<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 891 to 905.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/privacy-in-social-networked-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/daily-pioneer-columnists-oct-29-2012-apar-gupta-bolstering-right-to-remain-private"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/epw-web-exclusives-oct-27-2012-elonnai-hickok-rethinking-dna-profiling-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-perspectives-on-the-2012-2013-goa-beach-shack-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/newstrackindia-october-18-2012-suggests-law-to-protect-individual-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-standard-october-18-2012-privacy-law-mooted-to-protect-people-against-misuse-of-info"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/dna-india-october-19-2012-saikat-datta-experts-committee-moots-law-to-protect-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/times-of-india-october-19-2012-govt-panel-wants-curbs-on-phone-taps"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/indianexpress-amitabh-sinha-october-19-2012-privacy-act-should-not-circumscribe-rti-expert-group"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/the-hindu-aarti-dhar-october-21-2012-bill-to-create-bank-for-dna-profiling-of-accused-coming"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/privacy-in-social-networked-world">
    <title>Privacy in the Social Networked World</title>
    <link>https://cis-india.org/news/privacy-in-social-networked-world</link>
    <description>
        &lt;b&gt;The Asian Privacy Scholars Network 2nd International Conference was hosted by the Centre for Business Information Ethics, Meiji University, Tokyo, Japan, on behalf of the Asian Privacy Scholars Network, November 19 - 20, 2012. Elonnai Hickok is speaking at the event.&lt;/b&gt;
        &lt;h3&gt;Monday, November 19, 2012&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09:00—09:30&lt;/td&gt;
&lt;td&gt;Registration and Welcome&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:30—10:30&lt;/td&gt;
&lt;td&gt;Keynote Speaker: Pirongrong Ramasoota&lt;br /&gt;(Chulalongkorn University, Thailand)&lt;br /&gt;The Future of Privacy in the World's Largest Democracy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30—11:00&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11:00—12:30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Whon-Il Park (Kyung Hee University, Korea)&lt;br /&gt;How to Protect, or Utilize, Personal Visual Information in Korea&lt;/p&gt;
&lt;p&gt;Sinta Dewi Rosadi (University Padjadjaran, Indonesia)&lt;br /&gt;Constitutional Privacy Protection: The Indonesian Experience&lt;/p&gt;
&lt;p&gt;Takato Natsui (Meiji University, Japan) Censorship, Burying and Mental Health in Business Office&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:30—14:00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:00—15:00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Lilian Edwards (Strathclyde University, UK)&lt;br /&gt;International Implications of the Proposed Revision of the EU Data Protection Directive&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Graham Greenleaf (UNSW, Australia and Meiji University, Japan)&lt;br /&gt;100 Data Privacy Laws: Their Significance and Origins&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:00—15:30&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:30—16:30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Kiyoshi Murata/Yohko Orito (Meiji University/Ehime University, Japan)&lt;br /&gt;Japanese Youngsters' Social Attitude towards Privacy&lt;/p&gt;
&lt;p&gt;Ryoko Asai/Iordanis Kavathatzopoulos&lt;br /&gt;(Meiji University, Japan/Uppsala University, Sweden) The Paradoxical Nature of Privacy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;18:00—20:00&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Conference Banquet (Salon San, 23rd Floor, Liberty Tower, Meiji University)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Tuesday, November 20, 2012&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;09:00—09:45&lt;/td&gt;
&lt;td&gt;Keynote Speaker: Roger Clarke&lt;br /&gt;(Xamax Consultancy, UNSW and ANU, Australia)&lt;br /&gt;Consumer-Oriented Social Media as Market Opportunity&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09:45—10:00&lt;/td&gt;
&lt;td&gt;Video Presentation from David Lyon (Queens University, Canada)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:00—10:30&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10:30—12:00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Daniel Trottier (Uppsala University, Sweden) Social Networking Sites and Crowd-sourced Surveillance&lt;/p&gt;
&lt;p&gt;Colin Bennett (University of Victoria, Canada) Social Networking and Privacy Jurisdiction&lt;/p&gt;
&lt;p&gt;Andrew Adams (Meiji University, Japan) Facebook Code: SNS Platform Affordances and Privacy&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12:00—13:00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13:00—14:30&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Elonnai Hickok (Centre for Internet and Society, India) Transparency and Privacy in India&lt;/p&gt;
&lt;p&gt;Fumio Shimpo (Keio University, Japan) Current Developments in Japanese Data Protection Policy&lt;/p&gt;
&lt;p&gt;Panel: Chen, Greenleaf, Hickok, Shimpo&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14:30—15:00&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15:00—17:00&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Ian Brown (University of Oxford, UK) Data Protection and Social Networking Services&lt;/p&gt;
&lt;p&gt;Shirley Williams (University of Reading, UK) Do Computer Science Scholars Consider Issues of Privacy when Studying Large Twitter Data Sets?&lt;/p&gt;
&lt;p&gt;Final Panel: Adams, Bennett, Brown, Clarke, Williams&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Organisers&lt;/h3&gt;
&lt;p&gt;Prof Andrew A. Adams, Meiji University, Tokyo, Japan&lt;br /&gt;Prof Kiyoshi Murata, Meiji University, Tokyo, Japan&lt;br /&gt;Prof Graham Greenleaf, UNSW, Sydney, Australia&lt;br /&gt;(JSPS Visiting Fellow, Meiji University Sep-Dec 2012)&lt;/p&gt;
&lt;p&gt;Read the original &lt;a class="external-link" href="http://www.kisc.meiji.ac.jp/~ethicj/APSN2/program.pdf"&gt;here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/privacy-in-social-networked-world'&gt;https://cis-india.org/news/privacy-in-social-networked-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-12-04T16:19:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google">
    <title> India second in requesting user info: Google</title>
    <link>https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google</link>
    <description>
        &lt;b&gt;India is at second place after the US in terms of the government requests for user data from Google&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Karthik Subramanian's article was &lt;a class="external-link" href="http://www.thehindu.com/sci-tech/internet/india-second-in-requesting-user-info-google/article4095170.ece"&gt;published in the Hindu on November 14, 2012&lt;/a&gt;. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The  Indian government made the second largest demand for Web user  information — next only to the United States government — to Google in  the six-month period from January to June this year, according to the  ‘Transparency Report’ published by the Web services major on Tuesday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During  the six-month period, the Indian government — both by way of court  orders and by way of requests from police— requested Google to disclose  user information 2,319 times over 3,467 users/accounts. Google fully or  partially complied with the request to the tune of 64 per cent. Only the  U.S. government requested more data during the period — 7,969 requests  over 16,281 accounts, compliance rate: 90 per cent.&lt;br /&gt;&lt;br /&gt;It is the  sixth time Google has brought out the bi-annual report detailing its  interactions with the world government agencies. It details two  categories of interactions : requests to divulge user data; and requests  to pull down content. India ranked seventh in the list of requests to  pull down data; experts say that the possible reason could be the  government not having such powers under the Constitution.&lt;br /&gt;&lt;br /&gt;Pranesh  Prakash, policy director with Bangalore-based Centre for Internet and  Society, said that the Google report was a damning indictment of the  country’s government exceeding its constitutional bounds by demanding  removal of material for defamation, government criticism, etc., without a  valid court order. "There are no laws in our country that allows the  executive or the police to remove such material without a court order."&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Substantial spike&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In  all, 33 countries figure in the report. There was a substantial spike  when compared to previous reports with respect to the number of requests  from various governments to pull down content.&lt;br /&gt;&lt;br /&gt;"In the first  half of 2012, there were 20,938 inquiries from government entities  around the world. Those requests were for information about 36,614  accounts,” wrote Dorothy Chou, Google’s senior policy analyst, on the  Official Google Blog while presenting the report. “The number of  government requests to remove content from our services was largely flat  from 2009 to 2011. But it’s spiked in this reporting period. In the  first half of 2012, there were 1,791 requests from government officials  around the world to remove 17,746 pieces of content."&lt;br /&gt;&lt;br /&gt;Google is  leading the cause for voluntary disclosure of the interactions it has  with the governments. Other web services that put out similar  transparency reports include micro-blogging site Twitter; cloud storage  service Dropbox; and social networking site Linkedin.&lt;br /&gt;&lt;br /&gt;Mr. Prakash  said it was not enough if just the web services put out such reports.  "The telecom service providers must voluntarily come out with such  information," he added.&lt;br /&gt;&lt;br /&gt;"There is a dearth of public information  about the amount of legal interception and surveillance. This does not  bode well in a democratic polity."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google'&gt;https://cis-india.org/news/the-hindu-sci-tech-internet-karthik-subramanian-nov-14-2012-india-second-in-requesting-user-info-google&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-15T09:40:10Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens">
    <title> India second in keeping tabs on netizens</title>
    <link>https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens</link>
    <description>
        &lt;b&gt;India ranks second globally in accessing private details of its citizens, next only to the US, if the latest data from Google is to be believed.
