<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 291 to 305.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/how-can-privacy-be-protected"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-times-of-india-mahendra-singh-may-18-2017-provide-hacker-details-outfit-that-claimed-data-leak-told"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/protection-of-privacy-in-mobile-phone-apps"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/jobs/programme-officer-privacy-2019"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/igf-2013-workshop-335-privacy-from-regional-regulations-to-global-connections"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/india-today-neha-vashishth-april-6-2017-privacy-what-bengaluru-police-leaks-phone-numbers-on-twitter"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/privacy-security-access-to-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy">
    <title>Q&amp;A to the Report of the Group of Experts on Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy</link>
    <description>
        &lt;b&gt;In January 2012 Justice A.P. Shah formed a committee consisting of a group of experts to contribute to and create a report of recommendations for a privacy legislation in India. The committee met a total of seven times from January to September 2012.  The Centre for Internet and Society (CIS) was a member of the committee creating the report. This blog post is CIS’s attempt to answer questions that have arisen from media coverage on the report, based on our understanding. &lt;/b&gt;
        &lt;h2&gt;Executive Summary&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The executive summary explains how the need for a horizontal privacy legislation that recognizes the right to privacy has come about in India in light of projects and practices such as the UID, NATGRID, and the changing nature of business and technology. The executive summary highlights the committee’s recommendations of what should be considered by legislatures while enacting a privacy legislation in India.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the salient features of the committee’s recommendations? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; In its report the committee recommended that any privacy legislation passed should:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt; Be technologically neutral and interoperable with international standards to ensure that the regulation can adapt to changing technology, and that business will be promoted. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Recognize the multiple dimensions of privacy including physical and informational privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Apply to all data controllers both in the private sector and the public sector to ensure that businesses and governments are held accountable to protecting privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establish a set of privacy principles that can be applicable to different practices, policies, projects, departments, and businesses to create a uniform level of privacy protection across all sectors. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Create an enforcement regime of co-regulation, where industry has the choice of developing privacy principles and ensuring compliance at the sectoral level with regular oversight by the Privacy Commissioners. &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 1: Constitutional Basis for Privacy&lt;/h2&gt;
&lt;p&gt;This chapter summarizes a number of decisions from the Indian Judiciary that demonstrate how the right to privacy in India has been defined on a case to case basis and has been defined as either a fundamental right or a common law right.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the contexts of the cases covered? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; This chapter covers cases that speak to the:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Right to privacy in the context of surveillance by the State &lt;/li&gt;
&lt;li&gt;Balancing the ‘right to privacy’ against the ‘right to free speech’ &lt;/li&gt;
&lt;li&gt;The ‘right to privacy’ of HIV patients &lt;/li&gt;
&lt;li&gt;Prior judicial sanctions for tapping telephones &lt;/li&gt;
&lt;li&gt;The ‘search and seizure’ powers of revenue authorities &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 2: International Privacy Principles&lt;/h2&gt;
&lt;p&gt;This chapter summarizes recent developments in privacy laws, international privacy principles, and privacy principles developed by specific countries. This review aided the Committee in forming its recommendations for the report.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Privacy principles from which countries were reviewed by the Committee?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The Committee reviewed privacy principles from the following countries and international organizations.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;EU Regulations of January 2012 &lt;/li&gt;
&lt;li&gt;US Consumer Privacy Bill of Rights &lt;/li&gt;
&lt;li&gt;OECD Privacy Principles &lt;/li&gt;
&lt;li&gt;APEC Privacy Framework &lt;/li&gt;
&lt;li&gt;Australia &lt;/li&gt;
&lt;li&gt;Canada &lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 3: National Privacy Principles, Rationales, and Emerging Issues&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter lays out the nine national privacy principles and describes the rationale for each principle along with emerging issues around each principle.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What could the principles apply to? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles apply to the collection, processing, storage, retention, access, disclosure, destruction, sharing, transfer, and anonymization of sensitive personal information, personal identifiable information, and identifiable information by data controllers. The national privacy principles can also be applied to legislation, projects, practices, and policies to ensure that provisions and requirements are in compliance with the national privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Who could be brought under the scope of the principles?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles are applicable to every data controller in the private sector and the public sector. For example organizations and government departments that determine the purposes and means of processing personal information will be brought under the scope of the principles and will be responsible for carrying out the processing of data in accordance with sectoral privacy standards or the national privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How could the National Privacy Principles impact individuals? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The principles provide individuals with the right to 1. Receive notice before giving consent stating what personal information is being collected, the purposes for which personal information is being collected, the uses of collected personal information, whether or not personal information will be disclosed to third persons, security safeguards established by the data controller, processes available to data subjects to access and correct personal information, and contact details of privacy officers. 2. Opt in and out of providing personal information 3. Withdraw given consent at any point of time. 4. Access and correct any personal information held by data controllers 5. Allow individuals to issue a complaint with the respective ombudsman, privacy commissioner, or court.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Would the National Privacy Principles be binding for every data controller? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; Yes, but Self Regulating Organizations at the industry level have the option of developing principles for that specific sector. These principles must be approved by the privacy commissioner and be in compliance with the National Privacy Principles.&lt;/p&gt;
&lt;h2&gt;Chapter 4: Analysis of Relevant Legislation, Bills, and Interests from a Privacy Perspective&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter examines relevant legislation, bills, and interests from a privacy perspective. In doing so the chapter clarifies how the right to privacy should intersect with the right to information and the freedom of expression, and anaylzes current and upcoming legislation to demonstrate what existing provisions in the legislation uphold the privacy principles, what existing provisions are in conflict with the principles, and what provisions are missing to ensure that the legislation is compliant to the extent possible with the principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How does the report understand the relationship between the Right to Information and the Right to Privacy?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; When applied the Privacy Act should not circumscribe the Right to Information Act. Furthermore, RTI recipients should not be considered data controllers and thus should not be brought under the ambit of the privacy principles.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: How does the report understand the relationship between the freedom of expression and privacy? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; Questions about how to balance the right to privacy with the freedom of expression can arise in many circumstances including: the right to be forgotten and data portability, journalistic expression, state secrecy and whistle blowers, and national security. Most often, public interest is the test used to determine if the right to privacy should supersede the freedom of expression or vice versa.&lt;/p&gt;
&lt;h2&gt;Chapter 5: The Regulatory Framework&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter outlines the committee’s recommendations for a regulatory framework for the Privacy Act.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Who are the main actors in the regulatory framework?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The report recommends that a regulatory framework be comprised of one privacy commissioner at the central level and four commissioners at the regional level, self regulating organizations (SRO’s) at the industry level, data controllers and privacy officers at the organization level, and courts.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the salient features of the regulatory framework? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The salient features of the regulatory framework include 1. A framework of co-regulation 2. Complaints 3. Exceptions to the Privacy Act 4. Offenses under the Act&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are exceptions to the right to privacy? Are these blanket exceptions?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; National security; public order; disclosure of information in public interest; prevention, detection, investigation and prosecution of criminal offences; and protection of the individual or of the rights and freedoms of others are suggested exceptions to the right to privacy. The committee has qualified these exceptions with the statement that before an exception can be made for the following circumstances, the proportionality, legality, and necessity in a democratic state should be used to measure if the exception applies and the extent of the exception. Thus, they are not blanket exceptions to the right to privacy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Historical and scientific research and journalistic purposes were also recommended as additional exceptions to the right to privacy that may be considered. These exceptions will not be subjected to the principles of proportionality, legality, and necessary in a democratic state.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are the powers and responsibilities of the privacy commissioners? &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The powers and responsibilities of the Privacy Commissioners are the following:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Responsibilities:&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Enforcement of the Act &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Broadly oversee interception/access, audio &amp;amp; video recordings, the use of personal identifiers, and the use of bodily or genetic material. &lt;/li&gt;
&lt;li&gt;Evaluate and approve privacy principles developed by SRO’s &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Collaborate with stakeholders to endure effective regulation, promote awareness of the Act, and sensitize citizens to privacy considerations &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Powers: &lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Order privacy impact assessments on organisations &lt;/li&gt;
&lt;li&gt;Investigate complaints suomotu or based off of complaints from data subjects (summon documents, call and examine witnesses, and take a case to court if necessary ) &lt;/li&gt;
&lt;li&gt;Fine non-compliant data controllers &lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Q: How does Co-regulation work? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; The purpose of establishing a regulatory framework of co-regulation is to ensure that appropriate policies and principles are articulated and enforced for all sectors. If a sector wishes to develop its own privacy standards, the industry level self regulating organization will submit to the privacy commissioner a sub set of self regulatory norms. If these norms are approved by the privacy commissioner the SRO will be responsible for enforcing those norms, but the privacy commissioner will have the power to sanction member data controllers for violating the norms. If a sector does not have an SRO or does not wish to develop its own set of standards, the National Privacy Principles will be binding.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What are data controllers? What are privacy officers? What are ombudsmen? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; A data controller is any entity that handles or process data. Privacy officers receive and handle complaints at the organizational level and may be appointed as part of a SRO’s privacy requirements for a sector.  Ombudsmen are appointed at the SRO level and are also responsible for receiving and handling complaints. The objective of having ombudsman and privacy officers is to reduce the burden of handling complaints on the commissioner and the courts.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: When can an individual issue a complaint? Which body should individuals issue complaints to? &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; An individual can issue a complaint at any point of time when they feel that their personal information has not been handled by a data controller according to the principles, or that a data controller is not in compliance with the Act. When applicable complaints are encouraged to be issued first to the organization. If the complaint is not resolved, the individual can take the complaint to the SRO or privacy commissioner. The individual also has the option of taking a complaint straight to the courts. When a complaint is received by the commissioner, the commissioner may fine the data controller if it is found to be non-compliant. Data controllers cannot appeal fines issued by the commissioner, but they can appeal the initial decision of non-compliance.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Can an individual receive compensation for a violation of privacy: &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; Yes. Individuals who suffer damages caused by non-compliance with the principles or any obligation under the Act can receive compensation, but the compensation must be issued by the courts and cannot be issued by a privacy commissioner. Actors that can be held liable by individuals include data controllers, organization directors, agency directors, and heads of Governmental departments.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: What offences does the report reccomend?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; The following constitutes as an offence under the Act:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Non-compliance with the  privacy principles &lt;/li&gt;
&lt;li&gt;Unlawful  collection,  processing,  sharing/disclosure,  access,  and  use  of personal data &lt;/li&gt;
