damage, he shall be liable to pay damages by way of compensation to the person 	so affected.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66 &lt;/strong&gt; &lt;em&gt;- Computer Related Offences: &lt;/em&gt; If any person, dishonestly, or fraudulently, does any act referred to in section 43, he shall be punishable with imprisonment for a term which may extend 	to two three years or with fine which may extend to Rs. 5,00,000/- or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66B &lt;/strong&gt; &lt;em&gt;- Punishment for dishonestly receiving stolen computer resource or communication device:&lt;/em&gt; Whoever dishonestly receives or retains any stolen computer resource or communication device knowing or having reason to believe the same to be stolen 	computer resource or communication device, shall be punished with imprisonment of either description for a term which may extend to three years or with 	fine which may extend to Rs. 1,00,000/- or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66C - &lt;/strong&gt; &lt;em&gt;Punishment for identity theft:&lt;/em&gt; Whoever, fraudulently or dishonestly make use of the electronic signature, password or any other unique identification feature of any other person, shall 	be punished with imprisonment of either description for a term which may extend to three years and shall also be liable to fine which may extend to rupees 	one lakh.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66D - &lt;/strong&gt; &lt;em&gt;Punishment for cheating by personation by using computer resource:&lt;/em&gt; Whoever, by means of any communication device or computer resource cheats by personation, shall be punished with imprisonment of either description for a 	term which may extend to three years and shall also be liable to fine which may extend to Rs. 1,00,000/-.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66E - &lt;/strong&gt; &lt;em&gt;Punishment for violation of privacy:&lt;/em&gt; Whoever, intentionally or knowingly captures, publishes or transmits the image of a private area of any person without his or her consent, under 	circumstances violating the privacy of that person, shall be punished with imprisonment which may extend to three years or with fine not exceeding Rs. 	2,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 66F - &lt;/strong&gt; &lt;em&gt;Punishment for cyber terrorism:&lt;/em&gt; (1) Whoever,- (A) with intent to threaten the unity, integrity, security or sovereignty of India or to strike terror in the people or any section of the 	people by -&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Denying or cause the denial of access to computer resource; or&lt;/li&gt;
&lt;li&gt;Attempting to penetrate a computer resource; or&lt;/li&gt;
&lt;li&gt;Introducing or causing to introduce any computer contaminant and by means of such conduct causes or is likely to cause death or injuries to persons 	or damage to or destruction of property or disrupts or knowing that it is likely to cause damage or disruption of supplies or services essential to the 	life of the community or adversely affect the critical information infrastructure, or&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;(B) knowingly or intentionally penetrates a computer resource and by by doing so obtains access to information that is restricted for reasons of the 	security of the State or foreign relations; or any restricted information with reasons to believe that such information may be used to cause or likely to 	cause injury to the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, 	decency or morality, or in relation to contempt of court, defamation or incitement to an offence, or to the advantage of any foreign nation, group of 	individuals or otherwise, commits the offence of cyber terrorism.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(2) Whoever commits or conspires to commit cyber terrorism shall be punishable with imprisonment which may extend to imprisonment for life.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; Section 67 - &lt;/strong&gt; &lt;em&gt;Publishing of information which is obscene in electronic form:&lt;/em&gt; Whoever publishes or transmits in the electronic form, any material which is lascivious or appeals to the prurient interest or if its effect is such as to 	tend to deprave and corrupt persons, shall be punished on first conviction with a maximum imprisonment upto 2 years and a maximum fine upto Rs. 5,00,000 	and for a second or subsequent conviction with a maximum imprisonment upto 5 years and also a maximum with fine upto Rs. 10,00,000.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; Section 67A - &lt;/strong&gt; &lt;em&gt;Punishment for publishing or transmitting of material containing sexually explicit act, etc. in electronic form:&lt;/em&gt; Whoever publishes or transmits in the electronic form any material which contains sexually explicit act or conduct shall be punished on 1st conviction with 	a maximum imprisonment for 5 years and a maximum fine of upto Rs. 10,00,000 and for a 2nd or subsequent conviction with a maximum imprisonment of 7 years 	and a maximum fine upto Rs. 10,00,000.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 67B - &lt;/strong&gt; &lt;em&gt;Punishment for publishing or transmitting of material depicting children in sexually explicit act, etc. in electronic form: &lt;/em&gt; Whoever,- (a) publishes or transmits material in any electronic form which depicts children engaged in sexually explicit act or conduct; or (b) creates 	text or digital images, collects, seeks, browses, downloads, advertises, promotes, exchanges or distributes material in any electronic form depicting 	children in obscene or indecent or sexually explicit manner; or (c) cultivates, entices or induces children to online relationship with one or more 	children for and on sexually explicit act or in a manner that may offend a reasonable adult on the computer resource; or (d) facilitates abusing children 	online; or (e) records in any electronic form own abuse or that of others pertaining to sexually explicit act with children, shall be punished on first conviction with a maximum imprisonment upto 5 years and a maximum fine upto Rs. 10,00,000 and in the event of a 2nd or 	subsequent conviction with a maximum imprisonment upto 7 years and also a maximum fine upto Rs. 10,00,000.&lt;a name="_ftnref5" href="#_ftn5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 72 - &lt;/strong&gt; &lt;em&gt;Breach of confidentiality and privacy: &lt;/em&gt; Any person who, in pursuance of any of the powers conferred under this Act, has secured access to any electronic record, book, register, correspondence, 	information, document or other material without the consent of the person concerned discloses the same to any other person shall be punished with 	imprisonment for a term which may extend to two years, or with fine which may extend to Rs. 1,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 72-A - &lt;/strong&gt; &lt;em&gt;Punishment for Disclosure of information in breach of lawful contract:&lt;/em&gt; Any person including an intermediary who, while providing services under the terms of lawful contract, has secured access to any material containing 	personal information about another person, with the intent to cause or knowing that he is likely to cause wrongful loss or wrongful gain discloses such 	material to any other person shall be punished with imprisonment for a term which may extend to three years, or with a fine which may extend to Rs. 	5,00,000 or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;3. The broad language and wide terminology used IT Act seems to cover most of the cyber crimes faced in India as of now, though the technical abilities to 	prevent the crimes still leave a lot to be desired. The prevention of cyber crime is not the domain of the IT Act and is rather the responsibility of the 	law enforcement authorities (note: there is no specific authority created under the IT Act, the Act is enforced by the police and other law enforcement 	authorities). That said, it may be a useful exercise to briefly compare these provisions with the crimes mentioned in the Convention on Cybercrime, 2001 	(Budapest Convention), an international treaty that seeks to addresses threats in cyber space by promoting the harmonization of national laws and 	cooperation across jurisdictions, to examine if there are any that are not covered by the IT Act. A comparison of the principles in Budapest Convention and 	the IT Act is below:&lt;/p&gt;
&lt;table style="text-align: justify;" class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;S. No.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article of the Budapest Convention&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Provisions of the IT Act which cover the same&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 2 - Illegal Access&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 43(a) read with Section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 3 - Illegal Interception&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 69 of the IT Act read with section 45 as well as Section 24 of the Telegraph Act, 1885&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;3&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 4 - Data interference&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sections 43(d) and 43(f) read with section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;4&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 5 - System interference&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Sections 43(d), (e) and (f) read with section 66&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;5&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 6 - Misuse of devices&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Not specifically covered&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;6&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 7 - Computer related forgery&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Computer related forgery is not specifically covered, but it is possible that when such a case comes to light, the provisions of Section 43 					read with section 66 as well as provisions of the Indian Penal Code, 1860 would be pressed into service to cover such crimes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;7&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 8 - Computer related fraud&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;While not specifically covered by the IT Act, it is possible that when such a case comes to light, the provisions of Section 43 read with 					section 66 as well as provisions of the Indian Penal Code, 1860 would be pressed into service to cover such crimes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;8&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Article 9 - Offences relating to child pornography&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Section 67B&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from the above discussion, most of the criminal acts elucidated in the Budapest Convention are covered under the IT Act except for the 	provision on misuse of devices, which requires the production, dealing, trading, etc. in devices whose sole objective is to violate the provisions of the 	IT Act, though it is possible that provisions of the Indian Penal Code, 1860 dealing with conspiracy and aiding and abetment may be pressed into service to 	cover such incidents.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;4. Further, there are a number of laws which deal with critical infrastructure in India, however since these are mostly sectoral laws dealing with specific 	infrastructure sectors, the one most relevant to ICT is the Telegraph Act, 1885, which makes it illegal to interfere with or damage critical telegraph 	infrastructure. The specific penal provisions are listed below:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 23 - &lt;/strong&gt; &lt;em&gt;Intrusion into signal-room, trespass in telegraph office or obstruction: &lt;/em&gt; If any person - (a) without permission of competent authority, enters the signal room of a telegraph office of the Government, or of a person licensed 	under this Act, or (b) enters a fenced enclosure round such a telegraph office in contravention of any rule or notice not to do so, or (c) refuses to quit 	such room or enclosure on being requested to do so by any officer or servant employed therein, or (d) wilfully obstructs or impedes any such officer or 	servant in the performance of his duty, he shall be punished with fine which may extend to Rs. 500.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 24&lt;/strong&gt; - &lt;em&gt;Unlawfully attempting to learn the contents of messages:&lt;/em&gt; If any person does any of the acts mentioned in section 23 with the intention of 	unlawfully learning the contents of any message, or of committing any offence punishable under this Act, he may (in addition to the fine with which he is 	punishable under section 23) be punished with imprisonment for a term which may extend to one year.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 25&lt;/strong&gt; - &lt;em&gt;Intentionally damaging or tampering with telegraphs: &lt;/em&gt;If any person, intending - (a) to prevent or obstruct the transmission or delivery of any 	message, or (b) to intercept or to acquaint himself with the contents of any message, or (c) to commit mischief, damages, removes, tampers with or touches 	any battery, machinery, telegraph line, post or other thing whatever, being part of or used in or about any telegraph or in the working thereof, he shall 	be punished with imprisonment for a term which may extend to three years, or with fine or with both.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Section 25A - &lt;/strong&gt; &lt;em&gt;Injury to or interference with a telegraph line or post: &lt;/em&gt; If, in any case not provided for by section 25, any person deals with any property and thereby wilfully or negligently damages any telegraph line or post 	duly placed on such property in accordance with the provisions of this Act, he shall be liable to pay the telegraph authority such expenses (if any) as may 	be incurred in making good such damage, and shall also, if the telegraphic communication is by reason of the damage so caused interrupted, be punishable 	with a fine which may extend to Rs. 1000:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;5. The telecom service providers in India have to sign a license agreement with the Department of Telecommunications for the right to provide telecom 	services in various parts of India. The telecom regulatory regime in India has gone through a lot of turmoil and evolution and currently any service 	provider wanting to provide telecom services is issued a Unified License (UL) and has to abide by the terms of the UL. Whilst most of the prohibited 	activities under the UL refer to specific terms under the UL itself such as non payment of fees and not fulfilling obligations under the UL, section 38 	provides for certain specific prohibited activities which may be relevant for the ICT sector. These prohibited activities include:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(i) Carrying objectionable, obscene, unauthorized or any other content, messages or communications infringing copyright and intellectual property right 	etc., which may be prohibited by the laws of India;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(ii) Provide tracing facilities to trace nuisance, obnoxious or malicious calls, messages or communications transported through his equipment and network, 	to the authorised government agencies;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iii) Ensuring that the Telecommunication infrastructure or installation thereof, carried out by it, should not become a safety or health hazard and is not 	in contravention of any statute, rule, regulation or public policy;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(iv) not permit any telecom service provider whose license has been revoked to use its services. Where such services are already provided, i.e. 	connectivity already exists, the license is required to immediately sever connectivity immediately.&lt;/p&gt;
&lt;h4 id="2b"&gt;2b. In case of ICT incidents, States should consider all relevant information, including the larger context of the event, the challenges of attribution in the ICT environment and the nature and extent of the consequences&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The Department of Electronics and Information Technology (DEITY) has released the XIIth Five Year Plan on the information technology sector and the report of the Sub-Group on Cyber Security in the plan recognizes that cyber security threats emanate from a wide variety of sources and manifest themselves in disruptive activities that target individuals, businesses, national infrastructure and Governments alike.	&lt;a name="_ftnref6" href="#_ftn6"&gt;[6]&lt;/a&gt; The primary objectives of the plan for securing the country's cyber space are preventing cyber attacks, reducing national vulnerability to cyber attacks, and minimizing damage and recovery time from cyber attacks. The plan takes into account a number of focus areas to achieve its stated objectives, which are described briefly below:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;&lt;em&gt;Enabling Legal Framework&lt;/em&gt; - Setting up think tanks in Public-Private mode to identify gaps in the existing policy and frameworks and take action to address them including addressing the privacy concerns of online users.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Policy, Compliance and Assurance&lt;/em&gt; - Enhancement of IT product security assurance mechanism (Common Criteria security 	test/evaluation, ISO 15408 &amp;amp; Crypto Module Validation Program), establishing a mechanism for national cyber security index leading to national risk 	management framework.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Resarch&amp;amp;Development (R&amp;amp;D)&lt;/em&gt; - Creation of Centres of Excellence in identified areas of advanced Cyber Security R&amp;amp;D and Centre for Technology Transfer to facilitate transition of R&amp;amp;D prototypes to production, supporting R&amp;amp;D projects in thrust areas.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security Incident&lt;/em&gt; - Early Warning and Response - Comprehensive threat assessment and attack mitigation by means of net traffic analysis and deployment of honey pots, development of vulnerability database.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Security awareness, skill development and training&lt;/em&gt; - Launching formal security education, skill building and awareness programs.&lt;/li&gt;
&lt;li&gt;&lt;em&gt;Collaboration&lt;/em&gt; - Establishing a collaborative platform/ think-tank for cyber security policy inputs, discussion and deliberations, operationalisation of security cooperation arrangements with overseas CERTs and industry, and seeking legal cooperation of international agencies on cyber 	crimes and cyber security.&lt;/li&gt;&lt;/ul&gt;
&lt;h4 id="2c"&gt;2c. States should not knowingly allow their territory to be used for internationally wrongful acts using ICTs&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;As mentioned in response to (a) above, the primary legislation in India that deals with information technology and hence ICT as well is the Information 	Technology Act, 2000. The IT Act contains a number of penal provisions which make it illegal to indulge in a number of practices such as hacking, online fraud, etc. which have been recognised internationally as wrongful acts using ICT (	&lt;em&gt;Please refer to answer under section (a) above for details of the penal provisions&lt;/em&gt;). Further section 1(2) of the IT Act provides that it also 	applies to any offence or contravention hereunder committed outside India by any person. This means that the IT Act also covers internationally wrongful acts using ICTs.&lt;/p&gt;
&lt;h4 id="2d"&gt;2d. States should consider how best to cooperate to exchange information, assist each other, prosecute terrorist and criminal use of ICTs and implement other cooperative measures to address such threats. States may need to consider whether new measures need to be developed in this respect&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There are a number of ways in which states can share information by using widely accepted formal processes precisely for this purpose. Some of the most 	common methods of international exchange used by India are given below.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;MLATs&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although the exact process by which intelligence agencies in India share information with other agencies internationally is unclear, India is a member of Interpol and the Central Bureau of Investigation, which is a Federal/Central investigating agency functioning under the Central Government, Department of Personnel &amp;amp; Training and is designated as the National Central Bureau of India. A very useful tool in the effort to establish cross-border cooperation is Mutual Legal Assistance Treaties (MLATs). MLATs are extremely important for law enforcement agencies, governments and the private sector, since they act as formal mechanisms for access to data which falls under different jurisdictions. India currently has MLATs with the following 39 countries &lt;a name="_ftnref7" href="#_ftn7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Although MLATs are considered to be a useful mechanism to ensure international cooperation, there are certain criticisms of the MLAT mechanism, such as:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;The Lack of Clear Time Tables:&lt;/strong&gt; Although MLATs do provide for broad time frames, they do not provide for more specific time tables and usually do not have any provision for an expedited process, for eg. it is believed that for requests to the U.S., processing can take from six weeks (for requests with minimal issues complying with U.S. legal standards) to 10 months.&lt;a name="_ftnref8" href="#_ftn8"&gt;[8]&lt;/a&gt; Such a long time frame is clearly a burden on the investigation process and has been criticised for being ineffectual as they may not provide information fast enough;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Variation in Legal Standards:&lt;/strong&gt; The legal standards for requesting information, for eg. the circumstances under which information can be requested or what information can be requested, differ from jurisdiction to jurisdiction. These differences are often not understood by requesting nations thus causing problems in accessing information;&lt;a name="_ftnref9" href="#_ftn9"&gt;[9]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Inefficient Legal Process:&lt;/strong&gt; The legal process to carry out requests through the MLAT process is often considered too cumbersome and inefficient.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Non-incorporation of Technological Challenges:&lt;/strong&gt; MLATs have not been updated to meet the challenges brought about by technology, especially with the advent of networked infrastructure and ICT which raise issues of attribution and cross-jurisdictional access to information. &lt;a name="_ftnref10" href="#_ftn10"&gt;[10]&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Extradition&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Extradition generally refers to the surrender of an alleged or convicted criminal by one State to another. More precisely, it may be defined as the process 	by which one State upon the request of another surrenders to the latter a person found within its jurisdiction for trial 	&lt;s&gt; and punishment &lt;/s&gt; or, if he has been already convicted, only for punishment, on account of a crime punishable by the laws of the requesting State and committed outside the 	territory of the requested State. Extradition plays an important role in the international battle against crime and owes its existence to the so-called 	principle of territoriality of criminal law, according to which a State will not apply its penal statutes to acts committed outside its own boundaries 	except where the protection of special national interests is at stake. India currently has extradition treaties with 37 countries and extradition 	arrangements with an additional 8 countries.&lt;a name="_ftnref11" href="#_ftn11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;Letters Rogatory&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A Letter Rogatory is a formal communication in writing sent by the Court in which an action is pending to a foreign court or Judge requesting that the 	testimony of a witness residing within the jurisdiction of that foreign court be formally taken under its direction and transmitted to the issuing court 	making the request for use in a pending legal contest or action. This request entirely depends upon the comity of courts towards each other and usages of 	the court of another nation.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Apart from the above methods, India also regularly signs Bilateral MoUs with various countries on law enforcement and information sharing specially in 	cases related to terrorism. India also regularly helps and gets helps from Interpol, the International Criminal Police Organisation for purposes of 	investigation, arrests and sharing of information.&lt;a name="_ftnref12" href="#_ftn12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Other than these formal methods states sometimes share information on an informal basis, where the parties help each other purely on the basis of goodwill, 	or sometimes even coercion. A recent example of informal cooperation between the security agencies of India and Nepal, although not in the realm of cyber 	space, was the arrest of YasinBhatkal, leader of the banned organisation Indian Mujahideen (IM) where the Indian security agencies allegedly sought informal help from their Neapaelese counterparts to arrest a person who was wantedhad long been wanted by the Indian security agencies for a long time.	&lt;a name="_ftnref13" href="#_ftn13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the current environment of growing ICT and increased cross-border information sharing between individuals, the role of private companies who carry this 	information has become much more pronounced. This changed dynamic raises new problems, especially because manyin light of thesefact that a number of these 	companies do not have a physical presence in all the countries where they offer services over the internet. This leads to problems for states in terms of 	law enforcement, speciallyespecially if they want information from these companies who do not have an incentive or desire to provide itagainst their will. 	These circumstances lead to a number of prickly situations where states are often frustrated in using legal and formal means and often resort to informal 	pressure to get the companies to agree to data localization requests, encryption/decryption standards and keys, back doors, and other requests. etc., Tthe 	most famous of these in the Indian context being the disagreement/ heated exchange between the Indian government and Canada based Blackberry Limited 	(formerly Research in Motion) for data requests on their Blackberry enterprise platform.&lt;/p&gt;
&lt;h4 id="2e"&gt;2e. States, in ensuring the secure use of ICTs, should respect Human Rights Council resolutions 20/8 and 26/13 on the promotion, protection and enjoyment of human rights on the Internet, as well as General Assembly resolutions 68/167 and 69/166 on the right to privacy in the digital age, to guarantee full respect for human rights, including the right to freedom of expression&lt;/h4&gt;
&lt;p&gt;&lt;strong&gt;Right to Privacy&lt;/strong&gt;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p style="text-align: justify;"&gt;The right to privacy has been recognised as a constitutionally protected fundamental right in India through judicial interpretation of the right to life which is specifically guaranteed under the Constitution of India. Since the right to privacy was read into the constitution by judicial pronouncements, it could be said that the right to privacy in India is a creature of the courts at least in the Indian context. For this reason it may be useful to list out some of the major cases which deal with the right to privacy in India:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;i. &lt;em&gt;Kharak Singh&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;¸&lt;a name="_ftnref14" href="#_ftn14"&gt;[14]&lt;/a&gt; (1962)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. For the first time, the courts recognized the right to privacy as a fundamental right, although in a minority opinion.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. The decision lLocated the right to privacy under both the right to personal liberty as well as freedom of movement.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;ii. &lt;em&gt;Govind&lt;/em&gt; v. &lt;em&gt;State of M.P.&lt;/em&gt;,&lt;a name="_ftnref15" href="#_ftn15"&gt;[15]&lt;/a&gt; (1975)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Adopted the minority opinion of &lt;em&gt;Kharak Singh &lt;/em&gt;as the opinion of the Supreme Court and held that the right to privacy is a fundamental right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. An individual deDerivesd the right to privacy from both the right to life and personal liberty as well as freedom of speech and movement.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. The right to privacy was said to encompass and protect the personal intimacies of the home, the family marriage, motherhood, procreation and child 	rearing.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;d. The court established that the rRight to privacy can be violated in the following circumstances (i) important countervailing interest which is superior, 	(ii) compelling state interest test, and (iii) compelling public interest.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;iii. &lt;em&gt;R. Rajagopal&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;,&lt;a name="_ftnref16" href="#_ftn16"&gt;[16]&lt;/a&gt; (1994)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Recognised that the rRight to privacy is a part of the right to personal liberty guaranteed under the constitution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Recognizeds that the right to privacy can be both a tort (actionable claim) as well as a fundamental right.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. Established that aA citizen has a right to safeguard the privacy of his own, his family, marriage, procreation, motherhood, child-bearing and education 	among other matters and nobody can publish anything regarding the same unless (i) he consents or voluntarily thrusts himself into controversy, (ii) the 	publication is made using material which is in public records (except for cases of rape, kidnapping and abduction), or (iii) he is a public servant and the matter relates to their discharge of official duties.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;iv. &lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;,&lt;a name="_ftnref17" href="#_ftn17"&gt;[17]&lt;/a&gt; (1996)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Extended the right to privacy to include communications privacy..&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Laid down guidelines which form the backbone for checks and balances in interception provisions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;v. &lt;em&gt;District Registrar and Collector, Hyderabad and another&lt;/em&gt; v. &lt;em&gt;Canara Bank and another&lt;/em&gt;,	&lt;a name="_ftnref18" href="#_ftn18"&gt;[18]&lt;/a&gt; (2004)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. Refers to personal liberty, freedom of expression and freedom of movement as the fundamental rights which give rise to the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. The rRight to privacy deals with persons and not places.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;c. Intrusion into privacy may be by - (1) legislative provisions, (2) administrative/executive orders and (3) judicial orders.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;vi. &lt;em&gt;Selvi and others&lt;/em&gt; v. &lt;em&gt;State of Karnataka and others&lt;/em&gt;,&lt;a name="_ftnref19" href="#_ftn19"&gt;[19]&lt;/a&gt; (2010)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;a. The Court acknowledged the distinction between bodily/physical privacy and mental privacy&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;b. Subjecting a person to techniques such as narcoanalysis, polygraph examination and the Brain Electrical Activation Profile (BEAP) test without consent violates the subject's mental privacy&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;Although the judgements in the above cases (except for the case of &lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;) were pronounced given in a non telecomnot delivered in a telecommunications context, however the ease with which these principles were applied in the case of	&lt;em&gt;People's Union for Civil Liberties&lt;/em&gt; v. &lt;em&gt;Union of India&lt;/em&gt;, suggests that these principles, where applicable, would be applied even in the context of ICT and are not limited to only the non-digital world.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;It must however be noted that dueDue to some incongruities in the interpretation of the earlier judgments, the Supreme Court has recently referred the 	matter regarding the existence and scope of the right to privacy in India to a larger bench so as to bring clarity regarding the exact scope of the right 	to privacy in Indian law. The very concept that the Constitution of India guarantees a right to privacy was challenged due to an "unresolved contradiction" in judicial pronouncements. This "unresolved contradiction" arose because in the cases of &lt;em&gt;M.P. Sharma &amp;amp; Others v. Satish Chandra &amp;amp; Others&lt;/em&gt;,&lt;a name="_ftnref20" href="#_ftn20"&gt;[20]&lt;/a&gt; and &lt;em&gt;Kharak Singh v. State of U.P. &amp;amp; Others,&lt;/em&gt; &lt;a name="_ftnref21" href="#_ftn21"&gt;[21]&lt;/a&gt;(decided by&lt;em&gt;Eigh&lt;/em&gt;eight&lt;em&gt;t&lt;/em&gt;andsix&lt;em&gt;Six&lt;/em&gt;Judges respectively) the majority judgment of 	the Supreme Court had categorically denied the existence of a right to privacy under the Indian Constitution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;However somehow the later case of Gobind v. &lt;em&gt;State of M.P. and another&lt;/em&gt;,&lt;a name="_ftnref22" href="#_ftn22"&gt;[22]&lt;/a&gt; (which was decided by a two Judge Bench of the Supreme Court) relied upon the opinion given by the minority of two judges in &lt;em&gt;Kharak Singh &lt;/em&gt;to hold that a right to privacy 	does exist and is guaranteed as a fundamental right under the Constitution of India without addressing the fact that this was a minority opinion and that the majority opinion had denied the existeance of the right to privacy. Thereafter a large number of cases have held the right to privacy to be a fundamental right, the most important of which are &lt;em&gt;R. Rajagopal&amp;amp; Another &lt;/em&gt;v. &lt;em&gt;State of Tamil Nadu &amp;amp; Others&lt;/em&gt;,&lt;a name="_ftnref23" href="#_ftn23"&gt;[23]&lt;/a&gt; (popularly known as &lt;em&gt;Auto Shanker's case&lt;/em&gt;) and	&lt;em&gt;People's Union for Civil Liberties (PUCL) &lt;/em&gt;v. &lt;em&gt;Union of India &amp;amp; Another&lt;/em&gt;.&lt;a name="_ftnref24" href="#_ftn24"&gt;[24]&lt;/a&gt; However, as was noticed by the Supreme Court in its August 11, 2015 order, all these judgments were decided by two or three Judges only which could not have overturned the judgments given by larger benches.&lt;a name="_ftnref25" href="#_ftn25"&gt;[25]&lt;/a&gt; It was to resolve this judicial incongruity that the Supreme Court referred this issue to a larger bench to decide on the existence and scope of the right to privacy in India.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&lt;strong&gt;Freedom of Expression&lt;/strong&gt;&lt;/p&gt;
&lt;ol start="4"&gt;&lt;li&gt;
