<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 121 to 135.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-national-privacy-principles"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-international-ambika-tandon-october-17-2019-mother-and-child-tracking-system-understanding-data-trail-indian-healthcare"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india-privacy-monitor-map"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/akriti-bopanna-and-gurshabad-grover-july-3-2019-impact-of-consolidation-in-the-internet-economy-on-the-evolution-of-the-internet"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/high-level-privacy-report"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/the-high-level-privacy-conclave"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/national-data-governance-framework-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings">
    <title>The National Privacy Roundtable Meetings</title>
    <link>https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society ("CIS"), the Federation of Indian Chambers of Commerce and Industry ("FICCI"), the Data Security Council of India ("DSCI") and Privacy International are, in partnership, conducting a series of national privacy roundtable meetings across India from April to October 2013. The roundtable meetings are designed to discuss possible frameworks to privacy in India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Background: The Roundtable Meetings and Organisers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/"&gt;CIS&lt;/a&gt; is a Bangalore-based non-profit think-tank and research organisation with interests in, amongst other fields, the law, policy and practice of free speech and privacy in India. &lt;a href="http://www.ficci.com/"&gt;FICCI&lt;/a&gt; is a non-governmental, non-profit association of approximately 250,000 Indian bodies corporate. It is the oldest and largest organisation of businesses in India and represents a national corporate consensus on policy issues. &lt;a href="http://www.dsci.in/"&gt;DSCI&lt;/a&gt; is an initiative of the National Association of Software and Service Companies, a non-profit trade association of Indian information technology ("IT") and business process outsourcing ("BPO") concerns, which promotes data protection in India. &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt; is a London-based non-profit organisation that defends and promotes the right to privacy across the world.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy in the Common Law and in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Because privacy is a multi-faceted concept, it has rarely been singly regulated. A taxonomy of privacy yields many types of individual and social activity to be differently regulated based on the degree of harm that may be caused by intrusions into these activities.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nature of the activity is significant; activities that are implicated by the state are attended by public law concerns and those conducted by private persons &lt;i&gt;inter se&lt;/i&gt; demand market-based regulation. Hence, because the principles underlying warranted police surveillance differ from those prompting consensual collections of personal data for commercial purposes, legal governance of these different fields must proceed differently. For this and other reasons, the legal conception of privacy — as opposed to its cultural construction – has historically been diverse and disparate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditionally, specific legislations have dealt separately with individual aspects of privacy in tort law, constitutional law, criminal procedure and commercial data protection, amongst other fields. The common law does not admit an enforceable right to privacy.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; In the absence of a specific tort of privacy, various equitable remedies, administrative laws and lesser torts have been relied upon to protect the privacy of claimants.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question of whether privacy is a constitutional right has been the subject of limited judicial debate in India. The early cases of &lt;i&gt;Kharak Singh&lt;/i&gt; (1964)&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; and &lt;i&gt;Gobind&lt;/i&gt; (1975)&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; considered privacy in terms of physical surveillance by the police in and around the homes of suspects and, in the latter case, the Supreme Court of India found that some of the Fundamental Rights “could be described as contributing to the right to privacy” which was nevertheless subject to a compelling public interest. This inference held the field until 1994 when, in the &lt;i&gt;Rajagopal&lt;/i&gt; case (1994),&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty guaranteed by Article 21 of the Constitution of India. However, &lt;i&gt;Rajagopal&lt;/i&gt; dealt specifically with a book, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case (1996)&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; and, while finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards.&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;A more robust statement of the right to privacy was made recently by the Delhi High Court in the &lt;i&gt;Naz &lt;/i&gt;&lt;i&gt;Foundation&lt;/i&gt; case (2011)&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;that de-criminalised consensual homosexual acts; however, this judgment is now in appeal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Attempts to Create a Statutory Regime&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The silence of the common law leaves the field of privacy in India open to occupation by statute. With the recent and rapid growth of the Indian IT and BPO industry, concerns regarding the protection of personal data to secure privacy have arisen. In May 2010, the European Union ("EU") commissioned an assessment of the adequacy of Indian data protection laws to evaluate the continued flow of personal data of European data subjects into India for processing. That assessment made adverse findings on the adequacy and preparedness of Indian data protection laws to safeguard personal data.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Conducted amidst negotiations for a free trade agreement between India and the EU, the failed assessment potentially impeded the growth of India’s outsourcing industry that is heavily reliant on European and North American business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, the Department of Electronics and Information Technology of the Ministry of Communications and Information Technology, Government of India, issued subordinate legislation under the rule-making power of the Information Technology Act, 2000 ("IT Act"), to give effect to section 43A of that statute. These rules – the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 ("Personal Data Rules")&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; — were subsequently reviewed by the Committee on Subordinate Legislation of the 15&lt;sup&gt;th&lt;/sup&gt; Lok Sabha.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; The Committee found that the Personal Data Rules contained clauses that were ambiguous, invasive of privacy and potentially illegal.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, a draft privacy legislation called the ‘Right to Privacy Bill, 2011’, which was drafted within the Department of Personnel and Training ("DoPT") of the Ministry of Personnel, Public Grievances and Pensions, Government of India,  was made available on the internet along with several file notings ("First DoPT Bill"). The First DoPT Bill contained provisions for the regulation of personal data, interception of communications, visual surveillance and direct marketing. The First DoPT Bill was referred to a Committee of Secretaries chaired by the Cabinet Secretary which, on 27 May 2011, recommended several changes including re-drafts of the chapters relating to interception of communications and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aware of the need for personal data protection laws to enable economic growth, the Planning Commission constituted a Group of Experts under the chairmanship of Justice Ajit P. Shah, a retired Chief Justice of the Delhi High Court who delivered the judgment in the &lt;i&gt;Naz Foundation&lt;/i&gt; case, to study foreign privacy laws, analyse existing Indian legal provisions and make specific proposals for incorporation into future Indian law. The Justice Shah Group of Experts submitted its Report to the Planning Commission on 16 October 2012 wherein it proposed the adoption of nine National Privacy Principles.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; These are the principles of notice, choice and consent, collection limitation, purpose limitation, disclosure of information, security, openness, and accountability. The Report recommended the application of these principles in laws relating to interception of communications, video and audio recordings, use of personal identifiers, bodily and genetic material, and personal data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Criminal Procedure and Special Laws Relating to Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While the &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; cases first brought the questions of permissibility and limits of police surveillance to the Supreme Court, the power to collect information and personal data of a person is firmly embedded in Indian criminal law and procedure. Surveillance is an essential condition of the nation-state; the inherent logic of its foundation requires the nation-state to perpetuate itself by interdicting threats to its peaceful existence. Surveillance is a method by which the nation-state’s agencies interdict those threats. The challenge for democratic countries such as India is to find the optimal balance between police powers of surveillance and the essential freedoms of its citizens, including the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regime governing the interception of communications is contained in section 5(2) of the Indian Telegraph Act, 1885 ("Telegraph Act") read with rule 419A of the Indian Telegraph Rules, 1951 ("Telegraph Rules"). The Telegraph Rules were amended in 2007&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; to give effect to, amongst other things, the procedural safeguards laid down by the Supreme Court in the &lt;i&gt;PUCL&lt;/i&gt; case. However, India’s federal scheme permits States to also legislate in this regard. Hence, in addition to the general law on interceptions contained in the Telegraph Act and Telegraph Rules, some States have also empowered their police forces with interception functions in certain cases.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; Ironically, even though some of these State laws invoke heightened public order concerns to justify their invasions of privacy, they establish procedural safeguards based on the principle of probable cause that surpasses the Telegraph Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, further subordinate legislation issued to fulfil the provisions of sections 69(2) and 69B(3) of the IT Act permit the interception and monitoring of electronic communications — including emails — to collect traffic data and to intercept, monitor, and decrypt electronic communications.