&lt;li&gt;Obstruction of commissioner &lt;/li&gt;
&lt;li&gt;Failure to comply with notification issued by commissioner        
&lt;ul&gt;
&lt;li&gt; Processing data after receiving a notification &lt;/li&gt;
&lt;li&gt; Failure to appear before commissioner &lt;/li&gt;
&lt;li&gt;Failure to produce documents requested by commissioner &lt;/li&gt;
&lt;li&gt; Sending report to commissioner with false or misleading information&lt;/li&gt;
&lt;/ul&gt;
&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Chapter 6: The Multiple Dimensions of Privacy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This chapter gives examples of practices that impact privacy in India which the national privacy principles could be applied to. These include interception/access, the use of electronic recording devices, the use of personal identifiers, and the use of bodily and genetic material. The current state of each practice in India is described, and the inconsistencies and gaps in the regimes are highlighted. Each section also provides recommendations of which privacy principles need to be addressed and strengthened in each practice, and how the privacy principles would be affected by each practice.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Does the report give specific recommendations as to how each practice should be amended to incorporate the National Privacy Principles?&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A:&lt;/b&gt; No. Each section explains the current state of the practice in India, gaps and inconsistencies with the current practice,  and recommends broadly what principles need to be addressed and strengthened in the regime, and how the National Privacy Principles may be affected by the practice.&lt;/p&gt;
&lt;h3&gt;Summary of Recommendations&lt;/h3&gt;
&lt;p&gt;This chapter consolidates and clarifies all of the Committee’s recommendations for a Privacy Act in India.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Q: Are the recommendations in this chapter different from chapters above?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;A:&lt;/b&gt; No.  The recommendations in this chapter reflect the recommendations made earlier. This chapter does clarify the recommended scope and objectives of the Privacy Act  including:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The Act should define and harmonize with existing laws in force. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should extend the right of privacy to all individuals in India and all data processed by any company or equipment locating in India, and all data that originated in India. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should clarify that the publication of personal data for artistic and journalistic purposes in public interest, the use of personal information for household purposes, and the disclosure of information as required by the Right to Information Act should not constitute an infringement of privacy. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Act should not require a ‘reasonable expectation’ of privacy to be present for the right to be evoked. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;If any other legislation provides more extensive protections than those set out by the Privacy Act, than the more extensive protections should apply. &lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/report-of-group-of-experts-on-privacy.pdf" class="internal-link"&gt;Report of the Group of Experts on Privacy&lt;/a&gt; [PDF, 1270 Kb]&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy'&gt;https://cis-india.org/internet-governance/blog/question-and-answer-to-report-of-group-of-experts-on-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-11-09T10:20:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/how-can-privacy-be-protected">
    <title>Putting Users First: How Can Privacy be Protected in Today’s Complex Mobile Ecosystem?</title>
    <link>https://cis-india.org/news/how-can-privacy-be-protected</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;&lt;span class="Apple-style-span"&gt;Traditional approaches to ‘online privacy’ are often based on ‘compliance’ with a patchwork of local laws (where they exist). However, as new mobile services, applications and data flows become increasingly global, geo-graphically-bound laws appear unable to keep pace. Self-regulation has an important role to play in ensuring that mobile users’ privacy is treated consistently irrespective of the location of companies, the technologies and business models involved. A key challenge for industry is (a) to identify mobile-friendly ways of helping users make informed decisions about their information and privacy; and (b) to ensure user privacy is respected and protected by those designing and building the services and applications of tomorrow.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The aim of this proposed workshop is to foster a constructive conversation around three key issues:&amp;nbsp;&lt;/p&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ol&gt;&lt;li&gt;Are privacy challenges on the mobile platform different to the fixed-pc environment? [Particularly in the context of:&lt;br /&gt;Location privacy&lt;br /&gt;Behavioural Advertising&amp;nbsp;&lt;br /&gt;Applications and related services&lt;br /&gt;&lt;/li&gt;&lt;li&gt;To what extent is mobile users’ privacy protected across technological and legal boundaries?&lt;/li&gt;&lt;li&gt;What are different stakeholders doing, what can they do and what should they be doing to address these challenges?&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Which of the five broad IGF Themes or the Cross-Cutting Priorities does your workshop fall under?&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Security, Openness and Privacy&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Have you organized an IGF workshop before?&lt;/strong&gt; No&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;If so, please provide the link to the report&lt;/strong&gt;:&lt;/div&gt;
&lt;div&gt;No link to this report&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Provide the names and affiliations of the panellists you are planning to invite&lt;/strong&gt;:&lt;/div&gt;
&lt;div&gt;The GSMA is working to address these privacy related challenges and is also committed to helping establish and shape a culture of privacy that respects and protects the privacy of users across the mobile ecosystem. Its work is coordinated through the GSMA Mobile Privacy Initiative. Through this Initiative the GSMA has been working closely with Industry stakeholders, Regulators, Governments and NGOs globally. For this workshop, we would propose to invite a panel of 7-8 participants (including the moderator) which could represent the following stakeholder categories:&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;A Representative from GSMA (Pat Walshe, Director of Privacy)&amp;nbsp;&lt;/li&gt;&lt;li&gt;One mobile operator: Jeff Brueggeman (Vice President-Publiy Policy AT&amp;amp;T)&lt;/li&gt;&lt;li&gt;A rep from the online industry: (i) Patrick Ryan, Policy Counsel, Open Internet for Google Inc&lt;/li&gt;&lt;li&gt;A rep from an open source software developer: Ms Juliana Rotich, Executive Director of Ushahidi Inc&amp;nbsp;&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Two Civil Society/ NGO representatives&lt;/strong&gt;:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Sunil Abraham, executive director, The Centre for Internet and Society (India)&lt;/li&gt;&lt;li&gt;An academic (Ian Brown, co-director of Oxford University's Information Security and Privacy Programme )&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&lt;br /&gt;Panel Moderator: Ambassador David Gross, Partner, Wiley Rein LLP&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Remote panel moderator: Yiannis Theodorou, Regulatory Policy Manager, GSMA&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Provide the name of the organizer(s) of the workshop and their affiliation to various stakeholder groups&lt;/strong&gt;:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Natasha Jackson: Head of Content, GSMA and Board member of the Family Online Safety Institute (FOSI)&lt;/li&gt;&lt;li&gt;Pat Walshe: Director of Privacy, GSMA, Member British Computer Society, International Association of Privacy Professionals&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The GSMA and its members actively participated in previous IGF workshops. GSMA has proven expertise and capacity to organise multi-stakeholder workshops and conferences – including the Mobile World Congress, Mobile Asia Congress, Government Mobile Forum every year, attended by tens of thousands of delegates and also organised a roundtable on mobile privacy at the 32nd International Conference of Data Protection and Privacy Commissioners held in Israel in October 2010.&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;The GSMA represents the interests of the worldwide mobile communications industry. Spanning 219 countries, the GSMA unites nearly 800 of the world's mobile operators, as well as more than 200 companies in the broader mobile ecosystem, including handset makers, software companies, equipment providers, Internet companies, and media and entertainment organisations.&lt;/div&gt;
&lt;div&gt;&lt;br /&gt;&lt;strong&gt;Organization&lt;/strong&gt;:GSM Association&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Contact Person&lt;/strong&gt;: Yiannis Theodorou, Regulatory Policy Manager, GSMA&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;Workshop Number: 75&amp;nbsp;&lt;/div&gt;
&lt;div&gt;See the &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposals2011View&amp;amp;wspid=75"&gt;event details&lt;/a&gt; on the IGF website.&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/how-can-privacy-be-protected'&gt;https://cis-india.org/news/how-can-privacy-be-protected&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-09-22T10:03:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID">
    <title>Public Statement to Final Draft of UID Bill </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID</link>
    <description>
        &lt;b&gt;The final draft of the UID Bill that will be submitted to the Lok Sabha was made public on 8 November 2010. If the Bill is approved by Parliament, it will become a legal legislation in India. The following note contains Civil Society's response to the final draft of the Bill. &lt;/b&gt;
        
&lt;p&gt;On 8 November 2010, the UID Authority issued the final draft of the UID Bill that will be submitted to the Lok Sabha for review and approval. Earlier this year in June 2010 the Authority issued a draft UID Bill to the public for comment and review. Civil Society responded with a detailed summary and high summary of points that amended the draft or were missing in the draft Bill. We are disappointed that none of the concerns raised by Civil Society, including those listed below, were addressed.&lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Architecture&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The centralized architecture of the UID project is unnecessary. A federated and decentralized structure to the UID project would achieve the same goal of providing identity, authentication, and delivery of benefits.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Scope&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The scope of the Bill is overboard. Though the main purpose of the Bill is to facilitate the delivery of benefits to residents, the loose language and&amp;nbsp;intermixing of terms&amp;nbsp;creates a threat&amp;nbsp;that data will be collected and used&amp;nbsp;beyond delivery of benefits&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Voluntary and not Mandatory&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill should prohibit the denial of goods, services, entitlements, and benefits for lack of a UID number- provided that an individual furnishes equivalent ID, thus ensuring that the &lt;em&gt;Aadhaar&lt;/em&gt; number is truly voluntary.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Inadequate Privacy Safeguards&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill inadequately elaborates on the principles of privacy relating to identity and transaction data. The protections needed should be self-contained within the Bill. Thus, the UID Bill itself should be clear and concise about&amp;nbsp;data collection, transfer, retention, security, and dissemination.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Unwarranted Data Retention&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not provide adequate privacy protection for transaction data. In particular section 32(2) empowers the Authority to determine the duration that data is to be retained for.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Lack of accountability for all Actors&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill holds only the Authority accountable for violations. Rather the Bill needs to hold enrolling agencies, registrars, and other service providers accountable. Furthermore, the Bill does not provide adequate regulations or accountability for the data that are outsourced.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Lack of Exceptions&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not detail the circumstances and categories of people who will be excused or accommodated with respect to the issuing of &lt;em&gt;Aadhaar&lt;/em&gt; numbers or authentication of transactions.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Lack of Anonymity&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not provide adequate specificity as to the situations in which anonymity will be preserved and/or an&lt;em&gt; Aadhaar &lt;/em&gt;number should not be requested.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Inadequacy of Penalties&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The penalties provided in the Bill are inadequate, because they do not cover several types of misuse.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Unaffordability of Fees&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;It is incompatible with the Bill’s stated purpose of inclusion to require an individual to pay to be authenticated.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Lack of Rollback and Ombudsman Office&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not provide adequate redress for system/transaction errors and fraud.&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;
&lt;p&gt;&lt;strong&gt;Inappropriate Structure and Governance&lt;/strong&gt;&lt;/p&gt;
&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Bill does not provide appropriate judicial and parliamentary oversight.&lt;/p&gt;
&lt;p&gt; Upon comparison of the draft Bill and the final Bill, CIS finds the following changes the most&amp;nbsp;&amp;nbsp; significant:&amp;nbsp;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Definition of Resident&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Section 2 (q): “resident” means an individual usually residing in a
 village or rural area or town or ward or demarcated area (demarcated by
 the Registrar General of Citizen Registration) within&amp;nbsp; ward in a town 
or urban area”&lt;em&gt;&lt;strong&gt; &lt;/strong&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Comment&lt;/em&gt;: This section clarifies the definition of 
‘resident’ from the draft Bill, which defined resident as an “individual
 usually residing within the territory of India”. By specifying that 
individuals in demarcated areas will not receive UID numbers, the 
definition of resident is brought into line with the scope of the Bill 
as laid out in the preamble. We see this change as a positive revision.&lt;strong&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Prohibition of Dissemination of Information&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;Section 30 (3): “Notwithstanding anything contained in 
any other law and save as otherwise provided in this Act, the Authority 
or any of its officer or other employee or any agency who maintains the 
Central Identities Data Repository shall not, whether during his service
 as such or thereafter, reveal any information stored in the Central 
Identities Data Repository to any person”&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Comment&lt;/em&gt;: This 
section prohibits the dissemination of any information that is stored in
