<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 601 to 615.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll.in-march-24-2016-rajshekhar-anumeha-yadav-how-the-govt-gains-when-private-companies-use-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindustan-times-may-1-2019-aayush-rathi-and-ambika-tandon-how-privacy-fares-in-the-2019-election-manifestos"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/bloomberg-udbhav-tiwari-october-22-2016-how-long-have-banks-known-about-debit-card-fraud"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/medianama-february-18-2021-amber-sinha-data-protection-bill-consent-clause-state-function"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/holding-id-issuers-accountable-what-works"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/hillhacks-2019"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis">
    <title>Human DNA Profiling Bill 2012 Analysis</title>
    <link>https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis</link>
    <description>
        &lt;b&gt;Jeremy Gruber from the Council for Responsible Genetics, US provides an analysis of the Human DNA Profiling Bill, 2012. He says that India’s updated 2012 Human DNA Profiling Bill offers largely superficial changes from its predecessor, the Draft DNA Profiling Bill, 2007.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Indeed, where there are significant departures from prior language, they tend to raise additional privacy and human rights concerns.  Overall the current version of the Bill is littered with significant and striking human rights and privacy concerns and, if passed in its current form, would place India far outside the mainstream of both law and policy in this area.  Beyond the privacy and human rights concerns that are addressed in this analysis of the Bill, the breadth of the structural and financial costs of enacting the Bill in its current form should also be seriously considered as they would most certainly be staggeringly high.&lt;/p&gt;
&lt;h2&gt;Bill Analysis&lt;/h2&gt;
&lt;h3&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The introduction of the Bill sets out the broad policy objectives of its drafters. The most telling portion in paragraph 1 states: “[DNA analysis] makes it possible to determine whether the source of origin of one body substance is identical to that of another, and further to establish the biological relationship, if any, between two individuals, living or dead &lt;i&gt;without any doubt&lt;/i&gt;.”   (emphasis added).  It is evident that the policy animating the Bill presupposes the objective infallibility of genetic analysis. This patent mistruth underpins the policy rationale for the Bill, and as such casts a long shadow over its substantive provisions. At the very least, it tells the reader (and perhaps one day the court) to broadly interpret the Bill’s language to favor DNA analysis as the privileged solution to investigational and prosecutorial needs. This provision, and indeed the bill as a whole, ignores the occurrence of false matches, cross-contamination, laboratory error and other limitations of forensic DNA analysis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The introduction goes on to state, truthfully, that “DNA analysis offers sensitive information which, if misused can cause harm to person or society.”  However this statement does not acknowledge that DNA analysis often causes more harm when used as intended as part of  unnecessarily expansive powers given to law enforcement authorities. Indeed this is further illustrated by language showing the legislative intent to draft a broad based bill that would govern the use of DNA in a variety of civil and criminal proceedings as well as for purposes to be determined at a later point.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Definitions (Chapter II)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;A number of the Bill’s definitions are overbroad, further expanding the scope of its later provisions. The “crime scene index” is defined to include “DNA profiles from forensic material found . . . on or within the body of any person, on anything, or at any place, associated with the commission of a specified offence.” Chapter II(2)(iv)&lt;i&gt;.&lt;/i&gt; A “specified offence” is defined as any   “offence listed in Part 1of the Schedule [to the Bill].” Part 1 of the “Schedule,” on page 56 of the Bill , includes in (A) “Offences under Indian Penal Code”  without any specification.  In the 2007 version of the bill, the language related to criminal offences was incredibly expansive but specified the various crimes covered inc. rape,“offences relating to dowry,” defamation, and “unnatural offenses.” (See 2007 Bill Schedule p. 34). The current Bill version dispenses with such identified crimes and seemingly expands the Schedule to create an “all crimes” database.  The new Bill (Section B) further adds a variety of additional offences under special laws ranging from the Medical Termination of Pregnancy Act to the Motor Vehicles Act and empowers the Board to add any new law it wants to the Schedule. Section C of the Schedule identifies a wide variety of civil matters to be included in the Schedule including disputes related to paternity, pedigree, and organ transplantation.  In adds additional civil categories not contemplated by prior versions of the Bill including issues related to assisted reproductive technologies, issues related to immigration/emigration and similar to Section B of the Schedule and in another significant departure from previous Bill versions, empowers the Board to include any other civil matter it chooses in the future.  The Crime Scene Index also defines victim expansively to include a person “reasonably suspected of being a victim” (Section 2 ii).  Taken together, the government is empowered to conduct genetic testing on almost anyone in any way connected with even minor infractions of the criminal law or involved in virtually any civil proceeding.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The definition of “offender” (Section 2y) is not limited to one with a criminal conviction but includes anyone even charged with an offense, thereby expanding coverage of the criminal provisions of the Bill to include individuals who have not yet been convicted of any crime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The crucial term “suspect” (Section 2zi) is defined as anyone “suspected of having committed an offence.” &lt;i&gt; &lt;/i&gt; By intentionally leaving out the qualifier “specified,” the drafters’ intent is plain: to sweep within the Bill’s breadth all persons suspected of any crime whatsoever even if there is insufficient probable cause for arrest. And, accordingly, the Bill defines the “suspects index” to include “DNA profiles derived from forensic material lawfully taken from suspects.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore the definitions include a category of persons entitled “volunteers,” (Section 2 zo) defined as “a person who volunteers to undergo a DNA procedure and, in case of a child or incapable person, his parent or guardian having agreed…” There is no additional clarification as to how this category might be treated in practice but without any clear provisions for informed consent, it is highly unlikely that such participation will be truly voluntary; especially without provisions for decision making subsequent to offering the sample such as future expungement from the system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taken together the definitions of victim, offender and suspect expand the reach of this Bill to a broad range of potentially innocent individuals involved in the criminal justice system, while the Schedule and definition of “volunteers” sweep a broad range of categories of innocent citizens into the purview of this Bill- including children and the mentally incapacitated-having nothing to do with the criminal justice system.  There is simply no corollary in any other country to such expansive authority. The Bill places India far outside the mainstream of policy in this area and raises serious and far ranging human rights concerns&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;DNA Profiling Board (Chapter III)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The DNA Profiling Board (hereinafter “Board”) is responsible for administering and overseeing the Indian DNA database &lt;i&gt;.&lt;/i&gt; Oversight is an important and valuable concept, however the value of such principles in this Bill are completely overshadowed by the expansive powers given to the Board.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bill lays out a number of fields from which the members are to be chosen inc. molecular biology, population biology, criminal justice and bioethics.  There is no representation from civil society human rights organizations or the criminal defense bar to ensure that privacy, human rights and the general public interest are ensured.  Furthermore the Chief Executive Office of the Board is to be a scientist and therefore unlikely to be familiar with criminal justice matters and evaluations of their efficacy. (Chapter III, Section 10)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Board is given an almost limitless list of responsibilities including “recommendations for maximizing the use of DNA techniques and technologies (Section 10k) and identifying scientific advances that may assist law enforcement (Section 10L). Such powers are particularly concerning because the Bill does not include any privacy provisions whatsoever but rather  invests in the Board the power to make “recommendations for privacy protection laws, regulations and practices relating to access to, or use of stored DNA samples or DNA analyses,” as well as “mak[ing] specific recommendations to . . . ensure the appropriate use and dissemination of DNA information [and] take any other necessary steps required to be taken to protect privacy.” (Section 10o and p). Furthermore the Board is given the responsibility of “deliberating and advising on all ethical and human rights issues emanating out of DNA profiling.” (Section 10t).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These provisions are in lieu of any substantive language limiting the scope of the legislation, and protecting privacy and human rights principles (which the bill otherwise lacks.) These are significant omissions. As expressed in the introduction, the stated purpose of the Bill is “to enhance protection of people in the society and [the] administration of justice.” Taken alone, this Bill actually expresses only the government’s interest in the legislation, suggesting an ambiguously wide scope for its provisions. Substantive concepts of individual privacy and human rights are required to counterbalance the interests of the government and provide protections for the equally vital privacy and human rights interests of the individual. As such,  limiting privacy and human rights principles should be included alongside the expression of the government’s security interest. Without it, the Board will effectively have &lt;i&gt;carte blanche&lt;/i&gt; with regard to what privacy and human rights protections are—or are not—adopted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Also in a departure from previous versions of this Bill, this Bill expands the Boards powers to include areas of policy beyond the coverage of the Bill’s other provisions including “intellectual property issues. (Section 10i)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, as noted earlier in the discussion of the Schedule (and in a significant departure from previous versions of the Bill), the Board is given total control to expand every category of person to be included under the Bill. In a democratic system of government, such decisions should rest exclusively with the Parliament and therefore be subject to the checks and balances of government as well as the transparency necessary to ensure public participation.  Leaving such decision making to an unelected body raises serious human rights concerns.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Approval of Laboratories (Chapter IV)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sections 13 to 17 provide for the approval by the DNA Profiling Board of DNA laboratories that will process and analyze genetic material for eventual inclusion on the DNA database. Under Section 13, all laboratories must be approved in writing prior to processing or analyzing any genetic material. However, a conflicting provision appears in the next section, Section 14(2), which permits DNA laboratories in existence at the time the legislation is enacted to process or analyze DNA samples immediately, without first obtaining approval.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Either an oversight on the part of the drafters, or the product of overly-vague language, the result is that established genetic laboratories—including whatever genetic material or profiles they may already have for whatever reason—are in effect “grandfathered” into the system. The only review of these laboratories is the &lt;i&gt;post hoc&lt;/i&gt; approval of the laboratory by the DNA profiling board. The potential for abuse and error that this conflict of provisions would be best addressed in keeping with the rule articulated in Section 13, i.e. correcting the language of Section 14(2) that allows for laboratories to be “grandfathered” into the system.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Standards, Obligations of DNA Laboratory (Chapter V)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Chapter V, which concerns the obligations of and the standards to be observed by approved DNA laboratories, lacks adequate administrative requirements. For example, Section 21 requires that labs ensure “adequate security” to minimize contamination without providing for accountability in the event of contamination. Similarly, Section 27 provides for audits of DNA laboratories only, withholding from similar scrutiny of the DNA Profiling Board itself. However, the greatest limitation of every Section of this Chapter is that rather than offering any specific substantive requirements, they instead offer categories requiring attention “as may be specified “ by the DNA Board.  Any actual standard or obligation by a laboratory is set entirely by the DNA Board.  Minimum standards must be set by law to ensure compliance.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Infrastructure and Training (Chapter VI)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Similar to Chapter V, this section offers no legislative benchmarks but rather categories of activities, with further regulation “as may be specified” by the Board.  As noted earlier, there are serious concerns in using DNA analysis with regards to false matches, cross-contamination and laboratory error.  Not taking such concerns seriously, and taking serious steps to minimize their occurrence, can lead to significant distrust of government and police authority when such incidents occur.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;DNA Databank (Chapter VII)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In addition on one national DNA database, the Bill sanctions the several Indian states to maintain their own DNA databases, provided these state-level databases forward copies of their content to the national database. Section 32(3). Section 32(5) states that the indices should include records related thereto” the DNA analysis. (See also Section 35(b)) Such  provisions allow for access to “the information” contained in the database, not simply “the DNA profiles” contained in the database. Without further clarification it would appear to authorize an unlimited amount of private information unrelated to identification to be included in the indices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The national database is envisioned to comprise several sub-databases (Section 32(4)), each to contain the genetic information of a subset of persons/samples, namely: (a) unidentified crime scene samples, (b) samples taken from suspects, (c) samples taken from offenders inc. persons convicted or currently subject to prosecution for criminal offenses   (d) samples associated with missing persons, (e) samples taken from unidentified bodies, (f) samples taken from “volunteers,” and finally (g) samples taken for reasons “as may be specified by regulations made by the Board. Section 33 (4) &lt;i&gt;et seq.&lt;/i&gt; Putting to one side the breadth of persons subject to inclusion under subcategories (1) through (6), subsection (7) appears on its face to be a “catch all” provision, leaving one only to guess at the circumstances under which its specificities may be promulgated. &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A close reading of Section 32(6) strongly suggests that the agency conducting the forensic analyses and populating the DNA database shall retain the actual DNA samples thereafter. This section reads in relevant part:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The “DNA Data Bank shall contain . . . the following information, namely: (a) in case of a profile in the offenders index, the identity of the person from whose body substance or body substances the profile was derived, and (b) in case of all other profiles, the case reference number of the investigation associated with the body substance or body substances from which the profile was derived.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Allowing retention of the biological sample, even after a profile has been created from it, in conjunction with the unlimited ability of the Board to create regulations for additional uses of that sample raises serious privacy and human rights concerns.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, rather than choosing to link the DNA profile data to a specific offender or case, the drafters of the Bill instead link the “body substance or body substances” with that specific offender or case. Whether sloppy drafting or clever nuance, this provision equates the DNA &lt;i&gt;profile&lt;/i&gt; with the DNA &lt;i&gt;sample&lt;/i&gt;, injecting unneeded—and potentially harmful—ambiguity into the proposed law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 37 (1) allows for indefinite retention of information in the offenders index (which includes individuals charged with an offense but not convicted).  This provision raises serious human rights concerns as it would appear to allow indefinite retention of profiles of individuals who have not been convicted of a crime.  This directly conflicts with Section 37 (II) which  allows for expungement when a certified copy of a court order stating that the individual in question has been acquitted.  This provision also appears to conflict with Chapter VIII Section 43(b) which appears to allow indefinite retention of DNA of suspects even after they’ve been excluded from an investigation. Indeed no process or procedures for expungement and removal of records are in place for suspects generally who are never charged or for any of the other categories of indices that are present in the Bill, thereby raising serious question as to how and even whether such profiles can be removed from the Databank.