<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 551 to 565.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/reply-to-rti-application-under-rti-act-of-2005-from-vanya-rakesh"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/eight-key-privacy-events-in-india-in-the-year-2015"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/sectoral-privacy-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-policy-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/dna-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-research"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/iso-iec-jtc-1-sc-27-working-groups-meeting-jaipur"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/reply-to-rti-application-under-rti-act-of-2005-from-vanya-rakesh">
    <title>Reply to RTI Application under RTI Act of 2005 from Vanya Rakesh</title>
    <link>https://cis-india.org/internet-governance/blog/reply-to-rti-application-under-rti-act-of-2005-from-vanya-rakesh</link>
    <description>
        &lt;b&gt;Unique Identification Authority of India replied to the RTI application filed by Vanya Rakesh. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Madam,&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Please refer to your RTI application dated 3.12.2015 received in the Division on 10.12.2015 on the subject mentioned above requesting to provide the information in electronic form via the email address vanya@cis-india.org, copies of the artwork in print media released by UIDAI to create awareness about use of Aadhaar not being mandatory.&lt;/li&gt;
&lt;li&gt;I am directed to furnish herewith in electronic form, copy of the artwork in print media released / published in the epapers edition of the Times of India and Dainik Jagran in their respective editions of dated 29.8.2015 in a soft copy, about obtaining of Aadhaar not being mandatory for a citizen, as desired.&lt;/li&gt;
&lt;li&gt;In case, you want to go for an appeal in connection with the information provided, you may appeal to the Appellate Authority indicated below within thirty days from the date of receipt of this letter.&lt;br /&gt;Shri Harish Lal Verma,&lt;br /&gt;Deputy Director (Media),&lt;br /&gt;Unique Identification Authority of India&lt;br /&gt;3nd Floor, Tower – II, Jeevan Bharati Building,&lt;br /&gt;New Delhi – 110001.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;Yours faithfully,&lt;br /&gt;&lt;br /&gt;(T Gou Khangin)&lt;br /&gt;Section Officer &amp;amp; CPIO Media Division&lt;br /&gt;&lt;br /&gt;Copy for information to: Deputy Director (Establishment) &amp;amp; Nodal CPIO&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Below scanned copies:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;RTI Reply&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/RTIReplytoSh.VanyaRakesh.jpg" alt="RTI Reply" class="image-inline" title="RTI Reply" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Coverage in Dainik Jagran&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;img src="https://cis-india.org/home-images/DainikJagran29.08.2015.png" alt="Dainik Jagran" class="image-inline" title="Dainik Jagran" /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/uid-ad" class="internal-link"&gt;Download the coverage in the Times of India here&lt;/a&gt;&lt;/b&gt;. Read the earlier blog entry &lt;a class="external-link" href="http://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/reply-to-rti-application-under-rti-act-of-2005-from-vanya-rakesh'&gt;https://cis-india.org/internet-governance/blog/reply-to-rti-application-under-rti-act-of-2005-from-vanya-rakesh&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-13T02:40:57Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/eight-key-privacy-events-in-india-in-the-year-2015">
    <title>Eight Key Privacy Events in India in the Year 2015</title>
    <link>https://cis-india.org/internet-governance/blog/eight-key-privacy-events-in-india-in-the-year-2015</link>
    <description>
        &lt;b&gt;As the year draws to a close, we are enumerating some of the key privacy related events in India that transpired in 2015. Much like the last few years, this year, too, was an eventful one in the context of privacy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While we did not witness, as one had hoped, any progress in the passage of a privacy law, the year saw significant developments with respect to the ongoing 	Aadhaar case. The statement by the Attorney General, India's foremost law officer, that there is a lack of clarity over whether the right to privacy is a fundamental right, and the fact the the matter is yet unresolved was a huge setback to the jurisprudence on privacy.	&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; However, the court has recognised a purpose limitation as applicable into the Aadhaar scheme, limiting 	the sharing of any information collected during the enrollment of residents in UID. A draft Encryption Policy was released and almost immediately withdrawn 	in the face of severe public backlash, and an updated Human DNA Profiling Bill was made available for comments. Prime Minister Narendra Modi's much 	publicised project "Digital India" was in news throughout the year, and it also attracted its' fair share of criticism in light of the lack of privacy 	safeguards it offered. Internationally, a lawsuit brought by Maximilian Schrems, an Austrian privacy activist, dealt a body blow to the fifteen year old 	Safe Harbour Framework in place for data transfers between EU and USA. Below, we look at what were, according to us, the eight most important privacy 	events in India, in 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;August 11, 2015 order on Aadhaar not being compulsory&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, a writ petition was filed by Judge K S Puttaswamy challenging the government's policy in its attempt to enroll all residents of India in the UID 	project and linking the Aadhaar card with various government services. A number of other petitioners who filed cases against the Aadhaar scheme have also 	been linked with this petition and the court has been hearing them together. On September 11, 2015, the Supreme Court reiterated its position in earlier orders made on September 23, 2013 and March 24, 2014 stating that the Aadhaar card shall not be made compulsory for any government services.	&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; Building on its earlier position, the court passed the following orders:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a) The government must give wide publicity in the media that it was not mandatory for a resident to obtain an Aadhaar card,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b) The production of an Aadhaar card would not be a condition for obtaining any benefits otherwise due to a citizen,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c) Aadhaar card would not be used for any purpose other than the PDS Scheme, for distribution of foodgrains and cooking fuel such as kerosene and for the 	LPG distribution scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d) The information about an individual obtained by the UIDAI while issuing an Aadhaar card shall not be used for any other purpose, save as above, except 	as may be directed by a Court for the purpose of criminal investigation.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite this being the fifth court order given by the Supreme Court&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; stating that the Aadhaar card cannot 	be a mandatory requirement for access to government services or subsidies, repeated violations continue. One of the violations which has been widely 	reported is the continued requirement of an Aadhaar number to set up a Digital Locker account which also led to activist, Sudhir Yadav filing a petition in 	the Supreme Court.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;No Right to Privacy - Attorney General to SC&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Attorney General, Mukul Rohatgi argued before the Supreme Court in the Aadhaar case that the Constitution of India did not provide for a fundamental 	Right to Privacy.&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; He referred to the body of case in the Supreme Court dealing with this issue and made a 	reference to the 1954 case, MP Sharma v. Satish Chandra&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; stating that there was "clear divergence of 	opinion" on the Right to Privacy and termed it as "a classic case of unclear position of law." He also referred to the discussion on this matter in the 	Constitutional Assembly Debates and pointed to the fact the framers of the Constitution did not intend for this to be a fundamental right. He said the 	matter needed to be referred to a nine judge Constitution bench.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; This raises serious questions over the 	jurisprudence developed by the Supreme Court on the right to privacy over the last five decades. The matter is currently pending resolution by a larger 	bench which needs to be constituted by the Chief Justice of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Shreya Singhal judgment and Section 69A, IT Act&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the much celebrated judgment, Shreya Singhal v. Union of India, in March 2015, the Supreme Court struck down Section 66A of the Information Technology 	Act, 2000 as unconstitutional and laid down guidelines for online takedowns under the Internet intermediary rules. However, significantly, the court also 	upheld Section 69A and the blocking rules under this provision. It was held to be a narrowly-drawn provision with adequate safeguards. The rules prescribe 	a procedure for blocking which involves receipt of a blocking request, examination of the request by the Committee and a review committee which performs 	oversight functions. However, commentators have pointed to the opacity of the process in the rules under this provisions. While the rules mandate that a 	hearing is given to the originator of the content, this safeguard is widely disregarded. The judgment did not discuss Section 69 of the Information 	Technology Act, 2000 which deal with decrypting of electronic communication, however, the Department of Electronic and Information Technology brought up 	this issue subsequently, through a Draft Encryption Policy, discussed below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Circulation and recall of Draft Encryption Policy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On October 19, 2015, the Department of Electronic and Information Technology (DeitY) released for public comment a draft National Encryption Policy. The draft received an immediate and severe backlash from commentators, and was withdrawn by September 22, 2015.	&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; The government blamed a junior official for the poor drafting of the document and noted that it had been 	released without a review by the Telecom Minister, Ravi Shankar Prasad and other senior officials.&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; The 	main areas of contention were a requirement that individuals store plain text versions of all encrypted communication for a period of 90 days, to be made 	available to law enforcement agencies on demand; the government's right to prescribe key-strength, algorithms and ciphers; and only government-notified 	encryption products and vendors registered with the government being allowed to be used for encryption.&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; The purport of the above was to limit the ways in which citizens could encrypt electronic communication, and to allow adequate access to law enforcement 	agencies. The requirement to keep all encrypted information in plain text format for a period of 90 days garnered particular criticism as it would allow 	for creation of a 'honeypot' of unencrypted data, which could attract theft and attacks.&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; The withdrawal of the draft policy is not the final chapter in this story, as the Telecom Minister has promised that the Department will come back with a revised policy.	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; This attempt to put restrictions on use of encryption technologies is not only in line with a host of 	surveillance initiatives that have mushroomed in India in the last few years,&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; but also finds resonance with a global trend which has seen various governments and law enforcement organisations argue against encryption.	&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Privacy concerns raised about Digital India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Digital India initiative includes over thirty Mission Mode Projects in various stages of implementation.	&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; All of these projects entail collection of vast quantities of personally identifiable information of 	the citizens. However, most of these initiatives do not have clearly laid down privacy policies.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; There 	is also a lack of properly articulated access control mechanisms and doubts over important issues such as data ownership owing to most projects involving public private partnership which involves private organisation collecting, processing and retaining large amounts of data.	&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; Ahead of Prime Minister Modi's visit to the US, over 100 hundred prominent US based academics released a statement raising concerns about "lack of safeguards about privacy of information, and thus its potential for abuse" in the Digital India project.	&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; It has been pointed out that the initiatives could enable a "cradle-to-grave digital identity that is unique, lifelong, and authenticable, and it plans to widely use the already mired in controversy Aadhaar program as the identification system."	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Issues with Human DNA Profiling Bill, 2015&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Human DNA Profiling Bill, 2015 envisions the creation of national and regional DNA databases comprising DNA profiles of the categories of persons 	specified in the Bill.&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; The categories include offenders, suspects, missing persons, unknown deceased 	persons, volunteers and such other categories specified by the DNA Profiling Board which has oversight over these banks. The Bill grants wide discretionary powers to the Board to introduce new DNA indices and make DNA profiles available for new purposes it may deem fit.	&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt; These, and the lack of proper safeguards surrounding issues like consent, retention and collection 	pose serious privacy risks if the Bill becomes a law. Significantly, there is no element of purpose limitation in the proposed law, which would allow the 	DNA samples to be re-used for unspecified purposes.&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Impact of the Schrems ruling on India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In Schrems v. Data Protection Commissioner, the Court of Justice in European Union (CJEU) annulled the Commission Decision 2000/520 according to which US 	data protection rules were deemed sufficient to satisfy EU privacy rules enabling transfers of personal data from EU to US, otherwise known as the 'Safe 	Harbour' framework. The court ruled that broad formulations of derogations on grounds of national security, public interest and law enforcement in place in 	the US goes beyond the test of proportionality and necessity under the Data Protection rules.&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt; This 	judgment could also have implications for the data processing industry in India. For a few years now, a framework similar to the Safe Harbour has been 	under discussion for transfer of data between India and EU. The lack of a privacy legislation has been among the significant hurdles in arriving at a 	framework.&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt; In the absence of a Safe Harbour framework, the companies in India rely on alternate 	mechanisms such as Binding Corporate Rules (BCR) or Model Contractual Clauses. These contracts impose the obligation on the data exporters and importers to 	ensure that 'adequate level of data protection' is provided. The Schrems judgement makes it clear that 'adequate level of data protection' entails a regime 	that is 'essentially equivalent' to that envisioned under Directive 95/46.&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt; What this means is that any 	new framework of protection between EU and other countries like US or India will necessarily have to meet this test of essential equivalence. The PRISM 	programme in the US and a host of surveillance programmes that have been initiated by the government in India in the last few years could pose problems in 	satisfying this test of essential equivalence as they do not conform to the proportionality and necessity principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. &lt;/b&gt; &lt;b&gt;The definition of "unfair trade practices" in the Consumer Protection Bill, 2015&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Consumer Protection Bill, 2015, tabled in the Parliament towards the end of the monsoon session&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt; has 	introduced an expansive definition of the term "unfair trade practices." The definition as per the Bill includes the disclosure "to any other person any 	personal information given in confidence by the consumer."&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt; This clause exclude from the scope of unfair 	trade practices, disclosures under provisions of any law in force or in public interest. This provision could have significant impact on the personal data 	protection law in India. Currently, the only law governing data protection law are the Reasonable security practices and procedures and sensitive personal 	data or information Rules, 2011&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt; prescribed under Section 43A of the Information Technology Act, 2000. Under these rules, sensitive personal data or information is protected in that their disclosure requires prior permission from the data subject.	&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt; For other kinds of personal information not categorized as sensitive personal data or information, the only recourse of data subjects in case to claim breach of the terms of privacy policy which constitutes a lawful contract.	&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; The Consumer Protection Bill, 2015, if enacted as law, could significantly expand the scope of 	protection available to data subjects. First, unlike the Section 43A rules, the provisions of the Bill would be applicable to physical as well as 	electronic collection of personal information. Second, disclosure to a third party of personal information other than sensitive personal data or 	information could also have similar 'prior permission' criteria under the Bill, if it can be shown that the information was shared by the consumer in 	confidence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What we see above are events largely built around a few trends that we have been witnessing in the context of privacy in India, in particular and across 	the world, in general. Lack of privacy safeguards in initiatives like the Aadhaar project and Digital India is symptomatic of policies that are not 	comprehensive in their scope, and consequently fail to address key concerns. Dr Usha Ramanathan has called these policies "powerpoint based policies" which are implemented based on proposals which are superficial in their scope and do not give due regard to their impact on a host of issues.	&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt; Second, the privacy concerns posed by the draft Encryption Policy and the Human DNA Profiling Bill point to the motive of surveillance that is in line with other projects introduced with the intent to protect and preserve national security.	&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; Third, the incidents that championed the cause of privacy like the Schrems judgment have largely been 	initiated by activists and civil society actors, and have typically entailed the involvement of the judiciary, often the single recourse of actors in the 	campaign for the protection of civil rights. It must be noted that jurisprudence on the right to privacy in India has not moved beyond the guidelines set 	forth by the Supreme Court in PUCL v. Union of India.&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt; However, new mass surveillance programmes and 	massive collection of personal data by both public and private parties through various schemes mandated a re-look at the standards laid down twenty years 	ago. The privacy issue pending resolution by a larger bench in the Aadhaar case affords an opportunity to revisit those principles in light of how 	surveillance has changed in the last two decades and strengthen privacy and data protection.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Right to Privacy not a fundamental right, cannot be invoked to scrap Aadhar: Centre tells Supreme Court, available at 			&lt;a href="http://articles.economictimes.indiatimes.com/2015-07-23/news/64773078_1_fundamental-right-attorney-general-mukul-rohatgi-privacy"&gt; http://articles.economictimes.indiatimes.com/2015-07-23/news/64773078_1_fundamental-right-attorney-general-mukul-rohatgi-privacy &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; SC allows govt to link Aadhaar card with PDS and LPG subsidies, available at 			&lt;a href="http://timesofindia.indiatimes.com/india/SC-allows-govt-to-link-Aadhaar-card-with-PDS-and-LPG-subsidies/articleshow/48436223.cms"&gt; http://timesofindia.indiatimes.com/india/SC-allows-govt-to-link-Aadhaar-card-with-PDS-and-LPG-subsidies/articleshow/48436223.cms &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; &lt;a href="http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841"&gt;http://judis.nic.in/supremecourt/imgs1.aspx?filename=42841&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Five SC Orders Later, Aadhaar Requirement Continues to Haunt Many, available at 			&lt;a href="http://thewire.in/2015/09/19/five-sc-orders-later-aadhaar-requirement-continues-to-haunt-many-11065/"&gt; http://thewire.in/2015/09/19/five-sc-orders-later-aadhaar-requirement-continues-to-haunt-many-11065/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Digital Locker scheme challenged in Supreme Court, available at 			&lt;a href="http://www.moneylife.in/article/digital-locker-scheme-challenged-in-supreme-court/42607.html"&gt; http://www.moneylife.in/article/digital-locker-scheme-challenged-in-supreme-court/42607.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Privacy not a fundamental right, argues Mukul Rohatgi for Govt as Govt affidavit says otherwise, available at 			&lt;a href="http://www.legallyindia.com/Constitutional-law/privacy-not-a-fundamental-right-argues-mukul-rohatgi-for-govt-as-govt-affidavit-says-otherwise"&gt; http://www.legallyindia.com/Constitutional-law/privacy-not-a-fundamental-right-argues-mukul-rohatgi-for-govt-as-govt-affidavit-says-otherwise &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; 1954 SCR 1077.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Supra Note 1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Government to withdraw draft encryption policy, available at 			&lt;a href="http://www.thehindu.com/news/national/govt-to-withdraw-draft-encryption-policy/article7677348.ece"&gt; http://www.thehindu.com/news/national/govt-to-withdraw-draft-encryption-policy/article7677348.ece &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Encryption policy poorly worded by officer: Telecom Minister Ravi Shankar Prasad, available at 			&lt;a href="http://economictimes.indiatimes.com/articleshow/49068406.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst"&gt; http://economictimes.indiatimes.com/articleshow/49068406.cms?utm_source=contentofinterest&amp;amp;utm_medium=text&amp;amp;utm_campaign=cppst &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Updated: India's draft encryption policy puts user privacy in danger, available at 			&lt;a href="http://www.medianama.com/2015/09/223-india-draft-encryption-policy/"&gt; http://www.medianama.com/2015/09/223-india-draft-encryption-policy/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Bhairav Acharya, The short-lived adventure of India's encryption policy, available at 			&lt;a href="http://notacoda.net/2015/10/10/the-short-lived-adventure-of-indias-encryption-policy/"&gt; http://notacoda.net/2015/10/10/the-short-lived-adventure-of-indias-encryption-policy/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Supra Note 9.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Maria Xynou, Big democracy, big surveillance: India's surveillance state, available at 			&lt;a href="https://www.opendemocracy.net/opensecurity/maria-xynou/big-democracy-big-surveillance-indias-surveillance-state"&gt; https://www.opendemocracy.net/opensecurity/maria-xynou/big-democracy-big-surveillance-indias-surveillance-state &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; China passes controversial anti-terrorism law to access encrypted user accounts, available at 			&lt;a href="http://www.theverge.com/2015/12/27/10670346/china-passes-law-to-access-encrypted-communications"&gt; http://www.theverge.com/2015/12/27/10670346/china-passes-law-to-access-encrypted-communications &lt;/a&gt; ; Police renew call against encryption technology that can help hide terrorists, available at 			&lt;a href="http://www.washingtontimes.com/news/2015/nov/16/paris-terror-attacks-renew-encryption-technology-s/?page=all"&gt; http://www.washingtontimes.com/news/2015/nov/16/paris-terror-attacks-renew-encryption-technology-s/?page=all &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; &lt;a href="http://www.mmp.cips.org.in/digital-india/"&gt;http://www.mmp.cips.org.in/digital-india/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; &lt;a href="http://slides.com/cisindia/big-data-in-indian-governance-preliminary-findings#/"&gt; http://slides.com/cisindia/big-data-in-indian-governance-preliminary-findings#/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;[18]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Indira Jaising, Digital India Schemes Must Be Preceded by a Data Protection and Privacy Law, available at 			&lt;a href="http://thewire.in/2015/07/04/digital-india-schemes-must-be-preceded-by-a-data-protection-and-privacy-law-5471/"&gt; http://thewire.in/2015/07/04/digital-india-schemes-must-be-preceded-by-a-data-protection-and-privacy-law-5471/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; US academics raise privacy concerns over 'Digital India' campaign, available at			&lt;a href="http://yourstory.com/2015/08/us-digital-india-campaign/"&gt;http://yourstory.com/2015/08/us-digital-india-campaign/&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Lisa Hayes, Digital India's Impact on Privacy: Aadhaar numbers, biometrics, and more, available at 			&lt;a href="https://cdt.org/blog/digital-indias-impact-on-privacy-aadhaar-numbers-biometrics-and-more/"&gt; https://cdt.org/blog/digital-indias-impact-on-privacy-aadhaar-numbers-biometrics-and-more/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; &lt;a href="http://www.prsindia.org/uploads/media/draft/Draft%20Human%20DNA%20Profiling%20Bill%202015.pdf"&gt; http://www.prsindia.org/uploads/media//draft/Draft%20Human%20DNA%20Profiling%20Bill%202015.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Comments on India's Human DNA Profiling Bill (June 2015 version), available at 			&lt;a href="http://www.genewatch.org/uploads/f03c6d66a9b354535738483c1c3d49e4/IndiaDNABill_FGPI_15.pdf"&gt; http://www.genewatch.org/uploads/f03c6d66a9b354535738483c1c3d49e4/IndiaDNABill_FGPI_15.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Elonnai Hickok, Vanya Rakesh and Vipul Kharbanda, CIS Comments and Recommendations to the Human DNA Profiling Bill, June 2015, available at 			&lt;a href="http://cis-india.org/internet-governance/blog/cis-comments-and-recommendations-to-human-dna-profiling-bill-2015"&gt; http://cis-india.org/internet-governance/blog/cis-comments-and-recommendations-to-human-dna-profiling-bill-2015 &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; &lt;a href="http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-10/cp150117en.pdf"&gt; http://curia.europa.eu/jcms/upload/docs/application/pdf/2015-10/cp150117en.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Jyoti Pandey, Contestations of Data, ECJ Safe Harbor Ruling and Lessons for India, available at 			&lt;a href="http://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india"&gt; http://cis-india.org/internet-governance/blog/contestations-of-data-ecj-safe-harbor-ruling-and-lessons-for-india &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Simon Cox, Case Watch: Making Sense of the Schrems Ruling on Data Transfer, available at 			&lt;a href="https://www.opensocietyfoundations.org/voices/case-watch-making-sense-schrems-ruling-data-transfer"&gt; https://www.opensocietyfoundations.org/voices/case-watch-making-sense-schrems-ruling-data-transfer &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; &lt;a href="http://www.prsindia.org/billtrack/the-consumer-protection-bill-2015-3965/"&gt; http://www.prsindia.org/billtrack/the-consumer-protection-bill-2015-3965/ &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Section 2(41) (I) of the Consumer Protection Bill, 2015.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; &lt;a href="http://www.ijlt.in/pdffiles/IT-(Reasonable%20Security%20Practices)-Rules-2011.pdf"&gt; http://www.ijlt.in/pdffiles/IT-%28Reasonable%20Security%20Practices%29-Rules-2011.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Rule 6 of Reasonable security practices and procedures and sensitive personal data or information Rules, 2011&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;[31]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Rule 4 of Reasonable security practices and procedures and sensitive personal data or information Rules, 2011&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; &lt;a href="http://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology"&gt; http://cis-india.org/internet-governance/events/communication-rights-in-the-age-of-digital-technology &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;[33]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Supra Note 11.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;[34]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; Chaitanya Ramachandra, PUCL V. Union of India Revisited: Why India's Sureveillance Law must be redesigned for the Digital Age, available at 			&lt;a href="http://nujslawreview.org/wp-content/uploads/2015/10/Chaitanya-Ramachandran.pdf"&gt; http://nujslawreview.org/wp-content/uploads/2015/10/Chaitanya-Ramachandran.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/eight-key-privacy-events-in-india-in-the-year-2015'&gt;https://cis-india.org/internet-governance/blog/eight-key-privacy-events-in-india-in-the-year-2015&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T05:43:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai">
    <title>RTI response regarding the UIDAI</title>
    <link>https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai</link>
    <description>
        &lt;b&gt;This is a response to the RTI filed regarding UIDAI&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Supreme Curt of India, by virtue of an order dated 11th August 2015, directed the Government to widely publicize in electronic and print media, including radio and television networks that obtaining Aadhar card is not mandatory for the citizens to avail welfare schemes of the Government. (until the matter is resolved). CIS filed an RTI to get information about the steps taken by Government in this regard, the initiatives taken, and details about the expenditure incurred to publicize and inform the public about Aadhar not being mandatory to avail welfare schemes of the Government. &lt;br /&gt;&lt;br /&gt;Response: It has been informed that an advisory was issued by UIDAI headquarters to all regional offices to comply with the order, along with several advertisement campaigns. The total cost incurred so far by UIDAI for this is Rs. 317.30 lakh.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/rti.pdf" class="internal-link"&gt;Download the Response&lt;/a&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai'&gt;https://cis-india.org/internet-governance/blog/rti-response-regarding-the-uidai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-12-22T02:57:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion">
    <title>Unbundling Issues of Privacy, Data Security, Identity Matrics, for Financial Inclusion</title>
    <link>https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion</link>
    <description>
        &lt;b&gt;This event was organized by Indicus Foundation and MicroSave on December 10, 2015 at the Metropolitan Hotel and Spa, New Delhi. Sunil Abraham was a speaker.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;While the initiative towards financial inclusion has gathered new impetus with the PMJDY and the accelerated roll out of benefits, there is also a parallel narrative of concerns over the legality and fundamental constitutionality of identity verification, which is a centre piece for delivery of financial benefits and services. These divergent narratives have now reached the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At one end of the spectrum are the voices that avow the power of biometric technology to irrepudiately establish biological identity; at the other, the alarmism over targeting, concentration and misuse of personal information contained in the world’s biggest personal database. There is also a third extreme position of whether Indian citizens are entitled to the right to privacy constitutionally, and whether the right to privacy includes the right to refuse a national identity number or metric altogether. That India has yet to enact a Privacy Bill and the National Identity Authority Bill on which rests the statutory basis for UIDAI and Aadhaar only adds to the quagmire.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Several issues lie intertwined in this miasma: Privacy as an absolute right; Definition and Limits of Personal Information and Sensitive Personal Information; Consent protocols over use of personal information; Data Security; Appropriate and inclusive technology platforms; and Responsibilities and Liabilities governing the use of personal information for bonafide purposes. These straddle multiple domains: data accuracy and irrepudiability; storage, security and encryption; and sharing of information for transaction processing including across national boundaries. Unfortunately, all of these tend to get lumped together in the public debate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aim of this workshop is to unbundle the issues and understand each of them from the perspective of financial inclusion, to be able to answer these questions:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;How essential and critical is a unified Identity metric for digital financial transactions? How essential is that such a metric be biometric?&lt;/li&gt;
&lt;li&gt;To what extent does the centralised storage of biometric data represent risks of personal safety and national security, compared to the information on election voter lists, passport offices, census data, and bank accounts?&lt;/li&gt;
&lt;li&gt;What are the possible sources of transactional risk and security breaches in data sharing, and what are the international best practices?&lt;/li&gt;
&lt;li&gt;Is the present Aadhaar architecture robust enough to: address all the genuine and reasonable concerns over leakage and misuse of sensitive personal information; and to ensure that no genuine identity holder is turned away from a service, entitlement or benefit to which (s)he has a right or claim?&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;In this direction, we have the privilege to interact in this workshop with experts from The Centre for Internet and Society, and Data Security Council of India who have been at the forefront of the discussions on privacy and data security aspects of technology based innovations including for financial inclusion.&lt;/p&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/icfi-workshop" class="internal-link"&gt;Download the Workshop Schedule here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion'&gt;https://cis-india.org/internet-governance/news/unbundling-issues-of-privacy-data-security-identity-matrics-for-financial-inclusion&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T10:45:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project">