&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Ishan Srivastava was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/tech/tech-news/internet/India-second-in-keeping-tabs-on-netizens/articleshow/17222023.cms"&gt;published in the Times of India on November 15, 2012&lt;/a&gt;, Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The transparency report by the internet search giant lists out requests it received from governments across the world to access information on the users of its various services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the first six months of 2012, India made 2,319 requests involving 3,467 users. In comparison, the US made 7,969 requests in the same period and Brazil, which comes third, sent 1,566 requests. Globally, there were 20,938 requests for user data during the January-June period. The data can include your complete &lt;a href="http://timesofindia.indiatimes.com/topic/Gmail-account"&gt;Gmail account&lt;/a&gt;, chat logs, Orkut profile and search terms among others. These reports are prepared by Google every six months, and were started in July-December 2009.&lt;/p&gt;
&lt;p&gt;The requests for user data from India doubled from 1,061 in July-December 2009 to 2,207 in July-December 2011.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Though India is a large country with a significant number of internet users, this data is nonetheless an indicator of growing surveillance," said Pranesh Prakash, policy director at &lt;a href="http://timesofindia.indiatimes.com/topic/Centre-for-Internet-and-Society"&gt;Centre for Internet and Society&lt;/a&gt; (CIS), a Bangalore-based organization looking at issues of public accountability, internet freedom and openness.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"India lacks a general privacy law that helps set guidelines for such user requests, despite privacy being a constitutional right as part of the right to life," said Prakash.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India also actively sends requests to take down content which it deems defamatory and against national security. While the number of court orders for taking down web content has remained almost stagnant over the years, there has been a rise in the number of requests by the executive and police. Between January and June this year, there were 20 court orders and 64 requests from executive/police that resulted in 596 items being taken down from the web. In comparison, there were only eight court orders and 22 executive/police requests in January-June 2010, resulting in 125 items being taken down.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The government does not always specify the reason for which they want access. They just want access, what they do with the information is not known to us," said a legal adviser to an MNC. "These requests come with a threat to our continued operation in India."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Falsified court orders are also being employed to seek removal of content. Three such court orders were sent to Google "that demanded the removal of blog posts and entire blogs for alleged defamation." One order was said have been issued by a local court in Andheri, Mumbai while the other two by the Delhi high court. But all the three were found to be fake.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Google says a single court order was responsible for removal of 360 items this year as they "contained adult videos that allegedly violated an individual's personal privacy." While such orders have a positive impact like curbing pornography and violent content, governments at every level have also tried to use these requests to take down unfavourable content or criticism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In January-June 2011 period, Google received "requests from state and local law enforcement agencies to remove &lt;a href="http://timesofindia.indiatimes.com/topic/YouTube"&gt;YouTube&lt;/a&gt; videos that displayed protests against social leaders or used offensive language in reference to religious leaders". Google rejected a majority of these requests. It also received a request from a law enforcement agency to remove 236 communities and profiles from Orkut that were critical of a local politician. Google did not remove them either.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Prior to 2009, government had limited powers of interception. However, after 26/11 they gave themselves huge powers to block and monitor content," said Supreme Court lawyer Pavan Duggal. "Data privacy is non-existent in India." He said that the A P Shah Committee, which was formed to recommend principles for a privacy law, has submitted its report to the Planning Commission and now it is up to the government to take it to the next stage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both Prakash and Duggal said that technology companies in India, including telecom players, should come out with similar transparency reports as Google. A report by international watchdog Privacy International says that &lt;a href="http://economictimes.indiatimes.com/bharti-airtel-ltd/stocks/companyid-2718.cms" target="_blank"&gt;Bharti Airtel&lt;/a&gt;, in its 2010-2011 annual report, said it had received 422 appreciation letters from law enforcement agencies for assistance in lawful interceptions. "The Indian IT Act requires electronic audit by firms but the law is silent on how this audit is filed," said Duggal.&lt;/p&gt;
&lt;p&gt;Globally, &lt;a href="http://timesofindia.indiatimes.com/topic/Dropbox"&gt;Dropbox&lt;/a&gt;, LinkedIn, Sonic.net and Twitter release transparency reports apart from Google.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens'&gt;https://cis-india.org/news/times-of-india-india-times-tech-tech-news-internet-ishan-srivastava-nov-15-2012-india-second-in-keeping-tabs-on-netizens&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-15T09:04:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy">
    <title>Q&amp;A to the Report of the Group of Experts on Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy</link>
    <description>
        &lt;b&gt;In January 2012 Justice A.P. Shah formed a committee consisting of a group of experts to contribute to and create a report of recommendations for a privacy legislation in India. The committee met a total of seven times from January to September 2012.  The Centre for Internet and Society (CIS) was a member of the committee creating the report. This blog post is CIS’s attempt to answer questions that have arisen from media coverage on the report, based on our understanding. &lt;/b&gt;
        &lt;h2&gt;Executive Summary&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The executive summary explains how the need for a horizontal privacy legislation that recognizes the right to privacy has come about in India in light of projects and practices such as the UID, NATGRID, and the changing nature of business and technology. The executive summary highlights the committee’s recommendations of what should be considered by legislatures while enacting a privacy legislation in India.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the salient features of the committee’s recommendations? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; In its report the committee recommended that any privacy legislation passed should:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; Be technologically neutral and interoperable with international standards to ensure that the regulation can adapt to changing technology, and that business will be promoted. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Recognize the multiple dimensions of privacy including physical and informational privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Apply to all data controllers both in the private sector and the public sector to ensure that businesses and governments are held accountable to protecting privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establish a set of privacy principles that can be applicable to different practices, policies, projects, departments, and businesses to create a uniform level of privacy protection across all sectors. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Create an enforcement regime of co-regulation, where industry has the choice of developing privacy principles and ensuring compliance at the sectoral level with regular oversight by the Privacy Commissioners. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 1: Constitutional Basis for Privacy&lt;/h2&gt;
&lt;p&gt;This chapter summarizes a number of decisions from the Indian Judiciary that demonstrate how the right to privacy in India has been defined on a case to case basis and has been defined as either a fundamental right or a common law right.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the contexts of the cases covered? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; This chapter covers cases that speak to the:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Right to privacy in the context of surveillance by the State &lt;/li&gt;
&lt;li&gt;Balancing the ‘right to privacy’ against the ‘right to free speech’ &lt;/li&gt;
&lt;li&gt;The ‘right to privacy’ of HIV patients &lt;/li&gt;
&lt;li&gt;Prior judicial sanctions for tapping telephones &lt;/li&gt;
&lt;li&gt;The ‘search and seizure’ powers of revenue authorities &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 2: International Privacy Principles&lt;/h2&gt;
&lt;p&gt;This chapter summarizes recent developments in privacy laws, international privacy principles, and privacy principles developed by specific countries. This review aided the Committee in forming its recommendations for the report.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Privacy principles from which countries were reviewed by the Committee?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The Committee reviewed privacy principles from the following countries and international organizations.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;EU Regulations of January 2012 &lt;/li&gt;
&lt;li&gt;US Consumer Privacy Bill of Rights &lt;/li&gt;
&lt;li&gt;OECD Privacy Principles &lt;/li&gt;
&lt;li&gt;APEC Privacy Framework &lt;/li&gt;
&lt;li&gt;Australia &lt;/li&gt;
&lt;li&gt;Canada &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 3: National Privacy Principles, Rationales, and Emerging Issues&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter lays out the nine national privacy principles and describes the rationale for each principle along with emerging issues around each principle.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What could the principles apply to? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles apply to the collection, processing, storage, retention, access, disclosure, destruction, sharing, transfer, and anonymization of sensitive personal information, personal identifiable information, and identifiable information by data controllers. The national privacy principles can also be applied to legislation, projects, practices, and policies to ensure that provisions and requirements are in compliance with the national privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Who could be brought under the scope of the principles?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles are applicable to every data controller in the private sector and the public sector. For example organizations and government departments that determine the purposes and means of processing personal information will be brought under the scope of the principles and will be responsible for carrying out the processing of data in accordance with sectoral privacy standards or the national privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How could the National Privacy Principles impact individuals? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles provide individuals with the right to 1. Receive notice before giving consent stating what personal information is being collected, the purposes for which personal information is being collected, the uses of collected personal information, whether or not personal information will be disclosed to third persons, security safeguards established by the data controller, processes available to data subjects to access and correct personal information, and contact details of privacy officers. 2. Opt in and out of providing personal information 3. Withdraw given consent at any point of time. 4. Access and correct any personal information held by data controllers 5. Allow individuals to issue a complaint with the respective ombudsman, privacy commissioner, or court.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Would the National Privacy Principles be binding for every data controller? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; Yes, but Self Regulating Organizations at the industry level have the option of developing principles for that specific sector. These principles must be approved by the privacy commissioner and be in compliance with the National Privacy Principles.&lt;/p&gt;
&lt;h2&gt;Chapter 4: Analysis of Relevant Legislation, Bills, and Interests from a Privacy Perspective&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter examines relevant legislation, bills, and interests from a privacy perspective. In doing so the chapter clarifies how the right to privacy should intersect with the right to information and the freedom of expression, and anaylzes current and upcoming legislation to demonstrate what existing provisions in the legislation uphold the privacy principles, what existing provisions are in conflict with the principles, and what provisions are missing to ensure that the legislation is compliant to the extent possible with the principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How does the report understand the relationship between the Right to Information and the Right to Privacy?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; When applied the Privacy Act should not circumscribe the Right to Information Act. Furthermore, RTI recipients should not be considered data controllers and thus should not be brought under the ambit of the privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How does the report understand the relationship between the freedom of expression and privacy? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; Questions about how to balance the right to privacy with the freedom of expression can arise in many circumstances including: the right to be forgotten and data portability, journalistic expression, state secrecy and whistle blowers, and national security. Most often, public interest is the test used to determine if the right to privacy should supersede the freedom of expression or vice versa.&lt;/p&gt;
&lt;h2&gt;Chapter 5: The Regulatory Framework&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter outlines the committee’s recommendations for a regulatory framework for the Privacy Act.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Who are the main actors in the regulatory framework?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The report recommends that a regulatory framework be comprised of one privacy commissioner at the central level and four commissioners at the regional level, self regulating organizations (SRO’s) at the industry level, data controllers and privacy officers at the organization level, and courts.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the salient features of the regulatory framework? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The salient features of the regulatory framework include 1. A framework of co-regulation 2. Complaints 3. Exceptions to the Privacy Act 4. Offenses under the Act&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are exceptions to the right to privacy? Are these blanket exceptions?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; National security; public order; disclosure of information in public interest; prevention, detection, investigation and prosecution of criminal offences; and protection of the individual or of the rights and freedoms of others are suggested exceptions to the right to privacy. The committee has qualified these exceptions with the statement that before an exception can be made for the following circumstances, the proportionality, legality, and necessity in a democratic state should be used to measure if the exception applies and the extent of the exception. Thus, they are not blanket exceptions to the right to privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Historical and scientific research and journalistic purposes were also recommended as additional exceptions to the right to privacy that may be considered. These exceptions will not be subjected to the principles of proportionality, legality, and necessary in a democratic state.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the powers and responsibilities of the privacy commissioners? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The powers and responsibilities of the Privacy Commissioners are the following:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Responsibilities:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Enforcement of the Act &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Broadly oversee interception/access, audio &amp;amp; video recordings, the use of personal identifiers, and the use of bodily or genetic material. &lt;/li&gt;
&lt;li&gt;Evaluate and approve privacy principles developed by SRO’s &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Collaborate with stakeholders to endure effective regulation, promote awareness of the Act, and sensitize citizens to privacy considerations &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Powers: &lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Order privacy impact assessments on organisations &lt;/li&gt;