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Confidentiality, Access to DNA Profiles, Samples, and Records (Chapter VIII)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Two further provisions regarding access to the database warrant close scrutiny. First, Sections 39 and 40 confers upon the Board the unlimited power to expand categories for which DNA profiles, samples and records can be used. Considering that the Bill (Section 40(e)) already questionably allows such records to be used for population research, these provisions raise serious questions as to the classes of potential use such private information might be subject.&lt;br /&gt;Sections 40-42  purport to confer upon the police and other authorized individuals direct access to all of the information contained in the national DNA database. While administratively expedient, this arrangement opens up the possibility for misuse. A more prudent system would place the Board (or some administrative subordinate portion thereof) between the police and the content of the DNA database, with the latter having to make specific and particular requests to the former. This would minimize the risks inherent in the more expansive model of database access the bill currently envisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 45 related to post-conviction DNA testing has the laudable goal of offering “any individual undergoing a sentence of imprisonment or death pursuant to conviction for an offence, may apply to the court which convicted him for an order of DNA testing” in order to prove their innocence.   However such an application lists eleven separate criteria that such an applicant must meet before qualifying, and allows a court total discretion in deciding whether all such criteria have been met.  High barriers and absolute discretion make such testing highly unlikely and therefore make a provision seeming to offer human rights protections completely hollow.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Offences and Penalties (Chapter X)&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This chapter lays out penalties for misuse of the Database. Most notably, the bill specifically excludes a private cause of action for the unlawful collection of DNA, or for the unlawful storage of private information on the national DNA database. A new provision in Section 58 does allow for an aggrieved person to petition the Central Government or Board if an instance of misuse is not being addressed but such provision does not contain any required processes such entities must follow in responding to such a petition, making an otherwise positive new provision relatively empty.  Nor does the bill grant an individual right to review one’s personal data contained on the database. Without these key features, there are limited checks against the unlawful collection, analysis, and storage of private genetic information on the database.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Best Practices Analysis&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;Collection of DNA&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;With consent: only for a specific investigation (e.g. from a victim or for elimination purposes). Volunteers should not have information entered on a database. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Without consent: only from persons suspected of a crime for which DNA evidence is directly relevant i.e. a crime scene sample exists or is likely to exist. Or, broader categories?&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Requirement for an order by a court? Or allowed in other circumstances?&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Samples collected by police officers, or only medical professionals? Must take place in a secure location i.e. not on the street, etc.&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Provision of information for all persons from whom DNA is taken.&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Crime scenes should be promptly examined if DNA evidence is likely to be relevant, and quality assurance procedures must protect against contamination of evidence.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Analysis of DNA&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Should take place only in laboratories with quality assurance.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Regulated at discretion of DNA Profiling Board.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Laboratories should be independent of police.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Profiling standards must be sufficient to minimize false matches occurring by chance. This must take account of increased likelihood of false matches in transboundary searches, and with relatives.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Storage of DNA and Linked Data&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Data from convicted persons should be separate from others e.g. missing persons’ databases. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Unclear.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Access to databases and samples must be restricted and there must be an independent and transparent system of governance, with regular information published e.g. annual reports, minutes of oversight meetings.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Access to database at discretion of DNA Data Bank Manager.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Personal identification information should not be sent with samples to laboratories.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Any transfer of data e.g. from police station to lab or database, must be secure.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision; regulated at discretion of DNA Profiling Board.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Uses of Samples and Data&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Research uses should be restricted to anonymised verification of database performance (e.g. checking false matches etc.). Third party access to data for such purposes should be allowed, provided public information on research projects is published. There should be an ethics board. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Research uses for other purposes e.g. health research, behavioral research should not be allowed.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Uses should be restricted by law to solving crimes or identifying dead bodies/body parts. Identification of a person is not an acceptable use. Missing persons databases (if they exist) should be separate from police databases. &lt;br /&gt;.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Ambiguous provisions suggest much wider scope.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Any transfer of data e.g. from police station to lab or database, must be secure.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Destruction of DNA and Linked Data&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;DNA samples should be destroyed once the DNA profiles needed for identification purposes have been obtained from them, allowing for sufficient time for quality assurance, e.g. six months. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;DNA samples are retained.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;An automatic removals process is required for deletion of data from innocent persons. This must take place within a reasonable time of acquittal, etc.&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;There should be limits on retention of DNA profiles from persons convicted of minor crimes. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;There should be an appeals process against retention of data.&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Linked data on other databases (e.g. police record of arrest, fingerprints) should be deleted at the same time as DNA database records.&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Crime scene DNA evidence should be retained for as long as a reinvestigation might be needed (including to address miscarriages of justice).&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;DNA evidence permitted to be retained indefinitely. &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Use in court&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Individuals must have a right to have a second sample taken from them and reanalyzed as a check. &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Individuals must have a right to obtain re-analysis of crime scene forensic evidence in the event of appeal.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Allowed but with impossibly high barriers.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Expert evidence and statistics must not misrepresent the role and value of the DNA evidence in relation to the crime. &lt;br /&gt;.&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;b&gt;Other&lt;/b&gt;&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Relevant safeguards must be proscribed by law and there should be appropriate penalties for abuse.  &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Impacts on children and other vulnerable persons (e.g. mentally ill) must be considered. &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;Potential for racial bias must be minimized.&lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;No provision.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;a class="external-link" href="http://www.councilforresponsiblegenetics.org/"&gt;Click&lt;/a&gt; for more information on the Council for Responsible Genetics.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis'&gt;https://cis-india.org/internet-governance/blog/human-dna-profiling-bill-analysis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Jeremy Gruber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-03-19T09:53:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes">
    <title>How to Engage in Broadband Policy and Regulatory Processes</title>
    <link>https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes</link>
    <description>
        &lt;b&gt;LIRNEasia with the support of the Ford Foundation offered a four-day course in Gurgaon from March 7 to 10, 2014. Sunil Abraham taught on Surveillance and Privacy. &lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/surveillance-and-privacy.pdf" class="internal-link"&gt;Click to see&lt;/a&gt; Sunil Abraham's presentation on Surveillance and Privacy. Also read it on LIRNE asia website &lt;a class="external-link" href="http://broadbandasia.info/wp-content/uploads/2014/03/privacy-lirneasia.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Goal&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To enable members of Indian civil-society groups (including academics and those from the media) to marshal available research and evidence for effective participation in broadband policy and regulatory processes including interactions with media, thereby facilitating and enriching policy discourse on means of increasing broadband access by the poor.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Outcomes&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The objective of the course is to produce discerning and knowledgeable consumers of research who are able to engage in broadband policy and regulatory processes.  The course will benefit those working in government and at operators as well.&lt;/p&gt;
&lt;p&gt;At the end of the course attendees will:&lt;/p&gt;
&lt;p&gt;Be able to find and assess relevant research &amp;amp; evidence&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Be able to summarize the research in a coherent and comprehensive manner&lt;/li&gt;
&lt;li&gt;Have an understanding of broadband policy and regulatory processes in India &lt;/li&gt;
&lt;li&gt;Have the necessary tools to improve their communication skills&lt;/li&gt;
&lt;li&gt;Have some understanding of how media function and how to effectively interact with media&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Participants will be formed into teams on day1. Both group assignments are connected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first assignment requires each group to research on a National Broadband Network (NBN) assigned to them (one of US, Singapore, Hong Kong, Brazil, South Africa, Korea or Colombia) and writing it up based on a template that will be provided. Each team will have to present their findings about the NBN at the end of day 2.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second assignment is to be performed by teams.  It is an oral presentation, accompanied by a policy brief of two pages max. at a mock public hearing at which the Indian Department of Telecommunications (DoT) is seeking input on the question of subsidizing fiber-to-the-home (FTTH) as the second phase of the current INR 20,000 Crore (USD 4 Billion) National Optical Fiber Network initiative.  Each team will be assigned a role and they should present the recommendations from the point of view of the assigned ‘role’.  All presentations must be evidence based.  It is expected that participants will use what they learnt about other NBNs on day 2 to support their argument.  Additional research must be conducted on Days 3 and 4.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;/th&gt;&lt;th&gt;Day1 (March 7)&lt;/th&gt;&lt;th&gt;Day2 (March 8)&lt;/th&gt;&lt;th&gt;Day3 (March 9)&lt;/th&gt;&lt;th&gt;Day4 (March 10)&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09.00&lt;br /&gt;10.30&lt;/td&gt;
&lt;td&gt;S1  Introduction (Rohan Samarajiva RS)&lt;/td&gt;
&lt;td&gt;S5  Interrogating supply-side indicators (RS &amp;amp; RLG)&lt;/td&gt;
&lt;td&gt;S8 Indian broadband policy &amp;amp; regulatory environment in relation to comparator countries (Satyen Gupta SG)&lt;/td&gt;
&lt;td&gt;S13 Lessons from Mexico (Ernesto Flores EF) &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30&lt;br /&gt;11.00&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00&lt;br /&gt;12.00&lt;/td&gt;
&lt;td&gt;S2 Research on significance of broadband/Internet (Payal Malik PM)&lt;/td&gt;
&lt;td&gt;S6 Assessing &amp;amp; summarizing research (RS &amp;amp; NK)&lt;/td&gt;
&lt;td&gt;S9  Research on subsidies in broadband eco system (PM)&lt;/td&gt;
&lt;td&gt;S14 Spectrum policy debates (Martin Cave (MC)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.00&lt;br /&gt;13.00&lt;/td&gt;
&lt;td&gt;S3   Finding research (Nilusha Kapugama NK)&lt;/td&gt;
&lt;td&gt;S7 The art of media interaction (RS)&lt;/td&gt;
&lt;td&gt;S10 Making policy &amp;amp; doing regulation (SG &amp;amp; Rajat Kathuria RK) panel discussion&lt;/td&gt;
&lt;td&gt;S15 Framing issues (RS)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;br /&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00&lt;br /&gt;15.00&lt;/td&gt;
&lt;td&gt;A1 Group formation; Assignments explained and introduction of Broadband Website (Roshanthi Lucas Gunaratne RLG)&lt;/td&gt;
&lt;td&gt;A2 Rewriting research summaries &amp;amp; preparing presentations&lt;/td&gt;
&lt;td&gt;S11 Surveillance and Privacy (RS &amp;amp; Sunil Abraham SA)&lt;/td&gt;
&lt;td&gt;A5 Mock public hearing (RS &amp;amp; panel)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.00&lt;br /&gt;15.30&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.30&lt;br /&gt;17.00&lt;/td&gt;
&lt;td&gt;S4 Demand-side research (NK) &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;A3 Presentation &amp;amp; critique of research summaries (RS &amp;amp; Panel)&lt;/td&gt;
&lt;td&gt;S12 International policy debates on Internet and broadband (RS)&lt;/td&gt;
&lt;td&gt;A5 Mock public hearing &amp;amp; critique (RS &amp;amp; panel)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.00 onwards&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;Certificate dinner&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Faculty&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Rohan Samarajiva, PhD&lt;/b&gt;&lt;br /&gt;Rohan Samarajiva, was the founding CEO (2004 - 2012) and Chair (2004 – onwards) of LIRNEasia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previously he was the Team Leader at the Sri Lanka Ministry for Economic Reform, Science and Technology (2002-04) responsible for infrastructure reforms, including participation in the design of the USD 83 million e Sri Lanka Initiative.  He was Director General of Telecommunications in Sri Lanka (1998-99), a founder director of the ICT Agency of Sri Lanka (2003-05), Honorary Professor at the University of Moratuwa in Sri Lanka (2003-04), Visiting Professor of Economics of Infrastructures at the Delft University of Technology in the Netherlands (2000-03) and Associate Professor of Communication and Public Policy at the Ohio State University in the US (1987-2000).  He was Policy Advisor to the Ministry of Post and Telecom in Bangladesh (2007-09).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He serves as Senior Advisor to Sarvodaya (Sri Lanka’s largest community based organization) on ICT matters. Samarajiva is a Board Member of Communication Policy Research south, an initiative to identify and foster policy intellectuals in emerging Asia. He serves on the editorial boards of seven academic journals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His full CV can be found at &lt;a href="http://lirneasia.net/wp-content/uploads/2007/12/CVApril1long.pdf"&gt;http://lirneasia.net/wp-content/uploads/2007/12/CVApril1long.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Martin Cave, PhD&lt;/b&gt;&lt;br /&gt;Martin Cave is a regulatory economist specialising in competition law and in the network industries, including  airports, broadcasting, energy, posts, railways, telecommunications and water. He has published extensively in these fields, and has held professorial positions at Warwick Business School, University of Warwick, UK, and the Department of Economics, Brunel University, UK. In 2010/11, Martin held the BP Centennial Chair at the London School of Economics, based in the Department of Law. He is now Visiting Professor at Imperial College Business School.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He is a Deputy Chair of the Competition Commission from January 2012. He has provided expert advice to governments, competition authorities, regulators and firms around the world, focussing particularly upon the communications industries. This work has included reviews of spectrum policies for the Governments of Australia, Canada and the UK; advice on market analysis and access remedies to a large number of regulators in Asia, Australia, Europe and Latin America, including the European Commission. He has provided advice and expert testimony in competition and sector-specific regulatory proceedings to a number of major international firms in Asia, Australasia and Europe. He has also advised UK ministers on matters relating to the water sector, housing, legal services and airports, and advised regulators in the railway and energy sectors. He was a founder member of the Academic Advisory Committee of the Brussels-based think tank, the Centre for Regulation in Europe (&lt;a href="http://www.cerre.eu/" target="_blank"&gt;www.cerre.eu&lt;/a&gt;). In 2009 he was awarded the OBE for public service.&lt;/p&gt;