    <title>Kick Off Meeting for the Politics of Data Project</title>
    <link>https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project</link>
    <description>
        &lt;b&gt;Tactical Technology Collective (TTC) on December 7 and 8, 2015 organized this event in Phnom Penh. Amber Sinha participated in it.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The areas TTC is planning to focus on in the Politics of Data project include:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Politics of Data: exploring questions about what it means to live in a data society and how it impacts our autonomy and privacy. Me and My Shadow is one of the projects under Politics of Data that looks at the digital traces that we leave behind and how these pieces of information are created, stored and collected. It provides people with resources to learn about how these digital traces can create stories or profiles about you, and how to minimise your digital traces online.&lt;/li&gt;
&lt;li&gt;Digital Security and Privacy: through this programme, they intend to work with rights advocates, journalists, activists and others to build their digital security skills.&lt;/li&gt;
&lt;li&gt;Exposing and Shaping Issues: this part of the programme will explore new forms of finding, creating and representing evidence by advocacy and activist groups and individuals.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;The meetings saw participation from a host of organisations in Asia including Bytes for All, Cambodian Center for Human Rights, OpenNet, Community Legal Education Center, Engage Media, iPlural and Mido.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project'&gt;https://cis-india.org/internet-governance/news/kick-off-meeting-for-the-politics-of-data-project&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-12T16:42:29Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-research">
    <title>Security Research</title>
    <link>https://cis-india.org/internet-governance/blog/security-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives.&lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Research on the issue of privacy in different sectors in India.&lt;/li&gt;
&lt;li&gt;Monitoring projects, practices, and policies around those sectors.&lt;/li&gt;
&lt;li&gt;Raising public awareness around the issue of privacy, in light of varied projects, industries, sectors and instances.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;State surveillance in India has been carried out by Government agencies for many years. Recent projects include: NATGRID, CMS, NETRA, etc. which aim to overhaul the overall security and intelligence infrastructure in the country. The purpose of such initiatives has been to maintain national security and ensure interconnectivity and interoperability between departments and agencies. Concerns regarding the structure, regulatory frameworks (or lack thereof), and technologies used in these programmes and projects have attracted criticism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surveillance/Security Research -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Central Monitoring System -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Central Monitoring System or CMS is a clandestine mass electronic surveillance data mining program installed by the Center for Development of 	Telematics (C-DOT), a part of the Indian government. It gives law enforcement agencies centralized access to India's telecommunications network and the 	ability to listen in on and record mobile, landline, satellite, Voice over Internet Protocol (VoIP) calls along with private e-mails, SMS, MMS. It also 	gives them the ability to geo-locate individuals via cell phones in real time.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Central Monitoring System: Some Questions to be Raised in Parliament &lt;span&gt;http://bit.ly/1fln2vu&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; India´s ´Big Brother´: The Central Monitoring System (CMS) &lt;a href="http://bit.ly/1kyyzKB"&gt;http://bit.ly/1kyyzKB&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; India's Central Monitoring System (CMS): Something to Worry About? &lt;a href="http://bit.ly/1gsM4oQ"&gt;http://bit.ly/1gsM4oQ&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; C-DoT's surveillance system making enemies on internet 	&lt;a href="http://cis-india.org/news/dna-march-21-2014-krishna-bahirwani-c-dots-surveillance-system-making-enemies-on-internet"&gt; http://cis-india.org/news/dna-march-21-2014-krishna-bahirwani-c-dots-surveillance-system-making-enemies-on-internet &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;2. Surveillance Industry : Global And Domestic -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance industry is a multi-billion dollar economic sector that tracks individuals along with their actions such as e-mails and texts. With the 	cause for its existence being terrorism and the government's attempts to fight it, a network has been created that leaves no one with their privacy. All 	that an individual does in the digital world is suspect to surveillance. This included surveillance in the form of snooping where an individual's phone 	calls, text messages and e-mails are monitored or a more active kind where cameras, sensors and other devices are used to actively track the movements and 	actions of an individual. This information allows governments to bypass the privacy that an individual has in a manner that is considered unethical and 	incorrect. This information that is collected also in vulnerable to cyber-attacks that are serious risks to privacy and the individuals themselves. The 	following set of articles look into the ethics, risks, vulnerabilities and trade-offs of having a mass surveillance industry in place.&lt;/p&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance Technologies http://bit.ly/14pxg74 &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;New Standard Operating Procedures for Lawful Interception and Monitoring &lt;span&gt;http://bit.ly/1mRRIo4&lt;/span&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Video Surveillance and Its Impact on the Right to Privacy 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/video-surveillance-privacy"&gt; http://cis-india.org/internet-governance/blog/privacy/video-surveillance-privacy &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;More than a Hundred Global Groups Make a Principled Stand against Surveillance 	&lt;a href="http://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance"&gt; http://cis-india.org/internet-governance/blog/more-than-hundred-global-groups-make-principled-stand-against-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Models for Surveillance and Interception of Communications Worldwide 	&lt;a href="http://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide"&gt; http://cis-india.org/internet-governance/blog/models-for-surveillance-and-interception-of-communications-worldwide &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Why 'Facebook' is More Dangerous than the Government Spying on You 	&lt;a href="http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you"&gt; http://cis-india.org/internet-governance/blog/why-facebook-is-more-dangerous-than-the-government-spying-on-you &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; The Difficult Balance of Transparent Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance"&gt; http://cis-india.org/internet-governance/blog/the-difficult-balance-of-transparent-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; UK's Interception of Communications Commissioner - A Model of Accountability 		&lt;a href="http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability"&gt; http://cis-india.org/internet-governance/blog/uk-interception-of-communications-commissioner-a-model-of-accountability &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India 		&lt;a href="http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"&gt; http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; State Surveillance and Human Rights Camp: Summary &lt;a href="http://bit.ly/ZZNm6M"&gt;http://bit.ly/ZZNm6M&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India Subject to NSA Dragnet Surveillance! No Longer a Hypothesis - It is Now Officially Confirmed		&lt;a href="http://bit.ly/1eqtD8g"&gt;http://bit.ly/1eqtD8g&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Spy Files 3: WikiLeaks Sheds More Light on the Global Surveillance Industry &lt;a href="http://bit.ly/1d6EmjD"&gt;http://bit.ly/1d6EmjD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance Camp IV: Disproportionate State Surveillance - A Violation of Privacy &lt;a href="http://bit.ly/1ilTJts"&gt;http://bit.ly/1ilTJts&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Hacking without borders: The future of artificial intelligence and surveillance &lt;a href="http://bit.ly/1kWiwGv"&gt;http://bit.ly/1kWiwGv&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Driving in the Surveillance Society: Cameras, RFID tags and Black Boxes &lt;a href="http://bit.ly/1mr3KTH"&gt;http://bit.ly/1mr3KTH&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Policy Brief: Oversight Mechanisms for Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance"&gt; http://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;3. Judgements By the Indian Courts -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The surveillance industry in India has been brought before the court in different cases. The following articles look into the cause of action in these 	cases along with their impact on India and its citizens.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Anvar v. Basheer and the New (Old) Law of Electronic Evidence 	&lt;a href="http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence"&gt; http://cis-india.org/internet-governance/blog/anvar-v-basheer-new-old-law-of-electronic-evidence &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Gujarat High Court Judgement on the Snoopgate Issue 	&lt;a href="http://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue"&gt; http://cis-india.org/internet-governance/blog/gujarat-high-court-judgment-on-snoopgate-issue &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;4. International Privacy Laws -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Due to the universality of the internet, many questions of accountability arise and jurisdiction becomes a problem. Therefore certain treaties, agreements 	and other international legal literature was created to answer these questions. The articles listed below look into the international legal framework which 	governs the internet.&lt;/p&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Learning to Forget the ECJ's Decision on the Right to be Forgotten and its Implications 		&lt;a href="http://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications"&gt; http://cis-india.org/internet-governance/blog/learning-to-forget-ecj-decision-on-the-right-to-be-forgotten-and-its-implications &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy and Security Can Co-exist		&lt;a href="http://cis-india.org/internet-governance/blog/privacy-and-security"&gt;http://cis-india.org/internet-governance/blog/privacy-and-security&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; European Union Draft Report Admonishes Mass Surveillance, Calls for Stricter Data Protection and Privacy Laws 		&lt;a href="http://cis-india.org/internet-governance/blog/european-union-draft-report-admonishes-mass-surveillance"&gt; http://cis-india.org/internet-governance/blog/european-union-draft-report-admonishes-mass-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Draft International Principles on Communications Surveillance and Human Rights &lt;a href="http://bit.ly/XCsk9b"&gt;http://bit.ly/XCsk9b&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Indian Surveillance Framework -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government's mass surveillance systems are configured a little differently from the networks of many countries such as the USA and the UK. This 	is because of the vast difference in infrastructure both in existence and the required amount. In many ways, it is considered that the surveillance network 	in India is far worse than other countries. This is due to the present form of the legal system in existence. The articles below explore the system and its 	functioning including the various methods through which we are spied on. The ethics and vulnerabilities are also explored in these articles.&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Paper-thin Safeguards and Mass Surveillance in India - 	&lt;a href="http://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india"&gt; http://cis-india.org/internet-governance/blog/paper-thin-safeguards-and-mass-surveillance-in-india &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Surveillance Industry in India: At Least 76 Companies Aiding Our Watchers! - 	&lt;a href="http://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers"&gt; http://cis-india.org/internet-governance/blog/the-surveillance-industry-in-india-at-least-76-companies-aiding-our-watchers &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The Surveillance Industry in India - An Analysis of Indian Security Expos 	&lt;a href="http://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos"&gt; http://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;GSMA Research Outputs: different legal and regulatory aspects of security and surveillance in India	&lt;a href="http://cis-india.org/internet-governance/blog/gsma-research-outputs"&gt;http://cis-india.org/internet-governance/blog/gsma-research-outputs&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Way to watch 		&lt;a href="http://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch"&gt; http://cis-india.org/internet-governance/blog/indian-express-june-26-2013-chinmayi-arun-way-to-watch &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Free Speech and Surveillance 		&lt;a href="http://cis-india.org/internet-governance/blog/free-speech-and-surveillance"&gt; http://cis-india.org/internet-governance/blog/free-speech-and-surveillance &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance rises, privacy retreats 		&lt;a href="http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats"&gt; http://cis-india.org/internet-governance/news/business-standard-namrata-acharya-april-12-2015-surveillance-rises-privacy-retreats &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Freedom from Monitoring: India Inc. should Push For Privacy Laws 	&lt;a href="http://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring"&gt; http://cis-india.org/internet-governance/blog/forbesindia-article-august-21-2013-sunil-abraham-freedom-from-monitoring &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Surat's Massive Surveillance Network Should Cause Concern, Not Celebration 	&lt;a href="http://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration"&gt; http://cis-india.org/internet-governance/blog/surat-massive-surveillance-network-cause-of-concern-not-celebration &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Vodafone Report Explains Government Access to Customer Data 	&lt;a href="http://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data"&gt; http://cis-india.org/internet-governance/blog/vodafone-report-explains-govt-access-to-customer-data &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Review of the Functioning of the Cyber Appellate Tribunal and Adjudicator officers under the IT Act 	&lt;a href="http://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act"&gt; http://cis-india.org/internet-governance/blog/review-of-functioning-of-cyber-appellate-tribunal-and-adjudicatory-officers-under-it-act &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;A Comparison of Indian Legislation to Draft International Principles on Surveillance of Communications	&lt;a href="http://bit.ly/U6T3xy"&gt;http://bit.ly/U6T3xy&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;SEBI and Communication Surveillance: New Rules, New Responsibilities? &lt;a href="http://bit.ly/1eqtD8g"&gt;http://bit.ly/1eqtD8g&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Snooping Can Lead to Data Abuse		&lt;a href="http://cis-india.org/internet-governance/blog/snooping-to-data-abuse"&gt;http://cis-india.org/internet-governance/blog/snooping-to-data-abuse&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Big Brother is Watching You &lt;a href="http://bit.ly/1arbxwm"&gt;http://bit.ly/1arbxwm&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt; Moving Towards a Surveillance State 		&lt;a href="http://cis-india.org/internet-governance/blog/moving-towards-surveillance-state"&gt; http://cis-india.org/internet-governance/blog/moving-towards-surveillance-state &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; How Surveillance Works in India 		&lt;a href="http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india"&gt; http://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Big Democracy, Big Surveillance: India's Surveillance State http://bit.ly/1nkg8Ho &lt;/li&gt;
&lt;li&gt; Can India Trust Its Government on Privacy? 		&lt;a href="http://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy"&gt; http://cis-india.org/internet-governance/blog/new-york-times-july-11-2013-can-india-trust-its-government-on-piracy &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Indian surveillance laws &amp;amp; practices far worse than US 		&lt;a href="http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us"&gt; http://cis-india.org/internet-governance/blog/economic-times-june-13-2013-pranesh-prakash-indian-surveillance-laws-and-practices-far-worse-than-us &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Security, Surveillance and Data Sharing Schemes and Bodies in India 		&lt;a href="http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf/view"&gt; http://cis-india.org/internet-governance/blog/security-surveillance-and-data-sharing.pdf/view &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Policy Paper on Surveillance in India 		&lt;a href="http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-indiahttp:/cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology"&gt; http://cis-india.org/internet-governance/blog/policy-paper-on-surveillance-in-indiahttp://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technology &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Constitutionality of Indian Surveillance Law: Public Emergency as a Condition Precedent for Intercepting Communications 		&lt;a href="http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law"&gt; http://cis-india.org/internet-governance/blog/the-constitutionality-of-indian-surveillance-law &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 1: Foundations http://bit.ly/1ntqsen &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 2: Gobind and the Compelling State Interest Test		&lt;a href="http://bit.ly/1dH3meL"&gt;http://bit.ly/1dH3meL&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Surveillance and the Indian Constitution - Part 3: The Public/Private Distinction and the Supreme Court's Wrong Turn		&lt;a href="http://bit.ly/1kBosnw"&gt;http://bit.ly/1kBosnw&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;li&gt; Mastering the Art of Keeping Indians Under Surveillance 		http://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-research'&gt;https://cis-india.org/internet-governance/blog/security-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:55:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/sectoral-privacy-research">
    <title>Sectoral Privacy Research</title>
    <link>https://cis-india.org/internet-governance/blog/sectoral-privacy-research</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, India has been researching privacy in India since the year 2010, with special focus on the following issues.&lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Research on the issue of privacy in different sectors in India.&lt;/li&gt;
&lt;li&gt;Monitoring projects, practices, and policies around those sectors.&lt;/li&gt;
&lt;li&gt;Raising public awareness around the issue of privacy, in light of varied projects, industries, sectors and instances.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Right to Privacy has evolved in India since many decades, where the question of it being a Fundamental Right has been debated many times in courts of Law. With the advent of information technology and digitisation of the services, the issue of Privacy holds more relevance in sectors like Banking, Healthcare, Telecommunications, ITC, etc., The Right to Privacy is also addressed in light of the Sexual minorities, Whistle-blowers, Government services, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sectors -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Consumer Privacy and other sectors -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consumer privacy laws and regulations seek to protect any individual from loss of privacy due to failures or limitations of corporate customer privacy 	measures. The following articles deal with the current consumer privacy laws in place in India and around the world. Also, privacy concerns have been 	considered along with other sectors like Copyright law, data protection, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Consumer Privacy - How to Enforce an Effective Protective Regime? &lt;a href="http://bit.ly/1a99P2z"&gt;http://bit.ly/1a99P2z&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Information Technology Act: Do we have the Safeguards for Electronic Privacy? &lt;a href="http://bit.ly/10VJp1P"&gt;http://bit.ly/10VJp1P&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Limits to Privacy http://bit.ly/19mPG6I &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;§ Copyright Enforcement and Privacy in India &lt;a href="http://bit.ly/18fi9fM"&gt;http://bit.ly/18fi9fM&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Privacy in India: Country Report http://bit.ly/14pnNwl &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;§ Transparency and Privacy &lt;a href="http://bit.ly/1a9dMnC"&gt;http://bit.ly/1a9dMnC&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Report of the Group of Experts on Privacy (Contributed by CIS) &lt;a href="http://bit.ly/VqzKtr"&gt;http://bit.ly/VqzKtr&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The (In) Visible Subject: Power, Privacy and Social Networking &lt;a href="http://bit.ly/15koqol"&gt;http://bit.ly/15koqol&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and the Indian Copyright Act, 1857 as Amended in 2010 &lt;a href="http://bit.ly/1euwX0r"&gt;http://bit.ly/1euwX0r&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Should Ratan Tata be afforded the Right to Privacy? &lt;a href="http://bit.ly/LRlXin"&gt;http://bit.ly/LRlXin&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Comments on Information Technology (Guidelines for Cyber Café) Rules, 2011 &lt;a href="http://bit.ly/15kojJn"&gt;http://bit.ly/15kojJn&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Broadcasting Standards Authority Censures TV9 over Privacy Violations! &lt;a href="http://bit.ly/16L4izl"&gt;http://bit.ly/16L4izl&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Is Data Protection Enough? &lt;a href="http://bit.ly/1bvaWx2"&gt;http://bit.ly/1bvaWx2&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy, speech at stake in cyberspace	&lt;a href="http://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1"&gt;http://cis-india.org/news/privacy-speech-at-stake-in-cyberspace-1&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Q&amp;amp;A to the Report of the Group of Experts on Privacy &lt;a href="http://bit.ly/TPhzQQ"&gt;http://bit.ly/TPhzQQ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy worries cloud Facebook's WhatsApp Deal 	&lt;a href="http://cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal"&gt; http://cis-india.org/internet-governance/blog/economic-times-march-14-2014-sunil-abraham-privacy-worries-cloud-facebook-whatsapp-deal &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ GNI Assessment Finds ICT Companies Protect User Privacy and Freedom of Expression &lt;a href="http://bit.ly/1mjbpmL"&gt;http://bit.ly/1mjbpmL&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ A Stolen Perspective &lt;a href="http://bit.ly/1bWHyzv"&gt;http://bit.ly/1bWHyzv&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Is Data Protection enough? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough"&gt; http://cis-india.org/internet-governance/blog/privacy/is-data-protection-enough &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ I don't want my fingerprints taken &lt;a href="http://bit.ly/aYdMia"&gt;http://bit.ly/aYdMia&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Keeping it Private &lt;a href="http://bit.ly/15wjTVc"&gt;http://bit.ly/15wjTVc&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Personal Data, Public Profile &lt;a href="http://bit.ly/15vlFk4"&gt;http://bit.ly/15vlFk4&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Why your Facebook Stalker is Not the Real Problem &lt;a href="http://bit.ly/1bI2MSc"&gt;http://bit.ly/1bI2MSc&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Private Eye &lt;a href="http://bit.ly/173ypSI"&gt;http://bit.ly/173ypSI&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ How Facebook is Blatantly Abusing our Trust &lt;a href="http://bit.ly/OBXGXk"&gt;http://bit.ly/OBXGXk&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Open Secrets &lt;a href="http://bit.ly/1b5uvK0"&gt;http://bit.ly/1b5uvK0&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Big Brother is Watching You &lt;a href="http://bit.ly/1cGpg0K"&gt;http://bit.ly/1cGpg0K&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Banking/Finance -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy in the banking and finance industry is crucial as the records and funds of one person must not be accessible by another without the due 	authorisation. The following articles deal with the current system in place that governs privacy in the financial and banking industry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Banking: Do Indian Banking Standards Provide Enough Privacy Protection? &lt;a href="http://bit.ly/18fhsTM"&gt;http://bit.ly/18fhsTM&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Finance and Privacy &lt;a href="http://bit.ly/15aUPh6"&gt;http://bit.ly/15aUPh6&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Making the Powerful Accountable &lt;a href="http://bit.ly/1nvzSpC"&gt;http://bit.ly/1nvzSpC&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Telecommunications -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The telecommunications industry is the backbone of current technology with respect to ICTs. The telecommunications industry has its own rules and 	regulations. These rules are the focal point of the following articles including criticism and acclaim.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Telecommunications: Do We Have the Safeguards? &lt;a href="http://bit.ly/10VJp1P"&gt;http://bit.ly/10VJp1P&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Media Law &lt;a href="http://bit.ly/18fgDfF"&gt;http://bit.ly/18fgDfF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ IP Addresses and Expeditious Disclosure of Identity in India &lt;a href="http://bit.ly/16dBy4N"&gt;http://bit.ly/16dBy4N&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Telecommunications and Internet Privacy Read more: &lt;a href="http://bit.ly/16dEcaF"&gt;http://bit.ly/16dEcaF&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Encryption Standards and Practices &lt;a href="http://bit.ly/KT9BTy"&gt;http://bit.ly/KT9BTy&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Encryption Standards and Practices 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/privacy_encryption"&gt; http://cis-india.org/internet-governance/blog/privacy/privacy_encryption &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Security: Privacy, Transparency and Technology 	&lt;a href="http://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technolog"&gt; http://cis-india.org/internet-governance/blog/security-privacy-transparency-and-technolog &lt;/a&gt; y&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Sexual Minorities -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the internet is a global forum of self-expression and acceptance for most of us, it does not hold true for sexual minorities. The internet is a place 	of secrecy for those that do not conform to the typical identities set by society and therefore their privacy is more important to them than most. When 	they reveal themselves or are revealed by others, they typically face a lot of group hatred from the rest of the people and therefore value their privacy. 	The following article looks into their situation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;· Privacy and Sexual Minorities http://bit.ly/19mQUyZ&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Health -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy between a doctor and a patient is seen as incredibly important and so should the privacy of a person in any situation where they reveal more 	than they would to others in the sense of CT scans and other diagnoses. The following articles look into the present scenario of privacy in places like a 	hospital or diagnosis center.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Health and Privacy &lt;a href="http://bit.ly/16L1AJX"&gt;http://bit.ly/16L1AJX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy Concerns in Whole Body Imaging: A Few Questions &lt;a href="http://bit.ly/1jmvH1z"&gt;http://bit.ly/1jmvH1z&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. e-Governance -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main focus of governments in ICTs is their gain for governance. There have many a multiplicity of laws and legislation passed by various countries 	including India in an effort to govern the universal space that is the internet. Surveillance is a major part of that governance and control. The articles 	listed below deal with the issues of ethics and drawbacks in the current legal scenario involving ICTs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ E-Governance and Privacy &lt;a href="http://bit.ly/18fiReX"&gt;http://bit.ly/18fiReX&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy and Governmental Databases &lt;a href="http://bit.ly/18fmSy8"&gt;http://bit.ly/18fmSy8&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Killing Internet Softly with its Rules &lt;a href="http://bit.ly/1b5I7Z2"&gt;http://bit.ly/1b5I7Z2&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Cyber Crime &amp;amp; Privacy &lt;a href="http://bit.ly/17VTluv"&gt;http://bit.ly/17VTluv&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Understanding the Right to Information &lt;a href="http://bit.ly/1hojKr7"&gt;http://bit.ly/1hojKr7&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy Perspectives on the 2012-2013 Goa Beach Shack Policy &lt;a href="http://bit.ly/ThAovQ"&gt;http://bit.ly/ThAovQ&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Identifying Aspects of Privacy in Islamic Law 	&lt;a href="http://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"&gt; http://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ What Does Facebook's Transparency Report Tell Us About the Indian Government's Record on Free Expression &amp;amp; Privacy? 	&lt;a href="http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy"&gt; http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell &lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/what-does-facebook-transparency-report-tell-us-about-indian-government-record-on-free-expression-and-privacy"&gt; -us-about-indian-government-record-on-free-expression-and-privacy &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Search and Seizure and the Right to Privacy in the Digital Age: A Comparison of US and India 	&lt;a href="http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age"&gt; http://cis-india.org/internet-governance/blog/search-and-seizure-and-right-to-privacy-in-digital-age &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Internet Privacy in India 	&lt;a href="http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india"&gt; http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-i &lt;/a&gt; &lt;a href="http://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india"&gt;ndia&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Internet-driven Developments - Structural Changes and Tipping Points &lt;a href="http://bit.ly/10s8HVH"&gt;http://bit.ly/10s8HVH&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Data Retention in India &lt;a href="http://bit.ly/XR791u"&gt;http://bit.ly/XR791u&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ 2012: Privacy Highlights in India &lt;a href="http://bit.ly/1kWe3n7"&gt;http://bit.ly/1kWe3n7&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Big Dog is Watching You! The Sci-fi Future of Animal and Insect Drones &lt;a href="http://bit.ly/1kWee1W"&gt;http://bit.ly/1kWee1W&lt;/a&gt;&lt;/p&gt;
&lt;ul style="text-align: justify; " type="disc"&gt;
&lt;/ul&gt;
&lt;ol style="text-align: justify; " type="1"&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; " type="square"&gt;
&lt;li&gt; Privacy Law in India: A Muddled Field - I 		&lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1"&gt; http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-priv &lt;/a&gt; &lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-bhairav-acharya-april-15-2014-privacy-law-in-india-a-muddled-field-1"&gt; acy-law-in-india-a-muddled-field-1 &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Four Parts of Privacy in India 		&lt;a href="http://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india"&gt; http://cis-india.org/internet-governance/blog/economic-and-political-weekly-bhairav-acharya-may-30-2015-four-parts-of-privacy-in-india &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Right to Privacy in Peril 		&lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Microsoft Releases its First Report on Data Requests by Law Enforcement Agencies around the World		&lt;a href="http://bit.ly/1kWjylM"&gt;http://bit.ly/1kWjylM&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The Criminal Law Amendment Bill 2013 - Penalising 'Peeping Toms' and Other Privacy Issues &lt;a href="http://bit.ly/1dO46o5"&gt;http://bit.ly/1dO46o5&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy vs. Transparency: An Attempt at Resolving the Dichotomy		&lt;a href="http://cis-india.org/openness/blog-old/privacy-v-transparency"&gt;http://cis-india.org/openness/blog-old/privacy-v-transparency&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to "Not" Recognize India as Data Secure Nation till Enactment of Privacy Legislation		&lt;a href="http://bit.ly/1sJME9j"&gt;http://bit.ly/1sJME9j&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to Prevent the Installation of RFID tags in Vehicles &lt;a href="http://bit.ly/1hxidzU"&gt;http://bit.ly/1hxidzU&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The National Privacy Roundtable Meetings &lt;a href="http://bit.ly/158ayNW"&gt;http://bit.ly/158ayNW&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Transparency Reports - A Glance on What Google and Facebook Tell about Government Data Requests		&lt;a href="http://bit.ly/19NYTal"&gt;http://bit.ly/19NYTal&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; CIS and International Coalition Calls upon Governments to Protect Privacy &lt;a href="http://bit.ly/18oOTDk"&gt;http://bit.ly/18oOTDk&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; An Analysis of the Cases Filed under Section 46 of the Information Technology Act, 2000 for Adjudication in the State of Maharashtra		&lt;a href="http://bit.ly/16dKyoo"&gt;http://bit.ly/16dKyoo&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Open Letter to Members of the European Parliament of the Civil Liberties, Justice and Home Affairs Committee		&lt;a href="http://bit.ly/17eZntz"&gt;http://bit.ly/17eZntz&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; CIS Supports the UN Resolution on "The Right to Privacy in the Digital age" &lt;a href="http://bit.ly/1c2A89q"&gt;http://bit.ly/1c2A89q&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Brochures from Expos on Smart Cards, e-Security, RFID &amp;amp; Biometrics in India &lt;a href="http://bit.ly/1f714fN"&gt;http://bit.ly/1f714fN&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Electoral Databases - Privacy and Security Concerns &lt;a href="http://bit.ly/Mb4ktM"&gt;http://bit.ly/Mb4ktM&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Net Neutrality and Privacy &lt;a href="http://bit.ly/1khi1GQ"&gt;http://bit.ly/1khi1GQ&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Intermediary Liability Resources &lt;a href="http://bit.ly/1hRT8OD"&gt;http://bit.ly/1hRT8OD&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Feedback to the NIA Bill &lt;a href="http://bit.ly/1ePhUeg"&gt;http://bit.ly/1ePhUeg&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India's Identity Crisis &lt;a href="http://bit.ly/1lTRuuz"&gt;http://bit.ly/1lTRuuz&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Facebook, Privacy, and India &lt;a href="http://bit.ly/a2HzhT"&gt;http://bit.ly/a2HzhT&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Private censorship and the Right to Hear 		&lt;a href="http://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear"&gt; http://cis-india.org/internet-governance/blog/the-hoot-july-17-2014-chinmayi-arun-private-censorship-and-the-right-to-hear &lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Your Privacy is Public Property (Rules issued by a control-obsessed government have armed officials with widespread powers to pry into your private 		life. &lt;a href="http://cis-india.org/news/privacy-public-property"&gt;http://cis-india.org/news/privacy-public-property&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; The India Privacy Monitor Map &lt;a href="http://bit.ly/19A5mCZ"&gt;http://bit.ly/19A5mCZ&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Privacy and Security can Co-Exist &lt;a href="http://bit.ly/193fPXi"&gt;http://bit.ly/193fPXi&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; A Street View of the Private and The Public (&lt;a href="http://bit.ly/15VKmdf"&gt;http://bit.ly/15VKmdf&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Sense and Censorship &lt;a href="http://bit.ly/14KFwyo"&gt;http://bit.ly/14KFwyo&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Government access to private sector data &lt;a href="http://bit.ly/18rjd1X"&gt;http://bit.ly/18rjd1X&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; India: Privacy in Peril &lt;a href="http://bit.ly/1g5QbZj"&gt;http://bit.ly/1g5QbZj&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Big Democracy, Big Surveillance: India's Surveillance State &lt;a href="http://bit.ly/1nkg8Ho"&gt;http://bit.ly/1nkg8Ho&lt;/a&gt; &lt;/li&gt;
