<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 81 to 95.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/guidelines-for-examination-of-computer-related-inventions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/nie-steps-in-to-grow-konkani-wikipedia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-in-healthcare-policy-guide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/university-of-mysore-releases-kannada-vishwakosha-under-cc-license"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/accessibility/blog/enabling-elections"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain">
    <title>Availability and Accessibility of Government Information in Public Domain</title>
    <link>https://cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain</link>
    <description>
        &lt;b&gt;The information provided on most Government websites such as Acts, notifications, rules, orders, minutes of meetings and consultations, etc. is usually in the form of electronic documents. However, these lack authenticity and  accessibility and cannot be (text) searched., This policy brief identifies the problem areas with the current work flow being used to publish documents and proposes suitable modifications  to make them easy to locate, authentic and accessible.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Prepared by Sunil Abraham, Nirmita Narasimhan, Beliappa, and Anandhi Viswanathan and with inputs from Dipendra Manocha, Saksham, and Deepak Maheshwari, Symantec. Download the text as&lt;b&gt; &lt;a href="https://cis-india.org/accessibility/blog/policy-brief-availability-accessibility-govt-information-public-domain.pdf" class="external-link"&gt;PDF here&lt;/a&gt;&lt;/b&gt;. (96 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Problem Statement&lt;/b&gt;: The information published on most  government websites exist in the form of document files [including but  not limited to the Acts, Rules and Regulations, Government Orders and  Notifications, Consultation Papers, Reports etc.] which, even when  published, more often than not lack authenticity and accessibility and  cannot be (text) searched.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Analysis: The current workflow towards publishing documents on government websites is broadly as follows:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The document is born digital – that means it is created on a computer.&lt;/li&gt;
&lt;li&gt;The document is printed.&lt;/li&gt;
&lt;li&gt;The document is stamped with the official seal and signed in ink by the authorized person(s).&lt;/li&gt;
&lt;li&gt;The paper document is scanned.&lt;/li&gt;
&lt;li&gt;The scanned image is converted into a PDF file.&lt;/li&gt;
&lt;li&gt;The document is uploaded on the website and thereby published in the public domain.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;In fact, at times, even gazette notifications and other printed documents are also scanned as images.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This approach has numerous problems, including the following:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;First and foremost, such a practice is against the letter and spirit of Section 4 (1) (a) of the Right to Information Act, 2005.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;that inter alia, mandates every public authority to “maintain all its records duly catalogued and indexed in a manner and form which facilitates the right to information under this Act and ensure that all records that are appropriate to be computerised are, within a reasonable time and subject to availability of resources, computerised and connected through a network all over the country on different systems so that access to such records is facilitated”.&lt;/li&gt;
&lt;li&gt;This does not realize the enabling provision of the Information Technology Act, 2000&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; which gives legal sanctity to digital signatures. The digital image of a physical signature is not a digital signature in the eye of the law, though at times it is mistakenly believed to be so.&lt;/li&gt;
&lt;li&gt;This does not address the problem of repudiation. That means a government official can say “I didn't sign that document” and there is no way to tell whether what he or she is saying is true. One of the key features of digital signatures is non-repudiability.&lt;/li&gt;
&lt;li&gt;Scanned images of printed text cannot be searched for specific text (character, word or phrase) even by people without disabilities but for people with disabilities, the documents become totally inaccessible since the accessibility software cannot parse such scanned images – against the underlying tenets and objectives of the National Universal Electronic Accessibility Policy 2013.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;As an extension, content of such documents cannot be indexed by search engines (such as Google, Bing and Raftaar, etc.) and hence, unlikely to be located even if technically the same are in the public domain.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Proposed Solution&lt;/b&gt;: The following work flow is proposed for publishing documents electronically on government websites:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;The document is born digital by preparing it in or through a computer system. Documents in Indian languages should be produced using Unicode based fonts.&lt;/li&gt;
&lt;li&gt;The government official authorized to sign the same, must sign it digitally.&lt;/li&gt;
&lt;li&gt;The document is uploaded in an open standard based format such as EPUB using a content management system and made available on the website such that it is available, accessible, indexable and searchable.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This will ensure democratization of information in its truest sense – making available information to the public at large and ensuring that it can be easily located and remains accessible to one and all.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The process of formatting should be standardized in such a way that semantics (such as heading styles, lists and tables) can be added to the text of the document. The Web Style Guide provides information on good practices for creating well-structured documents:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Standardizing the formatting process by creating different templates for different types of documents will ensure uniform accessibility of the documents as well as provide a standard look and feel across government documents.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India became a global pioneer by making the legal provision for computerised, indexed and duly catalogued public records. It is high time that India takes the lead by living up to the legislative intent under the Right to Information Act, Information Technology Act and the National University of Educational Planning and Administration, and thereby establishes a global best practice.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Admittedly, legacy documents should also be converted electronically to accessible formats though before such a rendering, due editorial oversight may be necessary along with use of technologies such as Optical Character Recognition (OCR).&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Government of India. The Right to Information Act, 2005. No. 22 of 2005. Retrieved on November 30, 2014 from &lt;a class="external-link" href="http://rti.gov.in/webactrti.htm"&gt;http://rti.gov.in/webactrti.htm&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Government of India. The Information Technology Act, 2000. No. 21 of 2000. Retrieved on November 30, 2014 from &lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/itbill2000.pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/downloads/itact2000/itbill2000.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Government of India. National Policy on Universal Electronic Accessibility. 2013. Retrieved on November 30, 2014 from &lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/National Policy on Universal Electronics(1).pdf"&gt;http://deity.gov.in/sites/upload_files/dit/files/National Policy on Universal Electronics(1).pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain'&gt;https://cis-india.org/accessibility/blog/availability-and-accessibility-of-government-information-in-public-domain&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Government Information</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Digitisation</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-12-30T01:25:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2">
    <title>White Paper on RTI and Privacy V1.2</title>
    <link>https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2</link>
    <description>
        &lt;b&gt;This white paper explores the relationship between privacy and transparency in the context of the right to information in India. Analysing pertinent case law and legislation - the paper highlights how the courts and the law in India address questions of transparency vs. privacy. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Although the right to information is not specifically spelt out in the Constitution of India, 1950, it has been read into Articles 14 (right to equality), 19(1)(a) (freedom of speech and expression) and 21 (right to life) through cases such as &lt;i&gt;Bennet Coleman&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;,&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; &lt;i&gt;Tata Press Ltd. &lt;/i&gt;v.&lt;i&gt; Maharashtra Telephone Nigam Ltd.&lt;/i&gt;,&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; etc. The same Articles of the Constitution were also interpreted in &lt;i&gt;Kharak Singh&lt;/i&gt; v.&lt;i&gt;State of U.P.&lt;/i&gt;,&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; &lt;i&gt;Govind&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;,	&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; and a number of other cases, to include within their scope a right to privacy. At the very outset it 	appears that a right to receive information -though achieving greater transparency in public life - could impinge on the right to privacy of certain 	people. The presumed tension between the right to privacy and the right to information has been widely recognized and a framework towards balancing the two 	rights, has been widely discussed across jurisdictions. In India, nowhere is this conflict and the attempt to balance it more evident than under the Right 	to Information Act, 2005 (the "&lt;b&gt;RTI Act&lt;/b&gt;").&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Supporting the constitutional right to information enjoyed by the citizens, is the statutorily recognized right to information granted under the RTI Act. 	Any potential infringement of the right to privacy by the provisions of the RTI Act are sought to be balanced by section 8 which provides that no 	information should be disclosed if it creates an unwarranted invasion of the privacy of any individual. This exception states that there is no obligation 	to disclose information which relates to personal information, the disclosure of which has no relationship to any public activity or interest, or which would cause unwarranted invasion of the privacy of the individual unless the larger public interest justifies the disclosure of such information.	&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; The Act further goes on to say that where any information relating to or supplied by a third party and 	treated by that party as confidential, is to be disclosed, the Central Public Information Officer or State Public Information Officer has to give written 	notice to that party within five days of receiving such a request inviting such third party (within ten days) to make its case as to whether such 	information should or should not be disclosed.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A plain reading of section 11 suggests that for the section to apply the following three conditions have to be satisfied, i.e. (i) if the PIO is 	considering disclosing the information (ii) the information relates to the third party or was given to a Public Authority by the third party in confidence; 	and (iii) the third party treated the information to be a confidential. It has been held that in order to satisfy the third part of the test stated above, 	the third party has to be consulted and therefore a notice has to be sent to the third party. Even if the third party claims confidentiality, the proviso 	to the section provides that the information cannot be withheld if the public interest in the disclosure outweighs the possible harm or injury that may be 	caused to the third party, except in cases of trade or commercial secrets.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; The Courts have also held that section 11 should be read keeping in mind the exceptions contained in section 8 (discussed in detail later) and the exceptions contained therein.	&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This principle of non disclosure of private information can be found across a number of common law jurisdictions. The United Kingdom's Freedom of 	Information Act, 2000 exempts the disclosure of information where it would violate the data protection principles contained in the Data Protection Act, 	1998 or constitute an actionable breach of confidence.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; The Australian Freedom of Information Act, 1982 	categorizes documents involving unreasonable disclosure of personal information as conditionally exempt i.e. allows for their disclosure unless such 	disclosure would be contrary to public interest.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; The Canadian Access to Information Act also has a provision which allows the authorities to refuse to disclose personal information except in accordance with the provisions of the Canadian Privacy Act.	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An overview of the RTI Act, especially sections 6 to 8 seems to give the impression that the legislature has tried to balance and harmonize conflicting public and private rights and interests by building sufficient safeguards and exceptions to the general principles of disclosure under the Act.	&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; This is why it is generally suggested that section 8, when applied, should be given a strict interpretation as it is a fetter on not only a statutory right granted under the RTI Act but also a pre-existing constitutional right.	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; Logical as this argument may seem and appropriate in some circumstances, it does present a problem 	when dealing with the privacy exception contained in section 8(1)(j). That is because the right to privacy envisaged in this section is also a pre-existing 	constitutional right which has been traced to the same provisions of the Constitution from which the constitutional right of freedom of information 	emanates.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; Therefore there is an ambiguity regarding the treatment and priority given to the privacy 	exception vs. the disclosure mandate in the RTI Act, as it requires the balancing of not only two competing statutory rights but also two constitutional 	rights.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;The Privacy Exception &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As discussed earlier, the purpose of the RTI Act is to increase transparency and ensure that people have access to as much public information as possible. 	Such a right is critical in a democratic country as it allows for accountability of the State and allows individuals to seek out information and make 	informed decisions. However, it seems from the language of the RTI Act that at the time of its drafting the legislature did realize that there would be a 	conflict between the endeavor to provide information and the right to privacy of individuals over the information kept with public authorities, which is 	why a privacy exception was carved into section 8(1)(j) of the Right to Information Act. The Act does not only protect the privacy of the third party who's 	information is at risk of being disclosed, but also the privacy of the applicant. In fact it has now been held that a private respondent need not give 	his/her ID or address as long as the information provided by him/her is sufficient to contact him/her.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is interesting to note that although the RTI Act gives every citizen a right to information, it does not limit this right with a stipulation as to how the information shall be used by the applicant or the reason for which the applicant wants such information.	&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; This lack of a purpose limitation in the Act may have privacy implications as non sensitive personal 	information could be sought from different sources and processed by any person so as to convert such non-sensitive or anonymous information into 	identifiable information which could directly impact the privacy of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The exception in S. 8(1)(j) prohibits the disclosure of personal information for two reasons (i) its disclosure does not relate to any public activity or 	interest or (ii) it would be an unwarranted invasion into privacy. The above two conditions however get trumped if a larger public interest is satisfied by 	the disclosure of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One interesting thing about the exception contained in section 8(1)(j) is that this exception itself has an exception to it in the form of a proviso. The 	proviso says that any information which cannot be denied to the central or state legislature shall not be denied to any person. Since the proviso has been 	placed at the end of sub-section 8(1) which is also the end of clause 8(1)(j), one might be tempted to ask whether this proviso applies only to the privacy 	exception i.e. clause 8(1)(j) or to the entire sub-section 8(1) (which includes other exceptions such as national interest, etc.). This issue was put to 	rest by the Bombay High Court when it held that since the proviso has been put only after clause 8(1)(j) and not before each and every clause, it would not 	apply to the entire sub-section 8(1) but only to clause 8(1)(j), thus ensuring that the exceptions to disclosure other than the right to privacy are not 	restricted by this proviso.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Scope of Proviso to section 8(1)(j)&lt;/b&gt;&lt;br /&gt;Though the courts have agreed that the proviso is applicable only to section 8(1)(j), the import of the proviso to section 8(1)(j) is a little more 	ambiguous and there are conflicting decisions by different High Courts on this point. Whereas the Bombay High Court has laid emphasis on the letter of the proviso and derived strength from the objects and overall scheme of the Act to water down the provisions of section 8(1)(j),	&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; the Delhi High Court has disagreed with such an approach which gives "undue, even overwhelming 	deference" to Parliamentary privilege in seeking information. Such an approach would render the protection under section 8(1)j) meaningless, and the basic 	safeguard bereft of content.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; In the words of the Delhi High Court:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;" 	&lt;i&gt; The proviso has to be only as confined to what it enacts, to the class of information that Parliament can ordinarily seek; if it were held that all 		information relating to all public servants, even private information, can be accessed by Parliament, Section 8(1)(j) would be devoid of any substance, 		because the provision makes no distinction between public and private information. Moreover there is no law which enables Parliament to demand all such 		information; it has to be necessarily in the context of some matter, or investigation. If the reasoning of the Bombay High Court were to be accepted, 		there would be nothing left of the right to privacy, elevated to the status of a fundamental right, by several judgments of the Supreme Court. &lt;/i&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The interpretation given by the Delhi High Court thus ensures that section 8(1)(j) still has some effect, as otherwise the privacy exception would have 	gotten steamrolled by parliamentary privilege and all sorts of information such as Income Tax Returns, etc. of both private and public individuals would 	have been liable to disclosure under the RTI Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, the RTI Act does not describe the terms "personal information" or "larger public interest" used in section 8(1)(j), which leaves some amount 	of ambiguity in interpreting the privacy exception to the RTI Act. Therefore the only option for anyone to understand these terms in greater depth is to 	discuss and analyse the case laws developed by the Hon'ble Supreme Court and the High Courts which have tried to throw some light on this issue.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We shall discuss some of these landmark judgments to understand the interpretations given to these terms and then move on to specific instances where 	(applying these principles) information has been disclosed or denied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Personal Information&lt;/b&gt;&lt;br /&gt;The RTI Act defines the term information but does not define the term "personal information". Therefore one has to rely on judicial pronouncements to 	understand the term a more clearly. Looking at the common understanding and dictionary meaning of "personal" as well as the definition of "information" 	contained in the RTI Act it could be said that personal information would be information, information that pertains to a person and as such it takes into 	its fold possibly every kind of information relating to the person. Now, such personal information of the person may, or may not, have relation to any public activity, or to public interest. At the same time, such personal information may, or may not, be private to the person.	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Delhi High Court has tried to draw a distinction between the term "private information" which encompasses the personal intimacies of the home, the 	family, marriage, motherhood, procreation, child rearing and of the like nature and "personal information" which would be any information that pertains to an individual. This would logically imply that all private information would be part of personal information but not the other way round.	&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; The term 'personal information' has in other cases, been variously described as "identity particulars 	of public servants, i.e. details such as their dates of birth, personal identification numbers",&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt; and as 	including tax returns, medical records etc.&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; It is worth noting that just because the term used is 	"personal information" does not mean that the information always has to relate to an actual person, but may even be a juristic entity such as a trust or 	corporation, etc.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Larger Public Interest&lt;/b&gt;&lt;br /&gt;The term larger public interest has not been discussed or defined in the RTI Act, however the Courts have developed some tests to determine if in a given 	situation, personal information should be disclosed in the larger public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whenever a Public Information Officer is asked for personal information about any person, it has to balance the competing claims of the privacy of the 	third party on the one hand and claim of public interest on the other and determine whether the public interest in such a disclosure satisfies violating a 	person's privacy. The expression "public interest" is not capable of a precise definition and does not have a rigid meaning. It is therefore an elastic 	term and takes its colors from the statute in which it occurs, the concept varying with the time and the state of the society and its needs. This seems to 	be the reason why the legislature and even the Courts have shied away from a precise definition of "public interest". However, the term public interest 	does not mean something that is merely interesting or satisfies the curiosity or love of information or amusement; but something in which a class of the 	community have some interest by which their rights or liabilities are affected.&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There have been suggestions that the use of the word "larger" before the term "public interest" denotes that the public interest involved should serve a 	large section of the society and not just a small section of it, i.e. if the information has a bearing on the economy, the moral values in the society; the 	environment; national safety, or the like, the same would qualify as "larger public interest".&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; However 	this is not a very well supported theory and the usage of the term "larger public interest" cannot be given such a narrow meaning, for example what if the 	disclosure of the information could save the lives of only 10 people or even just 5 children? Would the information not be released just because it 	violates one person's right to privacy and there is not a significant number of lives at stake? This does not seem to be what all the cases on the right to privacy, right from &lt;i&gt;Kharak Singh&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;b&gt;[27]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; all the way to &lt;i&gt;Naz Foundation&lt;/i&gt;,	&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt; seem to suggest. Infact, in the very same judgment where the above interpretation has been suggested, 	the Court undermines this argument by giving the example of a person with a previous crime of sexual assault being employed in an orphanage and says that 	the interest of the small group of children in the orphanage would outweigh the privacy concerns of the individual thus requiring disclosure of all 	information regarding the employee's past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In light of the above understanding of section 8(1)(j), there seem to be two different tests that have been proposed by the Courts, which seem to connote 	the same principle although in different words:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. The test laid down by &lt;i&gt;Union Public Service Commission&lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) The information sought must relate to „Personal information‟ as understood above of a third party. Therefore, if the information sought 	does not qualify as personal information, the exemption would not apply;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Such personal information should relate to a third person, i.e., a person other than the information seeker or the public authority; AND&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) (a) The information sought should not have a relation to any public activity qua such third person, or to public interest. If the information sought 	relates to public activity of the third party, i.e. to his activities falling within the public domain, the exemption would not apply. Similarly, if the 	disclosure of the personal information is found justified in public interest, the exemption would be lifted, otherwise not; OR (b) The disclosure of the information would cause unwarranted invasion of the privacy of the individual, and that there is no larger public interest involved in such disclosure.	&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. The other test was laid down in &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, but in the specific circumstances of disclosure of personal 	information relating to a public official:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) whether the information is deemed to comprise the individual's private details, unrelated to his position in the organization;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) whether the disclosure of the personal information is with the aim of providing knowledge of the proper performance of the duties and tasks assigned 	to the public servant in any specific case; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) whether the disclosure will furnish any information required to establish accountability or transparency in the use of public resources.	&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Constitutional Restrictions&lt;/b&gt;&lt;br /&gt;Since there is not extensive academic discussion on the meaning of the term "larger public interest" or "public interest" as provided in section 8(1)(j), 	one is forced to turn to other sources to get a better idea of these terms. One such source is constitutional law, since the right to privacy, as contained in section 8(1)(j) has its origins in Articles 14,&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; 19(1)(a)	&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt; and 21&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; of the Constitution of India. The 	constitutional right to privacy in India is also not an absolute right and various cases have carved out a number of exceptions to privacy, a perusal of 	which may give some indication as to what may be considered as 'larger public interest', these restrictions are:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) Reasonable restrictions can be imposed on the right to privacy in the interests of the sovereignty and integrity of India, the security of the State, friendly relations with foreign States, public order, decency or morality, or in relation to contempt of court, defamation or incitement to an offence;	&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) Reasonable restrictions can be imposed upon the right to privacy either in the interests of the general public or for the protection of the interests of 	any Scheduled Tribe;&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;&lt;sup&gt;[35]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c) The right to privacy can be restricted by procedure established by law which procedure would have to satisfy the test laid down in the	&lt;i&gt;Maneka Gandhi case&lt;/i&gt;.&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d) The right can be restricted if there is an important countervailing interest which is superior;	&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e) It can be restricted if there is a compelling state interest to be served by doing so;	&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;f) It can be restricted in case there is a compelling public interest to be served by doing so;	&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;g) The &lt;i&gt;Rajagopal tests - &lt;/i&gt;This case lays down three exceptions to the rule that a person's private information cannot be published, &lt;i&gt;viz. &lt;/i&gt; i) person voluntarily thrusts himself into controversy or voluntarily raises or invites a controversy, ii) if publication is based on public records other 	than for sexual assault, kidnap and abduction, iii) there is no right to privacy for public officials with respect to their acts and conduct relevant to 	the discharge of their official duties. It must be noted that although the Court talks about public records, it does not use the term 'public domain' and 	thus it is possible that even if a document has been leaked in the public domain and is freely available, if it is not a matter of public record, the right 	to privacy can still be claimed in regard to it.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Section 8(1)(j) in Practice &lt;br /&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The discussion in the previous chapter regarding the interpretation of section 8(1)(j), though (hopefully) helpful still seems a little abstract without 	specific instances and illustrations to drive home the point. In this chapter we shall endeavor to briefly discuss some specific cases regarding 	information disclosure where the issue of violation of privacy of a third party was raised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Private Information of Public Officials&lt;/b&gt;&lt;br /&gt;Some of the most common problems regarding section 8(1)(j) come up when discussing information (personal or otherwise) regarding public officers. The issue 	comes up because an argument can be made that certain information such as income tax details, financial details, medical records, etc. of public officials 	should be disclosed since it has a bearing on their public activities and disclosure of such information in case of crooked officers would serve the 	interests of transparency and cleaner government (hence serving a larger public interest). Although section 8(1)(j) does not make any distinction between a 	private person and a public servant, a distinction in the way their personal information is treated does appear in reality due to the inherent nature of a public servant. Infact it has sometimes been argued that public servants must waive the right to privacy in favour of transparency.&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt; However this argument has been repeatedly rejected by the Courts,	&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt; just because a person assumes public office does not mean that he/she would automatically lose their 	right to privacy in favour of transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If personal information regarding a public servant is asked for, then a distinction must be made between the information that is inherently personal to the 	person and that which has a connection with his/her public functions. The information exempted under section 8(1)(j) is personal information which is so 	intimately private in nature that the disclosure of the same would not benefit any other person, but would result in the invasion of the privacy of the 	third party.&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt; In short, the Courts have concluded that there can be no blanket rule regarding what 	information can and cannot be disclosed when it comes to a public servant, and the disclosure (or lack of it) would depend upon the circumstances of each 	case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the earlier thinking of the CIC as well as various High Courts of the country was that information regarding disciplinary proceedings and service 	records of public officials is to be treated as public information in order to boost transparency,&lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt; however this line of thinking took almost a U-turn in 2012 after the decision of the Supreme Court in &lt;i&gt;Girish Ramchandra Deshpande &lt;/i&gt;v.	&lt;i&gt;Central Information Commissioner,&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;b&gt;[45]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; and now the prevailing principle is that 	such information is personal information and should not be disclosed unless a larger public interest is would be served by the disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would also be helpful to look at a list of the type of information regarding public servants which has been disclosed in the past, gleaned from various 	cases, to get a better understanding of the prevailing trends in such cases:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Details of postings of public servants at various points of time, since this was not considered as personal information;	&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Copies of posting/ transfer orders of public servants, since it was not considered personal information;	&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Information regarding transfers of colleagues cannot be exempted from disclosure, since disclosure would not cause any unwarranted invasion of 	privacy and non disclosure would defeat the object of the RTI Act;&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Information regarding the criteria adopted and the marks allotted to various academic qualifications, experience and interview in selection process 	for government posts by the state Public Service Commission;&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Information regarding marks obtained in written test, interview, annual confidential reports of the applicant as well as the marks in the written test and interview of the last candidate selected, since this information was not considered as personal information;	&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Information relating to the appointment and educational certificates of teachers in an educational institution (which satisfies the requirements of being a public authority) was disclosed since this was considered as relevant to them performing their functions.	&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The performance of an employee/officer in an organization is primarily a matter between the employee and the employer and normally those aspects are 	governed by the service rules which fall under the expression "personal information", the disclosure of which has no relationship to any public activity or 	public interest. To understand this better below is a brief list of the type of information that has been considered by the Courts as personal information 	which is liable to be exempt from disclosure under section 8(1)(j):&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) (a) Salary details, (b) show cause notice, memo and censure, (c) return of assets and liabilities, (d) details of investment and other related details, 	(e) details of gifts accepted, (f) complete enquiry proceedings, (g) details of income tax returns;&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) All memos issued, show cause notices and orders of censure/punishment etc. are personal information. Cannot be revealed unless a larger public 	interest justifies such disclosure;&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Disciplinary information of an employee is personal information and is exempt under section 8(1)(j);	&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Medical records cannot be disclosed due to section 8(1)(j) as they come under "personal information", unless a larger public interest can be shown 	meriting such disclosure;&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Copy of personnel records and service book (containing Annual Confidential Reports, etc.) of a public servant is personal information and cannot be 	disclosed due to section 8(1)(j);&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Information regarding sexual disorder, DNA test between an officer and his surrogate mother, name of his biological father and step father, name of 	his mother and surrogate step mother and such other aspects were denied by the Courts as such information was considered beyond the perception of decency 	and was an invasion into another man's privacy.