&lt;li&gt;Investigate complaints suomotu or based off of complaints from data subjects (summon documents, call and examine witnesses, and take a case to court if necessary ) &lt;/li&gt;
&lt;li&gt;Fine non-compliant data controllers &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Q: How does Co-regulation work? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The purpose of establishing a regulatory framework of co-regulation is to ensure that appropriate policies and principles are articulated and enforced for all sectors. If a sector wishes to develop its own privacy standards, the industry level self regulating organization will submit to the privacy commissioner a sub set of self regulatory norms. If these norms are approved by the privacy commissioner the SRO will be responsible for enforcing those norms, but the privacy commissioner will have the power to sanction member data controllers for violating the norms. If a sector does not have an SRO or does not wish to develop its own set of standards, the National Privacy Principles will be binding.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are data controllers? What are privacy officers? What are ombudsmen? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; A data controller is any entity that handles or process data. Privacy officers receive and handle complaints at the organizational level and may be appointed as part of a SRO’s privacy requirements for a sector.  Ombudsmen are appointed at the SRO level and are also responsible for receiving and handling complaints. The objective of having ombudsman and privacy officers is to reduce the burden of handling complaints on the commissioner and the courts.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: When can an individual issue a complaint? Which body should individuals issue complaints to? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; An individual can issue a complaint at any point of time when they feel that their personal information has not been handled by a data controller according to the principles, or that a data controller is not in compliance with the Act. When applicable complaints are encouraged to be issued first to the organization. If the complaint is not resolved, the individual can take the complaint to the SRO or privacy commissioner. The individual also has the option of taking a complaint straight to the courts. When a complaint is received by the commissioner, the commissioner may fine the data controller if it is found to be non-compliant. Data controllers cannot appeal fines issued by the commissioner, but they can appeal the initial decision of non-compliance.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Can an individual receive compensation for a violation of privacy: &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; Yes. Individuals who suffer damages caused by non-compliance with the principles or any obligation under the Act can receive compensation, but the compensation must be issued by the courts and cannot be issued by a privacy commissioner. Actors that can be held liable by individuals include data controllers, organization directors, agency directors, and heads of Governmental departments.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What offences does the report reccomend?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The following constitutes as an offence under the Act:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Non-compliance with the  privacy principles &lt;/li&gt;
&lt;li&gt;Unlawful  collection,  processing,  sharing/disclosure,  access,  and  use  of personal data &lt;/li&gt;
&lt;li&gt;Obstruction of commissioner &lt;/li&gt;
&lt;li&gt;Failure to comply with notification issued by commissioner        
&lt;ul&gt;
&lt;li&gt; Processing data after receiving a notification &lt;/li&gt;
&lt;li&gt; Failure to appear before commissioner &lt;/li&gt;
&lt;li&gt;Failure to produce documents requested by commissioner &lt;/li&gt;
&lt;li&gt; Sending report to commissioner with false or misleading information&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 6: The Multiple Dimensions of Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter gives examples of practices that impact privacy in India which the national privacy principles could be applied to. These include interception/access, the use of electronic recording devices, the use of personal identifiers, and the use of bodily and genetic material. The current state of each practice in India is described, and the inconsistencies and gaps in the regimes are highlighted. Each section also provides recommendations of which privacy principles need to be addressed and strengthened in each practice, and how the privacy principles would be affected by each practice.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Does the report give specific recommendations as to how each practice should be amended to incorporate the National Privacy Principles?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; No. Each section explains the current state of the practice in India, gaps and inconsistencies with the current practice,  and recommends broadly what principles need to be addressed and strengthened in the regime, and how the National Privacy Principles may be affected by the practice.&lt;/p&gt;
&lt;h3&gt;Summary of Recommendations&lt;/h3&gt;
&lt;p&gt;This chapter consolidates and clarifies all of the Committee’s recommendations for a Privacy Act in India.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Are the recommendations in this chapter different from chapters above?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; No.  The recommendations in this chapter reflect the recommendations made earlier. This chapter does clarify the recommended scope and objectives of the Privacy Act  including:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The Act should define and harmonize with existing laws in force. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should extend the right of privacy to all individuals in India and all data processed by any company or equipment locating in India, and all data that originated in India. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should clarify that the publication of personal data for artistic and journalistic purposes in public interest, the use of personal information for household purposes, and the disclosure of information as required by the Right to Information Act should not constitute an infringement of privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should not require a ‘reasonable expectation’ of privacy to be present for the right to be evoked. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If any other legislation provides more extensive protections than those set out by the Privacy Act, than the more extensive protections should apply. &lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy.pdf" class="internal-link"&gt;Report of the Group of Experts on Privacy&lt;/a&gt; [PDF, 1270 Kb]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy'&gt;https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-09T10:20:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms">
    <title>Law yet to catch up with tech-enabled peeping toms</title>
    <link>https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms</link>
    <description>
        &lt;b&gt;Devices that give sharp images are the order of the day. But this clarity is lacking when it comes to regulating use of cameras and camera phones in public places, say policy makers.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The article by Sandhya Soman &amp;amp; Pratiksha Ramkumar was &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2012-11-07/chennai/34972633_1_privacy-law-phones-in-public-places-camera-phones"&gt;published&lt;/a&gt; in the Times of India on November 7, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;If there is one thing that sends more clients harried by blackmailers to detectives like A M Malathy of Malathy Detective Agency, it is the pervasive presence of the camera, most often inside modest cell phones. "One girl had to leave a town as her ex-boyfriend uploaded her photo on the internet and referred to her as a call girl. We got the web page removed," says Malathy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But tracing culprits is difficult if they are strangers on the road. Absence of a privacy law makes it difficult for police to book culprits. "If someone photographs a woman on a bus, we can ask the person to delete it. But we can't book the person s there is no law," says Jegabar Sali, assistant commissioner, cyber crime cell.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Information Technology (IT) Act, 2000 talks of punishment only in cases where a person's private areas have been photographed. However, things are looking up with the government trying to draw up the Right to Privacy Bill.&lt;br /&gt;&lt;br /&gt;"The problems posed by digital technology are complex and we need to define what these new crimes are," says Rajeev Chandrasekhar, independent Member of Parliament, who introduced the Right to Privacy Bill,2010 in Parliament. "I did it because I got representations from parents and women about how MMS clips were being used to blackmail them," says Chandrasekhar.&lt;br /&gt;&lt;br /&gt;There have been attempts at legislation earlier. The Mobile Camera Phone Users (Code of Conduct) Bill, 2006 attempted to regulate the use of camera phones in public places. It proposed that manufactures build camera phones that flash a light or emit a 'click' sound, and that users should get consent of the person being photographed.&lt;br /&gt;&lt;br /&gt;"The sound and light are for informing people that they are being filmed," says Sunil Abraham, executive director, Centre for Internet and Society, a Bangalore-based organisation that was part of the committee. These provisions are part of South Korea's privacy law, which sought to bring down cases of technology-enabled 'upskirt' photography, where photos of women were taken without their permission, he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms'&gt;https://cis-india.org/news/times-of-india-sandhya-soman-and-pratiksha-ramkumar-nov-7-2012-law-yet-to-catch-up-with-tech-enabled-peeping-toms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-08T08:06:07Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/daily-pioneer-columnists-oct-29-2012-apar-gupta-bolstering-right-to-remain-private">
    <title>Bolstering right to remain private </title>
    <link>https://cis-india.org/news/daily-pioneer-columnists-oct-29-2012-apar-gupta-bolstering-right-to-remain-private</link>
    <description>
        &lt;b&gt;The Justice AP Shah panel has done to well to lay down an enforceable roadmap that can strengthen  privacy laws in the country. It’s now for the legislature to take the issue to a logical conclusion.&lt;/b&gt;
        &lt;div class="itemFullText" style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;p&gt;Apar Gupta's column was &lt;a class="external-link" href="http://www.dailypioneer.com/columnists/item/52726-bolstering-right-to-remain-private.html"&gt;published&lt;/a&gt; in the Pioneer on October 29, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;span&gt;A  haveli courtyard is an apt metaphor for the complexity which is  involved in drafting a law on privacy. Though the courtyard gives an  appearance of openness, it is limited by the walls, doors and windows  which surround it. The architecture represents a mediated understanding  of the options which are available to the resident in sharing and  limiting information to family and strangers. A somewhat similar project  is in the works with the Union Government taking steps towards the  enactment of a privacy law.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Privacy  law as it is understood at present is usually limited to the odd writ  petition filed against the Government by a private individual seeking  enforcement of a fundamental right to privacy. Recently, such  adjudication has been limited to high-profile individuals, and where  there is wide voyeuristic interest. For instance, two recent petitioners  include industrialist Ratan Tata and former Samajwadi Party leader Amar  Singh. Here, it is important to stress that with the state gathering  more and more data about individuals through the Unique Identification  Authority of India scheme, there is a need to democratise the right by  making legal provisions for its enforcement. In making such provisions a  balance has to be maintained, where information which serves public  interest or gathered through informed consent is not encumbered in the  name of protecting individual privacy.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;To  find this balance, the Government late last year tasked a Committee of  Experts chaired by Justice AP Shah to prepare a report on the Privacy  Bill. Readers would recall that Justice Shah had authored a judgement  which read down Section 377 of the Indian Penal Code, decriminalising  homosexual activity. A closer reading of the judgement shows the  reliance placed by the court on the privacy right and to reach its  determination. With such credentials, the Justice Shah Committee has  exceeded the high expectations placed on it, presenting a fair and  balanced approach towards a privacy law in India.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;At  the very outset the report clearly marks its objectives, from which it  then commences to study judicial precedent on privacy as well as the  experience of foreign jurisdictions. On the basis of this study, it has  evolved nine privacy principles which encompass within it distinct  aspects of individual privacy. Such a nuanced approach to privacy is  certainly welcome given that privacy as a right is often subjective,  varying drastically in its appreciation as per civil society, private  industry and even Government itself.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Beyond  the specific aspects of the privacy right, the report extends the right  both to Government as well as private industry. This is a sign of the  times, best put by Pranesh Prakash, policy director, Centre for Internet  and Society, when he says that citizens reveal more data about  themselves to social networking websites than they would to the  Government under torture!&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Another  significant aspect is the proposed co-regulatory regime which the  report suggests. And, experience has taught us that a right without an  effective remedy to enforce it counts for a little more than a black  letter on paper. In this respect, the report proposes a sectoral  regulator which has supervision over State level privacy commissioners.  In addition to this, the report also proposes a system of  self-regulation where industry-specific standards may be proposed and  then sanctioned by the privacy commissioners. However, contrary to the  present approach of tribunalisation, the report suggests that recourse  to civil courts for aggrieved persons should always be kept open.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Though  the origins of the privacy rights may be antiquated, widespread  consensus suggests that the modern practice and substance of privacy law  owes its beginning to an article published in the fourth volume of the  Harvard Law Review. The article, authored by Louis Brandeis and Samuel  Warren drawing a physical justification for what seemed like a novelty  back then, stated that the law regarded a man’s house as his castle.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Sadly,  the right has not seen a proper development in India, mainly due to the  absence of an overarching legislation as well as a lack of  understanding of its proper contours. At least in this respect, the  report marks a significant development in the drafting of a  comprehensive privacy legislation in India. A haveli, a house or a  castle — the Justice Shah panel has provided a useful blueprint to the  legislature to build an effective and balanced statute to safeguard  individual privacy.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;&lt;i&gt;(The writer is a partner in a Delhi-based law firm and visiting faculty at the National Law University, Delhi)&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/daily-pioneer-columnists-oct-29-2012-apar-gupta-bolstering-right-to-remain-private'&gt;https://cis-india.org/news/daily-pioneer-columnists-oct-29-2012-apar-gupta-bolstering-right-to-remain-private&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-29T09:00:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/epw-web-exclusives-oct-27-2012-elonnai-hickok-rethinking-dna-profiling-india">
    <title>Rethinking DNA Profiling in India</title>
    <link>https://cis-india.org/internet-governance/blog/epw-web-exclusives-oct-27-2012-elonnai-hickok-rethinking-dna-profiling-india</link>
    <description>