&lt;li&gt; Who Governs the Internet? Implications for Freedom and National Security &lt;a href="http://bit.ly/1hnnJ2a"&gt;http://bit.ly/1hnnJ2a&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;7. Whistle-blowers -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Whistle-blowers are always in a difficult situation when they must reveal the misdeeds of their corporations and governments due to the blowback that is 	possible if their identity is revealed to the public. As in the case of Edward Snowden and many others, a whistle-blowers identity is to be kept the most 	private to avoid the consequences of revealing the information that they did. This is the main focus of the article below.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Privacy Rights of Whistle-blowers &lt;a href="http://bit.ly/18GWmM3"&gt;http://bit.ly/18GWmM3&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. Cloud and Open Source -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cloud computing and open source software have grown rapidly over the past few decades. Cloud computing is when an individual or company uses offsite 	hardware on a pay by usage basis provided and owned by someone else. The advantages are low costs and easy access along with decreased initial costs. Open 	source software on the other hand is software where despite the existence of proprietary elements and innovation, the software is available to the public 	at no charge. These software are based of open standards and have the obvious advantage of being compatible with many different set ups and are free. The 	following article highlights these computing solutions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Privacy, Free/Open Source, and the Cloud &lt;a href="http://bit.ly/1cTmGoI"&gt;http://bit.ly/1cTmGoI&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. e-Commerce -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the fastest growing applications of the internet is e-Commerce. This includes many facets of commerce such as online trading, the stock exchange 	etc. in these cases, just as in the financial and banking industries, privacy is very important to protect ones investments and capital. The following 	article's main focal point is the world of e-Commerce and its current privacy scenario.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Consumer Privacy in e-Commerce http://bit.ly/1dCtgTs&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/sectoral-privacy-research'&gt;https://cis-india.org/internet-governance/blog/sectoral-privacy-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:46:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-policy-research">
    <title>Privacy Policy Research</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-policy-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives.&lt;/b&gt;
        &lt;ol&gt;
&lt;li&gt;Raising public awareness  and dialogue around privacy, &lt;/li&gt;
&lt;li&gt;Undertaking in depth research of domestic and international policy pertaining to privacy &lt;/li&gt;
&lt;li&gt;Driving comprehensive privacy legislation in India through research.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;India does not have a comprehensive legislation covering issues of privacy or establishing the right to privacy In 2010 an "Approach Paper on Privacy" was published, in 2011 the Department of Personnel and Training released a draft Right to Privacy Bill, in 2012 the Planning Commission constituted a group of experts which published The Report of the Group of Experts on Privacy, in 2013 CIS drafted the citizens Privacy Protection Bill, and in 2014 the Right to Privacy Bill was leaked. Currently the Government is in the process of drafting and finalizing the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/DraftRighttoPrivacyBill.png" alt="Draft Right to Privacy" class="image-inline" title="Draft Right to Privacy" /&gt;&lt;/p&gt;
&lt;p&gt;Privacy Research -&lt;/p&gt;
&lt;p&gt;1. Approach Paper on Privacy, 2010 -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following article contains the reply drafted by CIS in response to the Paper on Privacy in 2010. The Paper on Privacy was a document drafted by a group 	of officers created to develop a framework for a privacy legislation that would balance the need for privacy protection, security, sectoral interests, and 	respond to the domain legislation on the subject.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; CIS Responds to Privacy Approach Paper &lt;a href="http://bit.ly/16dEPB3"&gt;http://bit.ly/16dEPB3&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;2. Report on Privacy, 2012 -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report on Privacy, 2012 was drafted and published by a group of experts under the Planning Commission pertaining to the current legislation with 	respect to privacy. The following articles contain the responses and criticisms to the report and the current legislation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; The National Cyber Security Policy: Not a Real Policy &lt;a href="http://bit.ly/16yLYFq"&gt;http://bit.ly/16yLYFq&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Privacy Law Must Fit the Bill &lt;a href="http://bit.ly/19DNYjs"&gt;http://bit.ly/19DNYjs&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;3. Privacy Protection Bill, 2013 -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Protection Bill, 2013 was a legislation that aims to formulate the rules and law that governs privacy protection. The following articles refer 	to this legislation including a citizen's draft of the legislation.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; The Privacy (Protection) Bill 2013: A Citizen's Draft &lt;a href="http://bit.ly/1bXYbL6"&gt;http://bit.ly/1bXYbL6&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Privacy Protection Bill, 2013 (With Amendments based on Public Feedback) &lt;a href="http://bit.ly/1efkgbe"&gt;http://bit.ly/1efkgbe&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; Privacy (Protection) Bill, 2013: Updated Third Draft &lt;a href="http://bit.ly/14WAgI7"&gt;http://bit.ly/14WAgI7&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; The Privacy Protection Bill, 2013 &lt;a href="http://bit.ly/1g3TwIX"&gt;http://bit.ly/1g3TwIX&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt; The New Right to Privacy Bill 2011: A Blind Man's View of the Elephant &lt;a href="http://bit.ly/17VSgCH"&gt;http://bit.ly/17VSgCH&lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;4. Right to Privacy Act, 2014 (Leaked Bill) -&lt;/p&gt;
&lt;p&gt;The Right to Privacy Act, 2014 is a bill still under proposal that was leaked, linked below.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt; Leaked Privacy Bill: 2014 vs. 2011 http://bit.ly/QV0Y0w &lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-policy-research'&gt;https://cis-india.org/internet-governance/blog/privacy-policy-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:40:37Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/dna-research">
    <title>DNA Research</title>
    <link>https://cis-india.org/internet-governance/blog/dna-research</link>
    <description>
        &lt;b&gt;In 2006, the Department of Biotechnology drafted the Human DNA Profiling Bill. In 2012 a revised Bill was released and a group of Experts was constituted to finalize the Bill. In 2014, another version was released, the approval of which is pending before the Parliament. This legislation will allow the government of India to Create a National DNA Data Bank and a DNA Profiling Board for the purposes of forensic research and analysis. Here is a collection of our research on privacy and security concerns related to the Bill.&lt;/b&gt;
        
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society, India has been researching privacy in India since the year 2010, with special focus on the following issues related to the DNA Bill:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Validity and legality of collection, usage and storage of DNA samples and information derived from the same.&lt;/li&gt;
&lt;li&gt;Monitoring projects and policies around Human DNA Profiling.&lt;/li&gt;
&lt;li&gt;Raising public awareness around issues concerning biometrics.&lt;/li&gt;&lt;/ol&gt;
&lt;p style="text-align: justify;"&gt;In 2006, the Department of Biotechnology drafted the Human DNA Profiling Bill. In 2012 a revised Bill was released and a group of Experts was constituted to finalize the Bill. In 2014, another version was released, the approval of which is pending before the Parliament.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The Bill seeks to establish DNA Databases at the state and regional level and a national level database. The databases would store DNA profiles of suspects, offenders, missing persons, and deceased persons. The database could be used by courts, law enforcement (national and international) agencies, and other authorized persons for criminal and civil purposes. The Bill will also regulate DNA laboratories collecting DNA samples. Lack of adequate consent, the broad powers of the board, and the deletion of innocent persons profiles are just a few of the concerns voiced about the Bill.&lt;/p&gt;
&lt;img src="https://github.com/cis-india/website/raw/master/img/CIS_DNA-Profiling-Bill_Web.jpg" alt="DNA Profiling Bill - Infographic" /&gt;
&lt;h6&gt;&lt;a href="https://github.com/cis-india/website/raw/master/img/CIS_DNA-Profiling-Bill_Web.jpg" target="_blank"&gt;Download the infographic.&lt;/a&gt; Credit: &lt;a href="https://twitter.com/Scott_Mason88" target="_blank"&gt;Scott Mason&lt;/a&gt; and CIS team.&lt;/h6&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;1. DNA Bill&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;The Human DNA Profiling bill is a legislation that will allow the government of India to Create a National DNA Data Bank and a DNA Profiling Board for the 	purposes of forensic research and analysis. There have been many concerns raised about the infringement of privacy and the power that the government will 	have with such information raised by Human Rights Groups, individuals and NGOs. The bill proposes to profile people through their fingerprints and retinal 	scans which allow the government to create different unique profiles for individuals. Some of the concerns raised include the loss of privacy by such 	profiling and the manner in which they are conducted. Unless strictly controlled, monitored and protected, such a database of the citizens' fingerprints 	and retinal scans could lead to huge blowbacks in the form of security risks and privacy invasions. The following articles elaborate upon these matters.&lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;ul type="disc"&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/biometrics-an-angootha-chaap-nation"&gt;Biometrics - An 'Angootha Chaap' Nation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/re-the-human-dna-profiling-bill-2012"&gt;Re: The Human DNA Profiling Bill, 2012&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis"&gt;Human DNA Profiling Bill 2012 Analysis&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/indian-draft-dna-profiling-act"&gt;Overview and Concerns Regarding the Indian Draft DNA Act&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/indias-biometric-identification-programs-and-privacy-concerns"&gt;India's Biometric Identification Programs and Privacy Concerns&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/dna-dissent"&gt;A Dissent note to the Expert Committee for DNA Profiling&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/cis-comments-and-recommendations-to-human-dna-profiling-bill-2015"&gt;CIS Comments and Recommendations to the Human DNA Profiling Bill, June 2015&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/concerns-regarding-dna-law"&gt;Concerns regarding DNA Law&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/human-dna-profiling-bill-2012-vs-2015"&gt;Human DNA Profiling Bill 2012 v/s 2015 Bill&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/the-scariest-bill-in-parliament-is-getting-no-attention-2013-here2019s-what-you-need-to-know-about-it"&gt;The scariest Bill in the Parliament is getting no attention - Here's what you need to know about it&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/business-standard-kanika-datta-august-1-2015-why-the-dna-bill-is-open-to-misuse-sunil-abraham"&gt;Why the DNA Bill is open to misuse&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/livemint-nikita-mehta-july-29-2015-regulation-misuse-concerns-still-dog-dna-profiling-bill"&gt;Regulation, misuse concerns still dog DNA Profiling Bill&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/news/open-magazine-august-7-2015-ullekh-np-genetic-profiling"&gt;Genetic profiling - Is it all in the DNA?&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/comparison-of-the-human-dna-profiling-bill-2012-with-cis-recommendations-sub-committee-recommendations-expert-committee-recommendations-and-the-human-dna-profiling-bill-2015"&gt;Comparison of the Human DNA Profiling Bill 2012 with - CIS Recommendations, Sub-Committee Recommendations, Expert Committee Recommendations, and the Human DNA Profiling Bill 2015&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/council-for-responsible-genetics-april-2014-sunil-abraham-very-big-brother"&gt;Very Big Brother&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;
&lt;h2&gt;2. Comparative Analysis with other Legislatures&lt;/h2&gt;
&lt;p&gt;Human DNA Profiling is a system that isn't proposed only in India. This system of identification has been proposed and implemented in many nations. Each of 	these systems differs from the other on bases dependent on the nation's and society's needs. The risks and criticisms that DNA profiling has faced may be 	the same but the manner in which solutions to such issues are varying. The following articles look into the different systems in place in different 	countries and create a comparison with the proposed system in India to give us a better understanding of the risks and implications of such a system being 	implemented.&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world"&gt;Comparative Analysis of DNA Profiling Legislations from Across the World&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions"&gt;Comparison of Section 35(1) of the Draft Human DNA Profiling Bill and Section 4 of the Identification Act Revised Statute of Canada&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="http://cis-india.org/internet-governance/blog/comparison-of-draft-dna-profiling-bills"&gt;A Comparison of the Draft DNA Profiling Bill 2007 and the Draft Human DNA Profiling Bill 2012&lt;/a&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/dna-research'&gt;https://cis-india.org/internet-governance/blog/dna-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-07-21T11:02:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-research">
    <title>UID Research</title>
    <link>https://cis-india.org/internet-governance/blog/uid-research</link>
    <description>
        &lt;b&gt;The Centre Internet and Society, India has been researching privacy policy in India since the year 2010 with the following objectives. &lt;/b&gt;
        &lt;ol style="text-align: justify; "&gt;
&lt;li&gt;Researching the vision and implementation of the UID Scheme - both from a technical and regulatory perspective.&lt;/li&gt;
&lt;li&gt;Understanding the validity and legality of collection, usage and storage of Biometric information for this scheme.&lt;/li&gt;
&lt;li&gt;Raising public awareness around issues concerning privacy, data security and the objectives of the UID Scheme.&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The UID scheme seeks to provide all residents of India an identity number based on their biometrics that can be used to authenticate individuals for the purpose of Government benefits and services. A 2015 Supreme Court ruling has clarified that the UID can only be used in the PDS and LPG Schemes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Concerns with the scheme include the broad consent taken at the time of enrolment, the lack of clarity as to what happens with transactional metadata, the centralized storage of the biometric information in the CIDR, the seeding of the aadhaar number into service providers’ databases, and the possibility of function creep. Also, there are concerns due to absence of a legislation to look into the privacy and security concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;UID Research -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Ramifications of Aadhar and UID schemes -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID and Aadhar systems have been bombarded with criticisms and plagued with issues ranging from privacy concerns to security risks. The following 	articles deal with the many problems and drawbacks of these systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID and NPR: Towards Common Ground 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground"&gt; http://cis-india.org/internet-governance/blog/uid-npr-towards-common-ground &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Public Statement to Final Draft of UID Bill &lt;a href="http://bit.ly/1aGf1NN"&gt;http://bit.ly/1aGf1NN&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID Project in India - Some Possible Ramifications	&lt;a href="http://cis-india.org/internet-governance/blog/uid-in-india"&gt;http://cis-india.org/internet-governance/blog/uid-in-india&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Aadhaar Number vs the Social Security Number 	&lt;a href="http://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number"&gt; http://cis-india.org/internet-governance/blog/aadhaar-vs-social-security-number &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Feedback to the NIA Bill	&lt;a href="http://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill"&gt;http://cis-india.org/internet-governance/blog/cis-feedback-to-nia-bill&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Unique ID System: Pros and Cons &lt;a href="http://bit.ly/1jmxbZS"&gt;http://bit.ly/1jmxbZS&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Submitted seven open letters to the Parliamentary Finance Committee on the UID covering the following aspects: SCOSTA Standards 	(http://bit.ly/1hq5Rqd), Centralized Database (http://bit.ly/1hsHJDg), Biometrics (http://bit.ly/196drke), UID Budget (http://bit.ly/1e4c2Op), Operational 	Design (http://bit.ly/JXR61S), UID and Transactions (http://bit.ly/1gY6B8r), and Deduplication (http://bit.ly/1c9TkSg)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Comments on Finance Committee Statements to Open Letters on Unique Identity: The Parliamentary Finance Committee responded to the open letters sent by CIS through an email on 12 October 2011. CIS has commented on the points raised by the Committee:	&lt;a href="http://bit.ly/1kz4H0F"&gt;http://bit.ly/1kz4H0F&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Unique Identification Scheme (UID) &amp;amp; National Population Register (NPR), and Governance 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note"&gt; http://cis-india.org/internet-governance/blog/uid-and-npr-a-background-note &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Financial Inclusion and the UID	&lt;a href="http://cis-india.org/internet-governance/privacy_uidfinancialinclusion"&gt;http://cis-india.org/internet-governance/privacy_uidfinancialinclusion&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ The Aadhaar Case	&lt;a href="http://cis-india.org/internet-governance/blog/the-aadhaar-case"&gt;http://cis-india.org/internet-governance/blog/the-aadhaar-case&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Do we need the Aadhaar scheme &lt;a href="http://bit.ly/1850wAz"&gt;http://bit.ly/1850wAz&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ 4 Popular Myths about UID &lt;a href="http://bit.ly/1bWFoQg"&gt;http://bit.ly/1bWFoQg&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Does the UID Reflect India? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/uid-reflects-india"&gt; http://cis-india.org/internet-governance/blog/privacy/uid-reflects-india &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Would it be a unique identity crisis?	&lt;a href="http://cis-india.org/news/unique-identity-crisis"&gt;http://cis-india.org/news/unique-identity-crisis&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UID: Nothing to Hide, Nothing to Fear? 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear"&gt; http://cis-india.org/internet-governance/blog/privacy/uid-nothing-to-hide-fear &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Right to Privacy and UID -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UID system has been hit by many privacy concerns from NGOs, private individuals and others. The sharing of one's information, especially fingerprints 	and retinal scans to a system that is controlled by the government and is not vetted as having good security irks most people. These issues are dealt with 	the in the following articles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ India Fears of Privacy Loss Pursue Ambitious ID Project	&lt;a href="http://cis-india.org/news/india-fears-of-privacy-loss"&gt;http://cis-india.org/news/india-fears-of-privacy-loss&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Analysing the Right to Privacy and Dignity with Respect to the UID &lt;a href="http://bit.ly/1bWFoQg"&gt;http://bit.ly/1bWFoQg&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Analysing the Right to Privacy and Dignity with Respect to the UID 	&lt;a href="http://cis-india.org/internet-governance/blog/privacy/privacy-uiddevaprasad"&gt; http://cis-india.org/internet-governance/blog/privacy/privacy-uiddevaprasad &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Supreme Court order is a good start, but is seeding necessary? 	&lt;a href="http://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary"&gt; http://cis-india.org/internet-governance/blog/supreme-court-order-is-a-good-start-but-is-seeding-necessary &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Right to Privacy in Peril 	&lt;a href="http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril"&gt; http://cis-india.org/internet-governance/blog/right-to-privacy-in-peril &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Data Flow in the UID -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The articles below deal with the manner in which data is moved around and handled in the UID system in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ UIDAI Practices and the Information Technology Act, Section 43A and Subsequent Rules 	&lt;a href="http://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules"&gt; http://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;§ Data flow in the Unique Identification Scheme of India 	&lt;a href="http://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india"&gt; http://cis-india.org/internet-governance/blog/data-flow-in-unique-identification-scheme-of-india &lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-research'&gt;https://cis-india.org/internet-governance/blog/uid-research&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-01-03T09:59:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia">
    <title>Net Neutrality across South Asia</title>
    <link>https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) and the Observer Research Foundation in association with Centre for Global Communication Studies, Annenberg School for Communication, University of Pennnsylvania and Internet Policy Observatory is organizing this event at the Observer Research Foundation's office in New Delhi from 10 a.m. to 5 p.m., on December 12, 2015.&lt;/b&gt;
        &lt;h3&gt;Context&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Net neutrality can broadly be understood as the principle of non-discrimination which in practice allows the internet to be free and open by preventing service providers from slowing or interfering with the transfer of data. Net neutrality has risen as a global policy issue, yet cultural, political, commercial, and economical factors influence how net neutrality is understood and addressed in a particular context. Indeed, the factors driving the net neutrality debate, the way in which governments are addressing net neutrality, the role and response of industry, the public response, and the role of civil society has been varied across contexts. The topic of net neutrality is not limited to a technical debate and brings together a number of issues including the right to access, the right to freedom of expression, fair competition practices, and privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This conference seeks to bring together domain experts, industry, government, and civil society across South Asia to understand how net neutrality is understood in different contexts, how it is being addressed from a policy point of view, what the varying public dialogues around net neutrality are, and what role civil society can play in influencing the debate.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;
&lt;div style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/concept-note-network-neutrality-in-south-asia" class="internal-link"&gt;&lt;strong&gt;Download the Concept Note&lt;/strong&gt;&lt;/a&gt;&lt;/div&gt;
&lt;/li&gt;
&lt;li&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/NN_Conference%20Report.pdf" class="internal-link"&gt;&lt;b&gt;Download Event Report &lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/li&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia'&gt;https://cis-india.org/internet-governance/events/net-neutrality-across-south-asia&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-02-27T08:09:29Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns">
    <title>Shopping on apps raise privacy and security concerns</title>
    <link>https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns</link>
    <description>
        &lt;b&gt;The recently concluded online Diwali sales frequently offered consumers hefty discounts on merchandise if they shopped via store app, a move that experts say increases security risks for internet users.&lt;/b&gt;
        &lt;p&gt;The article by Vivek Ananth was &lt;a class="external-link" href="http://www.thesoftcopy.in/23_11_15_shopping_on_apps_raise_concerns.html"&gt;published by the Softcopy, an IIJNM Web Publication&lt;/a&gt; on November 23, 2015. Sunil Abraham gave inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“It makes the security much worse because of  increased complexity from  the user perspective,” said Sunil Abraham, executive  director at Centre  for Internet and Society.&lt;br /&gt; &lt;br /&gt; “User will have to install  multiple apps and then  worry about the security implications arising from each  app. From the  e-commerce corporation perspective it might reduce effort but for  users  this is a nightmare.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Do  apps increase security risks? &lt;br /&gt; &lt;br /&gt; The degree of risk depends on the specific app and   can only be determined after a detailed security audit, Abraham said.&lt;br /&gt; &lt;br /&gt; “Unfortunately there aren't many organisations doing   such audits and making their results available to the public,” he added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are some users who say that privacy on the  internet isn’t an option.&lt;br /&gt; &lt;br /&gt; “Once you are online your privacy is kind of gone,”   said Hasmit Trivedi of Mumbai. “I mean you are vulnerable.”&lt;br /&gt; &lt;br /&gt; “That (browsing history being used to target   advertisements) does concern me, but not to the extent that I'll stop  using  these websites,” said Sweta Rajan, a lawyer from Mumbai.&lt;br /&gt; &lt;br /&gt; “Google has done this forever," said Dinoo Muthappa.“I  don't even care if they use my search to place advertisements of what  they  think I need while browsing.”&lt;b&gt;&lt;/b&gt;&lt;br /&gt; &lt;b&gt;&lt;br /&gt; Comfort  and Convenience trumps privacy&lt;/b&gt;&lt;br /&gt; &lt;br /&gt; “I don't really shop for things I'm not comfortable   allowing the world to know. I'm ok with them using this (usage pattern  and  browsing information) for commercial reasons,” Rajan said.&lt;br /&gt; &lt;br /&gt; “We live in a world where the cost of convenience is   our privacy. Take my user preferences,” said Dinoo Muthappa, a lawyer  from  Delhi.“If it means you'll make money and somehow reflect as a  discount to me  later, that's fine,” she added.&lt;br /&gt; &lt;br /&gt; “I frankly don't have a problem with it in   principle,” said Akshara Kumar Chitoor, a lawyer from Bengaluru, about   companies mining data to target advertisements at her. “I don't think  it's very  different from how certain TV channels carry certain  advertisements because  they know the audiences.I mean,  you get Rin and  Horlicks ads on Zee and Sony but not Romedy Now or Comedy  Central.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The convenience of having it come home  when I want  and not having to face the guy who I know is ripping me  off; these guys can use  and sell my information,” Muthappa said.&lt;br /&gt; &lt;br /&gt; “With my work timings I literally do not find time  to go to a store and  shop,”Rajan said. “I buy everything online. It's very  convenient and  time saving.”&lt;br /&gt; &lt;br /&gt; “Personally, I think just browsing stuff to buy is  much easier on your  computer,” said Sreenath Unnikrishnan, a product developer  from  Singapore. “However, I do think apps are more convenient for payment. As   in your card information is normally stored and can be accessed  without having  to log in and all. I can do that on a computer too, but  it's less secure. At  least that's what I think.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/GoogleandFacebook.png" alt="Google and Facebook" class="image-inline" title="Google and Facebook" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="style24" href="https://www.google.com/policies/technologies/ads/"&gt;Google&lt;/a&gt; and &lt;a class="external-link" href="https://www.facebook.com/help/516147308587266/?helpref=hc_fnav"&gt;Facebook&lt;/a&gt; have their advertisement norms disclosed.&lt;br /&gt; &lt;br /&gt; Twitter also follows a&lt;a class="style23" href="https://support.twitter.com/articles/20170405"&gt; similar model &lt;/a&gt;using the email ids that their users have associated with their twitter  handles.&lt;br /&gt; &lt;br /&gt; “If the service is free - then as many have said  before - you are the  product, said Sunil Abraham executive director at Centre  for Internet  and Society. “Your personal information is being sold to marketers  and  advertisers. As Bruce Schneier puts it ‘surveillance is the business  model  of the Internet’".&lt;br /&gt; &lt;br /&gt; The terms and conditions are sometimes very long and  use difficult language.&lt;br /&gt; &lt;br /&gt; “Transparency and Informed Consent are principles in  most jurisdictions that have data protection law modelled on the &lt;a class="style24" href="http://ec.europa.eu/justice/data-protection/index_en.htm"&gt;EU  Data Protection Directive&lt;/a&gt;,” Abraham said.“Part of the transparency  principle is the accessibility of the language.”&lt;br /&gt; &lt;br /&gt; The user though still has an option to opt out of  the above process where their data is collected by these companies.&lt;br /&gt; Privacy policies of internet companies are legal  documents. These are  required under data protection laws. This makes them  complicated, said  Abraham. &lt;br /&gt; &lt;br /&gt; The users don’t care that their usage data is being  mined by businesses  till they have a bad experience, Abraham said.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns'&gt;https://cis-india.org/internet-governance/news/the-soft-copy-vivek-ananth-november-23-2015-shopping-on-apps-raise-privacy-and-security-concerns&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-03-21T14:56:26Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications">
    <title>Predictive Policing: What is it, How it works, and its Legal Implications</title>
    <link>https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications</link>
    <description>
        &lt;b&gt;This article reviews literature surrounding big data and predictive policing and provides an analysis of the legal implications of using predictive policing techniques in the Indian context.&lt;/b&gt;