&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is not just the issue of disclosure of personal details of public officials that raises complicated questions regarding the right to information, but 	the opposite is equally true, i.e. what about seemingly "public" details of private individuals. A very complicated question arose with regard to 	information relating to the passport details of private individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Passport Information of Private Individuals&lt;/b&gt;&lt;br /&gt;The disclosure of passport details of private individuals is complicated because for a long time there was some confusion because of the treatment to be 	given to passport details, i.e. would its disclosure cause an invasion of privacy since it contains personally identifying information, specially because 	photocopies of the passport are regularly given for various purposes such as travelling, getting a new phone connection, etc. The Central Information 	Commission used a somewhat convoluted logic that since a person providing information relating to his residence and identity while applying for a passport 	was engaging in a public activity therefore such information relates to a public activity and should be disclosed. This view was rejected by the Delhi High Court in the case of &lt;i&gt;Union of India&lt;/i&gt; v. &lt;i&gt;Hardev Singh&lt;/i&gt;,&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt; and the view taken in&lt;i&gt;Hardev Singh&lt;/i&gt; was later endorsed and relied upon in &lt;i&gt;Union of India &lt;/i&gt;v. &lt;i&gt;Rajesh Bhatia&lt;/i&gt;,	&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt; while hearing a number of petitions to decide what details of a third party's passport should be 	disclosed and what should be exempt from disclosure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A list of the Courts conclusions is given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;Information that can be revealed:&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Name of passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Whether a visa was issued to a third party or not;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Details of the passport including dates of first issue, subsequent renewals, dates of application for renewals, numbers of the new passports and date 	of expiry;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Nature of documents submitted as proof;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Name of police station from where verification for passport was done;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Whether any report was called for from the jurisdictional police;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vii) Whether passport was renewed through an agent or through a foreign embassy;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(viii) Whether it was renewed in India or any foreign country;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ix) Whether tatkal facility was availed by the passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;&lt;span&gt;Information that cannot be revealed:&lt;/span&gt;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) Contents of the documents submitted with the passport application;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Marital status and name and address of husband;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Whether person's name figures as mother/guardian in the passport of any minor;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Copy of passport application form;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Residential address of passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vi) Details of cases filed/pending against passport holder;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(vii) Copy of old passport;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(viii) Report of the police and CID for issuing the passport;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ix) Copy of the Verification Certificate, if any such Verification Certificate was relied upon for the issue of the passport.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Instances &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the above two broad categories of information that has been the subject of intense judicial discussion, certain other situations have also 	arisen where the Courts have had to decide the issue of disclosure under section 8(1)(j), a brief summary of such situations is given below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(i) names and details of people who received money as donations from the President out of public funds was considered as information which has a definite 	link to public activities and was therefore liable to be disclosed;&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) information regarding the religion practiced by a person, who is alleged to be a public figure, collected by the Census authorities was not disclosed since it was held that the quest to obtain the information about the religion professed or not professed by a citizen cannot be in any event;	&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) information regarding all FIRs against a person was not protected under section 8(1)(j) since it was already a matter of public record and Court 	record and could not be said to be an invasion of the person's privacy;&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) information regarding the income tax returns of a public charitable trust was held not to be exempt under section 8(1)(j), since the trust involved 	was a public charitable trust functioning under a Scheme formulated by the District Court and registered under the Bombay Public Trust Act as such due to 	its character and activities its tax returns would be in relation to public interest or activities.&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Conclusion&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A discussion of the provisions of section 8 and 11 of the RTI Act as well as the case laws under it reveals that the legislature was aware of the dangers 	posed to the privacy of individuals from such a powerful transparency law. However, it did not want the exceptions carved out to protect the privacy of 	individuals to nullify the objects of the RTI Act and therefore drafted the legislation to incorporate the principle that although the RTI Act should not 	be used to violate the privacy of individuals, such an exception will not be applicable if a larger public interest is to be served by the disclosure. This 	principle is in line with other common law jurisdictions such as the U.K, Austalia, Canada, etc. which have similar exceptions based on privacy or 	confidentiality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However it is disappointing to note that the legislature has only left the legislation at the stage of the principle which has left the language of the 	exception very wide and open to varied interpretations. It is understandable that the legislature would try to keep specifics out of the scope of the 	section to make it future proof. It is obvious that it would be impossible for the legislature or the courts to imagine every single circumstance that 	could arise where the right to information and the right to privacy would be at loggerheads. However, such wide and ambiguous drafting has led to cases 	where the Courts and the Central Information Commission have taken opposing views, with the views of the Court obviously prevailing in the end. This was 	illustrated by the issue of disclosure of passport details of private individuals with a large number of CIC cases taking different views till the High 	Court of Delhi gave categorical findings on the issue in the &lt;i&gt;Hardev Singh&lt;/i&gt; and &lt;i&gt;Rajesh Bhatia&lt;/i&gt; cases. Similar was the issue of service 	details of public officials since before the decision of the Supreme Court in the case of &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; in 2012 the prevailing 	thinking of the CIC was that details of disciplinary proceedings against public officials are not covered by section 8(1)(j), however this thinking has now 	taken a U-turn as the Supreme Court's understanding of the right to privacy has taken stronger roots and such information is now outside the scope of the 	RTI Act, unless a larger public interest in the disclosure can be shown.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ambiguity that arises in application when trying to balance the right to privacy against the right to information is a drawback in incorporating only a 	principle and leaving the language ambiguous in any legislation. This paper does not advocate that the legislature try to list out all the instances of 	this problem that are possibly imaginable, this would be too time consuming and may even be counterproductive. However, it is possible for the legislature 	to adopt an accepted practice of legislative drafting and list certain instances where there is an obvious balancing required between the two rights and 	put them as "&lt;i&gt;Illustrations&lt;/i&gt;" to the section. This device has been utilised to great effect by some of the most fundamental legislations in India 	such as the Contract Act, 1872 and the Indian Penal Code, 1860. An alternative to this approach could be to utilize the approach taken in the Australian 	Freedom of Information Act, where the Act itself gives certain factors which should be considered to determine whether access to a particular document 	would be in the public interest or not.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;List of References&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Primary Sources&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Australia Freedom of Information Act, 1982.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;i&gt;Bennet Coleman&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, AIR 1973 SC 106.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;i&gt;Bhagat Singh &lt;/i&gt;v. &lt;i&gt;Chief Information Commissioner, &lt;/i&gt;2008 (64) AIC 284 (Del).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Calcutta High Court, WP (W) No. 33290 of 2013, dated 20-11-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Canadian Access to Information Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Constitution of India, 1950.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. &lt;i&gt;Govind&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. &lt;i&gt;Haryana Public Service Commission &lt;/i&gt;v. &lt;i&gt;State Information Commission, &lt;/i&gt;AIR 2009 P &amp;amp; H 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;10. &lt;i&gt;Jamia Millia Islamia v. Sh. Ikramuddin&lt;/i&gt;, Delhi High Court, WP(C) 5677 of 2011 dated 22-11-2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;11. &lt;i&gt;Jitendra Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, 2008 (66) AIC 685 (All).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;12. &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, AIR 1963 SC 129.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;13. &lt;i&gt;Maneka Gandhi &lt;/i&gt;v. &lt;i&gt;Union of India&lt;/i&gt;, Supreme Court of India, WP No. 231 of 1977, dated 25-01-1978.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;14. &lt;i&gt;Naz Foundation&lt;/i&gt; Delhi High Court, WP(C) No.7455/2001 dated 02-07-2009.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;15. &lt;i&gt;P.C. Wadhwa&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, Punjab and Haryana High Court, LPA No. 1252 of 2009 dated 29-11-2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;16. &lt;i&gt;Paardarshita Public Welfare Foundation&lt;/i&gt; v. &lt;i&gt;Union of India and others&lt;/i&gt;, AIR 2011 Del 82.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;17. &lt;i&gt;President's Secretariat&lt;/i&gt; v. &lt;i&gt;Nitish Kumar Tripathi&lt;/i&gt;, Delhi High Court, WP (C) 3382 of 2012, dated 14-06-2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;18. &lt;i&gt;Public Information Officer&lt;/i&gt; v. &lt;i&gt;Andhra Pradesh Information Commission&lt;/i&gt;,2009 (76) AIC 854 (AP).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;19. &lt;i&gt;R. Rajagopal v. Union of India&lt;/i&gt;, Supreme Court of India, dated 7-10-1994.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;20. &lt;i&gt;Rajendra Vasantlal Shah&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner, New Delhi&lt;/i&gt;, AIR 2011 Guj 70.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;21. &lt;i&gt;Rajinder Jaina&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, 2010 (86) AIC 510 (Del. H.C.).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;22. Right to Information Act, 2005&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;23. &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;24. &lt;i&gt;Srikant Pandaya&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, AIR 2011 MP 14.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;25. &lt;i&gt;Surendra Singh &lt;/i&gt;v. &lt;i&gt;State of U.P&lt;/i&gt;, AIR 2009 Alld. 106.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;26. &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;27. &lt;i&gt;Tata Press Ltd. &lt;/i&gt;v.&lt;i&gt; Maharashtra Telephone Nigam Ltd.&lt;/i&gt;, (1995) 5 SCC 139.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;28. U.K. Freedom of Information Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;29. &lt;i&gt;UCO Bank&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner and another&lt;/i&gt;, 2009 (79) AIC 545 (P&amp;amp;H).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;30. &lt;i&gt;Union Centre for Earth Science Studies &lt;/i&gt;v. &lt;i&gt;Anson Sebastian, &lt;/i&gt;AIR 2010 Ker. 151&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;31. &lt;i&gt;Union of India&lt;/i&gt; v. &lt;i&gt;Hardev Singh&lt;/i&gt; WP(C) 3444 of 2012 dated 23-08-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;32. &lt;i&gt;Union of India &lt;/i&gt;v. &lt;i&gt;Rajesh Bhatia&lt;/i&gt; WP(C) 2232/2012 dated 17-09-2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;33. &lt;i&gt;Union Public Service Commission &lt;/i&gt;v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 	13-07-2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;34. &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span style="text-decoration: underline;"&gt;&lt;b&gt;Secondary Sources&lt;/b&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. "Country Report for U.K.", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/united-kingdom"&gt;https://www.privacyinternational.org/reports/united-kingdom&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. "Country Report for Australia", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/australia"&gt;https://www.privacyinternational.org/reports/australia&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. "Country Report for Canada", Privacy International, available at	&lt;a href="https://www.privacyinternational.org/reports/canada"&gt;https://www.privacyinternational.org/reports/canada&lt;/a&gt;.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; AIR 1973 SC 106. This case held that the freedom of the press embodies in itself the right of the people to read.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; (1995) 5 SCC 139.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; AIR 1963 SC 129.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Section 8(1) in its entirety states as follows:&lt;/p&gt;
&lt;p&gt;(1) Notwithstanding anything contained in this Act, there shall be no obligation to give any citizen,-&lt;/p&gt;
&lt;p&gt;(a) information, disclosure of which would prejudicially affect the sovereignty and integrity of India, the security, strategic, scientific or 			economic interests of the State, relation with foreign State or lead to incitement of an offence;&lt;/p&gt;
&lt;p&gt;(b) information which has been expressly forbidden to be published by any court of law or tribunal or the disclosure of which may constitute 			contempt of court;&lt;/p&gt;
&lt;p&gt;(c) information, the disclosure of which would cause a breach of privilege of Parliament or the State Legislature;&lt;/p&gt;
&lt;p&gt;(d) information including commercial confidence, trade secrets or intellectual property, the disclosure of which would harm the competitive 			position of a third party, unless the competent authority is satisfied that larger public interest warrants the disclosure of such information;&lt;/p&gt;
&lt;p&gt;(e) information available to a person in his fiduciary relationship, unless the competent authority is satisfied that the larger public interest 			warrants the disclosure of such information;&lt;/p&gt;
&lt;p&gt;(f) information received in confidence from foreign Government;&lt;/p&gt;
&lt;p&gt;(g) information, the disclosure of which would endanger the life or physical safety of any person or identify the source of information or 			assistance given in confidence for law enforcement or security purposes;&lt;/p&gt;
&lt;p&gt;(h) information which would impede the process of investigation or apprehension or prosecution of offenders;&lt;/p&gt;
&lt;p&gt;(i) cabinet papers including records of deliberations of the Council of Ministers, Secretaries and other officers:&lt;/p&gt;
&lt;p&gt;Provided that the decisions of Council of Ministers, the reasons thereof, and the material on the basis of which the decisions were taken shall be 			made public after the decision has been taken, and the matter is complete, or over:&lt;/p&gt;
&lt;p&gt;Provided further that those matters which come under the exemptions specified in this section shall not be disclosed;&lt;/p&gt;
&lt;p&gt;(j) information which relates to personal information the disclosure of which has no relationship to any public activity or interest, or which 			would cause unwarranted invasion of the privacy of the individual unless the Central Public Information Officer or the State Public Information 			Officer or the appellate authority, as the case may be, is satisfied that the larger public interest justifies the disclosure of such information:&lt;/p&gt;
&lt;p&gt;Provided that the information which cannot be denied to the Parliament or a State Legislature shall not be denied to any person.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Section 11 of the RTI Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; &lt;i&gt;The Registrar General&lt;/i&gt; v. &lt;i&gt;A. Kanagaraj&lt;/i&gt;, (Madras High Court, 14 June 2013, available at http://www.indiankanoon.org/doc/36226888/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Arvind Kejriwal v. Central Public Information Officer, (Delhi High Court, 30 September 2011, available at http://www.indiankanoon.org/doc/1923225/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Sections 40 and 41 of the U.K. Freedom of Information Act, 2000.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Section 11A read with section 47-F of the Australia Freedom of Information Act, 1982.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Section 19 of the Canadian Access to Information Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; &lt;i&gt;Public Information Officer&lt;/i&gt; v. &lt;i&gt;Andhra Pradesh Information Commission&lt;/i&gt;,2009 (76) AIC 854 (AP).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; &lt;i&gt;Bhagat Singh &lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner, &lt;/i&gt;2008 (64) AIC 284 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Articles 14, 19(1)(a) and 21 of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Calcutta High Court, WP(W) No. 33290 of 2013, dated 20-11-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; &lt;i&gt;Jitendra Singh&lt;/i&gt; v. &lt;i&gt;State of U.P.&lt;/i&gt;, 2008 (66) AIC 685 (All).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; &lt;i&gt;Surup Singh Hyra Naik&lt;/i&gt; v. &lt;i&gt;State of Maharashtra&lt;/i&gt;, 2007 (58) AIC 739 (Bom), para 14. Where the Court held that since the medical records of a convict cannot be 			denied to Parliament or State legislature therefore they cannot be exempted from disclosure under the Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; &lt;i&gt;Jamia Millia Islamia v. Sh. Ikramuddin&lt;/i&gt; , Delhi High Court, WP(C) 5677 of 2011 dated 22-11-2011.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 ( for stay), dated 13-07-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; AIR 1963 SC 129.&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Delhi High Court, WP(C) No.7455/2001 dated 02-07-2009.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; &lt;i&gt;Union Public Service Commission &lt;/i&gt; v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 &amp;amp; C.M. No. 2618/2011 (for stay), dated 13-07-2012. This ruling was overturned by a 			Division Bench of the High Court relying upon a subsequent Supreme Court ruling, however, it could be argued that the Division Bench did not per se 			disagree with the discussion and the principles laid down in this case, but only the way they were applied.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; Right to equality.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Freedom of speech and expression.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Right to life.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Article 19(2) of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; Article 19(5) of the Constitution of India, 1950.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; &lt;i&gt;Maneka Gandhi &lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, Supreme Court of India, WP No. 231 of 1977, dated 25-01-1978. The test laid down in this case is universally considered 			to be that the procedure established by law which restricts the fundamental right should be just, fair and reasonable.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; &lt;i&gt;Govind &lt;/i&gt; v.&lt;i&gt; State of M.P&lt;/i&gt;&lt;i&gt;.&lt;/i&gt;, Supreme Court of India, WP No. 72 of 1970, dated 18-03-1975. However the Court later used phrases such as 			"reasonable restriction in public interest" and "reasonable restriction upon it for compelling interest of State" interchangeably which seems to 			suggest that the terms "compelling public interest" and "compelling state interest" used by the Court are being used synonymously and the Court 			does not draw any distinction between them. It is also important to note that the wider phrase "countervailing interest is shown to be superior" 			seems to suggest that it is possible, atleast in theory, to have other interests apart from public interest or state interest also which could 			trump the right to privacy.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; &lt;i&gt;R. Rajagopal v. Union of India&lt;/i&gt; , Supreme Court of India, dated 7-10-1994. These tests have been listed as one group since they are all applicable in the specific context of 			publication of private information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; &lt;i&gt;Vijay Prakash&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010. Also see &lt;i&gt;Vijay Prakash&lt;/i&gt; v.			&lt;i&gt;Union of India&lt;/i&gt;, 2009 (82) AIC 583 (Del).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667. This case also held that information cannot be denied on the ground that it 			would be too voluminous.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; &lt;i&gt;Union Centre for Earth Science Studies &lt;/i&gt; v. &lt;i&gt;Anson Sebastian, &lt;/i&gt;AIR 2010 Ker. 151; &lt;i&gt;Union Public Service Commission &lt;/i&gt;v. &lt;i&gt;R.K. Jain&lt;/i&gt;, Delhi High Court W.P.(C) 1243/2011 			&amp;amp; C.M. No. 2618/2011 (for stay), dated 13-07-2012&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; &lt;i&gt;Canara Bank&lt;/i&gt; v. &lt;i&gt;Chief Information Commissioner&lt;/i&gt;, 2007 (58) AIC Ker 667.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; &lt;i&gt;Haryana Public Service Commission &lt;/i&gt; v. &lt;i&gt;State Information Commission, &lt;/i&gt;AIR 2009 P &amp;amp; H 14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; &lt;i&gt;UCO Bank&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner and another&lt;/i&gt;, 2009 (79) AIC 545 (P&amp;amp;H).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; &lt;i&gt;Surendra Singh &lt;/i&gt; v. &lt;i&gt;State of U.P&lt;/i&gt;, AIR 2009 Alld. 106.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; &lt;i&gt;Girish Ramchandra Deshpande&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner&lt;/i&gt;, 2012 (119) AIC 105 (SC).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; &lt;i&gt;R.K. Jain&lt;/i&gt; v. &lt;i&gt;Union Public Service Commission&lt;/i&gt;, Delhi High Court, LPA No. 618 of 2012, dated 12-11-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; &lt;i&gt;Secretary General, Supreme Court of India&lt;/i&gt; v. &lt;i&gt;Subhash Chandra,&lt;/i&gt; Delhi High Court - Full Bench, LPA No.501/2009, dated 12-01-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; &lt;i&gt;Srikant Pandaya&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;/i&gt;, AIR 2011 MP 14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; &lt;i&gt;Paardarshita Public Welfare Foundation&lt;/i&gt; v. &lt;i&gt;Union of India and others&lt;/i&gt;, AIR 2011 Del 82. It must be mentioned that this case was not exactly under the procedure prescribed under 			the RTI Act but was a public interest litigation although the courts relied upon the provisions of the RTI Act.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; WP(C) 3444 of 2012 dated 23-08-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; WP(C) 2232/2012 dated 17-09-2013.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; &lt;i&gt;President's Secretariat&lt;/i&gt; v. &lt;i&gt;Nitish Kumar Tripathi&lt;/i&gt;, Delhi High Court, WP (C) 3382 of 2012, dated 14-06-2012.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; &lt;i&gt;P.C. Wadhwa&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, Punjab and Haryana High Court, LPA No. 1252 of 2009 dated 29-11-2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; &lt;i&gt;Rajinder Jaina&lt;/i&gt; v. &lt;i&gt;Central Information Commission&lt;/i&gt;, 2010 (86) AIC 510 (Del. H.C.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; &lt;i&gt;Rajendra Vasantlal Shah&lt;/i&gt; v. &lt;i&gt;Central Information Commissioner, New Delhi&lt;/i&gt;, AIR 2011 Guj 70.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2'&gt;https://cis-india.org/internet-governance/blog/white-paper-on-rti-and-privacy-v-1.2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-09T02:53:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/guidelines-for-examination-of-computer-related-inventions">
    <title>Guidelines for Examination of Computer Related Inventions: Mapping the Stakeholders' Response</title>
    <link>https://cis-india.org/a2k/blogs/guidelines-for-examination-of-computer-related-inventions</link>
    <description>
        &lt;b&gt;The procedure and tests surrounding software patenting in India have remained ambiguous since the Parliament introduced the term “per se” through the Patent (Amendment) Act, 2002.  In 2013, the Indian Patent Office released Draft Guidelines for the Examination of Computer Related Inventions, in an effort to clarify some of the ambiguity. Through this post, CIS intern, Shashank Singh, analyses the various responses by the stakeholders to these Guidelines and highlights the various issues put forth in the responses. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt; I. &lt;/b&gt; &lt;b&gt;Introduction &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In June, 2013 the Office of Controller General of Patents, Designs and Trademarks ('IPO'), released the	&lt;a href="http://ipindia.nic.in/iponew/draft_Guidelines_CRIs_28June2013.pdf"&gt;Draft Guidelines for Examination of Computer Related Inventions&lt;/a&gt; ('Guidelines'). The aim of the Guidelines was to provide some much needed clarity around patentability of Computer Related Inventions ('CRI'). The 	Guidelines discuss the procedure to be adopted by the examiners while examining CRI patent applications. In response to the Guidelines, several 	stakeholders submitted their comments to either accept, reject or modify the interpretation provided by the IPO. Most of the comments circled around the 	phraseology of Section 3(k), Patents Act, 1970 ('Act'). In its current form, Section 3(k) reads as "a mathematical or business method or a computer 	programme per se or algorithms", and comes under Chapter III of the Act which lists inventions that are not patentable. Simply put, this means that software cannot be patented in India, unless it is embedded/combined in with some hardware. While this is the	&lt;a href="http://nopr.niscair.res.in/bitstream/123456789/14456/1/JIPR%2017(4)%20284-295.pdf"&gt;most widely accepted interpretation of this Section 3(k)&lt;/a&gt;, 	there have been contradictory interpretations as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this note, I shall look at the various ambiguities surrounding patent application for CRIs. The note has been divided into five parts. Part II briefly 	reiterates the legislative history behind Section 3(k) and CRI patenting. Part III would briefly summarize the various parts of the Guidelines where the IPO has given their interpretation and opinion on the various issues surrounding CRI patenting. Part IV would then map the	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/CRI%20Comments-index.html"&gt;position of the stakeholders&lt;/a&gt; on each ambiguous point. Lastly, 	Part V would give the conclusion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; II. &lt;/b&gt; &lt;b&gt;Legislative History &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Patent Act, 1970, prior to the 2002 Amendment, there was no specific provision under which software could be patented. Nonetheless, there was no 	explicit embargo on software patenting either. For an invention to be patentable, under Section 2(1) (j) of the Act, which defines an invention, general 	criteria of novelty, non-obviousness and usefulness must be applied. Software is generally in the form of a mathematical formula or algorithm, both of which are not patentable under the Act as they	&lt;a href="http://nopr.niscair.res.in/bitstream/123456789/14456/1/JIPR%2017(4)%20284-295.pdf"&gt;do not produce anything tangible.&lt;/a&gt; However, if combined or 	embedded in a machine or a computer, the resultant product can be patented as it would pass the aforementioned criteria.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Parliament, in 1999, sought to amend the Act to bring it in conformity with the changing technological landscape. Consequently, the Patent (Second Amendment) Bill, 1999 was introduced in the Parliament which was then referred to a	&lt;a href="http://164.100.47.5/webcom/MoreInfo/PatentReport.pdf"&gt;Joint Parliamentary Committee&lt;/a&gt; ('JPC'). The ensuing Bill proposed Section 3(k) in its 	current phraseology. It reasoned that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;" 	&lt;i&gt; In the new proposed clause (k) the words ''per se" have been inserted. This change has been proposed because sometimes the computer programme may 		include certain other things, &lt;b&gt;ancillary thereto or developed thereon.&lt;/b&gt; The intention here is not to reject them for grant of patent if 		they are inventions. However, the &lt;b&gt;computer programmes as such&lt;/b&gt; are not intended to be granted patent. This amendment has been proposed 		to clarify the purpose. &lt;/i&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bill was then enacted as the &lt;a href="http://www.ipindia.nic.in/ipr/patent/patentg.pdf"&gt;Patent (Amendment) Act, 2002&lt;/a&gt; and reads in its current form 	as:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 3(k) - &lt;i&gt;"a mathematical or business method or a computer programme per se or algorithm"&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This created some ambiguity with respect to the interpretation of the term "per se". It was interpreted to mean that software cannot be patented unless it 	is combined with some hardware. This combination would then have to comply with all the tests of patentability under the Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In December, 2004 the &lt;a href="http://lawmin.nic.in/Patents%20Amendment%20Ordinance%202004.pdf"&gt;Patent (Amendment) Ordinance, 2004&lt;/a&gt; ('Ordinance') was 	enacted which amended Section 3(k) to divide it into two parts, namely Section 3(k) and Section 3(ka).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"&lt;i&gt;(k) a computer programme per se other than its technical application to industry or a combination with hardware;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(ka) a mathematical method or a business method or algorithms;&lt;/i&gt; ".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In February, 2005 the Ordinance was introduced in the Parliament as the	&lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=8096"&gt;Patent (Amendment) Bill, 2005&lt;/a&gt;.This included the amendment to Section 3(k) as under the 	Ordinance. In the Objects and Reasons it clarified that the intention behind the amendment was to " 	&lt;i&gt; modify and clarify the provisions relating to patenting of software related inventions when they have technical application to industry or in 		combination with hardware &lt;/i&gt; ". However, the final amending Act did not divide Section 3(k) as proposed by the Ordinance. In the	&lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=8096"&gt;press note, by the Ministry of Commerce and Industry&lt;/a&gt; it was noted that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; "It is proposed to omit the clarification relating to patenting of software related inventions introduced by the Ordinance as Section 3(k) and 3 (ka). 		The clarification was objected to on the ground that this may give rise to monopoly of multinationals." &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Later, in the same year the IPO release a	&lt;a href="http://ipindia.nic.in/ipr/patent/manual-2052005.pdf"&gt;Manual of Patent Office Practice and Procedure, 2005&lt;/a&gt;. Here, it noted that "a computer 	readable storage medium having a program recorded thereon…irrespective of the medium of its storage are not patentable". This did nothing to clarify 	the ambiguity that existed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the 	&lt;a href="http://164.100.47.5/newcommittee/reports/EnglishCommittees/Committee%20on%20Commerce/88th%20Report.htm"&gt; Parliamentary Standing Committee on Commerce, 88&lt;sup&gt;th&lt;/sup&gt; Report on the Patent and Trademark System in India (2008) &lt;/a&gt; noted the uncertainty surrounding the term 'per se' and said that there was a need to clarify the same. It did not do anything in furtherance of pointing 	this out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2011 	&lt;a href="http://www.ipindia.nic.in/ipr/patent/manual/HTML%20AND%20PDF/Manual%20of%20Patent%20Office%20Practice%20and%20Procedure%20-%20pdf/Manual%20of%20Patent%20Office%20Practice%20and%20Procedure.pdf"&gt; Manual of Patent Office and Procedure, 2011 &lt;/a&gt; tried to elaborately deal with the ambiguity. Nonetheless, substantively it did not change the uncertainty. It stated that&lt;b&gt;:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; "If the claimed subject matter in a patent application is only a computer programme, it is considered as a computer programme per se and hence not 		patentable. Claims directed at computer programme products' are computer programmes per se stored in a computer readable medium and as such are not 		allowable. Even if the claims, inter alia, contain a subject matter which is not a computer programme, it is examined whether such subject matter is 		sufficiently disclosed in the specification and forms an essential part of the invention." &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; III. &lt;/b&gt; &lt;b&gt;Draft Guidelines for Examination of Computer Related Inventions, 2013&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Draft Guidelines were released on June 28, 2013, following which stakeholders were invited to give comments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Terms/ Definitions used while dealing with CRIs &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the outset, the IPO put a caveat to say that the Guidelines do not constitute 'rule making'. Consequently, in case of a conflict between the Guidelines 	and the Act, the Act shall prevail. After the Introduction and Background, in Part I and Part II respectively, the Guidelines looked at the various 	definitions/terms that correspond to CRI patent claims in Part III. In all, there were 21 such definitions/terms that were sought to be clarified. These 	definitions can be branched into three categories.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Category I- Where the definition/term was borrowed from some other Indian stature. 	&lt;br /&gt; Category II- Where the definition/term was construed according to the plain dictionary meaning. Category III- Where the Guidelines tried to give their 	interpretation to the term/definition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Category I, there were seven definitions whose meaning was derived from some other stature. The meaning of Computer Network, Computer System, Data, 	Information and Function were derived from &lt;a href="http://www.dot.gov.in/sites/default/files/itbill2000_0.pdf"&gt;Information Technology Act, 2000&lt;/a&gt; ('IT 	Act'). The definition of Computer Programme was taken from &lt;a href="http://copyright.gov.in/documents/copyrightrules1957.pdf"&gt;Copyright Act, 1957&lt;/a&gt;. 	Lastly, the definition of Computer was taken from both Copyright Act and IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Category II, the Guidelines underscored five definitions whose meaning was to be borrowed from the Oxford Dictionary. These were algorithm, software, 	per se, firm ware and hardware. Importantly, it was noted that these definitions have not been defined anywhere in Indian legislations. Lastly, under 	Category III the Guidelines tried to interpret certain terms according to their understanding. These terms included, Embedded Systems, Technical Effects, 	Technical Advancement, Mathematical Methods, Business Methods etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Categorization of CRI claims &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Part IV, the Guidelines tried to broadly group the various CRI patent applications under four heads. These categorizations tried to give an insight into 	what the patent examiners look for while rejecting a patent application.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Method/process: &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Without defining what a method or process would entail, the Guidelines stated that any claim carrying a preamble with "method/process for..." shall not be 	patentable. It clarified that claims relating to mathematical methods, business methods, computer programme per se, algorithm or mental act are cannot be 	patented as they are prime illustrations of claims under this category. Further, the Guidelines gave specific examples of each of the aforementioned 	claims.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Apparatus/system &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The second category consisted of claims whose preamble stated that the patent application was for an "apparatus/system". Under this, the patent application 	must not only comply with the standard tests of patentability- novelty, inventive step and industrial applicability, but also define the inventive 	constructional or hardware feature of the CRI. However, in contradictory statements, the Guidelines try to narrow down the prerequisites for a claim under 	this category, only to state that such claims cannot be patented.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Computer readable medium &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;While stating this as a category, the Guidelines do not elaborate on what this exactly means and what types of claims would be rejected being under this 	category.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Computer program product &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;This category includes computer programs that are expressed on a computer readable medium (CD, DVD, Signal etc.). Further, infusing ambiguity to the 	debate, the Guidelines failed to differentiate between Computer Readable Medium and Computer Program Product.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Examination Procedure used by IPO &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The examination procedure for CRI patent application in the Guidelines is similar to other patent applications which look at novelty, inventive step and 	industrial applicability. However, claims relating to determination of specific subject matter under the excluded categories (Method/Process, Computer 	Readable Medium, Apparatus/system, and Computer Program Product) require specific examination skills from the examiner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the excluded category itself, Method/Process requires subjective judgement by the examiner as to whether such a claim qualifies to be classified 	under this category or not. For investigating the inventive step involved in the 'method/process', the technical advancement over existing knowledge in the 	technological field has to be analyzed. Any patent claim from a non-technological field shall not be considered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Guidelines then tried to clarify the controversial Section 3(k) which eliminates the patenting of computer programmes per se. While previously stating 	that the definition of the term 'per se' as borrowed from the Oxford dictionary meant 'by itself', the Guidelines stated that computer programme loaded on 	a general purpose computer or related device cannot be patented. Nonetheless, while filing patent application for a novel hardware, with a loaded computer 	programme, the likelihood patenting the combination cannot be ruled out. Further, the stated hardware must be something more than a general purpose 	machine. Essentially, a patent for a novel computer programme combined with a novel hardware, which must be more than a general purpose machine, may be 	considered for patenting. It then gave several examples which were followed by flowcharts to further clarify ambiguities surrounding CRI patentability. 	