        &lt;b&gt;DNA profile databases can be useful tools in solving crime, but given that the DNA profile of a person can reveal very personal information about the individual, including medical history, family history and so on, a more comprehensive legislation regulating the collection, use, analysis and storage of DNA samples needs included in the draft Human DNA Profiling Bill.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Elonnai Hickok's article was &lt;a class="external-link" href="http://www.epw.in/web-exclusives/rethinking-dna-profiling-india.html"&gt;published in Economic &amp;amp; Political Weekly&lt;/a&gt;, Vol - XLVII No. 43, October 27, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;DNA evidence was first accepted by the courts in India in 1985,&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; and in 2005 the Criminal Code of Procedure was amended to allow for medical practitioners, after authorisation from a police officer who is not below the rank of sub-inspector, to examine a person arrested on the charge of committing an offence and with reasonable grounds that an examination of the individual will bring to light evidence regarding the offence. This can include&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"the examination of blood, blood stains, semen, swabs in case of sexual offences, sputum and sweat, hair samples, and finger nail clippings, by the use of modern and scientific techniques including DNA profiling and such other tests which the registered medical practitioner thinks necessary in a particular case."&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this provision establishes that authorisation is needed for collection of DNA samples, defines who can collect samples, creates permitted circumstances for collection, and lists material that can be collected, among other things, it does not address how the collected DNA evidence should be handled, and what will happen to the evidence after it is collected and analysed. These gaps in the provision indicate the need for a more comprehensive legislation regulating the collection, use, analysis and storage of DNA samples, including for crime-related purposes in India.&lt;/p&gt;
&lt;p&gt;The initiative to draft a Bill regulating the use of DNA samples for crime-related reasons began in 2003, when the Department of Biotechnology (DoB) established a committee known as the DNA Profiling Advisory Committee to make recommendations for the drafting of the DNA profiling Bill 2006, which eventually became the Human DNA Profiling Bill 2007.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; The 2007 draft Bill was prepared by the DoB along with the Centre for DNA Fingerprinting and Diagnostics (CDFD).&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CDFD is an autonomous institution supported by the DoB. In addition to the CDFD, there are multiple Central Forensic Science Laboratories in India under the control of the Ministry of Home Affairs and the Central Bureau of Investigation,&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;, along with a number of private labs &lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; which analyse DNA samples for crime-related purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2007, the draft Human DNA Profiling Bill was made public, but was never introduced in Parliament. In February 2012, a new version of the Bill was leaked. If passed, the Bill will establish state-level DNA databases which will feed into a national-level DNA database, and proposes to regulate the use of DNA for the purposes of&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"enhancing protection of people in the society and the administration of justice."&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bill will also establish a DNA Profiling Board responsible for 24 functions, including specifying the list of instances for human DNA profiling and the sources of collection, enumerating guidelines for storage and destruction of biological samples, and laying down standards and procedures for establishment and functioning of DNA laboratories and DNA Data Banks.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; The lack of harmonisation and clear policy indicates that there is a need in India for standardising the collection and use of DNA samples. Although DNA evidence can be useful for solving crimes, the current 2012 draft Bill is missing critical safeguards and technical standards essential to preventing the misuse of DNA and protecting individual rights.&lt;/p&gt;
&lt;p&gt;Concerns that have been raised with regards to the Bill are both intrinsic, including problems with effectiveness of achieving the set objectives, and extrinsic, including concerns with the fundamental principles of the Bill. For example, the use of DNA material as evidence and the subsequent creation of a DNA database can be useful for solving crimes when the database contains DNA profiles from&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; from DNA samples&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; only from crime scenes, and is restricted to DNA profiles from individuals who might be repeat offenders. If a wide range of DNA profiles are added to the database, the effectiveness of the database decreases, and the likelihood of a false match increases as the ability to correctly identify a criminal depends on the number of crime scene DNA profiles on the database, and the number of false matches that occur is proportional to the number of comparisons made (more comparisons = more false matches).&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; This inverse relationship between the effectiveness of the DNA database and the size of the database was found in the UK when it was proven that the expansion of the UK DNA database did not help to solve more crimes, despite millions of profiles being added to the database.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The current scope of the draft 2012 Bill is not limited to crimes for which samples can be taken and placed in the database. Instead the Bill creates indexes within every databank including: &lt;i&gt;crime scene indexes, suspects index, offender’s index, missing persons index, unknown deceased persons’ index, volunteers’ index, and such other DNA indices as may be specified by regulations made by the Board&lt;/i&gt;.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; How independent each of these indices are, is unclear. For example, the Bill does not specify when a profile is searched for in the database – if all indices are searched, or if only the relevant indices are searched, and the Bill requires that when a DNA profile is added to the databank, it must be compared with all the existing profiles.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; The Bill also lists a range of offences for which DNA profiling will be applicable and DNA samples collected, and used for the identification of the perpetrator including, unnatural offences, individual identification, issues relating to assisted reproductive technologies, adultery, outraging the modesty of women etc.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; Though the Bill is not incorrect in its list of offences where DNA profiling could be applicable, it is unclear if DNA profiles from all the listed offenses will be stored on the database. If it is the case that the DNA profiles will be stored, it would make the scope of the database too broad.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike other types of identifiers, such as fingerprints, DNA can reveal very personal information about an individual, including medical history, family history and location.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; Thus, having a DNA database with a broad scope and adding more DNA profiles onto a database, increases the potential for misuse of information stored on the database, because there is more opportunity for profiling, tracking of individuals, and access to private data. In its current form, the Bill protects against such misuse to a certain extent by limiting the information that will be stored with a DNA profile and in the indices,&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt; but the Bill does not make it clear if the DNA profiles of individuals convicted for a crime will be stored and searched independently from other profiles. Additionally, though the Bill limits the use of DNA profiles and DNA samples to identification of perpetrators,&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; it allows for DNA profiles/DNA samples and related information related to be shared for &lt;i&gt;creation and maintenance of a population statistics database that is to be used, as prescribed, for the purpose of identification research, protocol development, or quality control provided that it does not contain any personally identifiable information and does not violate ethical norms&lt;/i&gt;.”&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An indication of the possibility of how a DNA database could be misused in India can be seen in the CDFD’s stated objectives, where it lists "to create DNA marker databases of different caste populations of India."&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; CDFD appears to be collecting this data by requiring caste and origin of state to be filled in on the identification form that is submitted with any DNA sample.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt; Though an argument could be made that this information could be used for research purposes, there appears to be no framework over the use of this information and this objective. Is the information stored along with the DNA sample? Is it used in criminal cases? Is it revealed during court cases or at other points of time?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, in the Report of the Working Group for the Eleventh Five Year Plan, it lists the following as a possible use of DNA profiling technology:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"Human population analysis with a view to elicit profiling of different caste populations of India to use them in forensic DNA fingerprinting and develop DNA databases."&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This objective is based on the assumption that caste is an immutable genetic trait and seems to ignore the fact that individuals change their caste and that caste is not uniformly passed on in marriage. Furthermore, using caste for forensic purposes and to develop DNA databases could far too easily be abused and result in the profiling of individuals, and identification errors. For example, in 2011 the UK police, in an attempt to catch the night stalker Delroy Grant, used DNA to (incorrectly) predict that he originated from the Winward Islands. The police then used mass DNA screenings of black men. The police initially eliminated Delroy Grant as a suspect because another Delroy Grant was on the DNA database, and the real Delroy Grant was eventually caught when the police pursued more traditional forms of investigation.&lt;a href="#fn23" name="fr23"&gt;[23]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other uses for DNA databases and DNA samples in India have been envisioned over the years. For example, in 2010 the state of Tamil Nadu sought to amend the Prisoners Identification Act 1920 to allow for the establishment of a prisoners’ DNA database – which would require that any prisoner’s DNA be collected and stored.&lt;a href="#fn24" name="fr24"&gt;[24]&lt;/a&gt; In another example, the home page of BioAxis DNA Research Centre (P) Limited, a private DNA laboratory offering forensic services states,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"&lt;i&gt;In a country like India which is densely populated there is huge requirement for these type of databases which may help in stopping different types of fraud like Ration card fraud, Voter ID Card fraud, Driving license fraud etc. The database may help the Indian police to differentiate the criminals and non criminals&lt;/i&gt;."&lt;a href="#fn25" name="fr25"&gt;[25]&lt;/a&gt; Not only is this statement incorrect in stating that a DNA database will differentiate between criminals and non-criminals, but DNA evidence is not useful in stopping ration card fraud etc. as it would require that DNA be extracted and authenticated for every instance of service. In 2012, the Department of Forensic Medicine and Toxicology at AFMC Pune proposed to establish a DNA data bank containing profiles of armed forces personnel.&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt; And in Uttar Pradesh, the government ordered mandatory sampling for DNA fingerprinting of dead bodies.&lt;a href="#fn27" name="fr27"&gt;[27]&lt;/a&gt; These examples raise important questions about the scope of use, collection and storage of DNA profiles in databases that the Bill is silent on.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The assumption in the Bill that DNA evidence is infallible is another point of contention. The preamble of the Bill states that, &lt;i&gt;"DNA analysis of body substances is a powerful technology that makes it possible to determine whether the source of origin of one body substance is identical to that of another, and further to establish the biological relationship, if any, between two individuals, living or dead with any doubt."&lt;/i&gt;&lt;a href="#fn28" name="fr28"&gt;[28]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This statement ignores the possibility of false matches, cross-contamination, and laboratory error&lt;a href="#fn29" name="fr29"&gt;[29]&lt;/a&gt; as DNA evidence is only as infallible as the humans collecting, analysing, and marshalling the evidence. These mistakes are not purely speculative, as cases that have relied on DNA as evidence in India demonstrate that the reliability of DNA evidence is questionable due to collection, analysis, and chain of custody errors. For example, in the Aarushi murder case the forensic expert who testified failed to remember which samples were collected at the scene of the crime&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt; in the French diplomat rape case, the DNA report came out with both negative and positive results;&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; and in the Abhishek rape case the DNA sample had to be reanalysed after initial analysis did not prove conclusive.&lt;a href="#fn32" name="fr32"&gt;[32]&lt;/a&gt; Yet the Bill does not mandate a set of best practices that could help in minimising these errors, such as defining what profiling system will be used nationally, and defining specific security measures that must be taken by DNA laboratories – all of which are currently left to be determined by the DNA board.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The assumption in the preamble that DNA can establish if a relationship exists between two individuals without a doubt is also misleading as it implies that the use of DNA samples and the creation of a database will increase the conviction rate, when in actuality the exact number of accurate convictions resulting purely from DNA evidence is unknown, as is the number of innocent people who are falsely accused of a crime based on DNA evidence in India. This misconception is reflected on the website of the Department of Biotechnology’s information page for CDFD where it states:&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;"…The DNA fingerprinting service, given the fact that it has been shown to bring about dramatic increase in the conviction rate, will continue to be in much demand. With the crime burden on the society increasing, more and more requests for DNA fingerprinting are naturally anticipated. For example, starting from just a few cases of DNA fingerprinting per month, CDFD is now handling similar number of cases every day."&lt;a href="#fn34" name="fr34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the claim that the DNA fingerprinting service has shown a dramatic increase in the conviction rate, is not supported by evidence in this article, according to the CDFD 2010-2011 annual report, the centre analysed DNA from 57 cases of deceased persons, 40 maternity/paternity cases, four rape and murder cases, eight sexual assault cases, and three kidney transplantation cases.&lt;a href="#fn35" name="fr35"&gt;[35]&lt;/a&gt; This is in comparison to the 2006 – 2007 annual report, which quoted 83 paternity/maternity dispute cases, 68 identification of deceased, 11 cases of sexual assault, eight cases of murder, and two cases of wildlife poaching.&lt;a href="#fn36" name="fr36"&gt;[36]&lt;/a&gt; From the numbers quoted in the CDFD annual report, it appears that paternity/maternity cases and identification of the deceased are the most frequent types of cases using DNA evidence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other concerns with the Bill include access controls to the database and rights of the individual. For example, the Bill does not require that a court order be issued for access to a DNA profile, and instead leaves it in the hand of the DNA bank manager to determine if communication of information relating to a match to a court, tribunal, law enforcement agency, or DNA laboratory is appropriate.&lt;a href="#fn37" name="fr37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally, the Data Bank Manager is empowered to grant access to any information on the database to any person or class of persons that he/she considers appropriate for the purposes of proper operation and maintenance or for training purposes.&lt;a href="#fn38" name="fr38"&gt;[38]&lt;/a&gt; The low standards for access that are found in the Bill are worrisome as the possibility for tampering of evidence and analysis is increased.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bill is also missing important provisions that would be necessary to protect the rights of the individual. For example, individuals are not permitted a private cause of action for the unlawful collection, use, or retention of DNA, and individuals do not have the right to access their own information stored on the database.