&lt;p style="text-align: justify;"&gt;Freedom of expression is one of the most important fundamental rights guaranteed under the constitution and has been vehemently protected by the judiciary on a number of occasions whenever it has been threatened. With the advent of social media, the entire dynamics of the freedom of speech and expression have changed in that it is now possible for every individual, with an internet connection and a Facebook/Twitter/Whatsapp account to reach millions of people without spending any extra money. This ability to reach a much larger and wider audience also led to greater friction between people holding different opinions. As the ease of the internet removed the otherwise filtering effects of geography and made it easier for people to communicate with each other, the advent of social media made it easier for them to communicate with a larger number of people at the same time. This ability to communicate within a group also gave rise to "debates" which often turngot ugly, highlighting giving way to concerns of how easy it is to harass people on social media.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;This concern over of harassment led a number of people to call for greater censorship of social media and it was perhaps this concern which gave rise to the biggest challenge to the freedom of speech and expression in the online world, in the form of section 66A of the Information Technology Act, 	2000 which made it an offense to send information which was "grossly offensive" (s.66A(a)) or caused "annoyance" or "inconvenience" while being known to be false (s.66A(c)). This section was used widely seen by Oonline activists, including the Centre for Internet and Society, widely considered this section as a tool for the government to silence those who criticised it. In fact, statistics compiled by the National Crime Records Bureau from 2014 revealed that 	2,402 people, including 29 women, were arrested in 4,192 cases under section 66A which accounted for nearly 60% of all arrests under the IT Act, and 40% of arrests for cyber crimes in 2014. &lt;a name="_ftnref26" href="#_ftn26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p style="text-align: justify;"&gt;The section was finally struck down by the Supreme Court in 2015 in the case of &lt;em&gt;Shreya Singhal&lt;/em&gt;v. &lt;em&gt;Union of India&lt;/em&gt;, &lt;a name="_ftnref27" href="#_ftn27"&gt;[27]&lt;/a&gt; on the ground of being too vague. This decision was seen as a huge victory for the campaign for 	freedom of speech and expression in the virtual world since this section was frequently used by the state (or rather government in power) to muzzle free 	speech against the incumbent government or political leaders. The offending section 66A made it an offence to send any information that was "grossly offensive or has menacing character" or "which he knows to be false, but for the purpose of causing annoyance, inconvenience, danger, obstruction, insult, injury, criminal intimidation, enmity, hatred, or ill will, persistently makes by makinguse of such computer resource or a communication device,". These terms quoted above were held by the Court to be too vague and wide and falling foul of the limited restrictions constitutionally imposed on the freedom of expression. The Supreme Court therefore, and were therefore struck down section 66A by the Supreme Court.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;h4 id="2f"&gt;2f. A State should not conduct or knowingly support ICT activity contrary to its obligations under international law that intentionally damages critical infrastructure or otherwise impairs the use and operation of critical infrastructure to provide services to the public&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;The researchers of this report could not locate any norms in India which address this issue. To the best of their knowledge, India does not support any ICT activity that intentionally damages critical infrastructure or impairs the use and operation of critical infrastructure.&lt;/p&gt;
&lt;h4 id="2g"&gt;2g. States should take appropriate measures to protect their critical infrastructure from ICT threats, taking into account General Assembly resolution 58/199 on the creation of a global culture of cybersecurity and the protection of critical information infrastructures, and other relevant resolutions&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;1. Section 70 of the IT Act gives the government the authority to declare any computer system which directly affects any critical information infrastructure to be a protected system. The term "critical information infrastructure" (CII) is defined in the IT Act "the computer resource, the 	incapacitation or destruction of which, shall have debilitating impact on national security, economy, public health or safety." Once the government declares any computer resource as a protected system it gets the authority to prescribe information security practices for such as system as well as 	identify the persons who are authorised to access such systems. Any person who accesses a protected system in contravention of the provision of Section 70 of the IT Act shall be liable to be imprisoned for a maximum period of 10 years and also pay a fine. Further, section 70A of the IT Act gives the government the power to name a national nodal agency in respect of CII and also prescribe the manner for such agency to perform its duties. In pursuance of the powers under sections 70A the government has designated the National Critical Information Infrastructure Protection Centre (NCIIPC) situated in the JNU campus as the nodal agency &lt;a name="_ftnref28" href="#_ftn28"&gt;[28]&lt;/a&gt;. This agency is a part of and under the administrative control of the National Technical Research Organisation (NTRO) &lt;a name="_ftnref29" href="#_ftn29"&gt;[29].&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;2. The functions and manner of performing such functions by the NCIIPC has been prescribed in the Information Technology (National Critical Information 	Infrastructure Protection Centre and Manner of Performing Functions and Duties) Rules, 2013.&lt;a name="_ftnref30" href="#_ftn30"&gt;[30]&lt;/a&gt; According 	to these Rules the functions of the NCIIPC include, inter alia, (i) the protecting and giving advice to reduce the vulnerabilities of CII against cyber 	terrorism, cyber warfare and other threats; (ii) identification of all critical infrastructure elements so that they can be notified by the government; 	(iii) providing strategic leadership and coherence across the government to respond to cyber security threats against CII; (iv) coordinating, sharing, 	monitoring, analysing and forecasting national level threats to CII for policy guidance, expertiese sharing and situational awareness for early warning 	alerts; (v) assisting in the development of appropriate plans, adoption of standards, sharing best practices and refinining procurement processes for CII; 	(vi) undertaking and funding research and development to innovate future technologies and collaborate with PSUs, academia and international partners for 	protection of CII; (vii) organising training and awareness programmes and development of audit and certification agencies for protection of CII; (viii) 	developing and executing national and international cooperation strategies for protection of CII; (ix) issuing guidelines, advisories and vulnerability 	notes relating to CII and practices, procedures, prevention and responses in consultation with CERT-In and other organisations; (x) exchanging information 	with CERT-In, especially in relation to cyber incidents; and (xi) calling for information and giving directions to critical sectors or persons having a 	critical impact on CII, in the event of any threat to CII.&lt;a name="_ftnref31" href="#_ftn31"&gt;[31]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;3. The NCIIPC had in the year 2013 released (non publicly) Guidelines for the Protection of National Critical Information Infrastructure	&lt;a name="_ftnref32" href="#_ftn32"&gt;[32]&lt;/a&gt; (CII Guidelines) which presented 40forty controls and respective guiding principles for the protection 	of CII. It is expected that these controls and guiding principles will help critical sectors to draw a CII protection roadmap to achieve safe, secure and 	resilient CII for India. The 'Guidelines for forty Critical Controls' is considered by the NCIIPC to be a significant milestone in its efforts for the 	protection of nation's critical information assets. These fort controls can be found in Section 6 (Best Practices, Controls and Guidelines) of the CII 	Guidelines. It must be noted that the CII Guidelines were drafted after taking inputs from a number of stakeholders such as the national Stock Exchange, 	the Airports Authority of India, National Thermal Power Corporation, Reserve Bank of India, Indian Railways, Telecom Regulatory Authority of India, Bharat 	Sanchar Nigam Limited, etc. This exercise of taking inputs from different stakeholders as well as developing a standard of as many as 40forty aspects of 	security seems to suggest that the NCIIPC is taking steps in the right direction.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;4. The Recommendations on Telecommunication Infrastructure Policy issued by the Telecom Regulatory Authority of India in April, 2011 are silent on the 	issue of security of critical information infrastructure.s. However, the National Policy on Information Technology, 2012 (NPIT) does address the issue of 	security of cyber space by saying that the government should make efforts to do the following:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;"9.1 To undertake policy, promotion and enabling actions for compliance to international security best practices and conformity assessment (product, 	process, technology &amp;amp; people) and incentives for compliance.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.2 To promote indigenous development of suitable security techniques &amp;amp; technology through frontier technology research, solution oriented research, 	proof of concept, pilot development etc. and deployment of secure IT products/processes&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.3 To create a culture of cyber security for responsible user behavior &amp;amp; actions including building capacities and awareness campaigns.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;9.4 To create, establish and operate an 'Information Security Assurance Framework'."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;5. The Department of Information and Technology has formed the Computer Emergency Response Term of India (CERT-In) to enhance the security of India's 	Communications and Information Infrastructure through proactive action and effective collaboration. The Information Security Policy on Protection of 	Critical Infrastructure released by the CERT-In considers information recorded, processed or stored in electronic medium as a valuable asset and is geared 	towards protection of such "valuable asset". The policy recognises the importance of critical information infrastructure network and says that any 	disruption of the operation of such networks is likely to have devastating effects. The policy prescribes that personnel with program delivery 	responsibilities should also recognise the importance of security of information resources and their management. Thus Ddue to this recognition of the 	growing networked nature of government as well as critical organisations and the need to have a proper vulnerability analysis as well as effective 	management of information security risks, the Department of Technology prescribes the following information security policy:&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;"In order to reduce the risk of cyber attacks and improve upon the security posture of critical information infrastructure, Government and critical sector 	organizations are required to do the following on priority:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Identify a member of senior management, as Chief Information Security Officer (CISO), knowledgeable in the nature of information security &amp;amp; 	related issues and designate him/her as a 'Point of contact', responsible for coordinating security policy compliance efforts and to regularly interact 	with the Indian Computer Emergency Response Team (CERT-In), Department of Information Technology (DIT), which is the nodal agency for coordinating all 	actions pertaining to cyber security;&lt;/li&gt;
&lt;li&gt;Prepare information security plan and implement the security control measures as per ISI/ISO/IEC 27001: 2005 and other guidelines/standards, as 	appropriate;&lt;/li&gt;
&lt;li&gt;Carry out periodic IT security risk assessments and determine acceptable level of risks, consistent with criticality of business/functional 	requirements, likely impact on business/ functions and achievement of organisational goals/objectives;&lt;/li&gt;
&lt;li&gt;Periodically test and evaluate the adequacy and effectiveness of technical security control measures implemented for IT systems and networks. 	Especially, Test and evaluation may become necessary after each significant change to the IT applications/systems/networks and can include, as appropriate 	the following:&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;➢ Penetration Testing (both announced as well as unannounced)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Vulnerability Assessment&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Application Security Testing&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;➢ Web Security Testing&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Carry out Audit of Information infrastructure on an annual basis and when there is major upgradation/change in the Information Technology 	Infrastructure, by an independent IT Security Auditing organization;..........&lt;/li&gt;&lt;/ul&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Report to CERT-In the cyber security incidents, as and when they occur and the status of cyber security, periodically."&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;6. The Department of Electronics and Information Technology (DEITY) released the National Policy on Electronics in 2012 which contained the government's 	take on the electronics industry in India. Section 5 of the said policy talks about cCyber sSecurity and states that to create a complete secure cyber 	eco-system in the country, careful and due attention is required for creation of well-d defined technology and systems, use of appropriate technology and 	more importantly development of appropriate products and&amp;amp; solutions. The priorities for action should be suitable design and development of indigenous 	appropriate products through frontier technology/product oriented research, testing and&amp;amp; validation of security of products meeting the protection 	profile requirements needed to secure the ICT infrastructure and cyber space of the country.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;7. In addition the CERT-In has issued an Information Security Management Implementation Guide for Government Organisations.	&lt;a name="_ftnref33" href="#_ftn33"&gt;[33]&lt;/a&gt; CERT-In has also prescribed progressive steps for implementation of Information Security Management 	System in Government &amp;amp; Critical Sectors as per ISO 27001. The steps prescribed are as follows:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Identification of a Point-of-Contact (POC) / Chief Information Security Officer (CISO) for coordinating information security policy implementation 	efforts and communication with CERT-In&lt;/li&gt;
&lt;li&gt;Information Security Awareness Programme&lt;/li&gt;
&lt;li&gt;Determination of general Risk environment of the organization (low / medium / hHigh) depending on the nature of web and&amp;amp; networking environment, 	criticality of business functions and impact of information security incidents on the organization, business activities, assets / resources and individuals&lt;/li&gt;
&lt;li&gt;Status appraisal and gap analysis against ISO 27001 based best information security practices&lt;/li&gt;
&lt;li&gt;Risk assessment covering evaluation of threat perception and technical and &amp;amp;operational vulnerabilities&lt;/li&gt;
&lt;li&gt;Comprehensive risk mitigation plan including selection of appropriate information security controls as per ISO 27001 based best information security 	practices&lt;/li&gt;
&lt;li&gt;Documentation of agreed information security control measures in the form of information security policy manual, procedure manual and work 	instructions&lt;/li&gt;
&lt;li&gt;Implementation of information security control measures (Managerial, Technical and&amp;amp; operational)&lt;/li&gt;
&lt;li&gt;Testing &amp;amp; evaluation of technical information security control measures for their adequacy &amp;amp; effectiveness and audit of IT 	applications/systems/networks by an independent information security auditing organization (penetration testing, vulnerability assessment, application 	security testing, web security testing, LAN audits, etc)&lt;/li&gt;
&lt;li&gt;Information Security Management assessment and certification against ISO 27001 standard, preferably by an independent &amp;amp; accredited organization&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;8. The Unified License for providing various telecommunication services also discusses contains certain terms which talk about how to engagedeal with 	telecommunication infrastructure in light of national security, which include the following recommendations:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Providing necessary facilities to the Government to counteract espionage, subversive act, sabotage or any other unlawful activity;&lt;/li&gt;
&lt;li&gt;Giving full access to its network and equipment to the authorised persons for technical scrutiny and inspection;&lt;/li&gt;
&lt;li&gt;Obtaininggettting security clearance for all foreign nationals deployed on for installation, operation and maintenance of the network;&lt;/li&gt;
&lt;li&gt;Being completely responsible for the security of its network and having organizational policy on security and security management of its network 	including Network forensics, Network Hardening, Network penetration test, Risk assessment;&lt;/li&gt;
&lt;li&gt;Auditing its network or getting the network audited from security point of view once in a financial year from a network audit and certification 	agency;&lt;/li&gt;
&lt;li&gt;Inducting only those network elements into its telecommunications network, which have been got tested according tos per relevant contemporary Indian 	or International Security Standards;&lt;/li&gt;
&lt;li&gt;Including all contemporary security related features (including communication security) as prescribed under relevant security standards while 	procuring the equipment and implementing all such contemporary features into the network;&lt;/li&gt;
&lt;li&gt;Keeping requisite records of operations in the network;&lt;/li&gt;
&lt;li&gt;Monitoring of all intrusions, attacks and frauds on his technical facilities and provide reports on the same to the Licensor.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Further statutory restrictions on tampering critical infrastructure are already contained in the Telegraph Act and have been discussed above, though the 	penalties provided may need to be increased if they are to act as a deterrent in this age where the stakes are much higher.&lt;/p&gt;
&lt;h4 id="2h"&gt;2h. States should respond to appropriate requests for assistance by another State whose critical infrastructure is subject to malicious ICT acts. States should also respond to appropriate requests to mitigate malicious ICT activity aimed at the critical infrastructure of another State emanating 	from their territory, taking into account due regard for sovereignty&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There is yet to be a publicly acknowledged request from a foreign government asking the Indian government to take steps to prevent malicious ICT acts originating from its territory.&lt;/p&gt;
&lt;h4 id="2i"&gt;2i. States should take reasonable steps to ensure the integrity of the supply chain so that end users can have confidence in the security of ICT products. States should seek to prevent the proliferation of malicious ICT tools and techniques and the use of harmful hidden functions;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Section 4 of the National Electronics Policy, 2012 talks about "Developing and Mandating Standards" and says that in order to curb the inflow of sub-standard and unsafe electronic products the government should mandate technical and safety standards which conform to international standards and do the following:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Develop Indian standards to meet specific Indian conditions including climatic, power supply, and handling and other conditions etc., by suitably reviewing existing standards.&lt;/li&gt;
&lt;li&gt;Mandate technical standards in the interest of public health and safety.&lt;/li&gt;
&lt;li&gt;Set up an institutional mechanism within Department of Information Technology for mandating compliance to standards for electronics products.&lt;/li&gt;
&lt;li&gt;Develop a National Policy Framework for enforcement and use of Standards and Quality Management Processes.&lt;/li&gt;
&lt;li&gt;Strengthen the lab infrastructure for testing of electronic products and encouraging development of conformity assessment infrastructure by private 	participation.&lt;/li&gt;
&lt;li&gt;Create awareness amongst consumers against sub-standard and spurious electronic products.&lt;/li&gt;
&lt;li&gt;Build capacity within the Government and public sector for developing and mandating standards.&lt;/li&gt;
&lt;li&gt;Actively participate in the international development of standards in the Electronic System Design and Manufacturing sector.&lt;/li&gt;&lt;/ul&gt;
&lt;/h4&gt;
&lt;h4 id="2j"&gt;2j. States should encourage responsible reporting of ICT vulnerabilities and share associated information on available remedies to such vulnerabilities to limit and possibly eliminate potential threats to ICTs and ICT-dependent infrastructure&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;Under section 70B of the IT Act, India has established a Computer Emergency Response Team (CERT-In) to serve as the national agency for incident responses. The functions mandated to be performed by CERT-In as per the IT Act are:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Collection, analysis and dissemination of information on cyber incidents;&lt;/li&gt;
&lt;li&gt;Forecasting and alerts of cyber security incidents;&lt;/li&gt;
&lt;li&gt;Emergency measures for handling cyber security incidents;&lt;/li&gt;
&lt;li&gt;Coordination of cyber incidents response activities;&lt;/li&gt;
&lt;li&gt;Issuing ofe guidelines, advisories, vulnerability notes and white papers relating to information security practices, procedures, prevention, response 	and reporting of cyber incidents;&lt;/li&gt;
&lt;li&gt;Such other functions relating to cyber security as may be prescribed. &lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;CERT-In also publishes information regarding various cyber threats on its websites so as to keep internet users aware of the latest threats in the online world. Such information can be accessed both on the main page of the CERT-In website or under the Advisories section on the website.	&lt;a name="_ftnref34" href="#_ftn34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;h4 id="2k"&gt;2k. States should not conduct or knowingly support activity to harm the information systems of the authorized emergency response teams (sometimes known as computer emergency response teams or cyber security incident response teams) of another State. A State should not use authorized emergency response teams to engage in malicious international activity.&lt;/h4&gt;
&lt;p style="text-align: justify;"&gt;There are no official or public reports of India using its CERT-In to harm the information systems of another state, although it is highly unlikely that any state would publicly acknowledge such activities even if it was indulging in them.&lt;/p&gt;
&lt;h3 id="3"&gt;3. Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As can be seen from the discussion above, the statutory, regulatory and policy regime in India does seem to address most of the cyber security norms in some manner or the other, but these efforts almost always fall short of meeting some of the norms. While the Information Technology Act along with 	the Rules thereunder, as being the umbrella legislation for digital transactions in India, does address some of the issues mentioned above, it does not address some of the problems that arise out of a greater reliance on the internet such as spamming, trolling, and, online harassment, etc. Although some of these acts may be addressed by regular legislation by applying them in the online world however this does not always take into account the unique features and complexities of committing these acts/crimes in the online world.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the area of exchange of information between states, India has entered into a number of MLATs and extradition treaties, and frequently issues Letters of Rogatory. Yet however these mechanisms may not be adequate to address the needs of crime prevention of crimes in the age of ICT, as crime prevention it often requires exchange of information inon r a real time basis which is not possible with the bureaucratic procedures involved in the MLAT process. There 	also needsd to be stronger standards which are applicable to ICT equipment, including imported equipment especially in light of the fact that security 	concerns related to Chinese ICT equipment that from China have been raised quite frequently in the past. There also needs to be a better system of reporting ICT vulnerabilities to CERT-In or other authorized agencies so that mitigation measure can be implemented in time.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;It should be noted that the work of the Group of Experts is not complete since the General Assembly has asked the Secretary General to form a new Group of Experts which would report back to the Secretary General in 2017. It is imperative that the Government of India realise the importance of the work being done by the Group of Experts and take measures to ensure that a representative from India is included in or atleast the comments and concerns of India are 	included and addressed by the Group of Experts. Meanwhile, India can begin by strengthening domestic privacy safeguards, improving transparency and efficiency of relevant policies and processes, and looking towards solutions that respect rights and strengthen security. Brutent force solutions such as demands for back doors, unfair and unreasonable encryption regulation, and data localization requirements will not help propel India forward in international discussions, dialogues, or agreements on cross-border sharing of information. Though the recommendations from the Group of Experts are welcome, beyond a preliminary mention of privacy and freedom of expression, the rights of individuals - and the ways in which these can be protected, various components that go into supporting those rights including redress, transparency, and due process measures - was inadequately addressed.&lt;/p&gt;
&lt;div style="text-align: justify;"&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt; The terms "cyberspace" has been defined in the Oxford English Dictionary as the notional environment in which communication over computer networks 			occurs. Although the scope of this paper is not to discuss the meaning of this term, it was felt that a simple definition of the term would be 			useful to better define the parameters of the discussion.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt; &lt;a href="https://s3.amazonaws.com/unoda-web/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf"&gt; https://s3.amazonaws.com/unoda-web/wp-content/uploads/2016/01/A-RES-70-237-Information-Security.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt; https://www.justsecurity.org/29203/british-searches-america-tremendous-opportunity/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt; &lt;a href="http://deity.gov.in/content/country-wise-status"&gt;http://deity.gov.in/content/country-wise-status&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt; Provided that the provisions of section 67, section 67A and this section does not extend to any book, pamphlet, paper, writing, drawing, painting, 			representation or figure in electronic form-&lt;/p&gt;
&lt;p&gt;(i) The publication of which is proved to be justified as being for the public good on the ground that such book, pamphlet, paper writing, drawing, 			painting, representation or figure is in the interest of science, literature, art or learning or other objects of general concern; or&lt;/p&gt;
&lt;p&gt;(ii) which is kept or used for &lt;em&gt;bona fide&lt;/em&gt; heritage or religious purposes&lt;/p&gt;
&lt;p&gt;Explanation: For the purposes of this section, "children" means a person who has not completed the age of 18 years.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/Plan_Report_on_Cyber_Security.pdf"&gt; http://deity.gov.in/sites/upload_files/dit/files/Plan_Report_on_Cyber_Security.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt; List of the countries is available at &lt;a href="http://cbi.nic.in/interpol/mlats.php"&gt;http://cbi.nic.in/interpol/mlats.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;[8]&lt;/a&gt; &lt;a href="https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society"&gt; https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;[9]&lt;/a&gt; Peter Swire&lt;sup&gt; &lt;/sup&gt;&amp;amp; Justin D. Hemmings, "Re-Engineering the Mutual Legal Assistance Treaty Process",			&lt;a href="http://www.heinz.cmu.edu/~acquisti/SHB2015/Swire.docx"&gt;http://www.heinz.cmu.edu/~acquisti/SHB2015/Swire.docx&lt;/a&gt;, &lt;em&gt;cf. &lt;/em&gt; &lt;a href="https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society"&gt; https://www.lawfareblog.com/mlat-reform-some-thoughts-civil-society &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;[10]&lt;/a&gt; MLATS and International Cooperation for Law Enforcement Purposes, available at 			&lt;a href="http://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf"&gt; http://cis-india.org/internet-governance/blog/presentation-on-mlats.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;[11]&lt;/a&gt; The full list of the countries with which India has agreed an MLAT is available at			&lt;a href="http://cbi.nic.in/interpol/extradition.php"&gt;http://cbi.nic.in/interpol/extradition.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;[12]&lt;/a&gt; &lt;a href="http://cbi.nic.in/interpol/assist.php"&gt;http://cbi.nic.in/interpol/assist.php&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13" href="#_ftnref13"&gt;[13]&lt;/a&gt; &lt;a href="http://www.firstpost.com/india/how-the-police-tracked-and-arrested-im-founder-yasin-bhatkal-1071755.html"&gt; http://www.firstpost.com/india/how-the-police-tracked-and-arrested-im-founder-yasin-bhatkal-1071755.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14" href="#_ftnref14"&gt;[14]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15" href="#_ftnref15"&gt;[15]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16" href="#_ftnref16"&gt;[16]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17" href="#_ftnref17"&gt;[17]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=14584"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=14584&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18" href="#_ftnref18"&gt;[18]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=26571"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=26571&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19" href="#_ftnref19"&gt;[19]&lt;/a&gt; &lt;a href="http://dspace.judis.nic.in/bitstream/123456789/26592/1/36303.pdf"&gt;http://dspace.judis.nic.in/bitstream/123456789/26592/1/36303.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20" href="#_ftnref20"&gt;[20]&lt;/a&gt; AIR 1954 SC 300. In para 18 of the Judgment it was held: "A power of search and seizure is in any system of jurisprudence an overriding power of 			the State for the protection of social security and that power is necessarily regulated by law. When the Constitution makers have thought fit not 			to subject such regulation to constitutional limitations by recognition of a fundamental right to privacy, analogous to the American Fourth 			Amendment, we have no justification to import it, into a totally different fundamental right, by some process of strained construction."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21" href="#_ftnref21"&gt;[21]&lt;/a&gt; AIR 1963 SC 1295. In para 20 of the judgment it was held: "… Nor do we consider that Art. 21 has any relevance in the context as was sought 			to be suggested by learned counsel for the petitioner. As already pointed out, the right of privacy is not a guaranteed right under our 			Constitution and therefore the attempt to ascertain the movement of an individual which is merely a manner in which privacy is invaded is not an 			infringement of a fundamental right guaranteed by Part III."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22" href="#_ftnref22"&gt;[22]&lt;/a&gt; (1975) 2 SCC 148.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23" href="#_ftnref23"&gt;[23]&lt;/a&gt; (1994) 6 SCC 632.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24" href="#_ftnref24"&gt;[24]&lt;/a&gt; (1997) 1 SCC 301.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25" href="#_ftnref25"&gt;[25]&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26" href="#_ftnref26"&gt;[26]&lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/news/hindustan-times-august-20-2015-aloke-tikku-stats-from-2014-reveal-horror-of-scrapped-section-66-a-of-it-act"&gt; http://cis-india.org/internet-governance/news/hindustan-times-august-20-2015-aloke-tikku-stats-from-2014-reveal-horror-of-scrapped-section-66-a-of-it-act &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a name="_ftn27" href="#_ftnref27"&gt;[27]&lt;/a&gt; &lt;a href="http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf"&gt; http://supremecourtofindia.nic.in/FileServer/2015-03-24_1427183283.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a name="_ftn28" href="#_ftnref28"&gt;[28]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/S_O_18(E).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/S_O_18(E).pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a name="_ftn29" href="#_ftnref29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a name="_ftn30" href="#_ftnref30"&gt;[30]&lt;/a&gt; &lt;a href="http://deity.gov.in/sites/upload_files/dit/files/GSR_19(E).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/GSR_19(E).pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a name="_ftn31" href="#_ftnref31"&gt;[31]&lt;/a&gt; Rule 4 of the Information Technology (National Critical Information Infrastructure Protection Centre and Manner of Performing Functions and Duties) 			Rules, 2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a name="_ftn32" href="#_ftnref32"&gt;[32]&lt;/a&gt; Since these Guidelines were not publicly released they are not available on any government website. In this paper we have relied on a version 			available on a private website at 			&lt;a href="http://perry4law.org/cecsrdi/wp-content/uploads/2013/12/Guidelines-For-Protection-Of-National-Critical-Information-Infrastructure.pdf"&gt; http://perry4law.org/cecsrdi/wp-content/uploads/2013/12/Guidelines-For-Protection-Of-National-Critical-Information-Infrastructure.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a name="_ftn33" href="#_ftnref33"&gt;[33]&lt;/a&gt; Available at &lt;a href="http://www.cert-in.org.in/"&gt;http://www.cert-in.org.in/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a name="_ftn34" href="#_ftnref34"&gt;[34]&lt;/a&gt; &lt;a href="http://www.cert-in.org.in/"&gt;http://www.cert-in.org.in/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;h2&gt;List of Acronyms&lt;/h2&gt;
&lt;ul&gt;