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The proposed Privacy (Protection) Bill, 2013 and Roundtable Meetings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In this background, the proposed Privacy (Protection) Bill, 2013 seeks to protect privacy by regulating (i) the manner in which personal data is collected, processed, stored, transferred and destroyed — both by private persons for commercial gain and by the state for the purpose of governance; (ii) the conditions upon which, and procedure for, interceptions of communications — both voice and data communications, including both data-in-motion and data-at-rest — may be conducted and the authorities permitted to exercise those powers; and, (iii) the manner in which forms of surveillance not amounting to interceptions of communications — including the collection of intelligence from humans, signals, geospatial sources, measurements and signatures, and financial sources — may be conducted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous roundtable meetings to seek comments and opinion on the proposed Privacy (Protection) Bill, 2013 took place at:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;New Delhi: April 13, 2013 (&lt;a class="external-link" href="http://bit.ly/17REl0W"&gt;http://bit.ly/17REl0W&lt;/a&gt;) with 45 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Bangalore: April 20, 2013 (&lt;a class="external-link" href="http://bit.ly/162t8rU"&gt;http://bit.ly/162t8rU&lt;/a&gt;) with 45 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Chennai: May 18, 2013 (&lt;a class="external-link" href="http://bit.ly/12ICGYD"&gt;http://bit.ly/12ICGYD&lt;/a&gt;) with 25 participants.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mumbai, June 15, 2013 (&lt;a class="external-link" href="http://bit.ly/12fJSvZ"&gt;http://bit.ly/12fJSvZ&lt;/a&gt;) with 20 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kolkata: July 13, 2013 (&lt;a class="external-link" href="http://bit.ly/11dgINZ"&gt;http://bit.ly/11dgINZ&lt;/a&gt;) with 25 participants; and&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;New Delhi: August 24, 2013 (&lt;a class="external-link" href="http://bit.ly/195cWIf"&gt;http://bit.ly/195cWIf&lt;/a&gt;) with 40 participants.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The roundtable meetings were multi-stakeholder events with participation from industry representatives, lawyers, journalists, civil society organizations and Government representatives. On an average, 75 per cent of the participants represented industry concerns, 15 per cent represented civil society and 10 per cent represented regulatory authorities. The model followed at the roundtable meetings allowed for equal participation from all participants.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See generally, Dan Solove, “A Taxonomy of Privacy” &lt;i&gt;University of Pennsylvania Law Review&lt;/i&gt; (Vol. 154, No. 3, January 2006).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office&lt;/i&gt; [2003] UKHL 53.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See &lt;i&gt;A&lt;/i&gt; v. &lt;i&gt;B plc&lt;/i&gt; [2003] QB 195; &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office &lt;/i&gt;[2001] EWCA Civ 2081; &lt;i&gt;R (Ellis)&lt;/i&gt; v. &lt;i&gt;Chief Constable of Essex Police&lt;/i&gt; [2003] EWHC 1321 (Admin).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of Uttar Pradesh&lt;/i&gt; AIR 1963 SC 1295.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;i&gt;Gobind&lt;/i&gt; v. &lt;i&gt;State of Madhya Pradesh&lt;/i&gt; AIR 1975 SC 1378.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;R. Rajagopal&lt;/i&gt; v. &lt;i&gt;State of Tamil Nadu&lt;/i&gt; AIR 1995 SC 264.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;i&gt;People’s Union for Civil Liberties&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; (1997) 1 SCC 30.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. A Division Bench of the Supreme Court of India comprising Kuldip Singh and Saghir Ahmad, JJ, found that the procedure set out in section 5(2) of the Indian Telegraph Act, 1885 and rule 419 of the Indian Telegraph Rules, 1951 did not meet the “just, fair and reasonable” test laid down in &lt;i&gt;Maneka Gandhi&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; AIR 1978 SC 597 requisite for the deprivation of the right to personal liberty, from whence the Division Bench found a right to privacy emanated, guaranteed under Article 21 of the Constitution of India. Therefore, Kuldip Singh, J, imposed nine additional procedural safeguards that are listed in paragraph 35 of the judgment.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;i&gt;Naz Foundation&lt;/i&gt; v. &lt;i&gt;Government of NCT Delhi&lt;/i&gt; (2009) 160 DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. The 2010 data adequacy assessment of Indian data protection laws was conducted by Professor Graham Greenleaf. His account of the process and his summary of Indian law can found at Graham Greenleaf, "Promises and Illusions of Data Protection in Indian Law"&lt;i&gt; International Data Privacy Law&lt;/i&gt; (47-69, Vol. 1, No. 1, March 2011).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The Rules were brought into effect vide Notification GSR 313(E) on 11 April 2011. CIS submitted comments on the Rules that can be found here – &lt;a href="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011"&gt;http://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. The Committee on Subordinate Legislation, a parliamentary ‘watchdog’ committee, is mandated by rules 317-322 of the Rules of Procedure and Conduct of Business in the Lok Sabha (14&lt;sup&gt;th&lt;/sup&gt; edn., New Delhi: Lok Sabha Secretariat, 2010) to examine the validity of subordinate legislation.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. See the 31&lt;sup&gt;st&lt;/sup&gt; Report of the Committee on Subordinate Legislation that was presented on 21 March 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. See paragraphs 7.14-7.17 on pages 69-72 of the Report of the Group of Experts on Privacy, 16 October 2012, Planning Commission, Government of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. See, the Indian Telegraph (Amendment) Rules, 2007, which were brought into effect &lt;i&gt;vide&lt;/i&gt; Notification GSR 193(E) of the Department of Telecommunications of the Ministry of Communications and Information Technology, Government of India, dated 1 March 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. See, &lt;i&gt;inter alia&lt;/i&gt;, section 14 of the Maharashtra Control of Organised Crime Act, 1999; section 14 of the Andhra Pradesh Control of Organised Crime Act, 2001; and, section 14 of the Karnataka Control of Organised Crime Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. See, the Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data and Information) Rules, 2009 vide GSR 782 (E) dated 27 October 2009; and, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 vide GSR 780 (E) dated 27 October 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings'&gt;https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-21T10:03:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-national-privacy-principles">
    <title>The National Privacy Principles</title>
    <link>https://cis-india.org/internet-governance/blog/the-national-privacy-principles</link>
    <description>
        &lt;b&gt;In this infographic, we try to break down the National Privacy Principles developed by the Group of Experts on Privacy led by the Former Chief Justice A.P. Shah in 2012.&lt;/b&gt;
        
&lt;p&gt;&lt;strong&gt;License:&lt;/strong&gt; It is shared under Creative Commons &lt;a href="https://creativecommons.org/licenses/by/4.0/"&gt;Attribution 4.0 International&lt;/a&gt; License.&lt;/p&gt;
&lt;p&gt;&lt;img alt="" /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-national-privacy-principles'&gt;https://cis-india.org/internet-governance/blog/the-national-privacy-principles&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pooja Saxena and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-03-21T09:48:23Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-international-ambika-tandon-october-17-2019-mother-and-child-tracking-system-understanding-data-trail-indian-healthcare">
    <title>The Mother and Child Tracking System - understanding data trail in the Indian healthcare systems</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-international-ambika-tandon-october-17-2019-mother-and-child-tracking-system-understanding-data-trail-indian-healthcare</link>
    <description>
        &lt;b&gt;Reproductive health programmes in India have been digitising extensive data about pregnant women for over a decade, as part of multiple health information systems. These can be seen as precursors to current conceptions of big data systems within health informatics. In this article, published by Privacy International, Ambika Tandon presents some findings from a recently concluded case study of the MCTS as an example of public data-driven initiatives in reproductive health in India. &lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;This article was first published by &lt;a href="https://privacyinternational.org/news-analysis/3262/mother-and-child-tracking-system-understanding-data-trail-indian-healthcare" target="_blank"&gt;Privacy International&lt;/a&gt;, on October 17, 2019&lt;/h4&gt;
&lt;h4&gt;Case study of MCTS: &lt;a href="https://cis-india.org/raw/big-data-reproductive-health-india-mcts" target="_blank"&gt;Read&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;p&gt;On October 17th 2019, the UN Special Rapporteur (UNSR) on Extreme Poverty and Human Rights, Philip Alston, released his thematic report on digital technology, social protection and human rights. Understanding the impact of technology on the provision of social protection – and, by extent, its impact on people in vulnerable situations – has been part of the work the Centre for Internet and Society (CIS) and Privacy International (PI) have been doing.&lt;/p&gt;
&lt;p&gt;Earlier this year, &lt;a href="https://privacyinternational.org/advocacy/2996/privacy-internationals-submission-digital-technology-social-protection-and-human" target="_blank"&gt;PI responded&lt;/a&gt; to the UNSR's consultation on this topic. We highlighted what we perceived as some of the most pressing issues we had observed around the world when it comes to the use of technology for the delivery of social protection and its impact on the right to privacy and dignity of benefit claimants.&lt;/p&gt;
&lt;p&gt;Among them, automation and the increasing reliance on AI is a topic of particular concern - countries including Australia, India, the UK and the US have already started to adopt these technologies in digital welfare programmes. This adoption raises significant concerns about a quickly approaching future, in which computers decide whether or not we get access to the services that allow us to survive. There's an even more pressing problem. More than a few stories have emerged revealing the extent of the bias in many AI systems, biases that create serious issues for people in vulnerable situations, who are already exposed to discrimination, and made worse by increasing reliance on automation.&lt;/p&gt;