&lt;a href="#fn39" name="fr39"&gt;[39]&lt;/a&gt; These are significant gaps in the proposed legislation as it restricts the rights of the individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In conclusion, India could benefit from having a legislation regulating, standardising, and harmonising the use, collection, analysis, and retention of DNA samples for crime-related purposes. The current 2012 draft of the Bill is a step in the right direction, and an improvement from the 2007 DNA Profiling Bill. The 2012 draft draws upon best practices from the US and Canada, but could also benefit from drawing upon best practices from countries like Scotland. Safeguards missing from the current draft that would strengthen the Bill include: limiting the scope of the DNA database to include only samples from a crime scene for serious crimes and not minor offenses, requiring the destruction of DNA samples once a DNA profile is created, clearly defining when a court order is needed to collect DNA samples, defining when consent is required and is not required from the individual for a DNA sample to be taken, and ensuring that the individual has a right of appeal.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Law Commission of India. Review of the Indian Evidence Act 1872. Pg. 43 Available at:&lt;span&gt; &lt;a href="http://lawcommissionofindia.nic.in/reports/185thReport-PartII.pdf"&gt;http://lawcommissionofindia.nic.in/reports/185thReport-PartII.pdf&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012.&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Section 53. The Criminal Code of Procedure, 1973. Available at: &lt;span&gt;&lt;a href="http://www.vakilno1.com/bareacts/crpc/s53.htm"&gt;http://www.vakilno1.com/bareacts/crpc/s53.htm&lt;/a&gt;&lt;/span&gt;. Last accessed October 9th 2012.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Department of Biotechnology. Ministry of Science &amp;amp; Technology GOI. Annual Report 2009 – 2010. pg. 189. Available at: &lt;span&gt;&lt;a href="http://dbtindia.nic.in/annualreports/DBT-An-Re-2009-10.pdf"&gt;http://dbtindia.nic.in/annualreports/DBT-An-Re-2009-10.pdf&lt;/a&gt;&lt;/span&gt;. Last Accessed October 9th 2012.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Chhibber, M. Govt Crawling on DNA Profiling Bill, CBI urges it to hurry, cites China. The Indian Express. July 12 2010. Available at: &lt;span&gt;&lt;a href="http://www.indianexpress.com/news/govt-crawling-on-dna-profiling-bill-cbi-urges-it-to-hurry-cites-china/645247/0"&gt;http://www.indianexpress.com/news/govt-crawling-on-dna-profiling-bill-cbi-urges-it-to-hurry-cites-china/645247/0&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Perspective Plan for Indian Forensics. Final report 2010. Table 64.1 -64.3 pg. 264-267. Available at: &lt;span&gt;&lt;a href="http://mha.nic.in/pdfs/IFS%282010%29-FinalRpt.pdf"&gt;http://mha.nic.in/pdfs/IFS%282010%29-FinalRpt.pdf&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012. And CBI Manual. Chapter 27. Available at: &lt;span&gt;&lt;a href="http://mha.nic.in/pdfs/IFS%282010%29-FinalRpt.pdf"&gt;http://mha.nic.in/pdfs/IFS%282010%29-FinalRpt.pdf&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012.&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. For example: International Forensic Sciences, DNA Labs India (DLI), Truth Labs and Bio-Axis DNA Research Centre (P) Limited.&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Draft Human DNA Profiling Bill 2012. Introduction.&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Id. section 12(a-z)&lt;br /&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Id. Definition l. “DNA Profile” means results of analysis of a DNA sample with respect to human identification.&lt;br /&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Id. Definition m. “DNA sample” means biological specimen of any nature  that is utilized to conduct CAN analysis, collected in such manner as  specified in Part II of the Schedule.&lt;br /&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The UK DNA database and the European Court of Human Rights: Lessons  India can learn from UK mistakes. PowerPoint Presentation. Dr. Helen  Wallace, Genewatch UK. September 2012.&lt;br /&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Hope, C. Crimes solved by DNA evidence fall despite millions being added  to database. The Telegraph. November 12th 2008. Available at: &lt;span&gt;&lt;a href="http://www.telegraph.co.uk/news/uknews/law-and-order/3418649/Crimes-solved-by-DNA-evidence-fall-despite-millions-being-added-to-database.html"&gt;http://www.telegraph.co.uk/news/uknews/law-and-order/3418649/Crimes-solved-by-DNA-evidence-fall-despite-millions-being-added-to-database.html&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012&lt;br /&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Draft Human DNA Profiling Bill 2012. Section 32 (4(a-g))&lt;br /&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Id. Section 35&lt;br /&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Id. Schedule: List of applicable instances of Human DNA Profiling and Sources of Collection of Samples for DNA Test.&lt;br /&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Gruber J. Forensic DNA Databases. Council for Responsible Genetics. September 2012. Powerpoint presentation.&lt;br /&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Draft Human DNA Profiling Bill 2012. Section 32 (5)-
  
  
    &lt;span class="" id="text-1"&gt;
      &lt;a class="link-wiki-add" title="Click to add a new page" href="https://cis-india.org/internet-governance/blog/epw-web-exclusives-oct-27-2012-elonnai-hickok-rethinking-dna-profiling-india/@@wickedadd?Title=6)(a)-(b&amp;amp;section=text"&gt;
      6)(a)-(b&lt;sup&gt;[+]&lt;/sup&gt;&lt;/a&gt;
    &lt;/span&gt;
  

. Indices will only contain DNA identification records and analysis prepared by the laboratory and approved by the DNA Board, while profiles in the offenders index will contain only the identity of the person, and other profiles will contain only the case reference number.&lt;br /&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Id. Section 39&lt;br /&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Id. Section 40(c)&lt;br /&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. CDFD. Annual Report 2010-2011. Pg19. Available at: &lt;span&gt;&lt;a href="http://www.cdfd.org.in/images/AR_2010_11.pdf"&gt;http://www.cdfd.org.in/images/AR_2010_11.pdf&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012.&lt;br /&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Caste and origin of state is a field of information that is required to  be completed when an ‘identification form’ is sent to the CDFD along  with a DNA sample for analysis. Form available at: &lt;a href="http://www.cdfd.org.in/servicespages/dnafingerprinting.html" title="http://www.cdfd.org.in/servicespages/dnafingerprinting.html"&gt;http://www.cdfd.org.in/servicespages/dnafingerprinting.html&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. Report of the Working Group for the Eleventh Five Year Plan (2007 –  2012). October 2006. Pg. 152. Section: R&amp;amp;D Relating Services.  Available at: &lt;span&gt;&lt;a href="http://planningcommission.nic.in/aboutus/committee/wrkgrp11/wg11_subdbt.pdf"&gt;http://planningcommission.nic.in/aboutus/committee/wrkgrp11/wg11_subdbt.pdf&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012&lt;br /&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. Evans. M. Night Stalker: police blunders delayed arrest of Delroy Grant. March 24th 2011. The Telegraph. Available at: &lt;span&gt;&lt;a href="http://www.telegraph.co.uk/news/uknews/crime/8397585/Night-Stalker-police-blunders-delayed-arrest-of-Delroy-Grant.html"&gt;http://www.telegraph.co.uk/news/uknews/crime/8397585/Night-Stalker-police-blunders-delayed-arrest-of-Delroy-Grant.html&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. Narayan, P. A prisoner DNA database: Tamil Nadu shows the way. May 17th 2012. Available at: &lt;span&gt;&lt;a href="http://timesofindia.indiatimes.com/india/A-prisoner-DNA-database-Tamil-Nadu-shows-the-way/iplarticleshow/5938522.cms"&gt;http://timesofindia.indiatimes.com/india/A-prisoner-DNA-database-Tamil-Nadu-shows-the-way/iplarticleshow/5938522.cms&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012.&lt;br /&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. BioAxis DNA Research Centre (P) Limited. Website Available at: &lt;span&gt;&lt;a href="http://www.dnares.in/dna-databank-database-of-india.php"&gt;http://www.dnares.in/dna-databank-database-of-india.php&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;]. Times of India. AFMC to open DNA profiling centre today. February 2012. Available at:&lt;span&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2012-02-08/pune/31037108_1_dna-profile-dna-fingerprinting-data-bank"&gt;http://articles.timesofindia.indiatimes.com/2012-02-08/pune/31037108_1_dna-profile-dna-fingerprinting-data-bank&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. Siddiqui, P. UP makes DNA sampling mandatory with postmortem. Times of  India. September 4th 2012. Available  at:http://articles.timesofindia.indiatimes.com/2012-09-04/lucknow/33581061_1_dead-bodies-postmortem-house-postmortem-report.  Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. Draft DNA Human Profiling Bill 2012. Introduction&lt;br /&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Council for Responsible Genetics. Overview and Concerns Regarding the  Indian Draft DNA Profiling Bill. September 2012. Pg. 2. Available at: &lt;span&gt;&lt;a href="https://cis-india.org/internet-governance/indian-draft-dna-profiling-act.pdf/view"&gt;http://cis-india.org/internet-governance/indian-draft-dna-profiling-act.pdf/view&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012.&lt;br /&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. DNA. Aarushi case: Expert forgets samples collected from murder spot. August 28th 2012. Available at: &lt;span&gt;&lt;a href="http://www.dnaindia.com/india/report_aarushi-case-expert-forgets-samples-collected-from-murder-spot_1733957"&gt;http://www.dnaindia.com/india/report_aarushi-case-expert-forgets-samples-collected-from-murder-spot_1733957&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. India Today. Daughter rape case: French diplomat’s DNA test is inconclusive. July 7th 2012. Available at: &lt;span&gt;&lt;a href="http://indiatoday.intoday.in/story/french-diplomat-father-rapes-daughter-dna-test-bangalore/1/204270.html"&gt;http://indiatoday.intoday.in/story/french-diplomat-father-rapes-daughter-dna-test-bangalore/1/204270.html&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. The Times of India. DNA tests indicate Abhishek raped woman. May 30th 2006. Available at: &lt;span&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2006-05-30/india/27826225_1_abhishek-kasliwal-dna-fingerprinting-dna-tests"&gt;http://articles.timesofindia.indiatimes.com/2006-05-30/india/27826225_1_abhishek-kasliwal-dna-fingerprinting-dna-tests&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. Draft Human DNA Profiling Bill 2012. Section 18-27.&lt;br /&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. Department of Biotechnology. DNA Fingerprinting &amp;amp; Diagnostics, Hyderabad. Available at: &lt;span&gt;&lt;a href="http://dbtindia.nic.in/uniquepage.asp?id_pk=124"&gt;http://dbtindia.nic.in/uniquepage.asp?id_pk=124&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10 2012.&lt;br /&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. CDFD Annual Report 2010 – 2011.Pg.19. Available at: &lt;span&gt;&lt;a href="http://www.cdfd.org.in/images/AR_2010_11.pdf"&gt;http://www.cdfd.org.in/images/AR_2010_11.pdf&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. CDFD Annual Report 2006-2007.Pg. 13. Available at: &lt;span&gt;&lt;a href="http://www.cdfd.org.in/images/AR_2006_07.pdf"&gt;http://www.cdfd.org.in/images/AR_2006_07.pdf&lt;/a&gt;&lt;/span&gt;. Last accessed: October 10th 2012.&lt;br /&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. Draft Human DNA Profiling Bill 2012. Section 35&lt;br /&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Id. Section 41.&lt;br /&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;].Council for Responsible Genetics. Overview and Concerns Regarding the  Indian Draft DNA Profiling Bill. September 2012. Pg. 9 Available at: &lt;span&gt;&lt;a href="https://cis-india.org/internet-governance/indian-draft-dna-profiling-act.pdf/view"&gt;http://cis-india.org/internet-governance/indian-draft-dna-profiling-act.pdf/view&lt;/a&gt;&lt;/span&gt;. Last accessed: October 9th 2012.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/epw-web-exclusives-oct-27-2012-elonnai-hickok-rethinking-dna-profiling-india'&gt;https://cis-india.org/internet-governance/blog/epw-web-exclusives-oct-27-2012-elonnai-hickok-rethinking-dna-profiling-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-29T08:00:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-perspectives-on-the-2012-2013-goa-beach-shack-policy">
    <title>Privacy Perspectives on the 2012 -2013 Goa Beach Shack Policy </title>
    <link>https://cis-india.org/internet-governance/blog/privacy-perspectives-on-the-2012-2013-goa-beach-shack-policy</link>
    <description>
        &lt;b&gt;CCTVs in India are increasingly being employed by private organizations and the government in India as a way to increase security and prevent/ deter crime from taking place. When the government mandates the use of CCTV’s for this purpose, it often does so by means of a blunt policy mandate, requiring the installation of CCTV systems, but without any further clarification as to who should oversee the use of the cameras, what bodies should have access to the records, how access should be granted or obtained, and how long the recordings should be retained. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The lack of clarity and specificity in these requirements, the fact that these technologies are used in public spaces to collect undefined categories and amounts of information, and the fact that the technology can cut through space – and does not distinguish between private and public and primarily captures information where it is directed to, give rise to privacy concerns and raises fundamental questions about the ways in which technologies can be used to effectively increase security while still protecting the rights of individuals and the promotion of business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An example of a blanket CCTV installation requirement from the government is seen in the 2012-2013 Goa Beach Shack Policy.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; This blog will examine the shack policy from a privacy perspective, and how identification requirements are evolving. The blog will explore different principles by which surveillance technologies like CCTVs can be employed in order to promote effectiveness and protect the rights of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To help understand the current status of the Shack Policy and the extent of CCTV use in Goa, I spoke with a number of shack owners, cyber café owners, the Ministry of Tourism, and the Police of Goa. In this blog I do not use any direct quotes and write only from the perspective of my personal observations.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Current Status of the Shack Policy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This year, for the 2012-2013 tourist season, the Department of Tourism of Goa is implementing the Beach Shack Policy for regulating the establishment and running of temporary shacks at beaches in Goa. The policy applies only to the licensing, construction, maintenance, and demolition of temporary shacks on beaches owned by the government. The policy lays out requirements that must be submitted by applicants for obtaining a license and requirements relating to the operation of the shacks including size, security, health and safety, and noise control. Shacks, huts, hotels, etc. built on private land do not come under the scope of the policy. The shacks can only be bars and restaurants that can run from November 1&lt;sup&gt;st&lt;/sup&gt; through May 31&lt;sup&gt;st&lt;/sup&gt;, after which they must be taken down until the next season. The licensing of these shacks is to enable local employment opportunities in Goa. This can be seen by the requirement in the policy that Shacks are to be granted to only one member of the family who is unemployed.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; Currently, the Ministry of Tourism has almost completed the allotment of shack spaces on all beaches in Goa. The police will assist in the enforcement of the policy, but their exact role is in the process of being clarified. Before the 2012-2013 policy, shacks were regulated by annual beach shack policies, which are not available online, but can be accessed through an RTI request to the Department of Tourism. Resistance to the policy has been seen by some because of concerns that the shacks will take away business from local private owners, will block fishing boats, will cause trash and sewage problems, and create issues for free movement of people on the beach.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Inside the policy:&lt;/h2&gt;