&lt;li&gt;&lt;strong&gt;ICTs&lt;/strong&gt; – Information Communication Technologies&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;GGE&lt;/strong&gt; – Group of Experts&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;EU&lt;/strong&gt; – European Union&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DLC-ICT&lt;/strong&gt; – India-Belarus Digital Learning Center&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IT Act&lt;/strong&gt; – Information Technology Act, 2000&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;UL&lt;/strong&gt; - Unified License&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;DEITY&lt;/strong&gt; – Department of Electronics and Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;IT&lt;/strong&gt; – Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;ISO&lt;/strong&gt; – International Organization&amp;nbsp; for Standardisation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CERT&lt;/strong&gt; – Computer Emergency Response Team&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CERT-In&lt;/strong&gt; - Computer Emergency Response Team, India&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;MLAT&lt;/strong&gt; – Mutual Legal Assistance Treaty&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CII&lt;/strong&gt; – Critical Information Infrastructure&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NCIIPC&lt;/strong&gt; - National Critical Information Infrastructure Protection Centre&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NTRO&lt;/strong&gt; - National Technical Research Organisation&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;NPIT&lt;/strong&gt; - National Policy on Information Technology&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;CISO&lt;/strong&gt; - Chief Information Security Officer&lt;/li&gt;&lt;/ul&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india'&gt;https://cis-india.org/internet-governance/blog/analysis-report-experts-information-telecommunications-security-implications-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-08-11T09:58:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india">
    <title>Submitted Comments on the 'Government Open Data Use License - India'</title>
    <link>https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india</link>
    <description>
        &lt;b&gt;The public consultation process of the draft open data license to be used by Government of India has ended yesterday. Here we share the text of the submission by CIS. It was drafted by Anubha Sinha, Pranesh Prakash, and Sumandro Chattapadhyay.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;The following comments on the 'Government Open Data Use License - India' was drafted by Anubha Sinha, Pranesh Prakash, and Sumandro Chattapadhyay, and submitted through the &lt;a href="https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/"&gt;MyGov portal&lt;/a&gt; on July 25, 2016. The original submission can be found &lt;a href="https://www.mygov.in/sites/default/files/mygov_146946521043358971.pdfh"&gt;here&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;I. Preliminary&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;This submission presents comments by the Centre for Internet and Society (“&lt;strong&gt;CIS&lt;/strong&gt;”) &lt;strong&gt;[1]&lt;/strong&gt; on the draft Government Open Data Use License - India (“&lt;strong&gt;the draft licence&lt;/strong&gt;”) &lt;strong&gt;[2]&lt;/strong&gt; by the Department of Legal Affairs.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;This submission is based on the draft licence released on the MyGov portal on June 27, 2016 &lt;strong&gt;[3]&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;CIS commends the Department of Ministry of Law and Justice, Government of India for its efforts at seeking inputs from various stakeholders prior to finalising its open data licence. CIS is thankful for the opportunity to have been a part of the discussion during the framing of the licence; and to provide this submission, in furtherance of the feedback process continuing from the draft licence.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;II. Overview&lt;/h2&gt;
&lt;ol start="4"&gt;
&lt;li&gt;The Centre for Internet and Society is a non-governmental organisation engaged in research and policy work in the areas of, inter alia, access to knowledge and openness. This clause-by-clause submission is consistent with CIS’ commitment to safeguarding general public interest, and the interests and rights of various stakeholders involved. Accordingly, the comments in this submission aim to further these principles and are limited to those clauses that most directly have an impact on them.&lt;/li&gt;&lt;/ol&gt;
&lt;h2&gt;III. Comments and Recommendations&lt;/h2&gt;
&lt;ol start="5"&gt;
&lt;li&gt;&lt;strong&gt;Name of the Licence:&lt;/strong&gt; CIS recommends naming the licence “Open Data Licence - India” to reflect the nomenclature already established for similar licences in other nations like the UK and Canada. More importantly, the inclusion of the word ‘use’ in the original name “Government Open Data Use License” is misleading, since the licence permits use, sharing, modification and redistribution of open data.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Change Language on Permissible Use of Data:&lt;/strong&gt; The draft licence uses the terms “Access, use, adapt, and redistribute,” which are used in UNESCO’s definition of open educational resources, whereas, under the Indian Copyright Act &lt;strong&gt;[4]&lt;/strong&gt;, it should cover “reproduction, issuing of copies,” etc. To resolve this difference, we suggest the following language be used: “Subject to the provisions of section 7, all users are provided a worldwide, royalty-free, non-exclusive licence to all rights covered by copyright and allied rights, for the duration of existence of such copyright and allied rights over the data or information.”&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Add Section on the Scope of Applicability of the Licence:&lt;/strong&gt; It will be useful to inform the user of the licence on its applicability. The section may be drafted as: “This licence is meant for public use, and especially by all Ministries, Departments, Organizations, Agencies, and autonomous bodies of Government of India, when publicly disclosing, either proactively or reactively, data and information created, generated, collected, and managed using public funds provided by Government of India directly or through authorized agencies.”&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Add Sub-Clause Specifying that the Licence is Agnostic of Mode of Access:&lt;/strong&gt; As part of the section 4 of the draft licence, titled ‘Terms and Conditions of Use of Data,’ a sub-clause should be added that specifies that users may enjoy all the freedom granted under this licence irrespective of their preferred mode of access of the data concerned, say manually downloaded from the website, automatically accessed via an API, collected from a third party involved in re-sharing of this data, accessed in physical/printed form, etc.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Add Sub-Clause on Non-Repudiability and Integrity of the Published Data:&lt;/strong&gt; To complement the sub-clause 6.e. that notes that data published under this licence should be published permanently and with appropriate versioning (in case of the published data being updated and/or modified), another sub-clause should be added that states that non-repudiability and integrity of published data must be ensured through application of real/digital signature, as applicable, and checksum, as applicable. This is to ensure that an user who has obtained the data, either in physical or digital form, can effectively identify and verify the the agency that has published the data, and if any parts of the data have been lost/modified in the process of distribution and/or transmission (through technological corruption of data, or otherwise).&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Combine Section 6 on Exemptions and Section 7 on Termination:&lt;/strong&gt; Given that the licence cannot reasonably proscribe access to data that has already been published online, it is suggested that it would be better to simply terminate the application of the licence to that data or information that ought not to have been published for grounds provided under section 8 of the RTI Act, or have been inadvertently published. It should also be noted that section 8 of the RTI Act cannot be “violated” (as stated in Section 6.g. of the draft licence), since it only provides permission for the public authority to withhold information, and does not impose an obligation on them (or anyone else) to do so. The combined clause can read: “Upon determination by the data provider that specific data or information should not have been publicly disclosed for the grounds provided under Section 8 of the Right to Information Act, 2005, the data provider may terminate the applicability of the licence for that data or information, and this termination will have the effect of revocation of all rights provided under Section 3 of this licence.”&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;It will be our pleasure to discuss these submissions with the Department of Legal Affairs in greater detail, supplement these with further submissions if necessary, and offer any other assistance towards the efforts at developing a national open data licence.&lt;/li&gt;&lt;/ol&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="https://www.mygov.in/sites/default/files/mygov_1466767582190667.pdf"&gt;https://www.mygov.in/sites/default/files/mygov_1466767582190667.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/"&gt;https://www.mygov.in/group-issue/public-consultation-government-open-data-use-license-india/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; See: &lt;a href="http://www.copyright.gov.in/Documents/CopyrightRules1957.pdf"&gt;http://www.copyright.gov.in/Documents/CopyrightRules1957.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india'&gt;https://cis-india.org/openness/submitted-comments-on-the-government-open-data-use-license-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Open License</dc:subject>
    
    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>NDSAP</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-07-26T09:23:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data">
    <title>CIS Submission to TRAI Consultation on Free Data</title>
    <link>https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data</link>
    <description>
        &lt;b&gt;The Telecom Regulatory Authority of India (TRAI) held a consultation on Free Data, for which CIS sent in the following comments.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Telecom Regulatory Authority of India (TRAI) asked for &lt;a href="http://trai.gov.in/WriteReadData/ConsultationPaper/Document/CP_07_free_data_consultation.pdf"&gt;public comments on free data&lt;/a&gt;. Below are the comments that CIS submitted to the four questions that it posed.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 id="question-1"&gt;Question 1
&lt;p&gt;&lt;em&gt;Is there a need to have TSP agnostic platform to provide free data or suitable reimbursement to users, without violating the principles of Differential Pricing for Data laid down in TRAI Regulation? Please suggest the most suitable model to achieve the objective.&lt;/em&gt;&lt;/p&gt;
&lt;/h2&gt;
&lt;h3 id="is-there-a-need-for-free-data"&gt;Is There a Need for Free Data?&lt;/h3&gt;
&lt;p&gt;No, there is no &lt;em&gt;need&lt;/em&gt; for free data, just as there is no &lt;em&gt;need&lt;/em&gt; for telephony or Internet. However, making provisions for free data would increase the amount of innovation in the Internet and telecom sector, and there is a good probability that it would lead to faster adoption of the Internet, and thus be beneficial in terms of commerce, freedom of expression, freedom of association, and many other ways.&lt;/p&gt;
&lt;p&gt;Thus the question that a telecom regulator should ask is not whether there is a &lt;em&gt;need&lt;/em&gt; for TSP agnostic platforms, but whether such platforms are harmful for competition, for consumers, and for innovation. The telecom regulator ought not undertake regulation unless there is evidence to show that harm has been caused or that harm is likely to be caused. In short, TRAI should not follow the precautionary principle, since the telecom and Internet sectors are greatly divergent from environmental protection: the burden of proof for showing that something ought to be prohibited ought to be on those calling for prohibition.&lt;/p&gt;
&lt;h3 id="goal-regulating-gatekeeping"&gt;Goal: Regulating Gatekeeping&lt;/h3&gt;
&lt;p&gt;TRAI wouldn’t need to regulate price discrimination or Net neutrality if ISPs were not “gatekeepers” for last-mile access. “Gatekeeping” occurs when a single entity establishes itself as an exclusive route to reach a large number of people and businesses or, in network terms, nodes. It is not possible for Internet services to reach their end customers without passing through ISPs (generally telecom networks). The situation is very different in the middle-mile and for backhaul. Even though anti-competitive terms may exist in the middle-mile, especially given the opacity of terms in “transit agreements”, a packet is usually able to travel through multiple routes if one route is too expensive (even if that is not the shortest network path, and is thus inefficient in a way). However, this multiplicity of routes is generally not possible in the last mile.&lt;a id="fnref1" class="footnoteRef" href="#fn1"&gt;&lt;sup&gt;1&lt;/sup&gt;&lt;/a&gt; This leaves last mile telecom operators (ISPs) in a position to unfairly discriminate between different Internet services or destinations or applications, while harming consumer choice.&lt;/p&gt;
&lt;p&gt;However, the aim of regulation by TRAI cannot be to prevent gatekeeping, since that is not possible as long as there are a limited number of ISPs. For instance, even by the very act of charging money for access to the Internet, ISPs are guilty of “gatekeeping” since they are controlling who can and cannot access an Internet service that way. Instead, the aim of regulation by TRAI should be to “regulate gatekeepers to ensure they do not use their gatekeeping power to unjustly discriminate between similarly situated persons, content or traffic”, as we proposed in our submission to TRAI (on OTTs) last year.&lt;/p&gt;
&lt;h3 id="models-for-free-data"&gt;Models for Free Data&lt;/h3&gt;
&lt;p&gt;There are multiple models possible for free data, none of which TRAI should prohibit unless it would enable OTTs to abuse their gatekeeping powers.&lt;/p&gt;
&lt;h4 id="government-incentives-for-non-differentiated-free-data"&gt;Government Incentives For Non-Differentiated Free Data&lt;/h4&gt;
&lt;p&gt;The government may opt to require all ISPs to provide free Internet to all at a minimum QoS in exchange for exemption from paying part of their USO contributions, or the government may pay ISPs for such access using their USO contributions.&lt;/p&gt;
&lt;p&gt;TRAI should recommend to DoT that it set up a committee to study the feasibility of this model.&lt;/p&gt;
&lt;h4 id="isp-subsidies"&gt;ISP subsidies&lt;/h4&gt;
&lt;p&gt;ISP subsidies of Internet access only make economic sense for the ISP under the following ‘Goldilocks’ condition is met: the experience with the subsidised service is ‘good enough’ for the consumers to want to continue to use such services, but ‘bad enough’ for a large number of them to want to move to unsubsidised, paid access.&lt;/p&gt;
&lt;ol style="list-style-type: decimal;"&gt;
&lt;li&gt;Providing free Internet to all at a low speed.
&lt;ol style="list-style-type: lower-alpha;"&gt;
&lt;li&gt;This naturally discriminates against services and applications such as video streaming, but does not technically bar access to them.&lt;/li&gt;&lt;/ol&gt;
&lt;/li&gt;
&lt;li&gt;Providing free access to the Internet with other restrictions on quality that aren’t discriminatory with respect to content, services, or applications.&lt;/li&gt;&lt;/ol&gt;
&lt;h4 id="rewards-model"&gt;Rewards model&lt;/h4&gt;
&lt;p&gt;A TSP-agnostic rewards platform will only come within the scope of TRAI regulation if the platform has some form of agreement with the TSPs, even if it is collectively. If the rewards platform doesn’t have any agreement with any TSP, then TRAI does not have the power to regulate it. However, if the rewards platform has an agreement with any TSP, it is unclear whether it would be allowed under the Differential Data Tariff Regulation, since the clause 3(2) read with paragraph 30 of the Explanatory Memorandum might disallow such an agreement.&lt;/p&gt;
&lt;p&gt;Assuming for the sake of argument that platforms with such agreements are not disallowed, such platforms can engage in either post-purchase credits or pre-purchase credits, or both. In other words, it could be a situation where a person has to purchase a data pack, engage in some activity relating to the platform (answer surveys, use particular apps, etc.) and thereupon get credit of some form transferred to one’s SIM, or it could be a situation where even without purchasing a data pack, a consumer can earn credits and thereupon use those credits towards data.&lt;/p&gt;
&lt;p&gt;The former kind of rewards platform is not as useful when it comes to encouraging people to use the Internet, since only those who already see worth in using in the Internet (and can afford it) will purchase a data pack in the first place. The second form, on the other hand is quite useful, and could be encouraged. However, this second model is not as easily workable, economically, for fixed line connections, since there is a higher initial investment involved.&lt;/p&gt;
&lt;h4 id="recharge-api"&gt;Recharge API&lt;/h4&gt;
&lt;p&gt;A recharge API could be fashioned in one of two ways: (1) via the operating system on the phone, allowing a TSP or third parties (whether OTTs or other intermediaries) to transfer credit to the SIM card on the phone which have been bought wholesale. Another model could be that of all TSPs providing a recharge API for the use of third parties. Only the second model is likely to result in a “toll-free” experience since in the first model, like in the case of a rewards platform that requires up-front purchase of data packs, there has to be a investment made first before that amount is recouped. This is likely to hamper the utility of such a model.&lt;/p&gt;
&lt;p&gt;Further, in the first case, TRAI would probably not have the powers to regulate such transactions, as there would be no need for any involvement by the TSP. If anti-competitive agreements or abuse of dominant position seems to be taking place, it would be up to the Competition Commission of India to investigate.&lt;/p&gt;
&lt;p&gt;However, the second model would have to be overseen by TRAI to ensure that the recharge APIs don’t impose additional costs on OTTs, or unduly harm competition and innovation. For instance, there ought to be an open specification for such an API, which all the TSPs should use in order to reduce the costs on OTTs. Further, there should be no exclusivity, and no preferential treatment provided for the TSPs sister concerns or partners.&lt;/p&gt;
&lt;h4 id="example-sites"&gt;“0.example” sites&lt;/h4&gt;
&lt;p&gt;Other forms of free data, for instance by TSPs choosing not to charge for low-bandwidth traffic should be allowed, as long as it is not discriminatory, nor does it impose increased barriers to entry for OTTs. For instance, if a website self-certifies that it is low-bandwidth and optimized for Internet-enabled feature phones and uses 0.example.tld to signal this (just as wap.* were used in for WAP sites and m.* are used for mobile-optimized versions of many sites), then there is no reason why TSPs should be prohibited from not charging for the data consumed by such websites, as long as the TSP does so uniformly without discrimination. In such cases, the TSP is not harming competition, harming consumers, nor abusing its gatekeeping powers.&lt;/p&gt;
&lt;h4 id="ott-agnostic-free-data"&gt;OTT-agnostic free data&lt;/h4&gt;
&lt;p&gt;If a TSP decides not to charge for specific forms of traffic (for example, video, or for locally-peered traffic) regardless of the Internet service from which that traffic emanates, as as long as it does so with the end customer’s consent, then there is no question of the TSP harming competition, harming consumers, nor abusing its gatekeeping powers. There is no reason such schemes should be prohibited by TRAI unless they distort markets and harm innovation.&lt;/p&gt;
&lt;h4 id="unified-marketplace"&gt;Unified marketplace&lt;/h4&gt;
&lt;p&gt;One other way to do what is proposed as the “recharge API” model is to create a highly-regulated market where the gatekeeping powers of the ISP are diminished, and the ISP’s ability to leverage its exclusive access over its customers are curtailed. A comparison may be drawn here to the rules that are often set by standard-setting bodies where patents are involved: given that these patents are essential inputs, access to them must be allowed through fair, reasonable, and non-discriminatory licences. Access to the Internet and common carriers like telecom networks, being even more important (since alternatives exist to particular standards, but not to the Internet itself), must be placed at an even higher pedestal and thus even stricter regulation to ensure fair competition.&lt;/p&gt;
&lt;p&gt;A marketplace of this sort would impose some regulatory burdens on TRAI and place burdens on innovations by the ISPs, but a regulated marketplace harms ISP innovation less than not allowing a market at all.&lt;/p&gt;
&lt;p&gt;At a minimum, such a marketplace must ensure non-exclusivity, non-discrimination, and transparency. Thus, at a minimum, a telecom provider cannot discriminate between any OTTs who want similar access to zero-rating. Further, a telecom provider cannot prevent any OTT from zero-rating with any other telecom provider. To ensure that telecom providers are actually following this stipulation, transparency is needed, as a minimum.&lt;/p&gt;
&lt;p&gt;Transparency can take one of two forms: transparency to the regulator alone and transparency to the public. Transparency to the regulator alone would enable OTTs and ISPs to keep the terms of their commercial transactions secret from their competitors, but enable the regulator, upon request, to ensure that this doesn’t lead to anti-competitive practices. This model would increase the burden on the regulator, but would be more palatable to OTTs and ISPs, and more comparable to the wholesale data market where the terms of such agreements are strictly-guarded commercial secrets. On the other hand, requiring transparency to the public would reduce the burden on the regulator, despite coming at a cost of secrecy of commercial terms, and is far more preferable.&lt;/p&gt;
&lt;p&gt;Beyond transparency, a regulation could take the form of insisting on standard rates and terms for all OTT players, with differential usage tiers if need be, to ensure that access is truly non-discriminatory. This is how the market is structured on the retail side.&lt;/p&gt;
&lt;p&gt;Since there are transaction costs in individually approaching each telecom provider for such zero-rating, the market would greatly benefit from a single marketplace where OTTs can come and enter into agreements with multiple telecom providers.&lt;/p&gt;
&lt;p&gt;Even in this model, telecom networks will be charging based not only on the fact of the number of customers they have, but on the basis of them having exclusive routing to those customers. Further, even under the standard-rates based single-market model, a particular zero-rated site may be accessible for free from one network, but not across all networks: unlike the situation with a toll-free number in which no such distinction exists.&lt;/p&gt;
&lt;p&gt;To resolve this, the regulator may propose that if an OTT wishes to engage in paid zero-rating, it will need to do so across all networks, since if it doesn’t there is risk of providing an unfair advantage to one network over another and increasing the gatekeeper effect rather than decreasing it.&lt;/p&gt;
&lt;h2 id="question-2"&gt;Question 2&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Whether such platforms need to be regulated by the TRAI or market be allowed to develop these platforms?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;In many cases, TRAI would have no powers over such platforms, so the question of TRAI regulating does not arise. In all other cases, TRAI can allow the market to develop such platforms, and then see if any of them violates the Discriminatory Data Tariffs Regualation. For government-incentivised schemes that are proposed above, TRAI should take proactive measure in getting their feasibility evaluated.&lt;/p&gt;
&lt;h2 id="question-3"&gt;Question 3&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Whether free data or suitable reimbursement to users should be limited to mobile data users only or could it be extended through technical means to subscribers of fixed line broadband or leased line?&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;Spectrum is naturally a scarce resource, though technological advances (as dictated by Cooper’s Law) and more efficient management of spectrum make it less so. However, we have seen that fixed-line broadband has more or less stagnated for the past many years, while mobile access has increased. So the market distortionary power of fixed-line providers is far less than that of mobile providers. However, competition is far less in fixed-line Internet access services, while it is far higher in mobile Internet access. Switching costs in fixed-line Internet access services are also far higher than in mobile services. Given these differences, the regulation with regard to price discrimination might justifiably be different.&lt;/p&gt;
&lt;p&gt;All in all, for this particular issue, it is unclear why different rules should apply to mobile users and fixed line users.&lt;/p&gt;
&lt;h2 id="question-4"&gt;Question 4&lt;/h2&gt;
&lt;p&gt;&lt;em&gt;Any other issue related to the matter of Consultation.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;None.&lt;/p&gt;
&lt;div class="footnotes"&gt;
&lt;hr /&gt;
&lt;ol&gt;
&lt;li id="fn1"&gt;
&lt;p&gt;In India’s mobile telecom sector, according to a Nielsen study, an estimated 15% of mobile users are multi-SIM users, meaning the “gatekeeping” effect is significantly reduced in both directions: Internet services can reach them via multiple ISPs, and conversely they can reach Internet services via multiple ISPs. &lt;em&gt;See&lt;/em&gt; Nielsen, ‘Telecom Transitions: Tracking the Multi-SIM Phenomena in India’, http://www.nielsen.com/in/en/insights/reports/2015/telecom-transitions-tracking-the-multi-sim-phenomena-in-india.html&lt;a href="#fnref1"&gt;↩&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data'&gt;https://cis-india.org/internet-governance/blog/cis-submission-trai-consultation-free-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>TRAI</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Submissions</dc:subject>
    

   <dc:date>2016-07-01T16:04:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior">
    <title>Submission by the Centre for Internet and Society on Revisions to ICANN Expected Standards of Behavior</title>
    <link>https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior</link>
    <description>
        &lt;b&gt;Prepared by Vidushi Marda, with inputs from Dr. Nirmita Narasimhan and Sunil Abraham.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;We at the Centre for Internet and Society (“CIS”) are grateful for the opportunity to comment on the proposed revisions to ICANN’s Expected Standards of Behavior (“Standards”).&lt;/p&gt;
&lt;p&gt;Before providing specific comments on the proposed revisions, CIS would like to state for the record our extreme disappointment while noting that there is no indication of the intention to draft and adopt a dedicated anti - harassment policy. We are of the firm opinion that harassment, and particularly sexual harassment, is not only a sensitive topic, but also a deeply complex one. Such a policy should consider scope, procedural questions, redressal and remedies in cases of harassment in general and sexual harassment in particular. A mere change in language to these Standards, however well intentioned, cannot go too far in preventing and dealing with cases of harassment in the absence of a framework within which such instances can be addressed.&lt;/p&gt;
&lt;p&gt;Some of the issues that arose at ICANN55 were confusion surrounding the powers and limits of the Ombudsman’s office in dealing with cases of harassment, the exact procedure to be followed for redressal surrounding such incidents, and the appropriate conduct of parties to the matter. There will be no clarity in these respects, even if these proposed changes are to be adopted.&lt;/p&gt;
&lt;p&gt;Specifically, the proposed language is problematic and completely inadequate for the following reasons:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Vague&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;Terms like “professional conduct” and “appropriate behavior” mean little in the absence of a definition that entails such conduct. These terms could mean vastly different things to each community member and such language will only encourage a misalignment of expectation of conduct between community members. The “general” definition of harassment is at best, an ineffective placeholder, as it does not encompass exactly what kind of behavior would fall under its definition.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Fails to consider important scenarios&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The proposed language fails to consider situations where some attempts or advances at communication, sexual or otherwise, occur. For example, consider a situation in which one community member stalks another online, and catalogues his/her every move. This is most certainly foreseeable, but will not be adequately covered by the proposed language. Further, terms like “speech or behavior that is sexually aggressive or intimidates” &amp;nbsp;could or could not include types of speech such as art, music, photography etc, depending on who you ask. It also does not explain the use of the word behavior - physical, emotional, professional, online behavior are all possible, but the scope of this term would depend on the interpretation one chooses to apply. In part 4 below, we will demonstrate how ICANN has applied a far more detailed framework for harassment elsewhere.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Ignores complexity&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;In discussions surrounding the incident at ICANN55, a number of issues of arose. These included, inter alia, the definition of harassment and sexual harassment, what constituted such conduct, the procedure to be followed in such cases, the appropriate forum to deal with such incidents and the conduct that both parties are expected to maintain. These questions cannot, and have not been answered or addressed in the proposed change to the Standards. CIS emphasizes the need to understand this issue as one that must imbibe differences in culture, expectation, power dynamics, and options for redressal. If ICANN is to truly be a safe space, such issues must be substantively and procedurally fair for both the accused and the victim. This proposed definition is woefully inadequate in this regard.&lt;/p&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Superficial understanding of harassment, sexual harassment&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The proposed changes do not define harassment, and sexual harassment in an adequate fashion. The change currently reads, “Generally, harassment is considered unwelcome hostile or intimidating behavior -- in particular, speech or behavior that is sexually aggressive or intimidates based on attributes such as race, gender, ethnicity, religion, age, color, national origin, ancestry, disability or medical condition, sexual orientation, or gender identity.” These are subject to broad interpretation, and we have already highlighted the issues that may arise due to this in 1, above. Here, we would like to point to a far more comprehensive definition.&lt;/p&gt;
&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;ICANN’s own Employment Policy includes within the scope of sexual harassment “verbal, physical and visual conduct that creates an intimidating, offensive or hostile working environment, or interferes with work performance.” The policy also states:&lt;/p&gt;
&lt;blockquote&gt;Harassing conduct can take many forms and includes, but is not limited to, the following:&lt;br /&gt;
&lt;ol&gt;&lt;li&gt;Slurs, jokes, epithets, derogatory comments, statements or gestures;&lt;/li&gt;
&lt;li&gt;Assault, impeding or blocking another’s movement or otherwise physically interfering with normal work;&lt;/li&gt;
&lt;li&gt;Pictures, posters, drawings or cartoons based upon the characteristics mentioned in the first paragraph of this policy.&lt;/li&gt;&lt;/ol&gt;
Sexually harassing conduct includes all of the above prohibited actions, as well as other unwelcome conduct, such as requests for sexual favors, conversation containing sexual comments, and unwelcome sexual advances.”&lt;/blockquote&gt;
&lt;p&gt;This definition is not perfect, it does not comprehensively consider advances or attempts at communication, sexual or otherwise, which are unwelcome by the target. Nonetheless, CIS believes that this is a far more appropriate definition that does not include vague metrics that the proposed changes do. Since it is one ICANN has already adopted, it can act as an important stepping stone towards a comprehensive framework.&lt;/p&gt;
&lt;p&gt;Like ICANN, UNESCO’s organisational approach has been to adopt a comprehensive &lt;a href="http://www.un.org/womenwatch/osagi/UN_system_policies/(UNESCO)Anti-harassment_Policy.pdf"&gt;Anti-Harassment Policy&lt;/a&gt; which lays down details of definition, prevention, complaint procedure, investigations, sanctions, managerial responsibility, etc. Acknowledging the cultural sensitivity of harassment particularly in international situations, the policy also recognizes advances or attempts at communication, sexual or otherwise. Most importantly, it states that for conduct to come within the definition of sexual harassment, it “must be unwelcome, i.e. unsolicited and regarded as offensive or undesirable by the victim.”&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;In conclusion, we would like to reiterate the importance of adopting and drafting a dedicated anti-harassment policy and framework. The benefits of safety, certainty and formal redressal mechanisms in cases of harassment cannot be over emphasized.&lt;/p&gt;
&lt;p&gt;Importantly, such measures have already been taken elsewhere. The IETF has adopted an &lt;a href="http://tools.ietf.org/html/rfc7776"&gt;instrument&lt;/a&gt; to address issues of harassment that occur at meetings, mailing lists and social events. This instrument contemplates in detail, problematic behavior, unacceptable conduct, the scope of the term harassment, etc. It further envisages a framework for redressal of complaints, remediation, and even contemplates issues that may arise with such remediation. It is particularly important to note that while it provides a definition of harassment, it also states that "[a]ny definition of harassment prohibited by an applicable law can be subject to this set of procedures, recognising harassment as a deeply personal and subjective experience, and thus encouraging members to take up issues of harassment as per their cultural norms and national laws, which are then considered as per procedures laid down."&lt;/p&gt;
&lt;p&gt;A similar effort within the ICANN community is critical.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior'&gt;https://cis-india.org/internet-governance/submission-by-the-centre-for-internet-and-society-on-revisions-to-icann-expected-standards-of-behavior&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vidushi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Public Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>ICANN</dc:subject>
    
    
        <dc:subject>IANA Transition</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-06-30T06:07:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities">
    <title>Smart City Policies and Standards: Overview of Projects, Data Policies, and Standards across Five International Smart Cities </title>
    <link>https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities</link>
    <description>