&lt;p&gt;Beyond the issue of AI, we think it is important to look at welfare and automation with a wider lens. In order for an AI to function it needs to be trained on a dataset, so that it can understand what it is looking for. That requires the collection large quantities of data. That data would then be used to train and AI to recognise what fraudulent use of public benefits would look like. That means we need to think about every data point being collected as one that, in the long run, will likely be used for automation purposes.&lt;/p&gt;
&lt;p&gt;These systems incentivise the mass collection of people's data, across a huge range of government services, from welfare to health - where women and gender-diverse people are uniquely impacted. CIS have been looking specifically at reproductive health programmes in India, work which offers a unique insight into the ways in which mass data collection in systems like these can enable abuse.&lt;/p&gt;
&lt;p&gt;Reproductive health programmes in India have been digitising extensive data about pregnant women for over a decade, as part of multiple health information systems. These can be seen as precursors to current conceptions of big data systems within health informatics. India’s health programme instituted such an information system in 2009, the Mother and Child Tracking System (MCTS), which is aimed at collecting data on maternal and child health. The Centre for Internet and Society, India, &lt;a href="https://cis-india.org/raw/big-data-reproductive-health-india-mcts" target="_blank"&gt;undertook a case study of the MCTS&lt;/a&gt; as an example of public data-driven initiatives in reproductive health. The case study was supported by the &lt;a href="http://bd4d.net/" target="_blank"&gt;Big Data for Development network&lt;/a&gt; supported by the International Development Research Centre, Canada. The objective of the case study was to focus on the data flows and architecture of the system, and identify areas of concern as newer systems of health informatics are introduced on top of existing ones. The case study is also relevant from the perspective of Sustainable Development Goals, which aim to rectify the tendency of global development initiatives to ignore national HIS and create purpose-specific monitoring systems.&lt;/p&gt;
&lt;p&gt;After being launched in 2011, 120 million (12 crore) pregnant women and 111 million (11 crore) children have been registered on the MCTS as of 2018. The central database collects data on each visit of the woman from conception to 42 days postpartum, including details of direct benefit transfer of maternity benefit schemes. While data-driven monitoring is a critical exercise to improve health care provision, publicly available documents on the MCTS reflect the complete absence of robust data protection measures. The risk associated with data leaks are amplified due to the stigma associated with abortion, especially for unmarried women or survivors of rape.&lt;/p&gt;
&lt;p&gt;The historical landscape of reproductive healthcare provision and family planning in India has been dominated by a target-based approach. Geared at population control, this approach sought to maximise family planning targets without protecting decisional autonomy and bodily privacy for women. At the policy level, this approach was shifted in favour of a rights-based approach to family planning in 1994. However, targets continue to be set for women’s sterilisation on the ground. Surveillance practices in reproductive healthcare are then used to monitor under-performing regions and meet sterilisation targets for women, this continues to be the primary mode of contraception offered by public family planning initiatives.&lt;/p&gt;
&lt;p&gt;More recently, this database -&amp;nbsp;among others collecting data about reproductive health - is adding biometric information through linkage with the Aadhaar infrastructure. This data adds to the sensitive information being collected and stored without adhering to any publicly available data protection practices. Biometric linkage is aimed to fulfill multiple functions - primarily authentication of welfare beneficiaries of the national maternal benefits scheme. Making Aadhaar details mandatory could directly contribute to the denial of service to legitimate patients and beneficiaries - as has already been seen in some cases.&lt;/p&gt;
&lt;p&gt;The added layer of biometric surveillance also has the potential to enable other forms of abuse of privacy for pregnant women. In 2016, the union minister for Women and Child Development under the previous government suggested the use of strict biometric-based monitoring to discourage gender-biased sex selection. Activists critiqued the policy for its paternalistic approach to reduce the rampant practice of gender-biased sex selection, rather than addressing the root causes of gender inequality in the country.&lt;/p&gt;
&lt;p&gt;There is an urgent need to rethink the objectives and practices of data collection in public reproductive health provision in India. Rather than continued focus on meeting high-level targets, monitoring systems should enable local usage and protect the decisional autonomy of patients. In addition, the data protection legislation in India - expected to be tabled in the next session in parliament - should place free and informed consent, and informational privacy at the centre of data-driven practices in reproductive health provision.&lt;/p&gt;
&lt;p&gt;This is why the systematic mass collection of data in health services is all the more worrying. When the collection of our data becomes a condition for accessing health services, it is not only a threat to our right to health that should not be conditional on data sharing but also it raises questions as to how this data will be used in the age of automation.&lt;/p&gt;
&lt;p&gt;This is why understanding what data is collected and how it is collected in the context of health and social protection programmes is so important.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-international-ambika-tandon-october-17-2019-mother-and-child-tracking-system-understanding-data-trail-indian-healthcare'&gt;https://cis-india.org/internet-governance/blog/privacy-international-ambika-tandon-october-17-2019-mother-and-child-tracking-system-understanding-data-trail-indian-healthcare&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>ambika</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Research</dc:subject>
    
    
        <dc:subject>BD4D</dc:subject>
    
    
        <dc:subject>Healthcare</dc:subject>
    
    
        <dc:subject>Big Data for Development</dc:subject>
    

   <dc:date>2019-12-30T17:18:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system">
    <title>The Last Chance for a Welfare State Doesn’t Rest in the Aadhaar System</title>
    <link>https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system</link>
    <description>
        &lt;b&gt;Boosting welfare is the message, which is how Aadhaar is being presented in India. The Aadhaar system as a medium, however, is one that enables tracking, surveillance, and data monetisation. This piece by Sumandro Chattapadhyay was published in The Wire on April 19, 2016.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Originally published in and cross-posted from &lt;a href="http://thewire.in/2016/04/19/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system-30256/"&gt;The Wire&lt;/a&gt;.&lt;/em&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Once upon a time, a king desired that his parrot should be taught all the ancient knowledge of the kingdom. The priests started feeding the pages of the great books to the parrot with much enthusiasm. One day, the king asked the priests if the parrot’s education has completed. The priests poked the belly of the parrot but it made no sound. Only the rustle of undigested pages inside the belly could be heard. The priests declared that the parrot is indeed a learned one now.&lt;/p&gt;
&lt;p&gt;The fate of the welfare system in our country is quite similar to this parrot from Tagore’s parable. It has been forcefully fed identification cards and other official documents (often four copies of the same) for years, and always with the same justification of making it more effective and fixing the leaks. These identification regimes are in effect killing off the welfare system. And some may say that that has been the actual plan in any case.&lt;/p&gt;
&lt;p&gt;The Aadhaar number has been recently offered as &lt;a href="http://indianexpress.com/article/opinion/columns/aadhaar-project-uidai-last-chance-for-a-welfare-state/"&gt;the ‘last chance’ for the ailing welfare system&lt;/a&gt; – a last identification regime that it needs to gulp down to survive. This argument wilfully overlooks the acute problems with the Aadhaar project.&lt;/p&gt;
&lt;p&gt;Firstly, the ‘last chance’ for a welfare state in India is not provided by implementing a new and improved identification regime (Aadhaar numbers or otherwise), but by enabling citizens to effectively track, monitor, and ensure delivery of welfare, services, and benefits. This ‘opening up’ of the welfare bureaucracy has been most effectively initiated by the Right to Information Act. Instead of a centralised biometrics-linked identity verification platform, which gives the privilege of tracking and monitoring welfare flows only to a few expert groups, an effective welfare state requires the devolution of such privilege and responsibility.&lt;/p&gt;
&lt;p&gt;We should harness the tracking capabilities of electronic financial systems to disclose how money belonging to the Consolidated Fund of India travel around state agencies and departmental levels. Instead, the Aadhaar system effectively stacks up a range of entry barriers to accessing welfare – from malfunctioning biometric scanners, to connectivity problems, to the burden of keeping one’s fingerprint digitally legible under all labouring and algorithmic circumstances.&lt;/p&gt;
&lt;p&gt;Secondly, authentication of welfare recipients by Aadhaar number neither make the welfare delivery process free of techno-bureaucratic hurdles, nor does it exorcise away corruption. Anumeha Yadav has recently documented the emerging &lt;a href="http://scroll.in/article/805909/in-rajasthan-there-is-unrest-at-the-ration-shop-because-of-error-ridden-aadhaar"&gt;‘unrest at the ration shop’ across Rajasthan&lt;/a&gt;, as authentication processes face technical and connectivity delays, people get ‘locked out’ of public services for not having or having Aadhaar number with incorrect demographic details, and no mechanisms exist to provide rapid and definitive recourse.&lt;/p&gt;
&lt;p&gt;RTI activists at the &lt;a href="http://www.snsindia.org/"&gt;Satark Nagrik Sangathan&lt;/a&gt; have highlighted that the Delhi ration shops, using Aadhaar-based authentication, maintain only two columns of data to describe people who have come to the shop – those who received their ration, and those who did not (without any indication of the reason). This leads to erasure-by-design of evidence of the number of welfare-seekers who are excluded from welfare services when the Aadhaar-based authentication process fails (for valid reasons, or otherwise).&lt;/p&gt;