 the Central Identities Data Repository. This prohibition extends to 
anyone or any entity that handles information, and supersedes other laws
 that might permit dissemination of information. We see this change as a
 positive revision. &lt;strong&gt;&lt;br /&gt;&lt;/strong&gt;&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;strong&gt;Disclosure of Information in the Case of a National Security&lt;br /&gt;&lt;/strong&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;Section 33 (b):“Any disclosure of information (including identity information) made in the interests of national security in pursuance of a direction to that effect issued by an officer or officers not below the rank of Joint Secretary or equivalent in the Central Government specifically authorised in this behalf by an order of the Central Government”&lt;strong&gt;&lt;em&gt;&amp;nbsp; &lt;/em&gt;&lt;/strong&gt;&lt;em&gt;&lt;br /&gt;&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;em&gt;Comment&lt;/em&gt;: This section is a minor improvement on the previous draft since it requires&amp;nbsp; specific authorization from the Central Government (rather than from a Minister in charge). Unfortunately, however,&amp;nbsp; it retains the undesirable language of "national security" from the previous draft which, as we had previously pointed out,&amp;nbsp; is not currently clearly defined under Indian law. An alternative phrase that we recommend instead is the Constitutional vocabulary of&amp;nbsp; "public emergency" which already has a considerable volume of judicial reasoning that has elaborated what it means.&amp;nbsp; Eg. in Hukam Chand v. Union of India (AIR 1976 SC 789) it was held that a public emergency "is one which raises problems concerning the interest of public safety", the sovereignty and integrity of India, the security of the State, friendly relations with foreign States or public order, or the prevention of incitement to the commission of an offence."&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-publicstatement-UID&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:48:00Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis">
    <title>Public Law and Jurisprudential Issues of Privacy: A Talk at CIS</title>
    <link>https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis</link>
    <description>
        &lt;b&gt;On Friday, September 27, 2013, Abhayraj Naik will give a talk on public law and jurisprudential issues related to privacy. CIS will host the talk at its office in Bangalore from 4.30 p.m. to 6.00 p.m.&lt;/b&gt;
        
&lt;h3&gt;Abhayraj Naik&lt;/h3&gt;
&lt;p style="text-align: justify;"&gt;Abhayraj Naik is a graduate of the National Law School of  India University, Bangalore, and the Yale Law School. He  previously  taught public law at the Jindal Global Law School of the OP  Jindal Global University where he also co-directed  the Centre for Public Law &amp;amp; Jurisprudence from September 2009 to  July 2012.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Abhay is actively associated with the Environment Support Group, Bangalore  (&lt;a href="http://www.esgindia.org"&gt;http://www.esgindia.org&lt;/a&gt;), and has also been associated with the  Meiklejohn Civil Liberties Institute, Berkeley, USA; Universities Allied  for Essential Medicines, USA; Culture Move, Bangalore and other  national and international advocacy, activism and research groups for  several years now.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Abhay's research interests include legal theory,  philosophy, criminal justice reform, urban governance, ecology, and  technology policy. His current research projects include interdisciplinary studies  of urban street vending, information privacy, fiduciary duties,  forgiveness, biopiracy, and criminal justice reform.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;He enjoys cycling, travel, poetry, music, and radical educational and ecological activism.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;Abhay currently teaches at the Azim Premji University in Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;&lt;strong&gt;VIDEO&lt;/strong&gt;&lt;/p&gt;
&lt;iframe src="//www.youtube.com/embed/eTWSXa8g0gA" frameborder="0" height="250" width="250"&gt;&lt;/iframe&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis'&gt;https://cis-india.org/internet-governance/events/public-law-and-jurisprudential-issues-of-privacy-talk-at-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-30T12:39:23Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-times-of-india-mahendra-singh-may-18-2017-provide-hacker-details-outfit-that-claimed-data-leak-told">
    <title>Provide hacker details, outfit that claimed data leak told</title>
    <link>https://cis-india.org/internet-governance/news/the-times-of-india-mahendra-singh-may-18-2017-provide-hacker-details-outfit-that-claimed-data-leak-told</link>
    <description>
        &lt;b&gt;The Unique Identification Authority of India (UIDAI), the regulatory authority for Aadhaar, has written to a Bengaluru-based research organisation, Centre for Internet &amp; Society (CIS), seeking details about a suspected hack attack on government websites that led to the leak of information about 13 crore users.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article by Mahendra Singh was &lt;a class="external-link" href="http://timesofindia.indiatimes.com/india/provide-hacker-details-outfit-that-claimed-data-leak-told/articleshow/58725132.cms"&gt;published in the Times of India&lt;/a&gt; on May 18, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;In a recent report, CIS had highlighted that websites run by various  government departments, owing to a poor security framework, had publicly  displayed sensitive personal financial information and Aadhaar numbers  of beneficiaries of certainprojects.   &lt;br /&gt; &lt;br /&gt; In its letter, UIDAI argued that the data downloaded from one of the  websites could not have been accessed unless the website was hacked. As  hacking is a grave offence under the law, the UIDAI has asked CIS to  provide details of the persons involved in the data theft.   &lt;br /&gt; &lt;br /&gt; According to a source, the UIDAI said that access to data on the  website for the 'National Social Assistance Program' was only possible  for someone in possession of authorised login details, or if the site  (http://nsap.nic.in) was hacked or breached. The UIDAI said in its  letter that such illegal access was against the provisions of the  Aadhaar Act, 2016, and the IT Act, 2000, and that the persons involved  had committed a grave offence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Asking the CIS to reply before May 30, the UIDAI also said, "Aadhaar system is a protected system under Section 70 of the IT Act, 2000, the violation of which is punishable with rigorous imprisonment for a period up to 10 years." It added that the penalty clauses for violations are also provided in Section 36, Section 38 and Section 39 of the Aadhaar Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI, however, maintained that even if the Aadhaar details were known to someone it did not pose a real threat to the people whose information was publicly available because the Aadhaar number could not be misused without biometrics.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI letter said, "While, as your report suggests, there is a need to strengthen IT security of government websites, it is also important that the persons involved in hacking such sensitive information are brought to justice for which your assistance is required under the law."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Your report mentions 13 crore people's data has been 'leaked'. Please specify how much of this data had been downloaded by you or are in your possession or in the possession of any other persons that you know. Please provide the details," the UIDAI added in its letter. The UIDAI also urged CIS to provide the details of the persons/organisations with whom it shared the data, if it did.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-times-of-india-mahendra-singh-may-18-2017-provide-hacker-details-outfit-that-claimed-data-leak-told'&gt;https://cis-india.org/internet-governance/news/the-times-of-india-mahendra-singh-may-18-2017-provide-hacker-details-outfit-that-claimed-data-leak-told&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-06-07T12:14:13Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/protection-of-privacy-in-mobile-phone-apps">
    <title>Protection of Privacy in Mobile Phone Apps</title>
    <link>https://cis-india.org/internet-governance/blog/protection-of-privacy-in-mobile-phone-apps</link>
    <description>
        &lt;b&gt;The term “Fintech” refers to technology-based businesses that compete against, enable and/or collaborate with financial institutions. The year 2015 was a critical year for the Indian fintech industry, which saw the rise of numerous fintech start-ups, incubators and investments from the public and private sector.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;According to NASSCOM, the Indian fintech market is worth an estimated USD 1.2 billion, and is predicted to reach USD 2.4 billion by 2020.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;The services brought forth by Fintech, such as digital wallets, lending, and insurance, have transformed the ways in which businesses and institutions execute dayto-day transactions. The rise of fintech in India has rendered the nation’s market a point of attraction for global investment.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;Fintech in India is perceived both as a catalyst for economic growth and innovation, as well as a means of financial inclusion for the millions of unbanked individuals and businesses. The government of India, along with regulators such as SEBI (Securities and Exchange Board of India) and RBI (Reserve Bank India), has consistently supported the digitalization of the nation’s economy and the formation of a strong fintech ecosystem through funding and promotional initiatives.&lt;a href="#fn3" name="fr3"&gt;[3] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RBI has been pivotal in enabling the development of India’s fintech sector and adopting a cautious approach in addressing concerns around consumer protection and law enforcement. Its key objective as a regulator has been to create an environment for unimpeded innovations by fintech, expanding the reach of banking services for unbanked populations, regulating an efficient electronic payment system and providing alternative options for consumers. The RBI’s prime focus areas for enabling fintech have been around payment, lending, security/biometrics and wealth management. For example, the RBI has introduced “Unified Payment Interface” with the NPCI (National Payments Corporation of India), which has been critical in revolutionizing digital payments and pushing India closer to the objective of a cash-less society. It has also released a consultation paper on regulating Peer 2 Peer (P2P) lending market in India, highlighting the advantages and disadvantages of regulating the sector.&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The consultation paper offers a definition of P2P lending as well as a general explanation of the activity and the digital platforms that facilitate transactions between lenders and borrowers. It also provides a set of arguments for and against regulating P2P lending. The arguments against regulating the sector mainly pertain to the risk of stifling the growth of an innovative, efficient and accessible avenue for borrowers who either lack access to formal financial channels or are denied loans by them.&lt;a href="#fn5" name="fr5"&gt;[5] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is the general consensus around the positive impact of the Fintech sector in India: its facilitation of financial inclusion and economic opportunity. However, the paper lists many more arguments for regulation than against. One of the main points made is with regards to P2P lending’s potential to disrupt the financial sector by challenging traditional banking channels. There is also the argument that, if properly regulated, the P2P lending platforms can more efficiently and effectively exercise their potential of promoting alternative forms of finance.&lt;a href="#fn6" name="fr6"&gt;[6] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper concludes that the balance of advantage would lie in developing an appropriate regulatory and supervisory toolkit that facilitates the orderly growth of the P2P lending sector in order to harness its ability to provide an alternative avenue for credit for the right borrowers&lt;a href="#fn7" name="fr7"&gt;[7] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The RBI’s regulatory framework for P2P lending platforms encompasses the permitted activity, prudential regulations on capital, governance, business continuity plan (BCP) and customer interface, apart from regulatory reporting.&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Securities and Exchange Board of India (SEBI) is also a prominent regulator of the Indian fintech sector. They issued a consultation paper on “crowdfunding”, which is defined as the solicitation of funds (small amounts) from multiple investors through a web-based platform or social networking site for a specific project, business venture or social cause. P2P lending is then a form of crowdfunding, which can be understood as an umbrella term that covers fintech lending practices. SEBI’s paper aimed to provide a brief overview of the global scenario of crowdfunding including the various prevalent models under it, the associated benefits and risks, the regulatory approaches in different jurisdictions, etc. It also discusses the legal and regulatory challenges in implementing the framework for crowdfunding. The paper proposes a framework for ushering in crowdfunding by giving access to capital markets to provide an additional channel of early stage funding to Start-ups and SME’s and seeks to balance the same with investor protection.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; Unlike RBI’s consultation paper on P2P lending, SEBI’s paper on crowdfunding was intended mainly to invite discussion and not necessarily to implement a framework for regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some of the benefits cited in SEBI’s crowdfunding paper pertain to the commonly mentioned advantages of fintech: economic opportunity for the SME sector and start-ups, alternative lending systems to keep SMEs alive when traditional banks crash, new investment avenues for the local economy and increased competition in the financial sector.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The paper also lists a set of risks that suggest the need for a regulatory framework for crowdfunding. For example, it mentions the “substitution of institutional risk by retail risk”, meaning that individual lenders, who’s risk tolerance may be low, bear the risk of low/no return investors when they lend to SMEs without adequate assessment of credit worthiness. Also, there is the risk that the digital platform that facilitates lending and issues all the transactions, may not conduct proper due diligence. If the platform is temporarily shut down or closed permanently, no recourse is available to the investors.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The SEBI paper mentions a long list of other risks associated with crowdfunding, mostly associated with systemic failures, loan defaults, fraud practices, and information asymmetry. Information asymmetry refers partially to the chance that lending decisions are made based on incomplete data sets that are based on social networking platforms. There is a lack of transparency and reporting obligations in issuers including with respect to the use of funds raised.&lt;a href="#fn12" name="fr12"&gt;[12] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similar to the RBI consultation paper, SEBI makes a decent effort to weigh the costs and benefits of crowdfunding practices but only does this from an economic/financial perspective. Most of the cited risks, benefits and concerns tend to overlook information security and risks of privacy breaches of the implicated borrowers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India Stack is a paperless and cashless service delivery system that has been supported by the Indian government as part of the fintech sector. It is a new technology paradigm that is designed to handle massive data inflows, and is poised to enable entrepreneurs, citizens and governments to interact with one another transparently. It is intended to be an open system to electronically verify businesses, people and services. It allows the smartphone to become the delivery platform for services such as digital payments, identification and digital lockers. The vision of India Stack is to shift India towards a paperless economy.