        &lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;For the longest time, humans have been obsessed with prediction. Perhaps the most well-known oracle in history, Pythia, the infallible Oracle of Delphi was 	said to predict future events in hysterical outbursts on the seventh day of the month, inspired by the god Apollo himself. This fascination with informing 	ourselves about future events has hardly subsided in us humans. What has changed however is the methods we employ to do so. The development of Big data 	technologies for one, has seen radical applications into many parts of life as we know it, including enhancing our ability to make accurate predictions 	about the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One notable application of Big data into prediction caters to another basic need since the dawn of human civilisation, the need to protect our communities 	and cities. The word 'police' itself originates from the Greek word '&lt;i&gt;polis'&lt;/i&gt;, which means city. The melding of these two concepts prediction and 	policing has come together in the practice of Predictive policing, which is the application of computer modelling to historical crime data and metadata to 	predict future criminal activity&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt;&lt;b&gt;. &lt;/b&gt;In the subsequent sections, I will attempt an 	introduction of predictive policing and explain some of the main methods within the domain of predictive policing. Because of the disruptive nature of 	these technologies, it will also be prudent to expand on the implications predictive technologies have for justice, privacy protections and protections 	against discrimination among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In introducing the concept of predictive policing, my first step is to give a short explanation about current predictive analytics techniques, because 	these techniques are the ones which are applied into a law enforcement context as predictive policing.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What is predictive analysis&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Facilitated by the availability of big data, predictive analytics uses algorithms to recognise data patterns and predict future outcomes&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;. Predictive analytics encompasses data mining, predictive modeling, machine learning, and forecasting&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt;. Predictive analytics also relies heavily on machine learning and artificial intelligence approaches	&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;. The aim of such analysis is to identify relationships among variables that may not be immediately 	apparent using hypothesis-driven methods.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; In the mainstream media, one of the most infamous stories about the use of predictive analysis comes from USA, regarding a department store Target and their data analytics practices	&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt;. Target mined data from purchasing patterns of people who signed onto their baby registry. From this they 	were able to predict approximately when customers may be due and target advertisements accordingly. In the noted story, they were so successful that they 	predicted pregnancy before the pregnant girl's father knew she was pregnant. &lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Examples of predictive analytics&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;Predicting the success of a movie based on its online ratings&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Many universities, sometimes in partnership with other firms use predictive analytics to provide course recommendations to students, track student 	performance, personalize curriculum to individual students and foster networking between students.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;Predictive Analysis of Corporate Bond Indices Returns&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Relationship between predictive analytics and predictive policing&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The same techniques used in many of the predictive methods mentioned above find application into some predictive policing methods. However two important 	points need to be raised:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;First, predictive analytics is actually a subset of predictive policing. This is because while the steps in creating a predictive model, of defining a target variable, exposing your model to training data, selecting appropriate features and finally running predictive analysis	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt; maybe the same in a policing context, there are other methods which may be used to predict crime, but 	which do not rely on data mining. These techniques may instead use other methods, such as some of those detailed below along with data about historical 	crime to generate predictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In her article "Policing by Numbers: Big Data and the Fourth Amendment"&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt;, Joh categorises 3 main 	applications of Big data into policing. These are Predictive Policing, Domain Awareness systems and Genetic Data Banks. Genetic data banks refer to 	maintaining large databases of DNA that was collected as part of the justice system. Issues arise when the DNA collected is repurposed in order to conduct 	familial searches, instead of being used for corroborating identity. Familial searches may have disproportionate impacts on minority races. Domain Awareness systems use various computer software and other digital surveillance tools such as Geographical Information Systems	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; or more illicit ones such as Black Rooms&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt; to "help police create a software-enhanced picture of the present, using thousands of data points from multiple sources within a city"	&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt;. I believe Joh was very accurate in separating Predictive Policing from Domain Awareness systems, 	especially when it comes to analysing the implications of the various applications of Big data into policing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In such an analysis of the implications of using predictive policing methods, the issues surrounding predictive technologies often get conflated with 	larger issues about the application of big data into law enforcement. That opens the debate up to questions about overly intrusive evidence gathering and 	mass surveillance systems, which though used along with predictive technology, are not themselves predictive in nature. In this article, I aim to 	concentrate on the specific implications that arise due to predictive methods.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One important point regarding the impact of predictive policing is how the insights that predictive policing methods offer are used. There is much support 	for the idea that predictive policing does not replace policing methods, but actually augments them. The RAND report specifically cites one myth about 	predictive policing as "the computer will do everything for you&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt;". In reality police officers need to 	act on the recommendations provided by the technologies.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What is Predictive policing?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Predictive policing is the "application of analytical techniques-particularly quantitative techniques-to identify likely targets for police intervention 	and prevent crime or solve past crimes by making statistical predictions".&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; It is important to note that 	the use of data and statistics to inform policing is not new. Indeed, even twenty years ago, before the deluge of big data we have today, law enforcement 	regimes such as the New York Police Department (NYPD) were already using crime data in a major way. In order to keep track of crime trends, NYPD used the 	software CompStat&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; to map "crime statistics along with other indicators of problems, such as the 	locations of crime victims and gun arrests"&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt;. The senior officers used the information provided by CompStat to monitor trends of crimes on a daily basis and such monitoring became an instrumental way to track the performance of police agencies&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt;. CompStat has since seen application in many other jurisdictions	&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what is new is the amount of data available for collection, as well as the ease with which organisations can analyse and draw insightful results from 	that data. Specifically, new technologies allow for far more rigorous interrogation of data and wide-ranging applications, including adding greater 	accuracy to the prediction of future incidence of crime.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Predictive Policing methods&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Some methods of predictive policing involve application of known standard statistical methods, while other methods involve modifying these standard 	techniques. Predictive techniques that forecast future criminal activities can be framed around six analytic categories. They all may overlap in the sense 	that multiple techniques are used to create actual predictive policing software and in fact it is similar theories of criminology which undergird many of 	these methods, but the categorisation in such a way helps clarify the concept of predictive policing. The basis for the categorisation below comes from a RAND Corporation report entitled 'Predictive Policing: The Role of Crime Forecasting in Law Enforcement Operations'	&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;, which is a comprehensive and detailed contribution to scholarship in this nascent area.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hot spot analysis: Methods involving hot spot analysis attempt to "predict areas of increased crime risk based on historical crime data"&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt;. The premise behind such methods lies in the adage that "crime tends to be lumpy"	&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;. Hot Spot analysis seeks to map out these previous incidences of crime in order to inform potential 	future crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regression methods: A regression aims to find relationships between independent variables (factors that may influence criminal activity) and certain 	variables that one aims to predict. Hence, this method would track more variables than just crime history.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data mining techniques: Data mining attempts to recognise patterns in data and use it to make predictions about the future. One important variant in the 	various types of data mining methods used in policing are different types of algorithms that are used to mine data in different ways. These are dependent 	on the nature of the data the predictive model was trained on and will be used to interrogate in the future. Two broad categories of algorithms commonly 	used are clustering algorithms and classification algorithms:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;· Clustering algorithms "form a class of data mining approaches that seek to group data into clusters with similar attributes"	&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;. One example of clustering algorithms is spatial clustering algorithms, which use geospatial crime 	incident data to predict future hot spots for crime&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;· Classification algorithms "seek to establish rules assigning a class or label to events"&lt;a href="#_ftn27" name="_ftnref27"&gt;[27]&lt;/a&gt;. These 	algorithms use training data sets "to learn the patterns that determine the class of an observation"&lt;a href="#_ftn28" name="_ftnref28"&gt;[28]&lt;/a&gt; The patterns identified by the algorithm will be applied to future data, and where applicable, the algorithm will recognise similar patterns in the data. 	This can be used to make predictions about future criminal activity for example.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Near-repeat methods: Near-repeat methods work off the assumption that future crimes will take place close to timing and location of current crimes. Hence, 	it could be postulated that areas of high crime will experience more crime in the near future&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt;. This involves the use of a 'self-exciting' algorithm, very similar to algorithms modelling earthquake aftershocks	&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt;. The premise undergirding such methods is very similar to that of hot spot analysis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Spatiotemporal analysis&lt;b&gt;: &lt;/b&gt;Using "environmental and temporal features of the crime location"	&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; as the basis for predicting future crime. By combining the spatiotemporal features of the crime area 	with crime incident data, police could use the resultant information to predict the location and time of future crimes. Examples of factors that may be 	considered include timing of crimes, weather, distance from highways, time from payday and many more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Risk terrain analysis: Analyses other factors that are useful in predicting crimes. Examples of such factors include "the social, physical, and behavioural 	factors that make certain areas more likely to be affected by crime"&lt;a href="#_ftn32" name="_ftnref32"&gt;[32]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Various methods listed above are used, often together, to predict the where and when a crime may take place or even potential victims. The unifying thread 	which relates these methods is their dependence on historical crime data.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Examples of predictive policing:&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Most uses of predictive policing that have been studied and reviewed in scholarly work come from the USA, though I will detail one case study from 	Derbyshire, UK. Below is a collation of various methods that are a practical application of the methods raised above.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hot Spot analysis in Sacramento: In February 2011, Sacramento Police Department began using hot spot analysis along with research on optimal patrol 	time to act as a sufficient deterrent to inform how they patrol high-risk areas. This policy was aimed at preventing serious crimes by patrolling these 	predicted hot spots. In places where there was such patrolling, serious crimes reduced by a quarter with no significant increases such crimes in 	surrounding areas&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data Mining and Hot Spot Mapping in Derbyshire, UK: The Safer Derbyshire Partnership, a group of law enforcement agencies and municipal authorities 	sought to identify juvenile crime hotspots&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;. They used MapInfo software to combine "multiple discrete data sets to create detailed maps and visualisations of criminal activity, including temporal and spatial hotspots"	&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt;. This information informed law enforcement about how to optimally deploy their resources.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regression models in Pittsburgh: Researchers used reports from Pittsburgh Bureau of Police about violent crimes and "leading indicator"	&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt; crimes, crimes that were relatively minor but which could be a sign of potential future violent 	offences. The researcher ran analysis of areas with violent crimes, which were used as the dependent variable in analysing whether violent crimes in 	certain areas could be predicted by the leading indicator data. From the 93 significant violent crime areas that were studied, 19 areas were successfully 	predicted by the leading indicator data.&lt;a href="#_ftn37" name="_ftnref37"&gt;[37]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Risk terrain modelling analysis in Morris County, New Jersey: Police in Morris County, used risk terrain analysis to tackle violent crimes and 	burglaries. They considered five inputs in their model: "past burglaries, the address of individuals recently arrested for property crimes, proximity to major highways, the geographic concentration of young men and the location of apartment complexes and hotels."	&lt;a href="#_ftn38" name="_ftnref38"&gt;[38]&lt;/a&gt; The Morris County law enforcement officials linked the significant reductions in violent and property 	crime to their use of risk terrain modelling&lt;a href="#_ftn39" name="_ftnref39"&gt;[39]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Near-repeat &amp;amp; hot spot analysis used by Santa Cruz Police Department: Uses PredPol software that applies the Mohler's algorithm	&lt;a href="#_ftn40" name="_ftnref40"&gt;[40]&lt;/a&gt; to a database with five years' worth of crime data to assess the likelihood of future crime occurring 	in the geographic areas within the city. Before going on shift, officers receive information identifying 15 such areas with the highest probability of 	crime&lt;a href="#_ftn41" name="_ftnref41"&gt;[41]&lt;/a&gt;. The initiative has been cited as being very successful at reducing burglaries, and was used in 	Los Angeles and Richmond, Virginia&lt;a href="#_ftn42" name="_ftnref42"&gt;[42]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data Mining and Spatiotemporal analysis to predict future criminal activities in Chicago: Officers in Chicago Police Department made visits to 	people their software predicted were likely to be involved in violent crimes&lt;a href="#_ftn43" name="_ftnref43"&gt;[43]&lt;/a&gt;, guided by an 	algorithm-generated "Heat List"&lt;a href="#_ftn44" name="_ftnref44"&gt;[44]&lt;/a&gt;. Some of the inputs used in the predictions include some types of 	arrest records, gun ownership, social networks&lt;a href="#_ftn45" name="_ftnref45"&gt;[45]&lt;/a&gt; (police analysis of social networking is also a rising trend in predictive policing&lt;a href="#_ftn46" name="_ftnref46"&gt;[46]&lt;/a&gt;) and generally type of people you are acquainted with	&lt;a href="#_ftn47" name="_ftnref47"&gt;[47]&lt;/a&gt; among others, but the full list of the factors are not public. The list sends police officers (or 	sometimes mails letters) to peoples' homes to offer social services or deliver warnings about the consequences for offending. Based in part on the 	information provided by the algorithm, officers may provide people on the Heat List information about vocational training programs or warnings about how 	Federal Law provides harsher punishments for reoffending&lt;a href="#_ftn48" name="_ftnref48"&gt;[48]&lt;/a&gt;.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Predictive policing in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In this section, I map out some of the developments in the field of predictive policing within India. On the whole, predictive policing is still very new 	in India, with Jharkhand being the only state that appears to already have concrete plans in place to introduce predictive policing.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Jharkhand Police&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Jharkhand police began developing their IT infrastructure such as a Geographic Information System (GIS) and Server room when they received funding for 	Rs. 18.5 crore from the Ministry of Home Affairs&lt;a href="#_ftn49" name="_ftnref49"&gt;[49]&lt;/a&gt;. The Open Group on E-governance (OGE), founded as a 	collaboration between the Jharkhand Police and National Informatics Centre&lt;a href="#_ftn50" name="_ftnref50"&gt;[50]&lt;/a&gt;, is now a multi-disciplinary 	group which takes on different projects related to IT&lt;a href="#_ftn51" name="_ftnref51"&gt;[51]&lt;/a&gt;. With regards to predictive policing, some 	members of OGE began development in 2013 of data mining software which will scan online records that are digitised. The emerging crime trends "can be a 	building block in the predictive policing project that the state police want to try."&lt;a href="#_ftn52" name="_ftnref52"&gt;[52]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Jharkhand Police was also reported in 2012 to be in the final stages of forming a partnership with IIM-Ranchi&lt;a href="#_ftn53" name="_ftnref53"&gt;[53]&lt;/a&gt;. It was alleged the Jharkhand police aimed to tap into IIM's advanced business analytics skills	&lt;a href="#_ftn54" name="_ftnref54"&gt;[54]&lt;/a&gt;, skills that can be very useful in a predictive policing context. Mr Pradhan suggested that 	"predictive policing was based on intelligence-based patrol and rapid response"&lt;a href="#_ftn55" name="_ftnref55"&gt;[55]&lt;/a&gt; and that it could go a 	long way to dealing with the threat of Naxalism in Jharkhand&lt;a href="#_ftn56" name="_ftnref56"&gt;[56]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in Jharkhand, the emphasis appears to be targeted at developing a massive Domain Awareness system, collecting data and creating new ways to 	present that data to officers on the ground, instead of architecting and using predictive policing software. For example, the Jharkhand police now have in 	place "a Naxal Information System, Crime Criminal Information System (to be integrated with the CCTNS) and a GIS that supplies customised maps that are vital to operations against Maoist groups"&lt;a href="#_ftn57" name="_ftnref57"&gt;[57]&lt;/a&gt;. The Jharkhand police's "Crime Analytics Dashboard"	&lt;a href="#_ftn58" name="_ftnref58"&gt;[58]&lt;/a&gt; shows the incidence of crime according to type, location and presents it in an accessible portal, 	providing up-to-date information and undoubtedly raises the situational awareness of the officers. Arguably, the domain awareness systems that are taking 	shape in Jharkhand would pave the way for predictive policing methods to be applied in the future. These systems and hot spot maps seem to be the start of 	a new age of policing in Jharkhand.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Predictive Policing Research&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;One promising idea for predictive policing in India comes from the research conducted by Lavanya Gupta and others entitled "Predicting Crime Rates for 	Predictive Policing"&lt;a href="#_ftn59" name="_ftnref59"&gt;[59]&lt;/a&gt;, which was a submission for the Gandhian Young Technological Innovation Award. The 	research uses regression modelling to predict future crime rates. Drawing from First Information Reports (FIRs) of violent crimes (murder, rape, kidnapping 	etc.) from Chandigarh Police, the team attempted "to extrapolate annual crime rate trends developed through time series models. This approach also involves correlating past crime trends with factors that will influence the future scope of crime, in particular demographic and macro-economic variables"	&lt;a href="#_ftn60" name="_ftnref60"&gt;[60]&lt;/a&gt;. The researchers used early crime data as the training data for their model, which after some testing, 	eventually turned out to have an accuracy of around 88.2%.&lt;a href="#_ftn61" name="_ftnref61"&gt;[61]&lt;/a&gt; On the face of it, ideas like this could be 	the starting point for the introduction of predictive policing into India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rest of India's law enforcement bodies do not appear to be lagging behind. In the 44&lt;sup&gt;th&lt;/sup&gt; All India police science congress, held in 	Gandhinagar, Gujarat in March this year, one of the Themes for discussion was the "Role of Preventive Forensics and latest developments in Voice 	Identification, Tele-forensics and Cyber Forensics"&lt;a href="#_ftn62" name="_ftnref62"&gt;[62]&lt;/a&gt;.Mr A K Singh, (Additional Director General of 	Police, Administration) the chairman of the event also said in an interview that there was to be a round-table DGs (Director General of Police) held at the 	conference to discuss predictive policing&lt;a href="#_ftn63" name="_ftnref63"&gt;[63]&lt;/a&gt;. Perhaps predictive policing in India may not be that far 	away from reality.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;CCTNS and the building blocks of Predictive policing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Ministry of Home Affairs conceived of a Crime and Criminals Tracking and Network System (CCTNS) as part of national e-Governance plans. According to 	the website of the National Crime Records Bureau (NCRB), CCTNS aims to develop "a nationwide networked infrastructure for evolution of IT-enabled state-of-the-art tracking system around 'investigation of crime and detection of criminals' in real time"	&lt;a href="#_ftn64" name="_ftnref64"&gt;[64]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The plans for predictive policing seem in the works, but first steps that are needed in India across police forces involve digitizing data collection by 	the police, as well as connecting law enforcement agencies. The NCRB's website described the current possibility of exchange of information between 	neighbouring police stations, districts or states as being "next to impossible"&lt;a href="#_ftn65" name="_ftnref65"&gt;[65]&lt;/a&gt;. The aim of CCTNS is 	precisely to address this gap and integrate and connect the segregated law enforcement arms of the state in India, which would be a foundational step in 	any initiatives to apply predictive methods.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What are the implications of using predictive policing? Lessons from USA&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Despite the moves by law enforcement agencies to adopt predictive policing, one reality is that the implications of predictive policing methods are far 	from clear. This section will examine these implications on the carriage of justice and its use in law, as well as how it impacts privacy concerns for the 	individual. It frames the existing debates surrounding these issues with predictive policing, and aims to apply these principles into an Indian context.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Justice, Privacy &amp;amp; IV Amendment&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Two key concerns about how predictive policing methods may be used by law enforcement relate to how insights from predictive policing methods are acted 	upon and how courts interpret them. In the USA, this issue may finds its place under the scope of IV Amendment jurisprudence. The IV amendment states that 	all citizens are "secure from unreasonable searches and seizures of property by the government"&lt;a href="#_ftn66" name="_ftnref66"&gt;[66]&lt;/a&gt;. In 	this sense, the IV amendment forms the basis for search and surveillance law in the USA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A central aspect of the IV Amendment jurisprudence is drawn from &lt;i&gt;United States v. Katz&lt;/i&gt;. In &lt;i&gt;Katz&lt;/i&gt;, the FBI attached a microphone to the 	outside of a public phone booth to record the conversations of Charles Katz, who was making phone calls related to illegal gambling. The court ruled that 	such actions constituted a search within the auspices of the 4&lt;sup&gt;th&lt;/sup&gt; amendment. The ruling affirmed constitutional protection of all areas where 	someone has a "reasonable expectation of privacy"&lt;a href="#_ftn67" name="_ftnref67"&gt;[67]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Later cases have provided useful tests for situations where government surveillance tactics may or may not be lawful, depending on whether it violates 	one's reasonable expectation of privacy. For example, in &lt;i&gt;United States v. Knotts&lt;/i&gt;, the court held that "police use of an electronic beeper to 	follow a suspect surreptitiously did not constitute a Fourth Amendment search"&lt;a href="#_ftn68" name="_ftnref68"&gt;[68]&lt;/a&gt;. In fact, some argue 	that that the Supreme Court's reasoning in such cases suggests " any 'scientific enhancement' of the senses used by the police to watch activity falls 	outside of the Fourth Amendment's protections if the activity takes place in public"&lt;a href="#_ftn69" name="_ftnref69"&gt;[69]&lt;/a&gt;. This reasoning is 	based on the third party doctrine which holds that "if you voluntarily provide information to a third party, the IV Amendment does not preclude the 	government from accessing it without a warrant"&lt;a href="#_ftn70" name="_ftnref70"&gt;[70]&lt;/a&gt;. The clearest exposition of this reasoning was in Smith 	v. Maryland, where the presiding judges noted that "this Court consistently has held that a person has no legitimate expectation of privacy in information 	he voluntarily turns over to third parties"&lt;a href="#_ftn71" name="_ftnref71"&gt;[71]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the third party has seen some challenge in recent time. In &lt;i&gt;United States v. Jones&lt;/i&gt;, it was ruled that the government's warrantless GPS 	tracking of his vehicle 24 hours a day for 28 days violated his Fourth Amendment rights&lt;a href="#_ftn72" name="_ftnref72"&gt;[72]&lt;/a&gt;. Though the 	majority ruling was that warrantless GPS tracking constituted a search, it was in a concurring opinion written by Justice Sonya Sotomayor that such 	intrusive warrantless surveillance was said to infringe one's reasonable expectation of privacy. As Newell reflected on Sotomayor's opinion,&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Justice Sotomayor stated that the time had come for Fourth Amendment jurisprudence to discard the premise that legitimate expectations of privacy could 	only be found in situations of near or complete secrecy. Sotomayor argued that people should be able to maintain reasonable expectations of privacy in some 	information voluntarily disclosed to third parties"&lt;a href="#_ftn73" name="_ftnref73"&gt;[73]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She said that the court's current reasoning on what constitutes reasonable expectations of privacy in information disclosed to third parties, such as email 	or phone records or even purchase histories, is "ill-suited to the digital age, in which people reveal a great deal of information about themselves to 	third parties in the course of carrying out mundane tasks"&lt;a href="#_ftn74" name="_ftnref74"&gt;[74]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Predictive policing vs. Mass surveillance and Domain Awareness Systems&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;However, there is an important distinction to be drawn between these cases and evidence from predictive policing. This has to do with the difference in 	nature of the evidence collection. Arguably, from Jones and others, what we see is that use of mass surveillance and domain awareness systems, drawing from 	Joh's categorisation of domain awareness systems as being distinct from predictive policing mentioned above, could potentially encroach on one's reasonable 	expectation of privacy. However, I think that predictive policing, and the possible implications for justice associated with it, its predictive harms, are 	quite distinct from what has been heard by courts thus far.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The reason for distinct risks between predictive harms and privacy harms originating from information gathering is related to the nature of predictive 	policing technologies, and how they are used. It is highly unlikely that the evidence submitted by the State to indict an offender will be mainly 	predictive in nature. For example, would it be possible to convict an accused person solely on the premise that he was predicted to be highly likely to commit a crime, and that subsequently he did? The legal standard of proving guilt beyond a reasonable doubt	&lt;a href="#_ftn75" name="_ftnref75"&gt;[75]&lt;/a&gt; can hardly be met solely on predictive evidence for a multitude of reasons. Predictive policing 	methods could at most, be said to inform police about the risk of someone committing a crime or of crime happening at a certain location, as demonstrated 	above.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Predictive policing and Criminal Procedure&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;It may therefore pay to analyse how predictive policing may be used across the various processes within the criminal justice system. In fact, in an 	analysis of the various stages of criminal procedure, from opening an investigation to gathering evidence, followed by arrest, trial, conviction and 	sentencing, we see that as the individual gets subject to more serious incursions or sanctions by the state, it takes a higher standard of certainty about 	wrongdoing and a higher burden of proof, in order to legitimize that particular action.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, at more advanced stages of the criminal justice process such as seeking arrest warrants or trial, it is very unlikely that predictive policing on 	its own can have a tangible impact, because the nature of predictive evidence is probability based. It aims to calculate the risk of future crime occurring 	based on statistical analysis of past crime data&lt;a href="#_ftn76" name="_ftnref76"&gt;[76]&lt;/a&gt;. While extremely useful, probabilities on their own 	will not come remotely close meet the legal standards of proving 'guilt beyond reasonable doubt'. It may be at the earlier stages of the criminal justice 	process that evidence predictive policing might see more widespread application, in terms of applying for search warrants and searching suspicious people 	while on patrol.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In fact, in the law enforcement context, prediction as a concept is not new to justice. Both courts and law enforcement officials already make predictions 	about future likelihood of crimes. In the case of issuing warrants, the IV amendment makes provisions that law enforcement officials show that the potential search is based "upon probable cause"&lt;a href="#_ftn77" name="_ftnref77"&gt;[77]&lt;/a&gt; in order for a judge to grant a warrant. In	&lt;i&gt;US v. Brinegar&lt;/i&gt;, probable cause was defined as existing "where the facts and circumstances within the officers' knowledge, and of which they have reasonably trustworthy information, are sufficient in themselves to warrant a belief by a man of reasonable caution that a crime is being committed"	&lt;a href="#_ftn78" name="_ftnref78"&gt;[78]&lt;/a&gt;. Again, this legal standard seems too high for predictive evidence meet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the police also have an important role to play in preventing crimes by looking out for potential crimes while on patrol or while doing 	surveillance. When the police stop a civilian on the road to search him, reasonable suspicion must be established. This standard of reasonable suspicion 	was defined in most clearly in &lt;i&gt;Terry v. Ohio&lt;/i&gt;, which required police to "be able to point to specific and articulable facts which, taken together 	with rational inferences from those facts, reasonably warrant that intrusion"&lt;a href="#_ftn79" name="_ftnref79"&gt;[79]&lt;/a&gt;. Therefore, "reasonable 	suspicion that 'criminal activity may be afoot' is at base a prediction that the facts and circumstances warrant the reasonable prediction that a crime is 	occurring or will occur"&lt;a href="#_ftn80" name="_ftnref80"&gt;[80]&lt;/a&gt;. Despite the assertion that "there are as of yet no reported cases on 	predictive policing in the Fourth Amendment context"&lt;a href="#_ftn81" name="_ftnref81"&gt;[81]&lt;/a&gt;, examining the impact of predictive policing on the doctrine of reasonable suspicion could be very instructive in understanding the implications for justice and privacy	&lt;a href="#_ftn82" name="_ftnref82"&gt;[82]&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Predictive Policing and Reasonable Suspicion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Ferguson's insightful contribution to this area of scholarship involves the identification of existing areas where prediction already takes place in 	policing, and analogising them into a predictive policing context&lt;a href="#_ftn83" name="_ftnref83"&gt;[83]&lt;/a&gt;. These three areas are: responding to 	tips, profiling, and high crime areas (hot spots).&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Tips&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Tips are pieces of information shared with the police by members of the public. Often tips, either anonymous or from known police informants, may predict 	future actions of certain people, and require the police to act on this information. The precedent for understanding the role of tips in probable cause 	comes from &lt;i&gt;Illinois v. Gates&lt;/i&gt;&lt;a href="#_ftn84" name="_ftnref84"&gt;[84]&lt;/a&gt;. It was held that "an informant's 'veracity,' 'reliability,' and 	'basis of knowledge'-remain 'highly relevant in determining the value'"&lt;a href="#_ftn85" name="_ftnref85"&gt;[85]&lt;/a&gt; of the said tip. Anonymous tips need to be detailed, timely and individualised enough&lt;a href="#_ftn86" name="_ftnref86"&gt;[86]&lt;/a&gt; to justify reasonable suspicion	&lt;a href="#_ftn87" name="_ftnref87"&gt;[87]&lt;/a&gt;. And when the informant is known to be reliable, then his prior reliability may justify reasonable 	suspicion despite lacking a basis in knowledge&lt;a href="#_ftn88" name="_ftnref88"&gt;[88]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ferguson argues that whereas predictive policing cannot provide individualised tips, it is possible to consider reliable tips about certain areas as a 	parallel to predictive policing&lt;a href="#_ftn89" name="_ftnref89"&gt;[89]&lt;/a&gt;. And since the courts had shown a preference for reliability even in the face of a weak basis in knowledge, it is possible to see the reasonable suspicion standard change in its application&lt;a href="#_ftn90" name="_ftnref90"&gt;[90]&lt;/a&gt;. It also implies that IV protections may be different in places where crime is predicted to occur	&lt;a href="#_ftn91" name="_ftnref91"&gt;[91]&lt;/a&gt;.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Profiling&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Despite the negative connotations and controversial overtones at the mere sound of the word, profiling is already a method commonly used by law 	enforcement. For example, after a crime has been committed and general features of the suspect identified by witnesses, police often stop civilians who fit 	this description. Another example of profiling is common in combating drug trafficking&lt;a href="#_ftn92" name="_ftnref92"&gt;[92]&lt;/a&gt;, where agents 	keep track of travellers at airports to watch for suspicious behaviour. Based on their experience of common traits which distinguish drug traffickers from regular travellers (a profile), agents may search travellers if they fit the profile&lt;a href="#_ftn93" name="_ftnref93"&gt;[93]&lt;/a&gt;. In the case of	&lt;i&gt;United States v. Sokolow&lt;/i&gt;&lt;a href="#_ftn94" name="_ftnref94"&gt;[94]&lt;/a&gt;, the courts "recognized that a drug courier profile is not an irrelevant or inappropriate consideration that, taken in the totality of circumstances, can be considered in a reasonable suspicion determination"	&lt;a href="#_ftn95" name="_ftnref95"&gt;[95]&lt;/a&gt;. Similar lines of thinking could be employed in observing people exchanging small amounts of money in 	an area known for high levels of drug activity, conceiving predictive actions as a form of profile&lt;a href="#_ftn96" name="_ftnref96"&gt;[96]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is valid to consider predictive policing as a form of profiling&lt;a href="#_ftn97" name="_ftnref97"&gt;[97]&lt;/a&gt;, but Ferguson argues that the 	predictive policing context means this 'new form' of profiling could change IV analysis. The premise behind such an argument lies in the fact that a 	prediction made by some algorithm about potential high risk of crime in a certain area, could be taken in conjunction observations of ordinarily innocuous events. Read in the totality of circumstances, these two threads may justify individual reasonable suspicion	&lt;a href="#_ftn98" name="_ftnref98"&gt;[98]&lt;/a&gt;. For example, a man looking into cars at a parking lot may not by itself justify reasonable suspicion, 	but taken together with a prediction of high risk of car theft at that locality, it may well justify reasonable suspicion. It is this impact of predictive 	policing, which influences the analysis of reasonable suspicion in a totality of circumstances that may represent new implications for courts looking at IV 	amendment protections.&lt;/p&gt;