&lt;p&gt;Reetika Khera has made it very clear that using Aadhaar Payments Bridge to directly transfer cash to a beneficiary’s account, in the best case scenario, &lt;a href="http://www.epw.in/journal/2013/05/commentary/cost-benefit-analysis-uid.html"&gt;may only take care of one form of corruption&lt;/a&gt;: deception (a different person claiming to be the beneficiary). But it does not address the other two common forms of public corruption: collusion (government officials approving undue benefits and creating false beneficiaries) and extortion (forceful rent seeking after the cash has been transferred to the beneficiary’s account). Evidently, going after only deception does not make much sense in an environment where collusion and extortion are commonplace.&lt;/p&gt;
&lt;p&gt;Thirdly, the ‘relevant privacy question’ for Aadhaar is not limited to how UIDAI protects the data collected by it, but expands to usage of Aadhaar numbers across the public and private sectors. The privacy problem created by the Aadhaar numbers does begin but surely not end with internal data management procedures and responsibilities of the UIDAI.&lt;/p&gt;
&lt;p&gt;On one hand, the Aadhaar Bill 2016 has reduced the personal data sharing restrictions of the NIAI Bill 2010, and &lt;a href="http://scroll.in/article/806297/no-longer-a-black-box-why-does-the-revised-aadhar-bill-allow-sharing-of-identity-information"&gt;has allowed for sharing of all data except core biometrics (fingerprints and iris scan)&lt;/a&gt; with all agencies involved in authentication of a person through her/his Aadhaar number. These agencies have been asked to seek consent from the person who is being authenticated, and to inform her/him of the ways in which the provided data (by the person, and by UIDAI) will be used by the agency. In careful wording, the Bill only asks the agencies to inform the person about “alternatives to submission of identity information to the requesting entity” (Section 8.3) but not to provide any such alternatives. This facilitates and legalises a much wider collection of personal demographic data for offering of services by public agencies “or any body corporate or person” (Section 57), which is way beyond the scope of data management practices of UIDAI.&lt;/p&gt;
&lt;p&gt;On the other hand, the Aadhaar number is being seeded to all government databases – from lists of HIV patients, of rural citizens being offered 100 days of work, of students getting scholarships meant for specific social groups, of people with a bank account. Now in some sectors, such as banking, inter-agency sharing of data about clients is strictly regulated. But we increasingly have non-financial agencies playing crucial roles in the financial sector – from mobile wallets to peer-to-peer transaction to innovative credit ratings. Seeding of Aadhaar into all government and private databases would allow for easy and direct joining up of these databases by anyone who has access to them, and not at all by security agencies only.&lt;/p&gt;
&lt;p&gt;When it becomes publicly acceptable that &lt;a href="http://indianexpress.com/article/opinion/columns/aadhaar-project-uidai-last-chance-for-a-welfare-state/"&gt;the &lt;em&gt;money bill route&lt;/em&gt; was a ‘remedial’ instrument to put the Rajya Sabha ‘back on track’&lt;/a&gt;, one cannot not wonder about what was being remedied by avoiding a public debate about the draft bill before it was presented in Lok Sabha. The answer is simple: &lt;em&gt;welfare is the message, surveillance is the medium&lt;/em&gt;.&lt;/p&gt;
&lt;p&gt;Acceptance and adoption of all medium requires a message, a content. The users are interested in the message. The message, however, is not the business. Think of Free Basics. Facebook wants people with none or limited access to internet to enjoy parts of the internet at zero data cost. Facebook does not provide the content that the users consume on such internet. The content is created by the users themselves, and also provided by other companies. Facebook own and control the medium, and makes money out of all content, including interactions, passing through it.&lt;/p&gt;
&lt;p&gt;The UIDAI has set up a biometric data bank and related infrastructure to offer authentication-as-a-service. As the Bill clarifies, almost all agencies (public or private, national or global) can use this service to verify the identity of Indian residents. Unlike Facebook, the content of these services do not flow through the Aadhaar system. Nonetheless, Aadhaar keeps track of all ‘authentication records’, that is records of whose identity was authenticated by whom, when, and where. This database is gold (data) mine for security agencies in India, and elsewhere. Further, as more agencies use authentication based on Aadhaar numbers, it becomes easier for them to combine and compare databases with other agencies doing the same, by linking each line of transaction across databases using Aadhaar numbers.&lt;/p&gt;
&lt;p&gt;Welfare is the message that the Aadhaar system is riding on. The message is only useful for the medium as far as it ensures that the majority of the user population are subscribing to it. Once the users are enrolled, or on-boarded, the medium enables flow of all kinds of messages, and tracking and monetisation (perhaps not so much in the case of UIDAI) of all those flows. It does not matter if the Aadhaar system is being introduced to remedy the broken parliamentary process, or the broken welfare distribution system. What matters is that the UIDAI is establishing the infrastructure for a universal surveillance system in India, and without a formal acknowledgement and legal framework for the same.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system'&gt;https://cis-india.org/internet-governance/blog/the-last-chance-for-a-welfare-state-doesnt-rest-in-the-aadhaar-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sumandro</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Data Systems</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital India</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Biometrics</dc:subject>
    

   <dc:date>2016-04-19T13:18:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india-privacy-monitor-map">
    <title>The India Privacy Monitor Map</title>
    <link>https://cis-india.org/internet-governance/blog/india-privacy-monitor-map</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society has started the first Privacy Watch in India! Check out our map which includes data on the UID, NPR and CCTNS schemes, as well as on the installation of CCTV cameras and the use of drones throughout the country.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In a country of twenty-eight diverse states and seven union territories, it remained unclear to what extent surveillance, biometric and other privacy-intrusive schemes are being implemented. We are trying to make up for this by mapping out data in every single state in India on the UID, CCTNS and NPR schemes, as well as on the installation of CCTV cameras and the use of Unmanned Aerial Vehicles (UAVs), otherwise known as drones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In particular, the map in its current format includes data on the following:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UID:&lt;/b&gt; The Unique Identification Number (UID), also known as AADHAAR, is a 12-digit unique identification number which the Unique Identification Authority of India (UIDAI) is currently issuing for all residents in India (on a voluntary basis). Each UID is stored in a centralised database and linked to the basic demographic and biometric information of each individual. The UIDAI and AADHAAR currently lack legal backing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;NPR:&lt;/b&gt; Under the National Population Register (NPR), the demographic data of all residents in India is collected on a mandatory basis. The Unique Identification Authority of India (UIDAI) supplements the NPR with the collection of biometric data and the issue of the AADHAAR number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CCTV:&lt;/b&gt; Closed-circuit television cameras which can produce images or recordings for surveillance purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UAV: &lt;/b&gt;Unmanned Aerial Vehicles (UAVs), otherwise known as drones, are aircrafts without a human pilot on board. The flight of a UAV is controlled either autonomously by computers in the vehicle or under the remote control of a pilot on the ground or in another vehicle. UAVs are used for surveillance purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;CCTNS: &lt;/b&gt;The Crime and Criminal Tracking Networks and Systems (CCTNS) is a nationwide networking infrastructure for enhancing efficiency and effectiveness of policing and sharing data among 14,000 police stations across India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Our India Privacy Monitor Map can be viewed through the following link: http://cis-india.org/cisprivacymonitor &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This map is part of on-going research and will hopefully expand to include other schemes and projects which are potentially privacy-intrusive. We encourage all feedback and additional data!&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india-privacy-monitor-map'&gt;https://cis-india.org/internet-governance/blog/india-privacy-monitor-map&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-09T16:26:14Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance">
    <title>The India Conference on Cyber Security and Cyber Governance</title>
    <link>https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance</link>
    <description>
        &lt;b&gt;Following the success of CYFY 2013 the CYFY 2014 will be held from October 15 to 17, 2014 in New Delhi. The Centre for Internet and Society is a knowledge partner for this event and Sunil Abraham is participating as a panelist in the session "Privacy is Dead". &lt;/b&gt;
        &lt;p&gt;Click to &lt;a href="https://cis-india.org/internet-governance/blog/cyfy-2014-event-programme.pdf" class="internal-link"&gt;download the event details&lt;/a&gt;. The event brochure can be &lt;a href="https://cis-india.org/internet-governance/blog/cyfy-2014-brochure.pdf" class="external-link"&gt;downloaded here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance'&gt;https://cis-india.org/internet-governance/news/india-conference-cyber-security-and-cyber-governance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-10-13T07:10:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/akriti-bopanna-and-gurshabad-grover-july-3-2019-impact-of-consolidation-in-the-internet-economy-on-the-evolution-of-the-internet">
    <title>The Impact of Consolidation in the Internet Economy on the Evolution of the Internet </title>
    <link>https://cis-india.org/internet-governance/blog/akriti-bopanna-and-gurshabad-grover-july-3-2019-impact-of-consolidation-in-the-internet-economy-on-the-evolution-of-the-internet</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society in partnership with the Internet Society organized an event on the impact of consolidation in the Internet economy. It was divided into two roundtable discussions, the first one focusing on the policies and regulation while the latter dealt with the technical evolution of the Internet. This report contributed to the Internet Society’s 2019 Global Internet Report on Consolidation in the Internet Economy.&lt;/b&gt;