        &lt;b&gt;This blog post aims to review five Smart Cities across the globe, namely Singapore, Dubai, New York City, London and Seoul, the Data Policies and Standards adopted. Also, the research seeks to point the similarities, differences and best practices in the development of smart cities across jurisdictions.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the brief: &lt;a href="http://cis-india.org/internet-governance/files/SmartCitiesPoliciesStandards-20160608/at_download/file"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify;"&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Smart City as a concept is evolutionary in nature, and the key elements like Information and Communication Technology (ICT), digitization of services, Internet of Things (IoT), open data, big data, social innovation, knowledge, etc., would be intrinsic to defining a Smart City &lt;a href="#_ftn1"&gt;[1]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;A Smart City, as a “system of systems”, can potentially generate vast amounts of data, especially as cities install more sensors, gain access to data from sources such as mobile devices, and government and other agencies make more data accessible. Consequently, Big Data techniques and concepts are highly relevant to the future of Smart Cities. It was noted by Kenneth Cukier, Senior Editor of Digital Products at The Economist, that Big Data techniques can be used to enhance a number of processes essential to cities - for example, big data can be used to spot business trends, determine quality of research, prevent diseases, tack legal citations, combat crime, and determine real-time roadway traffic conditions &lt;a href="#_ftn2"&gt;[2]&lt;/a&gt;. Having said this, data is deemed to be the lifeblood of a Smart City and its availability, use, cost, quality, analysis, associated business models and governance are all areas of interest for a range of actors within a smart city &lt;a href="#_ftn3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This blog reviews five Smart Cities namely Singapore, Dubai, New York City, London and Seoul. In doing so, the research seeks to point the similarities, differences and best practices in the development of smart cities across jurisdictions. To achieve this, the research reviews:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;The definition of a Smart City in a given context or project (if any).&lt;/li&gt;
&lt;li&gt;Existing policy/regulations around data or notes the lack thereof.&lt;/li&gt;
&lt;li&gt;The cities adherence to the International standards and providing an update on the current status of the Smart City programme.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Singapore&lt;/h2&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation programme in Singapore was launched on 24th November, 2014. The programme is being driven by the Infocomm Development Authority of Singapore, through which Singapore seeks to harness ICT, networks and data to support improved livelihoods, stronger communities and creation of new opportunities for its residents &lt;a href="#_ftn4"&gt;[4]&lt;/a&gt; According to the IDA, a Smart Nation is a city where &lt;em&gt;“people and businesses are empowered through increased access to data, more participatory through the contribution of innovative ideas and solutions, and a more anticipatory government that utilises technology to better serve citizens’ needs”&lt;/em&gt; &lt;a href="#_ftn5"&gt;[5]&lt;/a&gt;. The Smart Nation programme is driven by a designated Office in the Prime Minister’s Office &lt;a href="#_ftn6"&gt;[6]&lt;/a&gt;. As a core component to the Smart Nation Programme, the Smart Nation Platform has been developed as the technical architecture to support the Programme. This Platform enables greater pervasive connectivity, better situational awareness through data collection, and efficient sharing and access to collected sensor data, allowing public bodies to use such data to develop policy and practical interventions &lt;a href="#_ftn7"&gt;[7]&lt;/a&gt; Such access would allow for anticipatory governance - a goal of the Smart Nation Programme as noted by Dr. Yaacob Ibrahim, Minister for Communications and Information stating “Insights gained from this data would enable us to better anticipate citizens’ needs and help in better delivery of services” &lt;a href="#_ftn8"&gt;[8]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;div style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation Programme is an ongoing initiative, being built on the past programme Intelligent Nation 2015 (iN2015 masterplan). The plan involves putting in place the infrastructure, policies, ecosystem and capabilities to enable a Smart Nation, by adopting a people-centric approach &lt;a href="#_ftn9"&gt;[9]&lt;/a&gt;. A number of co-creating solutions adopted by the Government include:&lt;/div&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;Development of Mobile Apps to facilitate communication between the public and the providers of public services.&lt;/li&gt;
&lt;li&gt;Organization of Hackathons by government agencies or corporations in collaboration with schools and industry partners to ideate and develop solutions to tackle real-world challenges.&lt;/li&gt;
&lt;li&gt;Adopt measure for smart mobility to create a more seamless transport experience and providing greater access to real-time transport information so that citizens can better plan their journeys.&lt;/li&gt;
&lt;li&gt;Smart technologies are also being introduced to the housing estates &lt;a href="#_ftn10"&gt;[10]&lt;/a&gt;.&lt;/li&gt;&lt;/ul&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation plan derives its legitimacy from the constitution of Singapore, holding the Prime Minister responsible to take charge of the subject ‘Smart Nation’ blueprint under the Statutory body of ‘Smart Nation’ Programme Office &lt;a href="#_ftn11"&gt;[11]&lt;/a&gt;. Singapore has a comprehensive data protection law – the Personal Data Protection Act 2012, rules governing the collection, use, disclosure and care of personal data. The Personal Data Protection Commission of Singapore has committed to work closely with the private sector, and also to support the Smart Nation vision on data privacy and cyber security ecosystem &lt;a href="#_ftn12"&gt;[12]&lt;/a&gt; &lt;a href="#_ftn13"&gt;[13]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Towards achieving the Smart Nation vision the government has also promoted the use of open data. In 2015 the Department of Statistics has made a vast amount of data available (across multiple themes say transport, infocomm, population, etc.) for free to the public in order to encourage innovation and facilitate the Smart Nation &lt;a href="#_ftn14"&gt;[14]&lt;/a&gt;. Prior to this initiative, the government had adopted the Open Data Policy in 2011, enabling public data for analysis, research and application development &lt;a href="#_ftn15"&gt;[15]&lt;/a&gt;. The concept of Virtual Singapore, which is a part of the Smart Nation Initiative, has been developed to adopt and simulate solutions on a virtual platform using big data analytics &lt;a href="#_ftn16"&gt;[16]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Nation initiative follows the standards laid under the purview of the Singapore Standards Council (SSC). It specifies three types of Internet of Things (IoT) Standards – sensor network standards (TR38 - for public areas &amp;amp; TR40 - for homes), IoT foundational standards (common set of guidelines for IoT requirements and architecture, information and service interoperability, security and data integrity) and domain-specific standards (healthcare, mobility, urban living, etc.) &lt;a href="#_ftn17"&gt;[17]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Singapore is part of ISO/IEC JTC 1/WG7 Sensor Networks and ISO/IEC JTC 1/WG10 Internet of Things (IoT) &lt;a href="#_ftn18"&gt;[18]&lt;/a&gt;. &lt;a href="https://www.itsc.org.sg/standards/singapore-it-standards"&gt;Singapore IT standards&lt;/a&gt; abides to the international standards as defined by ISO, ITU, etc.Singapore is a member of many international standards forums (see &lt;a href="https://www.itsc.org.sg/international-participation/memberships-in-iso-iec-jtc1"&gt;Singapore International Standards Committee&lt;/a&gt;) which includes JTC1/WG9 - Big Data; JTC1/WG10 - Internet of Things; JTC1/WG11 - Smart Cities.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Dubai, United Arab Emirates&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt; &lt;/strong&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Dubai Smart City strategy was launched as part of the Dubai Plan 2021 vision, in the year 2015 &lt;a href="#_ftn19"&gt;[19]&lt;/a&gt;. Dubai Plan 2021 describes the future of Dubai evolving through holistic and complementary perspectives, starting with the people and the society and places the government as the custodian of the city’s development. Within the Plan, the smart city theme envisions a platform that is fully connected and integrated infrastructure that enables easy mobility for all residents and tourists, and provides easy access to all economic centers and social services, in line with the world’s best cities &lt;a href="#_ftn20"&gt;[20]&lt;/a&gt;. Center to the smart city platform is data and data analytics, particularly cross functional data and big data techniques to give a complete view of the city &lt;a href="#_ftn21"&gt;[21]&lt;/a&gt; As envisioned, the Dubai Data portal would provide a gateway to empower relevant stakeholders to understand the nuances of the city and pursue questions that will result in the greatest impact from the city’s data &lt;a href="#_ftn22"&gt;[22]&lt;/a&gt;. The platform will be based on current data and existing services, initiatives, and networks to identify opportunities for a smart city &lt;a href="#_ftn23"&gt;[23]&lt;/a&gt;. The Smart City Plan also includes a framework for aligning districts of Dubai with the Smart City vision and dimensions &lt;a href="#_ftn24"&gt;[24]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Smart Dubai roadmap 2015 provides a consolidated report and planned smart city services, its status and the stage of its implementation, for e.g. Smart Grid, Mobile Payment, Smart Water, Health applications, Public Wi-Fi, Municipality, E-Traffic solutions, etc &lt;a href="#_ftn25"&gt;[25]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt; &lt;/strong&gt;The Smart Dubai strategy is envisioned to be completed by the year 2020, and currently it’s ongoing. The first phase of Smart Dubai masterplan is expected to end by 2016. Between 2017 and 2019, the plan aims to deliver new initiatives and services. The second phase of the masterplan is expected to be completed by the year 2020 &lt;a href="#_ftn26"&gt;[26]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Smart City Plan is being driven by the &lt;strong&gt;Dubai Smart City Office&lt;/strong&gt; – which has been established under Law No. (29) of 2015 on the establishment of Dubai Smart City Office; Law No. (30) of 2015 on the establishment of Dubai Smart City Establishment; Decree No. (37) of 2015 on the formation of the Board of the Dubai Smart City Office; and Decree No (38) of 2015- appointing a Director General for the Office, which will develop overall policies and strategic plans, supervise the smart transformation process and approve joint initiatives, projects and services &lt;a href="#_ftn27"&gt;[27]&lt;/a&gt;. Also, an open data law called &lt;strong&gt;Dubai Open Data Law&lt;/strong&gt; was issued to complete the legislative framework for transforming Dubai into a Smart City &lt;a href="#_ftn28"&gt;[28]&lt;/a&gt;. This law will enable the sharing of non-confidential data between public entities and other stakeholders.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In 2015 the Smart Dubai Executive Committee has collaborated through an agreement with the International Telecommunications Union (ITU) adopt the performance indicators by the ITU Focus Group on Smart Sustainable Cities to evaluate the feasibility of the indicators &lt;a href="#_ftn29"&gt;[29]&lt;/a&gt;. The Focus Group is working towards identifying global best practices for the development of smart cities &lt;a href="#_ftn30"&gt;[30]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;New York City, United States of America&lt;/h2&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The ‘One New York Plan’ announced in the year 2015 is a comprehensive plan for a sustainable and resilient city. It includes the adoption of digital technology and considers the importance of the role of data in transforming every aspect of the economy, communications, politics, and individual and family life &lt;a href="#_ftn31"&gt;[31]&lt;/a&gt;. Furthermore, through a publication on '&lt;a href="http://www1.nyc.gov/site/forward/innovations/smartnyc.page"&gt;Building a Smart+Equitable City&lt;/a&gt;', the Mayor’s Office of Technology and Innovation (MOTI) describes efforts to leverage new technologies to build Smart city.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Accordingly, the plan seeks to establish better lives through establishing principles and strategic frameworks to guide connected device and Internet of Things (IoT) implementation; MOTI serving as the coordinating entity for new technology and IoT deployments across all City agencies; collaborating with academia and the private sector on innovative pilot projects, and partnering with municipal governments and organizations around the world to share best practices and leverage the impact of technological advancements &lt;a href="#_ftn32"&gt;[32]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;OneNYC represents a unified vision for a sustainable, resilient, and equitable city developed with cross-cutting interagency collaboration, public engagement, and consultation with leading experts in their respective fields. The Mayor’s Office of Sustainability oversees the development of OneNYC and now shares responsibility with the Mayor’s Office of Recovery and Resiliency for ensuring its implementation &lt;a href="#_ftn33"&gt;[33]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;As per the Local Law 11 of 2012, each City entity must identify and ultimately publish all of its digital public data for citywide aggregation and publication by 2018. In adherence to this law, there exists a NYC Open Data Plan which requires annual data updation &lt;a href="#_ftn34"&gt;[34]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The LinkNYC initiative, one of the key projects to make New York a ‘smart’ city, aims to connect everyone through a city wide wi-fi network. The LinkNYC initiative will retrofit payphones with kiosks to provide high-speed WiFi hotspots and charging stations for increased connectivity &lt;a href="#_ftn35"&gt;[35]&lt;/a&gt;. Data Privacy in the initiative is addressed through the customer first privacy policy, which considers user’s privacy on priority and will not sell any personal information or share with third parties for their own use. LinkNYC will use anonymized, aggregate data to make the system more efficient and to develop insights to improve your Link experience &lt;a href="#_ftn36"&gt;[36]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The ANSI Network on Smart and Sustainable Cities (ANSSC) is a forum for information sharing and coordination on voluntary standards, conformity assessment and related activities for smart and sustainable cities in the US &lt;a href="#_ftn37"&gt;[37]&lt;/a&gt;. The US is a signatory of the ISO/ITU defined standards on smart cities &lt;a href="#_ftn38"&gt;[38]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;London, United Kingdom&lt;/h2&gt;
&lt;h3&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Smart London Plan was unveiled in the year 2013 by the Mayor of London. The plan is being driven through the Greater London Authority, with the advice of the Smart London Board. The Smart London Plan envisions &lt;em&gt;‘Using the creative power of new technologies to serve London and improve Londoner’s lives&lt;/em&gt;’ &lt;a href="#_ftn39"&gt;[39]&lt;/a&gt;. ‘Smart London’ is about harnessing new technology and data so that businesses, Londoners and visitors experience the city in a better way, and do not face bureaucratic hassle and congestion. Smart London seeks to improve the city as a whole and focuses on city macro functions that result from the interplay between city subsystems - such as local labour markets to financial markets, from local government to education, healthcare, transportation and utilities. According to strategy documents, a smarter London recognises and employs data as a service and will leverage data to enable informed decision making and the design of new activities.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;This project is currently ongoing. Since its formation in March 2013, the Smart London Board has been advising the Greater London Authority.The Plan sits within the overarching framework of the Mayor’s Vision 2020 &lt;a href="#_ftn40"&gt;[40]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The Smart London Plan incorporates the existing open data platform called ‘London DataStore’. The rules and guidelines for this platform are defined by the Greater London Authority, which includes working with public and private sector organisations to create, maintain and utilise it, enabling common data standards, identify and prioritise which data are needed to address London’s growth challenges, establish a Smart London Borough Partnership to encourage boroughs to free up London’s local level data. Also, privacy is protected and there is transparent use of data - to ensure data use is managed in the best interests of the public rather than private enterprise.&lt;sup&gt;42&lt;/sup&gt; The Smart London Plan aims to build on this existing datastore to identify and publish data that addresses specific growth challenges, with an emphasis on working with companies and communities to create, maintain, and use this data &lt;a href="#_ftn41"&gt;[41]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Open Data White Paper, issued by the Office of Paymaster General, seeks to build a transparent society by releasing public data through open data platforms and leveraging the potential of emerging technologies &lt;a href="#_ftn42"&gt;[42]&lt;/a&gt;. The Greater London Authority processes personal data in accordance with the Data Protection Act 1998 &lt;a href="#_ftn43"&gt;[43]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Adoption of International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;The British Standards Institution (BSI) has already established Smart City standards and has associated with the ISO Advisory Group on smart city standards. The UK subscribes to the BSI standards for smart cities and has adopted the same &lt;a href="#_ftn44"&gt;[44]&lt;/a&gt;. The following standards and publications help address various issues for a city to become a smart city:&lt;/p&gt;
&lt;ul style="text-align: justify;"&gt;
&lt;li&gt;The development of a standard on &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-180-smart-cities-terminology/"&gt;Smart city terminology (PAS 180)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The development of a &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-181-smart-cities-framework/"&gt;Smart city framework standard (PAS 181)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;The development of a &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PAS-182-smart-cities-data-concept-model/"&gt;Data concept model for smart cities (PAS 182)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;A &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8100-smart-cities-overview/"&gt;Smart city overview document (PD 8100)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;A &lt;a href="http://www.bsigroup.com/en-GB/smart-cities/Smart-Cities-Standards-and-Publication/PD-8101-smart-cities-planning-guidelines/"&gt;Smart city planning guidelines document (PD 8101)&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;BS 8904 Guidance for community sustainable development provides a decision-making framework that will help setting objectives in response to the needs and aspirations of city stakeholders&lt;/li&gt;
&lt;li&gt;BS 11000 Collaborative relationship management&lt;/li&gt;
&lt;li&gt;BSI BIP 2228:2013 Inclusive urban design - A guide to creating accessible public spaces.&lt;/li&gt;&lt;/ul&gt;
&lt;p style="text-align: justify;"&gt;Further, the Smart London Plan incorporates open data standards in accordance with London DataStore &lt;a href="#_ftn45"&gt;[45]&lt;/a&gt;. Various government reports – Smart Cities background paper, Open Data White Paper, etc., have suggested the use of standards related to Internet of Things (IoT), open data standards, etc &lt;a href="#_ftn46"&gt;[46]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2 style="text-align: justify;"&gt;Seoul, Korea&lt;/h2&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Introduction&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;Smart Seoul 2015 was announced in June 2011 by the Seoul Metropolitan Government, which envisions integrating IT services into every field, including administration, welfare, industry and living. Through this, the Seoul Metropolitan Government plans to create a Seoul that uses smart technologies by 2015 &lt;a href="#_ftn47"&gt;[47]&lt;/a&gt;. Towards this, the Seoul Metropolitan Government plans to make use of Big Data in policy development, and through scientific analytics, will provide customized administrative services and reduce wasteful spending. Also, the government is utilising Big Data to analyse trends emerging from existing services &lt;a href="#_ftn48"&gt;[48]&lt;/a&gt;. Examples of projects that leverage big data that the government has undertaken include the Taxi Matchmaking Project – analyzes the data related to taxi stands and passengers, the Owl Bus &lt;a href="#_ftn49"&gt;[49]&lt;/a&gt; - maps the bus routes, etc.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Status of the Project&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;Building on the Smart Seoul 2015, the Seoul Metropolitan Government plans to establish 'Global Digital Seoul 2020 – New Connections, Different Experiences' vision in next five-years. In this multi-objective plan, it aims to establish a ’Big Data campus’ providing win-win cooperation among public, private, industry and university &lt;a href="#_ftn50"&gt;[50]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;Policies and Regulations &lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;The Smart Seoul 2015 aims to create a ‘Seoul Data Mart’, which will be an open platform that makes public information available for data processing &lt;a href="#_ftn51"&gt;[51]&lt;/a&gt;. Furthermore, Seoul has opened the Seoul Open Data Plaza &lt;a href="#_ftn52"&gt;[52]&lt;/a&gt;, an online channel to share and provide citizens with all of Seoul’s public data, such as real-time bus operation schedules, subway schedules, non-smoking areas, locations of public Wi-Fi services, shoeshine shops, and facilities for disabled people, and the information registered in Seoul Open Data Plaza is provided in the open API format.&lt;sup&gt;45&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;South Korea has a comprehensive law governing data privacy – Personal Information Protection Act, 2011. The law includes data protection rules and principles, including obligations on the data controller and the consent of data subjects, rights to access personal data or object to its collection, and security requirements. It also covers cookies and spam, data processing by third parties and the international transfer of data &lt;a href="#_ftn53"&gt;[53]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;&lt;strong&gt;International Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;&lt;/strong&gt;The smart city standards are adopted in the development of smart cities in Korea &lt;a href="#_ftn54"&gt;[54]&lt;/a&gt;. Korea has adopted the ISO/TC 268, which is focused on sustainable development in communities. Korea also has one working group developing city indicators and another working group developing metrics for smart community infrastructures &lt;a href="#_ftn55"&gt;[55]&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The smart city projects studied are at different levels of implementation and have both similarities and differences. Below is an analysis of some of the key similarities and differences between smart city projects, a comparison of these points to India’s 100 Smart City Mission, and a summary of best practices around the development of smart city frameworks.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Nodal Agency&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;All cities studied have nodal agencies driving the smart city initiatives and many have policies in place backing these initiatives. For example, while the Smart Nation programme in Singapore is being driven by the Infocomm Development Authority, in London the smart city project is governed by the Great London Authority. The Smart Seoul Project in Korea is governed by the Seoul Metropolitan Government and New York has the Mayor’s Office of Technology and Innovation serving as the coordinating entity for new technology and IoT deployments across all City agencies. In India, the nodal agency driving the 100 Smart Cities Project is the Ministry of Urban Development under the Indian Government. In India, the implementation of the Mission at the City level will be done by a Special Purpose Vehicle (SPV), which will be a limited company and will plan, appraise, approve, release funds, implement, manage, operate, monitor and evaluate the Smart City development projects.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Policies&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Many of the cities had open data policies and data protection policies that pertain to the Smart City initiatives. In Dubai, an open data law called Dubai Open Data Law has been issued to complete the legislative framework for transforming Dubai into a Smart City and the Smart City Establishment will develop policies for the project. New York also has an Open Data Plan in place and LinkNYC will use anonymized, aggregate data to address data privacy of users. In London, the Smart London Plan incorporates the existing open data platform called ‘London DataStore’, the rules for which are defined by the Greater London Authority, which also ensures privacy and transparent use of data by processing personal data in accordance with the Data Protection Act 1998. For regulation of data in Seoul, a ‘Seoul Data Mart’ will be established to make public information available for data processing and the Seoul Open Data Plaza is an existing online channel to share and provide citizens with all of Seoul’s public data. South Korea has a comprehensive law governing data privacy in place as well. In Singapore, the Personal Data Protection Commission has committed to work and support the Smart Nation vision on data privacy and cyber security ecosystem. To achieve the vision of the project, the government has also promoted the use of open data. It can be said the these countries , with clearly laid out policies to support and guide the project, have well planned ecosystem for regulation and governance of systems, technologies and cities. All cities have incorporated open data into smart cities and many have developed guidelines for its use. All cities have similar goals of enhancing the lives of citizens and developing anticipatory regulation, however, there appears to be little discussion on the need to amend existing law or enable new law around privacy and data protection in light of data collection through smart cities. In India, no enabling legislation or policy has been formulated by the Government, apart from releasing “Mission Statement and Guidelines”, which provides details about the Project and vision, excluding a definition of a ‘smart city’ or the relevant applicable laws and policies. No information is publicly available regarding deployment of open data, use of specific technologies like cloud, big data, etc., the relevant policies and applicability of laws. Unlike India, all cities recognize the importance of big data techniques in enabling smart city visions, technology and policies. On the lines of these cities, India must work towards addressing the need for an open data framework in light of the 100 Smart Cities Mission to enable the sharing of non-confidential data between public entities and other stakeholders. This requires co-ordination to incorporate, enable and draw upon open data architecture in the cities by the Government with the existing open data framework in India, like the National Data Sharing and Accessibility Policy, 2012. Use of technology in the form of IoT and Big Data entails access to open data, bringing another policy area in its ambit which needs consideration. Also, identification and development of open standards for IoT must be looked at. Also, as data in smart cities will be generated, collected, used, and shared by both the public and private sector. It is essential that India’s existing data protection standards and regime must be amended to extend the data regulation beyond a body corporate and oversee the collection and use of data by the Government, and its agencies.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Standards&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;In Singapore, the Smart Nation initiative follows the standards laid under the purview of the Singapore Standards Council (SSC)and the &lt;a href="https://www.itsc.org.sg/standards/singapore-it-standards"&gt;Singapore IT standards&lt;/a&gt; abides to the international standards as defined by ISO, ITU, etc. The Country is also a member of many international standards forums (see &lt;a href="https://www.itsc.org.sg/international-participation/memberships-in-iso-iec-jtc1"&gt;Singapore International Standards Committee&lt;/a&gt;) which includes JTC1/WG9- Big Data; JTC1/WG10 - Internet of Things; JTC1/WG11 - Smart Cities. In Dubai, the Smart Dubai Executive Committee with the International Telecommunications Union (ITU) to adopt the performance indicators by the ITU Focus Group on Smart Sustainable Cities to evaluate the feasibility of the indicators. For the purpose of standards, the ANSI Network on Smart and Sustainable Cities (ANSSC) in New York is a forum smart and sustainable cities, along with US being a signatory of the ISO/ITU defined standards on smart cities. Also, The British Standards Institution (BSI) has already established Smart City standards and has associated with the ISO Advisory Group on smart city standards. The UK subscribes to the BSI standards for smart cities and has adopted the same and the Smart London Plan incorporates open data standards in accordance with London DataStore. For development of smart cities, Korea has adopted the ISO/TC 268, which is focused on sustainable development in communities and also has one working group developing city indicators and another working group developing metrics for smart community infrastructures. However, in India, the Bureau of Indian Standards (BIS) has undertaken the task to formulate standardised guidelines for central and state authorities in planning, design and construction of smart cities by setting up a technical committee under the Civil engineering department of the Bureau. However, adoption of the standards by implementing agencies would be voluntary and intends to complement internationally available documents in this area. Also, The Global Cities Institute (GCI) has undertaken a mission in the year 2015 to align with the Bureau of Indian Standards regarding development of standards of smart cities and also to forge relationships with Indian cities in light of ISO 37120. It can be said that India has currently not yet adopted international standards, but is in the process of developing national standards and adopting key international standards. Unlike other cities,which are adopting standards - national, ISO, or ITU, Indian cities are yet to adopt standards for regulation of the future smart cities.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Notes for India&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;India is in the nascent stages of developing smart cities across the country. Drawing from the practices adopted by cities across the world, smart cities in India should adopt strong regulatory and governance frameworks regarding technical standards, open data and data security and data protection policies. These policies will be essential in ensuring the sustainability and efficiency of smart cities while safeguarding individual rights. Some of these policies are already in place - such as India’s Open Data Policy and India’s data protection standards under section 43A of the ITA. It will be important to see how these policies are adopted and applied to the context of smart cities.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;References&lt;/h2&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;[1]&lt;/a&gt; Smart Cities and Transparent Evolution, &lt;a href="http://www.posterheroes.org/Posterheroes3/_mat/PH3_eng.pdf"&gt;http://www.posterheroes.org/Posterheroes3/_mat/PH3_eng.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;[2]&lt;/a&gt; "Data, Data Everywhere." The Economist, February 25, 2010. Accessed March 17, 2016, &lt;a href="http://www.economist.com/node/15557443"&gt;http://www.economist.com/node/15557443&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;[3]&lt;/a&gt; "Smart Cities." ISO. 2015. Accessed March 17, 2016, &lt;a href="http://www.iso.org/iso/smart_cities_report-jtc1.pdf"&gt;http://www.iso.org/iso/smart_cities_report-jtc1.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;[4]&lt;/a&gt; Transcript of Prime Minister Lee Hsien Loong's speech at Smart Nation launch on 24 November, &lt;a href="http://www.pmo.gov.sg/mediacentre/transcript-prime-minister-lee-hsien-loongs-speech-smart-nation-launch-24-november"&gt;http://www.pmo.gov.sg/mediacentre/transcript-prime-minister-lee-hsien-loongs-speech-smart-nation-launch-24-november&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;[5]&lt;/a&gt; Smart Nation Vision, &lt;a href="https://www.ida.gov.sg/Tech-Scene-News/Smart-Nation-Vision"&gt;https://www.ida.gov.sg/Tech-Scene-News/Smart-Nation-Vision&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;[6]&lt;/a&gt; Smart Nation, &lt;a href="http://www.pmo.gov.sg/smartnation"&gt;http://www.pmo.gov.sg/smartnation&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;[7]&lt;/a&gt; Smart Nation Platform, &lt;a href="https://www.ida.gov.sg/~/media/Files/About%20Us/Newsroom/Media%20Releases/2014/0617_smartnation/AnnexA_sn.pdf"&gt;https://www.ida.gov.sg/~/media/Files/About%20Us/Newsroom/Media%20Releases/2014/0617_smartnation/AnnexA_sn.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;[8]&lt;/a&gt; Transcript of Prime Minister Lee Hsien Loong's speech at Smart Nation launch on 24 November, &lt;a href="https://www.ida.gov.sg/blog/insg/featured/singapore-lays-groundwork-to-be-worlds-first-smart-nation/"&gt;https://www.ida.gov.sg/blog/insg/featured/singapore-lays-groundwork-to-be-worlds-first-smart-nation/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;[9]&lt;/a&gt; Prime Ministers’ Office Singapore-Smart Nation, &lt;a href="http://www.pmo.gov.sg/smartnation"&gt;http://www.pmo.gov.sg/smartnation&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;[10]&lt;/a&gt; Prime Ministers’ Office Singapore-Smart Nation, &lt;a href="http://www.pmo.gov.sg/smartnation"&gt;http://www.pmo.gov.sg/smartnation&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;[11]&lt;/a&gt; Constitution of the Republic of Singapore (Responsibility of the Prime Minister) Notification 2015, &lt;a href="http://statutes.agc.gov.sg/aol/search/display/view.w3p;page=0;query=Status%3Acurinforce%20Type%3Aact,sl%20Content%3A%22smart%22;rec=4;resUrl=http%3A%2F%2Fstatutes.agc.gov.sg%2Faol%2Fsearch%2Fsummary%2Fresults.w3p%3Bquery%3DStatus%253Acurinforce%2520Type%253Aact,sl%2520Content%253A%2522smart%2522;whole=yes"&gt;http://statutes.agc.gov.sg/aol/search/display/view.w3p;page=0;query=Status%3Acurinforce%20Type%3Aact,sl%20Content%3A%22smart%22;rec=4;resUrl=http%3A%2F%2Fstatutes.agc.gov.sg%2Faol%2Fsearch%2Fsummary%2Fresults.w3p%3Bquery%3DStatus%253Acurinforce%2520Type%253Aact,sl%2520Content%253A%2522smart%2522;whole=yes&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn12"&gt;[12]&lt;/a&gt; Personal Data Protection Singapore-Annual Report 2014-15, &lt;a href="https://www.pdpc.gov.sg/docs/default-source/Reports/pdpc-ar-fy14---online.pdf"&gt;https://www.pdpc.gov.sg/docs/default-source/Reports/pdpc-ar-fy14---online.