Interestingly, all these examples and flowcharts only listed the inventions that are not patentable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; IV. &lt;/b&gt; &lt;b&gt;Response by Stakeholders&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many and various comments were received from 36 stakeholders that including lawyers, civil society members, law firms, students, global and national trade 	bodies and industry representatives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our compilation (and the first level of analysis) of the Stakeholders' Responses is &lt;a href="https://cis-india.org/a2k/blogs/cri-comments-comparison-table.xlsx" class="internal-link"&gt;available here&lt;/a&gt;.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/DivisionofStakeholdersComments.png" alt="Division of Stakeholders' Comments" class="image-inline" title="Division of Stakeholders' Comments" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;While all the stakeholders' applauded the much needed transparency in the IPO, substantively they differed considerably on various issues and highlighted 	some inconsistencies. In this part, I shall map the responses of the various stakeholders'. While doing so, I shall also try and find specific patterns to 	the responses corresponding to the following segments:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Civil Society&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Law Firm/Advocates ('law Firms')&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Industry/ Industry Representatives/Global Trade Body (Industry)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Students&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These segments have been created on the assumption that each of the aforementioned segment would lobby for similar kind of policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Interpretation of Section 3(k) &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the major points of deviation between the stakeholders was regarding the interpretation of Section 3(k) which encapsulates the term "computer 	programme per se".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The industry responded by critiquing the current CRI patenting regime in India as being "restrictive" ( 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Draft%20Guidelines%20for%20Computer%20Related%20Inventions-updated-20130715-1.pdf"&gt; FICCI &lt;/a&gt; , &lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/NASSCOM-feedback%20to%20CRI%20guidance.pdf"&gt;NASSCOM&lt;/a&gt;, 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/USIBC%20Final%20Comments%20on%20CRI%20Guidelines%20July%2026,%202013.pdf"&gt; US India Business Council &lt;/a&gt; and &lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/%5bUntitled%5d.pdf"&gt;Bosch &lt;/a&gt; ). While some industry representatives sought 	clarifications due to uncertain phraseology, there was no industry representative that favored restricted interpretation to exclude software patenting 	altogether. While opposing the Guidelines, they sought assistance from the legislative history behind introduction of Section 3(k). It was pointed out that 	the term 'per se' was included to raise the threshold of patentability to something higher than the previous patentability standard, but it did not 	explicitly exclude patent protection for software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The general perception of the stakeholders, keeping in mind the current Guidelines, was that for patenting software it had to be combined with some 	hardware. This combination would then be scrutinized against the triple test of novelty, inventive step and industrial application.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the Guidelines noted that the hardware involved must not be general purpose hardware and that the chances of software patentability would increase 	significantly if novelty resides in the hardware; however, most of the industry and global trade bodies disagreed with this interpretation. They argued 	that if software in combination of hardware technically advances the existing technology, then such an innovation must be patentable, despite being 	combined with a general purpose machine (&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/%5bUntitled%5d.pdf"&gt;Bosch&lt;/a&gt;). Another 	explanation supporting expanded interpretation was that much of the technological innovation is accomplished through software development as compared to 	hardware innovation and novel software can achieve technical effect without the hardware developments ( 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/FINAL%20BSA%20comments%20on%20India%20Patent%20Office%20Guidelines%20for%20CII.pdf"&gt; BSA- The Software Alliance &lt;/a&gt; ). Consequently, software development that allows a general purpose machine to perform tasks that were once performed by a special machine must be 	incentivized. Some stakeholders interpreted the Guidelines to reason that hardware must be completely disregarded while examining patentability of software 	(&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Comments%20on%20the%20Recent%20guidelines%20on%20CRI.pdf"&gt;Majumdar &amp;amp; Co.&lt;/a&gt; ).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most of the responses from the civil society argued for a restricted interpretation of Section 3(k) (	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/CRI%20Comment%20CIS.pdf"&gt;Centre for Internet &amp;amp; Society&lt;/a&gt;). They concurred 	with the interpretation provided by the IPO to exclude software patentability. Most of the stakeholders responded seeking further clarification on the subject (&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/CRI_Comments_SFLC.pdf"&gt;Software Freedom Law Centre&lt;/a&gt;&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Final%20comments%20on%20CRI%20guidelines_Gabrial.pdf"&gt;, K&amp;amp;S Partners&lt;/a&gt; and	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Rachna.pdf"&gt;Xellect IP Solutions&lt;/a&gt;).&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/StakeholdersOpinion.png" alt="Stakeholders' Opinion" class="image-inline" title="Stakeholders' Opinion" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;However, within each segments itself there was difference of opinion on the interpretation of Section 3(k). For instance, out of the five civil society 	members, four wanted to restrictive interpretation while one of them favoured expansive interpretation to include software patenting. Similarly, 13 law 	firms sought further clarification on the subject matter, while seven argued for expansive interpretation and one of them argued for restricted 	interpretation. The most consistent response was from the industry that clearly favoured software patenting and called the Guidelines "restrictive". Seven 	out of the nine industry representatives supported expansive interpretation and the other two sought further clarifications on the subject.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Section 5.4.6- Hardware &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The interpretation of Section 3(k) until the release of the Guidelines was that software in combination with some hardware could be considered for 	patenting. However, the Guidelines increased the threshold stating that this hardware must be "something more than a general purpose machine". A 	stakeholder pointed out that increasing this threshold would go against the legislative intent as the requirement of a novel hardware has not been 	mentioned anywhere in the Act ( 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Comments%20to%20Guidelines%20for%20Examination%20of%20CRIs%20-%20Anand%20and%20Anand.pdf"&gt; Anand &amp;amp; Anand &lt;/a&gt; ).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The industry's perspective on this matter was largely uniform. They pointed out the large technological field that would be eliminated from the scope of patentability if the interpretation provided by the Guidelines is adopted (	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/%5bUntitled%5d.pdf"&gt;Bosch&lt;/a&gt;). Also, the investigation of novelty in the hardware 	would disincentives inventors in the field of CRIs ( 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Comments%20on%20Draft%20Guidelines%20for%20Examination%20of%20CRIs.pdf"&gt; Kan &amp;amp; Krishme &lt;/a&gt; ). Most of the stakeholders, across segments, sought more clarification on the role of hardware under Section 3(k) (&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Comments%20on%20the%20Recent%20guidelines%20on%20CRI.pdf"&gt;Majumdar &amp;amp; Co.&lt;/a&gt; &lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/CRI%20Comment%20CIS.pdf"&gt;Centre for Internet &amp;amp; Society&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Comparative Analysis &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Much of the criticism surrounding CRI patenting policy in India is based on the comparative inconsistency with similar laws in other jurisdictions. 	Comparative analysis on the subject has only been provided by the stakeholders that support software patentability. They point out that most countries like 	US, UK, Japan and the European Patent Convention allow patenting of software, and India must also do the same in order to comply with its international 	obligations under the TRIPs Agreement. Paradoxically, stakeholders who supported the current practice chose not to comparatively analyze CRI policy of 	other jurisdictions. While most of the stakeholders simply jumped to analyze comparative jurisprudence on the subject, only one of them gave a reasonable explanation for such a comparison (	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/RP-Comments-on_Guidelines_for_CRI-Main_26jul13_clean.pdf"&gt;LKS&lt;/a&gt;). It was noted 	that the Supreme Court of India and the Intellectual Property Appellate Board regularly borrow from foreign decisions to either accept or deny patents. 	Therefore, while formulating any policy on the matter, the position in other jurisdictions must be considered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was reasoned that the term 'per se' used in the Act, is similar to the European Patent Convention and	&lt;a href="https://www.gov.uk/government/uploads/system/uploads/attachment_data/file/354942/patentsact1977011014.pdf"&gt;UK Patent Act, 1977&lt;/a&gt; where the term 	'as such' has been used. Therefore, while juxtaposing both the terms, the interpretation of 'per se' must be similar to 'as such'. Consequently, software 	patenting must be allowed subject to the tests evolved by the courts. Similarly, the term 'as such' has been used by several Asian countries including 	China, Taiwan, South Korea and Japan. In these countries, software in concert with a specific hardware that resolves a technical problem thereby achieving 	a technical result can be patented ( 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Comments%20on%20draft%20Guidelines%20for%20CRI_Krishna.pdf"&gt; Krishna and Saurastri Associates &lt;/a&gt; ).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Likewise, while comparing the jurisprudence of US, the landmark case	&lt;a href="http://caselaw.lp.findlaw.com/scripts/getcase.pl?court=US&amp;amp;vol=450&amp;amp;invol=175"&gt;&lt;i&gt;Diamond vs. Diehr&lt;/i&gt;&lt;/a&gt;, which marked the beginning of software patenting was cited (	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Shubhojeet_Comments_CRI%20(1).pdf"&gt;Subhojeet Ghosh&lt;/a&gt; and 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/USIBC%20Final%20Comments%20on%20CRI%20Guidelines%20July%2026,%202013.pdf"&gt; US India Business Council &lt;/a&gt; ). Several others argued that India must align their laws with global standards (	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/%5bUntitled%5d.pdf"&gt;Bosch&lt;/a&gt;, 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/2013-07-26%20PEIL_comments%20on%20draft%20guidelines%20on%20examination%20of%20computer%20related%20inventions.pdf"&gt; Phillips Intellectual Property and Standards &lt;/a&gt; , 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Comments_to_India_Draft_Guidelines_for_Computer_Related_Inventions.pdf"&gt; Sun Smart IP Services &lt;/a&gt; , &lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Guideline1.pdf"&gt;United Overseas Patent Firm&lt;/a&gt;).&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/ComparativeAnalysis.png" alt="Comparative Analysis" class="image-inline" title="Comparative Analysis" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Business Method&lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Guidelines tried to narrow down the definition of 'Business Method' to clarify that such claims cannot be patented. It was urged that the Guidelines reconsider such a blanket embargo (	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Comments%20on%20CRIs.pdf"&gt;Legasis Partners- Advocates and Solicitors&lt;/a&gt;, 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Comments%20to%20Guidelines%20for%20Examination%20of%20CRIs%20-%20Anand%20and%20Anand.pdf"&gt; Anand &amp;amp; Anand &lt;/a&gt; ). While judging patentability, a patent must not be rejected simply because it mentions business method or business method related terminology. What must be examined is whether the inventive step resides in the technical or non-technical part of the claim (	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Comments%20on%20CRIs.pdf"&gt;Legasis Partners- Advocates and Solicitors&lt;/a&gt;). A 	distinction must be made differentiating as to what software implementing business method and a software relating to the technical aspect of the 	transaction ( 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Comments%20to%20Guidelines%20for%20Examination%20of%20CRIs%20-%20Anand%20and%20Anand.pdf"&gt; Anand &amp;amp; Anand &lt;/a&gt; ). While the former can be rejected, the latter must be accepted subject to the triple test of patenting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was pointed out that reevaluating a business method claim apart from a method involving financial transaction; monopoly claim over trade and new business strategies; monopoly claim over new types of carrying out business and method of increasing revenue; must be rejected (&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Comments%20on%20draft%20CRI.pdf"&gt;Law Offices of Mohan Associates&lt;/a&gt; &lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/REMFRY%20&amp;amp;%20SAGAR%20COMMENTS%20FOR%20CRI'S.pdf"&gt;, Remfry and Sagar&lt;/a&gt;, 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Draft%20Guidelines%20for%20Computer%20Related%20Inventions-updated-20130715-1.pdf"&gt; FICCI &lt;/a&gt; ). The more overarching opinion of the stakeholders was there is no objection to the exclusion of business method patents, but what constitutes business 	methods need more clarity (&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/COMMENTS.pdf"&gt;D. Moses Jeyakaran&lt;/a&gt;, 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Final%20thappeta%20Jul%2026%202013%20comments%20on%20CRI%20Examination.pdf"&gt; Law Firm of Naren Thappeta &lt;/a&gt; , 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/JIPA%20Opinions%20Draft%20Guidelines%20for%20Examination%20of%20CRIs.pdf"&gt; Japan Intellectual Property Association &lt;/a&gt; ).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;Critique of Examples and Flowcharts &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Guidelines provided for several examples and flowcharts to foster a better understanding of the subject matter. However, a notable feature of each of 	these was that they only gave examples of what claims would be rejected. This was sufficiently pointed out by most of the stakeholders who sought more 	positive examples (&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/%5bUntitled%5d.pdf"&gt;Bosch&lt;/a&gt;, 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/FINAL%20BSA%20comments%20on%20India%20Patent%20Office%20Guidelines%20for%20CII.pdf"&gt; BSA- The Software Alliance &lt;/a&gt; &lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Final%20comments%20on%20CRI%20guidelines_Gabrial.pdf"&gt;, K&amp;amp;S Partners&lt;/a&gt; , 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Draft%20Guidelines%20for%20Computer%20Related%20Inventions-updated-20130715-1.pdf"&gt; FICCI &lt;/a&gt; , &lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Rachna.pdf"&gt;Xellect IP Solutions&lt;/a&gt;, 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/JIPA%20Opinions%20Draft%20Guidelines%20for%20Examination%20of%20CRIs.pdf"&gt; Japan Intellectual Property Association &lt;/a&gt; , 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/FINAL_I-HIPP_submission_on_CRI_Guidelines.pdf"&gt; In-House Intellectual Property Professional Forum, &lt;/a&gt; &lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/NASSCOM-feedback%20to%20CRI%20guidance.pdf"&gt;NASSCOM&lt;/a&gt; &lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/O&amp;amp;A-Comments%20on%20Guidelines%20for%20CRI.pdf"&gt;, Obhan &amp;amp; Associates&lt;/a&gt; , &lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/REMFRY%20&amp;amp;%20SAGAR%20COMMENTS%20FOR%20CRI'S.pdf"&gt;Remfry &amp;amp; Sagar&lt;/a&gt;,	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/TCS%20Response%20to%20Draft%20CRI%20Guidelines.pdf"&gt;Tata Consultancy Services&lt;/a&gt; ). It was pointed out that the examples have not sufficiently elaborated on their relation with Section 3(k) ( 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Draft%20Guidelines%20for%20Computer%20Related%20Inventions-updated-20130715-1.pdf"&gt; FICCI &lt;/a&gt; ), and some of them are "weak, obscure and incorrect" (	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/CRI_Comments_SFLC.pdf"&gt;Software Freedom Law Centre&lt;/a&gt;). These examples also fail to elaborate on the tests that have previously been applied by the Patent Office (	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/RP-Comments-on_Guidelines_for_CRI-Main_26jul13_clean.pdf"&gt;LKS&lt;/a&gt;). Overall, the general perception was that, the examples were confusing and greater clarity along with positive examples was needed (	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/RP-Comments-on_Guidelines_for_CRI-Main_26jul13_clean.pdf"&gt;LKS&lt;/a&gt;, 	&lt;a href="http://ipindia.nic.in/iponew/CRI_Comments_Feedbacks/related_doc/Comments%20to%20Guidelines%20for%20Examination%20of%20CRIs%20-%20Anand%20and%20Anand.pdf"&gt; Anand &amp;amp; Anand &lt;/a&gt; ).&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/PositionofStakeholdersIllustrations.png" alt="Position of Stakeholders' Illustrations" class="image-inline" title="Position of Stakeholders' Illustrations" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, out of the 25 stakeholders' who commented on the illustrations, 16 sought positive examples. Further, most of the positive examples were 	sought by industry representatives and law firms who supported software patenting.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; V. &lt;/b&gt; &lt;b&gt;Conclusion &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has been over a year since IPO released the CRI Guidelines. On release, it invited suggestions in order to revise the Guidelines, but the revised 	version has still not been released by the IPO. The Guidelines were authored from a patent examiner's perspective; however, while doing so it obscured the 	matter further. It was argued that in totality the application of the Guidelines would now make the patentability of software stricter. It was also pointed 	out that the Guidelines have not taken into account the legislative history and the specific rejection of the Ordinance in the 2005 Amendment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The responses received by IPO gave conflicting opinion on the same issue. In general, it can be concluded that the industry and law firms were in favour of 	allowing software patenting. They sought removal of the hardware requirement for software patentability. Most of the stakeholder's who favoured software 	patenting also undertook a comparative study of jurisdictions like US, UK, EU and Japan to point out the difference in the software patenting policy. 	Further, they also wanted the Guidelines to give positive examples wherein CRIs patenting has previously been allowed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Admittedly, the Guidelines have no legal standing and much like the Patent Manual, they serve merely to guide the patent applicants and provide 	transparency patent examination. Overall, the Guidelines failed to explain the previous inconsistencies surrounding the subject matter. In conclusion the 	Guidelines mention that it would periodically release and update the Guidelines incorporating the stakeholder's comments. Considering the diverse set of 	opinions received by the IPO, it now needs to be seen which suggestions are accepted until the next round of comments.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/guidelines-for-examination-of-computer-related-inventions'&gt;https://cis-india.org/a2k/blogs/guidelines-for-examination-of-computer-related-inventions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Software Patents</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2015-01-05T17:01:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world">
    <title>Big Data and Positive Social Change in the Developing World: A White Paper for Practitioners and Researchers</title>
    <link>https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world</link>
    <description>
        &lt;b&gt;I was a part of a working group writing a white paper on big data and social change, over the last six months. This white paper was produced by a group of activists, researchers and data experts who met at the Rockefeller Foundation’s Bellagio Centre to discuss the question of whether, and how, big data is becoming a resource for positive social change in low- and middle-income countries (LMICs).&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Bellagio Big Data Workshop Participants. (2014). “Big data and positive social change in the developing world: A white paper for practitioners and researchers.” Oxford: Oxford Internet Institute. Available online: &lt;a class="external-link" href="http://ssrn.com/abstract=2491555"&gt;http://ssrn.com/abstract=2491555&lt;/a&gt;.&lt;/p&gt;
&lt;h2&gt;Summary&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Our working definition of big data includes, but is not limited to, sources such as social media, mobile phone use, digitally mediated transactions, the online news media, and administrative records. It can be categorised as data that is provided explicitly (e.g. social media feedback); data that is observed (e.g. mobile phone call records); and data that is inferred and derived by algorithms (for example social network structure or inflation rates). We defined four main areas where big data has potential for those interested in promoting positive social change: advocating and facilitating; describing and predicting; facilitating information exchange and promoting accountability and transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In terms of &lt;span class="ff5"&gt;advocating and facilitating&lt;/span&gt;,&lt;span class="_0 _"&gt; &lt;/span&gt; we discussed ways in which volunteered data may &lt;span class="_0 _"&gt; &lt;/span&gt;help organisations to open up new public spa&lt;span class="_0 _"&gt;&lt;/span&gt;ces for discussion and awareness&lt;span class="_0 _"&gt;&lt;/span&gt;-building; how both aggregating data and working across different databa&lt;span class="_0 _"&gt;&lt;/span&gt;ses can be tools for building awa&lt;span class="_0 _"&gt;&lt;/span&gt;reness, and howthe digital data commons can also configure new&lt;span class="_0 _"&gt;&lt;/span&gt;&lt;span class="ff5"&gt; &lt;/span&gt;communities and actions&lt;span class="_0 _"&gt;&lt;/span&gt; (sometimes serendipitously) through data science and aggregation. Finally, we also&lt;span class="_0 _"&gt;&lt;/span&gt; looked at the problem of overexposure and ho&lt;span class="_0 _"&gt;&lt;/span&gt;wactivists and organisations can&lt;span class="_0 _"&gt;&lt;/span&gt; protect themselves and hide their digital footprin&lt;span class="_0 _"&gt;&lt;/span&gt;ts. The challenges w&lt;span class="ls2"&gt;e&lt;/span&gt; identified in this area were how to interpret data&lt;span class="_0 _"&gt;&lt;/span&gt; correctly when supplementary information may b&lt;span class="_0 _"&gt;&lt;/span&gt;e lacking; organisational capacity constraints aro&lt;span class="_0 _"&gt;&lt;/span&gt;und processing and storing data,&lt;span class="_0 _"&gt;&lt;/span&gt; and issues around data dissemination, i.e. the pos&lt;span class="_0 _"&gt;&lt;/span&gt;sible negative consequences of inadvertently ide&lt;span class="_0 _"&gt;&lt;/span&gt;ntifying groups or individuals&lt;span class="_0 _"&gt;&lt;/span&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Next, we looked at the way big data can help describe and predict, functions which are particularly important in the academic, development and humanitarian areas of work where researchers can combine data into new dynamic, high-resolution datasets to detect new correlations and surface new questions. With data such as mobile phone data and Twitter analytics, understanding the data’s comprehensiveness, meaning and bias are the main challenges, accompanied by the problem of developing new and more comprehensive ethical systems to protect data subjects where data is observed rather than volunteered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next group of activities discussed was facilitating information exchange. We looked at mobile-based information services, where it is possible for a platform created around a particular aim (e.g. agricultural knowledge-building) to incorporate multiple feedback loops which feed into both research and action. The pitfalls include the technical challenge of developing a platform which is lean yet multifaceted in terms of its uses, and particularly making it reliably available to low-income users. This kind of platform, addressed by big data analytics, also offers new insights through data discovery and allows the provider to steer service provision according to users’ revealed needs and priorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our last category for big data use was accountability and transparency, where organisations are using crowdsourcing methods to aggregate and analyse information in real time to establish new spaces for critical discussion, awareness and action. Flows of digital information can be managed to prioritise participation and feedback, provide a safe space to engage with policy decisions and expose abuse. The main challenges are how to keep sensitive information (and informants) safe while also exposing data and making authorities accountable; how to make the work sustainable without selling data, and how to establish feedback loops so that users remain involved in the work beyond an initial posting. In the crowdsourcing context, new challenges are also arising in terms of how to verify and moderate real-time flows of information, and how to make this process itself transparent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, we also discussed the relationship between big and open data. Open data can be seen as a system of governance and a knowledge commons, whereas big data does not by its nature involve the idea of the commons, so we leaned toward the term ‘opening data’, i.e. processes which could apply to commercially generated as much as public-sector datasets. It is also important to understand where to prioritise opening, and where this may exclude people who are not using the ‘right’ technologies: for example, analogue methods (e.g. nailing a local authority budget to a town hall door every month) may be more open than ‘open’ digital data that’s available online.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our discussion surfaced many questions to do with representation and meaning: must datasets be interpreted by people with local knowledge? For researchers to get access to data that is fully representative, do we need a data commons? How are data proprietors engaging with the power dynamics and inequalities in the research field, and how can civil society engage with the private sector on its own terms if data access is skewed towards elites? We also looked at issues of privacy and risk: do we need a contextual risk perspective rather than a single set of standards? What is the role of local knowledge in protecting data subjects, and what kinds of institutions and practices are necessary? We concluded that there is a case to be made for building a data commons for private/public data, and for setting up new and more appropriate ethical guidelines to deal with big data, since aggregating, linking and merging data present new kinds of privacy risk. In particular, organisations advocating for opening datasets must admit the limitations of anonymisation, which is currently being ascribed more power to protect data subjects than it merits in the era of big data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our analysis makes a strong case that it is time for civil society groups in particular to become part of the conversation about the power of data. These groups are the connectors between individuals and governments, corporations and governance institutions, and have the potential to promote big data analysis that is locally driven and rooted. Civil society groups are also crucially important but currently underrepresented in debates about privacy and the rights of technology users, and civil society as a whole has a responsibility for building critical awareness of the ways big data is being used to sort, categorise and intervene in LMICs by corporations, governments and other actors. Big data is shaping up to be one of the key battlefields of our era, incorporating many of the issues civil society activists worldwide have been working on for decades. We hope that this paper can inform organisations and&lt;br /&gt;individuals as to where their particular interests may gain traction in the debate, and what their contribution may look like.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/big-data-and-positive-social-change.pdf"&gt;Click to download the full white paper here&lt;/a&gt;&lt;/b&gt;. (PDF, 1.95 Mb)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world'&gt;https://cis-india.org/internet-governance/blog/big-data-and-positive-social-change-in-developing-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-10-01T03:52:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands">
    <title>Expanding the World of Telugu Wikipedia – CIS-A2K and ALC join hands</title>
    <link>https://cis-india.org/openness/blog-old/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands</link>
    <description>
        &lt;b&gt;Students and faculty of Andhra Loyola College in Vijayawada aim to enhance Telugu Wikipedia through increased contributions to Wikipedia and make it available under free license.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge"&gt;The Access to Knowledge &lt;/a&gt;(A2K) programme of the Centre for Internet and Society (&lt;a href="https://en.wikipedia.org/wiki/Centre_for_Internet_and_Society_(India)"&gt;CIS&lt;/a&gt;) in its quest to catalyze the growth of open knowledge movement in Indic languages recently added another feather to its cap by signing a memorandum of understanding (MoU) with &lt;a href="http://www.andhraloyolacollege.ac.in/"&gt;Andhra Loyola College&lt;/a&gt; (ALC) in Vijayawada on August 14, 2014 to work collaboratively to improve &lt;a href="https://te.wikipedia.org/wiki/%E0%B0%AE%E0%B1%8A%E0%B0%A6%E0%B0%9F%E0%B0%BF_%E0%B0%AA%E0%B1%87%E0%B0%9C%E0%B1%80"&gt;Telugu Wikipedia&lt;/a&gt; and &lt;a href="https://te.wikisource.org/wiki/%E0%B0%AE%E0%B1%8A%E0%B0%A6%E0%B0%9F%E0%B0%BF_%E0%B0%AA%E0%B1%87%E0%B0%9C%E0%B1%80"&gt;Telugu Wikisource&lt;/a&gt;.  College Principal Fr. G.A.P. Kishore, Vice-Principals Fr. P. Anil Kumar and Fr. Rex Angelo, correspondent Fr. Raju signed the agreement with CIS-A2K programme director T. Vishnu Vardhan.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The MoU signed with ALC is for a period of five years and encompasses four activities:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Open knowledge creation in Telugu across various disciplines on  Telugu Wikipedia: ALC faculty and students will be trained by CIS-A2K  staff and interested Telugu Wikimedians to understand the principles  that govern Wikipedia in order to generate quality entries. Faculty from  Botany, Physics, Statistics, Ethics, Religion, Telugu Literature, and  Music will work with CIS-A2K. Each of the faculty in the coming months  will come up with a plan to generate open knowledge in Telugu in their  respective disciplines.&lt;/li&gt;
&lt;li&gt;Content donation and digitization on Telugu Wikisource: ALC through  its networks will help CIS-A2K to bring Telugu content under CC-BY-SA  4.0 license. The Telugu department of the college expressed keen  interest to work with CIS-A2K in digitizing historical Telugu content  and to make it available on Telugu Wikisource. Various competitions will  be planned in the future.&lt;/li&gt;
&lt;li&gt;Creating a free software environment at Andhra Loyola College:  400  machines within various labs on the campus will be converted into FOSS  systems with free and open source software including support for Telugu  and other Indic languages. It should be noted that all the existing  computers of ALC are run on proprietary software. As a pilot initiative  CIS-A2K has already converted 30 systems in a lab and named it as Loyola  FOSS Lab.&lt;/li&gt;
&lt;li&gt;CIS-A2K to revise the FIT (Fundamentals in Information Technology): A  mandatory course for all undergraduate  students which will introduce  students to FOSS, Openness and Wikipedia. This is an outcome of the FOSS  orientation done by T. Vishnu Vardhan and Rahimanuddin Shaik during the  two workshops that were held at ALC.&lt;/li&gt;
&lt;/ol&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K will put every effort to involve Telugu Wikimedians and FOSS community in taking this collaboration with ALC forward. CIS-A2K will also create a project page on Telugu Wikipedia to actively document and publicly share the detailed plans and progress. More updates will also be shared on this website.&lt;/p&gt;
&lt;table class="image-alc"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/alc1.png" alt="ALC and CIS-A2K" class="image-inline" title="ALC and CIS-A2K" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Above: Representatives from ALC and CIS-A2K seen during the signing ceremony.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The signing of the MoU was done at a public event  in the presence of students, faculty and management of ALC and various representatives from media. The media covered this event enthusiastically. The Hindu coverage can be found &lt;a href="http://www.thehindu.com/todays-paper/tp-national/tp-andhrapradesh/alc-signs-mou-for-better-net-access/article6320555.ece"&gt;here&lt;/a&gt; and Eenadu article coverage is &lt;a href="https://cis-india.org/openness/news/cis-mou-with-alc-coverage-in-eenadu" class="external-link"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands'&gt;https://cis-india.org/openness/blog-old/expanding-the-world-of-telugu-wikipedia-cis-and-alc-join-hands&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>T Vishnu Vardhan and Rahmanuddin Shaik</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Telugu Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-09-30T05:11:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/nie-steps-in-to-grow-konkani-wikipedia">
    <title>NIE Steps in to Grow Konkani Wikipedia</title>
    <link>https://cis-india.org/openness/blog-old/nie-steps-in-to-grow-konkani-wikipedia</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society's Access to Knowledge team (CIS-A2K) signed a memorandum of agreement (MoU) with Nirmala Institute of Education, Goa to enhance digital literacy in Konkani in the education sector across Goa.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Access to Knowledge (A2K) programme of CIS, in its sustained efforts to enhance the content and reach of &lt;a class="external-link" href="https://incubator.wikimedia.org/wiki/Wp/gom/Mukhel_Pan"&gt;Kokani Wikepedia &lt;/a&gt;(which is in incubation), has signed an MoU for a     period of five years with &lt;a class="external-link" href="http://dhe.goa.gov.in/nongovtnirmalainstitute.html"&gt;Nirmala Insitute of Education&lt;/a&gt; (NIE), a Secondary  Teacher Education College established in  1963 by the Society of  the Daughters of the Heart of Mary in response to  the then urgent need  for trained teachers in post liberation Goa. The key objectives of this partnership are: a) to design, develop and execute a certificate course titled "Teaching in the Age of  Wikipedia", which is aimed at middle and high school teacher-trainees  and teachers; and b) to introduce Wikimedia projects into the pedagogic curriculum of NIE.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both CIS and NIE share a mutual interest in conserving, developing and disseminating knowledge free of cost in Konkani, which incidentally is Goa’s     official language. Konkani as a language faces several challenges — it has no official script. The population who speak it are dispersed across the world and have little     motivation to further the cause of Konkani, and there are few educational venues that offer a formal course to study Konkani or offer Konkani based     curriculum. NIE Principal Dr. Denzil Martins welcomed this MoU and said that "it will guide our teacher-trainees to upload relevant information in Konkani that can be freely accessed by the local population" and "provide the volunteer-trainees with skills that they will be able to use to contribute and enhance the free knowledge in Konkani". The MoU was signed by Dr. Denzil Martins from NIE and T. Vishnu Vardhan (Programme Director, Access to Knowledge, CIS) in the presence of staff and students of NIE and volunteers Harriet Vidyasagar and Gayathri Rao Konkar. Dr. Rita Paes, ex-Principal of NIE who worked to forge this MoU sent her best wishes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K since 2013, has worked to develop partnerships with key educational institutions to promote and grow Konkani Wikipedia. It has previously     worked with NIE to design and implement a program to enroll 100 B.Ed. students to increase the amount of information available in     &lt;a href="https://meta.wikimedia.org/wiki/India_Access_To_Knowledge/Events/Goan_Towns_%26_Villages_@_Nirmala_Institute_of_Education"&gt; Goan villages and towns &lt;/a&gt; on Konkani Wikipedia. A2K has also been instrumental in convincing Goa University to     &lt;a href="http://cis-india.org/openness/blog/re-release-konkani-vishwakosh-under-cc-by-sa-3.0"&gt; re-release Konkani Vishwakosh (encyclopedia) under CC-BY-SA 3.0 &lt;/a&gt; , making it freely available to public, giving them the right to share, use and even build upon the work that has already been done.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The course ‘Teaching in the Age of Wikipedia’ will enable the teacher participant to have a) a comprehensive understanding of changes due to digital     technology to the knowledge domain; b) an introduction to various openness movements that inform the discourse on Open Educational Resources; c) exposure     and training to participate on open knowledge platforms like Wikipedia; and d) practical examples and best practices of using Wikipedia and sister projects     within the classroom context. The parties will also co-design and jointly implement programmes to introduce Wikipedia in the NIE curriculum. The curriculum     for this workshop is positioned within the context of indian languages (particularly Konkani) and school education to ensure that any learning is practical     and can be applied within the teachers immediate pedagogic environment. Speaking about the relevance of this course Gayathri and Harriet (who have been associated with NIE as volunteers) mentioned that "the Goa government has handed out tablets to all school going children in Goa. In order to use them effectively in the classroom will require teachers to rethink their role and teaching methodologies and this course is an important step towards that". Agreeing with this Denzil Martins feels that this course "will provide the teacher-trainees with ideas and inputs for using Wikipedia in creative ways in the classroom".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This partnership     could bring huge momentum and scale for the growth of Konkani as participants who graduate from this course will as teachers act as anchors and mentors     to teach and assign Wikipedia editing assignments in their respective schools and classrooms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Gayathri feels "such courses once fine tuned should be made available to teachers from all over the country and should be part of the package for introducing the digital technology in the school system.  Today it ends with setting up computer labls in schools or distribution of hardware to students - they may have a 'computer teacher' but the class and subject teachers never become part of these new initiatives. Only when this happens can we move away from 'teaching computers' to using computers as tools to learn and teach, which is the primary objective of digital technology in schools".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS will develop this open course and welcomes anyone to partner in this effort, which will be made available for anyone to use it within their context. The efforts to build free and open knowledge platforms like Konkani Wikipedia will continue and partnerships like NIE will play a crucial role in building a robust knowledge society in India.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/nie-steps-in-to-grow-konkani-wikipedia'&gt;https://cis-india.org/openness/blog-old/nie-steps-in-to-grow-konkani-wikipedia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vishnu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Konkani Wikipedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-10-10T11:26:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-in-healthcare-policy-guide">