        &lt;p&gt;Edited by Swaraj Barooah, Elonnai Hickok and Vishnu Ramachandran. Inputs by Swagam Dasgupta&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This report is a summary of the proceedings of the roundtables organized by the Centre for Internet and Society in partnership with the Internet Society on the impact of consolidation in the Internet economy. It was conducted under the Chatham House Rule, at The Energy and Resource Institute, Bangalore on the 29 June 2018 from 11AM to 4PM. This report was authored on 29 June 2018, and subsequently edited for readability on 25 June 2019. This report contributed to the Internet Society’s 2019 Global Internet Report on Consolidation in the Internet Economy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The roundtables aimed to analyze how growing forces of consolidation, including concentration, vertical and horizontal integration, and barriers to market entry and competition would influence the Internet in the next 3 to 5 years.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To provide for sufficient investigation, the discussions were divided across two sessions. The focus of the first group was the impact of consolidation on applicable regulatory andpolicy norms including regulation of internet services, the potential to secure or undermine people’s ability to choose services, and the overall impact on the political economy. Thesecond discussion delved into the effect of consolidation on the technical evolution of the internet (in terms of standards, tools and software practices) and consumer choices (interms of standards of privacy, security, other human rights).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sessions had participants from the private sector (2), research (4), government (1), technical community (3) and civil society organizations (6). Five women and eleven men constituted the participant list.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="https://cis-india.org/internet-governance/files/isoc-report.pdf"&gt;&lt;strong&gt;Click to download and read the full report&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/akriti-bopanna-and-gurshabad-grover-july-3-2019-impact-of-consolidation-in-the-internet-economy-on-the-evolution-of-the-internet'&gt;https://cis-india.org/internet-governance/blog/akriti-bopanna-and-gurshabad-grover-july-3-2019-impact-of-consolidation-in-the-internet-economy-on-the-evolution-of-the-internet&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Akriti Bopanna and Gurshabad Grover</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-07-03T12:53:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/high-level-privacy-report">
    <title>The High Level Privacy Conclave — Conference Report</title>
    <link>https://cis-india.org/internet-governance/high-level-privacy-report</link>
    <description>
        &lt;b&gt;Privacy India, the Centre for Internet and Society and the Society in Action Group, with support from IDRC and Privacy International, have spent 18 months studying the state of privacy in India, and conducting consultations across India in Kolkata, Bangalore, Ahmedabad, Guwahati, Chennai, and Mumbai. On February 3, 2012, a high-level conclave was held in New Delhi with representatives from government, industry, media, and civil society participating in the event. At the conclave the discussions were focused on Internet Privacy, National Security &amp; Privacy, and the future of Privacy in India. &lt;/b&gt;
        
&lt;p&gt;Rajan Gandhi, CEO, Society in Action Group, opened the conference with an explanation of the mandate of Privacy India, which is to raise awareness, spark civil action, and promote democratic dialogue around privacy challenges and violations in India.&amp;nbsp; He raised the question of whether Indians are concerned about privacy, while citing examples of banking institutions and telecom service providers, who ask for information more than required, such as marital status, financial status, etc. Lastly, he stressed the need for legislation and awareness about right to privacy.&lt;/p&gt;
&lt;h2&gt;Panel 1: National Security and Privacy&lt;/h2&gt;
&lt;p&gt;Malavika Jayaram (Advocate, Bangalore) moderated the first panel discussion on “National Security and Privacy”. The panel comprised of Manish Tewari (Member of Parliament, Ludhiana), PK Hormis Tharakan (Former Chief of Research and Analysis Wing, Government of India), Gus Hosein (Executive Director, Privacy International, UK), Vakul Sharma (Advocate, Supreme Court), Eric King (Human Rights and Technology Advisor, Privacy International, UK), Amol Sharma (Journalist, Wall Street Journal).&amp;nbsp;&lt;/p&gt;
&lt;p&gt;Malavika Jayaram started the discussion by posing the question as to what in their view is ‘national security’ and when can it be cited by the government to intrude upon our privacy? In response, the panel gave multiple views while agreeing that it is an abstract term. Gus Hosein, in response said that national security does not only mean protecting the national border of a nation, but also protecting the rights of the citizen. He also noted that national security is always implemented in a top-down manner. Thus, unfortunately national security has become the stick, which is used to beat down on people’s right. &lt;br /&gt;PK Hormis Tharakan defined national security as the security of people and property. National security includes all the efforts of the government to raise poor above the poverty line. He also stated that anything that hinders the process of alleviating poverty is a matter of ‘national security’.&lt;/p&gt;
&lt;p&gt;Manish Tewari stated that there is a need for legislation to address the various issues of violation of privacy. Specifically, he addressed the need of an independent oversight committee to put a check on the unrestricted powers of the law enforcement and intelligence agencies and the practice of intercepting communications on the grounds of national security. He pointed out that the rules, formulated by the Supreme Court in PUCL v. Union of India on interception of communication, are rarely implemented, and the guidelines are implemented more as an exception rather than a rule. The interception of communication by intelligence agencies should be regulated for a larger national interest.&lt;/p&gt;
&lt;p&gt;Manish Tewari also observed that there is a nationwide lack of understanding about new technologies and judges are very rarely technologically literate. This has created a situation in which the government's efforts to fight crime and terrorism by intercepting communications has horribly backfired. By building backdoors into communications systems to allow lawful access, and by restricting cryptography to a 40-bit limit, the authorities have created serious vulnerabilities in India's communications system that can be easily exploited by any malicious third party or foreign government.&lt;/p&gt;
&lt;h3&gt;Privacy Protection&lt;/h3&gt;
&lt;p&gt;The panel discussion then moved on to the various tools for protecting privacy such data encryption. Amol Sharma referred to the process followed in the USA for interception of communication. Surveillance in the United States can be carried out by government agencies only on the basis of a court order or a warrant. He noted that in the US regime there is at least an independent body that gives orders of interception of communication. In comparison, in India, the power to authorize wiretaps lies with the government.&lt;/p&gt;
&lt;p&gt;Amol Sharma also pointed out that, there are at least 5000-7000 interception requests from the government, out of which only three to five per cent requests for interception of communication are for white-collar crime. He cited the example of the government asking Research in Motion to provide their encryption keys and also provide a room in their offices for the purpose of interception of communication. He stated that he was very skeptic that terrorists will be using Blackberry services for communication, considering that there are many more convenient and untraceable means available to them such as Skype. He asserted that there is need of legislation for regulation and restricting invasion of privacy. He said, “National security is not a free ticket for any kind of wiretap”.&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Concerns about Third Party Intrusion&lt;/h3&gt;
&lt;p&gt;Eric King noted that national security exists so that individuals can protect themselves from any kind of intrusion. Interception of communication is not only limited to government, equipment for interception of mobile phone calls are easily available and also affordable. So any individual can intercept calls. The notion that interception is only limited to the state is not true, it can be carried out by individuals as well. Heavily criticizing the restriction on encryption in India, he said that the people should be given the power to protect their own privacy. He also harped on the possibility that not only citizens are at risk also government high officials and military personnel can be targeted due to the low level of encryption.&lt;/p&gt;
&lt;p&gt;Contributing to the conversation, Manish Tewari pointed out that while trying to intercept the mobile phone calls of an individual, the State could listen in to anyone’s conversation within the vicinity; hence there are gross privacy violations.&lt;/p&gt;
&lt;p&gt;Gus Hosein added that the problem lies at a more basic level. Governments generally order telecom companies to build back door for the purposes of interception. These vulnerabilities in the system are not only used by the government, but also may be misused by third parties. He cited an incident in Greece, where the government asked a telecom service provider to build backdoors into the system. A third party was able to access the back door, during the Athens Olympics, when security was of utmost importance. He also said, “If you build a system that allows the state to listen in to communications, you build national security vulnerability”. This was followed by a Question &amp;amp; Answer session. The issues raised during the Q&amp;amp;A session were:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Nature of consent given by the user to the telecom service provider. Taking into consideration that service providers have a duty to disclose the user data to the government on request. A situation which gives rise to a binary choice, either use the services or do not use it at all.&lt;/li&gt;&lt;li&gt;At the wake of breaches in cyber-security, the use of general consumer e-mails by high government officials causes serious threat to nation’s security.&lt;/li&gt;&lt;li&gt;Lack of technical know-how among the government officials.&lt;/li&gt;&lt;li&gt;If government is inept in handling technology, then are there any concerns about public private partnership and outsourcing of governmental duties. (For example, UID).&lt;/li&gt;&lt;li&gt;Collection and collation of information by organizations such as NATGRID. Are they vulnerable to misuse?&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;In the concluding statement of the first panel discussion, Gus Hosein, made the argument that there cannot be a balance between right to privacy and national security, as the former is an individual right and the latter a community right. Community interest will always take precedence over individual right. National security is always the excuse given by government for invading individual privacy.&lt;/p&gt;