&lt;p&gt;His full CV&lt;b&gt; &lt;/b&gt;available on &lt;a href="http://www.martincave.org.uk/index.php"&gt;http://www.martincave.org.uk/index.php&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Payal Malik&lt;/b&gt;&lt;br /&gt;Payal Malik is a Senior Research Fellow of LIRNEasia and an Associate Professor of Economics at the Delhi University. She is currently on deputation to the Competition Commission of India. She is also associated with National Council of Applied Economic Research and Indicus Analytics. She received her Master of Philosophy (M.Phil.), and MA in Economics from the Delhi School of Economics and BA in Economics from Lady Shriram College, University of Delhi. She also has a MBA in Finance from the University of Cincinnati.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She has several years of research experience on the issues of competition and regulation in network industries like power, telecommunication and water. In addition, she has done considerable research on the ICT sector. Recently she has been actively engaged in competition policy research. At LIRNEasia, she has led research on measuring India’s telecom sector and regulatory performance, including a study on Universal Service Instruments. She has written both for professional journals as well as for the economic press. Currently she is a regular columnist for the Financial Express, India and a referee for the Information Technologies and International Development journal published by University of Southern California, Annenberg.  &lt;a href="http://lirneasia.net/wp-content/uploads/2011/01/Payal-Malik-Curriculum-Vita%C3%A8-December-2010.pdf"&gt;Click here to download a detailed version of CV&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Satyen Gupta&lt;/b&gt;&lt;br /&gt;Satyen Gupta is the founder and Secretary General, NGN Forum, India. Previously he was the chief of Corporate Affairs, Sterlite Technologies Ltd and headed the Regulatory and Govt. Affairs for BT global Services for SAARC Region and handled Licencing, Regulation, compliance, competition and Industry Advocacy issues. He is also a member, Advisory Board of Creation and Implementation of National Optical Fibre Network for the government of India (2011 onwards). From 2000-2006 he served as the Principle Advisor, Telecom Regulatory Authority of India at the level of additional secretary to the government of India and headed the fixed network division. He is the author of “Everything Over IP-All you want to know about NGN” (2011).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He has conducted and taught many courses on telecommunication technologies, policy and regulation. He is also a Govt. Affairs and Regulatory advocate. He  graduated with Hons, in Engineering in 1979 from NIT, Kurukshetra University, INDIA and went on to complete his post graduate studies in Electronics Design Technology at CEDT, Indian Institute of Science, Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajat Kathuria, PhD&lt;/b&gt;&lt;br /&gt;Rajat Kathuria is Director and Chief Executive at Indian Council for Research on International Economic Relations (ICRIER), New Delhi. He has over 20 years experience in teaching and 10 years experience in economic policy, besides research interests on a range of issues relating to regulation and competition policy. He worked with Telecom Regulatory Authority of India (TRAI) during its first eight years (1998-2006) and gained hands on experience with telecom regulation in an environment changing rapidly towards competition. The role entailed analysis of economic issues relating to telecom tariff policy, tariff rebalancing, interconnection charges and licensing policy. Market research and questionnaire development and analysis formed an integral part of this exercise. It also involved evaluation of macro level initiatives for transforming the telecom industry. He wrote a number of consultation papers which eventually formed the basis of tariff and interconnection orders applicable to the industry. He has an undergraduate degree in Economics from St. Stephens College, a Masters from Delhi School of Economics and a PhD degree from the University of Maryland, College Park.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Ernesto Flores, PhD&lt;/b&gt;&lt;br /&gt;Ernesto M. Flores-Roux majored in Mathematics from the National University of Mexico (UNAM), obtained partial credits in a Masters in Economics (ITAM), and received his PhD in Statistics from The University of Chicago (1993). From 1993 to 2004, he worked for McKinsey &amp;amp; Co., Inc. (Mexico, Brazil), one of the most prestigious international consulting firms, first as a Consultant, then as Partner, and finally as the Partner in charge of McKinsey's Rio de Janeiro office. He specialized in several aspects of the telecommunications industry, including regulation, planning, strategy, and marketing. He assisted the governments of Mexico and Brazil in their deregulation and privatization processes. In 2004, he joined Telefonica, first as Director of Marketing and Strategy in Mexico and then transferring to Telefónica's operations in Peru, China (Beijing), and Brazil. In 2008 he joined the Ministry of Communications and Transport (SCT) in Mexico as Chief of Staff of the Deputy Minister of Communications. In 2009 he joined CIDE (Centro de Investigación y Docencia Económicas, Mexico City) as an associate professor of CIDE's telecommunications program (Telecom CIDE). He has published several papers in telecommunications policy and has written reports for the IDB, GSMA, UN/CEPAL , Ahciet, CAF, OECD, as well as other publications in industry and academic journals. In 2011 he became a member of the Advisory Council of the Mexican telecommunications regulator (Cofetel – Comisión Federal de Telecomunicaciones).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham&lt;/b&gt;&lt;br /&gt;Sunil Abraham is the Executive Director of Bangalore based research organization, the Centre for Internet and Society. He founded Mahiti in 1998, a company committed to creating high impact technology and communications solutions. Today, Mahiti employs more than 50 engineers. Sunil continues to serve on the board. Sunil was elected an Ashoka fellow in 1999 to 'explore the democratic potential of the Internet' and was also granted a Sarai FLOSS fellowship in 2003. Between June 2004 and June 2007, Sunil also managed the International Open Source Network, a project of United Nations Development Programme's Asia-Pacific Development Information Programme serving 42 countries in the Asia-Pacific region.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Nilusha Kapugama&lt;/b&gt;&lt;br /&gt;Nilusha Kapugama is a Research Manager at LIRNEasia and manages the electricity component of the 2012-2014 IDRC Project on ‘Achieving e-inclusion by improving government service delivery &amp;amp; exploring the potential of “big data” for answering development questions’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She is also working on a systematic review looking at the economic impacts of mobile phones. Previously she managed the Knowledge Based Economy project at LIRNEasia, which looked at the information and knowledge gaps in agriculture supply chains. She also worked on &lt;a href="http://www.lirneasia.net/projects/current-projects/capacity-and-field-building/"&gt;CPR&lt;/a&gt;&lt;a href="http://www.lirneasia.net/projects/current-projects/capacity-and-field-building/"&gt;south&lt;/a&gt;, LIRNEasia’s capacity-building initiative to develop Asia-Pacific expertise and knowledge networks in ICT policy regulation. She has also done research on broadband quality indicators and national regulatory authority (NRA) website indicators. She has also worked on LIRNEasia’s &lt;a href="http://www.lirneasia.net/projects/current-projects/virtual-organization/"&gt;Virtual Organization Project&lt;/a&gt;.  She has experience organizing international conferences and training courses.&lt;/p&gt;
&lt;p&gt;She holds a master’s degree in development economics and policy from the University of Manchester, UK.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Roshanthi Lucas Gunaratne&lt;/b&gt;&lt;br /&gt;Roshanthi is a Research Manager at LIRNEasia and is currently managing the Ford Foundation Funded project on Giving Broadband Access to the Poor in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She is also contributing to the IDRC Customer Lifecycle Management Practices Project by conducting research on customer lifecycle management practices in telecommunication sector in Bangladesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before joining LIRNE&lt;i&gt;asia&lt;/i&gt;, Roshanthi worked at the Global Fund to fight AIDS, Tuberculosis and Malaria, Geneva, Switzerland as a Strategic Information Officer. She contributed to the process of defining the Global Fund Key Performance Indicators, and also worked on improving the performance measurements of their grants. Prior to that, she worked as a telecom project manager at Dialog Telecom, and Suntel Ltd in Sri Lanka. As Suntel she managed the design and implementation of corporate customer projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She holds a MBA from the Judge Business School, University of Cambridge, UK and a BSc. Eng (Hons) specializing in Electronics and Telecommunication from the University of Moratuwa, Sri Lanka.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Resource Materials&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Bauer, Johannes M.; Kim, Junghyun; &amp;amp; Wildman, Steven S. (2005).  An integrated framework for assessing broadband policy options.  MICH. ST. L. REV. 21, pp. 21-50.  &lt;a href="http://www.msulawreview.org/PDFS/2005/1/Bauer-Kim.pdf"&gt;http://www.msulawreview.org/PDFS/2005/1/Bauer-Kim.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Broadband Commission (2012). &lt;i&gt;The state of broadband 2012:  Achieving digital inclusion for all.&lt;/i&gt; &lt;a href="http://www.broadbandcommission.org/Documents/bb-annualreport2012.pdf"&gt;http://www.broadbandcommission.org/Documents/bb-annualreport2012.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government of India, Department of Telecommunications (2012).  &lt;i&gt;National Telecom Policy 2012&lt;/i&gt;.  &lt;a href="http://www.dot.gov.in/ntp/NTP-06.06.2012-final.pdf"&gt;http://www.dot.gov.in/ntp/NTP-06.06.2012-final.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government of India, Department of Telecommunications (2004).  &lt;i&gt;Broadband policy&lt;/i&gt;.  &lt;a href="http://www.dot.gov.in/ntp/broadbandpolicy2004.htm"&gt;http://www.dot.gov.in/ntp/broadbandpolicy2004.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Junio, Don Rodney (2012). Does a National Broadband Plan Matter? A Comparative Analysis of Broadband Plans in Hong Kong and Singapore &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2146566"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2146566&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;InfoDev.  &lt;i&gt;Broadband strategies toolkit&lt;/i&gt;.  &lt;a href="http://broadbandtoolkit.org/en/toolkit/contents"&gt;http://broadbandtoolkit.org/en/toolkit/contents&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Samarajiva, Rohan (2010).  Leveraging the budget telecom network business model to bring broadband to the people, &lt;i&gt;Information Technology and International Development&lt;/i&gt;, 6, special edition:  93-97.  &lt;a href="http://itidjournal.org/itid/article/view/630/270"&gt;http://itidjournal.org/itid/article/view/630/270&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes'&gt;https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-03T06:07:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens">
    <title>How the world’s largest democracy is preparing to snoop on its citizens</title>
    <link>https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens</link>
    <description>
        &lt;b&gt;Monitoring system will allow govt to snoop on voice calls, SMSes, and access Internet data. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Leslie D' Monte and Joji Thomas Philip was &lt;a class="external-link" href="http://www.livemint.com/Politics/pR5zc8hCD1sn3NWQwa7cQJ/The-new-surveillance-state.html"&gt;published in Livemint&lt;/a&gt; on July 3, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Nothing will be secret or private.&lt;/p&gt;
&lt;p class="mceContentBody documentContent"&gt;Every conversation on landlines and mobile phones will be  heard; some will be recorded. Every move you make on the Internet will  be tracked.&lt;/p&gt;
&lt;p class="mceContentBody documentContent"&gt;Fiction?&lt;/p&gt;
&lt;p class="mceContentBody documentContent"&gt;By December, when the Nanny State goes live, it will be fact.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;Once the government’s innocuously named CMS  (communication monitoring system) is in place, the state will be able to  snoop on your voice calls, fax messages, SMSes and MMSes, across all  phone networks. It will be able to access your Internet data, and see  not just what sites you visit but even build a cache of your inbox, to  decrypt at leisure.&lt;/p&gt;
&lt;p class="mceContentBody documentContent"&gt;The process began more than a couple of years ago.&lt;/p&gt;
&lt;p class="mceContentBody documentContent" style="text-align: justify; "&gt;On 29 April 2011, India’s home ministry called for bids  to set up communications monitoring systems in all state capitals. The  notice, which was published on its website and went almost unnoticed,  specified that the system should be able to monitor voice calls, fax  messages, SMSes and MMSes, and work across terrestrial networks, GSM and  CDMA (the dominant mobile telephony platforms), and the Internet.&lt;/p&gt;
&lt;div class="p"&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/q9fAaeNdzUQ" width="320"&gt;&lt;/iframe&gt;&lt;/th&gt;
&lt;td&gt;
&lt;p style="text-align: justify; "&gt;The tender specified that the system should be able to  listen in live, and be able to analyse intercepted data. It should have  the ability to record, store and playback, without interfering “with the  operation of telecommunication network or make the target aware that he  is being monitored”.&lt;/p&gt;
&lt;p class="p" style="text-align: justify; "&gt;The CMS is no longer a concept. It has undergone  successful pilots and is likely to be commissioned by the year-end,  according to an internal note dated 10 June from the department of  telecommunications (DoT).&lt;/p&gt;
&lt;p class="p" style="text-align: justify; "&gt;A top government official, who did not want to be named, said the CMS  centralized data centre is likely to be ready by July and commissioned  by October. The official also added that the Centre for Development of  Telematics (C-DoT), the government’s telecom technology arm, has “signed  an agreement with the Centre for Artificial Intelligence and Robotics  (CAIR) for Internet Service Provider integration”. This agreement will  allow monitoring agencies to track an individual’s Internet use.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;Subsequent media reports, which have cited internal government documents, peg the cost of the CMS at around Rs.400 crore, but there is hardly any official data from the government about the implementation of the CMS.&lt;/p&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;In its 2012-13 annual report, DoT said the government has decided to set up the CMS for lawful interception and monitoring by law enforcement agencies, “reducing the manual intervention at many stages as well as saving of time”.&lt;/p&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;The system, according to the report, was to be installed by C-DoT after which the Telecom Enforcement, Resource and Monitoring (TERM) cells would take over. As on 31 March, there were 34 such TERM cells in the country. The current number could not be ascertained.&lt;/p&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;How does the government justify this invasive system? Its purpose is unclear, but national security is always a handy spectre. And so what if such a system can be misused to bully, spy and curtail the freedom of individuals? Indeed, India’s track record of using existing laws doesn’t inspire confidence.&lt;/p&gt;
&lt;p class="documentcontent" style="text-align: justify; "&gt;Student &lt;a href="http://www.livemint.com/Search/Link/Keyword/Shaheen%20Dhada"&gt;Shaheen Dhada&lt;/a&gt; was arrested (under the law) for criticizing the shutdown of Mumbai after the death of Shiv Sena supremo &lt;a href="http://www.livemint.com/Search/Link/Keyword/Bal%20Thackeray"&gt;Bal Thackeray&lt;/a&gt; on her personal Facebook account. Her friend, &lt;a href="http://www.livemint.com/Search/Link/Keyword/Renu%20Srinivasan"&gt;Renu Srinivasan&lt;/a&gt;, who had “liked” the comment was also arrested. The two were later freed, on bail.&lt;/p&gt;