&lt;h5 style="text-align: justify; "&gt;Profiling, Predictive Policing and Discrimination&lt;/h5&gt;
&lt;p style="text-align: justify; "&gt;The above sections have already brought up the point that law enforcement agencies already utilize profiling methods in their operations. Also, as the 	sections on how predictive analytics works and on methods of predictive policing make clear, predictive policing definitely incorporates the development of 	profiles for predicting future criminal activity. Concerns about predictive models generate potentially discriminatory predictions therefore are very 	serious, and need addressing. Potential discrimination may be either overt, though far less likely, or unintended. A valuable case study of which sheds 	light on such discriminatory data mining practices can be found in US Labour law. It was shown how predictive models could be discriminatory at various stages, from conceptualising the model and training it with training data, to eventually selecting inappropriate features to search for	&lt;a href="#_ftn99" name="_ftnref99"&gt;[99]&lt;/a&gt;. It is also possible for data scientists to (intentionally or not) use proxies for identifiers like 	race, income level, health condition and religion. Barocas and Selbst argue that "the current distribution of relevant attributes-attributes that can and should be taken into consideration in apportioning opportunities fairly-are demonstrably correlated with sensitive attributes"	&lt;a href="#_ftn100" name="_ftnref100"&gt;[100]&lt;/a&gt;. Hence, what may result is unintended discrimination, as predictive models and their subjective and 	implicit biases are reflected in predicted decisions, or that the discrimination is not even accounted for in the first place. While I have not found any 	case law where courts have examined such situations in a criminal context, at the very least, law enforcement agencies need to be aware of these 	possibilities and guard against any forms of discriminatory profiling.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Ferguson argues that "the precision of the technology may in fact provide more protection for citizens in broadly defined high crime areas"	&lt;a href="#_ftn101" name="_ftnref101"&gt;[101]&lt;/a&gt;. This is because the label of a 'high-crime area' may no longer apply to large areas but instead to 	very specific areas of criminal activity. This implies that previously defined areas of high crime, like entire neighbourhoods may not be scrutinised in 	such detail. Instead, police now may be more precise in locating and policing areas of high crime, such as an individual street corner or a particular 	block of flats instead of an entire locality.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Hot Spots&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Courts have also considered the existence of notoriously 'high-crime areas as part of considering reasonable suspicion&lt;a href="#_ftn102" name="_ftnref102"&gt;[102]&lt;/a&gt;. This was seen in &lt;i&gt;Illinois v. Wardlow&lt;/i&gt; &lt;a href="#_ftn103" name="_ftnref103"&gt;[103]&lt;/a&gt;, where the "high crime nature of an area can be considered in evaluating the officer's objective 	suspicion"&lt;a href="#_ftn104" name="_ftnref104"&gt;[104]&lt;/a&gt;. Many cases have since applied this reasoning without scrutinising the predictive value 	of such a label. In fact, Ferguson asserts that such labelling has questionable evidential value&lt;a href="#_ftn105" name="_ftnref105"&gt;[105]&lt;/a&gt;. He 	uses the facts of the &lt;i&gt;Wardlow &lt;/i&gt;case itself to challenge the 'high crime area' factor. Ferguson cites the reasoning of one of the judges in the 	case:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"While the area in question-Chicago's District 11-was a low-income area known for violent crimes, how that information factored into a predictive judgment 	about a man holding a bag in the afternoon is not immediately clear."&lt;a href="#_ftn106" name="_ftnref106"&gt;[106]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Especially because "the most basic models of predictive policing rely on past crimes"&lt;a href="#_ftn107" name="_ftnref107"&gt;[107]&lt;/a&gt;, it is likely 	that the predictive policing methods like hot spot or spatiotemporal analysis and risk terrain modelling may help to gather or build data models about high 	crime areas. Furthermore, the mathematical rigour of the predictive modelling could help clarify the term 'high crime area'. As Ferguson argues, "courts may no longer need to rely on the generalized high crime area terminology when more particularized and more relevant information is available"	&lt;a href="#_ftn108" name="_ftnref108"&gt;[108]&lt;/a&gt;.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Summary&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;Ferguson synthesises four themes to which encapsulate reasonable suspicion analysis:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt; Predictive information is not enough on its own. Instead, it is "considered relevant to the totality of circumstances, but must be corroborated by 	direct police observation"&lt;a href="#_ftn109" name="_ftnref109"&gt;[109]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;The prediction must also "be particularized to a person, a profile, or a place, in a way that directly connects the suspected crime to the suspected 	person, profile, or place"&lt;a href="#_ftn110" name="_ftnref110"&gt;[110]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;It must also be detailed enough to distinguish a person or place from others not the focus of the prediction	&lt;a href="#_ftn111" name="_ftnref111"&gt;[111]&lt;/a&gt;.&lt;/li&gt;
&lt;li&gt;Finally, predicted information becomes less valuable over time. Hence it must be acted on quickly or be lost	&lt;a href="#_ftn112" name="_ftnref112"&gt;[112]&lt;/a&gt;.&lt;/li&gt;
&lt;/ol&gt;
&lt;h4 style="text-align: justify; "&gt;Conclusions from America&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;The main conclusion to draw from the analysis of the parallels between existing predictions in IV amendment law and predictive policing is that "predictive policing will impact the reasonable suspicion calculus by becoming a factor within the totality of circumstances test"&lt;a href="#_ftn113" name="_ftnref113"&gt;[113]&lt;/a&gt;. Naturally, it reaffirms the imperative for predictive techniques to collect reliable data	&lt;a href="#_ftn114" name="_ftnref114"&gt;[114]&lt;/a&gt; and analyse it transparently&lt;a href="#_ftn115" name="_ftnref115"&gt;[115]&lt;/a&gt;. Moreover, in 	order for courts to evaluate the reliability of the data and the processes used (since predictive methods become part of the reasonable suspicion 	calculus), courts need to be able to analyse the predictive process. This has implications for the how hearings may be conducted, for how legal 	adjudicators may require training and many more. Another important concern is that the model of predictive information and police corroboration or direct 	observation&lt;a href="#_ftn116" name="_ftnref116"&gt;[116]&lt;/a&gt; may mean that in areas which were predicted to have low risk of crime, the reasonable 	suspicion doctrine works against law enforcement. There may be less effort paid to patrolling these other areas as a result of predictions.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Implications for India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;While there have been no cases directly involving predictive policing methods, it would be prudent to examine the parts of Indian law which would inform 	the calculus on the lawfulness of using predictive policing methods. A useful lens to examine this might be found in the observation that prediction is not 	in itself a novel concept in justice, and is already used by courts and law enforcement in numerous circumstances.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Criminal Procedure in Non-Warrant Contexts&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The most logical way to begin analysing the legal implications of predictive policing in India may probably involve identifying parallels between American 	and Indian criminal procedure, specifically searching for instances where 'reasonable suspicion' or some analogous requirement exists for justifying police 	searches.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In non-warrant scenarios, we find conditions for officers to conduct such a warrantless search in Section 165 of the Criminal Procedure Code (Cr PC). For 	clarity purposes I have stated section 165 (1) in full:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"Whenever an officer in charge of a police station or a police officer making an investigation &lt;b&gt;has reasonable grounds&lt;/b&gt; for believing that 	anything necessary for the purposes of an investigation into any offence which he is authorised to investigate may be found in any place with the limits of 	the police station of which he is in charge, or to which he is attached, and that such thing cannot in his opinion be otherwise obtained without undue 	delay, such officer may, after recording in writing the grounds of his belief and specifying in such writing, so far as possible, the thing for which search is to be made, search, or cause search to be made, for such thing in any place within the limits of such station."	&lt;a href="#_ftn117" name="_ftnref117"&gt;[117]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, India differs from the USA in that its Cr PC allows for police to arrest individuals without a warrant as well. As observed in	&lt;i&gt;Gulab Chand Upadhyaya vs State Of U.P&lt;/i&gt;, "Section 41 Cr PC gives the power to the police to arrest without warrant in cognizable offences, in cases enumerated in that Section. One such case is of receipt of a 'reasonable complaint' or 'credible information' or 'reasonable suspicion'"	&lt;a href="#_ftn118" name="_ftnref118"&gt;[118]&lt;/a&gt; Like above, I have stated section 41 (1) and subsection (a) in full:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"41. When police may arrest without warrant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://indiankanoon.org/doc/507354/"&gt;(1)&lt;/a&gt; Any police officer may without an order from a Magistrate and without a warrant, arrest any person-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://indiankanoon.org/doc/1315149/"&gt;(a)&lt;/a&gt; who has been concerned in any cognizable offence, or against whom a	&lt;b&gt;reasonable complaint has been made, or credible information has been received, or a reasonable suspicion exists&lt;/b&gt;, of his having been so 	concerned"&lt;a href="#_ftn119" name="_ftnref119"&gt;[119]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In analysing the above sections of Indian criminal procedure from a predictive policing angle, one may find both similarities and differences between the 	proposed American approach and possible Indian approaches to interpreting or incorporating predictive policing evidence.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Similarity of 'reasonable suspicion' requirement&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;For one, the requirement for "reasonable grounds" or "reasonable suspicion" seems to be analogous to the American doctrine of reasonable suspicion. This 	suggests that the concepts used in forming reasonable suspicion, for the police to "be able to point to specific and articulable facts which, taken 	together with rational inferences from those facts, reasonably warrant that intrusion"&lt;a href="#_ftn120" name="_ftnref120"&gt;[120]&lt;/a&gt; may also be 	useful in the Indian context.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One case which sheds light on an Indian interpretation of reasonable suspicion or grounds is	&lt;i&gt;State of Punjab v. Balbir Singh&lt;a href="#_ftn121" name="_ftnref121"&gt;&lt;b&gt;[121]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;. In that case, the court observes a 	requirement for "reason to believe that such an offence under Chapter IV has been committed and, therefore, an arrest or search was necessary as 	contemplated under these provisions"&lt;a href="#_ftn122" name="_ftnref122"&gt;[122]&lt;/a&gt; in the context of Section 41 and 42 in The Narcotic Drugs and 	Psychotropic Substances Act, 1985&lt;a href="#_ftn123" name="_ftnref123"&gt;[123]&lt;/a&gt;. In examining the requirement of having "reason to believe", the court draws on &lt;i&gt;Partap Singh (Dr)&lt;/i&gt; v.	&lt;i&gt;Director of Enforcement, Foreign Exchange Regulation Act&lt;a href="#_ftn124" name="_ftnref124"&gt;&lt;b&gt;[124]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;, where the judge 	observed that "the expression 'reason to believe' is not synonymous with subjective satisfaction of the officer. The belief must be held in good faith; it 	cannot be merely a pretence….."&lt;a href="#_ftn125" name="_ftnref125"&gt;[125]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In light of this, the judge in &lt;i&gt;Balbir Singh &lt;/i&gt;remarked that "whether there was such reason to believe and whether the officer empowered acted in a bona fide manner, depends upon the facts and circumstances of the case and will have a bearing in appreciation of the evidence"	&lt;a href="#_ftn126" name="_ftnref126"&gt;[126]&lt;/a&gt;. The standard considered by the court in &lt;i&gt;Balbir Singh &lt;/i&gt;and &lt;i&gt;Partap Singh&lt;/i&gt; is 	different from the 'reasonable suspicion' or 'reasonable grounds' standard as per Section 41 and 165 of Cr PC. But I think the discussion can help to 	inform our analysis of the idea of reasonableness in law enforcement actions. Of importance was the court requirement of something more than mere 	"pretence" as well as a belief held in good faith. This could suggest that in fact the reasoning in American jurisprudence about reasonable suspicion might 	be at least somewhat similar to how Indian courts view reasonable suspicion or grounds in the context of predictive policing, and therefore how we could 	similarly conjecture that predictive evidence could form part of the reasonable suspicion calculus in India as well.&lt;/p&gt;
&lt;h4 style="text-align: justify; "&gt;Difference in judicial treatment of illegally obtained evidence - Indian lack of exclusionary rules&lt;/h4&gt;
&lt;p style="text-align: justify; "&gt;However, the apparent similarity of how police in America and India may act in non-warrant situations - guided by the idea of reasonable suspicion - is 	only veneered by linguistic parallels. Despite the existence of such conditions which govern the searches without a warrant, I believe that Indian courts 	currently may provide far less protection against unlawful use of predictive technologies. The main premise behind this argument is that Indian courts 	refuse to exclude evidence that was obtained in breaches of the conditions of sections of the Cr PC. What exists in place of evidentiary safeguards is a 	line of cases in which courts routinely admit unlawfully or illegally obtained evidence. Without protections against unlawfully gathered evidence being 	considered relevant by courts, any regulations on search or conditions to be met before a search is lawful become ineffective. Evidence may simply enter 	the courtroom through a backdoor.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the USA, this is by and large, not the case. Although there are exceptions to these rules, exclusionary rules are set out to prevent admission of 	evidence which violates the constitution&lt;a href="#_ftn127" name="_ftnref127"&gt;[127]&lt;/a&gt;. "The exclusionary rule applies to evidence gained from an unreasonable search or seizure in violation of the Fourth Amendment "&lt;a href="#_ftn128" name="_ftnref128"&gt;[128]&lt;/a&gt;. Mapp v. Ohio	&lt;a href="#_ftn129" name="_ftnref129"&gt;[129]&lt;/a&gt; set the precedent for excluding unconstitutionally gathered evidence, where the court ruled that "all evidence obtained by searches and seizures in violation of the Federal Constitution is inadmissible in a criminal trial in a state court"	&lt;a href="#_ftn130" name="_ftnref130"&gt;[130]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Any such evidence which then leads law enforcement to collect new information may also be excluded, as part of the "fruit of the poisonous tree" doctrine&lt;a href="#_ftn131" name="_ftnref131"&gt;[131]&lt;/a&gt;, established in Silverthorne Lumber Co. v. United States	&lt;a href="#_ftn132" name="_ftnref132"&gt;[132]&lt;/a&gt;. The doctrine is a metaphor which suggests that if the source of certain evidence is tainted, so is 'fruit' or derivatives from that unconstitutional evidence. One such application was in	&lt;i&gt;Beck v. Ohio&lt;a href="#_ftn133" name="_ftnref133"&gt;&lt;b&gt;[133]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;, where the courts overturned a petitioner's conviction 	because the evidence used to convict him was obtained via an unlawful arrest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However in India's context, there is very little protection against the admission and use of unlawfully gathered evidence. In fact, there are a line of 	cases which lay out the extent of consideration given to unlawfully gathered evidence - both cases that specifically deal with the rules as per the Indian 	Cr PC as well as cases from other contexts - which follow and develop this line of reasoning of allowing illegally obtained evidence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One case to pay attention to is &lt;i&gt;State of Maharastra v. Natwarlal Damodardas Soni&lt;/i&gt; - in this case, the Anti-Corruption Bureau searched the house of 	the accused after receiving certain information as a tip. The police "had powers under the Code of Criminal Procedure to search and seize this gold if they 	had reason to believe that a cognizable offence had been committed in respect thereof"&lt;a href="#_ftn134" name="_ftnref134"&gt;[134]&lt;/a&gt;. Justice 	Sarkaria, in delivering his judgement, observed that for argument's sake, even if the search was illegal, "then also, it will not affect the validity of the seizure and further investigation"&lt;a href="#_ftn135" name="_ftnref135"&gt;[135]&lt;/a&gt;. The judge drew reasoning from	&lt;i&gt;Radhakishan v. State of U.P&lt;/i&gt;&lt;a href="#_ftn136" name="_ftnref136"&gt;[136]&lt;/a&gt;. This which was a case involving a postman who had certain 	postal items that were undelivered recovered from his house. As the judge in &lt;i&gt;Radhakishan&lt;/i&gt; noted:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"So far as the alleged illegality of the search is concerned, it is sufficient to say that even assuming that the search was illegal the seizure of the 	articles is not vitiated. It may be that where the provisions of Sections 103 and 165 of the Code of Criminal Procedure, are contravened the search could 	be resisted by the person whose premises are sought to be searched. It may also be that because of the illegality of the search the court may be inclined to examine carefully the evidence regarding the seizure. But beyond these two consequences no further consequence ensues."	&lt;a href="#_ftn137" name="_ftnref137"&gt;[137]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Shyam Lal Sharma&lt;/i&gt; v. &lt;i&gt;State of M.P.&lt;a href="#_ftn138" name="_ftnref138"&gt;&lt;b&gt;[138]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; was also drawn upon, where it was held that "even if the 	search is illegal being in contravention with the requirements of Section 165 of the Criminal Procedure Code, 1898, that provision ceases to have any 	application to the subsequent steps in the investigation"&lt;a href="#_ftn139" name="_ftnref139"&gt;[139]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even in &lt;i&gt;Gulab Chand &lt;/i&gt;&lt;i&gt;Upadhyay&lt;/i&gt;, mentioned above, the presiding judge contended that even "if arrest is made, it does not require any, much 	less strong, reasons to be recorded or reported by the police. Thus so long as the information or suspicion of cognizable offence is "reasonable" or 	"credible", the police officer is not accountable for the discretion of arresting or no arresting"&lt;a href="#_ftn140" name="_ftnref140"&gt;[140]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A more complete articulation of the receptiveness of Indian courts to admit illegally gathered evidence can be seen in the aforementioned	&lt;i&gt;Balbir Singh. &lt;/i&gt;The judgement aimed to:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"dispose of one of the contentions that failure to comply with the provisions of Cr PC in respect of search and seizure even up to that stage would also 	vitiate the trial. This aspect has been considered in a number of cases and it has been held that the violation of the provisions particularly that of 	Sections 100, 102, 103 or 165 Cr PC strictly per se does not vitiate the prosecution case. If there is such violation, what the courts have to see is 	whether any prejudice was caused to the accused and in appreciating the evidence and other relevant factors, the courts should bear in mind that there was 	such a violation and from that point of view evaluate the evidence on record."&lt;a href="#_ftn141" name="_ftnref141"&gt;[141]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The judges then consulted a series of authorities on the failure to comply with provisions of the Cr PC:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;i&gt;State of Punjab&lt;/i&gt; v. &lt;i&gt;Wassan Singh&lt;/i&gt;&lt;a href="#_ftn142" name="_ftnref142"&gt;[142]&lt;/a&gt;&lt;i&gt;:&lt;/i&gt; "irregularity in a search cannot vitiate the seizure of the articles"&lt;a href="#_ftn143" name="_ftnref143"&gt;[143]&lt;/a&gt;.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Sunder Singh&lt;/i&gt; v. &lt;i&gt;State of U.P&lt;/i&gt;&lt;a href="#_ftn144" name="_ftnref144"&gt;[144]&lt;/a&gt;&lt;i&gt;:&lt;/i&gt; 'irregularity 	cannot vitiate the trial unless the accused has been prejudiced by the defect and it is also held that if reliable local witnesses are not available the 	search would not be vitiated."&lt;a href="#_ftn145" name="_ftnref145"&gt;[145]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;Matajog Dobey&lt;/i&gt; v.&lt;i&gt;H.C. Bhari&lt;/i&gt;&lt;a href="#_ftn146" name="_ftnref146"&gt;[146]&lt;/a&gt;&lt;i&gt;:&lt;/i&gt; "when the 	salutory provisions have not been complied with, it may, however, affect the weight of the evidence in support of the search or may furnish a reason for 	disbelieving the evidence produced by the prosecution unless the prosecution properly explains such circumstance which made it impossible for it to comply 	with these provisions."&lt;a href="#_ftn147" name="_ftnref147"&gt;[147]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;i&gt;R&lt;/i&gt; v. &lt;i&gt;Sang&lt;/i&gt;&lt;a href="#_ftn148" name="_ftnref148"&gt;[148]&lt;/a&gt;: "reiterated the same principle that if 	evidence was admissible it matters not how it was obtained."&lt;a href="#_ftn149" name="_ftnref149"&gt;[149]&lt;/a&gt; Lord Diplock, one of the Lords 	adjudicating the case, observed that "however much the judge may dislike the way in which a particular piece of evidence was obtained before proceedings were commenced, if it is admissible evidence probative of the accused's guilt "it is no part of his judicial function to exclude it for this reason".	&lt;a href="#_ftn150" name="_ftnref150"&gt;[150]&lt;/a&gt; As the judge in &lt;i&gt;Balbir Singh&lt;/i&gt; quoted from Lord Diplock, a judge "has no discretion to 	refuse to admit relevant admissible evidence on the ground that it was obtained by improper or unfair means. The court is not concerned with how it was 	obtained."&lt;a href="#_ftn151" name="_ftnref151"&gt;[151]&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The vast body of case law presented above provides observers with a clear image of the courts willingness to admit and consider illegally obtained 	evidence. The lack of safeguards against admission of unlawful evidence are important from the standpoint of preventing the excessive or unlawful use of 	predictive policing methods. The affronts to justice and privacy, as well as the risks of profiling, seem to become magnified when law enforcement use 	predictive methods more than just to augment their policing techniques but to replace some of them. The efficacy and expediency offered by using predictive 	policing needs to be balanced against the competing interest of ensuring rule of law and due process. In the Indian context, it seems courts sparsely 	consider this competing interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Naturally, weighing in on which approach is better depends on a multitude of criteria like context, practicality, societal norms and many more. It also 	draws on existing debates in administrative law about the role of courts, which may emphasise protecting individuals and preventing excessive state power (red light theory) or emphasise efficiency in the governing process with courts assisting the state to achieve policy objectives (green light theory)	&lt;a href="#_ftn152" name="_ftnref152"&gt;[152]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A practical response may be that India should aim to embrace both elements and balance them appropriately, although what an appropriate balance again may vary. There are some who claim that this balance already exists in India. Evidence for such a claim may come from	&lt;i&gt;R.M. Malkani v. State of Maharashtra&lt;/i&gt;&lt;a href="#_ftn153" name="_ftnref153"&gt;[153]&lt;/a&gt;, where the court considered whether an illegally tape-recorded conversation&lt;i&gt; &lt;/i&gt;could be admissible. In its reasoning, the court drew from &lt;i&gt;Kuruma, Son of Kanju v. R.&lt;/i&gt; &lt;a href="#_ftn154" name="_ftnref154"&gt;[154]&lt;/a&gt;&lt;i&gt;, &lt;/i&gt;noting that&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"&lt;/i&gt; if evidence was admissible it matters not how it was obtained. There is of course always a word of caution. It is that the Judge has a discretion to 	disallow evidence in a criminal case if the strict rules of admissibility would operate unfairly against the accused. That caution is the golden rule in 	criminal jurisprudence"&lt;a href="#_ftn155" name="_ftnref155"&gt;[155]&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this discretion exists at least principally in India, in practice the cases presented above show that judges rarely exercise that discretion to 	prevent or bar the admission of illegally obtained evidence or evidence that was obtained in a manner that infringed the provisions governing search or 	arrest in the Cr PC. Indeed, the concern is that perhaps the necessary safeguards required to keep law enforcement practices, including predictive policing 	techniques, in check would be better served by a greater focus on reconsidering the legality of unlawfully gathered evidence. If not, evidence which should 	otherwise be inadmissible may find its way into consideration by existing legal backdoors.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Risk of discriminatory predictive analysis&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Regarding the risk of discriminatory profiling, Article 15 of India's Constitution&lt;a href="#_ftn156" name="_ftnref156"&gt;[156]&lt;/a&gt; states that "the State shall not discriminate against any citizen on grounds only of religion, race, caste, sex, place of birth or any of them"	&lt;a href="#_ftn157" name="_ftnref157"&gt;[157]&lt;/a&gt;. The existence of constitutional protection for such forms of discrimination suggests that India 	will be able to guard against discriminatory predictive policing. However, as mentioned before, predictive analytics often discriminates institutionally, 	"whereby unconscious implicit biases and inertia within society's institutions account for a large part of the disparate effects observed, rather than 	intentional choices"&lt;a href="#_ftn158" name="_ftnref158"&gt;[158]&lt;/a&gt;. As in most jurisdictions, preventing these forms of discrimination are much 	harder. Especially in a jurisdiction whose courts are already receptive to allowing admission of illegally obtained evidence, the risk of discriminatory 	data mining or prejudiced algorithms being used by police becomes magnified. Because the discrimination may be unintentional, it may be even harder for 	evidence from discriminatory predictive methods to be scrutinised or when applicable, dismissed by the courts.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion for India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;One thing which is eminently clear from the analysis of possible interpretations of predictive evidence is that Indian Courts have had no experience with 	any predictive policing cases, because the technology itself is still at a nascent stage. There is in fact a long way to go before predictive policing will 	become used on a scale similar to that of USA for example.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But, even in places where predictive policing is used much more prominently, there is no precedent to observe how courts may view predictive policing. 	Ferguson's method of locating analogous situations to predictive policing which courts have already considered is one notable approach, but even this does 	not provide complete answer. One of his main conclusions that predictive policing will affect the reasonable suspicion calculus, or in India's case, 	contribute to 'reasonable grounds' in some ways, is perhaps the most valid one.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, what provides more cause for concern in India's context are the limited protections against use of unlawfully gathered evidence. The lack of 	'exclusionary rules' unlike those present in the US amplifies the various risks of predictive policing because individuals have little means of redress in 	such situations where predictive policing may be used unjustly against them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Yet, the promise of predictive policing remains undeniably attractive for India. The successes predictive policing methods seem to have had In the US and 	UK coupled with the more efficient allocation of law enforcement's resources as a consequence of adapting predictive policing evidence this point. The 	government recognises this and seems to be laying the foundation and basic digital infrastructure required to utilize predictive policing optimally. One 	ought also to ask whether it is the even within the court's purview to decide what kind of policing methods are to be permissible through evaluating the 	nature of evidence. There is a case to be made for the legislative arm of the state to provide direction on how predictive policing is to be used in India. 	Perhaps the law must also evolve with the changes in technology, especially if courts are to scrutinise the predictive policing methods themselves.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Joh, Elizabeth E. "Policing by Numbers: Big Data and the Fourth Amendment." SSRN Scholarly Paper. Rochester, NY: Social Science Research Network, 			February 1, 2014. http://papers.ssrn.com/abstract=2403028. 			&lt;br /&gt; &lt;br /&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Tene, Omer, and Jules Polonetsky. "Big Data for All: Privacy and User Control in the Age of Analytics." Northwestern Journal of Technology and 			Intellectual Property 11, no. 5 (April 17, 2013): 239.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Datta, Rajbir Singh. "Predictive Analytics: The Use and Constitutionality of Technology in Combating Homegrown Terrorist Threats." SSRN Scholarly 			Paper. Rochester, NY: Social Science Research Network, May 1, 2013. http://papers.ssrn.com/abstract=2320160.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Johnson, Jeffrey Alan. "Ethics of Data Mining and Predictive Analytics in Higher Education." SSRN Scholarly Paper. Rochester, NY: Social Science 			Research Network, May 8, 2013. http://papers.ssrn.com/abstract=2156058.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; Duhigg, Charles. "How Companies Learn Your Secrets." The New York Times, February 16, 2012. 			http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Lijaya, A, M Pranav, P B Sarath Babu, and V R Nithin. "Predicting Movie Success Based on IMDB Data." International Journal of Data Mining 			Techniques and Applications 3 (June 2014): 365-68.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[9] Johnson, Jeffrey Alan. "Ethics of Data Mining and Predictive Analytics in Higher Education." SSRN Scholarly Paper. Rochester, NY: Social 			Science Research Network, May 8, 2013. http://papers.ssrn.com/abstract=2156058.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; Sangvinatsos, Antonios A. "Explanatory and Predictive Analysis of Corporate Bond Indices Returns." SSRN Scholarly Paper. Rochester, NY: Social 			Science Research Network, June 1, 2005. http://papers.ssrn.com/abstract=891641.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Barocas, Solon, and Andrew D. Selbst. "Big Data's Disparate Impact." SSRN Scholarly Paper. Rochester, NY: Social Science Research Network, February 			13, 2015. http://papers.ssrn.com/abstract=2477899.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; Joh, supra note 1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; US Environmental Protection Agency. "How We Use Data in the Mid-Atlantic Region." US EPA. Accessed November 6, 2015. 			http://archive.epa.gov/reg3esd1/data/web/html/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; See &lt;a href="http://web.archive.org/web/20060603014844/http:/blog.wired.com/27BStroke6/att_klein_wired.pdf"&gt;here&lt;/a&gt; for details of blackroom.