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The central government, based on its experience with the Aadhaar project, decided to launch the opendata initiative in 2012 supported by an open API policy, which would pave the way for private technology solutions to build services on top of Aadhaar and to make India a digital cash economy. Unified Payments Interface (UPI), which will make mobile payments card-less and completely digital, allows consumers to transact directly through their bank account with a unique UPI identity that syncs to Aadhaar’s verification and connects to the merchant, the settlement and the issuing bank to close transactions.&lt;a href="#fn14" name="fr14"&gt;[14] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is suspected that India Stack will shift in business models in banking from low-volume, high-value, high-cost and high fees to high-volume, low-value, low cost and no fees. This well lead to a drastic increase in accessibility and affordability, and the market force of consumer acquisition and the social purpose of mass inclusion will converge.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India Stack serves as an example of how the Government of India has supported initiatives that would promote the fintech sector while facilitating economic growth and financial opportunity for unbanked individuals. However, there is continuous discussion around India Stack’s attachment to the Aadhaar system, which can lead to the exclusion of unregistered individuals from the benefits that would otherwise be reaped from the open-data initiative. It can also result in many privacy and security breaches when records of individuals’ daily transactions are attached to their Aadhaar numbers, which carry their biometric information and is linked to other personal data that is held by the government such as health records.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://cis-india.org/internet-governance/files/protection-of-privacy-in-mobile-phones.pdf/view"&gt;&lt;b&gt;Download the Full Report&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. KPMG: https://assets.kpmg.com/content/dam/kpmg/pdf/2016/06/FinTech-new.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. RBI 2P2 Consultation Paper, https://rbidocs.rbi.org.in/rdocs/content/pdfs/CPERR280416.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. SEBI Crowdfunding consultation paper, http://www.sebi.gov.in/cms/sebi_data/attachdocs/1403005615257.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Krishna, https://yourstory.com/2016/07/india-stack/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Id.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Nilekani, http://indianexpress.com/article/opinion/columns/the-coming-revolution-in-indian-banking-2924534/&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/protection-of-privacy-in-mobile-phone-apps'&gt;https://cis-india.org/internet-governance/blog/protection-of-privacy-in-mobile-phone-apps&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Hitabhilash Mohanty and Edited by Leilah Elmokadem</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-15T14:18:43Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech">
    <title>Proposed Intermediary Liability Rules threat to privacy and free speech, global coalition tells MeitY</title>
    <link>https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech</link>
    <description>
        &lt;b&gt;“We respectfully call on you to withdraw the draft amendments proposed to the Information Technology (Intermediary Guidelines) Rules in December. As published, the draft amendments would erode digital security and undermine the exercise of human rights globally.”&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The blog post by Zaheer Merchant was published by &lt;a class="external-link" href="https://www.medianama.com/2019/03/223-proposed-intermediary-liability-rules-threat-to-privacy-and-free-speech-global-coalition-tells-meity/"&gt;Medianama &lt;/a&gt;on March 18, 2019.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;A global coalition of 31 civil society organizations and technology  experts has called on MeitY to reconsider the proposed amendments to the  Intermediary Liability Rules, terming them a threat to privacy and free  speech. In a letter to the ministry dated March 15, the coalition said  that the proposed amendments “would harm fundamental rights and the  space for a free internet, without necessarily addressing the problems  that the ministry aims to resolve.” Some of the signatories are Centre  for Internet and Society, SFLC.in, Internet Freedom Foundation,  Government Accountability Project and Human Rights Watch, among others  (A copy of the letter is attached at the bottom). The letter breaks down  its reasons for opposing the proposed amendments:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Traceability would undermine security, lead to surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the proposed guidelines, intermediaries would have to ensure  ‘traceability’ of messages by providing information related to its  originator and receivers. This, the letter argues, would force  intermediaries to undermine the security of of their platforms and  create a surveillance regime. “Undermining security features to ensure  traceability would affect all users of that platform, not just those  that are the subjects of the information request,” the letter reads. “…  such wide and ambiguous powers… on interception of communications would  directly harm the fundamental right to privacy of Indians and facilitate  unchecked surveillance.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. Data retention antithetical to privacy, must go&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letter also states that the data retention mandate included in  the draft guidelines is antithetical to privacy. The guidelines state  that intermediaries must preserve content requested by law enforcement  for 180 days or longer. This open-ended data retention, the letter  argues, contradicts the principle of ‘Storage Limitation’ recommended by  the Srikrishna Committee. “Provisions regarding storage limitation and  data retention must not be included within the fold of the Intermediary  Guidelines, and should be subject to parliamentary law-making,” the  letter reads.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. Proactive monitoring contradicts SC’s Shreya Singhal judgment, would result in censorship&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The letter also criticizes the requirement that intermediaries  proactively monitor and automatically delete ‘unlawful content’. “[This]  would directly conflict with the legal standard laid down by the  Supreme Court of India in the Shreya Singhal judgment, which holds that  intermediaries should only be legally compelled to take down content on  the basis of court orders or legally empowered government agencies,” the  letter reads. It could also cause intermediaries to err in favor of  takedowns, resulting in unnecessary censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“With the upcoming General Elections in India and the imposition of  the Model Code of Conduct on new policy decisions in place, we urge the  government to not push through these amended regulations given their  impact on fundamental rights and secure communications,” the letter  concludes.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;The proposed amendments to Intermediary Liability Rules &lt;b&gt;&lt;br /&gt; &lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Released at the end of December 2018, the proposed amendments to the  Intermediary Guidelines would modify guidelines under the Information  Technology Act concerning intermediaries, ostensibly to prevent misuse  of social media platforms and check the spread of fake news. Under  India’s Information Technology Act, any entity, person or platform that  receives, stores, processes, or transmits electronic information on  behalf of another is considered an intermediary. These include social  media platforms, cloud services, internet service providers, email  service providers and more. For an intermediary to avoid liability for  its users’ actions, it must comply with the proposed guidelines which  are being amended to the following:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;&lt;b&gt;Traceability, and information within 72 hours:&lt;/b&gt; The  new rules require platforms to introduce traceability to find where a  piece of information originated. For this, platforms may have to break  end-to-end encryption. The rules require the intermediary to hand over  information or assistance to government bodies in 72 hours, including in  matters of security or cybersecurity, and for investigative purposes.  [Rule 3(5)]&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Platforms with more than 50 lakh users are required to be registered&lt;/b&gt; under the Companies Act, have a physical address in the country, have a  nodal officer who will cooperate with law enforcement agencies, etc.  [Rule 3(7)]&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Platforms have to pull down unlawful content&lt;/b&gt; within  a shorter duration of 24 hours from the earlier 36 hours. They also  have to keep records of the “unlawful activity” for 180 days – double  the period of 90 days in the 2011 rules – as required by the court or  government agencies [Rule 3(8)]&lt;/li&gt;
&lt;li&gt;&lt;b&gt;Platforms have to deploy tools&lt;/b&gt; to proactively identify, remove and disable public access to unlawful information or content. [Rule 3(9)]&lt;/li&gt;
&lt;li&gt;&lt;b&gt;The new rules insert a monthly requirement on platforms&lt;/b&gt; to inform users of the platforms’ right to terminate usage rights and  to remove non-compliant information at their own discretion. [Rule 3(4)]&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech'&gt;https://cis-india.org/internet-governance/news/medianama-march-18-2019-zaheer-merchant-proposed-intermediary-liability-rules-threat-privacy-and-free-speech&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Zaheer Merchant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-03-20T15:56:51Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/jobs/programme-officer-privacy-2019">
    <title>Programme Officer - Privacy</title>
    <link>https://cis-india.org/jobs/programme-officer-privacy-2019</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) is seeking applications for the position of Programme Officer, to undertake public policy research on privacy and related themes. For this position, we will hire one full time researcher, to be based in the Delhi office of CIS, for the duration of one year.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h4&gt;To apply for this position please write to amber@cis-india.org along with a CV, two writing samples and contact details of two references, Interested candidates are invited to send their applications at the earliest — latest by April 30th.&lt;/h4&gt;
&lt;hr /&gt;
&lt;h3&gt;Organisation Profile&lt;/h3&gt;
&lt;p&gt;The Centre for Internet and Society (CIS) is a non-profit organisation that undertakes interdisciplinary research on internet and digital technologies from policy and academic perspectives. The areas of focus include digital accessibility for persons with disabilities, access to knowledge, intellectual property rights, openness (including open data, free and open source software, open standards, open access, open educational resources, and open video), internet governance, telecommunication reform, digital privacy, and cyber-security. The academic research at CIS seeks to understand the reconfiguration of social processes and structures through the internet and digital media technologies, and vice versa. Through its diverse initiatives, CIS explores, intervenes in, and advances contemporary discourse and practices around internet, technology and society in India, and elsewhere.&lt;/p&gt;
&lt;h3&gt;Privacy Research at CIS&lt;/h3&gt;
&lt;p&gt;While privacy has been a key subject of study for digital rights and development organisations in India for the last decade, recent and ongoing legal and policy developments have placed this issue at the forefront of human rights and regulatory research. CIS has conducted extensive research into the areas of privacy, data protection, data security, and was also a member of the Committee of Experts constituted under Justice A P Shah. CIS has also been cited multiple times in the Report of the Committee of Experts led by Justice Srikrishna. CIS values the fundamental principles of justice, equality, freedom and economic development and strongly advocates the right to privacy.&lt;/p&gt;
&lt;p&gt;Over the next year, CIS intends to look at several research questions on data protection which may include the global experience with privacy enforcement, need for effective redressal mechanisms, documenting the design of business models and data flows, regulation of social media big data, how data of disadvantaged groups including children may be protected. Additionally, while we now have the Supreme Court’s unanimous and emphatic recognition of the fundamental right to privacy, there is a need for research enquiry into several issues such as a clarification of  the scope of the Puttaswamy judgment, unpacking the different dimensions of privacy, how state actions interact with privacy.&lt;/p&gt;
&lt;h3&gt;The Role&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Research and analysis: Literature review, policy design, detailed analysis of research topics&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Knowledge management: Staying up-to-date on developments of interest to the project, and sharing/debating these with the team. Contributing to documentary and knowledge management processes&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Policy outreach and stakeholder engagement: Supporting the project manager in the dissemination of research findings in innovative formats. Attending, planning and executing events&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Writing op-eds, short notes, policy briefs and longer form academic writing for a range of audiences&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Presentations and formal discussions: Preparing and delivering presentations to various audiences&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Helping manage communications with stakeholders including international experts, regulators and policy makers&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;
&lt;li&gt;Managing interns and team: Managing work outputs with our interns; coordinating research with team members and the project manager&lt;/li&gt;&lt;/ul&gt;
&lt;h3&gt;Qualifications and Skills&lt;/h3&gt;
&lt;p&gt;We are looking for professionals from law, regulatory theory and public policy backgrounds.&lt;/p&gt;
&lt;p&gt;We are looking for candidates who are interested in studying the regulatory challenges of notice and consent, state capacity, how business models thwart privacy and the future of privacy post Puttaswamy.&lt;/p&gt;
&lt;p&gt;This is a full-time position based out of Delhi. The position is for a duration of one year. Salary will be commensurate with qualifications and experience.&lt;/p&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/jobs/programme-officer-privacy-2019'&gt;https://cis-india.org/jobs/programme-officer-privacy-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Jobs</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-04-15T06:53:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear">
    <title>Private Censorship and the Right to Hear</title>
    <link>https://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear</link>
    <description>