&lt;h3 class="documentcontent" style="text-align: justify; "&gt;No known safeguards&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;But how does the CMS work? According to the government official cited above, the Central Bureau for Investigation (CBI), for instance, is likely to be provided interception facilities through the CMS in Delhi initially.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“CBI shall enter data related to target in the CMS system and approach the telecom services provider”, at which point the process is automated, and the provider simply sends the data to a server which forwards the requested information, he explained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He didn’t mention any safeguards, nor have any been made public, which means that there are likely none. In a Q&amp;amp;A session on the popular social network Reddit on Tuesday, academic and activist &lt;a href="http://www.livemint.com/Search/Link/Keyword/Lawrence%20Lessig"&gt;Lawrence Lessig&lt;/a&gt;, the co-founder of Creative Commons, wrote on the subject of snooping in the US, “I’m really troubled by national security programmes. We don’t know what protections are built into the system.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;That has become the subject of much debate following the leaks by whistleblower &lt;a href="http://www.livemint.com/Search/Link/Keyword/Edward%20Snowden"&gt;Edward Snowden&lt;/a&gt; about the US National Security Agency’s surveillance programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Lessig pointed out that protection based on code is the only real protection from misuse, as other safeguards are dependent on people choosing not to violate reasonable expectations of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which is the heart of the problem. From what we know, the list of agencies with access to data in India is already large: the Research and Analysis Wing, CBI, the National Investigation Agency, the Central Board of Direct Taxes, the Narcotics Control Bureau, and the Enforcement Directorate. More may be added.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For the system to be useful in any practical fashion, access will have to be given to a large number of officials in each of these agencies. And in the absence of safeguards, one must assume that all data is accessible to all officials.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To be sure, some of this information is already being tracked by Internet companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Ravina Kothari, a 22-year-old student at Cardiff University, said she learnt a bitter lesson “last year when I Googled my name”. “It revealed all the personal details I had put up on social media sites. My childhood school photos popped up on &lt;a href="http://www.livemint.com/Search/Link/Keyword/Google"&gt;Google&lt;/a&gt; image search results. Worse, I had not put them there. My friends had tagged me in—all so scary. And I can’t do anything about it.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She has since stopped uploading personal details such as videos, pictures or telephone numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Twenty-one-year-old Shruti Lodha, studying to be a chartered accountant, feels a similar discomfort.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“I am definitely not comfortable with Google, and how every time I Google myself it reveals my identity and shows information that is on social media sites.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, 24-year-old &lt;a href="http://www.livemint.com/Search/Link/Keyword/Max%20Schrems"&gt;Max Schrems&lt;/a&gt; of Vienna, Austria, asked the world’s largest social networking site &lt;a href="http://www.livemint.com/Search/Link/Keyword/Facebook%20Inc."&gt;Facebook Inc.&lt;/a&gt; for a copy of every piece of information it had collected on him since he had created an account with it two years earlier.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Schrems was delivered a CD packing a 1,222-page file that included information he had deleted, but had been stored on &lt;a href="http://www.livemint.com/Search/Link/Keyword/Facebook"&gt;Facebook&lt;/a&gt;’s servers, according to ThreatPost, a publication on information technology (IT) security run by Kaspersky Lab, a leading maker of antivirus software.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Had Schrems been a resident of India, he could not have known how much personal information Facebook had on him. Every person in the European Union (EU) has the right to access all the data that a company holds on him or her.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the CMS, all this information, and much more, can be called up by just about anyone—the taxman, CBI officials, Assam Police (which will also monitor the network according to some reports)—and the old bogey of national security may not even be raised.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Need for a privacy law&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Publicly at least, companies agree that the new monitoring systems infringe on our rights. &lt;a href="http://www.livemint.com/Search/Link/Keyword/Subho%20Ray"&gt;Subho Ray&lt;/a&gt;, president, Internet and Mobile Association of India said, “Without any prior permission, government should not take or use any information which is considered private. The biggest challenge for us is that we do not have a privacy law in India.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cyber law experts and privacy lobby groups caution that the world’s largest democracy’s attempt to snoop on its citizens with the CMS, ostensibly for security reasons, could be abused in the absence of a transparent process and a privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue has become alarming, they add, with the US admitting to be collecting billions of pieces of information on immigrants—6.3 billion from Indian citizens alone under the Foreign Intelligence Surveillance Act, according to an 8 June report in the UK-based &lt;i&gt;The Guardian&lt;/i&gt; newspaper.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“We don’t know much about the CMS, except that when implemented, it could be plugged directly into telecom nodes and lead to widespread tapping,” said Apar Gupta, a partner at law firm Advani and Co. specializing in IT law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“There’s no legal sanction as of now for any type of mass surveillance, such as the one that the CMS suggests,” said Pavan Duggal, a Supreme Court lawyer and cyberlaw expert.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Gupta added that since India lacks privacy legislation, which obliges companies to maintain privacy standards when they export the data which they’ve gathered in India overseas, “this poses a problem”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;N.S. Nappinai, a Bombay high court advocate, said, “India has lived without any codified laws to protect privacy all these years and has relied primarily on Article 21 of the Constitution. Protecting privacy has just become more complicated with the humongous quantity of data being uploaded online. People seem totally unaware of the trouble they are inviting upon themselves.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Current laws are already compromised&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The lack of a privacy law makes it easier for the government to take such extreme steps. The Indian Telegraph Act and the IT Act, 2008 (amendments introduced in the IT Act, 2000), already gives the government the power to monitor, intercept and even block online conversations and websites. The addition of the CMS will greatly widen the number of sources and could simplify access to these records as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On 25 April 2011, the government admitted that the existing laws include provisions for interception and pointed out that the Supreme Court had, on 18 December 1996, upheld the constitutional validity of interceptions and monitoring.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the court had added that telephone tapping infringes on the right to life and the right to freedom of speech and expression, unless permitted under special procedures, these guidelines are not usually implemented, according to activists.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The shortcomings of the existing laws already make it possible to misuse the vast amount of information that is available today. These laws were written at a time when the Internet was not a fact of life, and where the lines between public and private were not already blurred. Given that, the perspectives on privacy can be worrisome.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a report presented to the Lok Sabha on 13 December 2011, the ministry of planning said, “Collection of information without a privacy law in place does not violate the right to privacy of the individual…There is no bar on collecting information, the only requirement to be fulfilled with respect to the protection of the privacy of an individual is that care should be taken in collection and use of information, consent of individual would be relevant, information should be kept safe and confidential.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This proposed Right to Privacy Bill was leaked to the public, and eventually nothing came of it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On 16 October 2012, a commission headed by justice (retired) &lt;a href="http://www.livemint.com/Search/Link/Keyword/A.P.%20Shah"&gt;A.P. Shah&lt;/a&gt; issued a report that included the study of privacy laws and related Bills from around the world. The report noted that with the “increased collection of citizen information by the government, concerns have emerged on their impact on the privacy of persons”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite the report being given to the Planning Commission, the government has continued with its plans.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Early this year, a privacy lobby body, the Centre for Internet and Society (CIS) drafted the Privacy (Protection) Bill 2013, with the objective of contributing to privacy legislation in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;CIS worked with the Federation of Indian Chambers of Commerce and Industry and the Data Security Council of India and held round table meetings around the country to bring about a privacy law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, executive director, CIS, said, “While the government sets out to protect national interests, it’s also very important to protect the rights of individuals.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The way ahead&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Human Rights Watch, in a 7 June media release, described the CMS as “chilling, given its (India’s) reckless and irresponsible use of sedition and Internet laws”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to &lt;i&gt;Freedom on the Net 2012&lt;/i&gt;, released on 24 September, India—which scored 39 points out of 100—was termed “partly-free”. But India is not alone. Around 40 countries filter the Internet in varying degrees, including democratic and non-democratic governments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.livemint.com/Search/Link/Keyword/YouTube"&gt;YouTube&lt;/a&gt; and Gmail (both owned by &lt;a href="http://www.livemint.com/Search/Link/Keyword/Google%20Inc."&gt;Google Inc.&lt;/a&gt;), &lt;a href="http://www.livemint.com/Search/Link/Keyword/BlackBerry"&gt;BlackBerry&lt;/a&gt;, WikiLeaks, Skype (owned by &lt;a href="http://www.livemint.com/Search/Link/Keyword/Microsoft%20Corp."&gt;Microsoft Corp.&lt;/a&gt;), &lt;a href="http://www.livemint.com/Search/Link/Keyword/Twitter"&gt;Twitter&lt;/a&gt; and Facebook have all been censored, at different times, in countries such as China, Iran, Egypt and India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;European Union countries have strong privacy laws as is evident from the Schrems case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Australia is engaged in putting similar safeguards in place. On 24 June, a Senate committee recommended that Australia’s proposed data retention scheme only be considered if it just collected metadata, avoided capture of browser histories and contained rigorous privacy controls and oversight.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian politicians could take a cue from such countries when balancing national interest with protecting the privacy of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Gopal Sathe in New Delhi and Zahra Khan in Mumbai contributed to this story.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens'&gt;https://cis-india.org/news/livemint-leslie-d-monte-joji-thomas-philip-july-3-2013-how-the-worlds-largest-democracy-is-preparing-to-snoop-on-its-citizens&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T09:41:21Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did">
    <title>How The U.K. Got A Better Deal From Facebook Than India Did </title>
    <link>https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did</link>
    <description>
        &lt;b&gt;The U.K.’s Information Commissioner’s Office (ICO) and India’s Karmanya Sareen shared a similar concern – how messenger application WhatsApp’s decision to share user data with parent Facebook is a violation of the promise of privacy.&lt;/b&gt;
        &lt;p&gt;The blog post by Payaswini Upadhyay was &lt;a class="external-link" href="http://www.bloombergquint.com/business/2016/11/17/how-the-uk-got-a-better-deal-from-facebook-than-india-did"&gt;published in Bloomberg Quint&lt;/a&gt; on November 17, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Last week, Facebook agreed to address the concerns of the ICO; in India, it didn’t have to.&lt;/p&gt;
&lt;h3&gt;WhatsApp: New Privacy Policy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In August 2016, WhatsApp issued a revised privacy policy that allowed it to share user information with parent company Facebook. Any user who didn’t want her information to be shared with Facebook had a 30-day period to opt out of the policy. Opting out meant that a user’s account information would not be shared with Facebook to improve ads and product experiences. But, there was a caveat.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;The Facebook family of companies will still receive and use this information for other purposes such as improving infrastructure and delivery systems, understanding how our services or theirs are used, securing systems, and fighting spam, abuse, or infringement activities.&lt;br /&gt;&lt;b&gt;WhatsApp Support Team statement on its website &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Facebook’s Commitment To ICO&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The ICO decided to delve deeper into what Facebook intended to do with the WhatsApp user data. Elizabeth Denham, Information Commissioner, ICO stated in her blog that users haven’t been given enough information about what Facebook plans to do with the information, and WhatsApp hasn’t got valid consent from users to share the information.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;I also believe users should be given ongoing control over how their information is used, not just a 30-day window.&lt;br /&gt;&lt;b&gt;Elizabeth Denham, Information Commissioner, ICO&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Denham further elaborated ICO’s stand - that it’s important users have control over their personal information, even if services don’t charge them a fee.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;We’ve set out the law clearly to Facebook, and we’re pleased that they’ve agreed to pause using data from U.K. WhatsApp users for advertisements or product improvement purposes.&lt;br /&gt;&lt;b&gt;Elizabeth Denham, Information Commissioner, ICO&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The ICO has now asked Facebook and WhatsApp to sign an undertaking committing to better explaining to users how their data will be used, and to giving users ongoing control over that information. Additionally, the ICO also wants WhatsApp to give users an unambiguous choice before Facebook starts using that information and for them to be given the opportunity to change that decision at any point in the future. Facebook and WhatsApp are yet to agree to this, Denham stated.&lt;/p&gt;
&lt;pre style="text-align: justify; "&gt;If Facebook starts using the data without valid consent, it may face enforcement action from my office.&lt;br /&gt;&lt;b&gt;Elizabeth Denham, Information Commissioner, ICO&lt;/b&gt;&lt;/pre&gt;
&lt;p style="text-align: justify; "&gt;In the U.K., protections in the European Data Protection Directive have been incorporated into local law via the Data Protection Act 1998. The ICO is both the privacy regulator and the transparency (right to information) regulator, Sunil Abraham, executive director at the Centre for Internet and Society pointed out. The regulator can issue enforcement notices and also fine errant actors in the market place, he said.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;This is a regulator with expertise, experience and teeth. Come May 25, 2018, the General Data Protection Regulation will come into force and this will give more comprehensive powers to the regulator to investigate and remedy cases like this. The regulator will take each principle from the Directive or Regulation and examine Facebook’s actions comprehensively before deciding on a response. &lt;br /&gt;&lt;b&gt;Sunil Abraham, Executive Director, Centre for Internet and Society&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, if the regulator determines that the principle of choice and consent has not been complied with, it can force Facebook to reverse its decisions and provide greater transparency and clearer choices, Abraham added.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Karmanya Sareen’s Grievance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Back home in India, just two months ago, Karmanya Sareen, a WhatsApp user, argued before the Delhi High Court against the company’s new privacy policy. The argument was that WhatsApp’s August 2016 notice to its users about the proposed change in the privacy policy violated the fundamental rights of users under Article 21 of the Constitution. Article 21 promises protection of life and personal liberty.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Proposed change in the privacy policy of WhatsApp would result in altering/changing the most valuable, basic and essential feature of WhatsApp i.e. the complete protection provided to the privacy of details and data of its users.&lt;br /&gt;&lt;b&gt;Karmanya Sareen vs Union of India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Delhi High Court struck down the Article 21 argument saying that the Supreme Court was still deliberating over including right to privacy as a fundamental right. It also pointed to WhatsApp’s 2012 Privacy Policy that allowed the company to transfer user information in case of an acquisition or merger with a third party. The 2012 policy also allowed WhatsApp to change the terms periodically.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, the Delhi High Court held that it is not open to the users now to contend that WhatsApp should be compelled to continue the same terms of service. However, the court gave WhatsApp two directions to protect users.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;WhatsApp to delete from its servers and not share with Facebook or its group companies any information belonging to users who delete their account.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Users who continue to be on WhatsApp, their existing information up to September 25, 2016 cannot be shared with Facebook or any of its group companies.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Did The Delhi High Court Go Easy On Facebook And WhatsApp?&lt;/h3&gt;
&lt;p&gt;Apar Gupta, an advocate specializing in information technology, points out that the directions given by the Delhi High Court to WhatsApp did not contemplate any additional protection to a user than what was already provided by WhatsApp.&lt;/p&gt;
&lt;p class="callout"&gt;The Delhi Court essentially reproduced WhatsApp’s privacy policy. It did not compel or provide any additional safeguard.&lt;br /&gt;&lt;b&gt;Apar Gupta, Lawyer&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Apar attributes this to the absence of a regulatory framework.&lt;/p&gt;
&lt;p class="callout"&gt;The lack of substantive safeguard and enforcement framework in India led to the Delhi High Court upholding WhatsApp’s new privacy policy.&lt;br /&gt;&lt;b&gt;Apar Gupta, Lawyer&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham added that the court did not examine the privacy policy from the perspective of data protection principles as would have been the case in EU or any other jurisdictions with a proper data protection law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The court too admitted this in its order that there existed a regulatory vacuum in India and asked TRAI to look into the matter. Facebook did not respond to BloombergQuint’s query on whether it would implement its U.K. commitments in India as well.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did'&gt;https://cis-india.org/internet-governance/news/bloomberg-quint-november-17-2016-payaswini-upadhyay-how-the-uk-got-a-better-deal-from-facebook-than-india-did&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Social Media</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-11-18T01:56:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll.in-march-24-2016-rajshekhar-anumeha-yadav-how-the-govt-gains-when-private-companies-use-aadhaar">
    <title>How the government gains when private companies use Aadhaar</title>