&lt;h3&gt;Application Requirements&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To apply for a license for a temporary shack, every application must be turned in by hand and must be accompanied by a residence certificate in original issued by Village Panchayat Municipality, attested copy of ration card, four copies of a recent colored passport photos with name written on the back, attested copy of birth certificate/passport copy/Pan Card and any other information that the applicant desires to furnish, and affidavit. In addition individuals must provide their name, address, telephone number, name of the shack, name of the beach stretch, nationality, experience, and any other information they wishes to provide.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; These requirements are not excessive and have been kept to what seems minimally necessary for providing a license, though the option for individuals to provide any additional information they wish – could be used to convey meaningful information or extraneous information to the government.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Operational Requirements&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The policy has a number of operational requirements for shack owners as well. For example owners must clearly display a self identifying photograph on the shack&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; and they must agree to assist the Tourism Department and Police department in stopping any crime and violation of any law along the Beach.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy also requires that any person handling food must take a course conducted by IHMCT, GTDC, or Porvorim,&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; shacks must also be made out of eco friendly material as much as possible and the use of cement is banned,&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; and the proper disposal of trash and waste water will be the responsibility of the shack owner.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; Furthermore, foreigners working in the shacks must have a work visa,&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; and loud music is not allowed to be played after 10:30 p.m.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted in the introduction, each shack must install a CCTV surveillance system that provides real-time footage with an internal looping system in a non-invasive form. &lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; But I got to understand that the CCTV requirement will be slowly introduced and will not be implemented this year due to resistance from shack owners. When the requirement is implemented, hopefully different aspects around the use of CCTVs will be clarified including: the retention period for the recordings, access control to the recordings, the responsibilities of the shack owner, where the camera will be set up and where it needs to be directed to, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Currently in Goa there are official requirements for CCTVs to be installed in Cyber Cafes under section 144 of the CrPc. This requirement only came into effect on October 1st 2012.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;Some private hotels, huts, and restaurants run CCTV cameras for their own security purposes. When asked if CCTVs will also become mandatory for private areas, some said this will happen, while others said it would be difficult to implement.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Enforcement&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The policy uses a number of measures to ensure enforcement. For examples, successful applicants must place a security deposit of 10,000 with Director of Tourism. If any term of the policy is violated, the deposited amount will be given to the Government Treasury and the individual is required to  pay another Rs. 10,000 to continue operating.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;The placement of deck beds on the beach without authorization will also be treated as an offense under the Goa Tourist Places (protection and maintenance) Act 2001 and will be punished with a term of imprisonment minimum three months, which may extend to 3 years, and a fine which may extend to Rs. 5,000 or both. All offenses under the Act are cognizable and non-refundable. &lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; If the shack is not dismantled at the end of the season, the individual will have their application rejected for the next three years.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; Shack owners will also be penalized of they are caught discriminating against who can and cannot enter into the shack.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, though CCTV cameras can be used to ‘catch’ a number of offenses, the offenses that are penalized under the Act do not seem to require the presence of a CCTV camera. Additionally, the policy is missing penalties for the tampering and misuse of these cameras and unauthorized access to recordings.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Other practices around security and identification in Goa&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In 2011 Goa also issued a new ‘C’ form that must be filled out by foreigners entering hotels.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;The form requires twenty six categories of information to be filled out including: permanent address, next destination to be proceeded to, contact number in hotel, purpose of visit, whether employed in India, and where the foreigner arrived from. According to hotel owners, three copies of these records are made. Two are submitted to the police and one is kept with the hotel. The records kept with the hotel are often kept for an undefined time period.  In 2011 the police also enforced a new practice where every shack, hut, hotel etc. must have an all night security guard to ensure security on the beach. It was noted that registration of migrant workers is now mandatory, and that non-registered or undocumented vendors are removed from working on the beaches.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Will the 2012 – 2013 Beach Shack Policy have new implications?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In its current form, especially taking into consideration that the CCTV requirement will not be implemented immediately, the 2012 – 2013 shack policy does not seem alarming from a privacy perspective. On the general policy, though the penalties, such as the possibility of three months in prison for having too many beach chairs, seems to be  over-reaching, there are a number of  positive requirements in the policy such as the use of eco-friendly material, noise control,  and strict procedures for disposing of trash and sewage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy perspective could change when CCTVs are implemented. The amount of data that would be generated and the ambiguity around the employment of the cameras could raise a number of privacy concerns. Yet the fact that this part of the policy will only be implemented later down the road seems indicative of both the shack owners discomfort in using the technology, and perhaps the government’s recognition that a certain level of  ground work needs to be done before CCTVs are made mandatory for every shack in the state.  Hopefully before the requirement is implemented, the ground work will be set up either at a national level – in the form of a national privacy legislation, or at the state level – in the form of appropriate safeguards and procedures built into the policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the macro level, and when examined in the context of  the growing use of CCTVs by private owners, the implementation of the UID and NPR requirements in Goa, and the introduction of the new ‘C’ form for foreigners, the CCTV requirement found in the Shack Policy seems to  part of a growing trend across the country where the government seems to seek to identify all individuals and their movements/actions for unclear and undefined purposes, and looks towards identification through the collection of personal information and use of technology as a means to solve security issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, Goa is not the only city to consider mandatory installation of CCTV’s.  In Delhi, the Department of Tourism issued a similar requirement in a 2012 amendment to the “existing Guidelines for Classification/Reclassification of Hotels”. According to the amendment hotels applying for approval are required to provide documentation that security features including CCTV systems are in place.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt; Similarly, in 2011 the Delhi State Industrial and Infrastructure Development Corporation began implementing a plan to install CCTVs outside of government and private liquor shops, amounting to 550 shops in total. The goal was to use the CCTV cameras to catch individuals breaking the Excise Act on camera and use the recordings during trials. According to news coverage, the cameras are required to be capable of recording images 50 meters away and all data must be stored for a period of 30 days.&lt;a href="#fn19" name="fr19"&gt;[19]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ambiguity that exists around the legal use of many of these security systems and technologies, including CCTV’s was recently highlighted in Report of the Group of Experts on Privacy headed by Justice A.P Shah.&lt;a href="#fn20" name="fr20"&gt;[20]&lt;/a&gt; The report noted that the use of CCTV cameras and more broadly the use of electronic recording devices in India is an area that needs regulation and privacy safeguards. The report describes how the nine proposed national privacy principles of notice, choice and consent, collection limitation, purpose limitation, access and correction, disclosure of information, security, and openness, could be applied and will be affected by the use of these technologies.&lt;a href="#fn21" name="fr21"&gt;[21]&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In India and elsewhere, the police are faced on a daily basis with the challenge of preventing and responding to all types of crime, and from this perspective – any information, clue, or lead is helpful and necessary, and the potential usefulness of CCTVs in identifying criminals and to some extent deterring  crime is clear. On the other hand when CCTVs are employed without safeguards and regulations it could result in infractions of privacy and rights or could simply move the crime away from the surveilled area to an unsurveilled area.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finding a way to ensure that police have access to the information that they need and that crime is prevented, while at the same time ensuring that the rights of individuals are not compromised, and the private sectors ability to easily do business is not limited by unrealistic security requirements, is an important discussion that governments, policy makers, and the public should be having. The answer hopefully is not found in a binary game of all or nothing, surveillance or no surveillance – but instead is found through mechanisms and principles that apply to both security and privacy such as transparency, oversight, proportionality, and necessity. For example, practices around what access the police legally have via surveillance systems, retention practices, cost of implementing surveillance, and amount of surveillance undertaken each year could be made transparent to the public to ensure that the public is informed and aware of the basic information around these systems. Furthermore, clear oversight over surveillance systems including distinction between the responsibilities and liabilities can ensure that unreasonable requirements are not placed. Lastly any surveillance that is undertaken should be necessary and proportional to the crime or threat that it is being used to prevent or detect. These principles along with the defined National Privacy Principles could help measure what amount and what type of surveillance could be the most effective, and ensure that when surveillance is employed it is done in a way that also protects the rights of individuals and the private sector.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Notes&lt;/b&gt;&lt;br /&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].Ministry of Tourism. Goa Government. 2012-2013 Beach Shack Policy. Available at: &lt;a class="external-link" href="http://bit.ly/Xk18NH"&gt;http://bit.ly/Xk18NH&lt;/a&gt;. Last accessed: October 24th 2012.&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Id. Section 2.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Id. Application Requirements 1-8. Pg 1&amp;amp;2.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Section 33.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;].A part of the affidavit&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;].Id. Section 4.&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Id. Section 17.&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].Id. Section 28.&lt;br /&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Id. Section 35.&lt;br /&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;].Id. Section 37.&lt;br /&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Id. Section 38.&lt;br /&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Order No. 38/10/2006. Under Section 144 of the Code of Criminal Procedure, 1973. Available at: &lt;a class="external-link" href="http:// www.goaprintingpress.gov.in/downloads/1213/1213-28-SIII-OG.pdf"&gt;http:// www.goaprintingpress.gov.in/downloads/1213/1213-28-SIII-OG.pdf&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Beach Shack Policy 2012 - 2013, Section 16.&lt;br /&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Id. Section 18.&lt;br /&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Id. Section 22.&lt;br /&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Id. Section 32.&lt;br /&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Arrival Report of Foreigner in Hotel.”Form C” . Available at: &lt;a class="external-link" href="http://bit.ly/TbUO4S"&gt;http://bit.ly/TbUO4S&lt;/a&gt;&lt;br /&gt;[&lt;a href="#fr19" name="fn18"&gt;18&lt;/a&gt;]. Government of India. Ministry of Tourism. Amendment in the existing Guidelines for Classification / Reclassification of Hotels. June 28&lt;sup&gt;th&lt;/sup&gt; 2012. Available at: &lt;a class="external-link" href="http://bit.ly/RXtgBg"&gt;http://bit.ly/RXtgBg&lt;/a&gt;. Last Accessed: October 24th 2012.&lt;br /&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Bajpaj, Ravi. CCTV shots to check drinking outside city liquor vends. The Indian Express reproduced on the website of dsidc. December 20&lt;sup&gt;th&lt;/sup&gt; 2011. Available at: &lt;a class="external-link" href="http://bit.ly/VHwCz"&gt;http://bit.ly/VHwCz&lt;/a&gt;d. Last accessed: October 24th 2012.&lt;br /&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. GOI. Report of the Group of Experts on Privacy. October 2012. Available at: &lt;a class="external-link" href="http://bit.ly/VqzKtr"&gt;http://bit.ly/VqzKtr&lt;/a&gt;. &lt;span&gt; &lt;/span&gt;Last accessed: October 24th 2012.&lt;span&gt; &lt;/span&gt;&lt;br /&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. Id. pg. 61-62.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-perspectives-on-the-2012-2013-goa-beach-shack-policy'&gt;https://cis-india.org/internet-governance/blog/privacy-perspectives-on-the-2012-2013-goa-beach-shack-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-25T10:23:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/newstrackindia-october-18-2012-suggests-law-to-protect-individual-privacy">
    <title>Panel suggests law to protect individual privacy </title>
    <link>https://cis-india.org/news/newstrackindia-october-18-2012-suggests-law-to-protect-individual-privacy</link>
    <description>
        &lt;b&gt;A government-appointed expert panel Thursday called for a law to protect individual privacy against misuse of information collected by various agencies, public and private, and through various methods like telephone tapping.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Published in &lt;a class="external-link" href="http://www.newstrackindia.com/newsdetails/2012/10/18/389--Panel-suggests-law-to-protect-individual-privacy-.html"&gt;Newstrack India&lt;/a&gt; on October 18, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Concerns have been voiced by various quarters in the country on the possible invasion of citizen's privacy guaranteed under Article 21 of the Constitution through national programmes like Unique Identification number, reproductive rights of women, DNA profiling and brain mapping which will be implemented through the information, communication and technology (ICT) platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Minister of State for Planning Ashwani Kumar last year had constituted the experts group to identify the privacy issues and prepare a report to facilitate authoring of the privacy bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The group, headed by former Delhi High Court Chief Justice A.P. Shah, recommended setting up of a regulatory framework comprising Privacy Commissioners at the centre and regional levels to deal with privacy issues and mandatory destruction of telephone conversation after a specified period.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As regards the specific issue of phone tapping, it said "interception orders must be specific and all interceptions would only be in force for a period of 60 days and renewed for a period up to 180 days".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It suggested that the records of the conservation should be destroyed by security agencies and telephone service providers within stipulated time frame.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Records of interception must be destroyed by security agencies after six months or nine months and service providers must destroy after two or six months," it said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Acccording to an official release, the following are some of the major recommendations made in the panel's report:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The regulatory framework will consist of Privacy Commissioners at the Central and Regional levels.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;A system of co-regulation that will give self-regulating organizations at industry level choice to develop privacy standards which should be approved by a Privacy Commissioner.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Individuals would be given the choice (opt-in/opt-out) with regard to providing their personal information and the data controller would take individual consent only after providing inputs of its information practices.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The data controller shall only collect personal information from data subjects as is necessary for the purposes identified for such collection as well as process the data relevant to the purpose for which they are collected.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The data collected would be put to use for the purpose for which it has been collected. Any change in the usage would be done with the consent of the person concerned.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Data collected and processed would be relevant for the purpose and no additional data elements would be collected from the individual.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Interception orders must be specific and all interceptions would only be in force for a period of 60 days and renewed for a period up to 180 days. Records of interception must be destroyed by security agencies after 6 months or 9 months and service providers must destroy after 2 months or 6 months.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Infringement of any provision under the Act would constitute an offence by which individuals may seek compensation for an organization/bodies held accountable to.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;Note: &lt;i&gt;CIS was part of the expert committee even though not explicitly mentioned&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/newstrackindia-october-18-2012-suggests-law-to-protect-individual-privacy'&gt;https://cis-india.org/news/newstrackindia-october-18-2012-suggests-law-to-protect-individual-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-22T14:37:28Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/business-standard-october-18-2012-privacy-law-mooted-to-protect-people-against-misuse-of-info">