&lt;h2&gt;Panel 2: Internet and Privacy&lt;/h2&gt;
&lt;p&gt;Sunil Abraham (Executive Director, The Centre for Internet and Society, Bangalore) moderated the second panel discussion on “Internet and Privacy”. The&amp;nbsp; panel comprised of Deepak Maheshwari (Director, Corporate Affairs, Microsoft), Amitabh Das (General Counsel, Yahoo! India), Ramanjit Singh Chima (Sr. Policy Analyst, Google), Talish Ray (Board Member, Software Freedom Law Center), and Vinayak Godse (Director- Data Protection, DSCI).&lt;/p&gt;
&lt;h3&gt;Defining Privacy&lt;/h3&gt;
&lt;p&gt;Sunil Abraham asked the panel questions with respect to defining privacy in the context of physical privacy and spatial privacy. In response,&amp;nbsp; Amitabh Das said that the right to privacy of individuals should be protected in a similar fashion online, as it is protected offline. Referring to safeguards under PUCL v. Union of India (SC, 1996), he observed that communication and behavior on the Internet should be free from monitoring and interception. The procedural safeguards offline should be also present online.&lt;/p&gt;
&lt;h3&gt;Key Escrow Regime&lt;br /&gt;&lt;/h3&gt;
&lt;p&gt;Deepak Maheshwari talked about the inconsistencies in the encryption standards in India. For example, in case of ISP licensees, there is a 40-bit restriction (symmetric key). In case of adopting higher-level encryption, the ISP has to take permission from the government and deposit both the keys to the government.&lt;/p&gt;
&lt;p&gt;He also pointed that online railway ticket booking services use 128-bit encryption. RBI mandates 128-bit encryption for online banking transaction. SBI recommends 64-128 bit encryption. The multiple regulations make it impossible to abide by the rules.&amp;nbsp;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;Anonymity and Pseudonymity&lt;/h3&gt;
&lt;p&gt;Sunil Abraham, while setting the context to India, where the government has taken stringent measures to cut down on anonymity and pseudonymity, asked the question whether such a step is welcomed by the internet users as well as intermediaries.&amp;nbsp; Ramanjit Singh Chima, in reply said that for any business, it is necessary to give what the user wants. Real identity provides a better platform for discussion. He also discussed the choices provided by Google, mainly search without login, encrypted searches so it gives the user to be anonymous. He also noted that there are legal as well as technical restraints as to anonymity on the Internet. He also cited the example of Korea, where the government mandated real name verification process for posting comments on the Internet. Google was not able to comply with this request and had to disable comment section in Korea.&lt;/p&gt;
&lt;h3&gt;Data Privacy&lt;/h3&gt;
&lt;p&gt;Vinayak Godse analyzed the issue of data privacy in detail. He stressed upon the need of data privacy law in the country for the outsourcing industries. The European Union (EU) data protection laws govern most of the clients of firms that outsource. EU considers India is not a data safe country due to lack of data privacy legislation. He suggested that the data privacy law should be pragmatic, light touch and should allow industry self-regulation.&lt;/p&gt;
&lt;h2&gt;Conclusion&lt;/h2&gt;
&lt;p&gt;The High Level Privacy Conclave discussed various issues related to Internet and privacy and national security and privacy. The various concerns raised by the stakeholders were helpful in understanding the problems related to privacy. The main concerns raised by the first panel were about the interaction and relation of national security to privacy. The major concerns around national security and privacy were of data encryption vis-à-vis surveillance by the State and third party intrusion. There was also an attempt made to understand and define national security in the context of its ambit and when can it be used by the State to access private information. The second panel discussed various aspects of privacy on the Internet. The panel included discussions on anonymity and data privacy on the Internet. &lt;br /&gt;&lt;br /&gt;We thank the moderators, panelists and participants for making High Level Privacy a constructive and a fruitful session on privacy and it also gave us insight to understand the problems related privacy and a way forward for possible solutions.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/high-level-privacy-conference." class="internal-link" title="High Level Privacy Conference Report"&gt;Download the PDF&lt;/a&gt; (195 Kb)&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/high-level-privacy-conclave-agenda.pdf" class="internal-link" title="High Level Privacy Conclave Program"&gt;Click&lt;/a&gt; for the agenda and speakers profile.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/high-level-privacy-report'&gt;https://cis-india.org/internet-governance/high-level-privacy-report&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>natasha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-04-30T09:46:12Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/the-high-level-privacy-conclave">
    <title>The High Level Privacy Conclave</title>
    <link>https://cis-india.org/internet-governance/the-high-level-privacy-conclave</link>
    <description>
        &lt;b&gt;India in dire need of privacy law; experts say government is ironically creating huge national security risks in attempts to prevent crime and terrorism.&lt;/b&gt;
        
&lt;p&gt;Privacy India, the Centre for Internet and Society and the Society in Action Group, with support from Privacy International, have spent 18 months studying the state of privacy across India, conducting consultations in Kolkata, Bangalore, Ahmedabad, Guwahati, Chennai and Mumbai. Today, the results of their research were discussed by representatives from government, industry, media and civil society at a high-level conclave in Delhi. In attendance were Manish Tewari MP, Microsoft Director of Corporate Affairs Deepak Maheshwari and P.K.H. Tharakan former Chief of the Research and Analysis Wing. A privacy symposium open to the general public will be held tomorrow afternoon at the Indian International Centre.&lt;/p&gt;
&lt;p&gt;The 130-page long Country report details how government bodies like the National Technical Research Organization (NTRO) engage in pervasive and frequently unauthorized wiretapping, listening in on the private conversations of politicians and ordinary citizens alike. The Cabinet Secretary himself, in a report last year, noted that a body like the Central Board of Direct Taxes should never have been authorized to conduct telephone tapping, as the Supreme Court had long ago made clear. Privacy problems are arising from UID, NPR, and other e-governance projects that involve the creation of databases and the collection of personal information. Indian citizens are losing the ability to control who has access to their information, what that information says about them and how that information is used.&lt;/p&gt;
&lt;p&gt;Overall, the study paints a picture of a dysfunctional system, with multiple pieces of legislation dealing with sectoral privacy-related issues like health, banking, phone tapping etc and no overarching legal guarantee of privacy. As Manish Tewari observed today, there is a nationwide lack of understanding about new technologies and judges are very rarely technologically literate. This has created a situation in which the government's efforts to fight crime and terrorism by intercepting communications has horribly backfired. By building backdoors into communications systems to allow lawful access, and by restricting cryptography to a 40-bit limit, the authorities have created serious vulnerabilities in India's communications system that can be easily exploited by any malicious third party or foreign government.&lt;/p&gt;
&lt;p&gt;Gus Hosein, Executive Director of Privacy International: "In their efforts to preserve and defend democratic society, India has undermined the very thing it wanted to protect. Both citizens and state are now at serious risk of being spied upon by anyone with a small amount of technological know-how and a computer."&lt;/p&gt;
&lt;p&gt;Usha Ramanathan, social and political activist, said: "In the name of state transparency, government projects are in fact rendering citizens transparent to the State, rather than the other way round. A comprehensive privacy law for India cannot come soon enough."&lt;/p&gt;
&lt;h2&gt;Privacy India&lt;/h2&gt;
&lt;p&gt;Privacy India was established in 2010 with the objective of raising awareness, sparking civil action and promoting democratic dialogue around privacy challenges and violations in India. One of our goals is to build consensus towards the promulgation of comprehensive privacy legislation in India through consultations with the public, policymakers, legislators and the legal and academic community.&lt;br /&gt;&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/the-high-level-privacy-conclave'&gt;https://cis-india.org/internet-governance/the-high-level-privacy-conclave&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Natasha Vaz</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-01T06:09:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue">
    <title>The Gujarat High Court Judgment on the Snoopgate Issue </title>
    <link>https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Pranlal N. Soni v. State of Gujarat, C/SCA/14389/2014&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the year 2013 the media widely reported that a female civil services officer was regularly spied upon in 2009 due to her acquaintance with the then Chief Minister of Gujarat (and current Prime Minister of India) Mr. Narendra Modi. It was reported that the surveillance was being supervised by the current president of the BJP, Mr. Amit Shah at the behest of Mr. Modi. The case took another twist when the officer and her father said that they had no problems with such surveillance, and had repeatedly conveyed to various statutory authorities including the National Commission for Women, the State Commission for Women, as also before the Hon’ble Supreme Court of India, that they never felt that their privacy was being interfered with by any of the actions of the State Authorities. Infact, para 3.5 of the petition indicated that it was at the behest of the father of the female officer that the State government had carried out the surveillance on his daughter as a security measure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Inspite of the repeated claims of the subject of surveillance and her father, the Gujarat Government passed a Notification under the Commissions of Inquiry Act, 1952 appointing a two member Commission of Inquiry to enquire into this incident without jeopardizing the identity or interest of the female officer. This Notification was challenged in the Gujarat High Court by the very same female officer and her father on the ground that it violated their fundamental right to life and liberty. The petitioners claimed that they had to change their residential accommodation four times in the preceding few months due to the constant media glare. The print, electronic and social media, so called social workers and other busybodies constantly intruded into the private life of the