    <link>https://cis-india.org/internet-governance/news/scroll.in-march-24-2016-rajshekhar-anumeha-yadav-how-the-govt-gains-when-private-companies-use-aadhaar</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p&gt;This blog post by M. Rajshekhar and Anumeha Yadav was published in &lt;a href="http://scroll.in/article/805467/how-the-government-gains-when-private-companies-use-aadhaar"&gt;&lt;span&gt;Scroll.in&lt;/span&gt;&lt;/a&gt; on March 24, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Last week, Rajya Sabha made a last-ditch attempt to modify the contentious Aadhaar legislation introduced by the Modi government. Since the legislation was introduced as a Money Bill, the Upper House had no powers to amend it. It could only send back the bill with recommended amendments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the clauses which Rajya Sabha wished to amend related to the use of the Aadhaar number, the 12-digit unique identification number assigned after the collection of an individual’s biometrics in the form of fingerprints and iris scans.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause 57 said that anyone, whether an individual or a public or private organisation, could use the Aadhaar number. Rajya Sabha voted to restrict the use of the number to the government. After all, the government had justified introducing Aadhaar legislation as a Money Bill by stating that it would be used for delivering government subsidies and benefits funded out of the Consolidated Fund of India. If the delivery of government welfare is the aim of Aadhaar, why should private companies be allowed to use it?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Rajya Sabha recommended dropping clause 57 to limit the use of Aadhaar to government agencies. But the Lok Sabha rejected its recommendation, and cleared the Bill in its original form, paving the way for private companies to use Aadhaar.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Strikingly, however, well before the Bill was cleared, a private company started advertising its services as&lt;em&gt; &lt;/em&gt;“India’s 1st Aadhaar based mobile app to verify your maid, driver, electrician, tutor, tenant and everyone else instantly”&lt;em&gt;. &lt;/em&gt;In an &lt;a href="http://scroll.in/article/805201/the-future-is-here-a-private-company-claims-to-have-access-to-your-aadhaar-data"&gt;&lt;span style="text-decoration: underline;"&gt;article&lt;/span&gt;&lt;/a&gt; for &lt;em&gt;Scroll.in,&lt;/em&gt; legal researcher Usha Ramanathan said, “A private company is advertising that it can use Aadhaar to collate information about citizens at a price. It says this openly, even as a case about the privacy of the information collected for the biometrics-linked government database is still pending in the Supreme Court.”&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;LinkedIn for plumbers&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;The company that owns the mobile app called TrustID believes it is not doing anything wrong.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Monika Chowdhry, who heads the marketing division of Swabhimaan Distribution Services, the company that created TrustID, defended the app, saying it offers the valuable service of verifying people's identities. “In our day to day life, we do a lot of transactions with people – like maids or plumbers. Till now, you would have to trust them on what they said about themselves and what others said about the quality of their work.” The company is solving that problem, she said. “We are saying ask the person for their Aadhaar number and name and we will immediately tell you if they are telling the truth or not,” Chowdhry said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chowdhry said that over time, the Aadhaar number of individuals will be used to create a private verified database of TrustIDs. “Our plan is to create a rating mechanism,” she said. Referring to the option for maid, plumbers and other service providers on the app, she added: “People like you and me, we have Linkedin and Naukri. What do these people have?”&lt;/p&gt;
&lt;p&gt;How does the company use Aadhaar for verification and is there a reason to be concerned?&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Aadhaar authentication&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After you have logged into the TrustID app, you can choose from a dropdown menu of categories. You can send anyone's Aadhaar number, gender and name – or even biometrics – and the app claims it can verify their identity.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;figure class="cms-block-image cms-block"&gt;&lt;img src="https://c2.staticflickr.com/2/1607/25979673596_e8c67299f5_b.jpg" /&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The app performs Aadhaar authentication – which means it matches an Aadhaar number with the information stored against that number in the servers of the Unique Identification Authority of India. At the time an individual enrols for an Aadhaar number, they disclose their name, gender, address and give biometric scans. This information is held in a database maintained by the UID authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the criticisms of Aadhaar has been that the database of millions of people could be misused in the absence of a privacy law in India. First, there is the question about whether the biometrics are secure. Second, there are risks that accompany the uncontrolled use of unique numbers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response, the proponents of Aadhaar have said that the data is encrypted and secure, and can be accessed only by the authority. Those wanting to authenticate – or match – the Aadhaar number cannot directly access the database. They can simply make requests to the authority which authenticates the number for them.&lt;/p&gt;
&lt;p&gt;So far, it appeared that the authority was taking Aadhaar authentication requests solely from government agencies. For instance, to pay wages to workers of the rural employment guarantee programme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But TrustID’s example showed that private companies too have been sending authentication requests to the authority. This is not entirely surprising for those who have followed the blueprint for Aadhaar as envisioned by Nandan Nilekani, its founder. In an &lt;a class="link-external" rel="nofollow" href="http://www.mckinsey.com/industries/public-sector/our-insights/for-every-citizen-an-identity" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;interview&lt;/span&gt;&lt;/a&gt; in 2012, Nilekani spoke about creating a "thriving application system" using Aadhaar for both the public and private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Chowdhary said Swabhimaan Distribution Services registered as an Aadhaar authentication agency in November 2015, and the app was launched in January 2016.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;&lt;figure class="cms-block-image cms-block"&gt;&lt;img src="http://d1u4oo4rb13yy8.cloudfront.net/bnqkqkhrnf-1458797562.png" /&gt;&lt;/figure&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TrustID, or Swabhimaan, is not the only private company that has signed up as an authentication agency for Aadhaar. A quick Google search throws up the name of &lt;a class="link-external" rel="nofollow" href="https://www.alankit.com/egovernance.aspx?id=AUA" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;Alankit&lt;/span&gt;&lt;/a&gt;, which wants to “provide Aadhaar Enabled Services to its beneficiaries, clients and customers and can further verify the correctness of the Aadhaar numbers provided ” .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This shows the authority entered into agreements with private companies well before the Aadhaar law was passed in Parliament. The companies were running ahead of legislation in a space unbounded by law, and the UIDAI supported them in this.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unclear how many private companies were sending requests for Aadhaar authentication. &lt;em&gt;Scroll's&lt;/em&gt; questions to Harish Agrawal, the deputy director general of Aadhaar's Authentication and Application Division, remained unanswered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In an interview to &lt;em&gt;Business Standard&lt;/em&gt;, ABP Pandey, the director general of the UIDAI, said, "Usually what happens is that first a law is passed and thereafter the institutions are built and operations start. Here it has happened the other way around. The operations – the enrolment – is almost complete. The organisation is also there and has been working under executive orders. Now everything has to be kind of retrofitted in to the acts and the regulations."&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Why is this problematic?&lt;/strong&gt;&lt;/p&gt;
&lt;p&gt;For one, allowing private companies to use the Aadhaar number shows that the government’s stated aims of Aadhaar are misleading.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Both in the Supreme Court and in Parliament, the government has pushed for the use of Aadhaar as an instrument of welfare delivery. It justified passing Aadhaar legislation as a Money Bill by emphasising its importance to its welfare schemes. But as the case of Swabhimaan shows, Aadhaar's uses clearly go well beyond what the Bill's preamble describes as the “targeted delivery of subsidies, benefits and services, the expenditure for which is incurred from the Consolidated Fund of India.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Two, biometrics and unique identification numbers are a qualitatively new form of private information. As such, they bring unknown risks. India does not have a privacy law, and a law defining the use of biometrics and unique numbers is yet to be created. Delhi-based lawyer Apar Gupta said, “Even the Aadhaar Bill is yet to be approved by the president. Its rules are yet to be drafted. There is not enough legal guidance on its use.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three, companies like Swabhimaan would be in a position to construct databases of their own. Take TrustID. When it starts retaining Aadhaar numbers, and adds ratings to them, it creates a database of its own, which amounts to creating profiles of people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here, as Ramanathan said, the analogy with the networking site LinkedIn doesn't work. “When I have an account on LinkedIn, I update my data,” she said. But the TrustID app generates profiles out of the ratings that others give. Even if a prospective employee shares his/her Aadhaar number, it does not amount to free consent since getting a job hinges on giving that number.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the future, companies could use Aadhaar numbers in unknown ways, for instance, to combine multiple databases – banks, telecom companies, hospitals – to create detailed profiles of you and me that they can monetise. In effect, Aadhaar becomes a commercial instrument for private companies, and not just a mechanism for the delivery of government welfare.&lt;/p&gt;
&lt;p&gt;&lt;strong&gt;Gains for the government&lt;/strong&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sunil Abraham, the executive director of the Centre for Internet and Society, further explained the risks that arise when databases are combined. He cited the example of &lt;a class="link-external" rel="nofollow" href="https://www.iiitd.ac.in/research/news/ocean" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;OCEAN&lt;/span&gt;&lt;/a&gt;, the system created by researchers at the Indraprastha Institute of Information Technology to raise privacy awareness. OCEAN used publicly available information held by the government (voter identity card, PAN card, driving licence) to access details about citizens in Delhi. This public data was combined with people's Facebook and Twitter accounts, and the aggregated results were visualised as a family tree which showed information extending to a person’s parents, siblings and spouse.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"If a company like TrustID tied up with OCEAN, it can create a very detailed profile of an individual," said Abraham. "To continue with the example of a job-seeker, if a employer uses TrustID to verify applicants' identity or profiles, the App may combine a database like OCEAN to track that you logged into Twitter at, say 2 am on most nights. It can profile you as someone who might not turn up at work on time in the morning."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Abraham pointed out that the government too stands to gain by allowing private companies to use Aadhaar for authentication. "Use of authentication by private companies will mean UIDAI can have information on authentications performed on you, or by you, over time in the private sphere as well, say during such a job search," he said. For instance, when TrustID runs a search for your prospective employers using your Aadhaar number, the government knows you have applied for a job at certain companies. "This is unnecessary involvement of the government, giving it access to information in an area that it should not have access to."&lt;/p&gt;
&lt;p&gt;Over time, such Aadhaar authentication for private services in companies, hospitals, or hotels will "help the government gain granular data on citizens", he said.&lt;/p&gt;
&lt;p&gt;Perhaps that explains why the government rushed the Aadhaar Bill through Parliament, allowing little time and room for public debate.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll.in-march-24-2016-rajshekhar-anumeha-yadav-how-the-govt-gains-when-private-companies-use-aadhaar'&gt;https://cis-india.org/internet-governance/news/scroll.in-march-24-2016-rajshekhar-anumeha-yadav-how-the-govt-gains-when-private-companies-use-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-04-01T15:58:38Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india">
    <title>How Surveillance Works in India</title>
    <link>https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india</link>
    <description>
        &lt;b&gt;When the Indian government announced it would start a Centralized Monitoring System in 2009 to monitor telecommunications in the country, the public seemed unconcerned. When the government announced that the system, also known as C.M.S., commenced in April, the news didn’t receive much attention. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This article by Pranesh Prakash was &lt;a class="external-link" href="http://india.blogs.nytimes.com/2013/07/10/how-surveillance-works-in-india/"&gt;published in the New York Times&lt;/a&gt; on July 10, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;After a colleague at the Centre for Internet and Society wrote about the program and it was &lt;a href="http://www.hrw.org/news/2013/06/07/india-new-monitoring-system-threatens-rights"&gt;lambasted&lt;/a&gt; by Human Rights Watch, more reporters started covering it as a privacy  issue. But it was ultimately the revelations by Edward J. Snowden about  American surveillance that prompted Indians to ask questions about its  own government’s surveillance programs.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, we have a strange mix of great amounts of transparency and  very little accountability when it comes to surveillance and  intelligence agencies. Many senior officials are happy to anonymously  brief reporters about the state of surveillance, but there is very  little that is officially made public, and still less is debated in the  national press and in Parliament.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This lack of accountability is seen both in the way the Big-Brother  acronyms (C.M.S., Natgrid, T.C.I.S., C.C.T.N.S., etc.) have been rolled  out, as well as the murky status of the intelligence agencies.&lt;span id="more-66746"&gt; &lt;/span&gt; No intelligence agency in India has been created under an act of Parliament with &lt;a href="http://articles.timesofindia.indiatimes.com/2013-02-02/india/36703357_1_intelligence-agencies-ntro-intelligence-bureau"&gt;clearly established roles and limitations on powers&lt;/a&gt;, and hence &lt;a href="http://articles.timesofindia.indiatimes.com/2012-03-26/chennai/31239894_1_ib-intelligence-bureau-officer-r-n-kulkarni"&gt;there is no public accountability whatsoever&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The absence of accountability has meant that the government has &lt;a href="http://articles.economictimes.indiatimes.com/2006-02-04/news/27434344_1_illegal-phone-indian-telegraph-act-security-agencies"&gt;since 2006&lt;/a&gt; &lt;a href="http://articles.timesofindia.indiatimes.com/2011-05-12/india/29535755_1_security-agencies-cms-intercept"&gt;been working on the C.M.S.&lt;/a&gt;, which will integrate with the &lt;a href="http://mha.nic.in/writereaddata/13040930061_Tr-ITJ-290411.pdf"&gt;Telephone&lt;/a&gt; &lt;a href="http://www.coraltele.com/support/GetPresentations.ashx?id=33"&gt;Call&lt;/a&gt; &lt;a href="http://indiatoday.intoday.in/story/government-plans-to-tighten-phone-tapping-norms/1/137251.html"&gt;Interception System&lt;/a&gt; that is also being rolled out. The cost: around 8 billion rupees ($132  million) — more than four times the initial estimate of 1.7 billion —  and even more important, our privacy and personal liberty. Under their  licensing terms, all Internet service providers and telecom providers  are required to provide the government direct access to all  communications passing through them. However, this currently happens in a  decentralized fashion, and the government in most cases has to ask the  telecoms for metadata, like call detail records, visited Web sites, IP  address assignments, or to carry out the interception and provide the  recordings to the government. Apart from this, the government uses  equipment to gain access to &lt;a href="http://www.outlookindia.com/article.aspx?265192"&gt;vast quantities of raw data traversing the Internet across multiple cities&lt;/a&gt;, including the data going through the undersea cables that land in Mumbai.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With the C.M.S., the government will get &lt;a href="http://www.thehindu.com/news/national/indias-surveillance-project-may-be-as-lethal-as-prism/article4834619.ece"&gt;centralized access to all communications metadata and content&lt;/a&gt; traversing through all telecom networks in India. This means that the  government can listen to all your calls, track a mobile phone and its  user’s location, read all your text messages, personal e-mails and chat  conversations. It can also see all your Google searches, Web site  visits, usernames and passwords if your communications aren’t encrypted.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: center; "&gt;&lt;img src="https://cis-india.org/home-images/Surveillance.png" alt="Internet Surfing" class="image-inline" title="Internet Surfing" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;span class="caption"&gt;A man surfing a Facebook page at an internet cafe in Guwahati, Assam, on Dec. 6, 2011. &lt;br /&gt;Image Credit: &lt;/span&gt;&lt;span class="credit"&gt;Anupam Nath/Associated Press&lt;/span&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;You might ask: Why is this a problem when the government already had  the same access, albeit in a decentralized fashion? To answer that  question, one has to first examine the law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are no laws that allow for &lt;i&gt;mass&lt;/i&gt; surveillance in India.  