    <title> 	 Privacy law mooted to protect people against misuse of info</title>
    <link>https://cis-india.org/news/business-standard-october-18-2012-privacy-law-mooted-to-protect-people-against-misuse-of-info</link>
    <description>
        &lt;b&gt;A government-appointed expert group today suggested enactment of a law to protect individuals against misuse of information collected through telephone tapping, videography or any other method. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Read the original &lt;a class="external-link" href="http://www.business-standard.com/generalnews/news/privacy-law-mooted-to-protect-people-against-misuseinfo/70058/"&gt;published&lt;/a&gt; in the Business Standard on October 18, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The group headed by former Delhi High Court Chief Justice A P Shah recommended setting up of a regulatory framework comprising Privacy Commissioners at the Centre and regional levels to deal with privacy issues and mandatory destruction of telephone conversation after a specified period.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As regards the specific issue of phone tapping, it said "interception orders must be specific and all interceptions would only be in force for a period of 60 days and renewed for a period up to 180 days".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The group, set up by Minister of State for Planning Ashwani Kumar in September 2011, suggested that the records of the conversation should be destroyed by security agencies and telephone service providers within stipulated time frame.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Records of interception must be destroyed by security agencies after six months or nine months and service providers must destroy after two or six months," it said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposed law seeks to protect individuals from misuse of data collected by agencies, whether in private or public sector. It said the data of individuals should be used only for the purpose for which it was collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issues concerning privacy of individuals assume significance in view of the collection of data by multiple agencies, government as well as private, for different purposes. At present, data is being collected under programmes like Aadhar, Know Your Customer (KYC) norms, recordings of telephone conversation, DNA profiling, brain mapping, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The group, Kumar said, "has evaluated what is happening in the other country and what is the constitutional position in India... How imperatives of national security and right to privacy of individual can be harmonised".&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;The Centre for Internet &amp;amp; Society was part of the expert committee even though it is not explicitly mentioned&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-standard-october-18-2012-privacy-law-mooted-to-protect-people-against-misuse-of-info'&gt;https://cis-india.org/news/business-standard-october-18-2012-privacy-law-mooted-to-protect-people-against-misuse-of-info&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-22T10:25:53Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/dna-india-october-19-2012-saikat-datta-experts-committee-moots-law-to-protect-privacy">
    <title>Experts' committee moots law to protect privacy</title>
    <link>https://cis-india.org/news/dna-india-october-19-2012-saikat-datta-experts-committee-moots-law-to-protect-privacy</link>
    <description>
        &lt;b&gt;In its report submitted to the Planning Commission on Thursday, the first ever experts’ group to identify the privacy issues and prepare a report to facilitate authoring of the privacy bill, has said that existing laws have created an ‘unclear regulatory regime’ which allows a state to be intrusive.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Saikat Datta's article was &lt;a class="external-link" href="http://www.dnaindia.com/india/report_experts-committee-moots-law-to-protect-privacy_1753827"&gt;published&lt;/a&gt; in DNA on October 19, 2012&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The report has been prepared by experts led by justice AP Shah, former chief justice of the Delhi high court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its exceptions to the proposed law on privacy, the experts’ group has recommended that national security, public order and disclosures made in ‘public interest’ will be exempted from the limitations of privacy. Several members of the group unsuccessfully argued to bring in the Intelligence agencies which are empowered to legally tap phones, intercept emails and conduct surveillance on citizens under the ambit of the Privacy Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report, a copy of which is available with &lt;i&gt;DNA&lt;/i&gt;, recognises that there are major differences in the existing laws that permit intrusive phone-tapping or surveillance of private citizens by the government.The group feels that “these differences have created an unclear regulatory regime that is inconsistent, non-transparent, and prone to misuse and does not provide remedy or compensation to aggrieved individuals.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore, the group has recommended that when the government conducts any intrusive surveillance like phone tapping, it must adhere to the principles of proportionality, legality and remain within the boundaries of a democratic state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The limitation (on tapping phones, etc) should be in proportion to the harm that has been caused or will be caused,” the report states.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, the report also exempts the disclosure of personal or private information for journalistic or historical and scientific purposes from being curbed under the proposed Privacy Act. Interestingly, this will give journalists a legal cover from being hauled up under the proposed privacy laws when they file stories.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government is keen to enact a privacy law quickly because of two major issues. The fallout of the leakage of the tapes of Niira Radia speaking to industry heads like Ratan Tata which led to a renewed clamour for a comprehensive Privacy Act. Ironically, anything related to phone-tapping has now been left out of the provisions of such an Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other reason was the pressure from the industry that is keen to get business from abroad that deals with sensitive personal data. In the absence of any personal data protection laws, Indian companies were not getting any business from European or American firms. With this law, India can look forward to getting substantial business that involves personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With this framework in mind the experts’ group has recommended that notice be given to any individual from whom personal information will be sought. With intrusive government projects like the UID or the NATGRID, the group was worried that this kind of massive data in the hands of the government could turn this into a police state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It has also mandated that the choice and consent of the individual must be taken before collecting this information. Also, there has to be a limitation on collecting this information and anything that has been collected will use the data for only a limited purpose. A data controller should be appointed to collect, maintain and use the data under strict stipulations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore, the data controller will be made accountable for any lapse in handling or disclosure of the data. To ensure that this kind of control can be exercised, the group has suggested the appointment of privacy commissioners who will adjudicate on any matter of illegal disclosures and mete out server punishment.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Recommendations&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;National security, public order and disclosures      made in ‘public interest’ will be exempted from the limitations of privacy&lt;/li&gt;
&lt;li&gt;The limitation (on tapping phones, etc) should be      in proportion to the harm caused or will be caused&lt;/li&gt;
&lt;li&gt;Disclosure of personal or private information for      journalistic or historical and scientific purposes should be exempted from      being curbed under the proposed Act&lt;/li&gt;
&lt;li&gt;Notice be given to individual from whom      information has to be sought&lt;/li&gt;
&lt;li&gt;A data controller should be appointed to collect,      maintain and use the data &lt;/li&gt;
&lt;li&gt;Privacy commissioners who will adjudicate on any      matter of illegal disclosures be appointed&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;The Centre for Internet &amp;amp; Society was part of the expert committee even though not explicitly mentioned&lt;/i&gt;.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/dna-india-october-19-2012-saikat-datta-experts-committee-moots-law-to-protect-privacy'&gt;https://cis-india.org/news/dna-india-october-19-2012-saikat-datta-experts-committee-moots-law-to-protect-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-22T10:18:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/times-of-india-october-19-2012-govt-panel-wants-curbs-on-phone-taps">
    <title>Govt panel wants curbs on phone taps</title>
    <link>https://cis-india.org/news/times-of-india-october-19-2012-govt-panel-wants-curbs-on-phone-taps</link>
    <description>
        &lt;b&gt;A government-appointed panel on Thursday recommended several measures, including guidelines on interception of telephonic conversations, video and audio recordings, use and storage of data as well as setting up of dispute resolution entities at Centre and state-level to protect the privacy of individuals.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Read the &lt;a class="external-link" href="http://articles.timesofindia.indiatimes.com/2012-10-19/india/34582974_1_privacy-issues-identifiable-information-privacy-act"&gt;original&lt;/a&gt; published in the Times of India on October 19, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The group led by former Delhi High Court chief justice A P Shah was set up by the Planning Commission to identify privacy issues and prepare a document to facilitate the proposed Privacy Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The group was set after concerns were raised about the impact on privacy of individuals with the emergence of several national programmes such as Unique Identification number, NATGRID, DNA profiling, Reproductive Rights of &lt;a href="http://timesofindia.indiatimes.com/topic/Women"&gt;Women&lt;/a&gt;, privileged communications and brain mapping, most of which will be implemented through information and communication technology (ICT) platforms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The panel recommended that reasons for interception must be specified and be recorded in writing and the provisions establish conditions for authorization by the competent authority. It said that all interceptions can be in force for 60 days and renewed for not more than 180 days. The panel said records of interception be destroyed by the security agencies after six months or nine months and service providers must destroy records after two months or six months. It also said that intermediaries must provide an internal check to ensure the security, confidentiality and privacy of intercepted material, and intermediaries would be held legally responsible for any unauthorized access or disclosure of intercepted materials.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The panel said the proposed Act should extend the right of privacy to individuals and bring under its regulation data controllers, which includes all corporates, public/ governmental bodies and organizations. Minister of State for Planning Ashwani Kumar said, "The group has evaluated what is happening in the other country and what is the constitutional position in India... how imperatives of national security and right to privacy of individual can be harmonized."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It said the Act should clarify that publication of personal data for artistic and journalistic purposes in public interest, use of personal information for household purposes and disclosure of information as required by the RTI Act should not constitute an "infringement of privacy".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proposed Privacy Act should also articulate national privacy principles. The principles will extend and be binding to all private/ public data controllers. It said the principles must establish safeguards and procedures over the collection, processing, storage, retention, access, disclosure, destruction of sensitive personal information, personal identifiable information and identifiable information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Act should establish the Central office of the &lt;a href="http://timesofindia.indiatimes.com/topic/Privacy-Commissioner"&gt;privacy commissioner&lt;/a&gt;, regional level privacy commissioner, self regulating organizations at the industry level and data controllers and privacy officers if required at the organization level, the report recommended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The panel also recommended that the infringement of any provision under the Act should constitute as an "offence" and individuals may seek "compensation" from organizations/ bodies held accountable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The group agreed that any proposed framework for privacy legislation must be technologically neutral and interoperable with international standards. "Specifically, the Privacy Act should not make any reference to specific technologies and must be generic enough such that principle and enforcement mechanisms adaptable to changes in society, the market place, technology and government," the report said.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Note: &lt;i&gt;The Centre for Internet &amp;amp; Society was part of the expert committee even though not explicitly mentioned&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/times-of-india-october-19-2012-govt-panel-wants-curbs-on-phone-taps'&gt;https://cis-india.org/news/times-of-india-october-19-2012-govt-panel-wants-curbs-on-phone-taps&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-22T09:57:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/indianexpress-amitabh-sinha-october-19-2012-privacy-act-should-not-circumscribe-rti-expert-group">
    <title>Privacy Act should not circumscribe RTI: expert group</title>
    <link>https://cis-india.org/news/indianexpress-amitabh-sinha-october-19-2012-privacy-act-should-not-circumscribe-rti-expert-group</link>
    <description>