        &lt;b&gt;Very little recourse is available against publishers or intermediaries if these private parties censor an author’s content unreasonably.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.thehoot.org/web/Private-censorship-and-the-right-to-hear/7652-1-1-6-true.html"&gt;published in the Hoot&lt;/a&gt; on July 17, 2014 and also mirrored on the &lt;a class="external-link" href="http://ccgnludelhi.wordpress.com/"&gt;website of Centre for Communication Governance&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;DNA&lt;/i&gt; newspaper's removal of &lt;a href="http://www.dnaindia.com/authors/rana-ayyub" target="_blank"&gt;Rana Ayyub&lt;/a&gt;'s brave &lt;a href="http://caravandaily.com/portal/censored-rana-ayyub-article-on-amit-shah-that-dna-axed/" target="_blank"&gt;piece&lt;/a&gt; on Amit Shah, with no explanation, is shocking. It is reminiscent of  the role that media owners played in censoring journalists during the  Emergency, prompting L.K. Advani to say, "&lt;a href="https://wearethebest.wordpress.com/2010/06/29/hindu-and-ht-were-worst-offenders-in-1975/" target="_blank"&gt;You were asked to bend, but you crawled&lt;/a&gt;."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;The  promptitude with which some media houses are weeding out political  writing that might get them into trouble should make us reconsider the  way we think about the &lt;a href="http://www.indiankanoon.org/doc/1157189/" target="_blank"&gt;freedom of the press&lt;/a&gt;.  Discussions of press freedom often concentrate on the individual's  right to speak, but may be more effective if they also accommodated  another perspective - the &lt;a href="http://balkin.blogspot.in/2011/03/hugo-black-lecture-part-i.html" target="_blank"&gt;audience's right to hear&lt;/a&gt;.&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;It  is fortunate that Ayyub's piece was printed and reached its audience  before attempts were made to bury it. Its removal was counterproductive,  making &lt;i&gt;DNA&lt;/i&gt;'s decision a good example of what is popularly known as the &lt;a href="http://en.wikipedia.org/wiki/Streisand_effect" target="_blank"&gt;Streisand Effect&lt;/a&gt; (when an attempt to censor or remove infor-mation has the unintended  consequence of publicising the information even more widely). &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The controversy that has emerged from &lt;i&gt;DNA&lt;/i&gt; removing the article has generated much wider attention for it now that it has appeared on &lt;a href="http://caravandaily.com/portal/censored-rana-ayyub-article-on-amit-shah-that-dna-axed/" target="_blank"&gt;multiple&lt;/a&gt; &lt;a href="http://rantographic.blogspot.in/2014/07/a-new-low-in-indian-politics-rana-ayyub.html" target="_blank"&gt;websites&lt;/a&gt;, its readership expanding as &lt;a href="https://twitter.com/search?q=rana%20ayyub&amp;amp;src=typd" target="_blank"&gt;outrage&lt;/a&gt; at its removal &lt;a href="http://www.firstpost.com/india/newspaper-pulls-down-article-critical-of-amit-shah-twitter-outrages-1616767.html" target="_blank"&gt;ricochets&lt;/a&gt; around the Internet. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;This incident is hardly the first of its kind. Just weeks ago, &lt;a href="http://www.livemint.com/Companies/rqT2Oi8fwv4XVjJcHzlcVN/Inside-the-Network18-takeover.html" target="_blank"&gt;news&lt;/a&gt; surfaced of Rajdeep Sardesai being pressurised to alter his news channel's political coverage before the national election. The &lt;i&gt;Mint&lt;/i&gt; &lt;a href="http://www.livemint.com/Companies/rqT2Oi8fwv4XVjJcHzlcVN/Inside-the-Network18-takeover.html" target="_blank"&gt;reported&lt;/a&gt; that the people pressurising Sardesai wanted a complete blackout of  Kejriwal and the Aam Admi party from CNN-IBN. Had he capitulated,  significant news of great public interest would have been lost to a  large audience. CNN-IBN's decision would have been put down to editorial  discretion, and we the public would have been none the wiser. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Luckily for their audience, Sardesai and Sagarika Ghose &lt;a href="http://www.thenewsminute.com/news_sections/456" target="_blank"&gt;quit&lt;/a&gt; the channel that they built from scratch instead of compromising their  journalistic integrity.  However, the league of editors who choose to  crawl remains large, their decisions protected by the Indian  constitution.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The  freedom of the press in India only protects the press from the  government's direct attempts to influence it. Both big business and the  state have far more instruments at their disposal than just direct  ownership or censorship diktats. These include withdrawal of lucrative  advertisements, &lt;a href="http://www.legallyindia.com/201404294653/Bar-Bench-Litigation/khaitan-mulla-ambani-gas-wars" target="_blank"&gt;defamation notices&lt;/a&gt; threatening journalists with enormous fines and imprisonment, and sometimes even &lt;a href="http://www.thehindu.com/news/national/11-journalists-killed-in-india-in-2013/article5523381.ece" target="_blank"&gt;physical violence&lt;/a&gt;. Who can forget how &lt;i&gt;Tehelka&lt;/i&gt; magazine's exposure of largescale government wrongdoing resulted in its  financiers being persecuted by the Enforcement Directorate, with one of  them even being jailed for some time. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;The  instruments of harassment work best when the legal notices are sent to  third party publishers or intermediaries. Unlike the authors who may  wish to defend their work or modify it a little to make it suitable for  publication, a publishing house or web platform would usually prefer to  avoid expensive litigation. Third party publishers will often &lt;a href="http://timesofindia.indiatimes.com/india/Under-pressure-publisher-puts-books-under-review/articleshow/36024216.cms" target="_blank"&gt;remove&lt;/a&gt; legitimate con-tent to avoid spending time and money fighting for it. &lt;a href="http://www.theguardian.com/books/2014/feb/19/penguin-india-protest-hindus-wendy-doniger" target="_blank"&gt;Pressurising&lt;/a&gt; them is a fairly effective way to silence authors and journalists. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Consider  the different news outlets and publishing houses that control what  reaches us as news or commentary. If they can be forced to bury content,  citing editorial discretion, consider what this means for the quality  of news that reaches the Indian public. Indira Gandhi understood this  weakness of the press, and &lt;a href="https://wearethebest.wordpress.com/2010/06/29/hindu-and-ht-were-worst-offenders-in-1975/" target="_blank"&gt;successfully controlled&lt;/a&gt; the Indian media by managing the proprietors.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Although  media ownership still remains concentrated in a few hands, the  disruptive element that still offers some hope of free public dialogue  is the Internet where, through blogs, small websites and social media,  journalists can still get access to the public sphere. This means that  when &lt;i&gt;DNA&lt;/i&gt; deletes Rana Ayyub's article, copies of it are immediately posted in other places. &lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;However, online journalism is also vulnerable. Online intermediaries which receive &lt;a href="http://ibnlive.in.com/news/dot-orders-blocking-of-73-urls-with-content-critical-of-iipm-including-a-ugc-notice-report/373152-11.html" target="_blank"&gt;content blocking&lt;/a&gt; and &lt;a href="http://www.indexoncensorship.org/2013/11/india-online-report-freedom-expression-digital-freedom-1/" target="_blank"&gt;take down&lt;/a&gt; orders tend to &lt;a href="https://cis-india.org/internet-governance/chilling-effects-on-free-expression-on-internet" target="_blank"&gt;over-comply&lt;/a&gt; rather than risk litigation. Like publishers, these intermediaries can  easily prevent speakers from reaching their audiences. Just look at the  volume of information online that is dependent on third party  intermediaries such as Rediff, Facebook, WordPress or Twitter. The only  thing that keeps the state and big business from easily controlling the  flow of information on the Internet is that it is difficult to exert &lt;a href="http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/19/government-take-down-requests-to-google-hits-a-new-record-company-says/" target="_blank"&gt;cross-border pressure&lt;/a&gt; on online intermediaries located outside India.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;However,  the ease with which most of the mainstream media is controlled makes it  easy to construct a bubble of fiction around audiences, leaving them in  blissful ignorance of how little they really know. Very little recourse  is available against publishers or intermediaries if these private  parties censor an author's content unreasonably. Unlike state  censorship, &lt;a href="http://www.lse.ac.uk/CPNSS/research/currentResearchProjects/ChoiceGroup/PDF_files/WP_6_2.pdf" target="_blank"&gt;private censorship&lt;/a&gt; is invisible, and is protected by the online and offline intermediaries' right to their editorial choices.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;Ordinarily,  there is nothing wrong with editorial discretion or even with a media  house choosing a particular slant to its stories. However, it is  important for the public to have access to a healthy range of  perspectives and interests, with a diversity of content. If news of  public significance is regularly filtered out, it affects the state of  our democracy. Citizens cannot participate in governance without access  to important information.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;&lt;span&gt;It  is, therefore, vital to acknowledge the harm caused by private  censorship. A democracy is endangered when a few parties  disproportionately control access to the public sphere. We need to think  of how to ensure that the voices of journalists and scholars reach  their audience. Media freedom should be seen in the context of the right  of the audience, the Indian public, to receive information.&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear'&gt;https://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-07-22T05:57:09Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/igf-2013-workshop-335-privacy-from-regional-regulations-to-global-connections">
    <title>Privacy: from regional regulations to global connections ?</title>
    <link>https://cis-india.org/news/igf-2013-workshop-335-privacy-from-regional-regulations-to-global-connections</link>
    <description>
        &lt;b&gt;This workshop is being organised by Internet Society at Bali on October 24. Sunil Abraham is one of the panelists for this.&lt;/b&gt;
        &lt;p&gt;&lt;i&gt;The Internet Governance Forum 2013 is being held at Bali from October   22 to 25. The overarching theme for the 2013 IGF meeting is: "Building   Bridges"- Enhancing Multistakeholder Cooperation for Growth and   Sustainable Development"&lt;/i&gt;.&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/wks2013/workshop_2013_status_list_view.php?xpsltipq_je=335"&gt;Read the original published on the IGF website&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Theme: Internet Governance Principles&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Internet dissolves geographical boundaries on a greater scale than any prior invention. It allows data, personal and otherwise, to flow across borders, supporting social and economic interactions. However, there is a complex mix of factors at play: multiple policy objectives that are sometimes in conflict; individuals’ rights; the interests of the communities; “monetization” of personal data for short-term and long-term commercial gain; different historical cultural and regulatory approaches to privacy; etc. &lt;br /&gt;&lt;br /&gt;Across a diverse, global Internet, how can we best deal with the tensions that naturally result from differences in personal privacy expectations, economic aspirations, and regulatory regimes, particularly when it comes to online data protection? &lt;br /&gt;&lt;br /&gt;This workshop will explore what core principles and strategies are needed to achieve a balanced and fair approach to data protection that is effective internationally and regionally. In the process, we will examine the possible paths to a global solution, together with impediments, and explore how successful local and regional approaches could be leveraged at the international level.&lt;br /&gt;&lt;br /&gt;We will also strive to articulate lessons learned from recent initiatives such as the modernisation of the Council of Europe Convention 108, the revision of the OECD Privacy Guidelines, the APEC Cross Border Privacy Rules System, and the proposed revisions to the EU data protection framework, etc. in tackling these challenging issues.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Has the proponent organised a workshop with a similar subject during past IGF meetings?&lt;br /&gt;&lt;/b&gt;Yes&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Indication of how the workshop will build on but go beyond the outcomes previously reached &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The submitter has not previously organised a workshop at the IGF.  However, his colleague has co-organised the following workshops on  related issues:  2012: ICC BASIS and ISOC - Solutions for enabling cross-border data  flows –  &lt;a class="external-link" href="http://wsms1.intgovforum.org/sites/default/files/IGF%202012%20ws86%20report_10%2012%2012%20final.doc"&gt;http://wsms1.intgovforum.org/sites/default/files/IGF%202012%20ws86%20report_10%2012%2012%20final.doc&lt;/a&gt; 2012: CoE and ISOC – Who is following me: tracking the trackers –  &lt;a class="external-link" href="http://wsms1.intgovforum.org/content/no181-who-following-me-tracking-trackers#report"&gt;http://wsms1.intgovforum.org/content/no181-who-following-me-tracking-trackers#report&lt;/a&gt; 2010: ISOC and EFF – The Future of Privacy –  &lt;a class="external-link" href="http://www.internetsociety.org/sites/default/files/future-privacy%2020100914.pdf"&gt;http://www.internetsociety.org/sites/default/files/future-privacy%2020100914.pdf&lt;/a&gt; Background papers:  Report from a WSIS Forum 2012 thematic workshop entitled: “Data Privacy  on a global scale: keeping pace with an evolving environment” – &lt;a class="external-link" href="http://www.internetsociety.org/sites/default/files/Data%20Privacy%20on%20a%20global%20scale_0.pdf"&gt; http://www.internetsociety.org/sites/default/files/Data%20Privacy%20on%20a%20global%20scale_0.pdf&lt;/a&gt; Report  from a IGF2012 workshop entitled “Solutions for enabling cross-border  data flows - &lt;a class="external-link" href="https://www.internetsociety.org/sites/default/files/IGF%202012%20cross-border%20data%20flows.pdf"&gt; https://www.internetsociety.org/sites/default/files/IGF%202012%20cross-border%20data%20flows.pdf&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Background Paper&lt;/h3&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.intgovforum.org/cms/wks2013/workshop_background_paper/29_1373533670.PDF"&gt;Download background paper&lt;/a&gt;&lt;/p&gt;
&lt;h3&gt;Co-organisers&lt;/h3&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;Ms. Sophie Kwasny, Head of the Data Protection Unit, Council of Europe , Intergovernmental Organizations, FRANCE, Western Europe and Others Group - WEOG&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mr. Frederic Donck, Internet Society, Technical Community, BELGIUM, Western Europe and Others Group - WEOG&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Have the Proponent or any of the co-organisers organised an IGF workshop before?&lt;/b&gt;&lt;br /&gt;Yes&lt;/p&gt;
&lt;p&gt;The link(s) to the workshop report(s)&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a href="http://www.internetsociety.org/sites/default/files/Data%20Privacy%20on%20a%20global%20scale_0.pdf"&gt;http://www.internetsociety.org/sites/default/files/Data%20Privacy%20on%20a%20global%20scale_0.pdf&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://https//www.internetsociety.org/sites/default/files/IGF%202012%20cross-border%20data%20flows.pdf"&gt;https://www.internetsociety.org/sites/default/files/IGF%202012%20cross-border%20data%20flows.pdf&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Panelists&lt;/h3&gt;
&lt;p&gt;Please click on Biography to view the biography of panelist&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Sophie Kwasny, Head of the Data Protection Unit, Council of Europe , Female, Intergovernmental Organizations, FRANCE, Western Europe and Others Group – WEOG&lt;/li&gt;