    <title>Privacy in Healthcare: Policy Guide</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-in-healthcare-policy-guide</link>
    <description>
        &lt;b&gt;The Health Policy Guide seeks to understand what are the legal regulations governing data flow in the health sector — particularly hospitals, and how are these regulations implemented. Towards this objective, the research reviews data practices in a variety of public and private hospitals and diagnostics labs. The research is based on legislation, case law, publicly available documents, and anonymous interviews.&lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-healthcare.pdf" class="external-link"&gt;Click to download the PDF&lt;/a&gt; (320 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;To this date, there exists no universally acceptable definition of the right to privacy. It is a continuously evolving concept whose nature and extent is     largely context driven. There are numerous aspects to the right to privacy, each different from the other in terms of the circumstance in which it is     invoked. Bodily privacy however, is to date, the most guarded facet of this vastly expansive right. The privacy over one’s own body including the organs,     genetic material and biological functions that make up one’s health is an inherent right that does not; as in the case of other forms of privacy such as     communication or transactional privacy, emanate from the State. It is a right that has its foundations in the Natural Law conceptions of The Right to Life,     which although regulated by the State can at no point be taken away by it except under extreme circumstances of a superseding Right to Life of a larger     number of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The deliberation leading to the construction of a universally applicable Right to Privacy has up until now however only been in terms of its interpretation     as an extension of the Fundamental Right to Life and Liberty as guaranteed under Article 21 as well as the freedom of expression and movement under     Articles 19(1)(a) and (b) of the Constitution of India. While this may be a valid interpretation, it narrows the ambit of the right as one that can only be     exercised against the State. The Right to privacy however has much larger implications in spheres that are often removed from the State. There is thus an     impending need to create an efficient and durable structure of Law and policy that regulates the protection of privacy in Institutions that may not always     be agents of the State.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is in this regard that the following analysis studies the existing conceptions of privacy in the Healthcare sector. It aims to study the existing     mechanisms of privacy protection and their pragmatic application in everyday practices. Further, it determines definitive policy gaps in the existing     framework and endeavors to provide effective recommendations to not only redress these shortcomings but also create a system that is efficient in its     fulfillment of the larger objective of the actualization of the Right to Privacy at an individual, state and institutional level.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Purpose&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The purpose of this research study is to formulate a comprehensive guide that maps the synthesis, structure and implementation of privacy regulations     within the healthcare sector in India. It traces the domestic legislation pertaining to various aspects of the healthcare sector and the specific     provisions of the law that facilitate the protection of the privacy of individuals who furnish their personal information as well as genetic material to     institutions of healthcare, either for the purpose of seeking treatment or to contribute to research studies. It is however imperative that the nature and     extent of the information collected be restricted through the establishment of requisite safeguards at an institutional level that percolate down to     everyday practices of data collection, handling and storage within healthcare institutions. The study thus aims to collate the existing systems of privacy     protection in the form of laws, regulations and guidelines and compare these with actual practices in government and private hospitals and diagnostic     laboratories to determine whether these laws are in fact effective in meeting the required standards of privacy protection. Further, the study also broadly     looks at International practices of privacy protection and offers recommendations to better the existing mechanisms of delimiting unnecessary intrusions on     the privacy of patients.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Importance&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Indian Healthcare sector although at par with international standards in its methods of diagnosis, treatment and the use of contemporary technology, is     still nascent in the nature and extent of its interaction with the Law. There are a number of aspects of healthcare that lie on the somewhat blurred line     between the interest of the public and the sole right of the individual seeking treatment. One such aspect is the slowly evolving right to privacy. The     numerous facets of this right have come to the fore largely through unique case laws that are reflective of a dynamic social structure, one that seeks to     reconcile the socio economic rights that once governed society with individual interests that it has slowly come to realize. The right of an individual to     disclose the nature of his disease, the liberty of a woman not to be compelled to undergo a blood test, the bodily autonomy to decide to bear children or     not, the decisional privacy with regards to the termination of a pregnancy and the custodial rights of two individuals to their child are certain     contentious aspects of healthcare that have constructed the porous interface between the right to privacy and the need for medical treatment. It is in this     context that this study aims to delve into the existing basic structure of domestic legislation, case laws and regulations and their subsequent application     in order to determine important gaps in the formulation of Law and Policy. The study thus aims to draw relevant conclusions to fill these gaps through     recommendations sourced from international best practice in order to construct a broad framework upon which one can base future policy considerations and     amendments to the existing law.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Methodology&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This research study was undertaken in two major parts. The first part assesses domestic legislation and its efficacy in the current context. This is done     through the determination of relevant provisions within the Act that are in consonance with the broader privacy principles as highlighted in the A.P Shah     Committee report on Privacy Protection&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;. This part of the research paper is based on secondary sources,     both in terms of books as well as online resources. The second part of the paper analyses the actual practices with regard to the assimilation,     organization, use and storage of personal data as practiced in Government and Private hospitals and Diagnostic laboratories. Three Private hospitals, a     prominent Government hospital and a Diagnostic laboratory were taken into consideration for this study. The information was provided by the concerned     personnel at the medical records department of these institutions of healthcare through a survey conducted on the condition of anonymity. The information     provided was analyzed and collated in accordance with the compliance of the practices of these institutions with the Principles of privacy envisioned in     the Report of the Group of Experts on Privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Embodiment of Privacy Regulation within Domestic Legislation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This section of the study analyses the viability of an approach that takes into account the efficacy of domestic legislation in regulating practices     pertaining to the privacy of individuals in the healthcare sector. This approach perceives the letter and spirit of the law as the foundational structure     upon which internal practices, self regulation and the effective implementation of policy considerations that aim to create an atmosphere of effective     privacy regulation take shape, within institutions that offer healthcare services. To this effect, domestic legislationthat provides for the protection of     a patient’s privacy has been examined. The law has been further studied with respect to its tendency to percolate into the everyday practices, regulations     and guidelines that private and government hospitals adhere to. The extent of its permeation into actual practice; in light of its efficacy in fulfilling     the perambulatory objectives of ensuring safe and unobtrusive practices,within the construct of which a patient is allowed to recover and seek treatment,     has also been examined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The term ‘&lt;b&gt;Privacy’&lt;/b&gt; is used in a multitude of domestic legislations primarily in the    &lt;b&gt;context of the foundation of the fiduciary relationship between a doctor and a patient.&lt;/b&gt;This fiduciary relationship emanates from a     reasonable expectation of mutual trust between the doctor and his patients and is established through the Indian Medical Council Act of 1952, specifically     section 20(A) of the Act which lays down the code of ethics which a doctor must adhere to at all times. Privacy within the healthcare sector includes a number of aspects including but not limited to &lt;b&gt;informational privacy&lt;/b&gt; (e.g., confidentiality, anonymity, secrecy and data security);    &lt;b&gt;physical privacy&lt;/b&gt; (e.g., modesty and bodily integrity); &lt;b&gt;associational privacy&lt;/b&gt; (e.g. intimate sharing of death, illness and recovery); &lt;b&gt;proprietary privacy&lt;/b&gt; (e.g., self-ownership and control over personal identifiers, genetic data, and body tissues); and    &lt;b&gt;decisional privacy&lt;/b&gt; (e.g., autonomy and choice in medical decision-making).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy Violations stem from policy and information gaps: &lt;/b&gt; Violations in the healthcare sector that stem from policy formulation as well and implementation gaps&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; include the disclosure of personal health information to third parties without consent, inadequate notification to a patient of a data breach, unlimited or     unnecessary collection of personal health data, collection of personal health data that is not accurate or relevant, the purpose of collecting data is not     specified, refusal to provide medical records upon request by client, provision of personal health data to public health, research, and commercial uses     without de-identification of data and improper security standards, storage and disposal. The disclosure of personal health information has the potential to     be embarrassing, stigmatizing or discriminatory.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; Furthermore, various goods such as employment, life, and medical insurance, could be placed at risk &lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;if the flow of medical information were not restricted.    &lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Disclosure of personal health information is permitted and does not amount to a violation of privacy in the following situations: 1) during referral, 2)     when demanded by the court or by the police on a written requisition, 3) when demanded by insurance companies as provided by the Insurance Act when the     patient has relinquished his rights on taking the insurance, and 4) when required for specific provisions of workmen's compensation cases, consumer protection cases, or for income tax authorities,&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; 5) disease registration, 6) communicable disease investigations, 7) vaccination studies, or 8) drug adverse event reporting.    &lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following domestic legislations have been studied and relevant provisions of the Act have been accentuated in order to analyse their compliance with     the basic principles of privacy as laid out in the A.P Shah Committee report on Privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mental Health Act, 1987&lt;/b&gt;&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;br /&gt;The Provisions under the Act pertaining to the protection of privacy of the patient have been examined. The principles embodied within the Act include     aspects of the Law that determine the nature and extent of oversight exercised by the relevant authorities over the collection of information, the     limitation on the collection of data and the restrictions on the disclosure of the data collected. The principle of oversight is embodied under the     legislation within the provisions that allow for the inspection of records in psychiatric hospitals and nursing homes only by officers authorized by the     State Government.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The limitation on the Collection of information is imposed by the     Inspection of living conditionsby a psychiatrist and two social workers are on a monthly basis. This would include analyzing the living condition of every patient and the administrative processes of the psychiatric hospital and/or psychiatric nursing home.    &lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Additionally, Visitors must maintain a book regarding their observations and     remarks.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Medical certificates may be issued by a doctor, containing information regarding the nature and degree of the mental disorder as reasons for the detention of a person in a psychiatric hospital or psychiatric nursing home.    &lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Lastly, the disclosure of personal records of any facility under this Act by     inspecting officers is prohibited&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pre-Conception and Pre-Natal Diagnostic Techniques (Prohibition of Sex Selection) Act, 1994&lt;/b&gt; &lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;br /&gt;The Act was instituted in light of a prevalent public interest consideration of preventing female foeticide. However, it is imperative that the provision     of the Act remain just shy of unnecessarily intrusive techniques and do not violate the basic human requirement of privacy in an inherently personal     sphere. The procedure that a mother has to follow in order to avail of pre-natal diagnostic testing is mandatory consent of age, abortion history and family history. These conditions require a woman to reveal sensitive information concerning family history of mental retardation or physical deformities.&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; A&lt;b&gt;special concern for privacy and confidentiality should be exercised with regards to disclosure of genetic information.&lt;/b&gt; &lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Medical Termination of Pregnancy Act, 1971&lt;/b&gt; &lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;br /&gt;Although, the right to an abortion is afforded to a woman within the construct of her inherent right to bodily privacy, decisional privacy (for e.g.,     autonomy and choice in medical decision-making) is not afforded to patients and their families with regards to determining the sex of the baby. The     sections of the Act that have been examined lay down the provisions available within the Act to facilitate the protection of a woman’s right to privacy     during the possible termination of a pregnancy. These include the principles pertaining to the choice and consent of the patient to undergo the procedure,     a limit on the amount of information that can be collected from the patient, the prevention of disclosure of sensitive information and the security     measures in place to prevent the unauthorized access to this information. The Medical Termination of Pregnancy Regulations, 2003 supplement the Act and provide relevant restrictions within every day practices of data collection use and storage in order to protect the privacy of patients. The Act mandates    &lt;i&gt;Written Consent &lt;/i&gt;of the patient in order to facilitate an abortion .Consent implies that the patient is aware of all her options, has been     counselled about the procedure, the risks and post-abortion care.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;. The Act prohibits the disclosure of matters relating to treatment for termination of pregnancy to anyone other than the Chief Medical Officer of the State.    &lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;The Register of women who have terminated their pregnancy, as maintained by the hospital, must be     destroyed on the expiry of a period of five years from the date of the last entry.&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; The Act also emphasizes upon the security of information collected. The medical practitioner assigns a serial number for the woman terminating her pregnancy.&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;Additionally, the admission register is stored in safe custody of the head of the hospital.    &lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indian Medical Council (Professional conduct, Etiquette and Ethics) Regulations, 2002 (Code of Ethics Regulations, 2002)&lt;/b&gt;&lt;br /&gt;The Medical Council of India (&lt;b&gt;MCI&lt;/b&gt;) Code of Ethics Regulations&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; sets the professional standards for medical practice. These provisions regulate the nature and extent of doctor patient confidentiality. It also     establishes universally recognized norms pertaining to consent to a particular medical procedure and sets the institutionally acceptable limit for     intrusive procedure or gathering excessively personal information when it is not mandatorily required for the said procedure. The provisions addressed     under these regulations pertain to the Security of the information collected by medical practitioners and the nature of doctor patient confidentiality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Physicians are obliged to protect the confidentiality of patients&lt;sup&gt; 5&lt;/sup&gt;during all stages of the procedure and with regard to all aspects of the information provided by the patient to the doctor, includinginformation relating to their personal and domestic lives.    &lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;The only exception to this mandate of confidentiality is if the law requires     the revelation of certain information, or if there is a serious and identifiable risk to a specific person and / or community ofa notifiable disease.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Ethical Guidelines for Biomedical Research on Human Subjects&lt;/b&gt; &lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;br /&gt;The provisions for the regulation of privacy pertaining to biomedical research include aspects of consent as well as a limitation on the information that     may be collected and its subsequent use. The provisions of this act aim to regulate the protection of privacy during clinical trials and during other     methods of research. The principal of informed consent is an integral part of this set of guidelines. ThePrivacy related information included in the     participant/ patient information sheet includes: the choice to prevent the use of their biological sample, the extent to which confidentiality of records     could be maintained and the consequences of breach of confidentiality, possible current and future uses of the biological material and of the data to be     generated from the research and if the material is likely to be used for secondary purposes or would be shared with others, the risk of discovery of     biologically sensitive information and publications, including photographs and pedigree charts.&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; The Guidelines require special concern for privacy and confidentiality when conducting genetic family studies.    &lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;The protection of privacy and maintenance of confidentiality, specifically surrounding the identity and records, is maintained whenusing the information or genetic material provided by participants for research purposes.    &lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;The Guidelines require investigators to maintain confidentiality of     epidemiological data due to the particular concern that some population based data may also have implications on issues like national security or public     safety.&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;All documentation and communication of the Institutional Ethics Committee (IEC) must be dated,     filed and preserved according to the written procedures.Data of individual participants can be disclosed in a court of law under the orders of the     presiding judge, if there is a threat to a person’s life, communication to the drug registration authority regarding cases of severe adverse reaction and     communication to the health authority if there is risk to public health.&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Insurance Regulatory and Development Authority (Third Party Administrators) Health Services Regulations, 2001&lt;br /&gt;&lt;/b&gt;The provisions of the Act that have been addressed within the scope of the study regulate the practices of third party administrators within the healthcare     sector so as to ensure their compliance with the basic principles of privacy.An exception to the maintenance and confidentiality of information     confidentiality clause in the code of conduct, requires TPAs to provide relevant information to any Court of Law/Tribunal, the Government, or the Authority     in the case of any investigation carried out or proposed to be carried out by the Authority against the insurance company, TPA or any other person or for any other reason.&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt;In July 2010, the IRDA notified the&lt;b&gt;Insurance Regulatory and Development &lt;/b&gt;Authority&lt;b&gt; (Sharing of Database for Distribution of Insurance Products) Regulations&lt;/b&gt; &lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;&lt;b&gt;. These regulations restrict referral companies from &lt;/b&gt;providing details of their     customers without their prior consent.&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;TPAs must maintain the confidentiality of the data collected by     it in the course of its agreement and maintain proper records of all transactions carried out by it on behalf of an insurance company and are also required     to refrain from trading information and the records of its business&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;.TPA’s must keep records for a     period of not less than three years.&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IDRA Guidelines on Outsourcing of Activities by Insurance Companies&lt;/b&gt; &lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt;&lt;br /&gt;These guidelines require the insurer to take appropriate steps that require third party service providers protect confidential information of both the     Insurer and its clients from intentional or inadvertent disclosure to unauthorized persons.&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Exceptions to the Protection of Privacy&lt;/b&gt;&lt;br /&gt;The legal provisions with regard to privacy, confidentiality and secrecy are often superseded by Public Interest Considerations. The right to privacy,     although recognized in the course of Indian jurisprudence and embodied within domestic legislation is often overruled prima facie when faced with     situations or instances that involve a larger interest of a greater number of people. This policy is in keeping with India’s policy goals as a social     welfare state to aid in the effectuation of its utilitarian ideals. This does not allow individual interest to at any point surpass the interest of the     masses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Epidemic Diseases Act, 1897&lt;/b&gt; &lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt;&lt;br /&gt;Implicit within this formulation of this Act is the assumption that in the case of infectious diseases, the right to privacy, of infected individuals must     give way to the overriding interest of protecting public health.&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt; This can be ascertained not only from     the black letter of the Law but also from its spirit. Thus, in the absolute positivist as well as a more liberal interpretation, at the crux of the legislation lies the undeniable fundamental covenant of the preservation of public health, even at the cost of the privacy of a select few individuals    &lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Policy and Regulations&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;National Policy for Persons with Disabilities, 2006&lt;/b&gt;&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt;&lt;br /&gt;The following provisions of the Act provide for the incorporation of privacy considerations in prevalent practices with regard to persons with     disabilities. The National Sample Survey Organization collects the &lt;b&gt;following information on persons with disabilities:&lt;/b&gt; the socio- economic     and cultural context, cause of disabilities, early childhood education methodologies and all matters connected with disabilities, at least once in five years.&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt;This data is collected by non-medical investigators.    &lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt;There is thus an inherent limit on the information collected. Additionally, this information is used     only for the purpose for which it has been collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Special Employment Exchange, as established under The Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Act,     1995 Act, collects and furnishes information in registers, regarding provisions for employment. &lt;b&gt;Access to such data is limited to&lt;/b&gt; any     person who is authorized by the Special Employment Exchange as well as persons authorized by general or special order by the Government, to access, inspect, question and copy any relevant record, document or information in the possession of any establishment.    &lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt; When conducting research on persons with disabilities consent is required from the individual or their     family members or caregivers.&lt;a href="#_ftn45" name="_ftnref45"&gt;[45]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;HIV Interventions&lt;/b&gt;&lt;br /&gt;In 1992, the Government of India instituted the National AIDS Control Organization (NACO) for the prevention and control of AIDS. NACO aims to control the     spread of HIV in India through the implementation of Targeted Interventions (TIs) for most at risk populations (MARPs) primarily, sex workers, men having     sex with men and people who inject drugs.&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;The Targeted Interventions (TIs) system of testing under this     organization has however raised numerous concerns about relevant policy gaps in the maintenance of the confidentiality and privacy of persons living with     HIV/ AIDS. The shortcomings in the existing policy framework include: The Lack of a limitation and subsequent confidentiality in the amount of Information     collected. Project staff inTIsrecordthe name, address and other contact information of MARPs and share this data with Technical Support Unit and State AIDS     Control Societies.&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt; Proof of address and identity documents are required to get enrolled in government     ART programs.&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt;Peer-educators operate under a system known as line-listing, used to make referrals and conduct follow-ups. Peer-educators have to follow-up with those who have not gone at regular intervals for testing.    &lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt; This practice can result in peer-educators noticing and concluding that the names missing are those     who have tested positive. &lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt; Although voluntary in nature, the policy encourage the fulfillment of     fulfilling of numerical targets, and in doing so supports unethical ways of testing.&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The right to privacy is an essential requirement for persons living with HIV/AIDS due to the potential stigmatizing and discriminatory impact of the     revelation of this sensitive information, in any form.&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt; The lack of privacy rights often fuels the     spread of the disease and exacerbates its impact on high risk communities of individuals. Fears emanating from a privacy breach or a disclosure of data     often deter people from getting tested and seeking medical care. The impact of such disclosure of sensitive information including the revelation of tests     results to individuals other than the person being tested include low self esteem, fear of loss of support from family/peers, loss of earnings especially for female and transgender sex workers, fear of incrimination for illicit sex/drug use and the insensitivity of counselors.    &lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;HIV positive individualslive in constant fear of their positive status being leaked. They also shy away     from treatment as they fear people might see them taking their medicines and thereby guess their status. Thus breaches in confidentiality and policy gaps in privacy regulation, especially with respect to diseases such as HIV also prevents people from seeking out treatment.    &lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Case Law&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The following cases have been used to deliberate upon important points of contention within the ambit of the implementation and impact of Privacy     Regulationsin the healthcare sector. This includes the nature and extent of privacy enjoyed by the patient and instances where in the privacy of the     patient can be compromised in light of public interest considerations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. Surupsingh Hrya Naik vs. State of Maharashtra&lt;/i&gt; ,&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt; (2007)&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;The decision in this case held that The RTI Act 2005 would supersede The Medical Council Code of Ethics. The health records of an                         individual in judicial custody should be made available under the Act and can only be denied in exceptional cases, for valid reasons.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Since the Code of Ethics Regulations are only delegated legislation, it was held in the case of &lt;i&gt;Mr. SurupsinghHrya Naik v.State Of Maharashtra&lt;/i&gt;&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt; that these would not prevail over the Right to Information Act, 2005 (&lt;b&gt;RTI Act&lt;/b&gt;) unless the information sought falls under the exceptions contained in Section 8 of the RTI Act. This case dealt with the important point of contention of     whether making the health records public under the RTI Act would constitute a violation of the right to privacy. These health records were required to     determine why the convict in question was allowed to stay in a hospital as opposed to prison. In this context the Bombay High Court held thatThe Right to     Information Act supersedes the regulation that mandate the confidentiality od a person, or in this case a convict’s medical records. It was held that the     medical records of a a person sentenced or convicted or remanded to police or judicial custody, if during that period such person is admitted in hospital     and nursing home, should be made available to the person asking the information provided such hospital nursing home is maintained by the State or Public     Authority or any other Public Body. It is only in rare and in exceptional cases and for good and valid reasons recorded in writing can the information may     be denied.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Radiological &amp;amp; Imaging Association v. Union of India&lt;/i&gt; ,&lt;a href="#_ftn57" name="_ftnref57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (2011)&lt;br /&gt;On 14 January 2011 a circular was issued by the Collector and District Magistrate, Kolhapur requiring the Radiologists and Sonologists to submit an on-line     form “F” under the PNDT Rules. This was challenged by the Radiological and Imaging Association, &lt;i&gt;inter alia&lt;/i&gt;, on the ground that it violates the     privacy of their patients. Deciding the above issue the Bombay High Court held that .The images stored in the silent observer are not transmitted on-line     to any server and thus remain embedded in the ultra-sound machine. Further, the silent observer is to be opened only on request of the Collector/ the civil     surgeonin the presence of the concerned radiologist/sonologist/doctor incharge of the Ultra-sound Clinic. In light of these considerations and the fact     that the `F' form submitted on-line is submitted only to the Collector and District Magistrate is no violation of the doctor's duty of confidentiality or     the patient's right to privacy. It was further observed that The contours of the right to privacy must be circumscribed by the compelling public interest     flowing through each and every provision of the PC&amp;amp;PNDT Act, when read in the background of the following figures of declining sex ratio in the last     five decades.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;The use of a Silent Observer system on a sonograph has requisite safeguards and doesn’t violate privacy rights. The declining sex ratio                         of the country was considered a compelling public Interest that could supersede the right to privacy.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Smt. Selvi and Ors. v.State of Karnataka &lt;/i&gt;(2010)&lt;br /&gt;The Supreme Court held that involuntary subjection of a person to narco analysis, polygraph test and brain-mapping violates the ‘right against self-incrimination' which finds its place in Article 20(3)&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt; of the Constitution.    &lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt; The court also found that narco analysis violated individuals’ right to privacy by intruding into a     “subject’s mental privacy,” denying an opportunity to choose whether to speak or remain silent, and physically restraining a subject to the location of the     tests and amounted to cruel, inhuman or degrading treatment.&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;The Supreme Court found that Narco-analysis violated an individuals’ right to privacy by intruding into a “subject’s mental privacy,”                         denying an opportunity to choose whether to speak or remain silent.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Neera Mathur v. Life Insurance Corporation &lt;/i&gt;(LIC),&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt; (1991)&lt;br /&gt;In this casethe plaintiff contested a wrongful termination after she availed of maternity leave. LIC required women applicants to furnish personal details     like their menstrual cycles, conceptions, pregnancies, etc. at the time of appointment. Such a requirement was held to go against the modesty and self     respect of women. The Court held that termination was only because of disclosures in application, which was held to be intrusive, embarrassing and     humiliating. LIC was directed to delete such questions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court did not refer to the term privacy however it used the term personal details as well as modesty and self respect, but did not specifically link     them to the right to life or any other fundamental right. These terms (modesty and self respect) are usually not connected to privacy but although they may     be the harm which comes from an intrusion of one’s privacy.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;The Supreme Court held that Questions related to an individual’s reproductive issues are personal details and should not be asked in                         the service application forms.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Ms. X vs. Mr. Z &amp;amp;Anr&lt;/i&gt; ,&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt; (2001)&lt;br /&gt;In this case, the Delhi High Court held that an aborted foetus was not a part of the body of a woman and allowed the DNA test of the aborted foetus at the     instance of the husband. The application for a DNA test of the foetus was contested by the wife on the ground of “Right to Privacy”.7In this regard the     court held that The Supreme Court had previously decided that a party may be directed to provide blood as a DNA sample but cannot be compelled to do so.     The Court may only draw an adverse interference against such party who refuses to follow the direction of the Court in this respect.The position of the     court in this case was that the claim that the preservation of a foetus in the laboratory of the All India Institute of Medical Science, violates the     petitioner’s right to privacy, cannot be entertained as the foetus had been voluntarily discharges from her body previously, with her consent. The foetus,     that she herself has dischargedis claimed to be subjected to DNA test. Thus, in light of the particular facts and the context of the case, it was held that     petitioner does not have any right of privacy.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;A woman’s right to privacy does not extend to a foetus, which is no longer a part of her body. The right to privacy may arise from a                         contract as well as a specific relationship, including a marital relationship. The principle in this case has been laid down in broad                         enough terms that it may be applied to other body parts which have been disassociated from the body of the individual.