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn13"&gt;[13]&lt;/a&gt; Balancing Innovation and Personal Data Protection, &lt;a href="https://www.ida.gov.sg/Tech-Scene-News/Tech-News/Digital-Government/2015/9/Balancing-innovation-and-personal-data-protection"&gt;https://www.ida.gov.sg/Tech-Scene-News/Tech-News/Digital-Government/2015/9/Balancing-innovation-and-personal-data-protection&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn14"&gt;[14]&lt;/a&gt; Department of Statistics Singapore- Free Access to More Data on the SingStat Website from 1 March 2015, &lt;a href="http://www.singstat.gov.sg/docs/default-source/default-document-library/news/press_releases/press27022015.pdf"&gt;http://www.singstat.gov.sg/docs/default-source/default-document-library/news/press_releases/press27022015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;[15]&lt;/a&gt; Singapore Marks 50th Birthday With Open Data Contest, &lt;a href="https://blog.hootsuite.com/singapore-open-data/"&gt;https://blog.hootsuite.com/singapore-open-data/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;[16]&lt;/a&gt; Virtual Singapore - a 3D city model platform for knowledge sharing and community collaboration, &lt;a href="http://www.sla.gov.sg/News/tabid/142/articleid/572/category/Press%20Releases/parentId/97/year/2014/Default.aspx"&gt;http://www.sla.gov.sg/News/tabid/142/articleid/572/category/Press%20Releases/parentId/97/year/2014/Default.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;[17]&lt;/a&gt; Internet of Things (IoT) Standards Outline to Support Smart Nation Initiative Unveiled, &lt;a href="http://www.spring.gov.sg/NewsEvents/PR/Pages/Internet-of-Things-(IoT)-Standards-Outline-to-Support-Smart-Nation-Initiative-Unveiled-20150812.aspx"&gt;http://www.spring.gov.sg/NewsEvents/PR/Pages/Internet-of-Things-(IoT)-Standards-Outline-to-Support-Smart-Nation-Initiative-Unveiled-20150812.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;[18]&lt;/a&gt; Information Technology Standards Committee, &lt;a href="https://www.itsc.org.sg/technical-committees/internet-of-things-technical-committee-iottc"&gt;https://www.itsc.org.sg/technical-committees/internet-of-things-technical-committee-iottc&lt;/a&gt; and &lt;a href="https://www.ida.gov.sg/~/media/Files/Infocomm%20Landscape/iN2015/Reports/realisingthevisionin2015.pdf"&gt;https://www.ida.gov.sg/~/media/Files/Infocomm%20Landscape/iN2015/Reports/realisingthevisionin2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;[19]&lt;/a&gt; Government of Dubai-2021 Dubai Plan-Purpose, &lt;a href="http://www.dubaiplan2021.ae/the-purpose/"&gt;http://www.dubaiplan2021.ae/the-purpose/&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn20"&gt;[20]&lt;/a&gt; Government of Dubai-2021 Dubai Plan, &lt;a href="http://www.dubaiplan2021.ae/dubai-plan-2021/"&gt;http://www.dubaiplan2021.ae/dubai-plan-2021/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;[21]&lt;/a&gt; Smart Dubai, &lt;a href="http://www.smartdubai.ae/foundation_layers.php"&gt;http://www.smartdubai.ae/foundation_layers.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;[22]&lt;/a&gt; The Internet of Things: Connections for People’s happiness, &lt;a href="http://www.smartdubai.ae/story021002.php"&gt;http://www.smartdubai.ae/story021002.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;[23]&lt;/a&gt; Smart Dubai - Current State, &lt;a href="http://www.smartdubai.ae/current_state.php"&gt;http://www.smartdubai.ae/current_state.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;[24]&lt;/a&gt; Smart Dubai - District Guidelines, &lt;a href="http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf"&gt;http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;[25]&lt;/a&gt; See; &lt;a href="http://roadmap.smartdubai.ae/search-services-public.php"&gt;http://roadmap.smartdubai.ae/search-services-public.php&lt;/a&gt; and &lt;a href="http://roadmap.smartdubai.ae/search-initiatives-public.php"&gt;http://roadmap.smartdubai.ae/search-initiatives-public.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;[26]&lt;/a&gt; Smart Dubai-Smart District Guidelines, &lt;a href="http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf"&gt;http://smartdubai.ae/districtguidelines/Smart_Dubai_District_Guidelines_Public_Brief.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn27"&gt;[27]&lt;/a&gt; Dubai Ruler issues new laws to further enhance the organisational structure and legal framework of Dubai Smart City, &lt;a href="https://www.wam.ae/en/news/emirates/1395288828473.html"&gt;https://www.wam.ae/en/news/emirates/1395288828473.html&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn28"&gt;[28]&lt;/a&gt; See: &lt;a href="http://slc.dubai.gov.ae/en/AboutDepartment/News/Lists/NewsCentre/DispForm.aspx?ID=147&amp;amp;ContentTypeId=0x01001D47EB13C23E544893300E8367A23439"&gt;http://slc.dubai.gov.ae/en/AboutDepartment/News/Lists/NewsCentre/DispForm.aspx?ID=147&amp;amp;ContentTypeId=0x01001D47EB13C23E544893300E8367A23439&lt;/a&gt; and &lt;a href="http://www.smartdubai.ae/dubai_data.php"&gt;http://www.smartdubai.ae/dubai_data.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn29"&gt;[29]&lt;/a&gt; Dubai first city to trial ITU key performance indicators for smart sustainable cities, &lt;a href="http://www.itu.int/net/pressoffice/press_releases/2015/12.aspx#.VtaYtlt97IU"&gt;http://www.itu.int/net/pressoffice/press_releases/2015/12.aspx#.VtaYtlt97IU&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn30"&gt;[30]&lt;/a&gt; Smart Dubai Benchmark Report 2015 Executive Summary, &lt;a href="http://smartdubai.ae/bmr2015/methodology-public.php"&gt;http://smartdubai.ae/bmr2015/methodology-public.php&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn31"&gt;[31]&lt;/a&gt; Building a Smart + Equitable City, &lt;a href="http://www1.nyc.gov/assets/forward/documents/NYC-Smart-Equitable-City-Final.pdf"&gt;http://www1.nyc.gov/assets/forward/documents/NYC-Smart-Equitable-City-Final.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn32"&gt;[32]&lt;/a&gt; Building a Smart + Equitable City, &lt;a href="http://www1.nyc.gov/site/forward/innovations/smartnyc.page"&gt;http://www1.nyc.gov/site/forward/innovations/smartnyc.page&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn33"&gt;[33]&lt;/a&gt; One New York: The Plan for a Strong and Just City, &lt;a href="http://www1.nyc.gov/html/onenyc/about.html"&gt;http://www1.nyc.gov/html/onenyc/about.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn34"&gt;[34]&lt;/a&gt; Open Data for All, &lt;a href="http://www1.nyc.gov/assets/home/downloads/pdf/reports/2015/NYC-Open-Data-Plan-2015.pdf"&gt;http://www1.nyc.gov/assets/home/downloads/pdf/reports/2015/NYC-Open-Data-Plan-2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn35"&gt;[35]&lt;/a&gt; 7 public projects that are turning New York into a “smart city”, &lt;a href="http://www.builtinnyc.com/2015/11/24/7-projects-are-turning-new-york-futuristic-technology-hub"&gt;http://www.builtinnyc.com/2015/11/24/7-projects-are-turning-new-york-futuristic-technology-hub&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn36"&gt;[36]&lt;/a&gt; LinkNYC, &lt;a href="https://www.link.nyc/faq.html#privacy"&gt;https://www.link.nyc/faq.html#privacy&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn37"&gt;[7]&lt;/a&gt; ANSI Network on Smart and Sustainable Cities, &lt;a href="http://www.ansi.org/standards_activities/standards_boards_panels/anssc/overview.aspx?menuid=3"&gt;http://www.ansi.org/standards_activities/standards_boards_panels/anssc/overview.aspx?menuid=3&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn38"&gt;[38]&lt;/a&gt; IoT-Enabled Smart City Framework, &lt;a href="http://publicaa.ansi.org/sites/apdl/Documents/News%20and%20Publications/Links%20Within%20Stories/IoT-EnabledSmartCityFrameworkWP20160213.pdf"&gt;http://publicaa.ansi.org/sites/apdl/Documents/News%20and%20Publications/Links%20Within%20Stories/IoT-EnabledSmartCityFrameworkWP20160213.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn39"&gt;[39]&lt;/a&gt; Smart London (UK) Plan: Digital Technologies, London and Londoners, &lt;a href="http://munkschool.utoronto.ca/ipl/files/2015/03/KleinmanM_Smart-London-UK-v5_30AP2015.pdf"&gt;http://munkschool.utoronto.ca/ipl/files/2015/03/KleinmanM_Smart-London-UK-v5_30AP2015.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn40"&gt;[40]&lt;/a&gt; Smart London Plan, &lt;a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf"&gt;http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn41"&gt;[41]&lt;/a&gt; Smart London Plan, &lt;a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf"&gt;http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn42"&gt;[42]&lt;/a&gt; Open Data White Paper, &lt;a href="https://data.gov.uk/sites/default/files/Open_data_White_Paper.pdf"&gt;https://data.gov.uk/sites/default/files/Open_data_White_Paper.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn43"&gt;[43]&lt;/a&gt; London Datastore-Privacy, &lt;a href="http://data.london.gov.uk/about/privacy/"&gt;http://data.london.gov.uk/about/privacy/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn44"&gt;[44]&lt;/a&gt; Future Cities Standards Centre in London, &lt;a href="https://eu-smartcities.eu/commitment/5937"&gt;https://eu-smartcities.eu/commitment/5937&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn45"&gt;[45]&lt;/a&gt; Smart London Plan, &lt;a href="http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf"&gt;http://www.london.gov.uk/sites/default/files/smart_london_plan.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn46"&gt;[46]&lt;/a&gt; Smart Cities background paper, October 2013, &lt;a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246019/bis-13-1209-smart-cities-background-paper-digital.pdf"&gt;https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/246019/bis-13-1209-smart-cities-background-paper-digital.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn47"&gt;[47]&lt;/a&gt; Presentation of 2015 Blueprint of Seoul as ‘State-of-the-art Smart City’, &lt;a href="http://english.seoul.go.kr/presentation-of-2015-blueprint-of-seoul-as-%E2%80%98state-of-the-art-smart-city%E2%80%99/"&gt;http://english.seoul.go.kr/presentation-of-2015-blueprint-of-seoul-as-%E2%80%98state-of-the-art-smart-city%E2%80%99/&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn48"&gt;[48]&lt;/a&gt; “Policy Where There is Demand,” Seoul Utilizes Big Data, &lt;a href="http://english.seoul.go.kr/policy-demand-seoul-utilizes-big-data/"&gt;http://english.seoul.go.kr/policy-demand-seoul-utilizes-big-data/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn49"&gt;[49]&lt;/a&gt; Seoul’s “Owl Bus” Based on Big Data Technology, &lt;a href="http://www.citiesalliance.org/sites/citiesalliance.org/files/Seoul-Owl-Bus-11052014.pdf"&gt;http://www.citiesalliance.org/sites/citiesalliance.org/files/Seoul-Owl-Bus-11052014.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn50"&gt;[50]&lt;/a&gt; Seoul Launches “Global Digital Seoul 2020”, &lt;a href="http://english.seoul.go.kr/seoul-launches-global-digital-seoul-2020/"&gt;http://english.seoul.go.kr/seoul-launches-global-digital-seoul-2020/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn51"&gt;[51]&lt;/a&gt; Smart Seoul 2015, &lt;a href="http://english.seoul.go.kr/wp-content/uploads/2014/02/SMART_SEOUL_2015_41.pdf"&gt;http://english.seoul.go.kr/wp-content/uploads/2014/02/SMART_SEOUL_2015_41.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn52"&gt;[52]&lt;/a&gt; Disclosing public data through the Seoul Open Data Plaza, &lt;a href="http://english.seoul.go.kr/policy-information/key-policies/informatization/seoul-open-data-plaza/"&gt;http://english.seoul.go.kr/policy-information/key-policies/informatization/seoul-open-data-plaza/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn53"&gt;[53]&lt;/a&gt; Data protection in South Korea: overview, &lt;a href="http://uk.practicallaw.com/2-579-7926"&gt;http://uk.practicallaw.com/2-579-7926&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn54"&gt;[54]&lt;/a&gt;Smart Cities Seoul: a case study, &lt;a href="https://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000190001PDFE.pdf"&gt;https://www.itu.int/dms_pub/itu-t/oth/23/01/T23010000190001PDFE.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a name="_ftn55"&gt;[55]&lt;/a&gt; Smart Cities-ISO, &lt;a href="http://www.iso.org/iso/livelinkgetfile-isocs?nodeid=16193764"&gt;http://www.iso.org/iso/livelinkgetfile-isocs?nodeid=16193764&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities'&gt;https://cis-india.org/internet-governance/blog/policies-and-standards-overview-of-five-international-smart-cities&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Kiran A. B., Elonnai Hickok and Vanya Rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Smart Cities</dc:subject>
    
    
        <dc:subject>Policies</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-06-11T13:29:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq">
    <title>FAQ on the Aadhaar Project and the Bill</title>
    <link>https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq</link>
    <description>
        &lt;b&gt;This FAQ attempts to address the key questions regarding the Aadhaar/UIDAI project and the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016 (henceforth, Bill). This is neither a comprehensive list of questions, nor does it contain fully developed answers. We will continue to add questions to this list, and edit/expand the answers, based on our ongoing research. We will be grateful to receive your comments, criticisms, evidences, edits, suggestions for new answers, and any other responses. These can either be shared as comments in the document hosted on Google Drive, or via tweets sent to the information policy team at @CIS_InfoPolicy. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;To comment on and/or download the file, click &lt;a href="https://docs.google.com/document/d/1ib5bQUgZZ7PABurMHlzmfwZK6932DFQI6hUlad-vwfI/edit?usp=sharing" target="_blank"&gt;here&lt;/a&gt;.&lt;/h4&gt;
&lt;hr /&gt;
&lt;iframe src="https://docs.google.com/document/d/1ib5bQUgZZ7PABurMHlzmfwZK6932DFQI6hUlad-vwfI/pub?embedded=true" height="500" width="100%"&gt;&lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq'&gt;https://cis-india.org/internet-governance/blog/aadhaar-project-and-bill-faq&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Elonnai Hickok, Vanya Rakesh, and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-04-13T14:06:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles">
    <title>Analysis of Aadhaar Act in the Context of A.P. Shah Committee Principles</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles</link>
    <description>
        &lt;b&gt;Whilst there are a number of controversies relating to the Aadhaar Act including the fact that it was introduced in a manner so as to circumvent the majority of the opposition in the upper house of the Parliament and that it was rushed through the Lok Sabha in a mere eight days, in this paper we shall discuss the substantial aspects of the Act in relation to privacy concerns which have been raised by a number of experts. In October 2012, the Group of Experts on Privacy constituted by the Planning Commission under the chairmanship of Justice AP Shah Committee submitted its report which listed nine principles of privacy which all legislations, especially those dealing with personal should adhere to. In this paper, we shall discuss how the Aadhaar Act fares vis-à-vis these nine principles.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p&gt;The Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Act, 2016 (the “Aadhaar Act”) was introduced in the Lok Sabha (lower house of the Parliament) by Minister of Finance, Mr. Arun Jaitley, in on March 3, 2016, and was passed by the Lok Sabha on March 11, 2016. It was sent back by the Rajya Sabha with suggestions but the Lok Sabha rejected those suggestions, which means that the Act is now deemed to have been passed by both houses as it was originally introduced as a Money Bill. Whilst there are a number of controversies relating to the Aadhaar Act including the fact that it was introduced in a manner so as to circumvent the majority of the opposition in the upper house of the Parliament and that it was rushed through the Lok Sabha in a mere eight days, in this paper we shall discuss the substantial aspects of the Act in relation to privacy concerns which have been raised by a number of experts. In October 2012, the Group of Experts on Privacy constituted by the Planning Commission under the chairmanship of Justice AP Shah Committee submitted its report which listed nine principles of privacy which all legislations, especially those dealing with personal should adhere to. In this paper, we shall discuss how the Aadhaar Act fares vis-à-vis these nine principles.&lt;/p&gt;
&lt;p&gt;In order for the reader to better understand the frame of reference on which we shall analyse the Aadhaar Act, the nine principles contained in the report of the Group of Experts on Privacy are explained in brief below:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Principle 1: Notice&lt;/strong&gt; - Does the legislation/regulation require that entities governed by the Act give simple to understand notice of its information practices to all individuals, in clear and concise language, before any personal information is collected from them.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 2: Choice and Consent&lt;/strong&gt; - Does the legislation/regulation require that entities governed under the Act provide the individual with the option to opt in/opt out of providing their personal information.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 3: Collection Limitation&lt;/strong&gt; - Does the legislation/regulation require that entities governed under the Act collect personal information from individuals only as is necessary for a purpose identified.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 4: Purpose Limitation&lt;/strong&gt; - Does the legislation/regulation require that personal data collected and processed by entities governed by the Act be adequate and relevant to the purposes for which they are processed.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 5: Access and Correction&lt;/strong&gt; - Does the legislation/regulation allow individuals: access to personal information about them held by an entity governed by the Act; the ability to seek correction, amendments, or deletion of such information where it is inaccurate, etc.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 6: Disclosure&lt;/strong&gt; - Does the legislation ensure that information is only disclosed to third parties after notice and informed consent is obtained. Is disclosure allowed for law enforcement purposes done in accordance with laws in force.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 7: Security&lt;/strong&gt; - Does the legislation/regulation ensure that information that is collected and processed under that Act, is done so in a manner that protects against loss, unauthorized access, destruction, etc.&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 8: Openness&lt;/strong&gt; - Does the legislation/regulation require that any entity processing data take all necessary steps to implement practices, procedures, policies and systems in a manner proportional to the scale, scope, and sensitivity to the data that is collected and processed and is this information made available to all individuals in an intelligible form, using clear and plain language?&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Principle 9: Accountability&lt;/strong&gt; - Does the legislation/regulation provide for measures that ensure compliance of the privacy principles? This would include measures such as mechanisms to implement privacy policies; including tools, training, and education; and external and internal audits.&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Analysis of the Aadhaar Act&lt;/h2&gt;
&lt;p&gt;The Aadhaar Act has been brought about to give legislative backing to the most ambitious individual identity programme in the world which aims to provide a unique identity number to the entire population of India. The rationale behind this scheme is to correctly identify the beneficiaries of government schemes and subsidies so that leakages in government subsidies may be reduced. In furtherance of this rationale the Aadhaar Act gives the Unique Identification Authority of India (“UIDAI”) the power to enroll individuals by collecting their demographic and biometric information and issuing an Aadhaar number to them. Below is an analysis of the Act based on the privacy principles enumerated I the A.P. Shah Committee Report.&lt;/p&gt;
&lt;h3&gt;Collection Limitation&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Collection of Biometric and Demographic Information:&lt;/strong&gt; The Aadhaar Act entitles every “resident”
&lt;strong&gt;[1]&lt;/strong&gt; to obtain an Aadhaar number by submitting his/her biometric (photograph, finger print, Iris scan) and demographic information (name, date of birth, address &lt;strong&gt;[2]&lt;/strong&gt;) &lt;strong&gt;[3]&lt;/strong&gt;. It must be noted that the Act leaves scope for further information to be included in the collection process if so specified by regulations. It must be noted that although the Act specifically provides what information can be collected, it does not specifically prohibit the collection of further information. This becomes relevant because it makes it possible for enrolling agencies to collect extra information relating to individuals without any legal implications of such act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Authentication Records:&lt;/strong&gt; The UIDAI is mandated to maintain authentication records for a period which is yet to be specified (and shall be specified in the regulations) but it cannot collect or keep any information regarding the purpose for which the authentication request was made &lt;strong&gt;[4]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Unauthorized Collection:&lt;/strong&gt; Any person who in not authorized to collect information under the Act, and pretends that he is authorized to do so, shall be punishable with imprisonment for a term which may extend to three years or with a fine which may extend to Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/- &lt;strong&gt;[5]&lt;/strong&gt;. It must be noted that the section, as it is currently worded seems to criminalize the act of impersonation of authorized individuals and the actual collection of information is not required to complete this offence. It is not clear if this section will apply if a person who is authorized to collect information under the Act in general, collects some information that he/she is not authorized to collect.&lt;/p&gt;
&lt;h3&gt;Notice&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Notice during Collection:&lt;/strong&gt; The Aadhaar Act requires that the agencies enrolling people for distribution of Aadhaar numbers should give people notice regarding: (a) the manner in which the information shall be used; (b) the nature of recipients with whom the information is intended to be shared during authentication; and (c) the existence of a right to access information, the procedure for making requests for such access, and details of the person or department in-charge to whom such requests can be made &lt;strong&gt;[6]&lt;/strong&gt;. A failure to comply with this requirement will make the agency liable for imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/- &lt;strong&gt;[7]&lt;/strong&gt;. It must be noted that the Act leaves the manner of giving such notice in the realm of regulations and does not specify how this notice is to be provided, which leaves important specifics to the realm of the executive.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Notice during Authentication:&lt;/strong&gt; The Aadhaar Act requires that authenticating agencies shall give information to the individuals whose information is to be authenticated regarding (a) the nature of information that may be shared upon authentication; (b) the uses to which the information received during authentication may be put by the requesting entity; and (c) alternatives to submission of identity information to the requesting entity &lt;strong&gt;[8]&lt;/strong&gt;. A failure to comply with this requirement will make the agency liable for imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/- &lt;strong&gt;[9]&lt;/strong&gt;. Just as in the case of notice during collection, the manner in which the notice is required to be given is left to regulations leaving an unclear picture as to how comprehensive, accessible, and frequent this notice must be.&lt;/p&gt;
&lt;h3&gt;Access and Correction&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Updating Information:&lt;/strong&gt; The Aadhaar Act give the UIDAI the power to require residents to update their demographic and biometric information from time to time so as to maintain its accuracy &lt;strong&gt;[10]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Access to Information:&lt;/strong&gt; The Aadhaar Act provides that Aadhaar number holders may request the UIDAI to provide access to their identity information expect their core biometric information &lt;strong&gt;[11]&lt;/strong&gt;. It is not clear why access to the core biometric information &lt;strong&gt;[12]&lt;/strong&gt; is not provided to an individual. Further, since section 6 seems to place the responsibility of updation and accuracy of biometric information on the individual, it is not clear how a person is supposed to know that the biometric information contained in the database has changed if he/she does not have access to the same. It may also be noted that the Aadhaar Act provides only for a request to the UIDAI for access to the information and does not make access to the information a right of the individual, this would mean that it would be entirely upon the discretion of the UIDAI to refuse to grant access to the information once a request has been made.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Alteration of Information:&lt;/strong&gt; The Aadhaar Act gives individuals the right to request the UIDAI to alter their demographic if the same is incorrect or has changed and biometric information if it is lost or has changed. Upon receipt of such a request, if the UIDAI is satisfied, then it may make the necessary alteration and inform the individual accordingly. The Act also provides that no identity information in the Central database shall be altered except as provided in the regulations &lt;strong&gt;[13]&lt;/strong&gt;. This section provides for alteration of identity information but only in the circumstances given in the section, for example demographic information cannot be changed if it has been lost, similarly biometric information cannot be changed if it is inaccurate. Further, the section does not give a right to the individual to get the information altered but only entitles him/her to request the UIDAI to make a change and the final decision is left to the “satisfaction” of the UIDAI.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Access to Authentication Record:&lt;/strong&gt; Every individual is given the right to obtain his/her authentication record in a manner to be specified by regulations. [14]&lt;/p&gt;
&lt;h3&gt;Disclosure&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Sharing during Authentication:&lt;/strong&gt; The UIDAI is entitled to reply to any authentication query with a positive, negative or any other response which may be appropriate and may share identity information except core biometric information with the requesting entity &lt;strong&gt;[15]&lt;/strong&gt;. The language in this provision is ambiguous and it is unclear what 'identity information' may be shared and why it would be necessary to share such information as Aadhaar is meant to be  only a means of authentication so as to remove duplication.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Potential Disclosure during Maintenance of CIDR:&lt;/strong&gt; The UIDAI has been given the power to appoint any one or more entities to establish and maintain the Central Identities Data Repository (CIDR) &lt;strong&gt;[16]&lt;/strong&gt;. If a private entity is involved in the maintenance and establishment of the CIDR it can be presumed that there is the possibilty that they would, to some degree, have access to the information stored in the CIDR, yet there are no clear standards in the Act regarding this potential access. And the process for appointing such entities. The fact that the UIDAI has been given the freedom to appoint an outside entity to maintain a sensitive asset such as the CIDR raises security concerns.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Restriction on Sharing Information:&lt;/strong&gt; The Aadhaar Act creates a blanket prohibition on the usage of core biometric information for any purpose other than generation of Aadhaar numbers and also prohibits its sharing for any reason whatsoever &lt;strong&gt;[17]&lt;/strong&gt;. Other identity information is allowed to be shared in the manner specified under the Act or as may be specified in the regulations &lt;strong&gt;[18]&lt;/strong&gt;. The Act further provides that the requesting entities shall not disclose the identity information except with the prior consent of the individual to whom the information relates &lt;strong&gt;[19]&lt;/strong&gt;. There is also a prohibition on publicly displaying Aadhaar number or core biometric information except as specified by regulations &lt;strong&gt;[20]&lt;/strong&gt;. Officers or the UIDAI or the employees of the agencies employed to maintain the CIDR are prohibited from revealing the information stored in the CIDR or authentication record to anyone &lt;strong&gt;[21]&lt;/strong&gt;. It is not clear why an exception has been carved out and what circumstances would require publicly displaying Aadhaar numbers and core biometric information, especially since the reasons for which such important information may be displayed has been left up to regulations which have relatively less oversight. The section also provides the requesting entities with an option to further disclose information if they take consent of the individuals. This may lead to a situation where a requesting entity, perhaps the of an essential service, may take the consent of the individual to disclose his/her information in a standard form contract, without the option of saying no to such a request. It may lead to situations where the option is between giving consent to disclosure or denial or service altogether. For this reason it is necessary that there should be an opt in and opt out provision wherever a requesting entity has the power to ask for disclosure of information, so that people are not coerced into giving consent.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Disclosure in Specific Cases:&lt;/strong&gt; The prohibition on disclosure of information (except for core biometric information) does not apply in case of any disclosure made pursuant to an order of a court not below that of a District Judge &lt;strong&gt;[22]&lt;/strong&gt;. There is another exception to the prohibition on disclosure of information (including core biometric information) in the interest of national security if so directed by an officer not below the rank of a Joint Secretary to the Government of India specially authorised in this behalf by an order of the Central Government. Before any such direction can take effect, it will be reviewed by an oversight committee consisting of the Cabinet Secretary and the Secretaries to the Government of India in the Department of Legal Affairs and the Department of Electronics and Information Technology. Any such direction shall be valid for a period of three months and may be extended by another three months after the review by the Oversight Committee &lt;strong&gt;[23]&lt;/strong&gt;. Although this provision has been criticized, and rightly so, for the lack of accountability since the entire process is being handled within the executive and there is no independent oversight, however it must be mentioned that the level of oversight provided here is similar to that provided to interception requests, which involve a much graver if not the same level of invasion of privacy.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Penalty for Disclosure:&lt;/strong&gt; Any person who intentionally and in an unauthorized manner discloses, transmits, copies or otherwise disseminates any identity information collected in the course of enrolment or authentication shall be punishable with imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/ &lt;strong&gt;[24]&lt;/strong&gt;. Further any person who intentionally and in an unathorised manner, accesses information in the CIDR &lt;strong&gt;[25]&lt;/strong&gt;, downloads, copies or extracts any data from the CIDR &lt;strong&gt;[26]&lt;/strong&gt;, or reveals or shares or distributes any identity information, shall be punishable with imprisonment of upto 3 years and a fine of not less than Rs. 10,00,000/-.&lt;/p&gt;
&lt;h3&gt;Consent&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Consent for Authentication:&lt;/strong&gt; A requesting entity has to take the consent of the individual before collecting his/her identity information for the purposes of authentication and also has to inform the individual of the alternatives to submission of the identity information &lt;strong&gt;[27]&lt;/strong&gt;. Although this provision requires entities to take consent from the individuals before collecting information for authentication, however how useful this requirement of consent would be, still remains to be seen. There may be instances where a requesting entity may take the consent of the individual in a standard form contract, without the individual realizing what he/she is consenting to.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Note:&lt;/strong&gt; The Aadhaar Act provides no requirement or standard for the form of consent that must be taken during enrollment. This is significant as it is the point at which individuals are providing raw biometric material and during previous enrollment, has been a point of weakness as the consent taken is an enabler to function creep as it allows the UIDAI to share information with engaged in delivery of welfare services &lt;strong&gt;[28]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;Purpose&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Use of Information:&lt;/strong&gt; The authenticating entities are allowed to use the identity information only for the purpose of submission to the CIDR for authentication &lt;strong&gt;[29]&lt;/strong&gt;. Further, the Act specifies that identity information available with a requesting entity shall not be used for any purpose other than that specified to the individual at the time of submitting the information for authentication &lt;strong&gt;[30]&lt;/strong&gt;. The Act also provides that any authentication entity which uses the information for any purpose not already specified will be liable to punishment of imprisonment of upto 3 years or a fine of Rs. 10,000/- or both. In case of companies the maximum fine amount would be increased to Rs. 10,00,000/ &lt;strong&gt;[31]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;Security&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Security and Confidentiality of Information:&lt;/strong&gt; It is the responsibility of the UIDAI to ensure the security and confidentiality of the identity and authentication information and it is required to take all necessary action to ensure that the information in the CIDR is protected against unauthorized access, use or disclosure and against accidental or intentional destruction, loss or damage &lt;strong&gt;[32]&lt;/strong&gt;. The UIDAI is required to adopt and implement appropriate technical and organisational security measures and also ensure that its contractors do the same &lt;strong&gt;[33]&lt;/strong&gt;. It is also required to ensure that the agreements entered into with its contractors impose the same conditions as are imposed on the UIDAI under the Act and that they shall act only upon the instructions of the UIDAI &lt;strong&gt;[34]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Biometric Information to be Electronic Record:&lt;/strong&gt; The biometric information collected by the UIDAI has been deemed to be an “electronic record” as well as “sensitive personal data or information”, which would mean that in addition to the provisions of the Aadhaar Act, the provisions contained in the Information Technology Act, 2000 will also apply to such information &lt;strong&gt;[35]&lt;/strong&gt;. It must be noted that while the Act lays down the principle that UIDAI is required to ensure the saecurity of the information, it does not  lay down any guidelines as to the minimum security standards to be implemented by the Authority. However, through this section the legislature has linked the security standards contained in the IT Act to the information contained in this Act. While this is a clean way of dealing with the issue, some people may argue that the extremely sensitive nature of the information contained in the CIDR requires the standards for security to be much stricter than those provided in the IT Act. However, a perusal of Rule 8 of the Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011 shows that the Rules themselves provide that the standard of security must be commensurate with the information assets being protected. It would thus seem that the Act provides enough room to protect such important information, but perhaps leaves too much room for interpretation for such an important issue.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Penalty for Unauthorised Access:&lt;/strong&gt; Apart from the security provisions included in the legislation, the Aadhaar Act also provides for punishment of imprisonment of upto 3 years and a fine which shall not be less than Rs. 10,00,000/-, in case of the following offences:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;introduction of any virus or other computer contaminant in the CIDR &lt;strong&gt;[36]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;causing damage to the data in the CIDR &lt;strong&gt;[37]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;disruption of access to the CIDR &lt;strong&gt;[38]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;denial of access to any person who is authorised to access the CIDR &lt;strong&gt;[39]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;destruction, deletion or alteration of any information stored in any removable storage media or in the CIDR or diminishing its value or utility or affecting it injuriously by any means &lt;strong&gt;[40]&lt;/strong&gt;;&lt;/li&gt;