        &lt;b&gt;An expert group to draw the framework of a law to protect privacy of individuals has suggested that issues of personal privacy must not be used to dilute the provisions of or block information under the Right to Information Act, and used a language that almost directly contradicts the sentiments expressed by the Prime Minister in this regard just a few days ago. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Amitabh Sinha was published in the &lt;a class="external-link" href="http://www.indianexpress.com/news/privacy-act-should-not-circumscribe-rti-expert-group/1018942/0"&gt;Indian Express&lt;/a&gt; on October 19, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The group headed by Justice (retd) A P Shah has argued that the RTI Act already has provisions that protect the privacy, and such types of information are exempt from public disclosure. “When applied, the (proposed) Privacy Act should not circumscribe the Right to Information Act,” the report of the expert group, which was made public on Thursday, said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Section 8 of the (RTI) Act lists specific types of information that are exempted from public disclosure in order to protect privacy. In this way, privacy is the narrow exception to the Right to Information,” the report said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, just earlier this week, while inaugurating an annual convention of information commissioners, Prime Minister Manmohan Singh had made the opposite argument. “There is a fine balance required to be maintained between the Right to Information and the right to privacy, which stems out of the Fundamental Right to Life and Liberty,” he had said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The citizens’ right to know should definitely be circumscribed if disclosure of information encroaches upon someone’s personal privacy. But where to draw the line is a complicated question,” he had said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sibngh’s remarks had come at a time when questions were being asked about whether government money had been spent on foreign trips and medical treatment of UPA chairperson Sonia Gandhi. The government had clarified that no public money had been spent on either of the two.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The expert group under Justice Shah was constituted at the initiative of Minister of State for Planning Ashwani Kumar after an attempt by the Department of Personnel and Training (DoPT) last year to draft a privacy bill ended in a disaster. The expert group was only asked to draw up the broad contours of what a privacy law must comprise of. It has drawn from international experiences and presented nine ‘principles’ that must be accommodated in any future privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The group also recognises that the constitutional basis of privacy as “a fundamental right deriving from Article 21 of the Constitution of India”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report deals mainly with how the extensive collection of personal data — through government institutions like Census, NATGRID, UID, or through private agencies like banks, credit card companies or phone operators — must be stored, managed and eventually destroyed, if possible, without infringing on the privacy rights of an individual.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The report would now be referred to the DoPT which will then begin further consultation processes to make a fresh start at drafting a privacy law.&lt;/p&gt;
&lt;h3&gt;Suggestions on Tapping&lt;i&gt;&lt;br /&gt;&lt;/i&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The expert group has said that the system of telephone and other communication interception for security reasons has an “unclear regulatory regime that is inconsistent, non-transparent, prone to misuse, and that does not provide remedy or compensation to aggrieved individuals”. It has suggested the following:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;All orders of interceptions must be reported to a court within 15 days, disclosing the reason for interception.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;All interceptions must only be in force for 60 days, renewable up to a period of 180 days.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Reasons for interception order must be specified and recorded in writing by competent authority.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Records of interception must be destroyed by security agencies after six months, or nine months, and service providers must destroy records after two months, or six months.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;All interception orders must be sent for review by a designated committee.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Officers to whom information relating to interception can be disclosed must be specified.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Intermediaries (like telephone operators) must ensure security, confidentiality and privacy of intercepted material, and must be held legally responsible for any unauthorized access or disclosure of intercepted material.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;Note: &lt;i&gt;The Centre for Internet &amp;amp; Society was part of the expert committee even though it is not explicitly mentioned here&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/indianexpress-amitabh-sinha-october-19-2012-privacy-act-should-not-circumscribe-rti-expert-group'&gt;https://cis-india.org/news/indianexpress-amitabh-sinha-october-19-2012-privacy-act-should-not-circumscribe-rti-expert-group&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-22T09:36:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/the-hindu-aarti-dhar-october-21-2012-bill-to-create-bank-for-dna-profiling-of-accused-coming">
    <title>Bill to create bank for DNA profiling of accused coming</title>
    <link>https://cis-india.org/news/the-hindu-aarti-dhar-october-21-2012-bill-to-create-bank-for-dna-profiling-of-accused-coming</link>
    <description>
        &lt;b&gt;Access to data only for victim’s or suspect’s relatives. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This article by Aarthi Dhar was published in the &lt;a class="external-link" href="http://www.thehindu.com/news/national/bill-to-create-bank-for-dna-profiling-of-accused-coming/article4019621.ece"&gt;Hindu&lt;/a&gt; on October 21, 2012.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;A Bill to create a DNA data centre to profile people accused of serious crimes and unknown deceased is in the works. The proposal was originally mooted in 2007 but was dropped to factor in ethical, moral and legal issues on the sensitive matter.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Crafted by the Department of Biotechnology, it allows Deoxyribose Nucleic Acid (DNA) profiling for cases of culpable homicide, murder, death by negligence, miscarriage, dowry deaths, causing death of new born child, sexual assault, unnatural offences, outraging the modesty of a woman, co-habitation with a woman by deceit, adultery, enticing a married woman with criminal intent, among others.&lt;/p&gt;
&lt;p class="body"&gt;&lt;b&gt;Protecting privacy&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Addressing issues related to protecting privacy of individuals, the draft Bill envisages that access to the information in the National DNA Data Bank will be restricted to those related to the victim or suspect; any individual undergoing a sentence of imprisonment or death sentence can apply to the court which convicted him, for an order of DNA testing of specific evidence under specific conditions.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Human DNA Profiling Bill seeks to establish a DNA Profiling Board that will lay down the standards for laboratories, collection of human body substances and custody trail from collection to reporting. It also has a provision for setting up a National DNA Data Bank.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The DNA analysis of body substances that makes it possible to determine whether the source of origin of one body substance is identical to that of another, and to establish the biological relationship, if any, between two individuals.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The “forensic material” from which the DNA sample can be lifted is biological material from the body and represents intimate body samples. They include blood, semen, or any other tissue fluid.&lt;/p&gt;
&lt;p class="body"&gt;&lt;b&gt;DNA Profiling Board&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As envisaged in the Bill, the DNA Profiling Board at the national level, with similar structures at the State level, will be headed by a renowned molecular biologist with the other members being from police, legal, biological and related fields.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It will deliberate and advise on all ethical and human rights issues emanating out of DNA profiling in consonance with the United Nations vis-à-vis the rights and privacy of citizens, civil liberties and issues having ethical and other social implications.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Board will make recommendations on the use and dissemination of DNA information, ensure the accuracy, security and confidentiality of DNA and guidelines destruction of obsolete, expunged or inaccurate information.&lt;/p&gt;
&lt;p class="body"&gt;&lt;b&gt;Jail, fine for data misuse&lt;/b&gt;&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;It will also will lay down standards and procedures for establishment and functioning of DNA laboratories and Data Banks and prepare guidelines for storage of biological substances and their destruction. Any misuse of DNA data will attract imprisonment up to three years and monetary fine.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The working draft of the Bill has been sent to the Centre for Internet and Society for analysis and comments. The Citizens Forum for Civil Liberties has already opposed the proposed legislation and sought pre-emptive intervention to stop “dangerous” erosion of privacy by DNA profiling of citizens.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In a representation submitted to the National Human Rights Commission, the Forum has said DNA profiling is “undesirable, particularly as forensic DNA developments are intertwined with significant changes in legislation and contentious issues of privacy, civil liberty and social justice.”&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The Forum has sought “immediate intervention to safeguard citizens’ privacy and their civil liberties, which face an unprecedented onslaught from the provisions of the DNA Profiling Bill and other related surveillance measures being bulldozed by unregulated and ungovernable technology.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/the-hindu-aarti-dhar-october-21-2012-bill-to-create-bank-for-dna-profiling-of-accused-coming'&gt;https://cis-india.org/news/the-hindu-aarti-dhar-october-21-2012-bill-to-create-bank-for-dna-profiling-of-accused-coming&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-22T09:15:43Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones">
    <title>Court’s approval needed to tap phones: Panel</title>
    <link>https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones</link>
    <description>
        &lt;b&gt;Investigators can monitor a person for 15-20 days on executive orders in case of emergencies, suggests panel.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Surabhi Agarwal's article was published in &lt;a class="external-link" href="http://www.livemint.com/Politics/TKvdGjj2mMcp2FNgwIVLeP/Courts-approval-needed-to-tap-phones.html"&gt;LiveMint&lt;/a&gt; on October 18, 2012. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Government agencies need judicial permission before intercepting any communication or starting surveillance of any individual, a panel on the proposed privacy law suggested on Thursday.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If there is any urgency, investigators can tap phones or monitor a person’s movements for 15-20 days on executive orders but will then have to approach the courts to continue, the committee led by retired Delhi high court judge &lt;a href="http://www.livemint.com/Search/Link/Keyword/Ajit%20P.%20Shah"&gt;Ajit P. Shah&lt;/a&gt; recommended.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Phone tapping under the present regime is done under executive permission whereas in other countries it is done only with the permission of the courts,” Shah said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Security agencies currently require permission from home secretaries, either at the Centre or the states, to set up wiretaps or monitor emails. An oversight group of the cabinet, law and telecom secretaries at the Centre reviews all such authorizations.&lt;/p&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt; &lt;iframe frameborder="0" height="250" src="http://www.youtube.com/embed/LntqxttkTuE" width="300"&gt;&lt;/iframe&gt; &lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The government established the Shah committee in Feburary under the Planning Commission to study international best practices on privacy and surveillance after concerns arose on misuse of information collected by official agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Shah said on Thursday that the committee was “not interested” in preparing a privacy law but has only laid down the principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The department of personnel and training will deliberate on the panel’s recommendations and then draft a legislation, said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Ashwani%20Kumar"&gt;Ashwani Kumar&lt;/a&gt;, junior minister in the Planning Commission.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The Shah panel has recommended appointing privacy commissioners and a system under which organizations will have to develop privacy standards that will be approved by a commissioner as a means of self-regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sectoral industry associations would form a code of conduct for companies that will comply with law as they will be approved by the privacy commissioner, according to &lt;a href="http://www.livemint.com/Search/Link/Keyword/Kamlesh%20Bajaj"&gt;Kamlesh Bajaj&lt;/a&gt;, chief executive officer of Data Security Council of India, one of the members of the committee. “These associations could also act as alternative dispute-resolution mechanisms,” Bajaj said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The committee’s other recommendations include giving individuals a choice to provide personal information, collection of only critical personal information, use of data only for the purpose for which it has been collected, and a penalty for violations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Without a comprehensive horizontal regulatory framework and the office of the regulator both private and public entities in India have been trampling on the rights of citizens without complying to any of the international best practices when it comes to protecting the right to privacy,” said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Sunil%20Abraham"&gt;Sunil Abraham&lt;/a&gt;, executive director of Centre for Internet and Society, a Bangalore-based advocacy group. After the privacy law is enacted and the office of a privacy commissioner is created, people will be able to seek redressal against these erring pubic and private entities if their rights are violated, he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has been looking to enact a privacy law to ensure data collected by various programmes such as the National Population Register, Unique Identification Authority of India and National Intelligence Grid was not misused. It was expected to scotch criticism of these programmes by privacy and Internet activists. It later expanded the scope of the proposed legislation after catching flak for a leak of tapped conversations between corporate lobbyist &lt;a href="http://www.livemint.com/Search/Link/Keyword/Niira%20Radia"&gt;Niira Radia&lt;/a&gt;, industrialists and journalists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government now aims to uphold the right of all Indians against any misuse of personal information, interception of personal communication, unlawful surveillance and unwanted commercial communication. That means it effectively covers everything from the misuse of data collected by the government to spam.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there could be opposition from law enforcement agencies if the privacy law mandates that prior permission of the courts will be required before intercepting communication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If judges begin taking a call on interception requests, there could be chances of leakage, “since there are so many judges at so many levels”, said &lt;a href="http://www.livemint.com/Search/Link/Keyword/Rumel%20Dahiya"&gt;Rumel Dahiya&lt;/a&gt;, deputy director general at Institute of Defence Studies and Analyses, a New delhi-based think tank. “The government carries out surveillance to gain fool-proof intelligence. That purpose will be defeated.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Last week, Prime Minister &lt;a href="http://www.livemint.com/Search/Link/Keyword/Manmohan%20Singh"&gt;Manmohan Singh&lt;/a&gt; said a fine balance needs to be maintained between the right to information and the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Shah committee included representatives from the private sector, the department of information technology, ministry of home affairs, department of telecommunication, the law ministry and the department of personnel and training.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Kirthi V. Rao contributed to this story.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones'&gt;https://cis-india.org/news/livemint-october-18-2012-surabhi-agarwal-courts-approval-needed-to-tap-phones&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-10-22T07:02:34Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