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;It is important to note here that the fact that the Court is relying upon the principles laid down in the case of &lt;i&gt;R. Rajagopal &lt;/i&gt;seems to suggest that the Court is treating organic tissue preserved in a public hospital in the same manner as it would treat a public document, insofar     as the exception to the right to privacy is concerned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;B.K Parthasarthi vs. Government of Andhra Pradesh&lt;/i&gt; ,&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt; (1999)&lt;br /&gt;In this case, the Andhra Pradesh High Court was to decide the validity of a provision in the Andhra Pradesh Panchayat Raj Act, 1994 which stipulated that     any person having more than two children should be disqualified from contesting elections. This clause was challenged on a number of grounds including the     ground that it violated the right to privacy. The Court, in deciding upon the right to privacy and the right to reproductive autonomy, held thatThe     impugned provision, i.eSection 19(3) of the said Act does not compel directly anyone to stop procreation, but only disqualifies any person who is otherwise     eligible to seek election to various public offices coming within the ambit of the Andhra Pradesh Panchayat Raj Act, 1994 or declares such persons who have     already been holding such offices to be disqualified from continuing in such offices if they procreate more than two children.Therefore, the submission     made on behalf of the petitioners 'right to privacy' is infringed, is untenable and must be rejected.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. X v. Hospital Z, Supreme Court of India&lt;/i&gt; ,&lt;a href="#_ftn64" name="_ftnref64"&gt;[64]&lt;/a&gt; (1998 and 2002)&lt;br /&gt;The petitioner was engaged to be married and thereafter during tests for some other illness in the hospital it was found that the petitioner was HIV     positive. This information was released by the doctor to the petitioner’s family and through them to the family of the girl to whom the petitioner was     engaged, all without the consent of the petitioner. The Court held that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The Right to privacy is not treated as absolute and is subject to such action as may be lawfully taken for the prevention of crime or disorder or     protection of health or morals or protection of rights and freedoms of others.”&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;Right to privacy and is subject to such action as may be lawfully taken for the prevention of crime or disorder or protection of health                         or morals or protection of rights and freedoms of others.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This decision of this case could be interpreted to extend the principle, of disclosure to the person at risk, to other communicable and life threatening     diseases as well. However, a positivist interpretation would render these principle applicable to only to HIV+ cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;M. Vijaya v. Chairman and Managing Director, Singareni Collieries Co. Ltd.&lt;/i&gt; &lt;a href="#_ftn65" name="_ftnref65"&gt;[65]&lt;/a&gt; (2001)&lt;br /&gt;The petitioner alleged that she had contracted the HIV virus due to the negligence of the authorities of Maternity and Family Welfare Hospital,     Godavarikhani, a hospital under the control of Singareni Collieries Company Ltd., (SCCL), in conducting relevant precautionary blood tests before     transfusion of blood of her brother (donor) into her body when she was operated for hysterectomy (Chronic Cervicitis) at the hospital. The petition was     initially filed as a Public Interest Litigation,which the court duly expanded in order to address the problem of the lack of adequate precautionary     measures in hospitals, thereby also dealing with issues of medical confidentiality and privacy of HIV patients. The court thus deliberated upon the     conflict between the right to privacy of an HIV infected person and the duty of the state to prevent further transmission and held:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the interests of the general public, it is necessary for the State to identify HIV positive cases and any action taken in that regard cannot be termed     as unconstitutional. As under Article 47 of the Constitution, the State was under an obligation to take all steps for the improvement of the public health.     A law designed to achieve this object, if fair and reasonable, in our opinion, will not be in breach of Article 21 of the Constitution of India&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;The right of reproductive autonomy is a component of the right to privacy .A provision disqualifying a person from standing for                         elections due to the number of children had, does not violate the right to privacy as the object of the legislation is not to violate                         the autonomy of an individual but to mitigate the population growth in the country. Measures to control population growth shall be                         considered legal unless they impermissibly violate a fundamental right.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;However, another aspect of the matter is whether compelling a person to take HIV test amounts to denying the right to privacy? The Court analyzed the     existing domestic legislation to arrive at the conclusion that there is no general law that can compel a person to undergo an HIV-AIDS test. However,     specific provisions under the Prison Laws&lt;a href="#_ftn66" name="_ftnref66"&gt;[66]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;provide that as soon as a prisoner is admitted to prison, he is required to be examined medically and the record of prisoner's health is to be maintained     in a register. Further, Under the ITP Act, the sex workers can also be compelled to undergo HIV/ AIDS test.&lt;a href="#_ftn67" name="_ftnref67"&gt;[67]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, under Sections 269 and 270 of the Indian Penal Code, 1860, a person can be punished for negligent act of spreading infectious diseases.&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;The right to privacy of a person suspected to be HIV+ would be subordinate to the power and duty of the state to identify HIV+ patients                         in order to protect public interest and improve public health. However any law designed to achieve this object must be fair and                         reasonable. In a conflict between the individual’s privacy right and the public’s right in dealing with the cases of HIV-AIDS, the                         Roman Law principle 'SalusPopuliestSuprema' (regard for the public wealth is the highest law) applies when there is a necessity.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;After mapping legislation that permit the invasion of bodily privacy, the Court concluded that they are not comprehensive enough to enable the State to     collect information regarding patients of HIV/AIDS and devise appropriate strategies and therefore the State should draft a new legislation in this regard.     Further the Court gave certain directions to the state regarding how to handle the epidemic of HIV/AIDS and one of those directions was that the “Identity     of patients who come for treatment of HIV+/AIDS should not be disclosed so that other patients will also come forward for taking treatment.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Sharda v. Dharmpal&lt;/i&gt; ,&lt;a href="#_ftn68" name="_ftnref68"&gt;[68]&lt;/a&gt; (2003)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The basic question in this case was whether a party to a divorce proceeding can be compelled to a medical examination. The wife in the divorce proceeding     refused to submit herself to medical examination to determine whether she was of unsound mind on the ground that such an act would violate her right to     personal liberty. Discussing the balance between protecting the right to privacy and other principles that may be involved in matrimonial cases such as the     ‘best interest of the child’ in case child custody is also in issue, the Court held:&lt;/p&gt;
&lt;table style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;div&gt;
&lt;p&gt;If the best interest of a child is in issue in the case then the patient’s right to privacy and confidentiality would get limited. The                         right to privacy of an individual would be subordinate to the power of a court to arrive at a conclusion in a matrimonial dispute and                         the right of a party to protect his/her rights in a Court of law would trump the right to privacy of the other.&lt;/p&gt;
&lt;/div&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;"Privacy" is defined as "the state of being free from intrusion or disturbance in one's private life or affairs". However, the right to privacy in India,     is only conferred through an extensive interpretation of Article 21 and cannot therefore in any circumstance be considered an absolute right. Mental health     treatment involves disclosure of one's most private feelings However, like any other privilege the psychotherapist-patient privilege is not absolute and     may only be recognized if the benefit to society outweighs the costs of keeping the information private. Thus if a child's best interest is jeopardized by     maintaining confidentiality the privilege may be limited.” Thus, the power of a court to direct medical examination of a party to a matrimonial litigation     in a case of this nature cannot beheld to violate the petitioner’s right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Regulation of Privacy in Government and Private Hospitals and Diagnostic Laborataries&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A. Field Study&lt;/b&gt;&lt;br /&gt;The Hospitals that have been chosen for the analysis of the efficacy of these legislations include prominent Government Hospitals, Private Hospitals and     Diagnostic Centers. These Institutes were chosen because of their widely accredited status as centers of medical research and cutting edge treatment. They     have also had a long standing reputation due to their staff of experienced and skilled on call doctors and surgeons. The Private Hospitals chosen had     patient welfare centers that addressed the concerns of patients including questions and doubts relating to but not limited to confidentiality and consent.     The Government hospitals had a public relations office that addressed the concerns of discharged patients. They also provided counseling services to     patients to aid them in addressing concerns relate to the treatment that they might want to be kept confidential. Diagnostic laboratories also have an HR     department that addresses similar concerns. The laboratory also has a patient welfare manager who addresses the concerns and queries of the patient prior     to and during the procedure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following section describes the practices promulgated by Government and Private Hospitals, as well as Diagnostic Laboratories in their endeavor to     comply with the basic principles of privacy as laid down in the A.P Shah Committee report on Privacy.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(i) Notice&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Through an analysis of the information provided by Government and Private hospitals and diagnostic laboratories, relevant conclusions were drawn with     regard to the nature, process and method in which the patient information is recorded. Through interviews of various medical personnel including     administrative staff in the patient welfare and medical records departments we observed an environment of openness and accountability within the structure     of the patient registration system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Government Hospitals, the patient is notified of all types of information that is collected, in terms of both personal information as well as medical     history. The Patient admission as well as the patient consent form is filled out by the patient or the attending relative accompanying the patient and     assistance for the same is provided by the attending staff members, who explain the required details that need to be filled in a language that the patient     is able to understand. The patient is notified of the purpose for which such information is collected and the procedure that he/ she might have to undergo     depending on his injury or illness. The patient is not however, notified of the method in which he/she may correct or withdraw the information that is     provided. There is no protocol provided for the correction or withdrawal of information, once provided. The patient is, at all times notified of the extent     and nature of doctor patient confidentiality including the fact that his/her personal information would not be shared even with his/her immediate relatives     , insurance companies, consulting doctors who are not directly involved with his/her treatment or any unauthorized third party without requisite consent     from the patient. The patient is informed of the fact that in some cases the medical records of the patient will have to be shared with consulting doctors     and that all the patient’s medical records would be provided to insurance companies, but this will only be done with the consent of the patient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The same system of transparency and accountability transcends across private hospitals and diagnostic laboratories as well. In private hospitals, the     patient is informed of all the information that is collected and the purpose for which such information may be collected. Diagnostic laboratories have     specific patient consent forms for specific types of procedures which the patient will have to fill out depending on the required tests. These forms     contain provisions with regard to the confidential nature of all the information provided. This information can only be accessed by the patient and the     consulting doctor with the consent of the patient. Both private hospitals and diagnostic laboratories have a specific protocol and procedure in place to     correct or withdraw information that has been provided. In order to do so the patient would have to contact the medical records department with requisite     proof of the correct information. Private hospitals inform patients of the nature and extent of doctor patient confidentiality at every stage of the     registration process. Some private hospitals contain patient safety brochures which inform patients about the nature and extent of consent and     confidentiality, even with regard to consulting doctors and insurance agencies. If the patient does not want certain information revealed to insurance     agencies the hospital will retain such records and refraining from providing them to third party insurance agencies. Thus, all information provided by the     patient remains confidential at the behest of the patient.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(ii) Choice and Consent&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Choice and consent are two integral aspects of the regulation of privacy within the healthcare sector. Government and Private hospitals as well as     diagnostic laboratories have specific protocols in place to ensure that the consent of the patient is taken at every stage of the procedure. The consent of     the patient can also be withdrawn just prior to the procedure even if this consent has already been given by the patient in writing, previously. The choice     of the patient is also given ample importance at all stages of the procedure. The patient can refuse to provide any information that may not mandatorily     required for the treatment provided basic information regarding his identity and contact information in case of emergency correspondence has been given.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(iii) Collection Limitation&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The information collected from the patient in both government and private hospitals is used solely for the purpose that the patient has been informed of.     In case this information is used for purposes other than for the purpose that the patient has been informed of, the patient is informed of this new purpose     as well. Patient records in both Government and Private hospitals are stored in the Medical Records Department as hard copies and in some cases as scanned     soft copies of the hard copy as well. These Medical Records are all stored within the facility. The duration for which the records are stored range from a     minimum of two years to a maximum of ten years in most private hospitals. Some private hospitals store these records for life. Government hospitals store     these records for a term of thirty years only as hard copies after which the records are discarded. Private hospitals make medical records accessible to     any medical personnel who may ask for it provided the requisite proof of identity and reasons for accessing the same are provided, along with an attested     letter of authorization of the doctor who is currently involved or had been involved in the treatment of the patient. Government hospitals however do not     let any medical personnel access these records except for the doctor involved in the treatment of that particular patient. Both private and government     hospitals are required to share the medical records of the patient with the insurance companies. Government Hospitals only share patient records with     nationalized insurance agencies such as The Life Insurance Corporation of India (LIC) but not with private insurance agencies. The insurance claims forms     that are required prior to providing medical records to the insurance companies mandatorily require the signature of the patient. The patient is thus     informed that his records will be shared with the insurance agencies and his signature is a proof of his implied consent to the sharing of these records     with the company with which he has filed a health insurance claim.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Diagnostic laboratories collect patient information solely for the purpose of the particular test that they have been asked to conduct by the treating or     consulting doctor. Genetic samples (Blood, Semen, Urine etc) are collected at one time and the various tests required are conducted on these samples. In     case of any additional testing that is required to be conducted on these samples, the patient is informed. Additional testing is conducted only in critical     cases and in cases where the referral doctor requests for the same to be conducted on the collected samples. In critical cases, where immediate testing is     required and the patient is unreachable, the testing is conducted without informing the patient. The patient is mandatorily informed after the test that     such additional testing was conducted. The patient sample is stored for one week within the same facility. The Patient records are digitized. They can only     be accessed by the patient, who is provided with a particular username and password using which he can access only his records. The information is stored     for a minimum of two years. This information can be made available to a medical personnel only if such medical personnel has the required lab no, the     patients name, and reason for which it needs to be accessed. He thus requires the permission of the authorities at the facility as well as the permission     and consent of the patient to access such records. The Medical test records of a patient are kept completely confidential. Even insurance companies cannot     access such records unless they are provided to the company by the patient himself. In critical cases however, the patient information and tests results     are shared with the treating or referral doctor without the consent of the patient.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(iv) Purpose Limitation&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;In Government and Private Hospitals, the information is only used for the purpose for which it is collected. There is thus a direct and relevant connection     between the information collected and the purpose for which it used. Additional information is collected to gauge the medical history of the patient that     may be relevant to the disease that has to be treated. The information is never deleted after it has been used for the purpose for which it had been     collected. The Medical Records of the patient are kept for extended periods in hard copy as well as soft copy versions. There is a provision for informing     the patient in case the information is used for any purpose other than the purpose for which it was collected. Consent of the patient is taken at all     stages of collecting and utilizing the information provided by him.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Diagnostic Laboratories have a database of all the information collected which is saved in the server. The information is mandatorily deleted after it has     been used for the purpose for which it was collected after a period of two years. In case the information is used for any purpose other than the purpose     for which it was collected, for example, in critical cases where additional tests have to be conducted the patient is\ always informed of the same.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(v) Access and Correction&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;In private hospitals, the patient is allowed to access his own records during his stay at the hospital. He is given a copy of his file upon his discharge     from the hospital in the form of a discharge summary. However, if he needs to access the original records at a later stage, he can do so by filing a     request for the same at the Medical Records Department of the hospital. A patient can make amendments or corrections to his records by providing requisite     proof to substantiate the amended information. The patient however at no stage can confirm if the hospital is holding or processing personal information     about him or her with the exception of the provisions provided for the amendment or correction to the information held.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Medical records of a patient in a government hospital are completely sealed. A patient has no access to his own records. Only the concerned doctor who     was treating the patient during his stay at the hospital can access the records of the patient. This doctor has to be necessarily associated with the     hospital and had to have been directly involved in the patient’s treatment in order to access the records. The patient is allowed to amend information in     his medical records but only generic information such as the spelling of his name, his address, telephone number etc. The patient is at no point allowed to     access his own records and therefore cannot confirm if the hospital is holding or processing any information about him/her. The patient is only provided     with a discharge summary that includes his personal information, the details of his disease and the treatment provided in simple language.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Diagnostic laboratories have an online database of patient records. The patient is given a username and a password and can access the information at any     point. The patient may also amend or correct any information provided by contacting the Medical records department for the same. The patient can at any     time view the status of his record and confirm if it is being held or processed by the hospital. A copy of such information can be obtained by the patient     at any time.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(vi) Disclosure of Information&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Private Hospitals are extremely cautious with regard to the disclosure of patient information. Medical records of patients cannot be accessed by anyone     except the doctor treating that particular patient or consulting on the case. The patient is informed whenever his records are disclosed even to doctors.     Usually, even immediate relatives of the patient cannot access the patient’s records without the consent of the patient except in cases where the condition     of the patient is critical. The patient is always informed about the type and extent of information that may be disclosed whenever it is disclosed. No     information of the patient is made available publicly at any stage. The patient can refuse to consent to sharing of information collected from him/her with     non-authorized agencies. However, in no circumstance is the information collected from him/her shared with non authorized agencies. Some private hospitals     also provide the patient with patient’s safety brochures highlighting the extent of doctor patient confidentiality, the patient’s rights including the     right to withdraw consent at any stage and refuse access of records by unauthorized agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In government hospitals, the medical records of the patient can only be disclosed to authorized agencies with the prior approval of patient. The patient is     made aware of the type and extent of information that is collected from him/her and is mandatorily shared with authorized bodies such as insurance agencies     or the treating doctor. No information of the patient is made publicly available. In cases where the information is shared with insurance agencies or any     such authorized body the patient gives an undertaking via a letter of his consent to such disclosure. The insurance companies only use medical records for     verification purposes and have to do so at the facility. They cannot take any original documents or make copies of the records without the consent of the     patient as provided in the undertaking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Diagnostic Laboratories provide information regarding the patient’s medical records only to the concerned or referred doctor. The patient is always     informed of any instance where his information may be disclosed and the consent of the patient is always taken for the same. No information is made     available publicly or shared with unauthorized agencies at any stage. Information regarding the patient’s medical records is not even shared with insurance     companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government and Private Hospitals provide medical records of patients to the police only when a summons for the same has been issued by a judge. Diagnostic     laboratories however do not provide information regarding a patient’s records at any stage to any law enforcement agencies unless there is summons from a     judge specifying exactly the nature and extent of information required.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Patients are not made aware of laws which may govern the disclosure of information in private and government hospitals as well as in diagnostic     laboratories. The patient is merely informed that the information provided by him to the medical personnel will remain confidential.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(vii) Security&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The security measures that are put in place to ensure the safety of the collected information is not adequately specified in the forms or during the     collection of information from the patient in Government or Private Hospitals. Diagnostic laboratories however do provide the patient with information     regarding the security measures put in place to ensure the confidentiality of the information.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(viii) Openness&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The information made available to the patient at government and private hospital and diagnostic laboratories is easily intelligible. At every stage of the     procedure the explicit consent of the patient is obtained. In government and private hospitals the signature of the patient is obtained on consent forms at     every stage of the procedure and the nature and extent of the procedure is explained to the patient in a language that he understands and is comfortable     speaking. The information provided is detailed and is provided in simplistic terms so that the patient does at all stages understand the nature of any     procedure he is consenting to undergo.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;(ix) Accountability&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;Private hospitals and Diagnostic laboratories have internal and external audit mechanisms in place to check the efficacy of privacy measures. They both     have grievance redress mechanisms in the form of patient welfare cells and complaint cells. There is an assigned officer in place to take patient feedback     and address and manage the privacy concerns of the patient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government hospitals do not have an internal or external audit mechanism in place to check the efficacy of privacy measures. There is however a grievance     redressal mechanism in government hospitals in the form of a Public Relations Office that addresses the concerns, complaints, feedback and suggestions of     the patients. There is an officer in charge of addressing and managing the privacy concerns of patients. This officer also offers counseling to the     patients in case of privacy concerns regarding sensitive information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;International Best Practices and Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A. European Union&lt;br /&gt;&lt;/b&gt;An official EU data protection regulation &lt;a href="#_ftn69" name="_ftnref69"&gt;[69]&lt;/a&gt;was issued in January 2012. A key objective of this was to     introduce a uniform policy directive across all member states. The regulation, once implemented was to be applicable in all member states and left no room     for alteration or amendments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regulation calls for &lt;b&gt;Privacy Impact Assessments&lt;/b&gt;&lt;a href="#_ftn70" name="_ftnref70"&gt;[70]&lt;/a&gt;when there are specific risks to     privacy which would include profiling, sensitive data related to health, genetic material or biometric information. This is an important step towards     evaluating the nature and extent of privacy regulation required for various procedures and would be effective in the creation of a systematic structure for     the implementation of these regulations. The regulation also established the need for explicit consent for sensitive personal data. The basis for this is     an inherent imbalance in the positions of the data subject and the data controller, or in simpler terms the patient and the hospital or the life sciences     company conducting the research. Thus, implied consent is not enough &lt;a href="#_ftn71" name="_ftnref71"&gt;[71]&lt;/a&gt;and a need arises to proceed with     the testing only when there is &lt;b&gt;explicit informed consent.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Embedded within the regulation is the &lt;b&gt;right to be forgotten &lt;/b&gt;&lt;a href="#_ftn72" name="_ftnref72"&gt;[72]&lt;/a&gt;wherein patients can     request for their data to be deleted after they have been discharged or the clinical trial has been concluded. In the Indian scenario, patient information     is kept for extended periods of time. This can be subject to unauthorized access and misuse. The deletion of patient information once it has been used for     the purpose for which it was collected is thus imperative towards the creation of an environment of privacy protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 81 of the regulation specifies that health data may be processed only for three major processes&lt;a href="#_ftn73" name="_ftnref73"&gt;[73]&lt;/a&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) In cases of Preventative or occupational medicine, medical diagnosis, the care, treatment or management of healthcare services, and in cases where the     data is processed by the healthcare professionals, the data is subject to the obligation of professional secrecy;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) Considerations of public interest bearing a direct nexus to public health, for example, the protection of legitimate cross border threats to health or     ensuring a high standard of quality and safety for medicinal products or services;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c) Or other reasons of public interest such as social protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An added concern is the nature and extent of consent. The consent obtained during a clinical trial may not always be sufficient to cover additional     research even in instances of data being coded adequately. Thus, it may not be possible to anticipate additional research while carrying out initial     research. Article 83&lt;a href="#_ftn74" name="_ftnref74"&gt;[74]&lt;/a&gt; of the regulation prohibits the use of data collected for an additional purpose,     other that the purpose for which it was collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lastly, the regulation covers data that may be transferred outside the EEA, unless there is an additional level of data protection. If a court located     outside the EU makes a request for the disclosure of personal data, prior authorization must be obtained from the local data protection authority before     such transfer is made. It is imperative that this be implemented within Indian legislation as currently there is no mechanism to regulate the cross border     transfer of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;B. The United States of America&lt;br /&gt;&lt;/b&gt;The Health Maintenance Organizations Act, 1973 &lt;a href="#_ftn75" name="_ftnref75"&gt;[75]&lt;/a&gt;was enacted with a view to keep up with the rapid     development in the Information Technology sector. The digitization of personal information led to new forms of threats with regard to the privacy of a     patient. In the face of this threat, the overarching goal of providing effective and yet unobtrusive healthcare still remains paramount.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To this effect, several important federal regulations have been implemented. These include the Privacy and Security Ruled under the Health Insurance Portability and Accountability Act (HIPAA) 1996&lt;a href="#_ftn76" name="_ftnref76"&gt;[76]&lt;/a&gt; and the State Alliance for eHealth (2007)    &lt;a href="#_ftn77" name="_ftnref77"&gt;[77]&lt;/a&gt;.The HIPAA privacy rules addressed the use and subsequent disclosure of a patient's personal     information under various healthcare plans, medical providers, and clearinghouses. These insurance agencies were the primary agents involved in obtaining a     patients information for purposes such as treatment, payment, managing healthcare operations, medical research and subcontracting. Under the HIPAA it is     required of insurance agencies to ensure the implementation of various administrative safeguards such as policies, guidelines, regulations or rules to     monitor and control inter as well as intra organizational access.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from the HIPAA, approximately 60 laws related to privacy in the healthcare sector have been enacted in more than 34 states. These legislations have     been instrumental in creating awareness about privacy requirements in the healthcare sector and improving the efficiency of data collection and transfer.     Similar legislative initiative is required in the Indian context to aid in the creation of a regulated and secure atmosphere pertaining to the protection     of privacy within the healthcare sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;C. Australia&lt;br /&gt;&lt;/b&gt;Australia has a comprehensive law that deals with sectoral regulations of the right to privacy.An amendment to the Privacy Act1988    &lt;a href="#_ftn78" name="_ftnref78"&gt;[78]&lt;/a&gt;applies to all healthcare providers and was made applicable from 21st December 2001.The privacy Act     includes the followingpractices:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. A stringent requirement for informed consent prior to the collection of health related information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. A provision regarding the information that needs to be provided to individuals before information is collected from them&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. The considerations that have to be taken into account before the transfer of information to third parties such as insurance agencies, including the     specific instances wherein this information can be passed on&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. The details that must be included in the Privacy policy of the healthcare service providers' Privacy Policy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;e. The securing and storing of information; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;f. Providing individuals with a right to access their health records.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These provisions are in keeping with the 13 National Privacy &lt;a href="#_ftn79" name="_ftnref79"&gt;[79]&lt;/a&gt;Principles that represent the minimum     standards of privacy regulation with respect to the handling of personal information in the healthcare sector.These guidelines are advisory in nature and     have been issued by the Privacy Commissioner in exercise of his power under Section 27(1)(e) &lt;a href="#_ftn80" name="_ftnref80"&gt;[80]&lt;/a&gt;of the     Privacy Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Act also embodiessimilar privacy principles which include a collection limitation, a definitive use and purpose for the information collected, a     specific set of circumstance and an established protocol for the disclosure of information to third parties including the nature and extent of such     disclosure, maintenance accuracy ofthe data collected, requisite security measures to ensure the data collected is at all times protected, a sense of     transparency,accountability and openness in the administrative functioning of thehealthcare provider and accessibility of the patient to his ownrecords for     the purpose of viewing, corroboration or correction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the Act includes the system of identifiers which includes a number assigned by the organization to an individual to identify the purpose of     that person's data for the operation of the organization. Further, the Act provides for anonymity wherein individuals have the optionnot to identify     themselves while entering into transactions with an organization. The Act also provides for restrictions on the transfer of personal data outside Australia     and establishes conclusive and stringent barriers to the extent of collection of personal and sensitive data.These principles although vaguely similar to     those highlighted in the A.P. Shah Committee report can be usedto streamline the regulations pertaining to privacy in the healthcare sector and make them     more efficient.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Key Recommendations&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is Imperative that Privacy concerns relating to the transnational flow of Private data be addressed in the most efficient way possible. This would     involve international cooperation and collaboration to address privacy concerns including clear provisions and the development of coherent minimum     standards pertaining to international data transfer agreements. This exchange of ideas and multilateral deliberation would result in creating more     efficient methods of applying the provisions of privacy legislation even within domestic jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a universal need for the development of a foundational structure for the physical collection, use and storage of human biological specimens (in     contrast to the personalinformation that may be derived from those specimens) as these are extremely important aspects of biomedical research and clinical     trials. The need for Privacy Impact Assessments would also arise in the context of clinical trials, research studies and the gathering of biomedical data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, there also arises the need for patients to be allowed to request for the deletion of their personal information once it has served the purpose for     which it was obtained. The keeping of records for extended periods of time by hospitals and laboratories is unnecessary and can often result in the     unauthorized access to and subsequent misuse of such data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is a definitive need to ensure the incorporation of safeguards to regulate the protection of patient’s data once accessed by third parties, such as     insurance companies. In the Indian Context as well as insurance agencies often have unrestricted access to a patient's medical records however there is a     definitive lack of sufficient safeguards to ensure that this information is not released to or access by unauthorized persons either within these insurance     agencies or outsourced consultants&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The system of identifiers which allocate specific numbers to an individual’s data which can only be accessed using that specific number or series of     numbers can be incorporated into the Indian system as well and can simplify the administrative process thus increasing its efficacy. This would afford     individuals the privilege of anonymity while entering into transactions with specific healthcare institutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An important means of responding to public concerns over potential unauthorized use ofpersonal information gathered for research, could be through the issuing of Certificates of confidentiality as issued in the United States to protectsensitive information on research participants from forced disclosure.    &lt;a href="#_ftn81" name="_ftnref81"&gt;[81]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, it is imperative that frequent discussions, deliberations, conferences and roundtables take place involving multiple stakeholders form the     healthcare sector, insurance companies, patient’s rights advocacy groups and the government. This would aid in evolving a comprehensive policy that would     aid in the protection of privacy in the healthcare sector in an efficient and collusive manner.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusions&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Right to Privacy has been embodied in a multitude of domestic legislations pertaining to the healthcare sector. The privacy principles envisioned in     the A.P Shah Committee report have also been incorporated into the everyday practices of healthcare institutions to the greatest possible extent. There are     however significant gaps in the policy formulation that essentially do not account for the data once it has been collected or its subsequent transfer.     There is thus an imminent need for institutional collaboration in order to redress these gaps. Recommendations for the same have been made in the report.     However, for an effective framework to be laid down there is still a need for the State to play an active role in enabling the engagement between different     institutions both in the private and public domain across a multitude of sectors including insurance companies, online servers that are used to harbour a     data base of patient records and civil action groups that demand patient privacy while at the same time seek to access records under the Right to     Information Act. The collaborative efforts of these multiple stakeholders will ensure the creation of a strong foundational framework upon which the Right     to Privacy can be efficiently constructed.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; . Report of the group of experts on Privacy chaired by Justice A.P Shah &amp;lt;http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&amp;gt;             [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; . Nissenbaum, H. (2004). Privacy as Contextual Integrity. &lt;i&gt;Washington Law Review&lt;/i&gt;, &lt;i&gt;79&lt;/i&gt;(1), 101-139.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; . &lt;i&gt;Ibid.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; . Thomas, J. (2009). Medical Records and Issues in Negligence,            &lt;i&gt;Indian Journal of Urology : IJU : Journal of the Urological Society of India&lt;/i&gt;, &lt;i&gt;25&lt;/i&gt;(3), 384-388. doi:10.4103/0970-1591.56208.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; &lt;i&gt;. Ibid &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; . Plaza, J., &amp;amp;Fischbach, R. (n.d.). Current Issues in Research Ethics : Privacy and Confidentiality. Retrieved December 5, 2011, from             http://ccnmtl.columbia.edu/projects/cire/pac/foundation/index.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; . &lt;i&gt;Ibid.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; . The Mental Health Act, 1987 &amp;lt;https://sadm.maharashtra.gov.in/sadm/GRs/Mental%20health%20act.pdf&amp;gt; [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; . The Mental Health Act, 1987, s. 13(1).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; .The Mental Health Act, 1987, s. 38.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; .The Mental Health Act, 1987, s. 40.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; .The Mental Health Act, 1987, s. 21(2).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; .The Mental Health Act, 1987, s. 13(1), &lt;i&gt;Proviso&lt;/i&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; . Also see the: Pre-Conception and and Pre-Natal Diagnostic Techniques (Prohibition of Sex Selection) Rules, 1996.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; . Pre-Conception and Pre-Natal Diagnostic Techniques (Prohibition of Sex Selection) Act, 1994, s. 4(3).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; . Pre-Conception and Pre-Natal Diagnostic Techniques (Prohibition of Sex Selection) Act, 1994, s. 4(2). Pre-natal diagnostic techniques shall be             conducted for the purposes of detection of: chromosomal abnormalities, genetic metabolic diseases, haemoglobinopathies, sex-linked genetic             diseases, congenital anomalies any other abnormalities or diseases as may be specified by the Central Supervisory Board.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; .Medical Termination of Pregnancy Amendment Act, 2002, Notification on Medical Termination of Pregnancy (Amendment) Act, Medical Termination of             Pregnancy Regulations, 2003 and Medical Termination of Pregnancy Rules, 2003.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; .Medical Termination of Pregnancy Act, 1971 (Amended in 2002), s. 2(4) and 4, and Medical Termination of Pregnancy Rules, 2003, Rule 8&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; .Medical Termination of Pregnancy Regulations, 2003, Regulation 4(5).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; .Medical Termination of Pregnancy Regulations, 2003, Regulation 5.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; .Medical Termination of Pregnancy Regulations, 2003, Regulation 4(2).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; .Medical Termination of Pregnancy Regulations, 2003, Regulations 4(2) and 4(4).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; &lt;i&gt;. Code of Ethics Regulations, 2002&lt;/i&gt; available at&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.mciindia.org/RulesandRegulations/CodeofMedicalEthicsRegulations2002.aspx"&gt; http://www.mciindia.org/RulesandRegulations/CodeofMedicalEthicsRegulations2002.aspx &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; . &lt;i&gt;Code of Ethics Regulations,&lt;/i&gt; 2002 Chapter 2, Section 2.2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; .&lt;i&gt;Ethical Guidelines for Biomedical Research&lt;/i&gt;&lt;i&gt; on &lt;/i&gt;&lt;i&gt;Human Subjects&lt;/i&gt;. (2006) Indian &lt;i&gt;Council&lt;/i&gt; of Medical Research New             Delhi.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; . Informed Consent Process, &lt;i&gt;Ethical Guidelines for Biomedical Research&lt;/i&gt;on&lt;i&gt;Human Subjects (2006)&lt;/i&gt;&lt;i&gt;.&lt;/i&gt; Indian &lt;i&gt;Council&lt;/i&gt; of Medical Research New Delhi.P. 21.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; . Statement of Specific Principles for Human Genetics Research, &lt;i&gt;Ethical Guidelines for Biomedical Research&lt;/i&gt;on&lt;i&gt;Human Subjects (2000)&lt;/i&gt; &lt;i&gt;.&lt;/i&gt; Indian &lt;i&gt;Council&lt;/i&gt; of Medical Research New Delhi.P. 62.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; . General Ethical I&lt;i&gt;ssues. Ethical Guidelines for Biomedical Research&lt;/i&gt;on&lt;i&gt;Human Subjects (2006)&lt;/i&gt;&lt;i&gt;.&lt;/i&gt; Indian &lt;i&gt;Council&lt;/i&gt; of             Medical Research New Delhi.P. 29.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; . Statement of Specific Principles for Epidemiological Studies, &lt;i&gt;Ethical Guidelines for Biomedical Research&lt;/i&gt;on&lt;i&gt;Human Subjects (2000)&lt;/i&gt; &lt;i&gt;.&lt;/i&gt; Indian &lt;i&gt;Council&lt;/i&gt; of Medical Research New Delhi P. 56.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; . Statement of General Principles, Principle IV and Essential Information on Confidentiality for Prospective Research Participants,            &lt;i&gt;Ethical Guidelines for Biomedical Research&lt;/i&gt;on&lt;i&gt;Human Subjects (2006)&lt;/i&gt;&lt;i&gt;.&lt;/i&gt; Indian &lt;i&gt;Council&lt;/i&gt; of Medical Research New             Delhi.P. 29.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; . The IRDA (Third Party Administrators - Health Services) Regulations 2001, (2001), Chapter 5. Section 2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; . The IRDA (Sharing Of Database for Distribution of Insurance Products) Regulations 2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; . The IRDA (Sharing Of Database For Distribution Of Insurance Products) Regulations 2010.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; . The IRDA (Sharing Of Database For Distribution Of Insurance Products) Regulations 2010&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; . List of TPAs Updated as on 19th December, 2011, Insurance Regulatory and Development Authority (2011),             http://www.irda.gov.in/ADMINCMS/cms/NormalData_Layout.aspx?page=PageNo646 (last visited Dec 19, 2011).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; . The IRDA, Guideline on Outsourcing of Activities by Insurance Companies, (2011).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; . The IRDA, Guideline on Outsourcing of Activities by Insurance Companies, (2011), Section 9.11. P. 8. &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; .&lt;i&gt;The Epidemic Diseases Act&lt;/i&gt;, 1897.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; .&lt;i&gt;The Epidemic Diseases Act&lt;/i&gt;, 1897. s. 2.1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; .&lt;i&gt;The Epidemic Diseases Act&lt;/i&gt;, 1897, s. 2.2(b).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; . The National Policy for Persons with Disabilities, 2006, Persons with Disabilities (Equal Opportunities, Protection of Rights and Full             Participation) Act, 1995, Persons with Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Rules, 1996.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; . Research, National Policy for Persons with Disabilities, 1993.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; . Survey of Disabled Persons in India. (December 2003) National Sample Survey Organization. Ministry of Statistics and Programme Implementation.             Government of India.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; .Persons With Disabilities (Equal Opportunities, Protection of Rights and Full Participation) Act. 1995, Section 35.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt;. Research. National Policy for Persons with Disabilities, 2003.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt;. http://www.lawyerscollective.org/files/Anti%20rights%20practices%20in%20Targetted%20Interventions.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt;. http://www.lawyerscollective.org/files/Anti%20rights%20practices%20in%20Targetted%20Interventions.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt;. Aneka, Karnataka Sexual Minorities Forum. (2011)“Chasing Numbers, Betraying People: Relooking at HIV Services in Karnataka”, p.22.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt;. Aneka, Karnataka Sexual Minorities Forum. (2011)“Chasing Numbers, Betraying People: Relooking at HIV Services in Karnataka”, p.16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt;. Aneka, Karnataka Sexual Minorities Forum. (2011)“Chasing Numbers, Betraying People: Relooking at HIV Services in Karnataka”, p.16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt;. Aneka, Karnataka Sexual Minorities Forum. (2011)“Chasing Numbers, Betraying People: Relooking at HIV Services in Karnataka”, p.14.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt;. http://www.hivaidsonline.in/index.php/HIV-Human-Rights/legal-issues-that-arise-in-the-hiv-context.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt;. Chakrapani et al, (2008) ‘HIV Testing Barriers and Facilitators among Populations at-risk in Chennai, India’, INP, p 12.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt;. Aneka, Karnataka Sexual Minorities Forum. (2011)“Chasing Numbers, Betraying People: Relooking at HIV Services in Karnataka”, p.24.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; .&lt;a href="http://www.indiankanoon.org/doc/570038/"&gt;http://www.indiankanoon.org/doc/570038/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; .&lt;a href="http://www.indiankanoon.org/doc/570038/"&gt;http://www.indiankanoon.org/doc/570038/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; .&lt;a href="http://www.indiankanoon.org/doc/680703/"&gt;http://www.indiankanoon.org/doc/680703/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; . No person accused of any offence shall be compelled to be a witness against himself’, (the 'right to silence').&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; . http://indiankanoon.org/doc/338008/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; . http://www.hrdc.net/sahrdc/hrfeatures/HRF205.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; . AIR 1992 SC 392.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; . 96 (2002) DLT 354.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; .AIR 2000 A.P 156.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; .&lt;a href="http://indiankanoon.org/doc/382721/"&gt;http://indiankanoon.org/doc/382721/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; .&lt;a href="http://indiankanoon.org/doc/859256/"&gt;http://indiankanoon.org/doc/859256/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; .See Sections 24, 37, 38 and 39 of The Prisons Act, 1894 (Central Act 9 of 1894) Rules 583 to 653 (Chapter XXXV) and Rules 1007 to 1014 (Chapter             LVII) of Andhra Pradesh Prisons Rules, 1979&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; .Section 10-A,17(4) ,19(2) Immoral Traffic (Prevention) Act 1956&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; .&lt;a href="http://www.indiankanoon.org/doc/1309207/"&gt;http://www.indiankanoon.org/doc/1309207/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; . http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; . Article 33, Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL&lt;/p&gt;
&lt;p&gt;on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection             Regulation) &amp;lt; http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf&amp;gt; [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May, 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; .Article 4 (Definition of “Data Subject’s Consent”), Article 7, Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL&lt;/p&gt;
&lt;p&gt;on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection             Regulation) &amp;lt; http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf&amp;gt; [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May, 2014].&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; . Article 17, “Safeguarding Privacy in a Connected World – A European Data Protection Framework for the 21st&lt;/p&gt;
&lt;p&gt;Century” COM(2012) 9 final. Based on, Article 12(b), EU Directive 95/46/EC – The Data Protection Directive at             &amp;lt;http://www.dataprotection.ie/docs/EU-Directive-95-46-EC-Chapter-2/93.htm&amp;gt; [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May, 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; . Article 81, Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL&lt;/p&gt;
&lt;p&gt;on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection             Regulation) &amp;lt; http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf&amp;gt; [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May, 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; .Article 83, Proposal for a REGULATION OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL&lt;/p&gt;
&lt;p&gt;on the protection of individuals with regard to the processing of personal data and on the free movement of such data (General Data Protection             Regulation) &amp;lt; http://ec.europa.eu/justice/data-protection/document/review2012/com_2012_11_en.pdf&amp;gt; [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May, 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a href="#_ftnref75" name="_ftn75"&gt;[75]&lt;/a&gt; . Health Maintainence and Organization Act 1973, Notes and Brief Reports available at http://www.ssa.gov/policy/docs/ssb/v37n3/v37n3p35.pdf             [Accessed on 14th May 2014].&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a href="#_ftnref76" name="_ftn76"&gt;[76]&lt;/a&gt; . Health Insurance Portability and Accountability Act, 1996 available at             http://www.hhs.gov/ocr/privacy/hipaa/administrative/statute/hipaastatutepdf.pdf [Accessed on 14th May 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a href="#_ftnref77" name="_ftn77"&gt;[77]&lt;/a&gt; . Illinois Alliance for Health Innovation plan available at http://www2.illinois.gov/gov/healthcarereform/Documents/Alliance/Alliance%20011614.pdf             [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a href="#_ftnref78" name="_ftn78"&gt;[78]&lt;/a&gt; . The Privacy Act 1988 available at http://www.comlaw.gov.au/Series/C2004A03712 [Accessed on 14th May 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a href="#_ftnref79" name="_ftn79"&gt;[79]&lt;/a&gt; . Schedule 1, Privacy Act 1988 [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a href="#_ftnref80" name="_ftn80"&gt;[80]&lt;/a&gt; .Section 27(e), Privacy Act 1988 [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May 2014]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a href="#_ftnref81" name="_ftn81"&gt;[81]&lt;/a&gt; . Guidance on Certificates of Confidentiality, Office of Human Research Protections, U.S Department of Health and Human Services available at             http://www.hhs.gov/ohrp/policy/certconf.pdf [Accessed on 14&lt;sup&gt;th&lt;/sup&gt; May, 2014].&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-in-healthcare-policy-guide'&gt;https://cis-india.org/internet-governance/blog/privacy-in-healthcare-policy-guide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tanvi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-08-31T15:18:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/university-of-mysore-releases-kannada-vishwakosha-under-cc-license">
    <title>University of Mysore Re-releases Kannada Vishwakosha (Encyclopaedia) under Creative Commons Free License</title>
    <link>https://cis-india.org/openness/blog-old/university-of-mysore-releases-kannada-vishwakosha-under-cc-license</link>
    <description>
        &lt;b&gt;The University of Mysore and the Centre for Internet and Society co-organized the Open Knowledge Day in Mysore on July 15, 2014. On this occasion Mysore University released six volumes of Kannada Vishwakosha under the Creative Commons (CC) license. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Kannada Vishwakosha brought out by the &lt;a class="external-link" href="http://www.uni-mysore.ac.in/"&gt;University of Mysore&lt;/a&gt; can easily be termed as the best     encyclopaedia in Kannada. It has been modelled after the famous Britannica encyclopaedia. Mysore University Vishwakosha has 14 volumes having a total of 13802     pages. The very first volume was brought out in the year 1969 and the final volume was released in 2004. Many famous Kannada authors, scientists,     academicians and stalwarts from other fields have worked on creating this encyclopaedia. The print volumes of the first version of the encyclopaedia are     out of stock now. Recently UoM has started revising and reprinting the encyclopaedia. So far 4 volumes have been revised, enhanced and published.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UoM believes in Open Access to Knowledge. It has put up the research outputs from its departments online for &lt;a class="external-link" href="http://eprints.uni-mysore.ac.in/"&gt;free access to the public&lt;/a&gt;. UoM has done these as a subscriber to the &lt;a class="external-link" href="http://www.budapestopenaccessinitiative.org/read"&gt;idea of Budapest Open Access Initiative&lt;/a&gt;. The Open Access Institutional Repository, of UoM, covers scholarly publications covering journal     articles, conference papers, books, book reviews, presentations, reports and patents ever since UoM was established in 1916. Extending the philosophy of     open knowledge to the Kannada encyclopaedia published by UoM becomes a natural extension. UoM is in the verge of celebrating its centenary soon and has     taken many initiatives in that direction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS-A2K has been in negotiations with UoM towards releasing of its high quality Kannada Vishwakosha (Kannada Encyclopaedia) under Creative Commons license.     CIS and UoM signed a MoU on February 22, 2014. Here is the relevant extract from the MoU: "They will work together to digitize all encyclopaedic     publications for which the copyright is owned by UoM, and re-release them under the Creative Common license (CC-BY-SA 3.0). The digitized content will be     made available for everyone through free content distribution platforms like Wikipedia and Wikisource. The digitization will be done employing the global     standard Unicode so that the content has longevity, is universally portable and is easily searchable. Both parties have joined hands to undertake the above     in order to enhance digital literacy in the Kannada language and facilitate collaborative production and free dissemination of knowledge in Kannada to the     students, academics, researchers and the wider public. The parties also believe that by reintroducing the knowledge in digital and openly accessible     formats could significantly enhance the production of knowledge in Kannada and give a new lease of life to Kannada language in the digital era. The parties     will co-design and jointly implement relevant programmes to achieve this objective." As part of this MoU, UoM agreed to release the first six volumes of     Kannada Vishwakosha under CC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Volume numbers 1, 2, 4 and 6 of Kannada Vishwakosha of UoM have been revised and published recently. A project page has been created in Kannada Wikipedia     &lt;a class="external-link" href="http://bit.ly/mysoreunivwp"&gt;for this project&lt;/a&gt;. Kannada Wikipedians joined hands in the project. The project involved extracting the     text from the soft copies of the files, converting them into Unicode, extracting articles from these files and uploading them to Kannada Wikisource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A team of interns from Christ University had a major role to play in this development. These were students from the Wikipedia in Education Program that     was conducted in Christ University during the academic period of 2013-14. These students took active part in the current project and uploaded about 1200     articles so far (till July 21, 2014).&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Media Coverage&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The event attracted very good media coverage. Leading English and Kannada dailies like Andolana Kannada, City Today, Deccan Herald, Hosa Diganta, Kannada Jana Mana, Kannada Prabha, Rajya Dharma, Samyukta Karnataka, The Hindu, The New Indian Express, Udayavani, Vijaya Karnataka, and Vijaya Vani published about this. Scanned versions of the published articles can be &lt;a href="https://cis-india.org/openness/blog-old/open-knowledge-day-mysore-media-coverage-zip" class="external-link"&gt;downloaded here&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Other Links:&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;UoM Kannada Vishwakosha conversion project page in Kannada Wikipedia - &lt;a href="http://bit.ly/mysoreunivwp"&gt;http://bit.ly/mysoreunivwp&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Articles from UoM Kannada Vishwakosha in Kannada Wikisource - &lt;a href="http://bit.ly/mysoreuniv"&gt;http://bit.ly/mysoreuniv&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Category UoM Kannada Vishwakosha in Kannada Wikisource - &lt;a href="http://bit.ly/mysoreunivws"&gt;http://bit.ly/mysoreunivws&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;For pictures from the Open Knowledge Day event in Mysore - &lt;a class="external-link" href="https://commons.wikimedia.org/wiki/Category:Mysore_University_Open_Knowledge_Day"&gt;https://commons.wikimedia.org/wiki/Category:Mysore_University_Open_Knowledge_Day&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/university-of-mysore-releases-kannada-vishwakosha-under-cc-license'&gt;https://cis-india.org/openness/blog-old/university-of-mysore-releases-kannada-vishwakosha-under-cc-license&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pavanaja</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Kannada Wikipedia</dc:subject>
    

   <dc:date>2014-07-24T07:03:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights">
    <title>Delhi High Court Orders Blocking of Websites after Sony Complains Infringement of 2014 FIFA World Cup Telecast Rights</title>
    <link>https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights</link>
    <description>
        &lt;b&gt;Of late the Indian judiciary has been issuing John Doe orders to block websites, most recently in Multi Screen Media v. Sunit Singh and Others. The order mandated blocking of 472 websites, out of which approximately 267 websites were blocked as on July 7, 2014. This trend is an extremely dangerous one because it encourages flagrant censorship by intermediaries based on a judicial order which does not provide for specific blocking of a URL, instead provides for blocking of the entire website. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The High Court of Delhi on June 23, 2014 issued a &lt;a class="external-link" href="http://delhihighcourt.nic.in/dhcqrydisp_o.asp?pn=119642&amp;amp;yr=2014"&gt;John Doe injunction&lt;/a&gt; restraining more than 400 websites from broadcasting 2014 FIFA world cup matches. &lt;a href="http://www.khelnama.com/140624/football/news/delhi-high-court-bans-400-websites-live-streaming-fifa-wold-cup/16001"&gt;News reports&lt;/a&gt; indicate that the Single judge bench of Justice V. Kameswar Rao directed the &lt;a class="external-link" href="http://www.dot.gov.in/"&gt;Department of Telecom&lt;/a&gt; to issue appropriate directions to ISPs to block the websites that Multi Screen Media provided, as well as &lt;b&gt;“any other website identified by the plaintiff”&lt;/b&gt; in the future. &lt;b&gt;On July 4, Justice G. S. Sistani permitted &lt;a href="http://ibnlive.in.com/news/airtel-blocks-219-websites-for-infringing-on-sonys-world-cup-2014-telecast-rights/484439-11.html"&gt;reducing the list to 219 websites&lt;/a&gt;&lt;/b&gt;. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Background&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Multi Screen Media (MSM) is the official broadcaster for the ongoing 2014 FIFA World Cup tournament. FIFA (the Governing body) had exclusively licensed rights to MSM which included live, delayed, highlights, on demand, and repeat broadcast of the FIFA matches. MSM complained that the defendants indulged in hosting, streaming, providing access to, etc, thereby infringing the exclusive rights and broadcast and reproduction rights of MSM.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court in the instant order held that the defendants had &lt;b&gt;&lt;i&gt;prima facie&lt;/i&gt;&lt;/b&gt; infringed MSM’s broadcasting rights, which are guaranteed by section 37 of the &lt;a class="external-link" href="http://copyright.gov.in/Documents/CopyrightRules1957.pdf"&gt;Copyright Act, 1957&lt;/a&gt;.  In an over-zealous attempt to pre-empt infringement the court called for a blanket ban on all websites identified by MSM. Further, the court directed the concerned authorities to ensure ISPs complied with this order and block the websites mentioned by MSM presently, and other websites which may be subsequently be notified by MSM.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;b&gt;Where the Court went Wrong&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The court stated that MSM successfully established a &lt;b&gt;prima facie case&lt;/b&gt;, and on its basis granted a sweeping injunction to MSM ordering &lt;b&gt;blocking 471 second level domains&lt;/b&gt;. I’d like to point out numerous flaws with the order-&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Dissatisfactory "Prima facie case"&lt;/b&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;div style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;In my opinion the court could have scrutinised the list of websites provided by MSM more carefully. There is nothing in the order to suggest that evidence was proffered by MSM in support of the list. The order reveals that the list was prepared by &lt;/span&gt;&lt;a href="http://www.markscan.co.in/index.php" style="text-align: justify; "&gt;MarkScan&lt;/a&gt;&lt;span style="text-align: justify; "&gt;, a &lt;/span&gt;&lt;i style="text-align: justify; "&gt;“consulting boutique dedicated to (the client’s) IP requirements in the cyberspace and the Indian sub-continent.”&lt;/i&gt;&lt;span style="text-align: justify; "&gt; The list throws up names such as docs.google.com, goo.gl &amp;amp; ad.ly (provide URL shortening service &lt;/span&gt;&lt;i style="text-align: justify; "&gt;only&lt;/i&gt;&lt;span style="text-align: justify; "&gt;), torrent indexing websites, IP addresses, online file streaming websites, etc., at a cursory glance. Evidently, perfectly legitimate websites have been targeted by an ill conducted search and shoddily prepared list which may lead to blocking of legitimate content on account of no verification by the court. &lt;/span&gt;&lt;b style="text-align: justify; "&gt;471 websites out of 472 mentioned in the first list are second level domains&lt;/b&gt;&lt;span style="text-align: justify; "&gt; and &lt;/span&gt;&lt;b style="text-align: justify; "&gt;23&lt;/b&gt;&lt;span style="text-align: justify; "&gt; websites have been &lt;/span&gt;&lt;b style="text-align: justify; "&gt;listed twice&lt;/b&gt;&lt;span style="text-align: justify; "&gt;.&lt;/span&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;b style="text-align: justify; "&gt;&lt;br /&gt;&lt;/b&gt;&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;span style="text-align: justify; "&gt;2. &lt;/span&gt;&lt;b style="text-align: justify; "&gt;Generic order which abysmally fails to identify specific infringing URLS&lt;/b&gt;&lt;/div&gt;
&lt;p style="text-align: justify; "&gt;Out of the 472 websites (list provided in the order by MarkScan)-&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;471 are file streaming websites, video sharing websites, file lockers, URL shorteners, file storage websites; &lt;b&gt;only one is a specific URL&lt;/b&gt; [&lt;a href="http://www.24livestreamtv.com/brazil-2014-fifa-world-cup-football-%20%C2%A0%C2%A0live-streaming-online-t"&gt;http://www.24livestreamtv.com/brazil-2014-fifa-world-cup-football-%20%C2%A0%C2%A0live-streaming-online-t&lt;/a&gt; ].&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/copy_of_Untitled.jpg/image_preview" alt="Breakdown of the list in the July 23rd Order" class="image-inline image-inline" title="Breakdown of the list in the July 23rd Order" /&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;The order calls for blocking of complete websites. This is in complete contradiction to the 2012 Madras High Court’s order in &lt;a href="https://cis-india.org/internet-governance/blog/internet-governance/resources/john-doe-order-r.k.-productions-v.-bsnl-mtnl-and-ors.-movie-3"&gt;R K Productions v BSNL&lt;/a&gt; which held that only a particular URL where the infringing content is kept should be blocked, rather than the entire website. The Madras High Court order had also made it mandatory for the complainants to provide exact URLs where they find illegal content, such that ISPs could block only that content and not the entire site. MSM did not adhere to this and I have serious doubts if the defendants brought the distinguishing Madras High Court judgment to the attention of the bench. The entire situation is akin to MarkScan scamming MSM by providing their clients a dodgy list, and MSM scamming the court and the public at large.&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;3.&lt;b&gt; Lack of Transparency – Different blocking messages on different ISPs&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoListParagraph" style="text-align: justify; "&gt;The message displayed uniformly on blocked websites was:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"This website/URL has been blocked until further notice either pursuant to court orders or on the directions issued by the Department of Telecommunications."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I observed that a few websites showed the message &lt;b&gt;“Error 404 – File or Directory not found”&lt;/b&gt; without the blocking message (above) on the network provider Reliance, and same Error 404 with the blocking message on the network provider Airtel highlighting the non-transparent manner of adherence to the order. Further, both the messages do not indicate the end period of the block.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;b&gt;Legality of John Doe orders in Website Blocking&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;It is pertinent to reiterate the ‘misuse’ of John Doe orders to block websites in India. The judiciary has erred in applying the John Doe order to protect copyrightable content on the internet. While the &lt;i&gt;R K Productions v BSNL&lt;/i&gt; case appears reasonable in terms of permitting blocking of only URL specific content, the application of John Doe order to block websites remains unfounded in law. Ananth Padmanabhan in a three part study (&lt;a href="https://cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-1"&gt;Part I&lt;/a&gt;, &lt;a href="https://cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-2"&gt;II&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-3"&gt;III&lt;/a&gt;) had earlier analysed the improper use of John Doe injunctions to block websites in India. The John Doe order was conceived by US courts to pre-emptively remedy the irreparable damages suffered by copyright holders on account of unidentified/unnamed infringers. The interim injunction allowed collection of evidence from infringers, who were identified later as certain defendants and the final relief was accordingly granted. The courts routinely advocated judicious use of the order, and ensured that the identified defendants were provided and informed of their right to apply to the court within twenty four hours for a review of the order and a right to claim damages in an appropriate case. Therefore, the John Doe order applied against &lt;i&gt;primary&lt;/i&gt; infringers &lt;i&gt;per se.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, whilst extending this remedy in India the &lt;b&gt;courts have unfortunately placed onus on the conduit i.e. the ISP to block websites&lt;/b&gt;. This is &lt;a href="https://cis-india.org/internet-governance/blog/a2k/blog/john-doe-orders-isp-blocking-websites-copyright-1"&gt;tantamount to providing final relief at the interim stage&lt;/a&gt;, since all content definitely gets blocked; however, this hardly helps in identifying the actual infringer on the internet. &lt;b&gt;The court is prematurely doling out blocking remedies to the complaining party, which, legally speaking should be meted out only during the final disposition of the case after careful examination of the evidence available.&lt;/b&gt; Thus, the intent of a John Doe order is miserably lost in such an application. Moreover, this lends an arbitrary amount of power in the hands of intermediaries since ISPs may or may not choose to approach the court for directions to specifically block URLs which provide access to infringing content only.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights'&gt;https://cis-india.org/internet-governance/blog/delhi-high-court-orders-blocking-of-websites-after-sony-complains-infringement-of-2014-fifa-world-cup-telecast-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2014-07-08T07:02:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated">
    <title>India's Ratification of the Marrakesh Treaty Celebrated; Accessible Books Consortium Launched</title>
    <link>https://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated</link>
    <description>
        &lt;b&gt;On Day 1 of the 28th Session of the World Intellectual Property Organization (“WIPO”) Standing Committee on Copyright and Related Rights (“SCCR”), the WIPO organized an event to mark India’s ratification of the Marrakesh Treaty to Facilitate Access to Published Works for Persons Who Are Blind, Visually Impaired or Otherwise Print Disabled, 2013 (“Marrakesh Treaty”), and to launch the Accessible Books Consortium (“ABC”).&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;India Becomes the First Country to Ratify the Marrakesh Treaty&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Francis Gurry, Director General, WIPO said that the Marrakesh Treaty received 79 signatures in the twelve month period that the treaty was open for signatures. He further said that India’s ratification of the Marrakesh Treaty one year from its conclusion was a “WIPO record of sorts” and a “great example from a major country” of the importance attached to the Marrakesh Treaty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dilip Sinha, Ambassador and Permanent Representative of India to the United Nations in Geneva handed over India’s Instrument of Accession to the Marrakesh Treaty to Francis Gurry. Ambassador Sinha in his speech stressed on the importance of the Marrakesh Treaty to India and said that it helped that India had its amendments to its Copyright Act, 1957 in place, incorporating the provisions of the Marrakesh Treaty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Maryanne Diamond, the Immediate Past President of the World Blind Union (“WBU”) congratulated India on its ratification. Calling it a country who showed “huge leadership” in negotiations of the Marrakesh Treaty, Ms. Diamond said that this ratification was extremely significant, with India being home to a large number of blind and print disabled people and a part of the Global South. Ms. Diamond urged other nations to follow India’s example and make it a priority to ratify the Marrakesh Treaty.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Jens Bammel, Secretary General, International Publishers Association (“IPA”) also congratulated India on its ratification of the Marrakesh Treaty and called on other member states to ratify it.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Accessible Books Consortium Launched&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;At the launch of the ABC, Mr. Gurry said that the Marrakesh Treaty was only the means to an end, where the end was books in the hands of print disabled and visually impaired persons across the world. “To make it operational,” said Mr. Gurry, “we need to have operational activities.” He said that the ABC was an operational activity which would “breathe life” into and “make operational” the legal framework provided by the Marrakesh Treaty.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;What Does it Do?&lt;/h3&gt;