&lt;li&gt;stealing, concealing, destroying or altering any computer source code used by the Authority with an intention to cause damage &lt;strong&gt;[41]&lt;/strong&gt;.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;Further, unauthorized usage or tampering with the data in the CIDR or in any removable storage medium with the intent of modifying information relating to Aadhaar number holder or discovering any information thereof, is also punishable with imprisonment for a term which may extend to 3 years and also a fine which may extend to Rs. 10,000/- &lt;strong&gt;[42]&lt;/strong&gt;.&lt;/p&gt;
&lt;h3&gt;Accountability&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;Inspections and Audits:&lt;/strong&gt; One of the functions listed in the powers and functions of the UIDAI is the power to call for information and records, conduct inspections, inquiries and audit of the operations of the CIDR, Registrars, enrolling agencies and other agencies appointed under the Aadhaar Act &lt;strong&gt;[43]&lt;/strong&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Grievance Redressal:&lt;/strong&gt; Another function of the UIDAI is to set up facilitation centres and grievance redressal mechanisms for redressal of grievances of individuals, Registrars, enrolling agencies and other service providers &lt;strong&gt;[44]&lt;/strong&gt;. It must be said here that considering the importance that the government has given to and intends to give to Aadhaar in the future, an essential task such as grievance redressal should not be left entirely to the discretion of the UIDAI and some grievance redressal mechanism should be incorporated into the Act itself.&lt;/p&gt;
&lt;h3&gt;Openness&lt;/h3&gt;
&lt;p&gt;There does not seem to be any provision in the Aadhaar Act which requires the UIDAI to make its privacy policies and procedure available to the public in general even though the UIDAI has the responsibility to maintain the security and confidentiality of the information.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;Endnotes&lt;/h2&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; A resident is defined as any person who has resided in India for a period of atleasy 182 days in the previous 12 months.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; It has been specified that demographic information will not include race, religion, caste, tribe, ethnicity, language, records of entitlement, income or medical history.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; Section 3(1) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[4]&lt;/strong&gt; Section 32(1) and 32(3) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[5]&lt;/strong&gt; Section 36 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[6]&lt;/strong&gt; Section 3(2) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[7]&lt;/strong&gt; Section 41 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[8]&lt;/strong&gt; Section 8(3) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[9]&lt;/strong&gt; Section 41 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[10]&lt;/strong&gt; Section 6 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[11]&lt;/strong&gt; Section 28, &lt;em&gt;proviso&lt;/em&gt; of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[12]&lt;/strong&gt; Core biometric information is defined as fingerprints, iris scan or other biological attributes which may be specified by regulations.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[13]&lt;/strong&gt; Section 31 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[14]&lt;/strong&gt; Section 32(2) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[15]&lt;/strong&gt; Section 8(4) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[16]&lt;/strong&gt; Section 10 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[17]&lt;/strong&gt; Section 29(1) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[18]&lt;/strong&gt; Section 29(2) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[19]&lt;/strong&gt; Section 29(3)(b) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[20]&lt;/strong&gt; Section 29(4) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[21]&lt;/strong&gt; Section 28(5) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[22]&lt;/strong&gt; Section 33(1) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[23]&lt;/strong&gt; Section 33(2) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[24]&lt;/strong&gt; Section 37 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[25]&lt;/strong&gt; Section 38(a) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[26]&lt;/strong&gt; Section 38(b) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[27]&lt;/strong&gt; Section 8(2)(a) and (c) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[28]&lt;/strong&gt; For example, see: &lt;a href="http://www.karnataka.gov.in/aadhaar/Downloads/Application%20form%20-%20English.pdf"&gt;http://www.karnataka.gov.in/aadhaar/Downloads    /Application%20form%20-%20English.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[29]&lt;/strong&gt; Section 8(2)(b) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[30]&lt;/strong&gt; Section 29(3)(a) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[31]&lt;/strong&gt; Section 37 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[32]&lt;/strong&gt; Section 28(1), (2) and (3) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[33]&lt;/strong&gt; Section 28(4)(a) and (b) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[34]&lt;/strong&gt; Section 28(4)(c) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[35]&lt;/strong&gt; Section 30 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[36]&lt;/strong&gt; Section 38(c) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[37]&lt;/strong&gt; Section 38(d) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[38]&lt;/strong&gt; Section 38(e) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[39]&lt;/strong&gt; Section 38(f) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[40]&lt;/strong&gt; Section 38(h) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[41]&lt;/strong&gt; Section 38(i) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[42]&lt;/strong&gt; Section 39 of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[43]&lt;/strong&gt; Section 23(2)(l) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[44]&lt;/strong&gt; Section 23(2)(s) of the Aadhaar Act.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles'&gt;https://cis-india.org/internet-governance/blog/analysis-of-aadhaar-act-in-context-of-shah-committee-principles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-03-17T19:43:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016">
    <title>List of Recommendations on the Aadhaar Bill, 2016 - Letter Submitted to the Members of Parliament</title>
    <link>https://cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016</link>
    <description>
        &lt;b&gt;On Friday, March 11, the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. The Bill was introduced as a money bill and there was no public consultation to evaluate the provisions therein even though there are very serious ramifications for the Right to Privacy and the Right to Association and
Assembly. Based on these concerns, and numerous others, we submitted an initial list of recommendations to the Members of Parliaments to highlight the aspects of the Bill that require immediate attention.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;Download the submission letter: &lt;a href="https://github.com/cis-india/website/raw/master/docs/CIS_Aadhaar-Bill-2016_List-of-Recommendations_2016.03.16.pdf"&gt;PDF&lt;/a&gt;.&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Text of the Submission&lt;/h3&gt;
&lt;p&gt;On Friday, March 11, the Lok Sabha passed the Aadhaar (Targeted Delivery of Financial and Other Subsidies, Benefits and Services) Bill, 2016. The Bill was introduced as a money bill and there was no public consultation to evaluate the provisions therein even though there are very serious ramifications for the Right to Privacy and the Right to Association and Assembly. The Bill has made it compulsory for all Indian to enroll for Aadhaar in order to receive any subsidy, benefit, or service from the Government whose expenditure is incurred from the Consolidate Fund of India. Apart from the issue of centralisation of the national biometric database leading to a deep national vulnerability, the Bill also keeps unaddressed two serious concerns regarding the technological framework concerned:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Identification without Consent:&lt;/strong&gt; Before the Aadhaar project it was not possible for the Indian government or any private entity to identify citizens (and all residents) without their consent. But biometrics allow for non-consensual and covert identification and authentication. The only way to fix this is to change the technology configuration and architecture of the project. The law cannot be used to correct the problems in the technological design of the project.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Fallible Technology:&lt;/strong&gt; The Biometrics Standards Committee of UIDAI has acknowledged the lack of data on how a biometric authentication technology will scale up where the population is about 1.2 billion. The technology has been tested and found feasible only for a population of 200 million. Further, a report by 4G Identity Solutions estimates that while in any population, approximately 5% of the people have unreadable fingerprints, in India it could lead to a failure to enroll up to 15% of the population. For the current Indian population of 1.2 billion the expected proportion of duplicates is 1/121, a ratio which is far too high. &lt;strong&gt;[1]&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Based on these concerns, and numerous others, we sincerely request you to ensure that the Bill is rigorously discussed in Rajya Sabha, in public, and, if needed, also by a Parliamentary Standing Committee, before considering its approval and implementation. Towards this, we humbly submit an initial list of recommendations to highlight the aspects of the Bill that require immediate attention:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;&lt;strong&gt;Implement the Recommendations of the Shah and Sinha Committees:&lt;/strong&gt; The report by the Group of Experts on Privacy chaired by the Former Chief Justice A P Shah &lt;strong&gt;[2]&lt;/strong&gt; and the report by the Parliamentary Standing Committee on Finance (2011-2012) chaired by Shri Yashwant Sinha &lt;strong&gt;[3]&lt;/strong&gt; have suggested a rigorous and extensive range of recommendations on the Aadhaar / UIDAI / NIAI project and the National Identification Authority of India Bill, 2010 from which the majority sections of the Aadhaar Bill, 2016, are drawn. We request that these recommendations are seriously considered and incorporated into the Aadhaar Bill, 2016.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Authentication using the Aadhaar number for receiving government subsidies, benefits, and services cannot be made mandatory:&lt;/strong&gt; Section 7 of the Aadhaar Bill, 2016, states that authentication of the person using her/his Aadhaar number can be made mandatory for the purpose of disbursement of government subsidies, benefits, and services; and in case the person does not have an Aadhaar number, s/he will have to apply for Aadhaar enrolment. This sharply contradicts the claims made by UIDAI earlier that the Aadhaar number is “optional, and not mandatory”, and more importantly the directive given by the Supreme Court (via order dated August 11, 2015). The Bill must explicitly state that the Aadhaar number is only optional, and not mandatory, and a person without an Aadhaar number cannot be denied any democratic rights, and public subsidies, benefits, and services, and any private services.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Vulnerabilities in the Enrolment Process:&lt;/strong&gt; The Bill does not address already documented issues in the enrolment process. In the absence of an exhaustive list of information to be collected, some Registrars are permitted to collect extra and unnecessary information. Also, storage of data for elongated periods with Enrollment agencies creates security risks. These vulnerabilities need to be prevented through specific provisions.  It should also be mandated for all entities including the Enrolment Agencies, Registrars, CIDR and the requesting entities to shift to secure system like PKI based cryptography to ensure secure method of data transfer.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Precisely Define and Provide Legal Framework for Collection and Sharing of Biometric Data of Citizens:&lt;/strong&gt; The Bill defines “biometric information” is defined to include within its scope “photograph, fingerprint, iris scan, or other such biological attributes of an individual.” This definition gives broad and sweeping discretionary power to the UIDAI / Central Government to increase the scope of the term. The definition should be exhaustive in its scope so that a legislative act is required to modify it in any way.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Prohibit Central Storage of Biometrics Data:&lt;/strong&gt; The presence of central storage of sensitive personal information of all residents in one place creates a grave security risk. Even with the most enhanced security measures in place, the quantum of damage in case of a breach is extremely high. Therefore, storage of biometrics must be allowed only on the smart cards that are issued to the residents.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Chain of Trust Model and Audit Trail:&lt;/strong&gt; As one of the objects of the legislation is to provide targeted services to beneficiaries and reduce corruption, there should be more accountability measures in place. A chain of trust model must be incorporated in the process of enrolment where individuals and organisations vouch for individuals so that when a ghost is introduced someone has can be held accountable blame is not placed simply on the technology. This is especially important in light of the questions already raised about the deduplication technology. Further, there should be a transparent audit trail made available that allows public access to use of Aadhaar for combating corruption in the supply chain.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Rights of Residents:&lt;/strong&gt; There should be specific provisions dealing with cases where an individual is not issued an Aadhaar number or denied access to benefits due to any other factor. Additionally, the Bill should make provisions for residents to access and correct information collected from them, to be notified of data breaches and legal access to information by the Government or its agencies, as matter of right. Further, along with the obligations in Section 8, it should also be mandatory for all requesting entities to notify the individuals of any changes in privacy policy, and providing a mechanism to opt-out.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Establish Appropriate Oversight Mechanisms:&lt;/strong&gt; Section 33 currently specifies a procedure for oversight by a committee, however, there are no substantive provisions laid down that shall act as the guiding principles for such oversight mechanisms. The provision should include data minimisation, and “necessity and proportionality” principles as guiding principles for any exceptions to Section 29.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;Establish Grievance Redressal and Review Mechanisms:&lt;/strong&gt; Currently, there are no grievance redressal mechanism created under the Bill. The power to set up such a mechanism is delegated to the UIDAI under Section 23 (2) (s) of the Bill. However, making the entity administering a project, also responsible for providing for the frameworks to address the grievances arising from the project, severely compromises the independence of the grievance redressal body. An independent national grievance redressal body with state and district level bodies under it, should be set up. Further, the NIAI Bill, 2010, provided for establishing an Identity Review Committee to monitor the usage pattern of Aadhaar numbers. This has been removed in the Aadhaar Bill 2016, and must be restored.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Endnotes&lt;/h3&gt;
&lt;p&gt;&lt;strong&gt;[1]&lt;/strong&gt; See: &lt;a href="http://cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf."&gt;http://cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[2]&lt;/strong&gt; See: &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;[3]&lt;/strong&gt; See: &lt;a href="http://164.100.47.134/lsscommittee/Finance/15_Finance_42.pdf"&gt;http://164.100.47.134/lsscommittee/Finance/15_Finance_42.pdf&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016'&gt;https://cis-india.org/internet-governance/blog/list-of-recommendations-on-the-aadhaar-bill-2016&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha, Sumandro Chattapadhyay, Sunil Abraham, and Vanya Rakesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-03-21T08:50:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process">
    <title>Flaws in the UIDAI Process </title>
    <link>https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process</link>
    <description>
        &lt;b&gt;The accuracy of biometric identification depends on the chance of a false positive: the probability that the identifiers of two persons will match. Individuals whose identifiers match might be termed duplicands. When very many people are to be identified success can be measured by the (low) proportion of duplicands. The Government of India is engaged upon biometrically identifying the entire population of India. An experiment performed at an early stage of the programme has allowed us to estimate the chance of a false positive: and from that to estimate the proportion of duplicands. For the current population of 1.2 billion the expected proportion of duplicands is 1/121, a ratio which is far too high. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html"&gt;Economic &amp;amp; Political Weekly&lt;/a&gt;, Journal » Vol. 51, Issue No. 9, 27 Feb, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;A legal challenge is being mounted in the Supreme Court, currently, to the programme of biometric identification that the Unique Identification Authority of India (UIDAI) is engaged upon: an identification preliminary and a requisite to providing citizens with “Aadhaar numbers” that can serve them as “unique identiﬁers” in their transactions with the state. What follows will recount an assessment of their chances of success. We shall be using data that was available to the UIDAI and shall employ only elementary ways of calculation. It should be recorded immediately that an earlier technical paper by the author (Mathews 2013) has been of some use to the plaintiffs, and reference will be made to that in due course.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Aadhaar numbers themselves may or may not derive, in some way, from the biometrics in question; the question is not material here. For our purposes a biometric is a numerical representation of some organic feature: like the iris or the retina, for instance, or the inside of a ﬁnger, or the hand taken whole even. We shall consider them in some more detail later. The UIDAI is using ﬁngerprints and iris images to generate a combination of biometrics for each individual. This paper bears on the accuracy of the composite biometric identiﬁer. How well those composites will distinguish between individuals can be assessed, actually, using the results of an experiment conducted by the UIDAI itself in the very early stages of its operation; and our contention is that, from those results themselves, the UIDAI should have been able to estimate &lt;i&gt;how many individuals would have their biometric identiﬁers matching those of some other person&lt;/i&gt;, under the best of circumstances even, when any good part of population has been identiﬁed.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/Flaws_in_the_UIDAI_Process_0.pdf"&gt;Read the full article here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;The author thanks Nico Temme of the Centrum Wiskunde &amp;amp; Informatica in The Netherlands for the bounds he derived on the chance of a false positive. He is particularly grateful to the anonymous referee of this journal who, through two rounds of comment, has very much improved the presentation of the results. A technical supplement to this paper is placed on the EPW website along with this paper&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process'&gt;https://cis-india.org/internet-governance/blog/epw-27-february-2016-hans-varghese-mathews-flaws-in-uidai-process&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>hans</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-03-06T10:40:59Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion">
    <title>Comments by the Centre for Internet and Society on the Report of the Committee on Medium Term Path on Financial Inclusion </title>
    <link>https://cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion</link>
    <description>
        &lt;b&gt;Apart from item-specific suggestions, CIS would like to make one broad comment with regard to the suggestions dealing with linking of Aadhaar numbers with bank accounts. Aadhaar is increasingly being used by the government in various departments as a means to prevent fraud, however there is a serious dearth of evidence to suggest that Aadhaar linkage actually prevents leakages in government schemes. The same argument would be applicable when Aadhaar numbers are sought to be utilized to prevent leakages in the banking sector.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Centre for Internet and Society (CIS) is a non-governmental organization which undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In the course of its work CIS has also extensively researched and witten about the Aadhaar Scheme of the Government of India, specially from a privacy and technical point of view. CIS was part of the Group of Experts on Privacy constituted by the Planning Commission under the chairmanship of Justice AP Shah Committee and was instrumental in drafting a major part of the report of the Group. In this background CIS would like to mention that it is neither an expert on banking policy in general nor wishes to comment upon the purely banking related recommendations of the Committee. We would like to limit our recommendations to the areas in which we have some expertise and would therefore be commenting only on certain Recommendations of the Committee.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Before giving our individual comments on the relevant recommendations, CIS would like to make one broad comment with regard to the suggestions dealing with linking of Aadhaar numbers with bank accounts. Aadhaar is increasingly being used by the government in various departments as a means to prevent fraud, however there is a serious dearth of evidence to suggest that Aadhaar linkage actually prevents leakages in government schemes. The same argument would be applicable when Aadhaar numbers are sought to be utilized to prevent leakages in the banking sector.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Another problem with linking bank accounts with Aadhaar numbers, even if it is not mandatory, is that when the RBI issues an advisory to (optionally) link Aadhaar numbers with bank accounts, a number of banks may implement the advisory too strictly and refuse service to customers (especially marginal customers) whose bank accounts are not linked to their Aadhaar numbers, perhaps due to technical problems in the registration procedure, thereby denying those individuals access to the banking sector, which is contrary to the aims and objectives of the Committee and the stated policy of the RBI to improve access to banking.&lt;/p&gt;
&lt;h3 style="text-align: justify;"&gt;Individual Comments&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 1.4 - Given the predominance of individual account holdings, the Committee recommends that a unique biometric identifier such as Aadhaar should be linked to each individual credit account and the information shared with credit information companies. This will not only be useful in identifying multiple accounts, but will also help in mitigating the overall indebtedness of individuals who are often lured into multiple borrowings without being aware of its consequences.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: The discussion of the committee before making this recommendation revolves around the total incidence of indebtedness in rural areas and their Debt-to-Asset ratio representing payment capacity. However, the committee has not discussed any evidence which indicates that borrowing from multiple banks leads to greater indebtedness for individual account holders in the rural sector. Without identifying the problem through evidence the Committee has suggested linking bank accounts with Aadhaar numbers as a solution.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 2.2 - On the basis of cross-country evidence and our own experience, the Committee is of the view that to translate financial access into enhanced convenience and usage, there is a need for better utilization of the mobile banking facility and the maximum possible G2P payments, which would necessitate greater engagement by the government in the financial inclusion drive.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: The drafting of the recommendation suggests that RBI is batting for the DBT rather than the subsidy model. However an examination of the discussion in the report suggests that all that the Committee has not discussed or examined the subsidy model vis-à-vis the direct benefit transfer (DBT) model here (though it does recommend DBT in the chapter on G-2-P payments), but only is trying to say is that where government to people money transfer has to take place, it should take place using mobile banking, payment wallets or other such technologies, which have been known to be successful in various countries across the world.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 3.1 - The Committee recommends that in order to increase formal credit supply to all agrarian segments, the digitization of land records should be taken up by the states on a priority basis.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 3.2 - In order to ensure actual credit supply to the agricultural sector, the Committee recommends the introduction of Aadhaar-linked mechanism for Credit Eligibility Certificates. For example, in Andhra Pradesh, the revenue authorities issue Credit Eligibility Certificates to Tenant Farmers (under ‘Andhra Pradesh Land Licensed Cultivators Act No 18 of 2011'). Such tenancy /lease certificates, while protecting the owner’s rights, would enable landless cultivators to obtain loans. The Reserve Bank may accordingly modify its regulatory guidelines to banks to directly lend to tenants / lessees against such credit eligibility certificates.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: The Committee in its discussion before the recommendation 3.2 has discussed the problems faced by landless farmers, however there is no discussion or evidence which suggests that an Aadhaar linked Credit Eligibility Certificate is the best solution, or even a solution to the problem. The concern being expressed here is not with the system of a Credit Eligibility Certificate, but with the insistence on linking it to an Aadhaar number, and whether the system can be put in place without linking the same to an Aadhaar number.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 6.11 - Keeping in view the indebtedness and rising delinquency, the Committee is of the view that the credit history of all SHG members would need to be created, linking it to individual Aadhaar numbers. This will ensure credit discipline and will also provide comfort to banks.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: There is no discussion in the Report on the reasons for increase in indebtedness of SHGs. While the recommendation of creating credit histories for SHGs is laudable and very welcome, however there is no logical reason that has been brought out in the Report as to why the same needs to be linked to individual Aadhaar numbers and how such linkage will solve any problems.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 6.13 - The Committee recommends that bank credit to MFIs should be encouraged. The MFIs must provide credit information on their borrowers to credit bureaus through Aadhaar-linked unique identification of individual borrowers.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: Since the discussion before this recommendation clearly indicates multiple lending practices as one of the problems in the Microfinance sector and also suggests better credit information of borrowers as a possible solution, therefore this recommendation per se, seems sound. However, we would still like to point out that the RBI may think of alternative means to get borrower credit history rather than relying upon just the Aadhaar numbers.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 7.3 - Considering the widespread availability of mobile phones across the country, the Committee recommends the use of application-based mobiles as PoS for creating necessary infrastructure to support the large number of new accounts and cards issued under the PMJDY. Initially, the FIF can be used to subsidize the associated costs. This will also help to address the issue of low availability of PoS compared to the number of merchant outlets in the country. Banks should encourage merchants across geographies to adopt such applicationbased mobile as a PoS through some focused education and PoS deployment drives.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 7.5 - The Committee recommends that the National Payments Corporation of India (NPCI) should ensure faster development of a multi-lingual mobile application for customers who use non-smart phones, especially for users of NUUP; this will address the issue of linguistic diversity and thereby promote its popularization and quick adoption.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 7.8 - The Committee recommends that pre-paid payment instrument (PPI) interoperability may be allowed for non-banks to facilitate ease of access to customers and promote wider spread of PPIs across the country. It should however require non-bank PPI operators to enhance their customer grievance redressal mechanism to deal with any issues thereof.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 7.9 - The Committee is of the view that for non-bank PPIs, a small-value cashout may be permitted to incentivize usage with the necessary safeguards including adequate KYC and velocity checks.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comments&lt;/strong&gt;: While CIS supports the effort to use technology and mobile phones to increase banking penetration and improve access to the formal financial sector for rural and semi-rural areas, sufficient security mechanisms should be put in place while rolling out these services keeping in mind the low levels of education and technical sophistication that are prevalent in rural and semi-rural areas.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 8.1 - The Committee recommends that the deposit accounts of beneficiaries of government social payments, preferably all deposits accounts across banks, including the ‘inprinciple’ licensed payments banks and small finance banks, be seeded with Aadhaar in a timebound manner so as to create the necessary eco-system for cash transfer. This could be complemented with the necessary changes in the business correspondent (BC) system (see Chapter 6 for details) and increased adoption of mobile wallets to bridge the ‘last mile’ of service delivery in a cost-efficient manner at the convenience of the common person. This would also result in significant cost reductions for the government besides promoting financial inclusion.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: While the report of the Committee has already given several examples of how cash transfer directly into the bank accounts (rather than requiring the beneficiaries to be at a particular place at a particular time) could be more efficient as well as economical, the Committee is making the same point again here under the chapter that deals specifically with government to person payments. However even before this recommendation, there has been no discussion as to the need for linking or “seeding” the deposit accounts of the beneficiaries with Aadhaar numbers, let alone a discussion of how it would solve any problems.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;em&gt;Recommendation 10.6 - Given the focus on technology and the increasing number of customer complaints relating to debit/credit cards, the National Payments Corporation of India (NPCI) may be invited to SLBC meetings. They may particularly take up issues of Aadhaar-linkage in bank and payment accounts.&lt;/em&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;CIS Comment&lt;/strong&gt;: There is no discussion on why this recommendation has been made, more particularly; there is no discussion at all on why issues of Aadhaar linkage in bank and payment accounts need to be taken up at all.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion'&gt;https://cis-india.org/internet-governance/blog/comments-by-the-centre-for-internet-and-society-on-the-report-of-the-committee-on-medium-term-path-on-financial-inclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Financial Inclusion</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2016-03-01T13:53:38Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them">
    <title>Facebook Shares 10 Key Facts about Free Basics. Here's What's Wrong with All 10 of Them.</title>
    <link>https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them</link>
    <description>