&lt;li&gt;Nigel Waters, Public Officer, Australian Privacy Foundation , Male, Civil Society, Australia, Asia-Pacific Group&lt;/li&gt;
&lt;li&gt;Wendy Seltzer, Policy Counsel, World Wide Web Consortium (W3C) , Female, Technical Community, United States, Western Europe and Others Group – WEOG&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=104" target="_blank"&gt;&lt;span&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;Biography&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Joseph Alhadeff, Vice President for Global Public Policy, Chief Privacy Officer, Oracle Corporation, Male, Private Sector, United States, Western Europe and Others Group – WEOG&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=34" target="_blank"&gt;&lt;span&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;Biography&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Sunil Abraham, Executive Director, Centre for Internet and Society (CIS), Bangalore, Male, Civil Society, India, Asia-Pacific Group&lt;a href="http://www.intgovforum.org/cms/wks2013/panellist_2013_list_view.php?qbofmmjtu_je=108" target="_blank"&gt;&lt;span&gt;&lt;i&gt;&lt;br /&gt;&lt;/i&gt;Biography&lt;/span&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;h3&gt;Moderator&lt;/h3&gt;
&lt;p&gt;Frederic Donck, Internet Society, Director European Regional Bureau&lt;/p&gt;
&lt;h3&gt;Remote Moderator&lt;/h3&gt;
&lt;p&gt;Luca Belli, CERSA,Université Panthéon-Assas Sorbonne University&lt;/p&gt;
&lt;h3&gt;Agenda&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Moderator will briefly introduce the session as well as the different panellists. Each panellist will have 2 minutes (maximum) to introduce his/her own perspective on the general issues addressed by the moderator.&lt;br /&gt;&lt;br /&gt;No powerpoints allowed. Very dynamic session with regular interventions from remote participants and audience, as well as between panellists is sought.&lt;br /&gt;&lt;br /&gt;Moderator will work out questions (including through a coordinated approach before the session with panellists) and will organise the session in a way that allows a balanced conversation between all stakeholders (on-site/remotely).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Inclusiveness of the Session&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Moderator will briefly introduce the session as well as the different panellists. Each panellist will have 2 minutes (maximum) to introduce his/her own perspective on the general issues addressed by the moderator.&lt;br /&gt;&lt;br /&gt;No powerpoints allowed. Very dynamic session with regular interventions from remote participants and audience, as well as between panellists is sought.&lt;br /&gt;&lt;br /&gt;Moderator will work out questions (including through a coordinated approach before the session with panellists) and will organise the session in a way that allows a balanced conversation between all stakeholders (on-site/remotely).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Suitability for Remote Participation&lt;/h3&gt;
&lt;p&gt;Dynamic interaction with remote participants (ISOC community and chapters, technical community, Businesses, etc.) will be ensured through social medias, jabber, webex, and twitter (hashtag will be provided) etc.&lt;br /&gt;&lt;br /&gt;Coordinated approach with remote moderator will be ensured as well as the necessary communication and information to remote participants in advance of and during the session.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/igf-2013-workshop-335-privacy-from-regional-regulations-to-global-connections'&gt;https://cis-india.org/news/igf-2013-workshop-335-privacy-from-regional-regulations-to-global-connections&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-21T08:18:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/india-today-neha-vashishth-april-6-2017-privacy-what-bengaluru-police-leaks-phone-numbers-on-twitter">
    <title>Privacy, what? Bengaluru police leaks 46,000 phone numbers on Twitter</title>
    <link>https://cis-india.org/internet-governance/news/india-today-neha-vashishth-april-6-2017-privacy-what-bengaluru-police-leaks-phone-numbers-on-twitter</link>
    <description>
        &lt;b&gt;Bengaluru police made the biggest goof up of all time by releasing private information of people who called 100 to complain since April 2015 and was seemingly unapologetic about the breach of privacy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;The article by Neha Vashishth was &lt;a class="external-link" href="http://indiatoday.intoday.in/story/bengaluru-police-twitter-breach-privacy-phone-numbers/1/922183.html"&gt;published by India Today&lt;/a&gt; on April 6, 2017. Pranesh Prakash was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;We all love our privacy, don't we?&lt;/p&gt;
&lt;p&gt;We  put various locking apps and hide our private pictures on Facebook,  Twitter etc and only share what we want the world to see. But sometimes  even after our countless efforts, we end up losing our information on  the internet. After all, a breach of privacy is the greatest nightmare  one can have.&lt;/p&gt;
&lt;p&gt;Bengaluru police goofed up too when it came to  handling privacy concerns of Bengaluru citizens. The police department  posted phone numbers of thousands of citizens on their Twitter handle  (@BCPCR) who called 100 and complained against harassment, quarrels, and  gambling etc.&lt;/p&gt;
&lt;p&gt;The police posted over 46,000 tweets online since  April 2015 sharing information of people who called on 100 along with  the app known as 'Suraksha' to lodge complaints. The account was made  private as soon as the matter escalated&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;The police was unapologetic regarding the matter and said that the tweets were auto-generated from their twitter handle @BCPCR.&lt;/p&gt;
&lt;p&gt;Pranesh  Prakash, Policy Director at the Centre for Internet and Society said  the "police officer who ordered to create such an account should be held  responsible if any harm comes to a complainant."&lt;/p&gt;
&lt;p&gt;This not only  created a major breach of privacy of complainants but also risked their  lives. This incident only proves that privacy and sensitivity of the  matter has vanished in today's time.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/india-today-neha-vashishth-april-6-2017-privacy-what-bengaluru-police-leaks-phone-numbers-on-twitter'&gt;https://cis-india.org/internet-governance/news/india-today-neha-vashishth-april-6-2017-privacy-what-bengaluru-police-leaks-phone-numbers-on-twitter&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-07T02:57:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/privacy-security-access-to-rights">
    <title>Privacy, Security, and Access to Rights: A Technical and Policy Analyses</title>
    <link>https://cis-india.org/news/privacy-security-access-to-rights</link>
    <description>
        &lt;b&gt;Privacy and security are often presented as zero-sum outcomes with respect to issues affecting Internet governance. This dichotomous treatment often results in policy outcomes that directly limit access and rights. The meanings of privacy and security, however, are not used uniformly and often vary with the regards to the issue at hand (i.e. financial crimes, copyright enforcement) as well as cultural and political context.&lt;/b&gt;
        
&lt;p&gt;This workshop aims to explore the nuances in the relationship between privacy and security through a series of technical demonstrations alongside policy analyses from different regions to determine how rights and access can be best protected.&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Workshop Agenda is as follows:&lt;/p&gt;
&lt;ol&gt;&lt;li&gt;Introduction - Workshop Agenda, Issues, and Panelists (5 minutes)&amp;nbsp;&lt;/li&gt;&lt;li&gt;Regional Perspectives - Cultural and Policy Understandings of Privacy and Security, and the implications for access and rights (20 min)&lt;/li&gt;&lt;li&gt;Technical Perspectives - Designing privacy and security through technology (20 min)&lt;/li&gt;&lt;li&gt;Policy Opportunities and Challenges (10 min)&lt;/li&gt;&lt;li&gt;Question and Answer (30 min)&lt;/li&gt;&lt;/ol&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Which of the five broad IGF Themes or the Cross-Cutting Priorities does your workshop fall under?&lt;/strong&gt;&lt;/div&gt;
&lt;div&gt;Security, Openness and Privacy&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Have you organized an IGF workshop before?&lt;/strong&gt; No&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;If so, please provide the link to the report&lt;/strong&gt;:&lt;/div&gt;
&lt;div&gt;No link to this report&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Provide the names and affiliations of the panellists you are planning to invite&lt;/strong&gt;:&lt;br /&gt;Invited Panelists:&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;&amp;nbsp;Karen Reilly, Tor Project (United States)&lt;/li&gt;&lt;li&gt;Carlos Affonso Pereira de Souza, Centro de Technologica e Socieda (Brazil)&lt;/li&gt;&lt;li&gt;Smari McCarthy, International Modern Media Initiative (Iceland)&lt;/li&gt;&lt;li&gt;Christopher Soghoian, Indiana University (United States)&lt;/li&gt;&lt;li&gt;Bob Pepper, Cisco (United States)*&amp;nbsp;&lt;/li&gt;&lt;li&gt;Sunil Abraham (India)&lt;/li&gt;&lt;/ul&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;Remote Moderator:&lt;/div&gt;
&lt;div&gt;Cameran Ashraf, University of California, Los Angeles&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;
&lt;div&gt;&lt;strong&gt;Provide the name of the organizer(s) of the workshop and their affiliation to various stakeholder groups&lt;/strong&gt;:&lt;/div&gt;
&lt;div&gt;
&lt;ul&gt;&lt;li&gt;Kim Pham, Expression Technologies, Civil Society&lt;/li&gt;&lt;li&gt;Karen Reilly, Tor Project, Technical/Civil Society&lt;/li&gt;&lt;/ul&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Organization&lt;/strong&gt;: Expression Technologies&lt;/div&gt;
&lt;div&gt;&lt;strong&gt;Contact Person&lt;/strong&gt;: Kim Pham&lt;/div&gt;
&lt;div&gt;&amp;nbsp;&lt;/div&gt;
&lt;div&gt;See the &lt;a class="external-link" href="http://www.intgovforum.org/cms/component/chronocontact/?chronoformname=WSProposals2011View&amp;amp;wspid=219"&gt;event details&lt;/a&gt; on the IGF website&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/privacy-security-access-to-rights'&gt;https://cis-india.org/news/privacy-security-access-to-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2011-09-22T09:28:56Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance">
    <title>Privacy, security and surveillance: tackling international dilemmas and dangers in the digital realm</title>
    <link>https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance</link>
    <description>
        &lt;b&gt;Pranesh Prakash was a panelist in the session "Beyond the familiar: how do other countries deal with security and surveillance oversight?" The event was organized by Wilton Park between November 17 and 19, 2014.&lt;/b&gt;
        &lt;p&gt;Complete details of the programme can be &lt;a class="external-link" href="https://www.wiltonpark.org.uk/wp-content/uploads/WP1361-programme.pdf"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance'&gt;https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-15T12:56:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing">
    <title>Privacy, Free/Open Source, and the Cloud </title>
    <link>https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing</link>
    <description>
        &lt;b&gt;A look into the questions that arise in concern to privacy and cloud computing, and how open source plays into the picture. &lt;/b&gt;
        
&lt;h3&gt;Introduction&lt;/h3&gt;
&lt;p&gt;Cloud computing, in basic terms,&amp;nbsp; is internet-based computing where shared resources and services are taken from the primary infrastructure of the internet and provided on demand. Cloud computing creates a shared network between major corporations like Google, Microsoft, Amazon and Yahoo. In this way, cloud systems are related to grid computing systems/service- oriented architectures, and create the potential for the entire I.T. infrastructure to be programmable. Because of this, cloud computing establishes a new consumption and delivery standard for IT services based on the internet. It is a new consumption and delivery model, because it is made up of services delivered through common centers and built on servers which act as a point of access for the computing needs of consumers.&amp;nbsp; The access points facilitate the tailoring and delivering of targeted applications and services to consumers.&amp;nbsp; Details are taken from the users, who no longer need to have an understanding of, or control over the technology infrastructure in the cloud that supports their desired application.&lt;/p&gt;
&lt;p&gt;There are both corporate and consumer implications for such a system. For example, according cloud computing lowers the barriers to entry for corporations and new services. It also enables innovative enterprise in locations where there is an insufficient supply of human or other resources through the provision of inexpensive hardware, software, and applications. The consumer, in turn, is provided with information that he or she is projected to be interested in based on information he or she has already “consumed.”&amp;nbsp; Thus, for example: Google has the ability to monitor a person’s consuming habits through searches and to reduce those habits to a pattern which selects applications to display – and consumption of those reinforces the pattern.&lt;/p&gt;
&lt;h3&gt;Privacy Concerns:&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Though cloud computing can be a useful tool for&amp;nbsp; consumers, corporations, and countries, cloud computing poses significant privacy concerns for all actors involved. For the consumer, a major concern is that future business models may rely on the use of personal data from consumers of cloud services for advertising or behavioral targeting. This concern brings to light the fundamental problem of cloud computing which is that consumers consent to the secondary use of their personal data only when they are signing up for services, and that “consent” is almost automatically generated. How can the cloud assure users that their private data will be properly protected? It is true that high levels of encryption can be (and are) used, and that many companies also take other precautionary measures, but protective measures vary, and the secondary sources that gain access to information may not protect it as well as the initial source.&amp;nbsp; Moreover, even strong protection measures are vulnerable to hackers. As well, what happens if a jurisdiction, like the Indian government, gains access to information about a foreign national?&amp;nbsp;&amp;nbsp; India still does not have a comprehensive data protection law, nor does it have many forms of redress for violations of privacy. How is that individuals information protected?&lt;/p&gt;
&lt;p&gt;These questions give rise to other privacy concerns with respect to the data that is circulated and stored on the cloud, which are the questions of territory, sovereignty, and regulation. Many of these were brought up at the Internet Governance Forum, which took place on the 16th of September including: Which jurisdiction has authority in cases of dispute or digital crime? If you lose data or your data is damaged, stolen, or manipulated, where do you go? Is the violation enforced under local laws, and, if so, under the law of the violator or the law of the violated?&amp;nbsp; If international law, who can access the tribunals, and which tribunals have this jurisdiction?&amp;nbsp; What if a person's data is replicated in two data centres in two different countries? &amp;nbsp;Are the data subject to scrutiny by the officials of all three?&amp;nbsp; Is there a remedy against abuse by any of them?&amp;nbsp; Does it matter whether the country in which the data centre resides does not require a warrant for government access?&amp;nbsp; And how will a consumer know any of that up front?&amp;nbsp; As a corollary, if content is being sent to one country but resides on a data centre in another country, whose data protection standards apply?&amp;nbsp; For example, certain governments in Europe require data retention for limited amount of time for purposes for law enforcement, but other countries may allow retention of data for shorter or longer periods of time.&lt;/p&gt;