&lt;p&gt;Mr. Gurry said that the ABC aimed at achieving three things- &lt;i&gt;first, &lt;/i&gt;capacity building; &lt;i&gt;second, &lt;/i&gt;international book exchange and &lt;i&gt;third, &lt;/i&gt;international book exchange.&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Capacity Building- Mr. Gurry said that the ABC seeks to provide training on accessible book production and distribution. He thanked the Republic of Korea which has committed to providing financial assistance for training in respect of production of books in accessible formats.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;International Book Exchange- Mr. Gurry said that this activity was an IT supported facility, namely, the &lt;a href="http://www.accessiblebooksconsortium.org/tigar/en/"&gt;TIGAR Service&lt;/a&gt; which has its origins in India. This would allow participating institutions to perform international searches of databases to find out if accessible formats of books are available. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Inclusive Publishing- Mr. Gurry said that at the end of the day, “books should be born accessible” and technology was creating the “promise of the realization of this aspiration.” Mr. Gurry said that the ABC would promote accessible publishing and to this end, had drawn up a charter of accessible publishing- &lt;a href="http://www.accessiblebooksconsortium.org/inclusive_publishing/en/accessible_best_practice_guidelines_for_publishers.html"&gt;Accessible Publishing Best Practice Guidelines for Publishers&lt;/a&gt;. Elsevier is the first publisher to have signed this charter.&lt;/li&gt;
&lt;/ol&gt;
&lt;h2&gt;India, WBU and IPA delighted&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Praising the ABC, Ambassador Sinha called it an indicator of what multi-stakeholder cooperation needs to do. He said that the ABC would assist organizations such as the DAISY Forum of India in achieving the goal of access to books in accessible formats. Congratulating the WIPO for its efforts on this front, Ambassador Sinha said that this would help nations like India realize their goal of achieving the purposes of the Marrakesh Treaty. Ms. Diamond, representing the WBU congratulated Elsevier on signing the charter. Jens Bammel, on behalf of the IPA expressed concern for making books available in accessible formats for non English speakers. The ABC, he said, was a project initiated to “genuinely complement” the Marrakesh Treaty, and would create a global catalogue of accessible works, whether provided by libraries or by publishers. Expressing his delight that the ABC was being supported equally by all stakeholders, Mr. Bammel reached out to member states to support this initiative politically.&lt;/p&gt;
&lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated'&gt;https://cis-india.org/accessibility/blog/indias-ratification-of-marrakesh-treaty-celebrated&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nehaa</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-07-01T11:09:08Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation">
    <title>The Embodiment of the Right to Privacy within Domestic Legislation</title>
    <link>https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation</link>
    <description>
        &lt;b&gt;The Right to Privacy is a pivotal construct, essential to the actualization of justice, fairness and equity within any democratic society. It is an instrument used to secure the boundaries of an individual’s personal space, in his interaction with not only the rest of society but also the State. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It is within this realm of the social transaction that there exists an unending conflict between the Right to Privacy of an individual and the overbearing hand of the State as a facilitator of public interest. This right thus acts as a safety valve providing individuals with a sacred space within which their interactions in their personal capacity have no bearing on their conduct in the public sphere. The preservation of this space is incredibly important in order to ensure a willingness of individuals to engage and cooperate with the State in its fulfillment of public welfare measures that would otherwise be deemed as intrusive. It is in this regard that the Right to Privacy, one of the last sustaining rights that an individual holds against a larger State interest, ought to be protected by the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are numerous dimensions to the idea of the Right to Privacy. These include but are not limited to the privacy of person, privacy of communication, personal privacy, transactional privacy, privacy of information and the privacy of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court of India has come to the rescue of individuals, time and again by construing "Right to Privacy" as an extension of the Fundamental Right to “Protection of Life and Personal liberty” under Article 21 of the Constitution. This has been reflected in the adjudicatory jurisprudence of the Constitutional courts in the country. However, there exists no Constitutional remedy to redress the breach of privacy by a nongovernmental actor, except under tortuous liability. The power and authority of public and private institutions to use an individual’s personal data for larger interests of national security or effectuation of socio-economic policies is still under extensive scrutiny. It is in this regard that we have compiled a number of sectoral legislations, regulating domains ranging from Finance and Telecom to Healthcare, Freedom of Expression, Consumer rights and Procedural codes. The highlighted provisions under each Act pertain to the mechanisms embodied within the legislation for the regulation of privacy within their respective sectors. Through this we aim to determine the threshold for permissible collection of confidential data and regulatory surveillance, provided a sufficient need for the same has been established. The determination of such a threshold is imperative to formulating a consistent and effective regime of privacy protection in India.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Click to download the below resources:&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Legislations&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/master-circulars.zip" class="external-link"&gt;Master Circulars&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/finance-and-privacy.zip" class="external-link"&gt;Finance and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/cpc-crpc.zip" class="external-link"&gt;Code of Civil Procedure and Code of Criminal Procedure&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/freedom-of-expression.zip" class="external-link"&gt;Freedom of Expression&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/identity-and-privacy.zip" class="internal-link"&gt;Identity and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/national-security-and-privacy.zip" class="internal-link"&gt;National Security and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/consumer-protection-privacy.zip" class="external-link"&gt;Consumer Protection&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/transparency-and-privacy.zip" class="internal-link"&gt;Transparency and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/healthcare.zip" class="external-link"&gt;Healthcare&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/telecom-chapters.zip" class="external-link"&gt;Telecom&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt; &lt;/ol&gt; 
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Case Laws&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/code-of-civil-procedure.zip" class="external-link"&gt;Code of Civil Procedure and Code of Criminal Procedure&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/freedom-expression.zip" class="internal-link"&gt;Freedom of Expression&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/identity-cases.zip" class="external-link"&gt;Identity and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/national-security-cases.zip" class="external-link"&gt;National Security and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/consumer-protection.zip" class="internal-link"&gt;Consumer Protection&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/transparency-privacy.zip" class="internal-link"&gt;Transparency and Privacy&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/health-care.zip" class="internal-link"&gt;Healthcare&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="https://cis-india.org/internet-governance/blog/telecom-cases.zip" class="internal-link"&gt;Telecom&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;ol&gt; &lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation'&gt;https://cis-india.org/internet-governance/blog/the-embodiment-of-right-to-privacy-within-domestic-legislation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tanvi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-09-08T02:37:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/accessibility/blog/enabling-elections">
    <title>Enabling Elections</title>
    <link>https://cis-india.org/accessibility/blog/enabling-elections</link>
    <description>
        &lt;b&gt;For making the 2014 General Elections in India participatory and accessible for voters with disabilities the Centre for Law and Policy Research and the Centre for Internet and Society have come up with a report. The report addresses the barriers that people with disabilities face during elections and recommends solutions for the same.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Executive Summary&lt;/h2&gt;
&lt;p&gt;The report examines three main areas:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;The barriers that people with disabilities face at the time of elections.&lt;/li&gt;
&lt;li&gt;The legal framework around this issue.&lt;/li&gt;
&lt;li&gt;The measures which need to be taken to eliminate the barriers in the pre-voting phase, during voting phase and also post-voting phase, so as to enhance the participation of voters with disabilities.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;Access to the public sphere and full political participation is a matter of right for persons with disabilities and the state is constitutionally mandated to enforce this right. The rights of voters with disabilities are examined under the constitutional provisions, the Representation of People’s Act 1951, the relevant directions of the Supreme Court and the international conventions. This report also considers international best practices while making recommendations, to the extent that they are suitable and practical in the Indian context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This report looks at Electoral Participation in two dimensions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;“Pre-electoral Participation” and&lt;/li&gt;
&lt;li&gt;“Actual Electoral Participation”&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The report then goes on to make recommendations for enhancing accessibility in both these categories.&lt;/p&gt;
&lt;p&gt;On Pre-electoral Participation, the report inter alia recommends the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Opportunities for people with disabilities to participate in public consultations.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Immediate outreach programs for higher voter registrations.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Making election material and candidate guides available in different formats such as large print, Braille and audio formats upon request so that voters can have full knowledge of the candidate they want to vote for.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Providing information for voters about locations which have special access, wheelchair facilities, technological assistance for visually impaired, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;On Actual Electoral Participation, we inter alia recommend the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Accessible polling sites.&lt;/li&gt;
&lt;li&gt;Training election staff to be sensitive to diverse needs of voters.&lt;/li&gt;
&lt;li&gt;Enabling privacy and independent voting by persons with disabilities.&lt;/li&gt;
&lt;li&gt;Arranging for mobile polling booths.&lt;/li&gt;
&lt;li&gt;Making EVM’s compatible and accessible such as by providing for Braille, large print.&lt;/li&gt;
&lt;li&gt;Tactile buttons, 'sip and puff' and audio devices.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The report also recommends the need to monitor participation of voters with disabilities in the forthcoming elections.There is a need to collect data, surveys and studies in the pre-election, election and post-election phases.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/accessibility/blog/enabling-elections.pdf" class="internal-link"&gt;Click here&lt;/a&gt; to download and read the full report (PDF, 4.5 MB)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/accessibility/blog/enabling-elections'&gt;https://cis-india.org/accessibility/blog/enabling-elections&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nirmita</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    

   <dc:date>2014-05-10T00:12:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune">
    <title>Institute for Internet &amp; Society 2014, Pune</title>
    <link>https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune</link>
    <description>
        &lt;b&gt;Last month, activists, journalists, researchers, and members of civil society came together at the 2014 Institute for Internet &amp; Society in Pune, which was hosted by CIS and funded by the Ford Foundation. The Institute was a week long, in which participants heard from speakers from various backgrounds on issues arising out of the intersection of internet and society, such as intellectual property, freedom of expression, and accessibility, to name a few. Below is an official reporting summarizing sessions that took place.&lt;/b&gt;
        &lt;p style="text-align: center; "&gt;&lt;iframe frameborder="0" height="500" src="http://www.slideflickr.com/iframe/J3JYk2bm" width="700"&gt;&lt;/iframe&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;&lt;/h1&gt;
&lt;h1&gt;Day One&lt;/h1&gt;
&lt;p&gt;February 11, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 9.40 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Introduction: Sunil Abraham, &lt;i&gt;Executive Director Centre for Internet and Society&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.00 a.m. – 10.15 a.m.&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Introduction of Participants&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.15 a.m. – 12.00 p.m.&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Internet Governance and Privacy: Sunil Abraham&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.00 p.m. – 12.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.30 p.m. – 1.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Keynote: Bishakha Datta, &lt;i&gt;Filmmaker and Activist, and Board Member, Wikimedia Foundation&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.00 p.m. – 2.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Participant Presentations&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea Break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Histories, Bodies and Debates around the Internet:   Nishant Shah, &lt;i&gt;Director-Research, CIS&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;This year’s Internet Institute, hosted by the Centre for Internet &amp;amp; Society (CIS), kicked off in Pune to put a start to a week of learnings and discussions surrounding internet usage and its implications on individuals of society. Twenty two attendees from all over India attended this year, from backgrounds of activism, journalism, research and advocacy work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Attendees were welcomed by&lt;b&gt; Dr. Ravina Aggarwal&lt;/b&gt;, Program Officer for Media Rights &amp;amp; Access at the Ford Foundation, the event’s sponsor, who started off the day by introducing the Foundation’s initiatives in pursuit of bridging the digital divide by addressing issues of internet connectivity.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/DSC_0050.JPG/image_preview" title="Pune_Sunil" height="243" width="367" alt="Pune_Sunil" class="image-inline image-inline" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Governance &amp;amp; Privacy&lt;/b&gt;, Sunil Abraham &lt;br /&gt;The Institute’s first session was led by &lt;b&gt;Sunil Abraham&lt;/b&gt;,  Executive Director of CIS, and engaged with issues of internet  governance and privacy with reference to four stories: 1) a dispute  between tweeters from the US and those in South Africa over the use of  hashtag &lt;a href="http://www.thoughtleader.co.za/khayadlanga/2009/11/05/yesterday-a-short-lived-war-broke-out-between-america-and-south-africa/comment-page-1/"&gt;#thingsdarkiesays&lt;/a&gt;, which is said not to be as racially derogatory as it is in the US; 2) Facebook’s contested policies on &lt;a href="http://www.zdnet.com/blog/facebook/facebook-clarifies-breastfeeding-photo-policy/8791"&gt;photos featuring users breastfeeding&lt;/a&gt;, 3) a lawsuit between &lt;a href="http://www.theguardian.com/environment/2010/jul/26/tata-sue-greenpeace-turtle-game"&gt;Tata and Greenpeace&lt;/a&gt; over the organization’s use of Tata’s logo in a video game created for  public criticism of their environmentally-degrading practices, and  lastly, 4) the case of &lt;a href="http://en.wikipedia.org/wiki/Savita_Bhabhi"&gt;Savita Bhabhi&lt;/a&gt;,  an Indian pornographic cartoon character which had been banned by  India’s High Court and which had served as a landmark case in expanding  the statutory laws for what is considered to be pornographic.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Each of these stories has one major thing in common: due to their nature of taking place over the internet, they are not confined to one geographic location and in turn, are addressed at the international level. The way by which an issue as such is to be addressed cuts across State policies and internet intermediary bodies to create quite a messy case in trying to determine who is at fault. Such complexity illustrates how challenging internet governance can be within today’s society that is no longer restricted to national or geographic boundaries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil also goes on in explaining the relationship between privacy, transparency, and power, summing it up in a simple formula; &lt;b&gt;privacy protection s&lt;/b&gt;hould have a &lt;i&gt;reverse&lt;/i&gt; relationship to &lt;b&gt;power&lt;/b&gt;—the more the power, the less the privacy one should be entitled to. On the contrary, a &lt;i&gt;direct correlation&lt;/i&gt; goes for &lt;b&gt;power&lt;/b&gt; and &lt;b&gt;transparency&lt;/b&gt;—the more the power, the more transparent a body should be. Instead of thinking about these concepts as a dichotomy, Sunil suggests to see them as absolute rights in themselves—instrumental in policies and necessary to address power imbalances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Web We Want&lt;/b&gt;, Bishakha Datta&lt;br /&gt;The Institute’s kickoff was also joined by Indian filmmaker and activist, &lt;b&gt;Bishakha Datta&lt;/b&gt;, who had delivered the keynote address. Bishakha bridged together notions of freedom of speech, surveillance, and accessibility, while introducing campaigns that work to create an open and universally accessible web, such as the &lt;a href="https://webwewant.org/"&gt;Web We Want&lt;/a&gt; and &lt;a href="http://www.sexualityanddisability.org/"&gt;Sexuality and Disability&lt;/a&gt;. Bishakha stresses how the internet as a space has altered how we experience societal constructs, which can be easily exhibited in how individuals experience Facebook in the occurrence of a death, for example. Bishakha initiated discussion among participants by posing questions such as, “what is our expectation of privacy in this brave new world?” and “what is the society we want?” to encompass the need to think of privacy in a new way with the coming of the endless possibilities the internet brings with it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Histories, Bodies and Debates around the Internet&lt;/b&gt;, Nishant Shah&lt;br /&gt;CIS Research Director, &lt;b&gt;Nishant Shah&lt;/b&gt;, led a session examining internet as a technology more broadly, and our understandings of it in relation to the human body. Nishant proposes the idea that history is a form of technology, as well as time, itself, for which our understanding only comes into being with the aid of technologies of measurement. Although we are inclined to separate technology from the self, Nishant challenges this notion while suggesting that technology is very integral to being human, and defines a “cyborg” as someone who is very intimate with technology. In this way, we are all cyborgs. While making reference to several literary pieces, including Haraway’s &lt;i&gt;Cyborg: Human, Animus, Technology&lt;/i&gt;; Kevin Warwick’s &lt;i&gt;Living Cyborg&lt;/i&gt;; and Watt’s small world theory, Nishant challenges participants’ previous notions of how one is to understand technology in relation to oneself, as well as the networks we find ourselves implicated within.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also brought forth by Nishant, was the fact that the internet as a technology has become integral to our identities, making &lt;i&gt;us&lt;/i&gt; accessible (rather than us solely making the technology accessible) through online forms of documentation. This digital phenomenon in which we tend to document what we know and experience as a means of legitimizing it can be summed in the modern version of an old fable: “If a tree falls in a lonely forest, and nobody tweets it, has it fallen?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant refers to several case studies in which the use of online technologies has created a sense of an extension of the self and one’s personal space; which can then be subject to violation as one can be in the physical form, and to the same emotional and psychological effect—as illustrated within the 1993 occurrence referred to as “&lt;a href="http://en.wikipedia.org/wiki/A_Rape_in_Cyberspace"&gt;A Rape in Cyberspace&lt;/a&gt;.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Attendee Participation&lt;/b&gt;&lt;br /&gt;Participants remained engaged and enthusiastic for the duration of the day, bringing forth their personal expertise and experiences. Several participants presented their own research initiatives, which looked at issues women face as journalists and as portrayed by the media; amateur pornography without the consent of the woman; study findings on the understandings of symptoms of internet addiction; as well as studies looking at how students engage with college confession pages on Facebook.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Two&lt;/h1&gt;
&lt;p&gt;February 12, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wireless Technology: Ravikiran Annaswamy, &lt;i&gt;CEO and Co-founder at Teritree   Technologies&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wired Technology: Ravikiran Annaswamy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Network, Threats and Securing Yourself: Kingsley   John, &lt;i&gt;Independent Consultant&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea Break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Practical Lab: Kingsley John&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;4.45 p.m. – 5.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wrap-up: Sunil Abraham&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Day Two of the Institute entailed a  more technical orientation to “internet &amp;amp; society” across sessions.  Participants listened to speakers introduce concepts related to wired  and wireless internet connectivity devices and their networks, along  with the network of internet users and how one may secure him or herself  while “online.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Wireless &amp;amp; Wired Technology&lt;/b&gt;, Ravikiran Annaswamy&lt;br /&gt;Senior industry practitioner, &lt;b&gt;Ravikiran Annaswamy&lt;/b&gt; had aimed to enable the Institute’s participants to “understand the  depth and omnipresent of telecom networks” that we find ourselves  implicated within. Ravikiran went through the basics of these  networks—including fixed line-, mobile-, IP-, and Next Generation  IP-networks—as well as the technical structuring of wired and wireless  broadband. Many participants found this session to be particularly  enriching as their projects aimed to provide increased access to  internet connectivity to marginalized areas in India, and had been  without the know-how to go about it.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/5.JPG/image_preview" alt="Pune_Participants" class="image-inline image-inline" title="Pune_Participants" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Network, Threats and Securing Yourself&lt;/b&gt;, Kinglsey John&lt;br /&gt;An instructional session on how to protect oneself was given by &lt;b&gt;Kingsley John&lt;/b&gt;, beginning with a lesson on IP Addresses—what they are and the different generations of such, and how IP addresses fit into a broader internet network. Following, Kingsley demonstrated and explained &lt;a href="http://www.slideshare.net/lupucosmin/encrypting-emails-using-kleopatra-pgp"&gt;email encryption through the use of software, Kleopatra&lt;/a&gt;, and how it may be used to generate keys to &lt;a href="http://thehackernews.com/2014/01/PGP-encryption-Thunderbird-Enigmail_12.html"&gt;encrypt emails through Thunderbird mail client&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Evening Discussion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A handful of participants voluntarily partook in an evening discussion, looking at the role of big players in the global internet network, such as Google and Facebook, how they collect and utilize users’ data, and what sorts of measures can be taken to minimize the collecting of such. Due to the widely varying backgrounds of interest among participants, those coming from this technical orientation towards the internet were able to inform their peers on relevant information and types of software that may be found useful related to minimizing one’s online presence.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Three&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;February 13, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.30 a.m. –   11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Free Software: Prof. G. Nagarjuna, &lt;i&gt;Chairperson, Free Software Foundation&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.00 a.m. –   11.15 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Open Data: Nisha Thompson, &lt;i&gt;Independent Consultant&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.45 p.m. –   1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Freedom of Expression: Bhairav Acharya, &lt;i&gt;Advocate and Adviser, Centre for Internet   and Society&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Copyright: Nehaa Chaudhari, &lt;i&gt;Program Officer, Centre for Internet and Society&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The third day of the Internet Institute incorporated themes presented by speakers ranging from free software, to freedom of expression, to copyright.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Free Software&lt;/b&gt;, Prof. G. Nagarjuna&lt;br /&gt;Chairman on the Board of Directors for the Free Software Foundation of India, &lt;b&gt;Professor G. Nagarjuna&lt;/b&gt; shared with the Institute’s participants his personal expertise on &lt;b&gt;software freedom&lt;/b&gt;. Nagarjuna mapped for us the network of concepts related to software freedom, beginning with the origins of the &lt;b&gt;copyleft movement&lt;/b&gt;, and also touching upon the art of hacking, the &lt;b&gt;open source movement&lt;/b&gt;, and what role software freedom plays in an interconnected world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nagarjuna looks at the free software movement as a political movement in the digital space highlighting the &lt;a href="http://www.gnu.org/philosophy/free-sw.html"&gt;user’s freedoms&lt;/a&gt; associated to the use, distribution, and modification of software for the greater good for all. This is said to distinguish this movement from that of Open Source—a technical and more practical development-oriented movement. The free software movement is not set out to compromise the fundamental issues for the sake of being practical and in that sense, ubiquitous. Instead, its objective is “not to make everybody &lt;i&gt;use&lt;/i&gt; the software, but to have them understand &lt;i&gt;why&lt;/i&gt; they are using the software,” so that they may become “authentic citizens that can also resonate &lt;i&gt;why &lt;/i&gt;they’re doing what they’re doing. We want them to understand the ethical and political aspects of doing so,” Nagarjuna says.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Open Data&lt;/b&gt;, Nisha Thompson&lt;br /&gt;Participants learned from &lt;b&gt;Nisha Thompson&lt;/b&gt; on Open Data; what it is, its benefits, and how it is involved in central government initiatives and policy, as well as civil society groups—generally for uses such as serving as evidence for decision making and accountability. Nisha explored challenges concerning the use of open data, such as those pertaining to privacy, legitimacy, copyright, and interoperability. The group looked at the &lt;a href="http://www.indiawaterportal.org/"&gt;India Water Portal&lt;/a&gt; as a case study, which makes accessible more than 300 water-related datasets already available in the public space for use from anything from sanitation and agriculture to climate change.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Freedom of Expression&lt;/b&gt;, Bhairav Acharya&lt;br /&gt;&lt;b&gt;Bhairav Acharya&lt;/b&gt;, a constitutional lawyer, traced the development of the freedom of speech and expression in India. Beginning with a conceptual understanding of censorship and the practice of censorship by the state, society, and the individual herself, Bhairav examines the limits traditionally placed by a nation-state on the right to free speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, modern free speech and censorship law was first formulated by the colonial British government, which broadly imported the common law to India. However, the colonial state also yielded to the religious and communitarian sensitivities of its subjects, resulting in a continuing close link between communalism and free speech in India today. After Independence, the post-colonial Indian state carried forward Raj censorship, but tweaked it to serve to a nation-building and developmental agenda. Nation-building and nationalism are centrifugal forces that attempt to construct a homogenous 'mainstream'; voices from the margins of this mainstream (the geographical, ethnic, and religious peripheries) and of the marginalised within the mainstream (the poor and disadvantaged), are censored.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within this narrative, Bhairav located and explained the evolution of the law relating to press censorship, defamation, obscenity, and contempt of court. Free speech law applies equally online. Broadly, censorship on the internet must survive the same constitutional scrutiny that is applied to offline censorship; but, as technology develops, the law must innovate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Copyright&lt;/b&gt;, Nehaa Chaudhari&lt;br /&gt;CIS Programme Officer, &lt;b&gt;Nehaa Chaudhari&lt;/b&gt; examined the concept of Copyright as an intellectual property right in discussing its fundamentals, purpose and origins, and Copyright’s intersection with the internet. Nehaa also explained the different exceptions to Copyright, along with its alternatives, such as opposing intellectual property protection regimes, including the Creative Commons and Copyleft. Within this session, Nehaa also introduced several cases in which Copyright came into play with the use of the internet, including Hunter Moore’s “&lt;a href="http://en.wikipedia.org/wiki/Is_Anyone_Up%3F"&gt;Is Anyone Up&lt;/a&gt;?” website, which had showcased pornographic pictures obtained by submission bringing rise to the phenomenon of “revenge porn.” Instances as such blur the lines of what is commonly referred to as intellectual property, and what specific requirements enables one to own the rights to such.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Four&lt;/h1&gt;
&lt;p&gt;February 14, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;E-Accessibility and Inclusion: Prashant Naik, &lt;i&gt;Union Bank&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Patents: Nehaa Chaudhari&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 2.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Fieldwork Assignment&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/DSC_0053.JPG/image_preview" alt="Pune_Rohini" class="image-inline" title="Pune_Rohini" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p style="text-align: justify; "&gt;Day Four of the Internet Institute introduced concepts of  eAccessibilty and Inclusion on the internet for persons with  disabilities, along with patents as an intellectual property right.  Participants were also assigned a fieldwork exercise as a hands-on  activity in which they were to employ what they’ve learned to initiate  conversation with individuals in public spaces and collect primary data  while doing so.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;eAccessibility and Inclusion&lt;/b&gt;, Prashant Naik&lt;/p&gt;
&lt;b&gt;Prashant Naik&lt;/b&gt; started off the  day with his session on E-Accessibility and Inclusion. Prashant  illustrated the importance of accessibility and what is meant by the  term. Participants learned of assistive technologies for different  disability types and how to create more accessible word and PDF  documents, as well as web pages for users. Prashant demonstrated to  participants what it is like to use a computer as a visually impaired  individual, which provided for an enriching experience.&lt;/td&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Patents&lt;/b&gt;, Nehaa Chaudhari&lt;b&gt;&lt;br /&gt;Nehaa Chaudhari &lt;/b&gt;led a second session at the Internet Institute on intellectual property rights—this one looking at patents particularly and their role within statutory law. Nehaa traced the historical origins of patents before examining the fundamentals of them, and addresses the questions, “Why have patents? And is the present system working for everyone?” Nehaa also introduced notions of the Commons along with the Anticommons, and perspectives within the debate around software patents, as well as different means by which the law can address the exploitation of patents or “patent thickets”—such as through patent pools or compulsory licensing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Fieldwork Assignment&lt;/b&gt;, Groupwork&lt;br /&gt;Participants were split into groups and required to carry out a mini fieldwork assignment in approaching individuals in varying public spaces in Pune in attempts to collect primary data. Questions asked to individuals were to be devised by the group, so long as they pertained to themes examined within the Internet Institute. Areas visited by groups included the Pune Central Mall, MG Road, and FC Road.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Five&lt;/h1&gt;
&lt;p&gt;February 15, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;9.30 a.m. –   11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;E-Governance: Manu Srivastav, &lt;i&gt;Vice President, eGovernments Foundation&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;11.00 a.m. –   11.15 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Market Concerns: Payal Malik, &lt;i&gt;Economic Adviser, Competition Commission of India&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;12.45 p.m. –   1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Digital Natives: Nishant Shah&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Fieldwork Presentations&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="invisible"&gt;
&lt;thead&gt; 
&lt;tr&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;Day Five of the Internet Institute  brought with it sessions related to themes of e-governance, market  concerns of telecommunications, and so called “Digital Natives.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;eGovernance&lt;/b&gt;, Manu Srivastava&lt;br /&gt;Vice President of the eGovernments Foundation, &lt;b&gt;Manu Srivastava&lt;/b&gt; led a session on eGovernance—the utilization of the internet as a means  of delivering government services communicating with citizens,  businesses, and members of government. Manu examined the complexities of  the eGovernance and barriers to implementation of eGovernance  initiatives. Within discussion, participants examined the nuanced  relationship between the government and citizens with the incorporation  of other governing bodies in an eGovernance system, as well as new  spaces for corruption to take place.&lt;/p&gt;
&lt;/td&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/19.JPG/image_preview" alt="Pune_Chatting" class="image-inline image-inline" title="Pune_Chatting" /&gt;&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;/thead&gt; 
&lt;tbody&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Market Concerns&lt;/b&gt;, Payal Malik&lt;br /&gt;&lt;b&gt;Payal Malik&lt;/b&gt;, Advisor of the Economics Division of the Competition Commission of India shared her knowledge on market concerns of the telecommunications industry, and exclaimed the importance of competition issues in such an industry as a tool to create greater good for a greater number of people. She demonstrated this importance by stating that affordability as a product of increased access can only be possible once there is enough investment, which generally only happens in a competitive market. In this way, we must set the conditions to make competition possible, as a tool to achieve certain objectives. Payal also demonstrated the economic benefits of telecommunications by stating that for every 10% increase in broadband penetration, increase in GDP of 1.3%. She also examined the broadband ecosystem in India and touched upon future possibilities of increased broadband penetration, such as for formers and the education sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Digital Natives&lt;/b&gt;, Nishant Shah&lt;br /&gt;&lt;b&gt;Nishant Shah&lt;/b&gt; shed some light on one of the areas that the Centre for Internet &amp;amp; Society looks at within their research scope, this being the “&lt;a href="https://cis-india.org/digital-natives"&gt;Digital Native&lt;/a&gt;.” As referred to by Nishant, the Digital Native is not to categorize a specific type of internet user, but can be said for simply any person who is performing a digital action, while doing away with this false dichotomy of age, location, and geography.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nishant examines varying case studies in which “the digital is empowering natives to not merely be benefactors of change, but agents of change,” from the &lt;a href="http://blog.blanknoise.org/2012/07/i-never-ask-for-it.html"&gt;Blank Noise Project&lt;/a&gt;’s “I NEVER Ask for it…” campaign in efforts to rethink sexual violence, to &lt;a href="http://www.wherethehellismatt.com/"&gt;Matt Harding&lt;/a&gt;’s foolish dancing with groups of individuals from all over the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As occurrences in the digital realm, however, these often political expressions may be rewritten by the network when picked up as a growing phenomenon, in order to make it accessible to online consumers by the masses. In doing so, the expression is removed from its political context and is presented in the form of nothing more than a fad. For this reason, Nishant stresses the need to become aware of the potential of the internet in becoming an “echo-chamber”—in which forms of expression are amplified and mimicked, resulting in a restructuring of the dynamics surrounding the subject—whether it be videos of &lt;a href="http://en.wikipedia.org/wiki/Back_Dorm_Boys"&gt;boys lipsyncing to Backstreet Boys&lt;/a&gt; in their dorm room going viral, or a strong and malicious movement to punish the Chinese girl who had taken a video of her heinously and wickedly killing a kitten after locating her using the &lt;a href="http://en.wikipedia.org/wiki/Human_flesh_search_engine"&gt;Human Flesh Search Engine&lt;/a&gt;.&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Fieldwork Presentations&lt;/b&gt;, Groupwork&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To end off the day, participant groups presented findings collated from the prior evening’s fieldwork exercise, in which they were to ask strangers in various public places of Pune questions pertaining to themes looked at from within this year’s Institute. Participants were divided into four groups and visited Pune’s FC Road, Mahatma Gandhi Road, and Central Mall.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Groups found that the majority of those interviews primarily accessed the phone via the mobile. There was also a common weariness of using the internet and concern for one’s privacy while doing so, especially with uploading photos to Facebook and online financial transactions. People were also generally concerned about using cyber cafes for fear of one’s accounts being hacked. Generally people suspected that so long as conversations are “private” (i.e. in one’s Facebook inbox), so too are they secure. Just as well, those interviewed shared a sense of security with the use of a password.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Six&lt;/h1&gt;