        &lt;b&gt;Shweta Sengar of Catch News spoke to Sunil Abraham about the recent advertisement by Facebook titled "What Net Neutrality Activists won't Tell You or, the Top 10 Facts about Free Basics". Sunil argued against the validity of all the 'top 10 facts'.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Facebook has rebranded internet.org as Free Basics. After suffering from several harsh blows from the net neutrality activists in India, the social media behemoth is positioning a movement in order to capture user attention.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Apart from a mammoth two page advertisement on Free Basics on 23 December in a leading English daily, we spotted a numerous hoardings across the capital.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Unlike Facebook, Wikipedia has a rather upfront approach for raising funds. You must have noticed a pop-up as you open Wikipedia when they are in need of funds. What Facebook has done is branded Free Basics as 'free' as the basic needs of life.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The newspaper advertisement by Facebook was aimed at clearing all the doubts about Free Basics. The 10 facts highlighted a connected India and urging users to take the "first step towards digital equality."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In an interview with &lt;em&gt;Catch&lt;/em&gt;, Sunil Abraham, Executive Director of Bangalore based research organisation, the Centre for Internet and Society, shared his thoughts on the controversial subject. Abraham countered each of Facebook's ten arguments. Take a look:&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;01&lt;/strong&gt; Free basics is open to any carriers. Any mobile operator can join us in  connecting India.&lt;/blockquote&gt;
&lt;p&gt;Sunil Abraham: Free Basics was initially exclusive to only one telecom operator in most markets that it was available in.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The non-exclusivity was introduced only after activists in India complained. But now the arrangement is exclusive to Free Basics as a walled garden provider. But discrimination harms remain until other Internet services can also have what Facebook has from telecom operators ie. free access to their destinations.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;02&lt;/strong&gt; We do not charge anyone anything for Free Basics. Period.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: As Bruce Schneier says "surveillance is the business model of the Internet". Free basics users are subject to an additional layer of surveillance ie. the data retention by the Facebook proxy server. Just as Facebook cannot say that they are ignoring Data Protection law because Facebook is a free product - they cannot say that Free Basics can violate network neutrality law because it is a free service. For ex. Flipkart should get Flipkart Basic on all Indian ISPs and Telcos.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;03&lt;/strong&gt; We do not pay for the data consumed in Free Basics. Operators participate  because the program has proven to bring more people online. Free Basics has brought new people onto mobile networks on average over 50% faster since launching the service.&lt;/blockquote&gt;
&lt;p&gt;SA: Facebook has been quoting statistics as evidence to influence the policy formulation process. But we need the absolute numbers and we also need them to be independently verifiable. At the very least we need the means to cross verify these numbers with numbers that telcos and ISPs routinely submit to TRAI.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Theoretical harms must be addressed through net neutrality regulation. For example, you don't have to build a single, centralised database of all Indian citizens to know that it can be compromised - from a security design perspective centralisation is always a bad idea. Gatekeeping powers given to any powerful entity will be compromised. While evidence is useful, regulation can already begin based on well established regulatory principles. After scientific evidence has been made available - the regulation can be tweaked.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;04&lt;/strong&gt; Any developer or publisher can have their content on Free Basics. There are  clear technical specs openly published here ... and we have never rejected an app or publisher who has me these tech specs.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Again this was only done as a retrospective fix after network neutrality activists in India complained about exclusive arrangements. For example, the music streaming service Hungama is not a low-bandwidth destination but since it was included the technical specifications only mentions large images and video files. Many of the other sites are indistinguishable from their web equivalents clearly indicating that this was just an afterthought. At the moment Free Basics has become controversial so most developers and publishers are not approaching them so there is no way for us to verify Facebook's claim.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;05&lt;/strong&gt; Nearly 800 developers in India have signed their support for Free Basics.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: I guess these are software developers working in the services industry who don't see themselves as potential competition to Facebook or any of the services within Free Basics. Also since Facebook as been completely disingenuous when it comes to soliciting support for their campaigns it is very hard to believe these claims. It has tried to change the meaning of the phrase "net neutrality" and has framed the debate in an inaccurate manner - therefore I could quite confidently say that these developers must have been fooled into supporting Free Basics.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;06&lt;/strong&gt; It is not a walled garden: In India, 40% of people who come online through Free  Basics are paying for data and accessing the full internet within the first 30 days. In the same time period, 8 times more people are paying versus staying on just&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Again, no absolute numbers and also no granularity in the data that makes it impossible for anyone to verify these numbers. Also there is no way to compare these numbers to access options that are respectful of network neutrality such as equal rating. If the numbers are roughly the same for equal rating and zero-rating then there is no strong case to be made for zero-rating.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;07&lt;/strong&gt; Free Basics is growing and popular in 36 other countries, which have welcomed  the program with open arms and seen the enormous benefits it has brought.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Free Basics was one of the most controversial topics at the last Internet Governance Forum. A gratis service is definitely going to be popular but that does not mean forbearance is the only option for the regulator. In countries with strong civil society and/or a strong regulator, Free Basics has ran into trouble. Facebook has been able to launch Free Basics only in jurisdictions where regulators are still undecided about net neutrality. India and Brazil are the last battle grounds for net neutrality and that is why Facebook is spending  advertising dollar and using it's infrastructure to win the global south.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;08&lt;/strong&gt; In a recent representative poll, 86% of Indians supported Free Basics by  Facebook, and the idea that everyone deserves access to free basic internet services.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: This is the poll which was framed in alarmist language where Indian were asked to choose between perpetuating or bridging the digital divide. This is a false choice that Facebook is perpetuating - with forward-looking positive Network Neutrality rules as advocated by Dr. Chris Marsden it should be possible to bridge digital divide without incurring any free speech, competition, innovation and diversity harms.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;09&lt;/strong&gt; In the past several days, 3.2 million people have petitioned the TRAI in  support of Free Basics.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: Obviously - since Free Basics is better than nothing. But the real choice should have been - are you a) against network neutrality ie. would you like to see Facebook play gatekeeper on the Internet OR b) for network neutrality ie. would you like to see Free Basics forced to comply with network neutrality rules  and expand access without harms to consumers and innovators.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;blockquote&gt;&lt;strong&gt;10&lt;/strong&gt; There are no ads in the version of Facebook on Free Basics. Facebook produces  no revenue. We are doing this to connect India, and the benefits to do are clear.&lt;/blockquote&gt;
&lt;p style="text-align: justify;"&gt;SA: As someone who has watched the Internet economy since the first dot com boom - it is absolutely clear that consumer acquisition is as important as revenues. They are doing it to connect people to Facebook and as a result some people will also connect to the Internet. But India is the last market on the planet where the walled garden can be bigger than the Internet, and therefore Facebook is manipulating the discourse through it's dominance of the networked public sphere.&lt;/p&gt;
&lt;p&gt;Bravo to TRAI and network neutrality activists for taking Facebook on.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published by &lt;a href="http://www.catchnews.com/tech-news/should-facebook-become-internet-s-gatekeeper-or-free-basics-must-comply-with-net-neutrality-sunil-abraham-has-some-thoughts-1450954347.html" target="_blank"&gt;Catch News&lt;/a&gt;, on December 24, 2015.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them'&gt;https://cis-india.org/internet-governance/news/facebook-shares-10-key-facts-about-free-basics-heres-whats-wrong-with-all-10-of-them&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Facebook</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-12-25T14:59:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview">
    <title>Smart Cities in India: An Overview</title>
    <link>https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview</link>
    <description>
        &lt;b&gt;The Government of India is in the process of developing 100 smart cities in India which it sees as the key to the country's economic and social growth. This blog post gives an overview of the Smart Cities project currently underway in India. The smart cities mission in India is at a nascent stage and an evolving area for research. The Centre for Internet and Society will continue work in this area.&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Overview of the 100 Smart Cities Mission&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Government of India announced its flagship programme- the 100 Smart Cities mission in the year 2014 and was launched in June 2015 to achieve urban 	transformation, drive economic growth and improve the quality of life of people by enabling local area development and harnessing technology. Initially, 	the Mission aims to cover 100 cities across the countries (which have been shortlisted on the basis of a Smart Cities Proposal prepared by every city) and 	its duration will be five years (FY 2015-16 to FY 2019-20). The Mission may be continued thereafter in the light of an evaluation to be done by the 	Ministry of Urban Development (MoUD) and incorporation of the learnings into the Mission. The Mission aims to focus on area-based development in the form 	of redevelopment of existing spaces, or the development of new areas (Greenfield) to accommodate the growing urban population and ensure comprehensive planning to improve quality of life, create employment and enhance incomes for all - especially the poor and the disadvantaged.	&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; On 27th August 2015 the Centre unveiled 98 smart cities across India which were selected for this Project. Across the selected cities, 13 crore population ( 35% of the urban population will be included in the development plans.	&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The mission has been developed for the purpose of achieving urban transformation. 	The vision is to preserve India's traditional architecture, culture &amp;amp; ethnicity while implementing modern technology to make cities livable, use 	resources in a sustainable manner and create an inclusive environment. &lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The promises of the Smart City mission include reduction of carbon footprint, adequate water and electricity supply, proper sanitation, including solid 	waste management, efficient urban mobility and public transport, affordable housing, robust IT connectivity and digitalization, good governance, citizen 	participation, security of citizens, health and education.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Why and How was the Smart Cities project conceptualized in India? What was the need for such a project in India?&lt;/li&gt;
&lt;li&gt;What was the role of the public/citizens at the ideation and conceptualization stage of the project?&lt;/li&gt;
&lt;li&gt;Which actors from the Government, Private industry and the civil society are involved in this mission? Though the smart cities mission has been 	initiated by the Government of India under the Ministry of Urban Development, there is no clarity about the involvement of the associated offices and 	departments of the Ministry.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;How are the Smart Cities being selected?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The 100 cities were supposed to be selected on the basis of Smart cities challenge&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; involving two stages. Stage I of the challenge involved Intra-State city selection on objective criteria to identify cities to compete in stage-II. In August 2015, The Ministry of Urban Development, Government of India announced 100 smart cities	&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; evaluated on parameters such as service levels, financial and institutional 	capacity, past track record, called as the 'shortlisted cities' for this purpose. The selected cities are now competing for selection in the Second stage 	of the challenge, which is an All India competition. For this crucial stage, the potential 100 smart cities are required to prepare a Smart City Proposal 	(SCP) stating the model chosen (retrofitting, redevelopment, Greenfield development or a mix), along with a Pan-City dimension with Smart Solutions. The 	proposal must also include suggestions collected by way of consultations held with city residents and other stakeholders, along with the proposal for 	financing of the smart city plan including the revenue model to attract private participation. The country saw wide participation from the citizens to 	voice their aspirations and concerns regarding the smart city. 15th December 2015 has been declared as the deadline for submission of the SCP, which must be in consonance with evaluation criteria set by The MoUD, set on the basis of professional advice.	&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; On the basis of this, 20 cities will be selected for the first year. According to 	the latest reports, the Centre is planning to fund only 10 cities for the first phase in case the proposals sent by the states do not match the expected quality standards and are unable to submit complete area-development plans by the deadline, i.e. 15th December, 2015.	&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Who would be undertaking the task of evaluating and selecting the cities for this project?&lt;/li&gt;
&lt;li&gt;What are the criteria for selection of a city to qualify in the first 20 (or 10, depending on the Central Government) for the first phase of 	implementation?&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;How are the smart cities going to be Funded?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Smart City Mission will be operated as a Centrally Sponsored Scheme (CSS) and the Central Government proposes to give financial support to the Mission to the extent of Rs. 48,000 crores over five years i.e. on an average Rs. 100 crore per city per year.	&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The additional resources will have to be mobilized by the State/ ULBs from 	external/internal sources. According to the scheme, once list of shortlisted Smart Cities is finalized, Rs. 2 crore would have been disbursed to each city 	for proposal preparation.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to estimates of the Central Government, around Rs 4 lakh crore of funds will be infused mainly through private investments and loans from multilateral institutions among other sources, which accounts to 80% of the total spending on the mission.	&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For this purpose, the Government will approach the World Bank and the Asian 	Development Bank (ADB) for a loan costing £500 million and £1 billion each for 2015-20. If ADB approves the loan, it would be it will be the 	bank's highest funding to India's urban sector so far.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Foreign Direct Investment regulations have been relaxed to invite foreign capital and help into the Smart City Mission.	&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Government notes on Financing of the project mentions PPPs for private funding and leveraging of resources from internal and external 	resources. There is lack of clarity on the external resources the Government has/will approach and the varied PPP agreements the Government is or is 	planning to enter into for the purpose of private investment in the smart cities.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;How is the scheme being implemented?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Under this scheme, each city is required to establish a Special Purpose Vehicle (SPV) having flexibility regarding planning, implementation, management and 	operations. The body will be headed by a full-time CEO, with nominees of Central Government, State Government and ULB on its Board. The SPV will be a 	limited company incorporated under the Companies Act, 2013 at the city-level, in which the State/UT and the Urban Local Body (ULB) will be the promoters 	having equity shareholding in the ratio 50:50. The private sector or financial institutions could be considered for taking equity stake in the SPV, 	provided the shareholding pattern of 50:50 of the State/UT and the ULB is maintained and the State/UT and the ULB together have majority shareholding and 	control of the SPV. Funds provided by the Government of India in the Smart Cities Mission to the SPV will be in the form of tied grant and kept in a 	separate Grant Fund.&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the purpose of implementation and monitoring of the projects, the MoUD has also established an Apex Committee and National Mission Directorate for 	National Level Monitoring&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, a State Level High Powered Steering Committee (HPSC) for State Level Monitoring&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and a Smart City Advisory Forum at the City Level	&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also, several consulting firms&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; have been assigned to the 100 cities to help them prepare action plans.&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Some of them include CRISIL, KPMG, McKinsey, etc.	&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;What policies and regulations have been put in place to account for the smart cities, apart from policies looking at issues of security, privacy, 	etc.?&lt;/li&gt;
&lt;li&gt;What international/national standards will be adopted while development of the smart cities? Though the Bureau of Indian Standards is in the 	process of formulating standardized guidelines for the smart cities in India&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, yet 	there is lack of clarity on adoption of these national standards, along with the role of international standards like the ones formulated by ISO.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;What is the role of Foreign Governments and bodies in the Smart cities mission?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ever since the government's ambitious project has been announced and cities have been shortlisted, many countries across the globe have shown keen interest 	to help specific shortlisted cities in building the smart cities and are willing to invest financially. Countries like Sweden, Malaysia, UAE, USA, etc. 	have agreed to partner with India for the mission.&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For example, UK has partnered 	with the Government to develop three India cities-Pune, Amravati and Indore.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Israel's start-up city Tel Aviv also entered into an agreement to help with urban transformation in the Indian cities of Pune, Nagpur and Nashik to foster 	innovation and share its technical know-how.&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; France has piqued interest for 	Nagpur and Puducherry, while the United States is interested in Ajmer, Vizag and Allahabad. Also, Spain's Barcelona Regional Agency has expressed interest 	in exchanging technology with the Delhi. Apart from foreign government, many organizations and multilateral agencies are also keen to partner with the 	Indian government and have offered financial assistance by way of loans. Some of them include the UK government-owned Department for International 	Development, German government KfW development bank, Japan International Cooperation Agency, the US Trade and Development Agency, United Nations Industrial 	Development Organization and United Nations Human Settlements Programme. &lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Do these governments or organization have influence on any other component of the Smart cities?&lt;/li&gt;
&lt;li&gt;How much are the foreign governments and multilateral bodies spending on the respective cities?&lt;/li&gt;
&lt;li&gt;What kind of technical know-how is being shared with the Indian government and cities?&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;What is the way ahead?&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On the basis of the SCP, the MoUD will evaluate, assess the credibility and select 20 smart cities out of the short-listed ones for execution of the plan 	in the first phase. The selected city will set up a SPV and receive funding from the Government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;Questions unanswered&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Will the deadline of submission of the Smart Cities Proposal be pushed back?&lt;/li&gt;
&lt;li&gt;After the SCP is submitted on the basis of consultation with the citizens and public, will they be further involved in the implementation of the 	project and what will be their role?&lt;/li&gt;
&lt;li&gt;How will the MoUD and other associated organizations as well as actors consider the implementation realities of the project, like consideration of 	land displacement, rehabilitation of the slum people, etc.&lt;/li&gt;
&lt;li&gt;How are ICT based systems going to be utilized to make the cities and the infrastructure "smart"?&lt;/li&gt;
&lt;li&gt;How is the MoUD going to respond to the concerns and criticism emerging from various sections of the society, as being reflected in the news items?&lt;/li&gt;
&lt;li&gt;How will the smart cities impact and integrate the existing laws, regulations and policies? Does the Government intend to use the existing legislations in entirety, or update and amend the laws for implementation of the Smart Cities Mission?&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Smart Cities, Mission Statement and Guidelines, Ministry of Urban Development, Government of India, June 2015, Available at : 			http://smartcities.gov.in/writereaddata/SmartCityGuidelines.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://articles.economictimes.indiatimes.com/2015-08-27/news/65929187_1_jammu-and-kashmir-12-cities-urban-development-venkaiah-naidu&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://india.gov.in/spotlight/smart-cities-mission-step-towards-smart-india&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/Process%20of%20Selection.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Full list : http://www.scribd.com/doc/276467963/Smart-Cities-Full-List&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/Process%20of%20Selection.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.ibtimes.co.in/modi-govt-select-only-10-cities-under-smart-city-project-this-year-report-658888&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/Financing%20of%20Smart%20Cities.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Smart Cities presentation by MoUD : http://smartcities.gov.in/writereaddata/Presentation%20on%20Smart%20Cities%20Mission.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://indianexpress.com/article/india/india-others/smart-cities-projectfrom-france-to-us-a-rush-to-offer-assistance-funds/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://indianexpress.com/article/india/india-others/funding-for-smart-cities-key-to-coffer-lies-outside-india/#sthash.5lnW9Jsq.dpuf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://india.gov.in/spotlight/smart-cities-mission-step-towards-smart-india&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/SPVs.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/National%20Level%20Monitoring.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/State%20Level%20Monitoring.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/City%20Level%20Monitoring.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://smartcities.gov.in/writereaddata/List_of_Consulting_Firms.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://pib.nic.in/newsite/PrintRelease.aspx?relid=128457&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;a href="http://economictimes.indiatimes.com/articleshow/49242050.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt; http://economictimes.indiatimes.com/articleshow/49242050.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.business-standard.com/article/economy-policy/in-a-first-bis-to-come-up-with-standards-for-smart-cities-115060400931_1.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://accommodationtimes.com/foreign-countries-have-keen-interest-in-development-of-smart-cities/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://articles.economictimes.indiatimes.com/2015-11-20/news/68440402_1_uk-trade-three-smart-cities-british-deputy-high-commissioner&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://www.jpost.com/Business-and-Innovation/Tech/Tel-Aviv-to-help-India-build-smart-cities-435161?utm_campaign=shareaholic&amp;amp;utm_medium=twitter&amp;amp;utm_source=socialnetwork&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; http://indianexpress.com/article/india/india-others/smart-cities-projectfrom-france-to-us-a-rush-to-offer-assistance-funds/#sthash.nCMxEKkc.dpuf&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview'&gt;https://cis-india.org/internet-governance/blog/smart-cities-in-india-an-overview&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2016-01-11T01:30:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality">
    <title>CIS's Position on Net Neutrality</title>
    <link>https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality</link>
    <description>
        &lt;b&gt;As researchers committed to the principle of pluralism we rarely produce institutional positions. This is also because we tend to update our positions based on research outputs. But the lack of clarity around our position on network neutrality has led some stakeholders to believe that we are advocating for forbearance. Nothing can be farther from the truth. Please see below for the current articulation of our common institutional position.&lt;/b&gt;
        &lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;ol style="text-align: justify;"&gt;
&lt;li&gt;Net Neutrality violations can potentially have multiple categories of harms —&lt;strong&gt; competition harms, free speech harms, privacy harms, innovation and ‘generativity’ harms, harms to consumer choice and user freedoms, and diversity harms&lt;/strong&gt; thanks to unjust discrimination and gatekeeping by Internet service providers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Net Neutrality violations (including some those forms of zero-rating that violate net neutrality) can also have different kinds benefits — enabling the &lt;strong&gt;right to freedom of expression&lt;/strong&gt;, and the &lt;strong&gt;freedom of association&lt;/strong&gt;, especially when access to communication and publishing technologies is increased; &lt;strong&gt;increased competition&lt;/strong&gt; [by enabling product differentiation, can potentially allow small ISPs compete against market incumbents]; &lt;strong&gt;increased access&lt;/strong&gt; [usually to a subset of the Internet] by those without any access because they cannot afford it, increased access [usually to a subset of the Internet] by those who don't see any value in the Internet, &lt;strong&gt;reduced payments&lt;/strong&gt; by those who already have access to the Internet especially if their usage is dominated by certain services and destinations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Given the magnitude and variety of potential harms, &lt;strong&gt;complete forbearance from all regulation is not an option&lt;/strong&gt; for regulators nor is self-regulation sufficient to address all the harms emerging from Net Neutrality violations, since incumbent telecom companies cannot be trusted to effectively self-regulate. Therefore, &lt;strong&gt;CIS calls for the immediate formulation of Net Neutrality regulation&lt;/strong&gt; by the telecom regulator [TRAI] and the notification thereof by the government [Department of Telecom of the Ministry of Information and Communication Technology]. CIS also calls for the eventual enactment of statutory law on Net Neutrality.&amp;nbsp; All such policy must be developed in a transparent fashion after proper consultation with all relevant stakeholders, and after giving citizens an opportunity to comment on draft regulations.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Even though some of these harms may be large, CIS believes that a government cannot apply the precautionary principle in the case of Net Neutrality violations. &lt;strong&gt;Banning technical innovations and business model innovations is not an appropriate policy option. &lt;/strong&gt;The regulation must toe a careful line &lt;strong&gt;to solve the optimization problem: &lt;/strong&gt;refraining from over-regulation of ISPs and harming innovation at the carrier level (and benefits of net neutrality violations mentioned above) while preventing ISPs from harming innovation and user choice.&amp;nbsp; ISPs must be regulated to limit harms from unjust discrimination towards consumers as well as to limit harms from unjust discrimination towards the services they carry on their networks.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Based on regulatory theory, we believe that a regulatory framework that is technologically neutral, that factors in differences in technological context, as well as market realities and existing regulation, and which is able to respond to new evidence is what is ideal.&lt;br /&gt;&lt;br /&gt;This means that we need a framework that has some bright-line rules based, but which allows for flexibility in determining the scope of exceptions and in the application of the rules.&amp;nbsp; Candidate principles to be embodied in the regulation include: &lt;strong&gt;transparency, non-exclusivity, limiting unjust discrimination&lt;/strong&gt;.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;The &lt;strong&gt;harms emerging from walled gardens can be mitigated in a number of ways&lt;/strong&gt;.&amp;nbsp; &lt;strong&gt;On zero-rating the form of regulation must depend on the specific model and the potential harms that result from that model. &lt;/strong&gt;Zero-rating can be: paid for by the end consumer or subsidized by ISPs or subsidized by content providers or subsidized by government or a combination of these; deal-based or criteria-based or government-imposed; ISP-imposed or offered by the ISP and chosen by consumers; Transparent and understood by consumers vs. non-transparent; based on content-type or agnostic to content-type; service-specific or service-class/protocol-specific or service-agnostic; available on one ISP or on all ISPs.&amp;nbsp; Zero-rating by a small ISP with 2% penetration will not have the same harms as zero-rating by the largest incumbent ISP.&amp;nbsp; For service-agnostic / content-type agnostic zero-rating, which Mozilla terms ‘&lt;strong&gt;equal rating&lt;/strong&gt;’, CIS advocates for&lt;strong&gt; no regulation.&lt;/strong&gt;&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;CIS believes that &lt;strong&gt;Net Neutrality regulation for mobile and fixed-line access must be different&lt;/strong&gt; recognizing the fundamental differences in technologies.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;&lt;strong&gt;On specialized services CIS believes that there should be logical separation&lt;/strong&gt; and that all details of such specialized services and their impact on the Internet must be made transparent to consumers both individual and institutional, the general public and to the regulator.&amp;nbsp; Further, such services should be available to the user only upon request, and not without their active choice, with the requirement that the service cannot be reasonably provided with ‘best efforts’ delivery guarantee that is available over the Internet, and hence requires discriminatory treatment, or that the discriminatory treatment does not unduly harm the provision of the rest of the Internet to other customers.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On incentives for telecom operators, CIS believes that the government should consider different models such as waiving contribution to the Universal Service Obligation Fund for prepaid consumers, and freeing up additional spectrum for telecom use without royalty using a shared spectrum paradigm, as well as freeing up more spectrum for use without a licence.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;On reasonable network management CIS still does not have a common institutional position.&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ol&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality'&gt;https://cis-india.org/internet-governance/blog/cis-position-on-net-neutrality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Net Neutrality</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2015-12-09T13:06:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india">
    <title>Crowdsourcing Incidents of Communication Privacy Violation in India</title>
    <link>https://cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india</link>
    <description>
        &lt;b&gt;In the context of several ongoing threads of debates and policy discussions, we are initiating this effort to crowdsource incidents of violation of digital/online/telephonic privacy of persons and organisations in India. The full list of submitted incidents is publicly shared, under Creative Commons Attributions-ShareAlike 4.0 International license. Please contribute and share with your friends and colleagues.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Report an incident: &lt;a href="http://goo.gl/forms/8Xcf0zcWZW"&gt;http://goo.gl/forms/8Xcf0zcWZW&lt;/a&gt;&lt;/h3&gt;
&lt;h3&gt;Collected incidents: &lt;a href="http://bit.ly/privacy-violation-india"&gt;http://bit.ly/privacy-violation-india&lt;/a&gt; (CC BY-SA 4.0)&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;You are welcome to cross-post this to your website or other online forum. Please provide attribution, and link back to this page. For any clarification, write to Sumandro Chattapadhyay, Research Director, CIS, at sumandro[at]cis-india[dot]org.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india'&gt;https://cis-india.org/internet-governance/crowdsourcing-incidents-of-communication-privacy-violation-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-10-16T10:49:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015">
    <title>Open Letter to PM Modi on Intellectual Property Rights issues on His Visit to the United States of America in September, 2015</title>
    <link>https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015</link>
    <description>
        &lt;b&gt;This is an open letter by CIS to the Prime Minister, Shri Narendra Modi in light of his impending visit to the USA. This letter asks the Prime Minister to urge the USA to ratify the Marrakesh Treaty; and asks that India not be a party to TPP negotiations, in light of recent reports on a study encouraging India to join the TPP.