The two laws covering interception are the Indian Telegraph Act of 1885  and the Information Technology Act of 2000, as amended in 2008, and they  restrict lawful interception to time-limited and targeted  interception.The targeted interception both these laws allow ordinarily  requires case-by-case authorization by either the home secretary or the  secretary of the department of information technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, the colonial government framed better privacy  safeguards into communications interception than did the  post-independence democratic Indian state. The Telegraph Act mandates  that interception of communications can only be done on account of a  public emergency or for public safety.  If either of those two  preconditions is satisfied, then the government may cite any of the  following five reasons: “the sovereignty and integrity of India, the  security of the state, friendly relations with foreign states, or public  order, or for preventing incitement to the commission of an offense.”  In 2008, the Information Technology Act copied much of the interception  provision of the Telegraph Act but removed the preconditions of public  emergency or public safety, and expands the power of the government to  order interception for “investigation of any offense.” The IT Act thus  very substantially lowers the bar for wiretapping.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from these two provisions, which apply to interception, there  are many laws that cover recorded metadata, all of which have far lower  standards. Under the Code of Criminal Procedure, no court order is  required unless the entity is seen to be a “postal or telegraph  authority” — and generally e-mail providers and social networking sites  are not seen as such.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unauthorized access to communications data is not punishable per se, which is why a private detective who gained access to &lt;a href="http://articles.timesofindia.indiatimes.com/2013-04-17/india/38615115_1_anurag-singh-arvind-dabas-naushad-ahmad-khan"&gt;the cellphone records of Arun Jaitley&lt;/a&gt;,  a Bharatiya Janata Party leader, has been charged under the weak  provision on fraud, rather than invasion of privacy. While there is a  provision in the Telegraph Act to punish unlawful interception, it  carries a far lesser penalty (up to three years of imprisonment) than  for a citizen’s failure to assist an agency that wishes to intercept or  monitor or decrypt (up to seven years of imprisonment).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To put the ridiculousness of the penalty in &lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguards-for-interception-monitoring-and-decryption-of-information-rules-2009/"&gt;Sections 69&lt;/a&gt; and &lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;69&lt;/a&gt;&lt;a href="https://cis-india.org/internet-governance/resources/it-procedure-and-safeguard-for-monitoring-and-collecting-traffic-data-or-information-rules-2009"&gt;B&lt;/a&gt; of the IT Act provision in perspective, an Intelligence Bureau officer who spills national secrets &lt;a href="http://www.vakilno1.com/bareacts/laws/the-intelligence-organisations-restriction-of-rights-act-1985.html"&gt;may be imprisoned up to three years. &lt;/a&gt;And  under the Indian Penal Code, failing to provide a document one is  legally bound to provide to a public servant, the punishment can be &lt;a href="http://indiankanoon.org/doc/54229/"&gt;up to one month’s imprisonment&lt;/a&gt;.  Further, a citizen who refuses to assist an authority in decryption, as  one is required to under Section 69, may simply be exercising her &lt;a href="http://lawcommissionofindia.nic.in/reports/180rpt.pdf"&gt;constitutional right against self-incrimination&lt;/a&gt;. For these reasons and more, these provisions of the IT Act are arguably unconstitutional.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As bad as the IT Act is, legally the government has done far worse.  In the licenses that the Department of Telecommunications grants  Internet service providers, cellular providers and telecoms, there are  provisions that require them to provide direct access to all  communications data and content even without a warrant, which is not  permitted by the existing laws on interception. The licenses also force  cellular providers to have ‘bulk encryption’ of less than 40 bits.  (Since G.S.M. network encryption systems like A5/1, A5/2, and A5/3 have a  fixed encryption bit length of 64 bits, providers in India have been  known use A5/0, that is, no encryption, thus meaning any person — not  just the government — can use off-the-air interception techniques to  listen to your calls.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cybercafes (but not public phone operators) are required to maintain  detailed records of clients’ identity proofs, photographs and the Web  sites they have visited, for a minimum period of one year. Under the  rules designed as India’s data protection law (oh, the irony!),  sensitive personal data has to be shared with government agencies, if  required for “purpose of verification of identity, or for prevention,  detection, investigation including cyber incidents, prosecution, and  punishment of offenses.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Along similar lines, in the rules meant to say when an Internet  intermediary may be held liable for a user’s actions, there is a  provision requiring the Internet company to “provide information or any  such assistance to government agencies legally authorized for  investigative, protective, cybersecurity activity.” (Incoherent, vague  and grammatically incorrect sentences are a consistent feature of laws  drafted by the Ministry of Communications and IT; one of the telecom  licenses states: “The licensee should make arrangement for monitoring  simultaneous calls by government security agencies,” when clearly they  meant “for simultaneous monitoring of calls.”)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a landmark 1996 judgment, the Indian Supreme Court  held that &lt;a href="http://indiankanoon.org/doc/87862/"&gt;telephone tapping is a serious invasion of an individual’s privacy&lt;/a&gt; and that the citizens’ right to privacy has to be protected from abuse  by the authorities. Given this, undoubtedly governments must have  explicit permission from their legislatures to engage in any kind of  broadening of electronic surveillance powers. Yet, without introducing  any new laws, the government has surreptitiously granted itself powers —  powers that Parliament hasn’t authorized it to exercise — by sneaking  such powers into provisions in contracts and in subordinate legislation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india'&gt;https://cis-india.org/internet-governance/blog/nytimes-july-10-2013-pranesh-prakash-how-surveillance-works-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-15T10:20:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch">
    <title>How private companies are using Aadhaar to try to deliver better services (but there's a catch)</title>
    <link>https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch</link>
    <description>
        &lt;b&gt;They are gathering more information on you.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;section class="columns large-6 normal-article-content scroll-article-content article-content"&gt;
&lt;div class="article-body"&gt;
&lt;p&gt;The article by M. Rajshekhar was &lt;a class="external-link" href="http://scroll.in/bulletins/40/delays-in-indias-infrastructure-projects-has-a-large-impact-on-key-social-indicators"&gt;published in Scroll.in&lt;/a&gt; on December 22, 2016. Sunil Abraham was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;In  2006, Ajay Trehan set up AuthBridge, a background verification company  in Gurgaon. That was a time when business process outsourcing was  booming. Global companies like Citibank were relocating back-office  functions to India. Outfits like AuthBridge sprang up in response to  help these companies find qualified staffers. They vetted applicants by  running identity checks, verifying education and employment records,  doing reference checks and more.&lt;/p&gt;
&lt;p&gt;Ten years later, AuthBridge’s  client profile has changed. With rising insecurity over crimes in  India’s cities, like the December 2012 gangrape in Delhi, or the rape of  a young woman in an Uber taxi in 2014, local companies – sizeably from  e-commerce and businesses with delivery services – have also started  vetting employees and partners to check if they have any criminal  history.  “Now, we have about 700-800 clients,” said Trehan. “Of them,  just 20%-30% are foreign companies.”&lt;/p&gt;
&lt;p&gt;AuthBridge’s verification  process has changed too. Earlier, its employees used to physically  verify the credentials of an applicant by travelling to her school or  college, meeting her previous employer, vetting her identity papers with  the government department that issued them, and so on.&lt;/p&gt;
&lt;p&gt;Now they simply run a query on an electronic database.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Aadhaar enters the private sector&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Aadhaar,  as India’s Unique Identity Project is called, aims to give a 12-digit  unique identity number to all residents by collecting their fingerprint  and iris scans. As of September, its database, maintained by the Unique  Identity Authority of India, held the names, addresses and biometric  information of more than 105 crore people.&lt;/p&gt;
&lt;p&gt;The project was created  by the United Progressive Alliance government in 2009 to reduce  leakages in the country’s welfare programmes.&lt;/p&gt;
&lt;p&gt;But, quietly, a  range of private sector companies have started using it. This includes  verification firms like Authbridge, banks like HDFC, telecommunications  companies like Reliance Jio, among others.&lt;/p&gt;
&lt;p&gt;So far, most  discussions on Aadhaar have focused on its utility for welfare delivery  and the risk of government surveillance. But as private sector companies  incorporate Aadhaar into their systems, fresh questions and concerns  are emerging about what this means. A recent tweet by a journalist that  went viral encapsulated these concerns.&lt;/p&gt;
&lt;figure class="cms-block-embed-twitter cms-block-embed cms-block"&gt; &lt;/figure&gt;
&lt;p&gt;To understand the rewards and risks of the use of Aadhaar by  private companies, here is a detailed look at how they are using it.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Five ways of using Aadhaar&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;The first way in which companies are using Aadhaar is &lt;b&gt;pure authentication. &lt;/b&gt;This  is how Authbridge uses Aadhaar. It sends a name and Aadhaar number to  the Unique Identity Authority’s server, which responds to say whether  they have matched.&lt;/p&gt;
&lt;p&gt;Apart from background verification companies,  Aadhaar-based authentication can also be used by employers. “A factory  hiring women or a security agency hiring guards and wanting to be sure  these people are who they claim to be,” said Pramod Varma, the chief  architect and technology advisor for the Aadhaar project.&lt;/p&gt;
&lt;p&gt;It could  also be used by regulated entities with strong Know Your Customer or  KYC norms like banks or telecommunications companies. In the old days of  branch-based banking, KYC was not a problem, said Varma, since “the  bank manager knew all his customers”. But now, KYC is much harder since  banks have moved to “core banking with millions of accounts in the  server”. Instant Aadhaar-authentication, he said, is useful for  verifying customers.&lt;/p&gt;
&lt;p&gt;The second is &lt;b&gt;authentication plus&lt;/b&gt;.  Here, at the time of authentication, a company also downloads the  customer’s data from the Aadhaar database. This is what companies like  Reliance Jio are doing.&lt;/p&gt;
&lt;p&gt;When a customer provides his Aadhaar  number to the company, the company not only runs a query on the Aadhaar  database to verify the name and number, it also downloads other  information about the customer held on the server, like address, date of  birth and gender.&lt;/p&gt;
&lt;p&gt;This data can be used to electronically fill  out the Know Your Customer forms, replacing what is right now a manual  process, said Anupam Varghese, the head (products) of Eko India  Financial Services, a financial services startup in the phone banking  and remittances segment.&lt;/p&gt;
&lt;p&gt;It is a disruptive proposition that  companies find useful. In India, the cost of enrolling customers is so  high, said Abhishek Sinha, the founder of Eko, that it prices a set of  financial products beyond the reach of most Indians. “Authenticating a  credit card customer and vetting her identity papers will cost anywhere  between Rs 150-Rs 200,” he said. A company can recover that investment  only if the customer racks up at least Rs 10,000 on the card, assuming a  2% margin on card transactions.&lt;/p&gt;
&lt;p&gt;With its instant authentication  and automatic form filling, Aadhaar-based electronic Know Your Customer,  said Sinha, slashes those costs and makes it easier for companies to  offer financial products which become viable even with a smaller volume  of transactions. This allows the growth of financial products for less  affluent customer segments.&lt;/p&gt;
&lt;p&gt;Subsequently, these companies might pad up those databases by adding their own data. This is a third model of using Aadhaar: &lt;b&gt;authentication plus private database&lt;/b&gt;.&lt;/p&gt;
&lt;p&gt;For instance, &lt;a href="http://scroll.in/article/805467/how-the-government-gains-when-private-companies-use-aadhaar"&gt;TrustID&lt;/a&gt;,  a mobile app which claims it can verify “your maid, driver,  electrician, tutor, tenant and all service professionals” using Aadhaar,  wants users to rate the services of the people they eventually employ.  In effect, it is &lt;a href="http://scroll.in/article/805467/how-the-government-gains-when-private-companies-use-aadhaar"&gt;creating&lt;/a&gt; a private database.&lt;/p&gt;
&lt;p&gt;Others, like Eko, are adding financial transaction histories to the Aadhaar data.&lt;/p&gt;
&lt;p&gt;While these three uses are built around Aadhaar-based authentication, the remaining three uses – &lt;b&gt;database sharing, data broking, &lt;/b&gt;&lt;b&gt;deduplication&lt;/b&gt;&lt;b&gt; &lt;/b&gt;– pivot around use of just the Aadhaar number. They are based on recent changes in how companies use customer data.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;The customer data boom&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Customer data has acquired centrality for several Indian companies, particularly startups in e-commerce and financial services.&lt;/p&gt;
&lt;p&gt;In  some sectors, Varma said, “the cost of switching [between rival  companies] is very low,” which heightens the need for customisation.  “The better you can serve, they more sticky you get for a customer.” In  other sectors, said Varghese, competition chips away at margins. Which  is another reason to try and come up with better services and products.&lt;/p&gt;
&lt;p&gt;This is where data can help.&lt;/p&gt;
&lt;p&gt;In  a conversation in October, Nandan Nilekani, software entrepreneur and  the first chairperson of the Unique Identity Authority of India,  explained why. “Companies like Ola compete with global companies like  Uber which have a tremendous advantage in that they have more data –  more customers globally – and better algorithms,” he said. If Ola has 5  million customers, Uber has 100 million. Which means Uber’s algorithms –  thanks to pattern recognition and machine learning – will be more  accurate.&lt;/p&gt;
&lt;p&gt;For all these reasons, said Varma, companies in a  handful of business verticals are trying to create “a 360 degree view of  their customer”.&lt;/p&gt;
&lt;p&gt;What has enabled this is a couple of  technological trends. The ability to store and process data, said  Nilekani, has gone up enormously in the last 15 years. At the same time,  data itself has proliferated as electronic devices like mobile phones  create records of voice, photos, messages and the locations of  customers.&lt;/p&gt;
&lt;p&gt;“All this is realtime data. So, on scale, speed and frequency, we have seen a jump,” said Nilekani.&lt;/p&gt;
&lt;p&gt;This rising appetite for data is resulting in a couple of novel outcomes.&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;Enter, the sharing of customer data&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Indian companies have begun sharing databases.&lt;/p&gt;
&lt;p&gt;A  good example is an experimental partnership between Eko, the banking  and remittances company, and Capital Float, a financial services startup  which gives short term loans.&lt;/p&gt;
&lt;p&gt;The two companies worked out an  arrangement where Eko shared a part of its database about its  distributors with Capital Float. This shared information contained  aggregated and anonymised information on distributors and their working  capital positions, said Varghese. Capital Float evaluated the database  and came back with a list of distributors it could lend to. Eko, then,  forwarded these offers to the distributors. After taking their consent,  data about the distributors who were interested in the loans was shared  with Capital Float.&lt;/p&gt;
&lt;p&gt;On the surface, this is a counter-intuitive  development: if customer data holds the key to competitive advantage,  companies should closely safeguard their data.&lt;/p&gt;
&lt;p&gt;But as it turns out, there are strong reasons to share data.&lt;/p&gt;
&lt;p&gt;Both  Eko and Capital Float, for instance, are small, specialised players in  the financial services market which is dominated by banks. Data sharing  is one way to compete with banks by offering complementary services to  customers.&lt;/p&gt;
&lt;p&gt;It is not clear how endemic data-sharing will get.  According to Varma, it will be used selectively. “I cannot see  organisations sharing databases at will,” he said. “They will be shared  only if they can be used to offer an additional service to the client.”&lt;/p&gt;
&lt;p&gt;But a programmer who works at iSpirt, a product software evangelising association&lt;b&gt; &lt;/b&gt;based  in Bangalore, and who did not want to be identified, said the trend  will grow. In the financial sector, as new players like mobile wallet  companies acquire more customers, banks that refuse to share data will  miss out on emergent markets, he said. “Keeping everything behind closed  doors – not participating in data exchanges – is now harmful,” he said.&lt;/p&gt;
&lt;p&gt;Sunil Abraham, who heads the Centre For Internet and Society,  foresees the rise of another kind of data-sharing – by companies that  aggregate customer data from multiple sources and market that to  clients. These could be data brokers like US-based Acziom, he said.  These could also be more specialised firms like medical transcription  companies, which simultaneously serve hospitals, insurance and  pharmaceutical companies.&lt;/p&gt;