&lt;h3&gt;How are privacy, free/open source, and the cloud related ?&lt;/h3&gt;
&lt;p&gt;Eben Moglen, a professor from Columbia law school, and founder and chairman of the Software Freedom Law Center who spoke on cloud computing, privacy, and free/open software at the Indian Institute for science on Thursday September 25, had another solution to the privacy concerns that arise out of the cloud. His lecture explains how the internet has moved from a tool that once promoted equality between people – no servants and no masters – to a tool that reinforces social hierarchies. The reinforcement of these hierarchies is directly related to the language used and communication facilitated between the computer and the individual.&amp;nbsp; Professor Moglen describes how initially, when computers were first introduced to the public, humans spoke directly to computers, and computers responded directly to humans. This open, two-way communication changed when Microsoft, Apple, and IBM removed the language between humans and computers and created proprietary software based on a server-client computing relationship. By removing the language between humans and computers, these corporations dis-empowered individuals. Professor Moglen used this as a springboard to address the privacy concerns that come up in cloud computing. Privacy at its base is the ability of an individual to control access to various aspects of self, such as decisional, informational, and locational. In having the ability to control these factors, privacy consists of a relation between a person and another person or an entity. Professor Moglen postulated that free/open access to code would make the internet an environment where choices over that relationship were still in the hands of an individual, and, among other protections, the individuals could build up their desired levels of privacy.&lt;/p&gt;
&lt;h3&gt;Is free/open software the solution?&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Eben Moglen's solution to the many privacy concerns that arise out of cloud computing is the application and use of free software/open source by individuals.&amp;nbsp; Unlike some applications on the cloud, open source is free, and once an individual has access to the code, that person can control how a program functions, including how a program uses personal information, and thus the person would be able to protect their privacy. Of course, this presumes that the consumer of the internet is sophisticated enough to access and manipulate code.&amp;nbsp; But even putting that presumption aside, is the ability to write code enough to protect data (will help you protect data better – add more security)?&amp;nbsp; Perhaps if a person could create his own server and bypass the cloud, but this does not seem like an ideal (or practical) solution. Though free/open source is an important element that should be incorporated into cloud computing, free/open source depends on open standards.&amp;nbsp;According to Pranesh Prakash, in his presentation at the Internet Governance Forum, the role of standards in ensuring interoperability is critical to allowing consumers to choose between different devices to access the cloud, to choose between different software clients, and to shift between one service and another. This would include moving information, both the data and the metadata, from one cloud to another. Clouds would need to be able to talk to one another to enable data sharing, and open source is key to this, though it is important to note that if one uses free/open source, they must set up their own infrastructure.&lt;/p&gt;
&lt;h3&gt;Conclusion&lt;/h3&gt;
&lt;p&gt;&amp;nbsp;Even though Moglen believes that free/open source software brings freedom and provides the solution to protect an individual’s privacy in the context of cloud computing, he was not speaking to the specific context of India. To do that, it is important to expand the definitions that one uses of free/open source and privacy, and then to contextualize them.&amp;nbsp; Looking closely at the words “free/open source,” they are not limited to access to a software's code, even though that is free/open source’s base.&amp;nbsp; For the ideology of free/open source to work, access to code is just a key to the puzzle. A person, community, culture and state must understand the purpose of free/open source, know how to use it,&amp;nbsp; and know how it can be applied in order for it to be transformative, liberating, and protective. There needs to be a shared understanding that free/open source is&amp;nbsp; not just about being able to change code, but about a shared commitment to sharing code and making it transparent and accessible. In the United States and other countries,&amp;nbsp; free/open source did not just enter into American society and immediately fix issues of&amp;nbsp; privacy by bringing freedom, as it seems Professor Moglen is suggesting free/open source will do in India.&amp;nbsp;&amp;nbsp;&amp;nbsp; Though Professor Moglen promises freedom and privacy protection through free/open source, perhaps this is not an honest appraisal of the technology.&amp;nbsp; Free/open source, if not equally accessed or misapplied, protects neither freedom nor privacy.&amp;nbsp; As noted above, even if a person has access to code, he can protect data only to a certain extent.&amp;nbsp; Thus, he might think that he has created a privacy wall around information that actually is readily accessible.&amp;nbsp; In other words, free/open source cannot be the only answer to freedom, but instead a piece to a collective answer.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing'&gt;https://cis-india.org/internet-governance/blog/privacy/privacy-cloud-computing&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-03-22T05:50:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality">
    <title>Privacy, Autonomy, and Sexual Choice: The Common Law Recognition of Homosexuality</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality</link>
    <description>
        &lt;b&gt;In the last few decades, all major common law jurisdictions have decriminalised non-procreative sex – oral and anal sex (sodomy) – to allow private, consensual, and non-commercial homosexual intercourse.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality.pdf" class="internal-link"&gt;&lt;b&gt;Download PDF&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anti-sodomy statutes across the world, often drafted in the same anachronistic vein as section 377 of the Indian Penal Code, 1860 (“IPC”), have either been repealed or struck down on the grounds that they invade individual privacy and are detrimentally discriminative against homosexual people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not an examination of India’s laws against homosexuality, it does not review the Supreme Court of India’s judgment in Suresh Koushal v. Naz Foundation (2014) 1 SCC 1 nor the Delhi High Court’s judgment in Naz Foundation v. Government of NCT Delhi 2009 (160) DLT 277, which the former overturned – in my view, wrongly. This note simply provides a legal history of the decriminalisation of non-procreative sexual activity in the United Kingdom and the United States. Same-sex marriage is also not examined.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;In the United Kingdom&lt;/h2&gt;
&lt;h3&gt;The Wolfenden Report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In England, following a campaign of arrests of non-heterosexual persons and subsequent protests in the 1950s, the government responded to public dissatisfaction by appointing the Departmental Committee on Homosexual Offences and Prostitution chaired by John Frederick Wolfenden. The report of this committee (“Wolfenden Report”) was published in 1957 and recommended that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“…homosexual behaviour between consenting adults in private should no longer be a criminal offence.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report further observed that it was not the function of a State to punitively scrutinise the private lives of its citizens:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“(T)he law’s function is to preserve public order and decency, to protect the citizen from what is offensive or injurious, and to provide sufficient safeguards against exploitation and corruption of others… It is not, in our view, the function of the law to intervene in the private life of citizens, or to seek to enforce any particular pattern of behaviour.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Sexual Offences Act, 1967&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Wolfenden Report was accepted and, in its pursuance, the Sexual Offences Act, 1967 was enacted to, for the first time in common law jurisdictions, partially decriminalise homosexual activity – described in English law as ‘buggery’ or anal sex between males.&lt;br /&gt;Section 1(1) of the original Sexual Offences Act, as notified on 27 July 1967 stated –&lt;br /&gt;&lt;b&gt;"&lt;/b&gt;Notwithstanding any statutory or common law provision, but subject to the provisions of the next following section, a homosexual act in private shall not be an offence provided that the parties consent thereto and have attained the age of twenty one years."&lt;br /&gt;A ‘homosexual act’ was defined in section 1(7) as –&lt;br /&gt;“For the purposes of this section a man shall be treated as doing a homosexual act if, and only if, he commits buggery with another man or commits an act of gross indecency with another man or is a party to the commission by a man of such an act.”&lt;br /&gt;The meaning of ‘private’ was also set forth rather strictly in section 1(2) –&lt;br /&gt;“An act which would otherwise be treated for the purposes of this Act as being done in private shall not be so treated if done –&lt;br /&gt;(a) when more than two persons take part or are present; or&lt;br /&gt;(b) in a lavatory to which the public have or are permitted to have access, whether on&lt;br /&gt;payment or otherwise.”&lt;br /&gt;Hence, by 1967, English law permitted:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;as between two men,&lt;/li&gt;
&lt;li&gt;both twenty-one years or older,&lt;/li&gt;
&lt;li&gt;anal sex (buggery),&lt;/li&gt;
&lt;li&gt;and other sexual activity (“gross indecency”)&lt;/li&gt;
&lt;li&gt;if, and only if, a strict prescription of privacy was maintained,&lt;/li&gt;
&lt;li&gt;that excluded even a non-participating third party from being present,&lt;/li&gt;
&lt;li&gt;and restricted the traditional conception of public space to exclude even lavatories.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;However, the benefit of Section 1 of the Sexual Offences Act, 1967 did not extend beyond England and Wales; to mentally unsound persons; members of the armed forces; merchant ships; and, members of merchant ships whether on land or otherwise.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Developments in Scotland and Northern Ireland&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Over the years, the restrictions in the original Sexual Offences Act, 1967 were lifted. In 1980, the Criminal Justice (Scotland) Act, 1980 partially decriminalised homosexual activity in Scotland on the same lines that the Act of 1967 did for England and Wales. One year later, in 1981, an Irishman Jeffrey Dudgeon successfully challenged the continued criminalisation of homosexuality in Northern Ireland before the European Court of Human Rights (“ECHR”) in the case of Dudgeon v. United Kingdom (1981) 4 EHRR 149. Interestingly, Dudgeon was not decided on the basis of detrimental discrimination or inequality, but on the ground that the continued illegality of homosexuality violated the petitioner’s right to privacy guaranteed by Article 8 of the 1950 European Convention on Human Rights (“European Convention”). In a 15-4 majority judgement, the ECHR found that “…moral attitudes towards male homosexuality…cannot…warrant interfering with the applicant’s private life…” Following Dudgeon, the Homosexual Offences (Northern Ireland) Order, 1982 came into effect; and with it, brought some semblance of uniformity in the sodomy laws of the United Kingdom.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Equalising the age of consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;However, protests continued against the unequal age of consent required for consensual homosexual sex (21 years) as opposed to that for heterosexual sex (16 years). In 1979, a government policy advisory recommended that the age of consent for homosexual sex be reduced to 18 years – two years older than that for heterosexual sex, but was never acted upon. In 1994, an attempt to statutorily equalise the age of consent at 16 years was defeated in the largely conservative House of Commons although a separate legislative proposal to reduce it to 18 years was carried and enacted under the Criminal Justice and Public Order Act, 1994. Following this, the unequal ages of consent forced a challenge against UK law in the ECHR in 1994; four years later, in Sutherland v. United Kingdom [1998] EHRLR 117, the ECHR found that the unequal age of consent violated Articles 8 and 14 of the European Convention – relating to privacy and discrimination. Sutherland was significant in two ways – it forced the British government to once again introduce legislation to equalise the ages of consent; and, significantly, it affirmed a homosexual human right on the ground of anti-discrimination (as opposed to privacy).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To meet its European Convention commitments, the House of Commons passed, in June 1998, a bill for an equal age of sexual consent but it was rejected by the more conservative House of Lords. In December 1998, the government reintroduced the equal age of consent legislation which again passed the House of Commons and was defeated in the House of Lords. Finally, in 1999, the government invoked the statutory superiority of the House of Commons, reintroduced for the third time the legislation, passed it unilaterally to result in the enactment of the Sexual Offences (Amendment) Act, 2000 that equalised the age of sexual consent for both heterosexuals and homosexuals at 16 years of age.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Uniformity of equality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;However, by this time, different UK jurisdictions observed separate legislations regarding homosexual activity. The privacy conditions stipulated in the original Sexual Offences Act, 1967 remained, although they had been subject to varied interpretation by English courts. To resolve this, the UK Parliament enacted the Sexual Offences Act, 2003 which repealed all earlier conflicting legislation, removed the strict privacy conditions attached to homosexual activity and re-drafted sexual offences in a gender neutral manner. A year later, the Civil Partnership Act, 2004 gave same-sex couples the same rights and responsibilities as a civil marriage. And, in 2007, the Equality Act (Sexual Orientation) Regulations came into force to prohibit general discrimination against homosexual persons in the same manner as such prohibition exists in respect of grounds of race, religion, disability, sex and so on.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;In the United States&lt;/h2&gt;