&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Shri Narendra Damodardas Modi&lt;br /&gt;Hon’ble Prime Minister of India&lt;br /&gt;152, South Block, Raisina Hill&lt;br /&gt;New Delhi-110011&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;22 September, 2015&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Dear Sir,&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We write on behalf of the Centre for Internet and Society, India &lt;a name="_ftnref1" href="#_ftn1"&gt;[1]&lt;/a&gt;, a Bangalore and New Delhi based not-for-profit organization engaging in research on among others, accessibility for persons with disabilities, intellectual property rights, openness and access to knowledge. Over the past fifteen months, we have welcomed and support certain initiatives of our government as being in line with some of our research interests, specifically, the "Make in India" and "Digital India" initiatives, and your vision of a digitally empowered India, as we have noted in an earlier open letter to you. &lt;a name="_ftnref2" href="#_ftn2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This letter is in light of your visit to the United States of America (“USA”) this month, to articulate a two-fold request:&lt;em&gt; first, &lt;/em&gt;that during the course of your visit you request the government of the USA to ratify the Marrakesh Treaty for visually impaired persons (“Marrakesh Treaty”); &lt;a name="_ftnref3" href="#_ftn3"&gt;[3]&lt;/a&gt; and &lt;em&gt;second, &lt;/em&gt;that the Indian government not enter into any negotiations around the Trans-Pacific Partnership trade agreement (“the TPP”).&lt;/p&gt;
&lt;h3&gt;On the Marrakesh Treaty&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;According to figures by the World Blind Union, approximately 90% of all published material is not accessible to blind or print disabled people. &lt;a name="_ftnref4" href="#_ftn4"&gt;[4]&lt;/a&gt; The severity of the ‘book famine’ experienced by the world’s estimated 300 million blind or otherwise print or visually disabled people (of which an estimated 63 million are in India) was highlighted by India in its Closing Statement at the Diplomatic Conference convened to conclude the Marrakesh Treaty. &lt;a name="_ftnref5" href="#_ftn5"&gt;[5]&lt;/a&gt; India has historically been a strong advocate of the spirit of the Marrakesh Treaty, becoming the first country to ratify it in June, 2014. &lt;a name="_ftnref6" href="#_ftn6"&gt;[6]&lt;/a&gt; Amendments in 2012 to India’s copyright law predated the signature to the Marrakesh Treaty. These amendments created disability and works neutral exceptions to our copyright law, well beyond the mandate of the Marrakesh Treaty.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The true realization of the promise of the Marrakesh Treaty however will remain a distant dream until the treaty comes into effect (three months) after 20 Member States have ratified it or acceded to it. &lt;a name="_ftnref7" href="#_ftn7"&gt;[7]&lt;/a&gt; According to information available from the World Intellectual Property Organization &lt;a name="_ftnref8" href="#_ftn8"&gt;[8]&lt;/a&gt;, this number is currently only 9, and the USA is not one of the countries to have done so. The USA is home &lt;a name="_ftnref9" href="#_ftn9"&gt;[9]&lt;/a&gt; to some of the largest publishers of both academic and other/leisure material including Penguin Random House, Harper Collins, John Wiley &amp;amp; Sons, the RELX Group, McGraw-Hill Education, Scholastic and Cengage Learning to name a few. It accounts for a large volume of the world’s book and other print material export. The active participation of the USA through the ratification of the Marrakesh treaty is critical if the treaty is to be truly effective.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;During your visit, we urge you request the government of the United States of America to ratify the Marrakesh Treaty at the earliest. This will bring us one important step closer to eradicating the book famine.&lt;/p&gt;
&lt;h3&gt;On the TPP&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;We are concerned after reports &lt;a name="_ftnref10" href="#_ftn10"&gt;[10]&lt;/a&gt; of a recent study authored by C Fred Bergsten that encourages India to join the TPP. On this front, we are in complete agreement with the reported statement of the Hon’ble Ambassador Shri Arun K. Singh, where he disagrees with some of the findings and analysis of this recent report. &lt;a name="_ftnref11" href="#_ftn11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The TPP has come into severe criticism &lt;a name="_ftnref12" href="#_ftn12"&gt;[12]&lt;/a&gt; over the years &lt;a name="_ftnref13" href="#_ftn13"&gt;[13]&lt;/a&gt; from a vast multitude &lt;a name="_ftnref14" href="#_ftn14"&gt;[14]&lt;/a&gt; of sources &lt;a name="_ftnref15" href="#_ftn15"&gt;[15]&lt;/a&gt; (including a group of 30 law professors in 2012) &lt;a name="_ftnref16" href="#_ftn16"&gt;[16]&lt;/a&gt; across the various countries that are a party to the negotiations. Among others and most relevant to us as an organization is the criticism around the secrecy of negotiations &lt;a name="_ftnref17" href="#_ftn17"&gt;[17]&lt;/a&gt; as well as the content of the chapter on intellectual property in the TPP. It is our belief that eventually, India stands to lose as a result of the TPP &lt;a name="_ftnref18" href="#_ftn18"&gt;[18]&lt;/a&gt; with its possible adverse impact on our economy. &lt;a name="_ftnref19" href="#_ftn19"&gt;[19]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The rigid intellectual property protections (including criminal penalties for unintentional copying) &lt;a name="_ftnref20" href="#_ftn20"&gt;[20]&lt;/a&gt; sought to be enforced through the TPP would benefit only US pharmaceutical and entertainment industries. &lt;a name="_ftnref21" href="#_ftn21"&gt;[21]&lt;/a&gt; These provisions (among others) mandate the inclusion of TRIPS plus provisions in national laws, envisage possible extensions in term of protection on patents, restrict copyright exceptions and limitations, extend copyright protection terms and impose a higher liability on intermediaries; &lt;a name="_ftnref22" href="#_ftn22"&gt;[22]&lt;/a&gt;all of which would be disastrous for an emerging economy such as India’s, which is a heavy user of intellectual property and not a heavy producer of the same.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Historically, India has been a supporter of a transparent, multilateral decision making process, a commitment to which was also reiterated recently by the Hon’ble Minister of State for Commerce and Industry, Smt. Nirmala Sitharaman. &lt;a name="_ftnref23" href="#_ftn23"&gt;[23]&lt;/a&gt;India has also raised many of its concerns (on the secrecy of the negotiations as well as substantive provisions themselves) around the TPP and its close cousin, the Anti-Counterfeiting Trade Agreement (“ACTA”) in 2011 &lt;a name="_ftnref24" href="#_ftn24"&gt;[24]&lt;/a&gt; and 2012 &lt;a name="_ftnref25" href="#_ftn25"&gt;[25]&lt;/a&gt; at the World Trade Organization (“WTO”) TRIPS Council and on the ACTA in 2010, also at the WTO Trips Council. &lt;a name="_ftnref26" href="#_ftn26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In light of the above, we strongly urge the Indian government to not engage in negotiations on the TPP. At a minimum, we would request that any engagement in TPP negotiations be preceded by national consultations on the same, soliciting input from various stakeholders with diverging interests, including academia, civil society, industry associations, large Indian corporations, small and medium enterprises and multi- national corporations, rights holders associations and other interest groups.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;We thank you for the opportunity to present these views to you. We do hope that you will consider these suggestions favourably, in the interests of India’s economic and social development. We welcome any opportunity to assist you with any queries you may have with regard to these submissions.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Thank you.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Yours truly&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;(For the Centre for Internet and Society, India)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Pranesh Prakash,&amp;nbsp; Policy Director&lt;br /&gt;Nehaa Chaudhari, Programme Officer&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Copies to:&lt;/p&gt;
&lt;ol style="text-align: justify;" type="1"&gt;
&lt;li&gt;Smt. Smriti Zubin Irani, Minister for Human Resource Development, Government of India.&lt;/li&gt;
&lt;li&gt;Prof. (Dr.) Ram Shankar Katheria, Minister of State for Human Resource Development (Higher Education), Government of India.&lt;/li&gt;
&lt;li&gt;Smt. Nirmala Sitharaman, Minister of State for Commerce and Industry, Government of India.&lt;/li&gt;
&lt;li&gt;Shri Vinay Sheel Oberoi, Secretary (Department of Higher Education), Ministry of Human Resources Development, Government of India, Government of India.&lt;/li&gt;
&lt;li&gt;Shri Amitabh Kant, Secretary (Department of Industrial Policy and Promotion), Ministry of Commerce and Industry, Government of India.&lt;/li&gt;&lt;/ol&gt;
&lt;p&gt;&amp;nbsp;&lt;br /&gt;&lt;br /&gt;(Edit - 25 September, 2015) - The following people have reached out to us in support of this letter and have expressed a desire to have their signatures placed on record as support. We wish to acknowledge the same.&amp;nbsp;&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Prof. Dinesh Abrol - Convenor, National Working Group on Patent Laws and WTO&lt;br /&gt;&lt;/li&gt;&lt;li&gt;Dr. B. Ekbal - President, Democratic Alliance for Knowledge Freedom, Kerala&lt;/li&gt;&lt;li&gt;T.C. James - President, NIPO&lt;/li&gt;&lt;li&gt;Dr. Suman Sahai - Chairperson, Gene Campaign&lt;/li&gt;&lt;li&gt;Dr. Biswajit Dhar - Professor, Centre for Economic Studies and Planning, School of Social Sciences, Jawaharlal Nehru University&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn1" href="#_ftnref1"&gt;[1]&lt;/a&gt;See generally &lt;a href="http://cis-india.org/"&gt;http://cis-india.org/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn2" href="#_ftnref2"&gt;[2]&lt;/a&gt;Rohini Lakshane, Open Letter to Prime Minister Modi, available at &lt;a href="http://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi"&gt;http://cis-india.org/a2k/blogs/open-letter-to-prime-minister-modi&lt;/a&gt; (last accessed 22 September, 2015); Centre for Internet and Society/Rohini Lakshane, Digital India &amp;amp; Make in India : Form a patent pool of critical mobile technologies – CIS India, available at &lt;a href="http://www.medianama.com/2015/03/223-digital-india-make-in-india-form-a-patent-pool-of-critical-mobile-technologies-cis-india/" rel="noreferrer"&gt;http://www.medianama.com/2015/03/223-digital-india-make-in-india-form-a-patent-pool-of-critical-mobile-technologies-cis-india/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn3" href="#_ftnref3"&gt;[3]&lt;/a&gt;The Marrakesh Treaty to Facilitate Access to Published Works by Visually Impaired Persons and Persons with Print Disabilities adopted on June 27, 2013. Treaty text and other official documentation available at &lt;a href="http://www.wipo.int/treaties/en/ip/marrakesh/" rel="noreferrer"&gt;http://www.wipo.int/treaties/en/ip/marrakesh/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn4" href="#_ftnref4"&gt;[4]&lt;/a&gt;World Blind Union, Marrakesh Treaty – Right to Read Campaign, available at &lt;a href="http://www.worldblindunion.org/English/our-work/our-priorities/Pages/right-2-read-campaign.aspx" rel="noreferrer"&gt;http://www.worldblindunion.org/English/our-work/our-priorities/Pages/right-2-read-campaign.aspx&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn5" href="#_ftnref5"&gt;[5]&lt;/a&gt;Pranesh Prakash, India’s Closing Statement at Marrakesh on the Treaty for the Blind, available at &lt;a href="http://cis-india.org/a2k/blogs/india-closing-statement-marrakesh-treaty-for-the-blind"&gt;http://cis-india.org/a2k/blogs/india-closing-statement-marrakesh-treaty-for-the-blind&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn6" href="#_ftnref6"&gt;[6]&lt;/a&gt;Nehaa Chaudhari, India’s Ratification of the Marrakesh Treaty Celebrated; Accessible Books Consortium Launched, available at &lt;a href="http://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated"&gt;http://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn7" href="#_ftnref7"&gt;[7]&lt;/a&gt;Article 18 of the Marrakesh Treaty.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn8" href="#_ftnref8"&gt;[8]&lt;/a&gt;World Intellectual Property Organization, WIPO Administered Treaties: Contracting Parties &amp;gt; Marrakesh VIP Treaty (Treaty not yet in force), available at &lt;a href="http://www.wipo.int/treaties/en/ShowResults.jsp?lang=en&amp;amp;treaty_id=843" rel="noreferrer"&gt;http://www.wipo.int/treaties/en/ShowResults.jsp?lang=en&amp;amp;treaty_id=843&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn9" href="#_ftnref9"&gt;[9]&lt;/a&gt;Publishers Weekly, The World’s 57 Largest Book Publishers, 2015, available at &lt;a href="http://www.publishersweekly.com/pw/by-topic/international/international-book-news/article/67224-the-world-s-57-largest-book-publishers-2015.html" rel="noreferrer"&gt;http://www.publishersweekly.com/pw/by-topic/international/international-book-news/article/67224-the-world-s-57-largest-book-publishers-2015.html&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn10" href="#_ftnref10"&gt;[10]&lt;/a&gt;S Rajagopalan, US Report Pushes India to Join the Trans-Pacific Partnership, available at &lt;a href="http://www.dailypioneer.com/world/us-report-pushes-india-to-join-trans-pacific-partnership.html" rel="noreferrer"&gt;http://www.dailypioneer.com/world/us-report-pushes-india-to-join-trans-pacific-partnership.html&lt;/a&gt; (last accessed 22 September, 2015); Indo-Asian News Service on NDTV, India Can Boost Exports by $500 Billion with Trade Liberalization: Study, available at &lt;a href="http://www.ndtv.com/india-news/india-can-boost-exports-by-500-billion-with-trade-liberalization-study-1218887" rel="noreferrer"&gt;http://www.ndtv.com/india-news/india-can-boost-exports-by-500-billion-with-trade-liberalization-study-1218887&lt;/a&gt; (last accessed 22 September, 2015); Raghavendra M., India can boost exports by $500 billion with trade liberalization: study, available at &lt;a href="http://www.americanbazaaronline.com/2015/09/18/india-can-boost-exports-by-500-billion-with-trade-liberalization-study/" rel="noreferrer"&gt;http://www.americanbazaaronline.com/2015/09/18/india-can-boost-exports-by-500-billion-with-trade-liberalization-study/&lt;/a&gt; (last accessed 22 September, 2015); Press Trust of India in the Business Standard, India can boost exports by USD 500 bn by joining the TPP: report, available at &lt;a href="http://www.business-standard.com/article/pti-stories/india-can-boost-exports-by-usd-500-bn-by-joining-tpp-report-115091701149_1.html" rel="noreferrer"&gt;http://www.business-standard.com/article/pti-stories/india-can-boost-exports-by-usd-500-bn-by-joining-tpp-report-115091701149_1.html&lt;/a&gt; (last accessed 22 September, 2015); Seema Sirohi, India must expand its trade before it gets left behind in the race, available at &lt;a href="http://blogs.economictimes.indiatimes.com/letterfromwashington/india-must-expand-its-trade-before-it-gets-left-behind-in-the-race/" rel="noreferrer"&gt;http://blogs.economictimes.indiatimes.com/letterfromwashington/india-must-expand-its-trade-before-it-gets-left-behind-in-the-race/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn11" href="#_ftnref11"&gt;[11]&lt;/a&gt;S Rajagopalan, US Report Pushes India to Join the Trans-Pacific Partnership, available at &lt;a href="http://www.dailypioneer.com/world/us-report-pushes-india-to-join-trans-pacific-partnership.html" rel="noreferrer"&gt;http://www.dailypioneer.com/world/us-report-pushes-india-to-join-trans-pacific-partnership.html&lt;/a&gt; (last accessed 22 September, 2015)&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn12" href="#_ftnref12"&gt;[12]&lt;/a&gt;Natasha Lennard, Noam Chomsky: Trans-Pacific Partnership is a “neoliberal assault”, available at &lt;a href="http://www.salon.com/2014/01/13/chomsky_tpp_is_a_neoliberal_assault/" rel="noreferrer"&gt;http://www.salon.com/2014/01/13/chomsky_tpp_is_a_neoliberal_assault/&lt;/a&gt; (last accessed 22 September, 2015); Zach Carter and Ryan Grim, Noam Chomsky: Obama Trade Deal a ‘Neoliberal Assault’ to ‘Further Corporate Domination’, available at &lt;a href="http://www.huffingtonpost.com/2014/01/13/noam-chomsky-obama-trans-pacific-partnership_n_4577495.html?ir=India&amp;amp;adsSiteOverride=in" rel="noreferrer"&gt;http://www.huffingtonpost.com/2014/01/13/noam-chomsky-obama-trans-pacific-partnership_n_4577495.html?ir=India&amp;amp;adsSiteOverride=in&lt;/a&gt; (last accessed 22 September, 2015); Sean Flynn;, Margot E Kaminski, Brook K Baker and Jimmy H Koo., "Public Interest Analysis of the US TPP Proposal for an IP Chapter" (2011). PIJIP Research Paper Series. Paper 21. &lt;a href="http://digitalcommons.wcl.american.edu/research/21" rel="noreferrer"&gt;http://digitalcommons.wcl.american.edu/research/21&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn13" href="#_ftnref13"&gt;[13]&lt;/a&gt;BBC News, TPP: What is it and why does it matter?, available at &lt;a href="http://www.bbc.com/news/business-21782080" rel="noreferrer"&gt;http://www.bbc.com/news/business-21782080&lt;/a&gt; (last accessed 22 September, 2015);&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn14" href="#_ftnref14"&gt;[14]&lt;/a&gt;For a compilation on writing on the TPP &lt;em&gt;see&lt;/em&gt; James Love, Trans-Pacific Partnership (TPP also known as the TPPA), available at &lt;a href="http://keionline.org/tpp" rel="noreferrer"&gt;http://keionline.org/tpp&lt;/a&gt; (last accessed 22 September, 2015); &lt;em&gt;see also &lt;/em&gt;American University Program on Information Justice and Intellectual Property, Trans-Pacific Partnership, available at &lt;a href="http://infojustice.org/tpp" rel="noreferrer"&gt;http://infojustice.org/tpp&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn15" href="#_ftnref15"&gt;[15]&lt;/a&gt;Zach Carter, Alan Grayson on Trans-Pacific Partnership: Obama Secrecy Hides ‘Assault on Democratic Government’, available at &lt;a href="http://www.huffingtonpost.com/2013/06/18/alan-grayson-trans-pacific-partnership_n_3456167.html?ir=India&amp;amp;adsSiteOverride=in" rel="noreferrer"&gt;http://www.huffingtonpost.com/2013/06/18/alan-grayson-trans-pacific-partnership_n_3456167.html?ir=India&amp;amp;adsSiteOverride=in&lt;/a&gt; (last accessed 22 September, 2015); James Love, KEI analysis of Wikileaks leak of TPP IPR text, from August 30, 2013, available at &lt;a href="http://keionline.org/node/1825" rel="noreferrer"&gt;http://keionline.org/node/1825&lt;/a&gt; (last accessed 22 September, 2015); Ian Verrender, The TPP has the potential for real harm, available at &lt;a href="http://www.abc.net.au/news/2015-03-16/verrender-the-tpp-has-the-potential-for-real-harm/6321538" rel="noreferrer"&gt;http://www.abc.net.au/news/2015-03-16/verrender-the-tpp-has-the-potential-for-real-harm/6321538&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn16" href="#_ftnref16"&gt;[16]&lt;/a&gt;Sean Flynn, Law Professors Call for Trans-Pacific Partnership (TPP) Transparency, available at &lt;a href="http://infojustice.org/archives/21137" rel="noreferrer"&gt;http://infojustice.org/archives/21137&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn17" href="#_ftnref17"&gt;[17]&lt;/a&gt;Sachie Mizohata, "The Trans-Pacific Partnership and Its Critics: An introduction and a petition," The Asia-Pacific Journal, Vol. 11, Issue 36, No. 3, available at &lt;a href="http://japanfocus.org/-Sachie-MIZOHATA/3996/article.html" rel="noreferrer"&gt;http://japanfocus.org/-Sachie-MIZOHATA/3996/article.html&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn18" href="#_ftnref18"&gt;[18]&lt;/a&gt;Vijay Rajamohan, Trans-Pacific Partnership – Should India Join this Mega Trade Deal?, available at &lt;a href="http://swarajyamag.com/world/trans-pacific-partnership-should-india-join-this-mega-trade-deal/" rel="noreferrer"&gt;http://swarajyamag.com/world/trans-pacific-partnership-should-india-join-this-mega-trade-deal/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn19" href="#_ftnref19"&gt;[19]&lt;/a&gt;Sylvia Mishra, How will the Trans-Pacific Partnership affect India?, available at &lt;a href="http://www.observerindia.com/cms/sites/orfonline/modules/analysis/AnalysisDetail.html?cmaid=85684&amp;amp;mmacmaid=85685" rel="noreferrer"&gt;http://www.observerindia.com/cms/sites/orfonline/modules/analysis/AnalysisDetail.html?cmaid=85684&amp;amp;mmacmaid=85685&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn20" href="#_ftnref20"&gt;[20]&lt;/a&gt;Gabrielle Chan, Trans-Pacific Partnership: a guide to the most contentious issues, available at &lt;a href="http://www.theguardian.com/world/2013/dec/10/trans-pacific-partnership-a-guide-to-the-most-contentious-issues" rel="noreferrer"&gt;http://www.theguardian.com/world/2013/dec/10/trans-pacific-partnership-a-guide-to-the-most-contentious-issues&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn21" href="#_ftnref21"&gt;[21]&lt;/a&gt;James Love, New leak of TPP consolidated text on intellectual property provides details of pandering to drug companies and publishers, available at &lt;a href="http://www.keionline.org/node/2108" rel="noreferrer"&gt;http://www.keionline.org/node/2108&lt;/a&gt; (last accessed 22 September, 2015); Vijay Rajamohan, Trans-Pacific Partnership – Should India Join this Mega Trade Deal?, available at &lt;a href="http://swarajyamag.com/world/trans-pacific-partnership-should-india-join-this-mega-trade-deal/" rel="noreferrer"&gt;http://swarajyamag.com/world/trans-pacific-partnership-should-india-join-this-mega-trade-deal/&lt;/a&gt; (last accessed 22 September, 2015) referencing Paul Krugman.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn22" href="#_ftnref22"&gt;[22]&lt;/a&gt;William New, Leaked TPP Draft Reveals Extreme Rights Holder Position Of US, Japan, Outraged Observers Say, available at &lt;a href="http://www.ip-watch.org/2014/10/17/leaked-tpp-draft-reveals-extreme-rights-holder-position-of-us-japan-outraged-observers-say/" rel="noreferrer"&gt;http://www.ip-watch.org/2014/10/17/leaked-tpp-draft-reveals-extreme-rights-holder-position-of-us-japan-outraged-observers-say/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn23" href="#_ftnref23"&gt;[23]&lt;/a&gt;Lalit K Jha, India not being left out of global trade pacts: Minister, available at &lt;a href="http://www.thestatesman.com/news/business/india-not-being-left-out-of-global-trade-pacts-minister/91679.html" rel="noreferrer"&gt;http://www.thestatesman.com/news/business/india-not-being-left-out-of-global-trade-pacts-minister/91679.html&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn24" href="#_ftnref24"&gt;[24]&lt;/a&gt;Thirukumaran Balasubramaniam, WTO TRIPS Council: India raises concerns on ACTA and TPPA on discussion of “Trends in the Enforcement of IPRs”, available at &lt;a href="https://donttradeourlivesaway.wordpress.com/2011/10/29/wto-trips-council-india-raises-concerns-on-acta-and-tppa-on-discussion-of-trends-in-the-enforcement-of-iprs/" rel="noreferrer"&gt;https://donttradeourlivesaway.wordpress.com/2011/10/29/wto-trips-council-india-raises-concerns-on-acta-and-tppa-on-discussion-of-trends-in-the-enforcement-of-iprs/&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn25" href="#_ftnref25"&gt;[25]&lt;/a&gt;Thirukumaran Balasubramaniam, 28 Feb 2012: Intervention delivered by India at WTO TRIPS Council on IP Enforcement Trends noting concerns with ACTA and TPPA, available at &lt;a href="http://keionline.org/node/1376" rel="noreferrer"&gt;http://keionline.org/node/1376&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;a name="_ftn26" href="#_ftnref26"&gt;[26]&lt;/a&gt;Kanaga Raja, ACTA comes in for criticism at the TRIPS council, available at &lt;a href="http://www.twn.my/title2/wto.info/2010/twninfo100606.htm" rel="noreferrer"&gt;http://www.twn.my/title2/wto.info/2010/twninfo100606.htm&lt;/a&gt; (last accessed 22 September, 2015).&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015'&gt;https://cis-india.org/a2k/blogs/open-letter-on-intellectual-property-rights-issues-during-your-visit-to-the-united-states-of-america-in-september-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pranesh Prakash and Nehaa Chaudhari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Intellectual Property Rights</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2015-09-25T06:43:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