&lt;p&gt;February 16, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Wikipedia: Dr. Abhijeet Safai&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Open Access: Muthu Madhan (TBC)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Case Studies Groupwork&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Case Studies Presentations&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;As the Institute came closer to its end, participants got the opportunity to hear from speakers on topics pertaining the Wikipedia editing in addition to Open Access to scholarly literature.  Participants also worked together in groups to examine specific case studies referenced in previous sessions, and then presented their conclusions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Wikipedia&lt;/b&gt;, Dr. Abhijeet Safai&lt;br /&gt;The Institute was joined by Medical Officer of Clinical Research at Pune’s Symbiosis Centre of Health Care, &lt;b&gt;Dr. Abhijeet Safai&lt;/b&gt;, who led a session on Wikipedia. Having edited over 3700 Wikipedia articles, Dr. Abhijeet was able to bring forth his expertise and familiarity in editing Wikipedia to participants so that they would be able to do the same. Introduced within this session were Wikipedia’s different fundamental pillars and codes of conducts to be complied with by all contributors, along with different features and components of Wikipedia articles that one should be aware of when contributing, such as how to cite sources and discuss the contents of an article with other contributors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Open Access&lt;/b&gt;, Muthu Madhan&lt;br /&gt;&lt;b&gt;Muthu Madhan&lt;/b&gt; joined the Internet Institute while speaking on Open Access (OA) to scholarly literature. Within his session, Muthu examined the historical context within which the scholarly journal had arisen and how the idea of Open Access began within this space. The presence of Open Access in India and other developing nations was also examined in this session, and the concept of Open Data, introduced.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Case Studies&lt;/b&gt;, Groupworks&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/11.JPG/image_preview" alt="Pune_Group2" class="image-inline image-inline" title="Pune_Group2" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/8.JPG/image_preview" alt="Pune_Group" class="image-inline image-inline" title="Pune_Group" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;Participants were split up into groups and assigned particular case studies looked at briefly in previous sessions. Case studies included &lt;a href="http://siditty.blogspot.in/2009/11/things-darkies-say.html"&gt;&lt;i&gt;#thingsdarkiessay&lt;/i&gt;&lt;/a&gt;&lt;i&gt;,&lt;/i&gt; a once trending Twitter hashtag in South Africa which had offended many Americans for its use of “darkie” as a derogatory term; the literary novel, &lt;a href="http://en.wikipedia.org/wiki/The_Hindus:_An_Alternative_History"&gt;&lt;i&gt;The Hindus&lt;/i&gt;&lt;/a&gt;, which offers an alternative narrative of Hindu history had been banned in India for obscenity; a case in which several users’ avatars had been controlled by another in a virtual community and forced to perform sexual acts, referred to as &lt;a href="http://en.wikipedia.org/wiki/A_Rape_in_Cyberspace"&gt;&lt;i&gt;A Rape Happened in Cyber Space&lt;/i&gt;&lt;/a&gt;; and lastly, a pornographic submission website, &lt;a href="http://en.wikipedia.org/wiki/Is_Anyone_Up%3F"&gt;Is Anyone Up?&lt;/a&gt;, for which content was largely derived from “revenge porn.” Each group then presented on the various perspectives surrounding the issue at hand.&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Cyborg&lt;/b&gt;, Nishant Shah&lt;br /&gt;Nishant Shah led an off-agenda session in the evening looking more closely at the notion of the human cyborg. Nishant deconstructs humanity’s relationship to technology, in suggesting that we “think of the human as &lt;i&gt;produced&lt;/i&gt; with the technologies… not who &lt;i&gt;produces&lt;/i&gt; technology.” Nishant explores the Digital Native as an attained identity for those who, because of technology, restructure and reinvent his or her environment—offline as well as online. Among other ideas shared, Nishant refers to works by Haraway on the human cyborg in illustrating our dependency on technology and our need to care for these technologies we depend on.&lt;/p&gt;
&lt;hr /&gt;
&lt;h1&gt;Day Seven&lt;/h1&gt;
&lt;p&gt;February 17, 2014&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Time&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Detail&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;9.30 a.m. – 11.00 a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Internet Activism: Laura Stein, &lt;i&gt;Associate Professor, University of Texas &lt;/i&gt;and &lt;i&gt;Fulbright Fellow&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.00 a.m. – 11.15   a.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;11.15 a.m. – 12.45   p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Domestic and International Bodies: Chinmayi Arun, &lt;i&gt;Research Director&lt;br /&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;12.45 p.m. – 1.30 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lunch&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;1.30 p.m. – 3.00 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Participant Presentations&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.00 p.m. – 3.15 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Tea-break&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p align="center" style="text-align: center; "&gt;3.15 p.m. – 4.45 p.m.&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Hot Question Challenge&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;The last day of the week-long Internet Institute examined concepts of Internet Activism and Domestic and International Bodies. Some participants led presentations on topics of personal familiarity, before a final wrap-up exercise, calling upon individuals to share any new formulations resulting from the Institute.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Internet Activism&lt;/b&gt;, Laura Stein&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/17.JPG/image_preview" alt="Pune_Laura" class="image-inline image-inline" title="Pune_Laura" /&gt;&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Associate Professor from the University of Texas, &lt;b&gt;Laura Stein&lt;/b&gt;,  spoke on activism on the internet. Laura examined some grassroots  organizations and movements taking place on the online and the benefits  that the internet brings in facilitating their impact, such as its  associated low costs, accessibility and possibility for anonymity.  Despite the positive effects catalyzed by the internet, Laura stresses  that the “laying field is still unequal, and movements are not simply  transformed by technology.” Some of the websites exemplifying online  activism that were examined within this session includes the &lt;a href="http://www.itgetsbetter.org/"&gt;It Gets Better Project&lt;/a&gt;, which aims to give hope to LGBT youth facing harassment, and the national election watch by the &lt;a href="http://adrindia.org/"&gt;Association for Democratic Reforms&lt;/a&gt;.  Additionally, Laura spoke on public communication policy, comparing  that of the US and India, and how this area of policy may influence  media content and practice.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Domestic and International Bodies&lt;/b&gt;, Chinmayi Arun&lt;br /&gt;As the Internet Institute’s final speaker, Research Director for Communication Governance at National Law University&lt;i&gt; &lt;/i&gt;,&lt;b&gt; Chinmayi Arun&lt;/b&gt;, explores the network of factors that affect one’s behavior on the internet—these including: social norms, the law, the markets, and architecture. In referring to Lawrence Lessig’s &lt;a href="http://en.wikipedia.org/wiki/Pathetic_dot_theory"&gt;pathetic dot theory&lt;/a&gt;, Chinmayi illustrates how individual’s—the pathetic dots in question—are functions of the interactions of these factors, and in this sense, regulated, and stresses the essential need to understand the system, in order to effectively change the dynamics within it. It is worth noting that not all pathetic dots are equal, and Google’s dot, for example, will be drastically bigger than a single user’s, having more leveraging power within the network of internet bodies. Also demonstrated, is the fact that we must acknowledge the need for regulation by the law to some extent, otherwise, the internet would be a black box where anything goes, putting one’s security at risk of violation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hot Question Challenge&lt;/b&gt;&lt;br /&gt;The very last exercise of the Institute entailed participants asking each other questions on demand, relating back to different themes looked at within the last week. Participants had the chance, here, to bridge together concepts across sessions, as well as formulate their own opinions, while posing questions to others that they, themselves, were still curious about.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/DSC_0371.JPG/image_large" alt="Pune_Everyone" class="image-inline image-inline" title="Pune_Everyone" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune'&gt;https://cis-india.org/telecom/blog/institute-for-internet-society-2014-pune&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>samantha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Digital Natives</dc:subject>
    
    
        <dc:subject>Telecom</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Wikipedia</dc:subject>
    
    
        <dc:subject>Accessibility</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Wikimedia</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-04-07T11:31:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3">
    <title>Can Judges Order ISPs to Block Websites for Copyright Infringement? (Part 3)</title>
    <link>https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3</link>
    <description>
        &lt;b&gt;In a three-part study, Ananth Padmanabhan examines the "John Doe" orders that courts have passed against ISPs, which entertainment companies have used to block dozens, if not hundreds, of websites.  In this, the third and concluding part, he looks at the Indian law in the Copyright Act and the Information Technology Act, and concludes that both those laws restrain courts and private companies from ordering an ISP to block a website for copyright infringement.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the third part of his study, Ananth Padmanabhan looks into the fair use provisions recently introduced in respect of mere conduit intermediaries by the Copyright (Amendment) Act, 2012, and concludes that there is no scope for any general, or specific, access blocking orders at the behest of the plaintiff in a civil suit, in India. He also argues that the &lt;a class="external-link" href="http://eprocure.gov.in/cppp/sites/default/files/eproc/itact2000.pdf"&gt;Information Technology Act, 2000&lt;/a&gt; read with the&lt;a class="external-link" href="http://deity.gov.in/sites/upload_files/dit/files/GSR314E_10511%281%29.pdf"&gt; Information Technology (Intermediaries Guidelines) Rules, 2011&lt;/a&gt; do not in any manner permit the Government to override the provisions of the &lt;a class="external-link" href="http://www.ircc.iitb.ac.in/webnew/Indian%20Copyright%20Act%201957.html"&gt;Copyright Act, 1957&lt;/a&gt; (as amended) while facilitating the denial of access to websites on grounds of copyright infringement, because the Copyright Act, 1957, is a complete code by itself.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Fair Use Provisions Introduced by the Copyright (Amendment) Act, 2012&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In 2010, the &lt;a href="https://cis-india.org/a2k/blogs/copyright-bill-analysis" class="external-link"&gt;controversial Copyright (Amendment) Bill&lt;/a&gt; came up for deliberation before the Parliamentary Standing Committee on Human Resource Development headed by Mr. &lt;a class="external-link" href="http://archive.india.gov.in/govt/rajyasabhampbiodata.php?mpcode=173"&gt;Oscar Fernandes&lt;/a&gt;. While a major part of the discussion on this amendment revolved around the altered royalty structure and rights allocation between music composers and lyricists on the one hand and film producers on the other, it can be safely stated that this is the most significant amendment to the Copyright Act, 1957 for more than this one reason. The amendment seeks to reform the Copyright Board, bring in a scheme of statutory licenses, expand the scope of performers’ rights and introduce anti-circumvention measures to check copyright piracy. As part of its ambitious objective, the amendment also attempts a new fair use model to protect intermediaries and file-sharing websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Copyright (Amendment) Act, 2012, which gives expression to this fair use model through Sections 52(1)(b) and (c), reads thus:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;b&gt;&lt;i&gt;52. Certain acts not to be infringement of copyright&lt;/i&gt;&lt;/b&gt;&lt;i&gt;. - (1) The following acts shall not constitute an infringement of copyright, namely:&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;(a) to (ad) - *****&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;(b) the transient or incidental storage of a work or performance purely in the technical process of electronic transmission or communication to the public;&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;(c) transient or incidental storage of a work or performance for the purpose of providing electronic links, access or integration, where such links, access or integration has not been expressly prohibited by the right holder, unless the person responsible is aware or has reasonable grounds for believing that such storage is of an infringing copy:&lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;Provided that if the person responsible for the storage of the copy has received a written complaint from the owner of copyright in the work, complaining that such transient or incidental storage is an infringement, such person responsible for the storage shall refrain from facilitating such access for a period of twenty-one days or till he receives an order from the competent court refraining from facilitating access and in case no such order is received before the expiry of such period of twenty-one days, he may continue to provide the facility of such access;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From a plain reading, it is clear that two important exceptions are carved out: one, in respect of the technical process of electronic transmission and the other, in respect of providing electronic links, access or integration. The material distinction between these exceptions is the presence of a take-down &lt;i&gt;proviso &lt;/i&gt;in respect of the latter kind of activity, ie. when providing electronic links, access or integration. This window of opportunity is not provided to the copyright owner when the third party is an ISP involved in the pure technical process of electronic transmission of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;R.K. Productions&lt;/i&gt;, the court was not informed of the introduction of these provisions &lt;i&gt;vide&lt;/i&gt; the Copyright (Amendment) Act, 2012, despite the hearing happening on a date subsequent to the amendment coming into force. This probably influenced the outcome as well, since the court held that ISPs were liable to block access to infringing content, once the specific webpage was brought to the notice of the concerned ISP. Newly introduced Section 52(1)(b) however makes it abundantly clear that ISPs cannot, in any manner, be held liable when they are acting as mere conduit pipes for the transmission of information. This legal position is also materially different from jurisdictions such as the United Kingdom where, the ISPs though not liable for copyright infringement, are statutorily mandated to lend all possible assistance such as take-down or blocking of access upon notice of infringement being furnished to them. This dichotomy between liability for infringement on the one hand and a general duty to assist in the prevention of infringement on the other is explained clearly by the Chancery Division in &lt;i&gt;Twentieth Century Fox Film Corporation v. British Telecommunications Plc.&lt;/i&gt;&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;Newzbin2&lt;/i&gt;, the Chancery Division took note of the safe harbour provisions created by the E-Commerce Directive,&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;particularly Articles 12 to 14 that dealt with acting as a “mere conduit”, caching and hosting respectively. The interesting feature with the “mere conduit” exception, which in all other respects is akin to the exception contained in Section 52(1)(b) of the Copyright Act, 1957, is the additional presence of Article 12(3). This provision clarifies that the “mere conduit” exception shall not stand in the way of a court or administrative authority requiring the service provider to terminate or prevent an infringement. Article 18 of this Directive also casts an obligation upon Member States to ensure that court actions available under national law permit the rapid adoption of measures, including interim measures, designed to terminate any alleged infringement and to prevent any further impairment of the interests involved. Similarly, the court looked into the Information Society Directive,&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 8(3) of which provides that “Member States shall ensure that rightholders are in a position to apply for an injunction against intermediaries whose services are used by a third party to infringe a copyright or related right.” This Directive was transposed into the domestic law in UK by the Copyright and Related Rights Regulations 2003, SI 2003/2498, resulting in the insertion of Section 97A in the Copyright, Designs and Patents Act 1988. This provision empowers the court to grant an injunction against a service provider who has actual knowledge of another person using their service to infringe copyright, such as where the service provider is given sufficient notice of the infringement. Finally, the Chancery Division also took note of the Enforcement Directive,&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Article 11 of which provided that Member States shall ensure that copyright owners are in a position to apply for an injunction against intermediaries whose services are used by a third party to infringe an intellectual property right. This entire legislative scheme compelled the court in &lt;i&gt;Newzbin2&lt;/i&gt; to conclude that an order of injunction could be granted against ISPs who are “mere conduits”, restraining them from providing access to websites that indulged in mass copyright infringement. The court reasoned that the language used in Section 97A did not require knowledge of any particular infringement but only a more general kind of knowledge about certain persons using the ISPs’ services to infringe copyright. Thus, it is seen that in the United Kingdom, though a “mere conduit” activity is not infringement at all, the concerned ISP can be directed by the court to block access to a website that hosts infringing content on the basis of the above legislative scheme. The enquiry should therefore be directed towards whether India has a similar scheme for copyright enforcement.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Information Technology Act – An Inapplicable Scheme for Website Blocking&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology Act, 2000&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;read with certain recently framed guidelines provides for a duty that could be thrust upon even “mere conduit” ISPs to disable access to copyrighted works. This is due to the presence of Section 79(2)(c) of this Act, which makes it clear that an intermediary shall be exempt from liability only where the intermediary observes due diligence as well as complies with the other guidelines framed by the Central Government in this behalf. Moreover, Section 79(3) provides that the intermediary shall not be entitled to the benefit of the exemption in Section 79(1) in a situation where the intermediary, upon receiving actual knowledge that any information, data, or communication link residing in or connected to a computer resource controlled by the intermediary is being used to commit an unlawful act, fails to expeditiously remove or disable access to that material on that resource without vitiating the evidence in any manner. In pursuance of Section 79(2)(c), the Central Government has also framed the Information Technology (Intermediaries Guidelines) Rules, 2011, which came into effect on 11.04.2011. Rule 4 of these Rules, when read along with Rule 2(d), casts obligation on an intermediary on whose computer system, copyright infringing content has been &lt;i&gt;stored, hosted or published&lt;/i&gt;, to &lt;i&gt;disable&lt;/i&gt; such information within thirty six hours from when it is brought to actual knowledge of the existence of such content by any affected person.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One way of understanding and interpreting in harmonious fashion, the provisions of the IT Act and the Rules therein and the recent amendments to the Copyright Act, is to contend that the issue of infringement of copyright by “mere conduit” ISPs is governed by Section 52(1)(b), which completely absolves them of any liability, while that of enforcement of copyright through the medium of such ISPs is governed by the IT Act. This bifurcation suffers from the difficulty that Section 79 of the IT Act is not an enforcement provision. It is a provision meant to exempt intermediaries from certain kinds of liability, in the same way as Section 52 of the Copyright Act. This provision, read with Section 81, makes it clear that the IT Act does not speak to liability for copyright infringement. From this, it has to necessarily follow that all issues pertaining to liability for such infringement have to be decided by the provisions of the Copyright Act. Therefore, the scheme in the IT Act read with the Intermediaries Guidelines Rules cannot confer additional liability for copyright infringement on ISPs where the Copyright Act exempts them from liability. More to the point, the intermediary cannot be liable for copyright infringement in the event of non-compliance with Section 79(3) or Rule 4 of the Intermediaries Guidelines Rules read with Section 79(1)(c) of the IT Act. Rule 4 of the Intermediaries Guidelines Rules, 2011, to the extent that it renders intermediaries outside the protective ambit of Section 79(1) upon failure to disable access to copyrighted content, is of no relevance as “mere conduits” have already been exempted from liability under Section 52(1)(b). Moreover, since these provisions in the IT Act do not deal with enforcement measures such as injunction orders from the court to disable access to infringing content in particular or infringing websites in general, it would be wrong to contend that the scheme in India is similar to the one in the United Kingdom where the issue of infringement has been divorced from that of enforcement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To conclude, Section 52(1)(b) is a blanket “mere conduit” exemption from liability for copyright infringement that stands uninfluenced by the presence of Section 79 of the IT Act or the Intermediaries Guidelines Rules. In the absence of a legislative scheme for enforcement in India akin to Section 97A of the UK Copyright, Designs and Patents Act 1988, Indian Courts cannot grant an injunction directing such “mere conduit” ISPs to block access to websites in general or infringing content in particular and any such action is not even maintainable in law post the insertion of Section 52(1)(b). The decision to the contrary in the &lt;i&gt;R.K.Productions &lt;/i&gt;case is incorrect.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. [2011] EWHC 1981 (Ch.). Hereinafter referred to as &lt;i&gt;Newzbin2.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. European Parliament and Council Directive 2000/31/EC on certain legal aspects of information society services, in particular electronic commerce, in the Internal Market (8 June 2000). This Directive was transposed into the domestic law in UK by the Electronic Commerce (EC Directive) Regulations 2002, SI 2002/2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. European Parliament and Council Directive 2001/29/EC on the harmonisation of certain aspects of copyright and related rights in the information society (22 May 2001).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. European Parliament and Council Directive 2004/48/EC on the enforcement of intellectual property rights (29 April 2004). This Directive was transposed into the UK domestic law primarily by the Intellectual Property (Enforcement, etc.) Regulations 2006, SI 2006/1028.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Hereinafter referred to as the IT Act.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3'&gt;https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ananth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Access to Knowledge</dc:subject>
    

   <dc:date>2014-02-14T05:13:36Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2">
    <title>Can Judges Order ISPs to Block Websites for Copyright Infringement? (Part 2)</title>
    <link>https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2</link>
    <description>
        &lt;b&gt;In a three-part study, Ananth Padmanabhan examines the "John Doe" orders that courts have passed against ISPs, which entertainment companies have used to block dozens, if not hundreds, of websites.  In this, the second part, he looks at the law laid down by the U.S. Supreme Court and the Delhi High Court on secondary and contributory copyright infringement, and finds that those wouldn't allow Indian courts to grant "John Doe" orders against ISPs.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the second part of his study, Ananth Padmanabhan proceeds to examine applying a general theory of secondary or contributory copyright infringement against ISPs. He traces the basis for holding a third party liable as a contributory by closely examining the decisions of the U.S. Supreme Court in Sony Corp. v Universal City Studios&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;and MGM Studios, Inc. v Grokster, Ltd.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;and concludes that this basis does not hold good in the case of a mere conduit intermediary such as an ISP.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. 464 U.S. 417 (1984). Hereinafter referred to as &lt;i&gt;Betamax&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. 545 U.S. 913 (2005). Hereinafter referred to as &lt;i&gt;Grokster.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Primary and Secondary Infringement&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Liability for copyright infringement can either be primary or secondary in character. In the case of ISPs, liability as primary infringers does not arise at all, and it is in their capacity as conduit pipes facilitating the transmission of information that they could be held secondarily liable. Even in such cases, the contention of copyright owners is that once the ISP is notified of infringing content, it has the primary responsibility of preventing access to such content. This contention is essentially rooted in a theory of secondary infringement based on knowledge and awareness, and the means to prevent further infringement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The controversy around a suitable model of secondary infringement is reflected in two judicial pronouncements – separated by a gap of more than two decades – delivered by the U.S. Supreme Court. In &lt;i&gt;Sony Corp. v Universal City Studios&lt;/i&gt;,[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;] the US Supreme Court held that the manufacturers of home video recording devices known in the market as Betamax would not be liable to copyright owners for secondary infringement since the technology was capable of substantially non-infringing and legitimate purposes. The U.S. Supreme Court even observed that these time-shifting devices would actually enhance television viewership and hence find favour with majority of the copyright holders too. The majority did concede that in an appropriate situation, liability for secondary infringement of copyright could well arise. In the words of the Court, “&lt;i&gt;vicarious liability is imposed in virtually all areas of the law, and the concept of contributory infringement is merely a species of the broader problem of identifying the circumstances in which it is just to hold one individual accountable for the actions of another&lt;/i&gt;”. However, if vicarious liability had to be imposed on the manufactures of the time-shifting devices, it had to rest on the fact that they sold equipment with constructive knowledge of the fact that their customers &lt;i&gt;may&lt;/i&gt; use that equipment to make unauthorized copies of copyrighted material. In the view of the Court, there was no precedent in the law of copyright for the imposition of vicarious liability merely on the showing of such fact.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notes of dissent were struck by Justice Blackmun, who wrote an opinion on behalf of himself and three other judges. The learned Judge noted that there was no private use exemption in favour of making of copies of a copyrighted work and hence, unauthorised time-shifting would amount to copyright infringement. He also concluded that there was no fair use in such activity that would exempt it from the purview of infringement. The dissent held the manufacturer liable as a contributory infringer and reasoned that the test for contributory infringement would only be whether the contributory infringer had &lt;i&gt;reason to know or believe &lt;/i&gt;that infringement would take place and &lt;i&gt;not whether he actually knew of the same&lt;/i&gt;. Off-the-air recording was not only a foreseeable use for the Betamax, but also its intended use, for which Sony would be liable for copyright infringement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This dissent has considerably influenced the seemingly contrarian position taken by the majority in the subsequent decision, &lt;i&gt;MGM Studios, Inc. v Grokster, Ltd.&lt;/i&gt;&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; This case called into question the liability of websites that facilitated peer-to-peer (P2P) file-sharing. Re-formulating the test for copyright infringement, the US Supreme Court held that ‘&lt;i&gt;one who distributes a device with the object of promoting its use to infringe copyright, as shown by clear expression or other affirmative steps taken to foster infringement, is liable for the resulting acts of infringement by third parties&lt;/i&gt;’. In re-drawing the boundaries of contributory infringement, the Court observed that contributory infringement is committed by any person who intentionally induces or encourages direct infringement, and vicarious infringement is committed by those who profit from direct infringement while declining to exercise their right to limit or stop it. When an article of commerce was good for nothing else but infringement, there was no legitimate public interest in its unlicensed availability and there would be no injustice in presuming or imputing intent to infringe in such cases. This doctrine would at the same time absolve the equivocal conduct of selling an item with substantial lawful as well as unlawful uses and would limit the liability to instances of more acute fault than the mere understanding that some of the products shall be misused, thus ensuring that innovation and commerce are not unreasonably hindered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court distinguished the case at hand from &lt;i&gt;Betamax&lt;/i&gt;, and noted that there was evidence here of active steps taken by the respondents to encourage direct copyright infringement, such as advertising an infringing use or instructing how to engage in an infringing use. This evidence revealed an affirmative intent that the product be used to infringe, and an &lt;i&gt;active &lt;/i&gt;encouragement of infringement. Without reversing the decision in &lt;i&gt;Betamax&lt;/i&gt;, but holding that it was misinterpreted by the lower court, the Court observed that &lt;i&gt;Betamax&lt;/i&gt; was not an authority for the proposition that whenever a product was capable of substantial lawful use, the producer could never be held liable as a contributory for the use of such product for infringing activity by third parties.&lt;i&gt; &lt;/i&gt;In the view of the Court, &lt;i&gt;Betamax &lt;/i&gt;did not displace other theories of secondary liability.&lt;i&gt; &lt;/i&gt;This other theory of secondary liability applicable to the case at hand was held to be the inducement rule, as per which any person who distributed a device with the object of promoting its use to infringe copyright, as evidenced by clear expression or other affirmative steps taken to foster infringement, would be liable for the resulting acts of infringement by third parties. However, the Court clarified that &lt;i&gt;mere knowledge of infringing potential or of actual infringing uses would not be enough&lt;/i&gt; under this rule to subject a distributor to liability. Similarly, ordinary acts incident to product distribution, such as offering customers technical support or product updates, support liability etc. would not by themselves attract the operation of this rule. The inducement rule, instead, premised liability on &lt;i&gt;purposeful, culpable expression and conduct&lt;/i&gt;, and thus did nothing to compromise &lt;i&gt;legitimate&lt;/i&gt; commerce or discourage innovation having a &lt;i&gt;lawful&lt;/i&gt; promise.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These seemingly divergent views on secondary infringement expressed by the U.S. Supreme Court are of significant relevance for India, due to the peculiar language used in the Indian Copyright Act, 1957.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 51 of the Act, which defines infringement, bifurcates the two types of infringement – ie. primary and secondary infringement – without indicating so in as many words. While Section 51(a)(i) speaks to primary infringers, 51(a)(ii) and 51(b) renders certain conduct to be secondary infringement. Even here, there is an important distinction between 51(a)(ii) and 51(b). The former exempts the alleged infringer from liability if he could establish that &lt;i&gt;he was not aware and had no reasonable ground for believing that &lt;/i&gt;the communication to the public, facilitated through the use of his “place”, would amount to copyright infringement. The latter on the other hand permits no such exception. Thus, any person, who makes for sale or hire, or by way of trade displays or offers for sale or hire, or distributes for the purpose of trade, or publicly exhibits by way of trade, or imports into India, any infringing copies of a work, shall be liable for infringement, without any specific &lt;i&gt;mens rea&lt;/i&gt; required to attract such liability. It is in the context of the former provision, ie. 51(a)(ii) that the liability of certain file-sharing websites for copyright infringement has arisen.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Mere Conduit ISPs – Secondary Infringement Absent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In &lt;i&gt;MySpace&lt;/i&gt;, the Delhi High Court examined the liability for secondary infringement on the part of a website that provides a platform for file-sharing. While holding the website liable, the Single Judge considered material certain facts such as the revenue model of the defendant, which depended largely on advertisements displayed on the webpages, and automatically generated advertisements that would come up for a few seconds before the infringing video clips started playing. Shockingly, the Court even considered relevant the fact that the defendant did provide for safeguards such as hash block filters, take down stay down functionality, and rights management tools operational through fingerprinting technology, to prevent or curb infringing activities being carried on in their website. This, in the view of the Court, made it evident that the defendant had a &lt;i&gt;reasonable apprehension or belief &lt;/i&gt;that the acts which were being carried on in the website &lt;i&gt;could&lt;/i&gt; infringe someone else’s copyright including that of the plaintiff. The logic employed by the Court to attribute liability for secondary infringement on file-sharing websites is befuddling and reveals complete disregard for the degree of regulatory authority available on the internet even where the space, i.e., the website, is supposedly “under the control” of a person. However, a critical examination of this decision is not relevant in understanding the liability of mere conduit ISPs. This is for the reason that none of the factual considerations relied on by the Single Judge to justify imposition of liability on a file-sharing website under Section 51(a)(ii) arise when the defendant is an ISP that only provides the path for content-neutral transmission of data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was completely ignored by the Madras High Court in &lt;i&gt;R.K.Productions v. B.S.N.L.&lt;/i&gt;,&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;where the producers of the Tamil film “3”, which enjoyed considerable pre-release buzz due to its song “Kolaveri Di”, sought an omnibus order of injunction against all websites that host torrents or links facilitating access to, or download of, this film. Though this was worded as a John Doe plaint by branding the infringers as unknown administrators of different torrent sites and so on, the real idea was to look to the resources and wherewithal of the known defendants, ie. the ISPs, to block access to the content hosted by the unknown defendants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This prompted the ISPs to file applications under Or. VII, Rule 11 of the Civil Procedure Code, seeking rejection of the plaint on the ground that the suit against them was barred by law. The Single Judge of the Madras High Court dismissed these applications for rejection of the plaint, after accepting the contention that the ISPs are necessary parties to the suit as the act of piracy occurs through the channel or network provided by them. The High Court heavily, and incorrectly, relied on MySpace without appreciating the distinction between a mere conduit ISP and a file-sharing website such as MySpace or YouTube, as regards their respective roles and responsibilities, the differing degrees of regulatory control over content enjoyed by them, and most importantly, the recognition and formalisation of these distinctions in the Copyright Act, 1957, vide the Copyright (Amendment) Act, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. 464 U.S. 417 (1984). Hereinafter referred to as Betamax.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. 545 U.S. 913 (2005). Hereinafter referred to as Grokster.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Hereinafter the Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;Super Cassette Industries Ltd. v MySpace Inc.&lt;/i&gt;, MIPR 2011 (2) 303 (hereinafter referred to as &lt;i&gt;MySpace&lt;/i&gt;). This decision of the Delhi High Court has been rightly criticised. &lt;i&gt;See &lt;/i&gt;&lt;a href="https://cis-india.org/a2k/blogs/super-cassettes-v-my-space"&gt;http://cis-india.org/a2k/blog/super-cassettes-v-my-space&lt;/a&gt; (last accessed on 24.03.2013).&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2'&gt;https://cis-india.org/a2k/blogs/john-doe-orders-isp-blocking-websites-copyright-2&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ananth</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Access to Knowledge</dc:subject>
    
    
        <dc:subject>Copyright</dc:subject>
    
    
        <dc:subject>Piracy</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2014-03-06T16:48:18Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