&lt;p&gt;The question is: what does all this have to do with Aadhaar?&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;The utility of Aadhaar&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Aadhaar makes it easier to &lt;b&gt;compare and combine diverse databases.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;This is what India’s microfinance companies are doing. As &lt;i&gt;Scroll.in&lt;/i&gt; reported &lt;a href="http://scroll.in/article/817366/despite-the-supreme-court-you-need-aadhaar-to-get-a-loan-from-microfinance-companies"&gt;recently&lt;/a&gt;,  Microfinance Institutions Network, an association of microlenders, has  told its member companies to seed the Aadhaar numbers of their borrowers  into their databases. By searching the databases for the Aadhaar number  of a prospective borrower, it will be possible to identify if she has  already taken too many loans.&lt;/p&gt;
&lt;p&gt;This is a scenario Nilekani bristles  at. “You do not need Aadhaar for that,” he said. “You can triangulate  databases using email or phone number or name.”&lt;/p&gt;
&lt;p&gt;But the iSpirt  programmer said, “With Aadhaar, the level of certainty is higher than  what you would get by using name, phone number or email.” Between  databases, the spelling of names might vary. Phone numbers change,  especially in a country like India where prepaid mobile connections  outnumber postpaid connections. Only a small part of the country’s  population uses email. With Aadhaar, said the programmer, it gets easier  to correlate databases.&lt;/p&gt;
&lt;p&gt;Aadhaar, added Varma, can also be used  to clean up databases. Banks, he said, can use the Aadhaar number to  create better customer profiles by identifying all accounts owned by a  person. This is the fifth use – &lt;b&gt;deduplication&lt;/b&gt;&lt;b&gt;. &lt;/b&gt;&lt;/p&gt;
&lt;h3 class="cms-block-heading cms-block"&gt;&lt;b&gt;What it all means&lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;The  implications are obvious. A lot of companies already had databases  about their customers. Now, as Nilekani said, technology is allowing the  collection of ever greater amounts of information about us. The sharing  of databases means companies will have ever more detailed customer  profiles.&lt;/p&gt;
&lt;p&gt;In a sense, we are entering a future where multiple  databases – including several that we are not even aware of – will  contain information about us. A hospital and an insurance company might  share their records. Or intermediary companies, which service both of  them, might create their own databases.&lt;/p&gt;
&lt;p&gt;This information will  materially affect our lives. As already happens online, companies will  increasingly base their products on algorithms that parse data about our  behaviour and then offer a customised price – which could be geared to  serve or exploit us.&lt;/p&gt;
&lt;p&gt;These algorithms, as &lt;i&gt;Propublica&lt;/i&gt; &lt;a class="link-external" href="https://www.propublica.org/series/machine-bias" rel="nofollow" target="_blank"&gt;reported&lt;/a&gt;, can be &lt;a class="link-external" href="https://www.propublica.org/series/machine-bias" rel="nofollow" target="_blank"&gt;opaque&lt;/a&gt;.&lt;/p&gt;
&lt;p&gt;In  a sense, much of this is a familiar trajectory. The United States too,  as the iSpirt programmer said, “saw a lot of irresponsible data sharing  without enough control for civilians”.&lt;/p&gt;
&lt;p&gt;That is where India is heading as well. As &lt;i&gt;Scroll &lt;/i&gt;noted in its &lt;a href="http://scroll.in/article/805467/how-the-government-gains-when-private-companies-use-aadhaar"&gt;article&lt;/a&gt; about TrustID, when the company creates scores for the workers who use  its app, they might not always be aware of that rating – or be in a  position to challenge that rating.&lt;/p&gt;
&lt;p&gt;There are large questions here.  Who owns the data about you in a company’s database? Take your  information in, say, Ola’s database – the address from where you get  picked up or dropped, the phone number, the places you visit most often.  Is the data owned by you, Ola or the driver? Should you have a say if a  company wants to share this data? If you grant permission, how does one  ensure it is used correctly?&lt;/p&gt;
&lt;p&gt;Right now, as the next story in this series will show, this is a poorly regulated landscape.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;This is the third part in a series on the expansion of Aadhaar and the concerns around it. The first two parts can be read &lt;a href="http://scroll.in/tags/38792/identity-project"&gt;here.&lt;/a&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;i class="mail-us-section"&gt;We welcome your comments at &lt;a href="mailto:?Subject=How%20private%20companies%20are%20using%20Aadhaar%20to%20try%20to%20deliver%20better%20services%20%28but%20there%27s%20a%20catch%29&amp;amp;to=letters@scroll.in" target="_blank"&gt;letters@scroll.in.&lt;/a&gt;&lt;/i&gt; 
&lt;ul class="article-tags-list"&gt;
&lt;/ul&gt;
&lt;/section&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch'&gt;https://cis-india.org/internet-governance/news/scroll-m-rajshekhar-how-private-companies-are-using-aadhaar-to-deliver-better-services-but-theres-a-catch&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-12-23T02:04:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindustan-times-may-1-2019-aayush-rathi-and-ambika-tandon-how-privacy-fares-in-the-2019-election-manifestos">
    <title>How privacy fares in the 2019 election manifestos | Opinion</title>
    <link>https://cis-india.org/internet-governance/blog/hindustan-times-may-1-2019-aayush-rathi-and-ambika-tandon-how-privacy-fares-in-the-2019-election-manifestos</link>
    <description>
        &lt;b&gt;We now have a rights-based language around privacy in the mainstream political discourse but that’s where it ends.&lt;/b&gt;
        &lt;p&gt;The article by Aayush Rathi and Ambika Tandon was &lt;a class="external-link" href="https://www.hindustantimes.com/analysis/how-privacy-fares-in-the-2019-election-manifestos/story-C7rPD7mG8wMr3D4tZcQ4pK.html"&gt;published in the Hindustan Times&lt;/a&gt; on May 1, 2019.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In August 2017, the Supreme Court, in Puttaswamy vs Union of India, unanimously recognised privacy as a fundamental right guaranteed by the Constitution. Before the historic judgment, the right to privacy had remained contested and was determined on a case-by-case basis. By understanding privacy as the preservation of individual dignity and autonomy, the judgment laid the groundwork to accommodate subsequent landmark legislative moves — varying from decriminalising homosexuality to limiting the use of the Aadhaar by private actors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Reflecting the importance gained by privacy within public imagination, the 2019 elections are the first time it finds mention across major party manifestos. In 2014, the Communist Party of India (Marxist) was the only political party to have made commitments to safeguarding privacy, albeit in a limited fashion. For the 2019 election, both the Congress and the CPI(M) promise to protect the right to privacy if elected to power. The Congress promises to “pass a law to protect the personal data of all persons and uphold the right to privacy”. However, it primarily focuses on informational privacy and its application to data protection, limited to the right of citizens to control access and use of information about themselves.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CPI(M) focuses on privacy more broadly while promising to protect against “intrusion into the fundamental right to privacy of every Indian”. In a similar vein, both the Congress and the CPI(M) also commit to bringing about surveillance reform by incorporating layers of oversight. The CPI(M) manifesto further promises to support the curtailment of mass surveillance globally. It promises to enact a data privacy law to protect against “appropriation/misuse of private data for commercial use”, albeit without any reference to misuse by government agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the Samajwadi Party manifesto proposes the reintroduction of the controversial NATGRID, an overarching surveillance tool proposed by the Congress in the aftermath of the 26/11 Mumbai attacks. In this backdrop, digital rights for individuals are conspicuous by their absence from the Bharatiya Janata Party’s manifesto. Data protection is only seen in a limited sense as being required in conjunction with increasing digital financialisation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The favourable articulation of privacy in some of the manifestos should be read along with other commitments across parties around achieving development goals through the digital economy. Central to the operation of this is aggregating citizen data. Utilising this aggregated data for predictive abilities is key to initiatives being proposed in the manifestos —digitising health records, a focus on sunrise technologies, such as machine learning and big data, and readiness for “Industry 5.0” are some examples.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The right is then operationalised in a manner that leads data subjects to pick between their privacy and accessing services being provided by the data collector. Relinquishing privacy becomes the only option especially when access to welfare services is at stake.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discourse around privacy in India has historically been used to restrict individual freedoms. In the Puttaswamy case, Justice DY Chandrachud, in his plurality opinion, acknowledges feminist scholarship to broaden the understanding of the right to privacy to one that protects bodily integrity and decisional privacy for marginalised communities. This implies protection against any manner of State interference with decisions regarding the self, and, more broadly, the right to create a private space to allow the personality to develop without interference. This includes protection from undue violations of bodily integrity such as protecting the freedom to use public spaces without fear of harassment, and criminalising marital rape.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the articulation of privacy in the manifestos is a good start, it should be much more. Governance must implement the right to look beyond the individualised conception of privacy so as to allow it to support a whole range of freedoms, rather than limiting it to data protection. This could take the shape of modifying traditional legal codes. Family law, for instance, could be reshaped to allow for greater exercise of agency by women in marriage, guardianship, succession etc. Criminal law, too, could render inadmissible evidence obtained through unjustified privacy violations. The manifestos do mark the entry of a rights-based language around privacy and bodily integrity into mainstream political discourse. However, there appears to be a lack of imagination of the extent to which these protections can be used to further individual liberty collectively.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindustan-times-may-1-2019-aayush-rathi-and-ambika-tandon-how-privacy-fares-in-the-2019-election-manifestos'&gt;https://cis-india.org/internet-governance/blog/hindustan-times-may-1-2019-aayush-rathi-and-ambika-tandon-how-privacy-fares-in-the-2019-election-manifestos&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi and Ambika Tandon</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-05-02T01:49:39Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/bloomberg-udbhav-tiwari-october-22-2016-how-long-have-banks-known-about-debit-card-fraud">
    <title>How Long Have Banks Known About The Debit Card Fraud?  </title>
    <link>https://cis-india.org/internet-governance/blog/bloomberg-udbhav-tiwari-october-22-2016-how-long-have-banks-known-about-debit-card-fraud</link>
    <description>
        &lt;b&gt;The recent security breach in an Indian payment switch provider, confirmed earlier this week by the National Payments Corporation of India Ltd (NPCIL), has forced domestic banks into damage control mode over the past few days.&lt;/b&gt;
        &lt;p&gt;The article was &lt;a class="external-link" href="http://www.bloombergquint.com/opinion/2016/10/21/how-long-have-banks-known-about-the-debit-card-fraud"&gt;published by Bloomberg&lt;/a&gt; on October 22, 2016.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The breach was detected when various customers began to lodge complaints  with their banks about unauthorised transactions on their accounts,  which upon investigation were said to originate from a foreign location  such as China. The security breach has affected actively at least 641  customers to the tune of Rs 1.8 crore, with lakhs more being affected by  the pro-active measures (including card revocation) being taken by  banks to prevent further financial losses.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Surprisingly little is known, however, about the nature of the attack responsible for the breach, the extent or scope of damage it has caused and the sufficiency of the countermeasures being initiated by the banks against the attacks. This article will talk about these aspects of the attack and also suggest normative measures that can be carried out to minimize harm and prevent such attacks in the future.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Modus Operandi&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to reports, the compromise may have happened at the level of the Hitachi Payment Services, which is a payment services provider which operates, among other financial services, ATMs for a variety of banks across the country. One or a certain number of ATMs were apparently compromised by a malware, which then infected the payment services provider network, leading to a far larger potential target area than just the physical ATMs for malware to act against. The malware could have infected the payment switch provider via physically being uploaded onto vulnerable ATM machines, which are known to run out-dated embedded operating systems with various documented loopholes that are rarely patched. The malware then could have recorded the details of the cards used on the infected ATMs (or even in the network generally) and then, via the same compromised network, transmitted confidential details, including ATM pins and CVV numbers, to the operators of the malware.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Malware.jpg/@@images/13c6e6b2-e9be-4056-bd2d-ad540cff88dc.jpeg" alt="Malware" class="image-inline" title="Malware" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The attack could have also occurred from some other vulnerable part of the payment network, such as a payment switch within the bank itself, making it far more dangerous as it still maybe be active on parts of the network within the bank and would have access to a far wider range &amp;amp; variety of information than a mere ATM. There is no real way to know if the threat has been even contained, forget neutralised, as the audits being carried out by PCI-DSS authorised agencies have been on-going for the past month and their reports are not due at least another 15 days, as intimated by NPCIL.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Massive Financial Implications&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Bank.png/@@images/5a9bda35-ccdc-4895-a841-609c4c7c0958.png" alt="Bank" class="image-inline" title="Bank" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Policemen guard the banking hall of a State Bank of India branch in New Delhi. (Photographer: Sondeep Shankar/Bloomberg News) &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The compromise of these details, regardless of the source of the compromise, has massive financial implications. This is because various international services allow debit/credit cards to be used only with the card number, expiry date, name &amp;amp; CVV number. They do not require the use of ATM Pins or an OTP (one time password) sent to a mobile phone for online transactions. In fact, unlike India where the RBI mandates OTPs for debit cards, this CVV based simplified online usage is the standard practice of using ATM Cards digitally in most of the developed world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This would mean that merely changing ATM pins, something which SBI alleges less than 7 percent of its customers had done prior to all 6 lakh cards being blocked, would serve as almost no protection if the cards are enabled for international online transactions. The fact that most of the dubious, unauthorised financial transactions are occurring from foreign locations probably demonstrates that it is these kinds of internationally enabled cards that are being targeted for this sort of an attack.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Are Banks Concealing Information?&lt;/h3&gt;
&lt;table class="invisible"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/copy_of_Bank.png/@@images/0f5235cb-4909-4885-b12e-d83bb4202230.png" alt="Bank" class="image-inline" title="Bank" /&gt;&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;A customer exits a Yes Bank Ltd. automated teller machine (ATM) in Ahmedabad. (Photographer: Dhiraj Singh/Bloomberg)&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;The absence of data/security breach laws in India is being sharply felt as there as has been an abject lack of clarity and information from the banking sector and the government regarding the attack. Over 47 states in the USA and most of the countries in the EU have enacted strict data security breach laws that mandate public intimation &amp;amp; disclosure of key information pertaining to the attack along with detailed containment measures. The presence of such a law in India would have gone a long way in preventing the breach from being under the wraps for so long (it occurred at the bank level in September, almost a month ago) and also ensured far more vigilant active compliance by corporations &amp;amp; banks to international security standards and best practices. For now, the only true countermeasure to prevent future harm to affected card holders is for all affected cards to be revoked by the banks and new cards being issued to affected customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Constant vigilance &amp;amp; comprehensive security audits by banks to detect affected cards and active protection for customers, using financial and identity insurance services such as AllClear ID Plus (used by Sony in the 2011 Playstation Hack) will go a long way in mitigating the harm of the breach. The banking industry, government &amp;amp; security agencies should all learn from this breach and a combination of new legislation, updated industry practices and consumer awareness is necessary for proactive &amp;amp; reactive actions in the future.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/bloomberg-udbhav-tiwari-october-22-2016-how-long-have-banks-known-about-debit-card-fraud'&gt;https://cis-india.org/internet-governance/blog/bloomberg-udbhav-tiwari-october-22-2016-how-long-have-banks-known-about-debit-card-fraud&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>tiwari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Cyber Security</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2016-10-22T08:06:51Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/medianama-february-18-2021-amber-sinha-data-protection-bill-consent-clause-state-function">
    <title>How Function Of State May Limit Informed Consent: Examining Clause 12 Of The Data Protection Bill</title>
    <link>https://cis-india.org/internet-governance/blog/medianama-february-18-2021-amber-sinha-data-protection-bill-consent-clause-state-function</link>