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Joh, supra note 1, at pg 48.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; Perry, Walter L., Brian McInnis, Carter C. Price, Susan Smith and John S. Hollywood. Predictive Policing: The Role of Crime Forecasting in Law 			Enforcement Operations. Santa Monica, CA: RAND Corporation, 2013. http://www.rand.org/pubs/research_reports/RR233. Also available in print form.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; Ibid, at pg 2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Chan, Sewell. "Why Did Crime Fall in New York City?" City Room. Accessed November 6, 2015. 			http://cityroom.blogs.nytimes.com/2007/08/13/why-did-crime-fall-in-new-york-city/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; Bureau of Justice Assistance. "COMPSTAT: ITS ORIGINS, EVOLUTION, AND FUTURE IN LAW ENFORCEMENT AGENCIES," 2013. 			http://www.policeforum.org/assets/docs/Free_Online_Documents/Compstat/compstat%20-%20its%20origins%20evolution%20and%20future%20in%20law%20enforcement%20agencies%202013.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; 1996 internal NYPD article "Managing for Results: Building a Police Organization that Dramatically Reduces Crime, Disorder, and Fear."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Bratton, William. "Crime by the Numbers." The New York Times, February 17, 2010. http://www.nytimes.com/2010/02/17/opinion/17bratton.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; RAND CORP, supra note 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; RAND CORP, supra note 16, at pg 19.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; Joh, supra note 1, at pg 44.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; RAND CORP, supra note 16, pg 38.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; RAND CORP, supra note 16, at pg 39.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; RAND CORP, supra note 16, at pg 41.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; Data-Smart City Solutions. "Dr. George Mohler: Mathematician and Crime Fighter." Data-Smart City Solutions, May 8, 2013. 			http://datasmart.ash.harvard.edu/news/article/dr.-george-mohler-mathematician-and-crime-fighter-166.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; RAND CORP, supra note 16, at pg 44.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; Joh, supra note 1, at pg 45.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; Ouellette, Danielle. "Dispatch - A Hot Spots Experiment: Sacramento Police Department," June 2012. 			http://cops.usdoj.gov/html/dispatch/06-2012/hot-spots-and-sacramento-pd.asp.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; Pitney Bowes Business Insight. "The Safer Derbyshire Partnership." Derbyshire, 2013. 			http://www.mapinfo.com/wp-content/uploads/2013/05/safer-derbyshire-casestudy.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; Daniel B Neill, Wilpen L. Gorr. "Detecting and Preventing Emerging Epidemics of Crime," 2007.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; RAND CORP, supra note 16, at pg 33.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; Joh, supra note 1, at pg 46.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; Paul, Jeffery S, and Thomas M. Joiner. "Integration of Centralized Intelligence with Geographic Information Systems: A Countywide Initiative." 			Geography and Public Safety 3, no. 1 (October 2011): 5-7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; Mohler, supra note 30.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; Moses, B., Lyria, &amp;amp; Chan, J. (2014). Using Big Data for Legal and Law Enforcement 			&lt;br /&gt; Decisions: Testing the New Tools (SSRN Scholarly Paper No. ID 2513564). Rochester, NY: Social Science Research Network. Retrieved from 			http://papers.ssrn.com/abstract=2513564&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; Gorner, Jeremy. "Chicago Police Use Heat List as Strategy to Prevent Violence." Chicago Tribune. August 21, 2013. 			http://articles.chicagotribune.com/2013-08-21/news/ct-met-heat-list-20130821_1_chicago-police-commander-andrew-papachristos-heat-list.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; Stroud, Matt. "The Minority Report: Chicago's New Police Computer Predicts Crimes, but Is It Racist?" The Verge. Accessed November 13, 2015. 			http://www.theverge.com/2014/2/19/5419854/the-minority-report-this-computer-predicts-crime-but-is-it-racist.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; Moser, Whet. "The Small Social Networks at the Heart of Chicago Violence." Chicago Magazine, December 9, 2013. 			http://www.chicagomag.com/city-life/December-2013/The-Small-Social-Networks-at-the-Heart-of-Chicago-Violence/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; Lester, Aaron. "Police Clicking into Crimes Using New Software." Boston Globe, March 18, 2013. 			https://www.bostonglobe.com/business/2013/03/17/police-intelligence-one-click-away/DzzDbrwdiNkjNMA1159ybM/story.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; Stanley, Jay. "Chicago Police 'Heat List' Renews Old Fears About Government Flagging and Tagging." American Civil Liberties Union, February 25, 			2014. https://www.aclu.org/blog/chicago-police-heat-list-renews-old-fears-about-government-flagging-and-tagging.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; Rieke, Aaron, David Robinson, and Harlan Yu. "Civil Rights, Big Data, and Our Algorithmic Future," September 2014. 			https://bigdata.fairness.io/wp-content/uploads/2015/04/2015-04-20-Civil-Rights-Big-Data-and-Our-Algorithmic-Future-v1.2.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; Edmond, Deepu Sebastian. "Jhakhand's Digital Leap." Indian Express, September 15, 2013. 			http://www.jhpolice.gov.in/news/jhakhands-digital-leap-indian-express-15092013-18219-1379316969.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; Jharkhand Police. "Jharkhand Police IT Vision 2020 - Effective Shared Open E-Governance." 2012. http://jhpolice.gov.in/vision2020. See slide 2&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; Edmond, supra note 49.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; Edmond, supra note 49.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; Kumar, Raj. "Enter, the Future of Policing - Cops to Team up with IIM Analysts to Predict &amp;amp; Prevent Incidents." The Telegraph. August 28, 2012. 			http://www.telegraphindia.com/1120828/jsp/jharkhand/story_15905662.jsp#.VkXwxvnhDWK.&lt;/p&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; See supra note 49.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; See &lt;a href="http://dashboard.jhpolice.gov.in/"&gt;here&lt;/a&gt; for Jharkhand Police crime dashboard.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; Lavanya Gupta, and Selva Priya. "Predicting Crime Rates for Predictive Policing." Gandhian Young Technological Innovation Award, December 29, 2014. 			http://gyti.techpedia.in/project-detail/predicting-crime-rates-for-predictive-policing/3545.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; Gupta, Lavanya. "Minority Report: Minority Report." Accessed November 13, 2015. http://cmuws2014.blogspot.in/2015/01/minority-report.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; See supra note 59.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; See &lt;a href="http://bprd.nic.in/showfile.asp?lid=1224"&gt;here&lt;/a&gt; for details about 44th All India Police Science Congress.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; India, Press Trust of. "Police Science Congress in Gujarat to Have DRDO Exhibition." Business Standard India, March 10, 2015. 			http://www.business-standard.com/article/pti-stories/police-science-congress-in-gujarat-to-have-drdo-exhibition-115031001310_1.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; National Crime Records Bureau. "About Crime and Criminal Tracking Network &amp;amp; Systems - CCTNS." Accessed November 13, 2015. 			http://ncrb.gov.in/cctns.htm.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; Ibid. (See index page)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; U.S. Const. amend. IV, available &lt;a href="https://www.law.cornell.edu/constitution/fourth_amendment"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; United States v Katz, 389 U.S. 347 (1967) , see &lt;a href="https://supreme.justia.com/cases/federal/us/389/347/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; See supra note 1, at pg 60.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; See supra note 1, at pg 60.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; Villasenor, John. "What You Need to Know about the Third-Party Doctrine." The Atlantic, December 30, 2013. 			http://www.theatlantic.com/technology/archive/2013/12/what-you-need-to-know-about-the-third-party-doctrine/282721/.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; Smith v Maryland, 442 U.S. 735 (1979), see &lt;a href="https://supreme.justia.com/cases/federal/us/442/735/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; United States v Jones, 565 U.S. ___ (2012), see &lt;a href="https://supreme.justia.com/cases/federal/us/565/10-1259/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; Newell, Bryce Clayton. "Local Law Enforcement Jumps on the Big Data Bandwagon: Automated License Plate Recognition Systems, Information Privacy, 			and Access to Government Information." SSRN Scholarly Paper. Rochester, NY: Social Science Research Network, October 16, 2013. 			http://papers.ssrn.com/abstract=2341182, at pg 24.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; See supra note 72.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a href="#_ftnref75" name="_ftn75"&gt;[75]&lt;/a&gt; Dahyabhai Chhaganbhai Thakker vs State Of Gujarat, 1964 AIR 1563&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a href="#_ftnref76" name="_ftn76"&gt;[76]&lt;/a&gt; See supra note 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a href="#_ftnref77" name="_ftn77"&gt;[77]&lt;/a&gt; See supra note 66.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a href="#_ftnref78" name="_ftn78"&gt;[78]&lt;/a&gt; Brinegar v. United States, 338 U.S. 160 (1949), see &lt;a href="https://supreme.justia.com/cases/federal/us/338/160/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a href="#_ftnref79" name="_ftn79"&gt;[79]&lt;/a&gt; Terry v. Ohio, 392 U.S. 1 (1968), see &lt;a href="https://supreme.justia.com/cases/federal/us/392/1/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a href="#_ftnref80" name="_ftn80"&gt;[80]&lt;/a&gt; Ferguson, Andrew Guthrie. "Big Data and Predictive Reasonable Suspicion." SSRN Scholarly Paper. Rochester, NY: Social Science Research Network, 			April 4, 2014. http://papers.ssrn.com/abstract=2394683, at pg 287. See also supra note 79.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a href="#_ftnref81" name="_ftn81"&gt;[81]&lt;/a&gt; See supra note 80.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a href="#_ftnref82" name="_ftn82"&gt;[82]&lt;/a&gt; See supra note 80.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p&gt;&lt;a href="#_ftnref83" name="_ftn83"&gt;[83]&lt;/a&gt; See supra note 80.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a href="#_ftnref84" name="_ftn84"&gt;[84]&lt;/a&gt; See supra note 80, at pg 289.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p&gt;&lt;a href="#_ftnref85" name="_ftn85"&gt;[85]&lt;/a&gt; Illinois v. Gates, 462 U.S. 213 (1983). See &lt;a href="https://supreme.justia.com/cases/federal/us/462/213/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a href="#_ftnref86" name="_ftn86"&gt;[86]&lt;/a&gt; See Alabama v. White, 496 U.S. 325 (1990). See &lt;a href="https://supreme.justia.com/cases/federal/us/496/325/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a href="#_ftnref87" name="_ftn87"&gt;[87]&lt;/a&gt; See supra note 80, at pg 291.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a href="#_ftnref88" name="_ftn88"&gt;[88]&lt;/a&gt; See supra note 80, at pg 293.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a href="#_ftnref89" name="_ftn89"&gt;[89]&lt;/a&gt; See supra note 80, at pg 308.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a href="#_ftnref90" name="_ftn90"&gt;[90]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a href="#_ftnref91" name="_ftn91"&gt;[91]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a href="#_ftnref92" name="_ftn92"&gt;[92]&lt;/a&gt; Larissa Cespedes-Yaffar, Shayona Dhanak, and Amy Stephenson. "U.S. v. Mendenhall, U.S. v. Sokolow, and the Drug Courier Profile Evidence 			Controversy." Accessed July 6, 2015. http://courses2.cit.cornell.edu/sociallaw/student_projects/drugcourier.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a href="#_ftnref93" name="_ftn93"&gt;[93]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a href="#_ftnref94" name="_ftn94"&gt;[94]&lt;/a&gt; United States v. Sokolow, 490 U.S. 1 (1989), see &lt;a href="https://supreme.justia.com/cases/federal/us/490/1/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn95"&gt;
&lt;p&gt;&lt;a href="#_ftnref95" name="_ftn95"&gt;[95]&lt;/a&gt; See supra note 80, at pg 295.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn96"&gt;
&lt;p&gt;&lt;a href="#_ftnref96" name="_ftn96"&gt;[96]&lt;/a&gt; See supra note 80, at pg 297.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn97"&gt;
&lt;p&gt;&lt;a href="#_ftnref97" name="_ftn97"&gt;[97]&lt;/a&gt; See supra note 80, at pg 308.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn98"&gt;
&lt;p&gt;&lt;a href="#_ftnref98" name="_ftn98"&gt;[98]&lt;/a&gt; See supra note 80, at pg 310.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn99"&gt;
&lt;p&gt;&lt;a href="#_ftnref99" name="_ftn99"&gt;[99]&lt;/a&gt; See supra note 11.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn100"&gt;
&lt;p&gt;&lt;a href="#_ftnref100" name="_ftn100"&gt;[100]&lt;/a&gt; See supra note 11.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn101"&gt;
&lt;p&gt;&lt;a href="#_ftnref101" name="_ftn101"&gt;&lt;sup&gt;&lt;sup&gt;[101]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;sup&gt; &lt;/sup&gt; See supra note 80, at pg 303.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn102"&gt;
&lt;p&gt;&lt;a href="#_ftnref102" name="_ftn102"&gt;[102]&lt;/a&gt; See supra note 80, at pg 300.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn103"&gt;
&lt;p&gt;&lt;a href="#_ftnref103" name="_ftn103"&gt;[103]&lt;/a&gt; Illinois v. Wardlow, 528 U.S. 119 (2000), see &lt;a href="https://supreme.justia.com/cases/federal/us/528/119/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn104"&gt;
&lt;p&gt;&lt;a href="#_ftnref104" name="_ftn104"&gt;[104]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn105"&gt;
&lt;p&gt;&lt;a href="#_ftnref105" name="_ftn105"&gt;[105]&lt;/a&gt; See supra note 80, at pg 301.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn106"&gt;
&lt;p&gt;&lt;a href="#_ftnref106" name="_ftn106"&gt;[106]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn107"&gt;
&lt;p&gt;&lt;a href="#_ftnref107" name="_ftn107"&gt;[107]&lt;/a&gt; See supra note 1, at pg 42.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn108"&gt;
&lt;p&gt;&lt;a href="#_ftnref108" name="_ftn108"&gt;[108]&lt;/a&gt; See supra note 80, at pg 303.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn109"&gt;
&lt;p&gt;&lt;a href="#_ftnref109" name="_ftn109"&gt;[109]&lt;/a&gt; See supra note 80, at pg 303.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn110"&gt;
&lt;p&gt;&lt;a href="#_ftnref110" name="_ftn110"&gt;[110]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn111"&gt;
&lt;p&gt;&lt;a href="#_ftnref111" name="_ftn111"&gt;[111]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn112"&gt;
&lt;p&gt;&lt;a href="#_ftnref112" name="_ftn112"&gt;[112]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn113"&gt;
&lt;p&gt;&lt;a href="#_ftnref113" name="_ftn113"&gt;[113]&lt;/a&gt; See supra note 80, at pg 312.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn114"&gt;
&lt;p&gt;&lt;a href="#_ftnref114" name="_ftn114"&gt;[114]&lt;/a&gt; See supra note 80, at pg 317.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn115"&gt;
&lt;p&gt;&lt;a href="#_ftnref115" name="_ftn115"&gt;[115]&lt;/a&gt; See supra note 80, at pg 319.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn116"&gt;
&lt;p&gt;&lt;a href="#_ftnref116" name="_ftn116"&gt;[116]&lt;/a&gt; See supra note 80, at pg 321.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn117"&gt;
&lt;p&gt;&lt;a href="#_ftnref117" name="_ftn117"&gt;[117]&lt;/a&gt; Section 165 Indian Criminal Procedure Code, see &lt;a href="http://indiankanoon.org/doc/996365/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn118"&gt;
&lt;p&gt;&lt;a href="#_ftnref118" name="_ftn118"&gt;[118]&lt;/a&gt; Gulab Chand Upadhyaya vs State Of U.P, 2002 CriLJ 2907&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn119"&gt;
&lt;p&gt;&lt;a href="#_ftnref119" name="_ftn119"&gt;[119]&lt;/a&gt; Section 41 Indian Criminal Procedure Code&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn120"&gt;
&lt;p&gt;&lt;a href="#_ftnref120" name="_ftn120"&gt;[120]&lt;/a&gt; See supra note 79&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn121"&gt;
&lt;p&gt;&lt;a href="#_ftnref121" name="_ftn121"&gt;[121]&lt;/a&gt; State of Punjab v. Balbir Singh. (1994) 3 SCC 299&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn122"&gt;
&lt;p&gt;&lt;a href="#_ftnref122" name="_ftn122"&gt;[122]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn123"&gt;
&lt;p&gt;&lt;a href="#_ftnref123" name="_ftn123"&gt;[123]&lt;/a&gt; Section 41 and 42 in The Narcotic Drugs and Psychotropic Substances Act 1985, see &lt;a href="http://indiankanoon.org/doc/1727139/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn124"&gt;
&lt;p&gt;&lt;a href="#_ftnref124" name="_ftn124"&gt;[124]&lt;/a&gt; &lt;i&gt;Partap Singh (Dr)&lt;/i&gt; v. &lt;i&gt;Director of Enforcement, Foreign Exchange Regulation Act. &lt;/i&gt;(1985) 3 SCC 72 : 1985 SCC (Cri) 312 : 1985 SCC (Tax) 352 : AIR 1985 SC 989&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn125"&gt;
&lt;p&gt;&lt;a href="#_ftnref125" name="_ftn125"&gt;[125]&lt;/a&gt; Ibid, at SCC pg 77-78.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn126"&gt;
&lt;p&gt;&lt;a href="#_ftnref126" name="_ftn126"&gt;[126]&lt;/a&gt; See supra note 121, at pg 313.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn127"&gt;
&lt;p&gt;&lt;a href="#_ftnref127" name="_ftn127"&gt;[127]&lt;/a&gt; Carlson, Mr David. "Exclusionary Rule." LII / Legal Information Institute, June 10, 2009. https://www.law.cornell.edu/wex/exclusionary_rule.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn128"&gt;
&lt;p&gt;&lt;a href="#_ftnref128" name="_ftn128"&gt;[128]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn129"&gt;
&lt;p&gt;&lt;a href="#_ftnref129" name="_ftn129"&gt;[129]&lt;/a&gt; Mapp v Ohio, 367 U.S. 643 (1961), see &lt;a href="https://supreme.justia.com/cases/federal/us/367/643/case.html"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn130"&gt;
&lt;p&gt;&lt;a href="#_ftnref130" name="_ftn130"&gt;[130]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn131"&gt;
&lt;p&gt;&lt;a href="#_ftnref131" name="_ftn131"&gt;[131]&lt;/a&gt; Busby, John C. "Fruit of the Poisonous Tree." LII / Legal Information Institute, September 21, 2009. 			https://www.law.cornell.edu/wex/fruit_of_the_poisonous_tree.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn132"&gt;
&lt;p&gt;&lt;a href="#_ftnref132" name="_ftn132"&gt;[132]&lt;/a&gt; Silverthorne Lumber Co., Inc. v. United States, 251 U.S. 385 (1920), see			&lt;a href="https://supreme.justia.com/cases/federal/us/251/385/case.html"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn133"&gt;
&lt;p&gt;&lt;a href="#_ftnref133" name="_ftn133"&gt;[133]&lt;/a&gt; Beck v. Ohio, 379 U.S. 89 (1964), see &lt;a href="https://supreme.justia.com/cases/federal/us/379/89/case.html"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn134"&gt;
&lt;p&gt;&lt;a href="#_ftnref134" name="_ftn134"&gt;[134]&lt;/a&gt; State of Maharashtra v. Natwarlal Damodardas Soni, (1980) 4 SCC 669, at 673.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn135"&gt;
&lt;p&gt;&lt;a href="#_ftnref135" name="_ftn135"&gt;[135]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn136"&gt;
&lt;p&gt;&lt;a href="#_ftnref136" name="_ftn136"&gt;[136]&lt;/a&gt; Radhakishan v. State of U.P. [AIR 1963 SC 822 : 1963 Supp 1 SCR 408, 411, 412 : (1963) 1 Cri LJ 809]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn137"&gt;
&lt;p&gt;&lt;a href="#_ftnref137" name="_ftn137"&gt;[137]&lt;/a&gt; Ibid, at SCR pg 411-12.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn138"&gt;
&lt;p&gt;&lt;a href="#_ftnref138" name="_ftn138"&gt;[138]&lt;/a&gt; &lt;i&gt;Shyam Lal Sharma&lt;/i&gt; v. &lt;i&gt;State of M.P&lt;/i&gt;. (1972) 1 SCC 764 : 1974 SCC (Cri) 470 : AIR 1972 SC 886&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn139"&gt;
&lt;p&gt;&lt;a href="#_ftnref139" name="_ftn139"&gt;[139]&lt;/a&gt; See supra note 135, at page 674.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn140"&gt;
&lt;p&gt;&lt;a href="#_ftnref140" name="_ftn140"&gt;[140]&lt;/a&gt; See supra note 119, at para. 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn141"&gt;
&lt;p&gt;&lt;a href="#_ftnref141" name="_ftn141"&gt;[141]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn142"&gt;
&lt;p&gt;&lt;a href="#_ftnref142" name="_ftn142"&gt;[142]&lt;/a&gt; State of Punjab v. Wassan Singh, (1981) 2 SCC 1 : 1981 SCC (Cri) 292&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn143"&gt;
&lt;p&gt;&lt;a href="#_ftnref143" name="_ftn143"&gt;[143]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn144"&gt;
&lt;p&gt;&lt;a href="#_ftnref144" name="_ftn144"&gt;[144]&lt;/a&gt; Sunder Singh v. State of U.P, AIR 1956 SC 411 : 1956 Cri LJ 801&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn145"&gt;
&lt;p&gt;&lt;a href="#_ftnref145" name="_ftn145"&gt;[145]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn146"&gt;
&lt;p&gt;&lt;a href="#_ftnref146" name="_ftn146"&gt;[146]&lt;/a&gt; Matajog Dobey v.H.C. Bhari, AIR 1956 SC 44 : (1955) 2 SCR 925 : 1956 Cri LJ 140&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn147"&gt;
&lt;p&gt;&lt;a href="#_ftnref147" name="_ftn147"&gt;[147]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn148"&gt;
&lt;p&gt;&lt;a href="#_ftnref148" name="_ftn148"&gt;[148]&lt;/a&gt; R v. Sang, (1979) 2 All ER 1222, 1230-31&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn149"&gt;
&lt;p&gt;&lt;a href="#_ftnref149" name="_ftn149"&gt;[149]&lt;/a&gt; See supra note 121, at pg 309.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn150"&gt;
&lt;p&gt;&lt;a href="#_ftnref150" name="_ftn150"&gt;[150]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn151"&gt;
&lt;p&gt;&lt;a href="#_ftnref151" name="_ftn151"&gt;[151]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn152"&gt;
&lt;p&gt;&lt;a href="#_ftnref152" name="_ftn152"&gt;[152]&lt;/a&gt; Harlow, Carol, and Richard Rawlings. &lt;i&gt;Law and Administration&lt;/i&gt;. 3rd ed. Law in Context. Cambridge University Press, 2009.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn153"&gt;
&lt;p&gt;&lt;a href="#_ftnref153" name="_ftn153"&gt;[153]&lt;/a&gt; &lt;i&gt;R.M. Malkani v. State of Maharashtra,&lt;/i&gt; (1973) 1 SCC 471&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn154"&gt;
&lt;p&gt;&lt;a href="#_ftnref154" name="_ftn154"&gt;[154]&lt;/a&gt; Kuruma, Son of Kanju v. R., (1955) AC 197&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn155"&gt;
&lt;p&gt;&lt;a href="#_ftnref155" name="_ftn155"&gt;[155]&lt;/a&gt; See supra note 154, at 477.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn156"&gt;
&lt;p&gt;&lt;a href="#_ftnref156" name="_ftn156"&gt;[156]&lt;/a&gt; Indian Const. Art 15, see &lt;a href="http://indiankanoon.org/doc/609295/"&gt;here&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn157"&gt;
&lt;p&gt;&lt;a href="#_ftnref157" name="_ftn157"&gt;[157]&lt;/a&gt; Ibid.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn158"&gt;
&lt;p&gt;&lt;a href="#_ftnref158" name="_ftn158"&gt;[158]&lt;/a&gt; See supra note 11.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications'&gt;https://cis-india.org/internet-governance/blog/predictive-policing-what-is-it-how-it-works-and-it-legal-implications&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rohan George</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Big Data</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-11-24T16:31:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance">
    <title>Policy Brief: Oversight Mechanisms for Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/oversight-mechanisms-for-surveillance" class="internal-link"&gt;&lt;b&gt;Download the PDF &lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h2 style="text-align: justify; "&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Across jurisdictions, the need for effective and relevant oversight mechanisms (coupled with legislative safeguards) for state surveillance has been highlighted by civil society, academia, citizens and other key stakeholders.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;A key part of oversight of state surveillance is accountability of intelligence agencies. This has been recognized at the international level. Indeed, the Organization for Economic Co-operation and Development, The United Nations, the Organization for Security and Cooperation in Europe, the Parliamentary Assembly of the Council of Europe, and the Inter-Parliamentary Union have all recognized that intelligence agencies need to be subject to democratic accountability.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;Since 2013, the need for oversight has received particular attention in light of the information disclosed through the 'Snowden Revelations'. &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; Some countries such as the US, Canada, and the UK have regulatory  mechanisms for the oversight of state surveillance and the intelligence  community, while many other countries – India included - have piecemeal  oversight mechanisms in place. The existence of regulatory mechanisms  for state surveillance does not necessarily equate to effective  oversight – and piecemeal mechanisms – depending on how they are  implemented, could be more effective than comprehensive mechanisms. This  policy brief seeks to explore the purpose of oversight mechanisms for  state surveillance, different forms of mechanisms, and what makes a  mechanism effective and comprehensive. The brief also reviews different  oversight mechanisms from the US, UK, and Canada and provides  recommendations for ways in which India can strengthen its present  oversight mechanisms for state surveillance and the intelligence  community.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;What is the purpose and what are the different components of an oversight mechanism for State Surveillance?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The International Principles on the Application of Human Rights to Communication Surveillance, developed through a global consultation with civil society groups, industry, and international experts recommends that public oversight mechanisms for state surveillance should be established to ensure transparency and accountability of Communications Surveillance. To achieve this, mechanisms should have the authority to:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Access all potentially relevant information about State actions, including, where appropriate, access to secret or classified information;&lt;/li&gt;
&lt;li&gt;Assess whether the State is making legitimate use of its lawful capabilities;&lt;/li&gt;
&lt;li&gt;Evaluate whether the State has been comprehensively and accurately publishing information about the use and scope of Communications Surveillance techniques and powers in accordance with its Transparency obligations publish periodic reports and other information relevant to Communications Surveillance;&lt;/li&gt;
&lt;li&gt;Make public determinations as to the lawfulness of those actions, including the extent to which they comply with these Principles&lt;a href="#fn4" name="fr4"&gt;[4] &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;What can inform oversight mechanisms for state surveillance?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The development of effective oversight mechanisms for state surveillance can be informed by a number of factors including:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Rapidly changing technology – how can mechanisms adapt, account for, and evaluate perpetually changing intelligence capabilities?&lt;/li&gt;
&lt;li&gt;Expanding surveillance powers – how can mechanisms evaluate and rationalize the use of expanding agency powers?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Tensions around secrecy, national interest, and individual rights – how can mechanisms respect, recognize, and uphold multiple competing interests and needs including an agency's need for secrecy, the government's need to protect national security, and the citizens need to have their constitutional and fundamental rights upheld?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The structure, purpose, and goals of specific intelligence agencies and circumstances– how can mechanisms be sensitive and attuned to the structure, purpose, and functions of differing intelligence agencies and circumstances? &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;These factors lead to further questions around:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;The purpose of an oversight mechanism: Is an oversight mechanism meant to ensure effectiveness of an agency? Perform general reviews of agency performance? Supervise the actions of an agency? Hold an agency accountable for misconduct?&lt;/li&gt;
&lt;li&gt;The structure of an oversight mechanism: Is it internal? External? A combination of both? How many oversight mechanisms that agencies should be held accountable to?&lt;/li&gt;
&lt;li&gt;The functions of an oversight mechanism: Is an oversight mechanism meant to inspect? Evaluate? Investigate? Report?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The powers of an oversight mechanism: The extent of access that an oversight mechanism needs and should have to the internal workings of security agencies and law enforcement to carry out due diligence? The extent of legal backing that an oversight mechanism should have to hold agencies legally accountable.&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;What oversight mechanisms for State Surveillance exist in India?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In India the oversight 'ecosystem' for state surveillance is comprised of:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Review committee&lt;/b&gt;: Under the Indian Telegraph Act 1885 and the Rules issued thereunder (Rule 419A), a Central Review Committee that consists of the Cabinet Secretary, Secretary of Legal Affairs to the Government of India, Secretary of Department of Telecommunications to the Government of India is responsible for meeting on a bi-monthly basis and reviewing the legality of interception directions. The review committee has the power to revoke the directions and order the destruction of intercepted material.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; This review committee is also responsible for evaluating interception, monitoring, and decryption orders issued under section 69 of the Information Technology Act 2000.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; and orders for the monitoring and collection of traffic data under section 69B of the Information Technology Act 2000.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Authorizing Authorities&lt;/b&gt;: The Secretary in the Ministry of Home Affairs of the Central Government is responsible for authorizing requests for the interception, monitoring, and decryption of communications issued by central agencies.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; The Secretary in charge of the Home Department is responsible for authorizing requests for the interception, monitoring, and decryption of communications from state level agencies and law enforcement.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt; The Secretary to the Government of India in the Department of Information Technology under the Ministry of Communications and Information Technology is responsible for authorizing requests for the monitoring and collection of traffic data.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; Any officer not below the rank of Joint Secretary to the Government of India, who has been authorised by the Union Home Secretary or the State Home Secretary in this behalf, may authorize the interception of communications in case of an emergency.&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; A Commissioner of Police, District Superintendent of Police or Magistrate may issue requests for stored data to any postal or telegraph authority.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Administrative authorities&lt;/b&gt;: India does not have an oversight mechanism for intelligence agencies, but agencies do report to different authorities. For example: The Intelligence Bureau reports to the Home Minister, the Research and Anaylsis Wing is under the Cabinet Secretariat and reports to the Prime Minister, the Joint Intelligence Committee (JIC), National Technical Research Organisation (NTRO) and Aviation Research Centre (ARC) report to the National Security Adviser; and the National Security Council Secretariat under the NSA which serves the National Security Council.&lt;a href="#fn13" name="fr13"&gt;[13] &lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;It is important to note that though India has a Right to Information Act, but most of the security agencies are exempt from the purview of the Act&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; as is disclosure of any information that falls under the purview of the Official Secrets Act 1923.&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; [Note: There is no point in listing out all the exceptions given in section 8 and other sections as well. I think the point is sufficiently made when we say that security agencies are exempt from the purview of the Act.] The Official Secrets Act does not provide a definition of an 'official secret' and instead protects information: pertaining to national Security, defence of the country, affecting friendly relations with foreign states, etc.&lt;a href="#fn16" name="fr16"&gt;[16] &lt;/a&gt;Information in India is designated as classified in accordance to the Manual of Departmental Security Instruction which is circulated by the Ministry of Home Affairs. According to the Public Records Rules 1997, “classified records" means the files relating to the public records classified as top-secret, confidential and restricted in accordance with the procedure laid down in the Manual of Departmental Security Instruction circulated by the Ministry of Home affairs from time to time;”&lt;a href="#fn17" name="fr17"&gt;[17] &lt;/a&gt;Bi-annually officers evaluate and de-classify classified information and share the same with the national archives.&lt;a href="#fn18" name="fr18"&gt;[18] &lt;/a&gt;In response to questions raised in the Lok Sabha on the 5th of May 2015 regarding if the Official Secrets Act, 1923 will be reviewed, the number of classified files stored with the Government under the Act, and if the Government has any plans to declassify some of the files – the Ministry of Home Affairs clarified that a committee consisting of Secretaries of the Ministry of Home Affairs, the Department of Personnel and Training, and the Department of Legal Affairs has been established to examine the provisions of the Official Secrets Act, 1923 particularly in light of the Right to Information Act, 2005. The Ministry of Home Affairs also clarified that the classification and declassification of files is done by each Government Department as per the Manual of Departmental Security Instructions, 1994 and thus there is no 'central database of the total number of classified files'.&lt;a href="#fn19" name="fr19"&gt;[19] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How can India's oversight mechanism for state surveillance be clarified?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Though these mechanisms establish a basic framework for an oversight mechanism for state surveillance in India, there are aspects of this framework that could be clarified and there are ways in which the framework could be strengthened.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aspects of the present review committee that could be clarified:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Powers of the review committee: Beyond having the authority to declare that orders for interception, monitoring, decryption, and collection of traffic data are not within the scope of the law and order for destruction of any collected information – what powers does the review committee have? Does the committee have the power to compel agencies to produce additional or supporting evidence? Does the committee have the power to compel information from the authorizing authority?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Obligations of the review committee: The review committee is required to 'record its findings' as to whether the interception orders issued are in accordance with the law. Is there a standard set of questions/information that must be addressed by the committee when reviewing an order? Does the committee only review the content of the order or do they also review the implementation of the order? Beyond recording its findings, are there any additional reporting obligations that the review committee must fulfill?&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accountability of the review committee: Does the review committee answer to a higher authority? Do they have to submit their findings to other branches of the government – such as Parliament? Is there a mechanism to ensure that the review committee does indeed meet every two months and review all orders issued under the relevant sections of the Indian Telegraph Act 1885 and the Information Technology Act 2008?&lt;/li&gt;