petitioners and their family members. The petitioner's email accounts were hacked and scores of indecent calls were received from all over. Under the guise of protecting the petitioner's privacy, every action undertaken by the so called custodians for and on behalf of the petitioners resulted into a breach of privacy of the petitioners, making life impossible for them on a day to day basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After hearing the arguments of the petitioners, including arguments on technical points the Court struck down the Notification issued by the State government to enquire into the issue of the alleged illegal surveillance. However the Court also briefly touched upon the issue of violation of the privacy of the female officer in this whole episode. However, instead of enquiring into whether there was any breach of privacy in the facts of the case, the Court relied upon the statement made by the female officer that whatever surveillance was done did not cause any invasion into her privacy, rather it was the unwelcome media glare that followed the revelations regarding the surveillance which had caused an invasion of her privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus we see that even though the whole snoopgate episode started out as one of “alleged” unwarranted and illegal surveillance this particular judgment is limited only to challenging the validity of the Inquiry Commission appointed by the State Government. In order to challenge the Notification in a PIL the female officer had to show that some fundamental right of hers was violated and in such circumstances privacy is the most obvious fundamental right which was violated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although this judgment talks about privacy, it does not have enough legal analysis of the right to privacy to have any significant ramifications for how privacy is interpreted in the Indian context. The only issue that could possibly be of some importance is that the we could interpret the Court’s reliance on the statement of the female officer that there was no breach of privacy rather than its own examination of facts to mean that in cases of breach of privacy, if the person whose privacy has been breached did not feel his or her privacy to have been invaded then the Courts would rely on the person’s statements rather than the facts. However this is only an interpretation from the facts and it does not seem that the Court has spent any significant amount of time to examine this issue, therefore it may not be prudent to consider this as establishing any legal principle.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Note&lt;/b&gt;: The details of the case as well as the judgment can be found at &lt;a href="http://gujarathc-casestatus.nic.in/gujarathc/tabhome.jsp"&gt;http://gujarathc-casestatus.nic.in/gujarathc/tabhome.jsp&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue'&gt;https://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-10-27T04:40:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/national-data-governance-framework-policy">
    <title>The Government’s Increased Focus on Regulating Non-Personal Data: A Look at the Draft National Data Governance Framework Policy </title>
    <link>https://cis-india.org/internet-governance/blog/national-data-governance-framework-policy</link>
    <description>
        &lt;b&gt;Digvijay Chaudhary and Anamika Kundu wrote an article on the National Data Governance Framework Policy. It was edited by Shweta Mohandas.&lt;/b&gt;
        &lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Non Personal Data (‘NPD’) can be &lt;a href="https://www.taylorfrancis.com/chapters/edit/10.4324/9780429022241-8/regulating-non-personal-data-age-big-data-bart-van-der-sloot"&gt;understood&lt;/a&gt; as any information not relating to an identified or identifiable natural person. The origin of such data can be both human and non-human. Human NPD would be such data which has been anonymised in such a way that the person to whom the data relates cannot be re-identified. Non-human NPD would mean any such data that did not relate to a human being in the first place, for example, weather data. There has been a gradual demonstrated interest in NPD by the government in recent times. This new focus on regulating non personal data can be owed to the economic incentive it provides. In its report, the Sri Krishna committee, released in 2018 agreed that NPD holds considerable strategic or economic interest for the nation, however, it left the questions surrounding NPD to a future committee.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;History of NPD Regulation&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In 2020, the Ministry of Electronics and Information Technology (‘MEITY’) constituted an expert committee (‘NPD Committee’) to study various issues relating to NPD and to make suggestions on the regulation of non-personal data. The NPD Committee differentiated NPD into human and non-human NPD, based on the data’s origin. Human NPD would include all information that has been stripped of any personally identifiable information and non-human NPD meant any information that did not contain any personally identifiable information in the first place (eg. weather data). The final report of the NPD Committee is awaited but the Committee came out with a &lt;a href="https://static.mygov.in/rest/s3fs-public/mygov_160922880751553221.pdf"&gt;revised draft&lt;/a&gt; of its recommendations in December 2020. In its December 2020 report, the NPD Committee proposed the creation of a National Data Protection Authority (‘NPDA’) as it felt this is a new and emerging area of regulation. Thereafter, the Joint Parliamentary Committee  on the Personal Data Protection Bill, 2019 (‘JPC’) came out with its &lt;a href="http://164.100.47.193/lsscommittee/Joint%20Committee%20on%20the%20Personal%20Data%20Protection%20Bill,%202019/17_Joint_Committee_on_the_Personal_Data_Protection_Bill_2019_1.pdf"&gt;version of the Data Protection Bill &lt;/a&gt;where it amended the short title of the PDP Bill 2019 to Data Protection Bill, 2021 widening the ambit of the Bill to include all types of data. The JPC report focuses only on human NPD, noting that non-personal data is essentially derived from one of the three sets of data - personal data, sensitive personal data, critical personal data - which is either anonymized or is in some way converted into non-re-identifiable data.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;On February 21, 2022,  the Ministry of Electronics and Information Technology (‘MEITY’) came out with the &lt;a href="https://www.meity.gov.in/content/draft-india-data-accessibility-use-policy-2022"&gt;Draft India Data Accessibility and Use Policy, 2022&lt;/a&gt; (‘Draft Policy’). The Draft Policy was strongly criticised mainly due to its aims to monetise data through its sale and licensing to body corporates. The Draft Policy had stated that anonymised and non-personal data collected by the State that has “&lt;a href="https://www.medianama.com/2022/06/223-new-data-governance-policy-privacy/"&gt;undergone value addition&lt;/a&gt;” could be sold for an “appropriate price”. During the Draft Policy’s consultation process, it had been withdrawn several times and then finally removed from the website.&lt;a href="https://www.meity.gov.in/writereaddata/files/Draft%20India%20Data%20Accessibility%20and%20Use%20Policy_0.pdf"&gt; The National Data Governance Framework Policy&lt;/a&gt; (‘NDGF Policy’) is a successor to this Draft Policy. There is a change in the language put forth in the NDGF Policy from the Draft Policy, where the latter mainly focused on monetary growth. The new NDGF Policy aims to regulate anonymised non-personal data (‘NPD’) kept with governmental authorities and make it accessible for research and improving governance. It wishes to create an ‘India Datasets programme’ which will consist of the aforementioned datasets. While  MEITY has opened the draft for public comments, is a need to spell out the procedure in some ways for stakeholders to draft recommendations for the NDGF policies in an informed manner. Through this piece, we discuss the NDGF Policy in terms of issues related to the absence of a comprehensive Data Protection Framework in India and the jurisdictional overlap of authorities under the NDGF Policy and DPB.&lt;/p&gt;
&lt;h2 dir="ltr" style="text-align: justify; "&gt;What the National Data Governance Framework Policy Says&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Presently in India, NPD is stored in a variety of governmental departments and bodies. It is difficult to access and use this stored data for governmental functions without modernising collection and management of governmental data. Through the NDGF Policy, the government aims to build an Indian data storehouse of anonymised non-personal datasets and make it accessible for both improving governance and encouraging research. It imagines the establishment of an Indian Data Office (‘IDO’)  set up by MEITY , which shall be responsible for consolidating data access and sharing of non-personal data across the government. In addition, it also mandates a Data Management Unit for every Ministry/department that would work closely with the IDO. IDO will also be responsible for issuing protocols for sharing NPD. The policy further imagines an Indian Data Council (‘IDC’) whose function would be to define frameworks for important datasets, finalise data standards, and Metadata standards and also review the implementation of the policy. The NDGF Policy has provided a broad structure concerning the setting up of anonymisation standards, data retention policies, data quality, and data sharing toolkit. The NDGF Policy states that these standards shall be developed and notified by the IDO or MEITY or the Ministry in question and need to be adhered to by all entities.&lt;/p&gt;
&lt;h2 dir="ltr" style="text-align: justify; "&gt;The Data Protection Framework in India&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The report adopted by the JPC, felt that it is simpler to enact a single law and a single regulator to oversee all the data that originates from any data principal and is in the custody of any data fiduciary. According to the JPC, the draft Bill deals with various kinds of data at various levels of security. The JPC also recommended that since the Data Protection Bill (‘DPB’) will handle both personal and non-personal data, any further policy / legal framework on non-personal data may be made a part of the same enactment instead of any separate legislation. The draft DPB states that what is to be done with the NDP shall be decided by the government from time to time according to its policy. As such, neither the DPB, 2021 nor the NDGF Policy go into details of regulating NPD but only provide a broad structure of facilitating free-flow of NPD, without taking into account the &lt;a href="https://cis-india.org/internet-governance/cis-comments-revised-npd-report/view"&gt;specific concerns&lt;/a&gt; that have been raised since the NPD committee came out with its draft report on regulating NPD dated December 2020.&lt;/p&gt;