&lt;h3&gt;Diversity of state laws&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sodomy laws in the United States of America have followed a different trajectory. A different political and legal system leaves individual US States with wide powers to draft and follow their own constitutions and laws. Accordingly, by 1961 all US States had their own individual anti-sodomy laws, with different definitions of sodomy and homosexuality. In 1962, Illinois became the first US State to repeal its anti-sodomy law. Many States followed suit over the next decades including Connecticut (1971); Colorado and Oregon (1972); Delaware, Hawaii and North Dakota (1973); Ohio (1974); New Hampshire and New Mexico (1975); California, Maine, Washington and West Virginia (1976); Indiana, South Dakota, Wyoming and Vermont (1977); Iowa and Nebraska (1978); New Jersey (1979); Alaska (1980); and, Wisconsin (1983).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Bowers v. Hardwick&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;However, not all States repealed their anti-sodomy laws. Georgia was one such State that retained a statutory bar to any oral or anal sex between any persons of any sex contained in Georgia Code Annotated §16-6-2 (1984) (“Georgia statute”) which provided, in pertinent part, as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“(a) A person commits the offense of sodomy when he performs or submits to any sexual act involving the sex organs of one person and the mouth or anus of another… (b) A person convicted of the offense of sodomy shall be punished by imprisonment for not less than one nor more than 20 years”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1982, a police officer arrested Michael Hardwick in his bedroom for sodomy, an offence which carried a prison sentence of up to twenty years. His case went all the way up to the US Supreme Court which, in 1986, pronounced its judgement in Bowers v. Hardwick 478 US 186 (1986). Although the Georgia statute was framed broadly to include even heterosexual sodomy (anal or oral sex between a man and a woman or two women) within its ambit of prohibited activity, the Court chose to frame the issue at hand rather narrowly. Justice Byron White, speaking for the majority, observed at the outset –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This case does not require a judgment on whether laws against sodomy between consenting adults in general, or between homosexuals in particular, are wise or&lt;br /&gt;desirable. It raises no question about the right or propriety of state legislative decisions to repeal their laws that criminalize homosexual sodomy, or of state-court decisions invalidating those laws on state constitutional grounds. The issue presented is whether the Federal Constitution confers a fundamental right upon homosexuals to engage in sodomy…”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy and autonomy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, Hardwick’s case against the Georgia statute was not grounded on an equality-discrimination argument (since the Georgia statute prohibited even heterosexual sodomy but was only enforced against homosexuals) but on a privacy argument that sought to privilege and immunise private consensual non-commercial sexual conduct from intrusive State intervention. To support this privacy claim, a long line of cases was relied upon that restricted the State’s ability to intervene in, and so upheld the sanctity of, the home, marriage, procreation, contraception, child rearing and so on [See, Carey v. Population Services 431 US 678 (1977), Pierce v. Society of Sisters 268 US 510 (1925) and Meyer v. Nebraska 262 US 390 (1923) on child rearing and education; Prince v. Massachusetts 321 US 158 (1944) on family relationships; Skinner v. Oklahoma ex rel. Williamson 316 US 535 (1942) on procreation; Loving v. Virginia 388 US 1 (1967) on marriage; Griswold v. Connecticut 381 US 479 (1965) and Eisenstadt v. Baird 405 US 438 (1972) on contraception; and Roe v. Wade 410 US 113 (1973) on abortion]. Further, the Court was pressed to declare a fundamental right to consensual homosexual sodomy by reading it into the Due Process clause of the Fourteenth Amendment to the US Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 9-judges Court split 5-4 down the middle to rule against all of Hardwick’s propositions and uphold the constitutionality of the Georgia statute. The Court’s majority agreed that cases cited by Hardwick had indeed evolved a right to privacy, but disagreed that this privacy extended to homosexual persons since “(n)o connection between family, marriage, or procreation on the one hand and homosexual activity on the other has been demonstrated…”. In essence, the Court’s majority held that homosexuality was distinct from procreative human sexual behaviour; that homosexual sex could, by virtue of this distinction, be separately categorised and discriminated against; and, hence, homosexual sex did not qualify for the benefit of intimate privacy protection that was available to heterosexuals. What reason did the Court give to support this discrimination? Justice White speaking for the majority gives us a clue: “Proscriptions against that (homosexual) conduct have ancient roots.” Justice White was joined in his majority judgement by Chief Justice Burger, Justice Powell, Justice Rehnquist and Justice O’Connor. His rationale was underscored by Chief Justice Burger who also wrote a short concurring opinion wherein he claimed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Decisions of individuals relating to homosexual conduct have been subject to state intervention throughout the history of Western civilization. Condemnation of those practices is firmly rooted in Judeo-Christian moral and ethical standards. Blackstone described “the infamous crime against nature” as an offense of “deeper malignity” than rape, a heinous act “the very mention of which is a disgrace to human nature,” and “a crime not fit to be named.” … To hold that the act of homosexual sodomy is somehow protected as a fundamental right would be to cast aside millennia of moral teaching.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The majority’s “wilful blindness”: Blackmun’s dissent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Court’s dissenting opinion was delivered by Justice Blackmun, in which Justice Brennan, Justice Marshall and Justice Stevens joined. At the outset, the Justice Blackmun disagreed with the issue that was framed by the majority led by Justice White: “This case is (not) about “a fundamental right to engage in homosexual sodomy,” as the Court purports to declare…” and further pointed out that the Georgia statute proscribed not just homosexual sodomy, but oral or anal sex committed by any two persons: “…the Court’s almost obsessive focus on homosexual activity is particularly hard to justify in light of the broad language Georgia has used.”. When considering the issue of privacy for intimate sexual conduct, Justice Blackmun criticised the findings of the majority: “Only the most wilful blindness could obscure the fact that sexual intimacy is a sensitive, key relationship of human existence, central to family life, community welfare, and the development of human personality…” And when dealing with the ‘historical morality’ argument that was advanced by Chief Justice Burger, the minority observed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The assertion that “traditional Judeo-Christian values proscribe” the conduct involved cannot provide an adequate justification for (§)16-6-2 (of the Georgia Statute). That certain, but by no means all, religious groups condemn the behavior at issue gives the State no license to impose their judgments on the entire citizenry. The legitimacy of secular legislation depends instead on whether the State can advance some justification for its law beyond its conformity to religious doctrine.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The states respond, privacy is upheld&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Bowers was argued and decided over five years in the 1980s. At the time, the USA was witnessing a neo-conservative wave in its society and government, which was headed by a republican conservative. The HIV/AIDS issue had achieved neither the domestic nor international proportions it now occupies and the linkages between HIV/AIDS, homosexuality and the right to health were still unclear. In the years after Bowers, several more US States repealed their sodomy laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In some US States, sodomy laws that were not legislatively repealed were judicially struck down. In 1998, the Georgia State Supreme Court, in Powell v. State of Georgia S98A0755, 270 Ga. 327, 510 S.E. 2d 18 (1998), heard a challenge to the same sodomy provision of the Georgia statute that was upheld in by the US Supreme Court in Bowers. In a complete departure from the US Supreme Court’s findings, the Georgia Supreme Court first considered whether the Georgia statute violated individual privacy: “It is clear from the right of privacy appellate jurisprudence…that the “right to be let alone” guaranteed by the Georgia Constitution is far more extensive that the right of privacy protected by the U.S. Constitution…”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Having established that an individual right to privacy existed to protect private consensual sodomy, the Georgia Court then considered whether there was a ‘legitimate State interest’ that justified the State’s restriction of this right. The justifications that were offered by the State included the possibility of child sexual abuse, prostitution and moral degradation of society. The Court found that there already were a number of legal provisions to deter and punish rape, child abuse, trafficking, prostitution and public indecency. Hence: “In light of the existence of these statutes, the sodomy statute’s raison d’ etre can only be to regulate the private sexual conduct of consenting adults, something which Georgians’ right of privacy puts beyond the bounds of government regulation.” By a 2-1 decision, Chief Justice Benham leading the majority, the Georgia Supreme Court struck down the Georgia statute for arbitrarily violating the privacy of individuals. Interestingly, the subjects of the dispute were not homosexual, but two heterosexual adults – a man and a woman. Similar cases where a US State’s sodomy laws were judicially struck down include:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Campbell v. Sundquist 926 S.W.2d 250 (1996) – [Tennessee – by the Tennessee Court of Appeals on privacy violation; appeal to the State Supreme Court expressly denied].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Commonwealth v. Bonadio 415 A.2d 47 (1980) – [Pennsylvania – by the Pennsylvania Supreme Court on both equality and privacy violations];&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Doe v. Ventura MC 01-489, 2001 WL 543734 (2001) – [Minnesota – by the Hennepin County District Judge on privacy violation; no appellate challenge];&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Gryczan v. Montana 942 P.2d 112 (1997) – [Montana – by the Montana Supreme Court on privacy violation];&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Jegley v. Picado 80 S.W.3d 332 (2001) – [Arkansas – by the Arkansas Supreme Court, on privacy violation];&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kentucky v. Wasson 842 S.W.2d 487 (1992) [Kentucky – by the Kentucky Supreme Court on both equality and privacy violations];&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Massachusetts v. Balthazar 366 Mass. 298, 318 NE2d 478 (1974) and GLAD v. Attorney General 436 Mass. 132, 763 NE2d 38 (2002) – [Massachusetts – by the Superior Judicial Court on privacy violation];&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;People v. Onofre 51 NY 2d 476 (1980) [New York – by the New York Court of Appeals on privacy violation]; and,&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Williams v. Glendenning No. 98036031/CL-1059 (1999) – [Maryland – by the Baltimore City Circuit Court on both privacy and equality violations; no appellate challenge].&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Lawrence v. Texas&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These developments made for an uneven field in the matter of legality of homosexual sex with the sodomy laws of most States being repealed by their State legislatures or subject to State judicial invalidation, while the sodomy laws of the remaining States were retained under the shade of constitutional protection afforded by Bowers. Texas was one such State which maintained an anti-sodomy law contained in Texas Penal Code Annotated § 21.06(a) (2003) (“Texas statute”) which criminalised sexual intercourse between two people of the same sex. In 1998, the Texas statute was invoked to arrest two men engaged in private, consensual, non-commercial sodomy. They subsequently challenged the constitutionality of the Texas statute, their case reaching the US Supreme Court. In 2003, the US Supreme Court, in Lawrence v. Texas 539 US 558 (2003) pronounced on the validity of the Texas statute. Interestingly, while the issue under consideration was identical to that decided in Bowers, the Court this time around was presented with detailed arguments on the equality-discrimination aspect of same-sex sodomy laws – which the Bowers Court majority did not consider. The Court split 6-3; the majority struck down the Texas statute. Justice Kennedy, speaking for himself and 4 other judges of the majority, found instant fault with the Bowers Court for framing the issue in question before it as simply whether homosexuals had a fundamental right to engage in sodomy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy, intimacy, home&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This mistake, Justice Kennedy claimed, “…discloses the Court’s own failure… To say that the issue in Bowers was simply the right to engage in certain sexual conduct demeans…the individual…just as it would demean a married couple were it to be said marriage is simply about the right to have sexual intercourse. Their penalties and purposes (of the laws involved)…have more far-reaching consequences, touching upon the most private human conduct, sexual behavior, and in the most private of places, the home.” Justice Kennedy, joined by Justice Stevens, Justice Souter, Justice Ginsburg and Justice Breyer, found that the Texas statute violated the right to privacy granted by the Due Process clause of the US Constitution:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The petitioners are entitled to respect for their private lives. The State cannot demean their existence or control their destiny by making their private sexual conduct a crime. “It is a promise of the Constitution that there is a realm of personal liberty which the government may not enter.”” [The quote is c.f. Planned Parenthood of Southeastern Pa. v. Casey 505 US 833 (1992)]&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Imposed morality is defeated&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;With the privacy argument established as controlling, Justice Kennedy went to some length to refute the ‘historical morality’ argument that was put forward in Bowers by then Chief Justice Burger: “At the outset it should be noted that there is no longstanding history in this country of laws directed at homosexual conduct as a distinct matter… The sweeping references by Chief Justice Burger to the history of Western civilization and to Judeo-Christian moral and ethical standards did not take account of other authorities pointing in an opposite direction.” To illustrate these other authorities, Justice Kennedy references the ECHR’s decision in Dudgeon supra which was reached five years before Bowers: “Authoritative in all countries that are members of the Council of Europe (21 nations then, 45 nations now), the decision (Dudgeon) is at odds with the premise in Bowers that the claim put forward was insubstantial in our Western civilization.”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court then affirmed that morality could not be a compelling ground to infringe upon a fundamental right: “Our obligation is to define the liberty of all, not to mandate our own moral code”. The lone remaining judge of the majority, Justice O’Connor, based her decision not on the right to privacy but on equality-discrimination considerations. Interestingly, Justice O’Connor sat on the Bowers Court and ruled with the majority in that case. Basing her decision on equal protection grounds allowed her to concur with the majority in Lawrence but not overturn her earlier position in Bowers which had rejected a right to privacy claim. It also enabled her to strike down the Texas statute while not conceding homosexuality as a constitutionally guaranteed private liberty. There were three dissenters: The chief dissent was delivered by Justice Scalia, in which he was joined by Chief Justice Rehnquist and Justice Thomas. Bowers was not merely distinguished by the majority, it was overruled:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Bowers was not correct when it was decided, and it is not correct today. It ought not to remain binding precedent. Bowers v. Hardwick should be and now is overruled.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality'&gt;https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-23T12:20:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