&lt;/ol&gt;
&lt;h2 style="text-align: justify; "&gt;Proposed oversight mechanisms in India&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Oversight mechanisms can help with avoiding breaches of national security by ensuring efficiency and effectiveness in the functioning of security agencies. The need for the oversight of state surveillance is not new in India. In 1999 the Union Government constituted a Committee with the mandate of reviewing the events leading up to Pakistani aggression in Kargil and to recommend measures towards ensuring national security. Though the Kargil Committee was addressing surveillance from the perspective of  gathering information on external forces, there are parellels in the lessons learned for state surveillance. Among other findings, in their Report the Committee found a number of limitations in the system for collection, reporting, collation, and assessment of intelligence. The Committee also found that there was a lack of oversight for the intelligence community in India – resulting in no mechanisms for tasking the agencies, monitoring their performance and overall functioning, and evaluating the quality of the work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Committee also noted that such a mechanism is a standard feature in jurisdictions across the world. The Committee emphasized this need from an economic perspective – that without oversight – the Government and the nation has no way of evaluating whether or not they are receiving value for their money. The Committee recommended a review of the intelligence system with the objective of solving such deficiencies.&lt;a href="#fn20" name="fr20"&gt;[20] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2000 a Group of Ministers was established to review the security and intelligence apparatus of the country. In their report issued to the Prime Minister, the Group of Ministers recommended the establishment of an Intelligence Coordination Group for the purpose of providing oversight of intelligence agencies at the Central level. Specifically the Intelligence Coordination Group would be responsible for:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Allocation of resources to the intelligence agencies&lt;/li&gt;
&lt;li&gt;Consideration of annual reviews on the quality of inputs&lt;/li&gt;
&lt;li&gt;Approve the annual tasking for intelligence collection&lt;/li&gt;
&lt;li&gt;Oversee the functions of intelligence agencies&lt;/li&gt;
&lt;li&gt;Examine national estimates and forecasts&lt;a href="#fn21" name="fr21"&gt;[21] &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Past critiques of the Indian surveillance regime have included the fact that intelligence agencies do not come under the purview of any overseeing mechanism including Parliament, the Right to Information Act 2005, or the General Comptroller of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, Manish Tewari, who at the time was a Member of Parliament from Ludhiana, introduced the Private Member's Bill - “The Intelligence Services (Powers and Regulation) Bill” proposed stand alone statutory regulation of intelligence agencies. In doing so it sought to establish an oversight mechanism for intelligence agencies within and outside of India. The Bill was never introduced into Parliament.&lt;a href="#fn22" name="fr22"&gt;[22]&lt;/a&gt; Broadly, the Bill sought to establish: a National Intelligence and Security Oversight Committee which would oversee the functionings of intelligence agencies and would submit an annual report to the Prime Minister, a National Intelligence Tribunal for the purpose of investigating complaints against intelligence agencies, an Intelligence Ombudsman for overseeing and ensuring the efficient functioning of agencies, and a legislative framework regulating intelligence agencies.&lt;a href="#fn23" name="fr23"&gt;[23] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Proposed policy in India has also explored the possibility of coupling surveillance regulation and oversight with private regulation and oversight. In 2011 the Right to Privacy Bill was drafted by the Department of Personnel and Training. The Bill proposed to establish a “Central Communication Interception Review Committee” for the purposes of reviewing orders for interception issued under the Telegraph Act. The Bill also sought to establish an authorization process for surveillance undertaken by following a person, through CCTV's, or other electronic means.&lt;a href="#fn24" name="fr24"&gt;[24] &lt;/a&gt;In contrast, the 2012 Report of the Group of Experts on Privacy, which provided recommendations for a privacy framework for India, recommended that the Privacy Commissioner should exercise broad oversight functions with respect to interception/access, audio &amp;amp; video recordings, the use of personal identifiers, and the use of bodily or genetic material.&lt;a href="#fn25" name="fr25"&gt;[25] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A 2012 report by the Institute for Defence Studies and Analyses titled “A Case for Intelligence Reforms in India” highlights at least four 'gaps' in intelligence that have resulted in breaches of national security including: zero intelligence, inadequate intelligence, inaccurate intelligence, and excessive intelligence – particularly in light of additional technical inputs and open source inputs.&lt;a href="#fn26" name="fr26"&gt;[26]&lt;/a&gt; In some cases, an oversight mechanism could help in remediating some of these gaps. Returning to the 2012 IDSA Report, the Report recommends the following steps towards an oversight mechanism for Indian intelligence:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Establishing an Intelligence Coordination Group (ICG) that will exercise oversight functions for the intelligence community at the Central level. This could include overseeing functions of the agencies, quality of work, and finances. &lt;/li&gt;
&lt;li&gt;Enacting legislation defining the mandates, functions, and duties of intelligence agencies.&lt;/li&gt;
&lt;li&gt;Holding intelligence agencies accountable to the Comptroller &amp;amp; Auditor General to ensure financial accountability. &lt;/li&gt;
&lt;li&gt;Establishing a Minister for National Security &amp;amp; Intelligence for exercising administrative authority over intelligence agencies. &lt;/li&gt;
&lt;li&gt;Establishing a Parliamentary Accountability Committee for oversight of intelligence agencies through parliament. &lt;/li&gt;
&lt;li&gt;Defining the extent to which intelligence agencies can be held accountable to reply to requests pertaining to violations of privacy and other human rights issued under the Right to Information Act.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Highlighting the importance of accountable surveillance frameworks, in 2015 the external affairs ministry director general of India Santosh Jha stated at the UN General Assembly that the global community needs to "to create frameworks so that Internet surveillance practices motivated by security concerns are conducted within a truly transparent and accountable framework.”&lt;a href="#fn27" name="fr27"&gt;[27] &lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;In what ways can India's mechanisms for state surveillance be strengthened?&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Building upon the recommendations from the Kargil Committee, the Report from the Group of Ministers, the Report of the Group of Experts on Privacy, the Draft Privacy Bill 2011, and the IDSA report, ways in which the framework for oversight of state surveillance in India could be strengthened include:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li style="text-align: justify; "&gt;Oversight to enhance public understanding, debate, accountability, and democratic governance: State surveillance is unique in that it is enabled with the objective of protecting a nations security. Yet, to do so it requires citizens of a nation to trust the actions taken by intelligence agencies and to allow for possible access into their personal lives and possible activities that might infringe on their constitutional rights (such as freedom of expression) for a larger outcome of security. Because of this, oversight mechanisms for state surveillance must balance securing national security while submitting itself to some form of accountability to the public.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Independence of oversight mechanisms: Given the Indian context, it is particularly important that an oversight mechanism for surveillance powers and the intelligence community is capable of addressing and being independent from political interference. Indeed, the majority of cases regarding illegal interceptions that have reached the public sphere pertain to the surveillance of political figures and political turf wars.&lt;a href="#fn28" name="fr28"&gt;[28] &lt;/a&gt;Furthermore, though the current Review Committee established in the Indian Telegraph Act does not have a member from the Ministry of Home Affairs (the Ministry responsible for authorizing interception requests), it is unclear how independent this committee is from the authorizing Ministry. To ensure non-biased oversight, it is important that oversight mechanisms are independent.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Legislative regulation of intelligence agencies: Currently, intelligence agencies are provided surveillance powers through the Information Technology Act and the Telegraph Act, but beyond the National Intelligence Agency Act which establishes the National Intelligence Agency, there is no legal mechanism creating, regulating and overseeing intelligence agencies using these powers. In the 'surveillance ecosystem' this creates a policy vacuum, where an agency is enabled through law with a surveillance power and provided a procedure to follow, but is not held legally accountable for the effective, ethical, and legal use of the power. To ensure legal accountability of the use of surveillance techniques, it is important that intelligence are created through legislation that includes oversight provisions.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Comprehensive oversight of all intrusive measures: Currently the Review Committee established under the Telegraph Act is responsible for the evaluation of orders for the interception, monitoring, decryption, and collection of traffic data. The Review Committee is not responsible for reviewing the implementation or effectiveness of such orders and is not responsible for reviewing orders for access to stored information or other forms of electronic surveillance. This situation is a result of 1. Present oversight mechanisms not having comprehensive mandates 2. Different laws in India enabling different levels of access and not providing a harmonized oversight mechanism and 3.Indian law not formally addressing and regulating emerging surveillance technologies and techniques. To ensure effectiveness, it is important for oversight mechanisms to be comprehensive in mandate and scope.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Establishment of a tribunal or redress mechanism: India currently does not have a specified means for individuals to seek redress for unlawful surveillance or surveillance that they feel has violated their rights. Thus, individuals must take any complaint to the courts. The downsides of such a system include the fact that the judiciary might not be able to make determinations regarding the violation, the court system in India is overwhelmed and thus due process is slow, and given the sensitive nature of the topic – courts might not have the ability to immediately access relevant documentation. To ensure redress, it is important that a tribunal or a redress mechanism with appropriate powers is established to address complaints or violations pertaining to surveillance.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Annual reporting by security agencies, law enforcement, and service providers: Information regarding orders for surveillance and the implementation of the same is not disclosed by the government or by service providers in India.&lt;a href="#fn29" name="fr29"&gt;[29] &lt;/a&gt; Indeed, service providers by law are required to maintain the confidentiality of orders for the interception, monitoring, or decryption of communications and monitoring or collection of traffic data. At the minimum, an oversight mechanism should receive annual reports from security agencies, law enforcement, and service providers with respect to the surveillance undertaken. Edited versions of these Reports could be shared with Parliament and the public.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Consistent and mandatory reviews of relevant legislation: Though committees have been established to review various legislation and policy pertaining to state surveillance, the time frame for these reviews is not clearly defined by law. These reviews should take place on a consistent and publicly stated time frame. Furthermore, legislation enabling surveillance in India do not require review and assessment for relevance, adequacy, necessity, and proportionality after a certain period of time. Mandating that legislation regulating surveillance is subject to review on a consistent is important in ensuring that the provisions are relevant, proportionate, adequate, and necessary. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Transparency of classification and declassification process and centralization of de-classified records: Currently, the Ministry of Home Affairs establishes the process that government departments must follow for classifying and de-classifying information. This process is not publicly available and de-classified information is stored only with the respective department. For transparency purposes, it is important that the process for classification of records be made public and the practice of classification of information  take place in exceptional cases. Furthermore, de-classified records should be stored centrally and made easily accessible to the public. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Executive and administrative orders regarding establishing of agencies and surveillance projects should be in the public domain: Intelligence agencies and surveillance projects in India are typically enabled through executive orders. For example, NATGRID was established via an executive order, but this order is not publicly available. As a form of transparency and accountability to the public, it is important that if executive orders establish an agency or  a surveillance project, these are made available to the public to the extent possible.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Oversight of surveillance should incorporate privacy and cyber/national security: Increasingly issues of surveillance, privacy, and cyber security are interlinked. Any move to establish an oversight mechanism for surveillance and the intelligence committee must incorporate and take into consideration privacy and cyber security. This could mean that an oversight mechanism for surveillance in India works closely with CERT-IN and a potential privacy commissioner or that the oversight mechanism contains internal expertise in these areas to ensure that they are adequately considered. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Oversight by design: Just like the concept of privacy by design promotes the ideal that principles of privacy are built into devices, processes, services, organizations, and regulation from the outset – oversight mechanisms for state surveillance should also be built in from the outset of surveillance projects and enabling legislation. In the past, this has not been the practice in India– the National Intelligence Grid was an intelligence system that sought to link twenty one databases together – making such information easily and readily accessible to security agencies – but the oversight of such a system was never defined.&lt;a href="#fn30" name="fr30"&gt;[30]&lt;/a&gt; Similarly, the Centralized Monitoring System was conceptualized to automate and internalize the process of intercepting communications by allowing security agencies to intercept communications directly and bypass the service provider.&lt;a href="#fn31" name="fr31"&gt;[31]&lt;/a&gt; Despite amending the Telecom Licenses to provide for the technical components of this project, oversight of the project or of security agencies directly accessing information has yet to be defined.&lt;a href="#fn32" name="fr32"&gt;[32] &lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Examples of oversight mechanisms for State Surveillance: US, UK, Canada and United States&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;United States&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In the United States the oversight 'ecosystem' for state surveillance is made up of:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Foreign Intelligence Surveillance Court&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The U.S Foreign Intelligence Surveillance Court (FISA) is the predominant oversight mechanism for state surveillance and oversees and authorizes the actions of the Federal Bureau of Investigation and the National Security Agency.&lt;a href="#fn33" name="fr33"&gt;[33]&lt;/a&gt; The court was established by the enactment of the Foreign Intelligence Surveillance Act 1978 and is governed by Rules of Procedure, the current Rules being formulated in 2010.&lt;a href="#fn34" name="fr34"&gt;[34] &lt;/a&gt;The Court is empowered to ensure compliance with the orders that it issues and the government is obligated to inform the Court if orders are breached.&lt;a href="#fn35" name="fr35"&gt;[35] &lt;/a&gt;FISA allows for individuals who receive an order from the Court to challenge the same,&lt;a href="#fn36" name="fr36"&gt;[36] &lt;/a&gt;and public filings are available on the Court's website.&lt;a href="#fn37" name="fr37"&gt;[37] &lt;/a&gt;Additionally, organizations, including the American Civil Liberties Union&lt;a href="#fn38" name="fr38"&gt;[38] &lt;/a&gt;and the Electronic Frontier Foundation, have filed motions with the Court for release of records. &lt;a href="#fn39" name="fr39"&gt;[39] &lt;/a&gt;Similarly, Google has approached the Court for the ability to publish aggregate information regarding FISA orders that the company recieves.&lt;a href="#fn40" name="fr40"&gt;[40] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Government Accountability Office &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The U.S Government Accountability Office (GAO) is an independent office that works for Congress and conducts audits, investigates, provides recommendations, and issues legal decisions and opinions with regard to federal government spending of taxpayer's money by the government and associated agencies including the Defence Department, the FBI, and Homeland Security.&lt;a href="#fn41" name="fr41"&gt;[41] &lt;/a&gt;The head of the GAO is the Comptroller General of the United States and is appointed by the President. The GAO will initiate an investigation if requested by congressional committees or subcommittees or if required under public law or committee reports. The GOA has reviewed topics relating to Homeland Security, Information Security, Justice and Law Enforcement, National Defense, and Telecommunications.&lt;a href="#fn42" name="fr42"&gt;[42] &lt;/a&gt;For example, in June 2015 the GOA completed an investigation and report on 'Foreign Terrorist Organization Process and U.S Agency Enforcement Actions” &lt;a href="#fn43" name="fr43"&gt;[43] &lt;/a&gt;and an investigation on “Cyber Security: Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies”.&lt;a href="#fn44" name="fr44"&gt;[44]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Senate Select Committee on Intelligence and the House Permanent Select Committee on Intelligence&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The U.S. Senate Select Committee on Intelligence is a standing committee of the U.S Senate with the mandate to review intelligence activities and programs and ensure that these are inline with the Constitution and other relevant laws. The Committee is also responsible for submitting to Senate appropriate proposals for legislation, and for reporting to Senate on intelligence activities and programs.&lt;a href="#fn45" name="fr45"&gt;[45] &lt;/a&gt;The House Permanent Select Committee holds similar jurisdiction. The House Permanent Select Committee is committed to secrecy and cannot disclose classified information excepted authorized to do so. Such an obligation does not exist for the Senate Select Committee on Intelligence and the committee can disclose classified information publicly on its own.&lt;a href="#fn46" name="fr46"&gt;[46]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Privacy and Civil Liberties Oversight Board&lt;/b&gt; (PCLOB)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy and Civil Liberties Oversight Board was established by the Implementing Recommendations of the 9/11 Commission Act of 2007 and is located within the executive branch.&lt;a href="#fn47" name="fr47"&gt;[47] &lt;/a&gt;The objective of the PCLOB is to ensure that the Federal Government's actions to combat terrorism are balanced against privacy and civil liberties. Towards this, the Board has the mandate to review and analyse ant-terrorism measures the executive takes and ensure that such actions are balanced with privacy and civil liberties, and to ensure that privacy and civil liberties are liberties are adequately considered in the development and implementation of anti-terrorism laws, regulations and policies.&lt;a href="#fn48" name="fr48"&gt;[48] &lt;/a&gt;The Board is responsible for developing principles to guide why, whether, when, and how the United States conducts surveillance for authorized purposes. Additionally, officers of eight federal agencies must submit reports to the PCLOB regarding the reviews that they have undertaken, the number and content of the complaints, and a summary of how each complaint was handled. In order to fulfill its mandate, the Board is authorized to access all relevant records, reports, audits, reviews, documents, papers, recommendations, and classified information. The Board may also interview and take statements from necessary personnel. The Board may request the Attorney General to subpoena on the Board's behalf individuals outside of the executive branch.&lt;a href="#fn49" name="fr49"&gt;[49]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To the extent possible, the Reports of the Board are made public. Examples of recommendations that the Board has made in the 2015 Report include: End the NSA”s bulk telephone records program, add additional privacy safeguards to the bulk telephone records program, enable the FISC to hear independent views on novel and significant matters, expand opportunities for appellate review of FISC decisions, take advantage of existing opportunities for outside legal and technical input in FISC matters, publicly release new and past FISC and DISCR decisions that involve novel legal, technical, or compliance questions, publicly report on the operation of the FISC Special Advocate Program, Permit Companies to Disclose Information about their receipt of FISA production orders and disclose more detailed statistics on surveillance, inform the PCLOB of FISA activities and provide relevant congressional reports and FISC decisions, begin to develop principles for transparency, disclose the scope of surveillance authorities affecting US Citizens.&lt;a href="#fn50" name="fr50"&gt;[50]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Wiretap Report &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Wiretap Report is an annual compilation of information provided by federal and state officials regarding applications for interception orders of wire, oral, or electronic communications, data address offenses under investigation, types and locations of interception devices, and costs and duration of authorized intercepts.&lt;a href="#fn51" name="fr51"&gt;[51] &lt;/a&gt;When submitting information for the report a judge will include the name and jurisdiction of the prosecuting official who applied for the order, the criminal offense under investigation, the type of intercept device used, the physical location of the device, and the duration of the intercept. Prosecutors provide information related to the cost of the intercept, the number of days the intercept device was in operation, the number of persons whose communications were intercepted, the number of intercepts, and the number of incriminating intercepts recorded. Results of the interception orders such as arrest, trials, convictions, and the number of motions to suppress evidence are also noted in the prosecutor reports. The Report is submitted to Congress and is legally required under Title III of the Omnibus Crime Control and Safe Streets Act of 1968. The report is issued by the Administrative Office of the United States Courts.&lt;a href="#fn52" name="fr52"&gt;[52] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;United Kingdom&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Intelligence and Security Committee (ISC) of Parliament &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intelligence Security Committee was established by the Intelligence Services Act 1994. Members are appointed by the Prime Minster and the Committee reports directly to the same. Additionally, the Committee submits annual reports to Parliament. Towards this, the Committee can take evidence from cabinet ministers, senior officials, and from the public.&lt;a href="#fn53" name="fr53"&gt;[53] &lt;/a&gt;The most recent report of the Committee is the 2015 “Report on Privacy and Security”.&lt;a href="#fn54" name="fr54"&gt;[54] &lt;/a&gt;Members of the Committee are subject to the Official Secrets Act 1989 and have access to classified material when carrying out investigations.&lt;a href="#fn55" name="fr55"&gt;[55]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Joint Intelligence Committee (JIC)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This Joint Intelligence Committee is located in the Cabinet office and is broadly responsible for overseeing national intelligence organizations and providing advice to the Cabinet on issues related to security, defense, and foreign affairs. The JIC is overseen by the Intelligence and Security Committee.&lt;a href="#fn56" name="fr56"&gt;[56]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Interception of Communications Commissioner &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Interception of Communications Commissioner is appointed by the Prime Minster under the Regulation of Investigatory Powers Act 2000 for the purpose of reviewing surveillance conducted by intelligence agencies, police forces, and other public authorities.  Specifically, the Commissioner inspects the interception of communications, the acquisition and disclosure of communications data, the interception of communications in prisons, and the unintentional electronic interception.&lt;a href="#fn57" name="fr57"&gt;[57] &lt;/a&gt;The Commissioner submits an annual report to the Prime Minister. The Reports of the Commissioner are publicly available.&lt;a href="#fn58" name="fr58"&gt;[58]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The Intelligence Services Commissioner &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Intelligence Services Commissioner is an independent body appointed by the Prime Minister that is legally empowered through the Regulation of Investigatory Powers Act (RIPA) 2000. The Commissioner provides independent oversight on the use of surveillance by UK intelligence services.&lt;a href="#fn59" name="fr59"&gt;[59] &lt;/a&gt;Specifically, the Commissioner is responsible for reviewing authorized interception orders and the actions and performance of the intelligence services.&lt;a href="#fn60" name="fr60"&gt;[60]&lt;/a&gt; The Commissioner is also responsible for providing assistance to the Investigatory Powers Tribunal, submitting annual reports to the Prime Minister on the discharge of its functions, and advising the Home Office on the need of extending the Terrorism Prevention and Investigation Measures regime.&lt;a href="#fn61" name="fr61"&gt;[61] &lt;/a&gt;Towards these the Commissioner conducts in-depth audits on the orders for interception to ensure that the surveillance is within the scope of the law, that the surveillance was necessary for a legally established reason, that the surveillance was proportionate, that the information accessed was justified by the privacy invaded, and that the surveillance authorized by the appropriate official. The Commissioner also conducts 'site visits' to ensure that orders are being implemented as per the law.&lt;a href="#fn62" name="fr62"&gt;[62] &lt;/a&gt;As a note, the Intelligence Services Commissioner does not undertake any subject that is related to the Interception of Communications Commissioner. The Commissioner has access to any information that he feels is necessary to carry out his investigations. The Reports of the Intelligence Service Commissioner are publicly available.&lt;a href="#fn63" name="fr63"&gt;[63] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Investigatory Powers Tribunal &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Investigatory Powers Tribunal is a court which investigates complaints of unlawful surveillance by public authorities or intelligence/law enforcement agencies.&lt;a href="#fn64" name="fr64"&gt;[64]&lt;/a&gt; The Tribunal was established under the Regulation of Investigatory Powers Act 2000 and has a range of oversight functions to ensure that public authorities act and agencies are in compliance with the Human Rights Act 1998.&lt;a href="#fn65" name="fr65"&gt;[65]&lt;/a&gt; The Tribunal specifically is an avenue of redress for anyone who believes that they have been a victim of unlawful surveillance under RIPA or wider human rights infringements under the Human Rights Act 1998.  The Tribunal can provide seven possible outcomes for any application including 'found in favor of complainant, no determination in favour of complainant, frivolous or vexatious, out of time, out of jurisdiction, withdrawn, or no valid complaint.&lt;a href="#fn66" name="fr66"&gt;[66] &lt;/a&gt;The Tribunal has the authority to receive and consider evidence in any form, even if inadmissible in an ordinary court.&lt;a href="#fn67" name="fr67"&gt;[67]&lt;/a&gt; Where possible, cases are available on the Tribunal's website.  Decisions by the Tribunal cannot be appealed, but can be challenged in the European Court of Human Rights.&lt;a href="#fn68" name="fr68"&gt;[68] &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Canada&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In Canada the oversight 'ecosystem' for state surveillance includes:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security Intelligence Review Committee &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Security Intelligence Review Committee is an independent body that is accountable to the Parliament of Canada and reports on the Canadian Security Intelligence Service.&lt;a href="#fn69" name="fr69"&gt;[69]&lt;/a&gt; Members of the Security Intelligence Review Committee are appointed by the Prime Minister of Canada. The committee conducts reviews on a pro-active basis and investigates complaints. Committee members have access to classified information to conduct reviews. The Committee submits an annual report to Parliament and an edited version is publicly available. The 2014 Report was titled “Lifting the Shroud of Secrecy”&lt;a href="#fn70" name="fr70"&gt;[70] &lt;/a&gt;and includes reviews of the CSIS's activities, reports on complaints and subsequent investigations, and provides recommendations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Office of the Communications Security Establishment Commissioner &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Communications Security Commissioner conducts independent reviews of Communications Security Establishment (CSE) activities to evaluate if they are within the scope of Canadian law.&lt;a href="#fn71" name="fr71"&gt;[71] &lt;/a&gt;The Commissioner submits a report to Parliament on an annual basis and has a number of powers including the power to subpoena documents and personnel.&lt;a href="#fn72" name="fr72"&gt;[72]&lt;/a&gt; If the Commissioner believes that the CSE has not complied with the law – it must report this to the Attorney General of Canada and to the Minister of National Defence. The Commissioner may also receive information from persons bound to secrecy if they deem it to be in the public interest to disclose such information.&lt;a href="#fn73" name="fr73"&gt;[73] &lt;/a&gt;The Commissioner is also responsible for verifying that the CSE does not surveil Canadians and for promoting measures to protect the privacy of Canadians.&lt;a href="#fn74" name="fr74"&gt;[74] &lt;/a&gt;When conducting a review, the Commissioner has the ability to examine records, receive briefings, interview relevant personnel, assess the veracity of information, listen to intercepted voice recordings, observe CSE operators and analysts to verify their work, examine CSI electronic tools, systems and databases to ensure compliance with the law.&lt;a href="#fn75" name="fr75"&gt;[75] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Office of the Privacy Commissioner&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Office of the Privacy Commissioner of Canada (OPC) oversees the implementation of and compliance with the Privacy Act and the Personal information and Electronic Documents Act.&lt;a href="#fn76" name="fr76"&gt;[76] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The OPC is an independent body that has the authority to investigate complaints regarding the handling of personal information by government and private companies, but can only comment on the activities of security and intelligence agencies. For example, in 2014 the OPC issued the report “Checks and Controls: Reinforcing Privacy Protection and Oversight for the Canadian Intelligence Community in an Era of Cyber Surveillance”&lt;a href="#fn77" name="fr77"&gt;[77]&lt;/a&gt; The OPC can also provide testimony to Parliament and other government bodies.&lt;a href="#fn78" name="fr78"&gt;[78] &lt;/a&gt;For example, the OPC has made appearances before the Senate Standing Committee of National Security and Defense on Bill C-51.&lt;a href="#fn79" name="fr79"&gt;[79]&lt;/a&gt; The OPC cannot conduct joint audits or investigations with other bodies.&lt;a href="#fn80" name="fr80"&gt;[80]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Annual Interception Reports&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Criminal Code of Canada, regional governments must issue annual interception reports. The reports must include number of individuals affected by interceptions, average duration of the interception, type of crimes investigated, numbers of cases brought to court, and number of individuals notified that interception had taken place.&lt;a href="#fn81" name="fr81"&gt;[81] &lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The presence of multiple and robust oversight mechanisms for state surveillance does not necessarily correlate to effective oversight. The oversight mechanisms in the UK, Canada, and the U.S have been criticised. For example, Canada . For example, the Canadian regime has been characterized as becoming weaker it has removed one of its key over sight mechanisms – the Inspector General of the Canadian Security Intelligence Service which was responsible for certifying that the Service was in compliance with law.&lt;a href="#fn82" name="fr82"&gt;[82] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other weaknesses in the Canadian regime that have been highlighted include the fact that different oversight bodies do not have the authority to share information with each other, and transparency reports do not include many new forms of surveillance.&lt;a href="#fn83" name="fr83"&gt;[83]&lt;/a&gt; Oversight mechanisms in the U.S on the other hand have been criticized as being opaque&lt;a href="#fn84" name="fr84"&gt;[84] &lt;/a&gt;or as lacking the needed political support to be effective.&lt;a href="#fn85" name="fr85"&gt;[85]&lt;/a&gt; The UK oversight mechanism has been criticized for not having judicial authorization of surveillance requests, have opaque laws, and for not having a strong right of redress for affected individuals.&lt;a href="#fn86" name="fr86"&gt;[86] &lt;/a&gt;These critiques demonstrate that there are a number of factors that must come together for an oversight mechanism to be effective. Public transparency and accountability to decision making bodies such as Parliament or Congress can ensure effectiveness of oversight mechanisms, and are steps towards providing the public with means to debate in an informed manner issues related to state surveillance and allows different bodies within the government the ability to hold the state accountable for its actions.&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt;&lt;ol style="text-align: justify; "&gt; &lt;/ol&gt; 