&lt;h2 dir="ltr" style="text-align: justify; "&gt;Jurisdictional overlaps among authorities and other concerns&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Under the NDGF policy, all guidelines and rules shall be published by a body known as the Indian Data Management Office (‘IDMO’). The IDMO is set to function under the MEITY and work with the Central government, state governments and other stakeholders to set standards. Currently, there is no sign of when the DPB will be passed as law. According to the JPC, the reason for including NPD within the DPB was because of the impossibility to differentiate between PD and NPD. There are also certain overlaps between the DPB and the NDGF which are not discussed by the NDGF. NDGF does not discuss the overlap between the IDMO and Data Protection Authority (‘DPA’) established under the DPB 2021.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Under the DPB, the DPA is tasked with specifying codes of practice under clause 49. On the other hand, the NDGF has imagined the setting up of IDO, IDMO, and the IDC, which shall be responsible for issuing codes of practice such as data retention, and data anonymisation, and data quality standards. As such, there appears to be some overlap in the functions of the to-be-constituted DPA and the NDGF Policy.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Furthermore, while the NDGF Policy aims to promote openness with respect to government data, there is a conflict with &lt;a href="https://opengovdata.org/"&gt;open government data (‘OGD’) principle&lt;/a&gt;s when there is a price attached to such data. OGD is data which is collected and processed by the government for free use, reuse and distribution. Any database created by the government must be publicly accessible to ensure compliance with the OGD principles.&lt;/p&gt;
&lt;h2 dir="ltr" style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Streamlining datasets across different authorities is a huge challenge for the government and hence the NGDF policy in its current draft requires a lot of clarification. The government can take inspiration from the European Union which in 2018, came out with a principles-based approach coupled with self-regulation on the framework of the free flow of non-personal data. The &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52019DC0250&amp;amp;from=EN"&gt;guidance&lt;/a&gt; on the free-flow of non-personal data defines non-personal data based on the origin of data - data which originally did not relate to any personal data (non-human NPD) and data which originated from personal data but was subsequently anonymised (human NPD). The &lt;a href="https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=CELEX:52019DC0250&amp;amp;from=EN"&gt;regulation&lt;/a&gt; further realises the reality of mixed data sets and regulates only the non-personal part of such datasets and where the datasets are inextricably linked, the GDPR would apply to such datasets. Moreover, any policy that seeks to govern the free flow of NPD ought to make it clear that in case of re-identification of anonymised data, such re-identified data would be considered personal data. The DPB, 2021 and the NGDF, both fail to take into account this difference.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/national-data-governance-framework-policy'&gt;https://cis-india.org/internet-governance/blog/national-data-governance-framework-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Digvijay Chaudhary and Anamika Kundu</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Open Data</dc:subject>
    
    
        <dc:subject>Open Government Data</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-06-30T13:24:35Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data">
    <title>The Future of Privacy in the Age of Big Data</title>
    <link>https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data</link>
    <description>
        &lt;b&gt;A study tour on privacy and big data was organised by Friedrich Naumann Foundation for Freedom from September 3 to 10, 2016 in Berlin and Hamburg. Vanya Rakesh was one of the participants from South Asia who went for the tour.&lt;/b&gt;
        &lt;h3&gt;List of Participants&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Shahid Ahmad, Deputy Director, Digital Empowerment Foundation&lt;/li&gt;
&lt;li&gt;Shahzad Ahmad, Country Director, Bytes for All&lt;/li&gt;
&lt;li&gt;Shivam Satnani, Senior Analyst, Data Security Council of India&lt;/li&gt;
&lt;li&gt;Vanya Rakesh, Senior Policy Officer, Centre for Internet &amp;amp; Society&lt;/li&gt;
&lt;li&gt;Anja Kovacs, Director, Internet Democracy Project&lt;/li&gt;
&lt;li&gt;Tshering Cigay Dorji, CEO, Thimphu Tech Park&lt;/li&gt;
&lt;li&gt;Vrinda Bhandari, Lawyer and Journalist, Chambers of Trideep Pais (Anwaltskanzlei)&lt;/li&gt;
&lt;li&gt;Tahsin Ifnoor Sayeed, Head of Business Intelligence, DNet&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/study-tour-big-data-privacy.pdf"&gt;Click to see the Agenda&lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data'&gt;https://cis-india.org/internet-governance/news/study-tour-on-future-of-privacy-in-age-of-big-data&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-09-22T23:24:16Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis">
    <title>The Fundamental Right to Privacy: An Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis</link>
    <description>
        &lt;b&gt;Last​ ​month’s​ ​judgment​ ​by​ ​the​ ​nine​ ​judge​ ​referral​ ​bench​ ​was​ ​an​ ​emphatic endorsement​ ​of​ ​the​ ​the​ ​constitutional​ ​right​ ​to​ ​privacy.​ ​In​ ​the​ ​course​ ​of​ ​a​ ​547​ ​page judgment,​ ​the​ ​bench​ ​affirmed​ ​the​ ​fundamental​ ​nature​ ​of​ ​the​ ​right​ ​to​ ​privacy reading​ ​it​ ​into​ ​the​ ​values​ ​of​ ​dignity​ ​and​ ​liberty.​ In the course of a few short papers, we will dissect the various aspects of the right to privacy as put forth by the nine judge constitutional bench in the Puttaswamy matter. The papers will focus on the sources, structure, scope, breadth, and future of privacy. Here are the first three papers, authored by Amber Sinha and edited by Elonnai Hickok.


&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;The​ ​Fundamental​ ​Right​ ​to​ ​Privacy - Part​ ​I:​ ​Sources&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Much​ ​of​ ​the​ ​debate​ ​and​ ​discussion​ ​in​ ​the​ ​hearings​ ​before​ ​the​ ​constitutional​ ​bench was​ ​regarding​ ​where​ ​in​ ​the​ ​Constitution​ ​a​ ​right​ ​to​ ​privacy​ ​may​ ​be​ ​located.​ In​ ​this paper,​ ​we​ ​analyse​ ​the​ ​different​ ​provisions​ ​and​ ​tools​ ​of​ ​interpretations​ ​use​ ​by​ ​the bench​ ​to​ ​read​ ​a​ ​right​ ​to​ ​privacy​ ​in​ ​Part​ ​III​ ​of​ ​the​ ​Constitution.&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-i-sources-pdf/at_download/file"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;The​ ​Fundamental​ ​Right​ ​to​ ​Privacy - ​Part​ ​II:​ Structure&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;​In​ ​the​ ​previous​ ​paper,​ ​we delved​ ​into​ ​the​ ​ ​sources​ ​in​ ​the​ ​Constitution​ ​and​ ​the​ ​interpretive​ ​tools​ ​used​ ​to​ ​locate 
the​ ​right​ ​to​ ​privacy​ ​as​ ​a​ ​constitutional​ ​right.​ ​This​ ​paper​ ​follows​ ​it​ ​up​ ​with​ ​an​ ​analysis of​ ​the​ ​structure​ ​of​ ​the​ ​right​ ​to​ ​privacy​ ​as​ ​articulated​ ​by​ ​the​ ​bench.​ ​We​ ​will​ ​look​ ​at​ ​the various​ ​facets​ ​of​ ​privacy​ ​which​ ​form​ ​a​ ​part​ ​of​ ​the​ ​fundamental​ ​right,​ ​the​ ​basis​ ​for such​ ​dimensions​ ​and​ ​what​ ​their​ ​implications​ ​may​ ​be.&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="https://cis-india.org/internet-governance/files/amber-sinha-the-fundamental-right-to-privacy-ii-structure-pdf/at_download/file"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;&lt;strong&gt;The​ ​Fundamental​ ​Right​ ​to​ ​Privacy - Part​ ​III:​ Scope&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;While the previous papers dealt with the sources in the Constitution and the interpretive tools used by the bench to locate the right to privacy as a constitutional right, as well as the structure of the right with its various dimensions, this paper will look at the judgment for guidance on principles to determine what the scope of the right of privacy may be.&lt;/p&gt;
&lt;h4&gt;Download: &lt;a href="https://cis-india.org/internet-governance/the200b-200bfundamental200b-200bright200b-200bto200b-200bprivacy-200b-200bpart200b-200biii-scope/at_download/file" class="external-link"&gt;PDF&lt;/a&gt;&lt;/h4&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis'&gt;https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-an-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-10-04T11:19:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide">
    <title>The Fundamental Right to Privacy - A Visual Guide</title>
    <link>https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide</link>
    <description>
        &lt;b&gt;Privacy is the ability of an individual or group to seclude themselves, or information about themselves, and thereby express themselves selectively. This visual guide to the story of privacy law in India and the recent judgement of the Puttaswamy v.
Union of India case is developed by Amber Sinha (research and content) and Pooja Saxena (design and conceptualisation).

&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;The Fundamental Right to Privacy - A Visual Guide: &lt;a href="https://cis-india.org/internet-governance/files/amber-sinha-and-pooja-saxena-the-fundamental-right-to-privacy-a-visual-guide/at_download/file"&gt;Download&lt;/a&gt; (PDF)&lt;/h4&gt;
&lt;hr /&gt;
&lt;iframe src="//www.slideshare.net/slideshow/embed_code/key/1MMYCXyxa2YBip" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" height="485" width="595"&gt; &lt;/iframe&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide'&gt;https://cis-india.org/internet-governance/blog/the-fundamental-right-to-privacy-a-visual-guide&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    

   <dc:date>2018-02-16T05:31:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india">
    <title>The Four Parts of Privacy in India</title>
    <link>https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india</link>
    <description>
        &lt;b&gt;Privacy enjoys an abundance of meanings. It is claimed in diverse situations every day by everyone against other people, society and the state.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Traditionally traced to classical liberalism’s public/private divide, there are now several theoretical conceptions of privacy that collaborate and sometimes contend. Indian privacy law is evolving in response to four types of privacy claims: against the press, against state surveillance, for decisional autonomy, and in relation to personal information. The Indian Supreme Court has selectively borrowed competing foreign privacy norms, primarily American, to create an unconvincing pastiche of privacy law in India. These developments are undermined by a lack of theoretical clarity and the continuing tension between individual freedoms and communitarian values.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This was published in &lt;i&gt;Economic &amp;amp; Political Weekly&lt;/i&gt;, 50(22), 30 May 2015. &lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/four-parts-of-privacy.pdf" class="internal-link"&gt;Download the full article here&lt;/a&gt;&lt;/b&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india'&gt;https://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-23T13:04:50Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