&lt;ul style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;.[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. For example, “Public Oversight” is one of the thirteen Necessary and  Proportionate principles on state communications surveillance developed  by civil society and academia globally, that should be incorporated by  states into communication surveillance regimes. The principles can be  accessed here: https://en.necessaryandproportionate.org/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Hans Born and Ian Leigh, “Making Intelligence Accountable. Legal Standards and Best Practice for Oversight of Intelligence Agencies.” Pg. 13. 2005. Available at: http://www.prsindia.org/theprsblog/wp-content/uploads/2010/07/making-intelligence.pdf. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. For example, this point was made in the context of the UK. For more  information see: Nick Clegg, 'Edward Snowden's revelations made it  clear: security oversight must be fit for the internet age,”. The  Guardian. March 3rd 2014. Available at: &lt;a href="http://www.theguardian.com/commentisfree/2014/mar/03/nick-clegg-snowden-security-oversight-internet-age"&gt;http://www.theguardian.com/commentisfree/2014/mar/03/nick-clegg-snowden-security-oversight-internet-age&lt;/a&gt;. Accessed: July 27, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. International Principles on the Application of Human Rights to  Communications Surveillance. Available at:  https://en.necessaryandproportionate.org/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Sub Rules (16) and (17) of Rule 419A, Indian Telegraph Rules, 1951.  Available at:http://www.dot.gov.in/sites/default/files/march2007.pdf  Note: This review committee is responsible for overseeing interception  orders issued under the Indian Telegraph Act and the Information  Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. Information Technology Procedure and Safeguards for Interception,  Monitoring, and Decryption of Information Rules 2009. Definition q.  Available at: &lt;a href="http://dispur.nic.in/itact/it-procedure-interception-monitoring-decryption-rules-2009.pdf"&gt;http://dispur.nic.in/itact/it-procedure-interception-monitoring-decryption-rules-2009.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. Information Technology (Procedure and safeguard for Monitoring and  Collecting Traffic Data or Information Rules, 2009). Definition (n).  Available at: &lt;a href="http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. This authority is responsible for authorizing interception requests  issued under the Indian Telegraph Act and the Information Technology  Act. Section 2, Indian Telegraph Act 1885 and Section 4, Information  Technology Procedure and Safeguards for Interception, Monitoring, and  Decryption of Information) Rules, 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. This authority is responsible for authorizing interception requests  issued under the Indian Telegraph Act and the Information Technology  Act. Section 2, Indian Telegraph Act 1885 and Section 4, Information  Technology Procedure and Safeguards for Interception, Monitoring, and  Decryption of Information) Rules, 2009&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;].  Definition (d) and section 3 of the Information Technology (Procedure  and safeguard for Monitoring and Collecting Traffic Data or Information  Rules, 2009). Available at: &lt;a href="http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;http://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. Rule 1, of the 419A Rules, Indian Telegraph Act 1885. Available  at:http://www.dot.gov.in/sites/default/files/march2007.pdf This  authority is responsible for authorizing interception requests issued  under the Indian Telegraph Act and the Information Technology Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. Section 92, CrPc. Available at: http://www.icf.indianrailways.gov.in/uploads/files/CrPC.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. Press Information Bureau GOI. Reconstitution of Cabinet Committees. June 19th 2014. Available at: &lt;a href="http://pib.nic.in/newsite/PrintRelease.aspx?relid=105747"&gt;http://pib.nic.in/newsite/PrintRelease.aspx?relid=105747&lt;/a&gt;. Accessed August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. Press Information Bureau, Government of India. Home minister proposes  radical restructuring of security architecture. Available at: &lt;a href="http://www.pib.nic.in/newsite/erelease.aspx?relid=56395"&gt;http://www.pib.nic.in/newsite/erelease.aspx?relid=56395&lt;/a&gt;. Accessed August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. Section 24 read with Schedule II of the Right to Information Act 2005. Available at: http://rti.gov.in/rti-act.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. Section 8 of the Right to Information Act 2005. Available at: http://rti.gov.in/rti-act.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. Abhimanyu Ghosh. “Open Government and the Right to Information”. Legal Services India. Available at: &lt;a href="http://www.legalservicesindia.com/articles/og.htm"&gt;http://www.legalservicesindia.com/articles/og.htm&lt;/a&gt;. Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. Public Record Rules 1997. Section 2. Definition c. Available at: &lt;a href="http://nationalarchives.nic.in/writereaddata/html_en_files/html/public_records97.html"&gt;http://nationalarchives.nic.in/writereaddata/html_en_files/html/public_records97.html&lt;/a&gt;. Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr19" name="fn19"&gt;19&lt;/a&gt;]. Times of India. Classified information is reviewed after 25-30 years. April 13th 2015. Available at: &lt;a href="http://timesofindia.indiatimes.com/india/Classified-information-is-reviewed-after-25-30-years/articleshow/46901878.cms"&gt;http://timesofindia.indiatimes.com/india/Classified-information-is-reviewed-after-25-30-years/articleshow/46901878.cms&lt;/a&gt;. Accessed: August 8, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr20" name="fn20"&gt;20&lt;/a&gt;]. Government of India. Ministry of Home Affairs. Lok Sabha Starred Question No 557. Available at: &lt;a href="http://mha1.nic.in/par2013/par2015-pdfs/ls-050515/557.pdf"&gt;http://mha1.nic.in/par2013/par2015-pdfs/ls-050515/557.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr21" name="fn21"&gt;21&lt;/a&gt;]. The Kargil Committee report Executive Summanry. Available at: http://fas.org/news/india/2000/25indi1.htm. Accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr22" name="fn22"&gt;22&lt;/a&gt;]. PIB Releases. Group of Ministers Report on Reforming the National Security System”. Available at: &lt;a href="http://pib.nic.in/archieve/lreleng/lyr2001/rmay2001/23052001/r2305200110.html"&gt;http://pib.nic.in/archieve/lreleng/lyr2001/rmay2001/23052001/r2305200110.html&lt;/a&gt;. Last accessed: August 6, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr23" name="fn23"&gt;23&lt;/a&gt;]. The Observer Research Foundation. “Manish Tewari introduces Bill on  Intelligence Agencies Reform. August 5th 2011. Available at: &lt;a href="http://www.observerindia.com/cms/sites/orfonline/modules/report/ReportDetail.html?cmaid=25156&amp;amp;mmacmaid=20327"&gt;http://www.observerindia.com/cms/sites/orfonline/modules/report/ReportDetail.html?cmaid=25156&amp;amp;mmacmaid=20327&lt;/a&gt;. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr24" name="fn24"&gt;24&lt;/a&gt;]. The Intelligence Services (Powers and Regulation) Bill, 2011. Available at: &lt;a href="http://www.observerindia.com/cms/export/orfonline/documents/Int_Bill.pdf"&gt;http://www.observerindia.com/cms/export/orfonline/documents/Int_Bill.pdf&lt;/a&gt;. Accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr25" name="fn25"&gt;25&lt;/a&gt;]. The Privacy Bill 2011. Available at: https://bourgeoisinspirations.files.wordpress.com/2010/03/draft_right-to-privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr26" name="fn26"&gt;26&lt;/a&gt;].  The Report of Group of Experts on Privacy. Available at: http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr27" name="fn27"&gt;27&lt;/a&gt;]. Institute for Defence Studies and Analyses. “A Case for Intelligence Reforms in India”. Available at: &lt;a href="http://www.idsa.in/book/AcaseforIntelligenceReformsinIndia.html"&gt;http://www.idsa.in/book/AcaseforIntelligenceReformsinIndia.html&lt;/a&gt;. Accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr28" name="fn28"&gt;28&lt;/a&gt;]. India Calls for Transparency in internet Surveillance. NDTV. July 3rd 2015. Available at: &lt;a href="http://gadgets.ndtv.com/internet/news/india-calls-for-transparency-in-internet-surveillance-710945"&gt;http://gadgets.ndtv.com/internet/news/india-calls-for-transparency-in-internet-surveillance-710945&lt;/a&gt;. Accessed: July 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr29" name="fn29"&gt;29&lt;/a&gt;]. Lovisha Aggarwal. “Analysis of News Items and Cases on Surveillance and  Digital Evidence in India”. Available at:  http://cis-india.org/internet-governance/blog/analysis-of-news-items-and-cases-on-surveillance-and-digital-evidence-in-india.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr30" name="fn30"&gt;30&lt;/a&gt;]. Rule 25 (4) of the Information Technology (Procedures and Safeguards for  the Interception, Monitoring, and Decryption of Information Rules)  2011. Available at:  http://dispur.nic.in/itact/it-procedure-interception-monitoring-decryption-rules-2009.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr31" name="fn31"&gt;31&lt;/a&gt;]. Ministry of Home Affairs, GOI. National Intelligence Grid. Available at: &lt;a href="http://www.davp.nic.in/WriteReadData/ADS/eng_19138_1_1314b.pdf"&gt;http://www.davp.nic.in/WriteReadData/ADS/eng_19138_1_1314b.pdf&lt;/a&gt;. Last accessed: August 6, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr32" name="fn32"&gt;32&lt;/a&gt;]. Press Information Bureau, Government of India. Centralised System to Monitor Communications Rajya Sabha. Available at: &lt;a href="http://pib.nic.in/newsite/erelease.aspx?relid=54679"&gt;http://pib.nic.in/newsite/erelease.aspx?relid=54679&lt;/a&gt;. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr33" name="fn33"&gt;33&lt;/a&gt;]. Department of Telecommunications. Amendemnt to the UAS License agreement  regarding Central Monitoring System. June 2013. Available at:  http://cis-india.org/internet-governance/blog/uas-license-agreement-amendment&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr34" name="fn34"&gt;34&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court. July 29th 2013. Available at: &lt;a href="http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf"&gt;http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf&lt;/a&gt;. Last accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court. Rules of Procedure 2010. Available at: http://www.fisc.uscourts.gov/sites/default/files/FISC%20Rules%20of%20Procedure.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr36" name="fn36"&gt;36&lt;/a&gt;]. United States Foreign Intelligence Court. Honorable Patrick J. Leahy. 2013. Available at: http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr37" name="fn37"&gt;37&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court. July 29th 2013. Available at: &lt;a href="http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf"&gt;http://www.fisc.uscourts.gov/sites/default/files/Leahy.pdf&lt;/a&gt;. Last accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr38" name="fn38"&gt;38&lt;/a&gt;]. Public Filings – U.S Foreign Intelligence Surveillance Court. Available at: http://www.fisc.uscourts.gov/public-filings&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr39" name="fn39"&gt;39&lt;/a&gt;]. ACLU. FISC Public Access Motion – ACLU Motion for Release of Court Records Interpreting Section 215 of the Patriot Act. Available at: https://www.aclu.org/legal-document/fisc-public-access-motion-aclu-motion-release-court-records-interpreting-section-215&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn40"&gt;40&lt;/a&gt;]. United States Foreign Intelligence Surveillance Court Washington DC. In Re motion for consent to disclosure of court records or, in the alternative a determination of the effect of the Court's rules on statutory access rights. Available at: https://www.eff.org/files/filenode/misc-13-01-opinion-order.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr41" name="fn41"&gt;41&lt;/a&gt;]. Google  Official Blog. Shedding some light on Foreign Intelligence Surveillance Act (FISA) requests. February 3rd 2014. Available at: http://googleblog.blogspot.in/2014/02/shedding-some-light-on-foreign.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr42" name="fn42"&gt;42&lt;/a&gt;]. U.S Government Accountability Office. Available at: http://www.gao.gov/key_issues/overview#t=1. Last accessed: August 8, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr43" name="fn43"&gt;43&lt;/a&gt;]. Report to Congressional Requesters. Combating Terrorism: Foreign Terrorist Organization Designation Proces and U.S Agency Enforcement Actions. Available at: http://www.gao.gov/assets/680/671028.pdf. Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr44" name="fn44"&gt;44&lt;/a&gt;]. United States Government Accountability Office. Cybersecurity: Recent Data Breaches Illustrate Need for Strong Controls across Federal Agencies. Available: http://www.gao.gov/assets/680/670935.pdf. Last accessed: August 6, 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr45" name="fn45"&gt;45&lt;/a&gt;]. Committee Legislation. Available at: http://ballotpedia.org/United_States_Senate_Committee_on_Intelligence_(Select)#Committee_legislation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr46" name="fn46"&gt;46&lt;/a&gt;]. Congressional Research Service. Congressional Oversight of Intelligence: Current Structure and Alternatives. May 14th 2012. Available at: https://fas.org/sgp/crs/intel/RL32525.pdf. Last Accessed: August 8, 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr40" name="fn47"&gt;47&lt;/a&gt;]. The Privacy and Civil Liberties Oversight Board: About the Board. Available at: https://www.pclob.gov/aboutus.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr48" name="fn48"&gt;48&lt;/a&gt;]. The Privacy and Civil Liberties Oversight Board: About the Board. Available at: https://www.pclob.gov/aboutus.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr49" name="fn49"&gt;49&lt;/a&gt;]. Congressional Research Service. Congressional Oversight of Intelligence: Current Structure and Alternatives. May 14th 2012. Available at: https://fas.org/sgp/crs/intel/RL32525.pdf. Last Accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr50" name="fn50"&gt;50&lt;/a&gt;]. United States Courts. Wiretap Reports. Available at: http://www.uscourts.gov/statistics-reports/analysisreports/wiretap-reports&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr51" name="fn51"&gt;51&lt;/a&gt;]. United States Courts. Wiretap Reports. Available at: http://www.uscourts.gov/statisticsreports/&lt;br /&gt;analysis-reports/wiretap-reports/faqs-wiretap-reports#faq-What-information-does-the-AO-receive-from-prosecutors?. Last Accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr52" name="fn52"&gt;52&lt;/a&gt;]. Intelligence and Security Committee of Parliament. Transcripts and Public Evidence. Available at: http://isc.independent.gov.uk/public-evidence. Last accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr53" name="fn53"&gt;53&lt;/a&gt;]. Intelligence and Security Committee of Parliament. Special Reports. Available at http://isc.independent.gov.uk/committee-reports/special-reports. Last accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr54" name="fn54"&gt;54&lt;/a&gt;]. Hugh Segal. The U.K. has legislative oversight of surveillance. Why not Canada. The Globe and Mail. June 12th 2013. Available at: http://www.theglobeandmail.com/globe-debate/uk-haslegislative-oversight-of-surveillance-why-not-canada/article12489071/. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr55" name="fn55"&gt;55&lt;/a&gt;]. The Joint Intelligence Committee home page. For more information see: https://www.gov.uk/government/organisations/national-security/groups/joint-intelligence-committee&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr56" name="fn56"&gt;56&lt;/a&gt;]. Interception of Communications Commissioner's Office. RIPA. Available at: http://www.iocco-uk.info/sections.asp?sectionID=2&amp;amp;type=top. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr57" name="fn57"&gt;57&lt;/a&gt;]. Interception of Communications Commissioner's Office. Reports. Available at: http://www.iocco-uk.info/sections.asp?sectionID=1&amp;amp;type=top. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr58" name="fn58"&gt;58&lt;/a&gt;]. The Intelligence Services Commissioner's Office Homepage. For more information see: http://intelligencecommissioner.com/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr59" name="fn59"&gt;59&lt;/a&gt;]. The Intelligence Services Commissioner's Office – The Commissioner's Statutory Functions. Available at: http://intelligencecommissioner.com/content.asp?id=4&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr60" name="fn60"&gt;60&lt;/a&gt;]. The Intelligence Services Commissioner's Office – The Commissioner's Statutory Functions. Available at: http://intelligencecommissioner.com/content.asp?id=4&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr61" name="fn61"&gt;61&lt;/a&gt;]. The Intelligence Services Commissioner's Office. What we do. Available at: http://intelligencecommissioner.com/content.asp?id=5. Last Accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr62" name="fn62"&gt;62&lt;/a&gt;]. The Intelligence Services Commissioner's Office. Intelligence Services Commissioner's Annual Reports. Available at: http://intelligencecommissioner.com/content.asp?id=19. Last&lt;br /&gt;accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr63" name="fn63"&gt;63&lt;/a&gt;]. The Investigatory Powers Tribunal Homepage. Available at: http://www.ipt-uk.com/&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr64" name="fn64"&gt;64&lt;/a&gt;]. The Investigatory Powers Tribunal – Functions – Key role. Available at: http://www.ipt-uk.com/section.aspx?pageid=1&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr65" name="fn65"&gt;65&lt;/a&gt;]. Investigatory Powers Tribunal. Functions – Decisions available to the Tribunal. Available at: http://www.ipt-uk.com/section.aspx?pageid=4. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr66" name="fn66"&gt;66&lt;/a&gt;]. Investigator Powers Tribunal. Operation - Available at: http://www.ipt-uk.com/section.aspx?pageid=7&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr67" name="fn67"&gt;67&lt;/a&gt;]. Investigatory Powers Tribunal. Operation- Differences to the ordinary court system. Available at: http://www.ipt-uk.com/section.aspx?pageid=7. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr68" name="fn68"&gt;68&lt;/a&gt;]. Security Intelligence Review Committee – Homepage. Available at: http://www.sirc-csars.gc.ca/index-eng.html&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr69" name="fn69"&gt;69&lt;/a&gt;]. SIRC Annual Report 2013-2014: Lifting the Shroud of Secrecy. Available at: http://www.sirccsars. gc.ca/anrran/2013-2014/index-eng.html. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr70" name="fn70"&gt;70&lt;/a&gt;]. The Office of the Communications Security Establishment – Homepage. Available at: http://www.ocsecbccst.gc.ca/index_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr71" name="fn71"&gt;71&lt;/a&gt;]. The Office of the Communications Security Establishment – Homepage. Available at: http://www.ocsecbccst.gc.ca/index_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr72" name="fn72"&gt;72&lt;/a&gt;]. The Office of the Communications Security Establishment – Mandate. Available at: http://www.ocsecbccst.gc.ca/mandate/index_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr73" name="fn73"&gt;73&lt;/a&gt;]. The Office of the Communications Security Establishment – Functions. Available at: http://www.ocsecbccst.gc.ca/functions/review_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr74" name="fn74"&gt;74&lt;/a&gt;]. The Office of the Communications Security Establishment – Functions. Available at: http://www.ocsecbccst.gc.ca/functions/review_e.php&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr75" name="fn75"&gt;75&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Homepage. Available at: https://www.priv.gc.ca/index_e.ASP&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr76" name="fn76"&gt;76&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Reports and Publications. Special Report to Parliament “Checks and Controls: Reinforcing Privacy Protection and Oversight for the Canadian Intelligence Community in an Era of Cyber-Surveillance. January 28th 2014. Available at: https://www.priv.gc.ca/information/srrs/201314/sr_cic_e.asp&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr77" name="fn77"&gt;77&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Available at: https://www.priv.gc.ca/index_e.asp. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr78" name="fn78"&gt;78&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Appearance before the Senate Standing Commitee National Security and Defence on Bill C-51, the Anti-Terrorism Act, 2015. Available at: https://www.priv.gc.ca/parl/2015/parl_20150423_e.asp. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr79" name="fn79"&gt;79&lt;/a&gt;]. Office of the Privacy Commissioner of Canada. Special Report to Parliament. January 8th 2014. Available at: https://www.priv.gc.ca/information/sr-rs/201314/sr_cic_e.asp. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr80" name="fn80"&gt;80&lt;/a&gt;]. Telecom Transparency Project. The Governance of Telecommunications Surveillance: How Opaque and Unaccountable Practices and Policies Threaten Canadians. Available at: http://www.telecomtransparency.org/wp-content/uploads/2015/05/Governance-of-Telecommunications-Surveillance-Final.pdf. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr81" name="fn81"&gt;81&lt;/a&gt;]. Patrick Baud. The Elimination of the Inspector General of the Canadian Security Intelligence Serive. May 2013. Ryerson University. Available at; http://www.academia.edu/4731993/The_Elimination_of_the_Inspector_General_of_the_Canadian_Security_Intelligence_Service&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr82" name="fn82"&gt;82&lt;/a&gt;]. Telecom Transparency Project. The Governance of Telecommunications Surveillance: How Opaque and Unaccountable Practices and Policies Threaten Canadians. Available at: http://www.telecomtransparency.org/wp-content/uploads/2015/05/Governance-of-Telecommunications-Surveillance-Final.pdf. Last accessed: August 6th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr83" name="fn83"&gt;83&lt;/a&gt;]. Glenn Greenwald. Fisa court oversight: a look inside a secret and empty process. The Guardian. June 19th 2013. Available at: http://www.theguardian.com/commentisfree/2013/jun/19/fisa-court-oversight-process-secrecy, Nadia Kayyali. Privacy and Civil Liberties Oversight Board to NSA: Why is Bulk Collection of Telelphone Records Still Happening? February 2105. Available at :https://www.eff.org/deeplinks/2015/02/privacy-and-civil-liberties-oversight-board-nsa-whybulk-collection-telephone. Last accessed: August 8th 2015.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr84" name="fn84"&gt;84&lt;/a&gt;]. Scott Shance. The Troubled Life of the Privacy and Civil Liberties Oversight Board. August 9th 2012. The Caucus. Available at: http://thecaucus.blogs.nytimes.com/2012/08/09/thetroubled-life-of-the-privacy-and-civil-liberties-oversight-board/?_r=0. Last accessed: August 8th 2015&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr85" name="fn85"&gt;85&lt;/a&gt;]. The Open Rights Group. Don't Spy on Us. Reforming Surveillance in the UK. September 2014. Available at: https://www.openrightsgroup.org/assets/files/pdfs/reports/DSOU_Reforming_surveillance_old.pdf&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr86" name="fn86"&gt;86&lt;/a&gt;].&lt;/p&gt;
&lt;/ul&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance'&gt;https://cis-india.org/internet-governance/blog/policy-brief-oversight-mechanisms-for-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-11-24T06:09:01Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/iso-iec-jtc-1-sc-27-working-groups-meeting-jaipur">
    <title>ISO/IEC/ JTC 1/SC 27 Working Groups Meeting, Jaipur </title>
    <link>https://cis-india.org/internet-governance/blog/iso-iec-jtc-1-sc-27-working-groups-meeting-jaipur</link>
    <description>
        &lt;b&gt;I attended this event held from October 26 to 30, 2015 in Jaipur. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Bureau of Indian Standards (BIS) in collaboration with Data Security Council of India (DSCI) hosted the global standards’ meeting – &lt;a href="https://www.dsci.in/sites/default/files/ISO-SC27-Working-Group-Meeting.pdf"&gt;ISO/IEC/ JTC 1/SC 27 Working Groups Meeting in Jaipur, Rajasthan&lt;/a&gt; at Hotel Marriott from 26th to 30th of October, 2015, followed by a half day conference on Friday, 30th October on the importance of Standards in the domain. The event witnessed experts from across the globe deliberating on forging international standards on Privacy, Security and Risk management in IoT, Cloud Computing and many other contemporary technologies, along with updating existing standards. Under &lt;a href="http://www.iso.org/iso/home/store/catalogue_tc/catalogue_tc_browse.htm?commid=45306&amp;amp;development=on"&gt;SC 27&lt;/a&gt;, 5 working groups parallely held the meetings on varied Projects and Study periods respectively. The 5 Working Groups are as follows:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;WG1: Information Security Management Systems;&lt;/li&gt;
&lt;li&gt;WG 2 :Cryptography and Security Mechanisms;&lt;/li&gt;
&lt;li&gt;WG 3 : Security Evaluation, Testing and Specification;&lt;/li&gt;
&lt;li&gt;WG 4 : Security Controls and Services; and&lt;/li&gt;
&lt;li&gt;WG 5 :Identity Management and Privacy technologies; competence of security management&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;This key set of Working Groups (WG)met in India for the first time.  Professionals discussed and debated development of standards under each working group to develop international standards to address issues regarding security, identity management and privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS had the opportunity to attend meetings under Working Group 5. This group further had parallel meetings on several topics namely:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Privacy enhancing data de-identification techniques ISO/IEC NWIP 20889 : Data de-identification techniques are important when it comes to PII to enable the exploitation of the benefits of data processing while maintaining compliance with regulatory requirements and the relevant ISO/IEC 29100 privacy principles. The selection, design, use and assessment of these techniques need to be performed appropriately in order to effectively address the risks of re-identification in a given context.  There is thus a need to classify known de-identification techniques using standardized terminology, and to describe their characteristics, including the underlying technologies, the applicability of each technique to reducing the risk of re-identification, and the usability of the de-identified data.  This is the main goal of this International Standard. Meetings were conducted to resolve comments sent by organisations across the world, review draft documents and agree on next steps.&lt;/li&gt;
&lt;li&gt;A study period on Privacy Engineering framework : This session deliberated upon contributions, terms of reference and discuss the scope for the emerging field of privacy engineering framework. The session also reviewed important terms to be included in the standard and identify possible improvements to existing privacy impact assessment and management standards. It was identified that the goal of this standard is to integrate privacy into systems as part of the systems engineering process. Another concern raised was that the framework must be consistent with Privacy framework under ISO 29100 and HL7 Privacy and security standards.&lt;/li&gt;
&lt;li&gt;A study period on user friendly online privacy notice and consent: The basic purpose of this New Work Item Proposal is to assess the viability of producing a guideline for PII Controllers on providing easy to understand notices and consent procedures to PII Principals within WG5. At the Meeting, a brief overview of the contributions received was given,along with assessment of  liaison to ISO/IEC JTC 1/SC 35 and other entities. This International Standard gives guidelines for the content and the structure of online privacy notices as well as documents asking for consent to collect and process personally identifiable information (PII) from PII principals online and is applicable to all situations where a PII controller or any other entity processing PII informs PII principals in any online context.&lt;/li&gt;
&lt;li&gt;Some of the other sessions under Working Group 5 were on Privacy Impact Assessment ISO/IEC 29134, Standardization in the area of Biometrics and Biometric information protection, Code of Practise for the protection of personally identifiable information, Study period on User friendly online privacy notice and consent, etc.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.iso.org/iso/iso_technical_committee?commid=45306"&gt;ISO/IEC/JTC 1/ SC27&lt;/a&gt; is a joint technical committee of the international standards bodies – ISO and IEC on Information Technology security techniques which conducts regular meetings across the world. JTC 1 has over 2600 published standards developed under the broad umbrella of the committee and its 20 subcommittees. Draft International Standards adopted by the joint technical committees are circulated to the national bodies for voting. Publication as an International Standard requires approval by at least 75% of the national bodies casting a vote in favour of the same. In India, the Bureau of Indian Standards (BIS) is the National Standards Body. Standards are formulated keeping in view national priorities, industrial development, technical needs, export promotion, health, safety etc. and are harmonized with ISO/IEC standards (wherever they exist) to the extent possible, in order to facilitate adoption of ISO/IEC standards by all segments of industry and business.BIS has been actively participating in the  Technical Committee  work of ISO/IEC and is currently a Participating member in 417 and 74 Technical Committees/ Subcommittees and Observer member in 248 and 79 Technical Committees/Subcommittees of ISO and IEC respectively.  BIS  holds Secretarial responsibilities of 2 Technical Committees and 6 Subcommittees of ISO.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The last meeting was held in the month of May, 2015 in Malaysia, followed by this meeting in October, 2015 Jaipur. 51 countries play an active role as the ‘Participating Members, India being one, while a few countries as observing members. As a part of these sessions, the participating countries also have rights to vote in all official ballots related to standards. The representatives of the country work on the preparation and development of the International Standards and provide feedback to their national organizations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There was an additional study group meeting on IoT to discuss comments on the previous drafts, suggest changes , review responses and identify standard gaps in SC 27.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On October 30, 2015  BIS-DSCI hosted a half day &lt;a href="https://www.dsci.in/sites/default/files/Agenda-PS.pdf"&gt;International conference on 30 October, 2015 on Cyber Security and Privacy Standards&lt;/a&gt;, comprising of keynotes and panel discussions, bringing together national and international experts to share experience and exchange views on cyber security techniques and protection of data and privacy in international standards, and their growing importance in their society.  The conference looked at various themes like the Role of standards in smart cities, Responding to the Challenges of Investigating Cyber Crimes through Standards, etc. It was emphasised that due to an increasing digital world, there is a universal agreement for the need of cyber security as the infrastructure is globally connected, the cyber threats are also distributed as they are not restricted by the geographical boundaries. Hence, the need for technical and policy solutions, along with standards was highlighted for future protection of the digital world which is now deeply embedded in life, businesses and the government. Standards will help in setting crucial infrastructure for in data security and build associated infrastructure on these lines.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The importance of standards was highlighted in context of smart cities wherein the need for standards was discussed by experts. Harmonization of regulations with standards must be looked at, by primarily creating standards which could be referred to by the regulators. Broadly, the challenges faced by smart cities are data security, privacy and digital resilience of the infrastructure. It was suggested that in the beginning, these areas must be looked at for development of standards in smart cities. Also, the ISO/IEC  has a &lt;a href="http://www.iec.ch/dyn/www/f?p=103:14:0::::FSP_ORG_ID,FSP_LANG_ID:12973,25"&gt;Working Group &lt;/a&gt;and a &lt;a href="http://www.iec.ch/dyn/www/f?p=103:85:0::::FSP_ORG_ID,FSP_LANG_ID:12710,25"&gt;Strategic Group&lt;/a&gt; focussing on Smart Cities. The risks of digitisation, network, identity management, etc. must be looked at to create the standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The next meeting has been scheduled for April 2016 in Tampa (USA).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This meeting was a good opportunity to interact with experts from various parts of the World and understand the working of ISO Meetings which are held twice/thrice every year. The Centre for Internet and Society will be continuing work and becoming involved in the standard setting process at the future Working group meetings.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/iso-iec-jtc-1-sc-27-working-groups-meeting-jaipur'&gt;https://cis-india.org/internet-governance/blog/iso-iec-jtc-1-sc-27-working-groups-meeting-jaipur&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vanya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-12-21T02:38:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