    <description>
        &lt;b&gt;The collective implication of leaving out ‘proportionality’ from Clause 12 is to provide very wide discretionary powers to the state.&lt;/b&gt;
        &lt;p&gt;The blog post was &lt;a class="external-link" href="https://www.medianama.com/2022/02/223-data-protection-bill-consent-clause-state-function/"&gt;published in Medianama&lt;/a&gt; on February 18, 2022. This is the first of a two-part series by Amber Sinha.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In 2018, hours after the Committee of Experts led by Justice Srikrishna Committee released their report and draft bill, I wrote &lt;a href="https://www.livemint.com/Opinion/zY8NPWoWWZw8AfI5JQhjmL/Draft-privacy-bill-and-its-loopholes.html"&gt;an opinion piece&lt;/a&gt; providing my quick take on what was good and bad about the bill. A section of my analysis focused on Clause 12 (then Clause 13) which provides for non-consensual processing of personal data for state functions. I called this provision a ‘carte-blanche’ which effectively allowed the state to process a citizen’s data for practically all interactions between them without having to deal with the inconvenience of seeking consent. My former colleague, Pranesh Prakash &lt;a href="https://twitter.com/pranesh/status/1023116679440621568"&gt;pointed out&lt;/a&gt; that this was not a correct interpretation of the provision as I had missed the significance of the word ‘necessary’ which was inserted to act as a check on the powers of the state. He also pointed out, correctly, that in its construction, this provision is equivalent to the position in European General Data Protection Regulation (Article 6 (i) (e)), and is perhaps even more restrictive.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While I agree with what Pranesh says above (his claims are largely factual, and there can be no basis for disagreement), my view of Clause 12 has not changed. While Clause 35 has been a focus of considerable discourse and analysis, for good reason, I continue to believe that Clause 12 remains among the most dangerous provisions of this bill, and I will try to unpack here, why.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Data Protection Bill 2021 has a chapter on the grounds for processing personal data, and one of those grounds is consent by the individual. The rest of the grounds deal with various situations in which personal data can be processed without seeking consent from the individual. Clause 12 lays down one of the grounds. It allows the state to process data without the consent of the individual in the following cases —&lt;/p&gt;
&lt;p&gt;a)  where it is necessary to respond to a medical emergency&lt;br /&gt;b)  where it is necessary for state to provide a service or benefit to the individual&lt;br /&gt;c)  where it is necessary for the state to issue any certification, licence or permit&lt;br /&gt;d)  where it is necessary under any central or state legislation, or to comply with a judicial order&lt;br /&gt;e)  where it is necessary for any measures during an epidemic, outbreak or public health&lt;br /&gt;f)  where it is necessary for safety procedures during disaster or breakdown of public order&lt;/p&gt;
&lt;p&gt;In order to carry out (b) and (c), there is also the added requirement that the state function must be authorised by law.&lt;/p&gt;
&lt;h2&gt;Twin restrictions in Clause 12&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The use of the words ‘necessary’ and ‘authorised by law’ is intended to pose checks on the powers of the state. The first restriction seeks to limit actions to only those cases where the processing of personal data would be necessary for the exercise of the state function. This should mean that if the state function can be exercised without non-consensual processing of personal data, then it must be done so. Therefore, while acting under this provision, the state should only process my data if it needs to do so, to provide me with the service or benefit. The second restriction means that this would apply to only those state functions which are authorised by law, meaning only those functions which are supported by validly enacted legislation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What we need to keep in mind regarding Clause 12 is that the requirement of ‘authorised by law’ does not mean that legislation must provide for that specific kind of data processing. It simply means that the larger state function must have legal backing. The danger is how these provisions may be used with broad mandates. If the activity in question is non-consensual collection and processing of, say, demographic data of citizens to create state resident hubs which will assist in the provision of services such as healthcare, housing, and other welfare functions; all that may be required is that the welfare functions are authorised by law.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Scope of privacy under Puttaswamy&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It would be worthwhile, at this point, to delve into the nature of restrictions that the landmark Puttaswamy judgement discussed that the state can impose on privacy. The judgement clearly identifies the principles of informed consent and purpose limitation as central to informational privacy. As discussed repeatedly during the course of the hearings and in the judgement, privacy, like any other fundamental right, is not absolute. However, restrictions on the right must be reasonable in nature. In the case of Clause 12, the restrictions on privacy in the form of denial of informed consent need to be tested against a constitutional standard. In Puttaswamy, the bench ​was ​not ​required ​to ​provide ​a ​legal ​test ​to ​determine ​the ​extent ​and ​scope ​of the ​right ​to ​privacy, but they do provide sufficient ​guidance ​for ​us ​to ​contemplate ​how ​the ​limits ​and ​scope ​of ​the ​constitutional ​right ​to ​privacy ​could ​be ​determined ​in ​future ​cases.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Puttaswamy judgement clearly states that “the right to privacy is protected as an intrinsic part of the right to life and personal liberty under Article 21 and as a part of the freedoms guaranteed by Part III of the Constitution.” By locating the right not just in Article 21 but also in the entirety of Part III, the bench clearly requires that “the drill of various Articles to which the right relates must be scrupulously followed.” This means that where transgressions on privacy relate to different provisions in Part III, the different tests under those provisions will apply along with those in Article 21. For instance, where the restrictions relate to personal freedoms, the tests under both Article 19 (right to freedoms) and Article 21 (right to life and liberty) will apply.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of Clause 12, the three tests laid down by Justice Chandrachud are most operative —&lt;br /&gt;a) the existence of a “law”&lt;br /&gt;b) a “legitimate State interest”&lt;br /&gt;c) the requirement of “proportionality”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first test is already reflected in the use of the phrase ‘authorised by law’ in Clause 12. The test under Article 21 would imply that the function of the state should not merely be authorised by law, but that the law, in both its substance and procedure, must be ‘fair, just and reasonable.’ The next test is that of ‘legitimate state interest’. In its report, the Joint Parliamentary Committee places emphasis on Justice Chandrachud’s use of “allocation of resources for human development” in an illustrative list of legitimate state interests. The report claims that the ground, functions of the state, thus satisfies the legitimate state interest. We do not dispute this claim.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Proportionality and Clause 12&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;It is the final test of ‘proportionality’ articulated by the Puttaswamy judgement, which is most operative in this context. Unlike Clauses 42 and 43 which include the twin tests of necessity and proportionality, the committee has chosen to only employ one ground in Clause 12. Proportionality is a commonly employed ground in European jurisprudence and common law countries such as Canada and South Africa, and it is also an integral part of Indian jurisprudence. As commonly understood, the proportionality test consists of three parts —&lt;/p&gt;
&lt;p&gt;a)  the limiting measures must be carefully designed, or rationally connected, to the objective&lt;br /&gt;b)  they must impair the right as little as possible&lt;br /&gt;c)  the effects of the limiting measures must not be so severe on individual or group rights that the legitimate state interest, albeit important, is outweighed by the abridgement of rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first test is similar to the test of proximity under Article 19. The test of ‘necessity’ in Clause 12 must be viewed in this context. It must be remembered that the test of necessity is not limited to only situations where it may not be possible to obtain consent while providing benefits. My reservations with the sufficiency of this standard stem from observations made in the report, as well as the relatively small amount of jurisprudence on this term in Indian law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Srikrishna Report interestingly mentions three kinds of scenarios where consent should not be required — where it is not appropriate, necessary, or relevant for processing. The report goes on to give an example of inappropriateness. In cases where data is being gathered to provide welfare services, there is an imbalance in power between the citizen and the state. Having made that observation, the committee inexplicably arrives at a conclusion that the response to this problem is to further erode the power available to citizens by removing the need for consent altogether under Clause 12. There is limited jurisprudence on the standard of ‘necessity’ under Indian law. The Supreme Court has articulated this test as ‘having reasonable relation to the object the legislation has in view.’ If we look elsewhere for guidance on how to read ‘necessity’, the ECHR in Handyside v United Kingdom held it to be neither “synonymous with indispensable” nor does it have the “flexibility of such expressions as admissible, ordinary, useful, reasonable or desirable.” In short, there must be a pressing social need to satisfy this ground.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, the other two tests of proportionality do not find a mention in Clause 12 at all. There is no requirement of ‘narrow tailoring’, that the scope of non-consensual processing must impair the right as little as possible. It is doubly unfortunate that this test does not find a place, as unlike necessity, ‘narrow tailoring’ is a test well understood in Indian law. This means that while there is a requirement to show that processing personal data was necessary to provide a service or benefit, there is no requirement to process data in a way that there is minimal non-consensual processing. The fear is that as long as there is a reasonable relation between processing data and the object of the function of state, state authorities and other bodies authorised by it, do not need to bother with obtaining consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, the third test of proportionality is also not represented in this provision. It provides a test between the abridgement of individual rights and legitimate state interest in question, and it requires that the first must not outweigh the second. The absence of the proportionality test leaves Clause 12 devoid of any such consideration. Therefore, as long as the test of necessity is met under this law, it need not evaluate the denial of consent against the service or benefit that is being provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The collective implication of leaving out ‘proportionality’ from Clause 12 is to provide very wide discretionary powers to the state, by setting the threshold to circumvent informed consent extremely low. In the next post, I will demonstrate the ease with which Clause 12 can allow indiscriminate data sharing by focusing on the Indian government’s digital healthcare schemes.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/medianama-february-18-2021-amber-sinha-data-protection-bill-consent-clause-state-function'&gt;https://cis-india.org/internet-governance/blog/medianama-february-18-2021-amber-sinha-data-protection-bill-consent-clause-state-function&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>amber</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-03-01T14:56:49Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust">
    <title>How Facebook is Blatantly Abusing our Trust</title>
    <link>https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust</link>
    <description>
        &lt;b&gt;‘Don’t fix it, if it ain’t broken’ is not an adage Facebook seems to subscribe to. Nishant Shah's column on privacy and Facebook was published in First Post on June 27, 2012.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Facebook is just re-emerging from the controversies around how it conducted the voting on its new privacy policies, when it goes and digs itself deeper by trying to push down its email services down the throats of its users. If you have recently logged-in to Facebook, you will have received a notification that says that you have been ‘gifted’ with a free Facebook email account.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, that is a later phenomenon. A couple of days ago, the whole community of Facebook users went about their usual way, without knowing that something substantial had changed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook, who launched their email service as a part of their social networking empire, with or without your consent, has given us a ‘yourname@facebook.com’ email account. I know free things are considered good, but not an email account that I did not sign up for!&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And to make things worse, this email account was, without our consent, added to our time-line and displayed as the primary email address.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In itself, it is a small move – with the redesign of the Timeline, Facebook had already introduced many such forced disclosures and changes that most of just had to accept, even if it might have had us fuming. However, with this change, Facebook has now started showing exactly what it can do in building your public profile and creating information about you, without your consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In their lame PR spiel, the company tried to pass it off as a freebie that they were gifting their users. But anybody who was not born yesterday realises that this is a desperate attempt to make a floundering service work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Facebook messaging may work despite the clunky user interface, but its email services remain terribly underused. One of the paradoxes for this lies in the fact that you cannot open a Facebook account without a primary email account with another service, which is used as your authentication as well as the system through which Facebook notifications work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, many times, when introducing Facebook to first-time users of the web, we have to first train them in creating and using an email account before they can get on to the social network.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hence, when Facebook did offer users the option of using a Facebook email service, most of them politely declined because nobody in their right mind is going to migrate to new a email services unless there was a substantial range of benefits being offered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So how did Facebook respond? It just forced the email service upon its millions of users. While this is no different from the other kind of restrictions that are imposed upon us within the Facebook universe – the advertisements we see, the design and layout, the insipid white-and-blue background, the kind of information we can and cannot share and display – etc. this is the first time that Facebook actually added to our information profile and displayed it to the public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Which means, that the next time somebody looks you up on Facebook – and let’s face it, one of the things we all use Facebook for, is to find people we know and get connected with them – they will see your Facebook email id listed as your contact address. And while you might get a notification in your primary email about any mails that you receive in your Facebook account, the fact is that, all those emails will become a part of Facebook’s huge data farms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a move that is almost a pale imitation of Google’s growing monopoly over our private information, Facebook seems to be now looking to expand its data empires. However, while Google did it through strategic design and marketing, offering innovations and incentives for its users to use their services, Facebook seems to have decided to build a Trojan horse and sneak these services in through the back door.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this might not seem a big deal right now, it has deeper repercussions for what this corporate behemoth can do, not only with our data, but also to our data that we think is actually our own.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If your alarm bells aren’t already ringing, they should be, as Facebook demonstrates a blatant abuse of the trust that we have put in its system, to keep our private data safe.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The million dollar question – or maybe a slightly reduced price, given its public listing status on the stock-exchange right now – is that while Facebook might keep us safe from other people using our data, will it also be able to keep us safe from itself?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a class="external-link" href="http://www.firstpost.com/tech/how-facebook-is-blatantly-abusing-our-trust-359263.html"&gt;&lt;span class="visualHighlight"&gt;Read the original here&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust'&gt;https://cis-india.org/internet-governance/how-facebook-is-blatantly-abusing-our-trust&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>nishant</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2012-06-28T12:42:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook">
    <title>How data privacy and governance issues have battered Facebook ahead of 2019 polls</title>
    <link>https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook</link>
    <description>
        &lt;b&gt;Rohit S, an airline pilot, had enough of Facebook. With over 1,000 friends and part of at least a dozen groups on subjects ranging from planes to politics, the 34-year-old found himself constantly checking his phone for updates and plunging headlong into increasingly noisy debates, where he had little personal connect.&lt;/b&gt;
        &lt;p&gt;The article by Rahul Sachitanand was &lt;a class="external-link" href="https://economictimes.indiatimes.com/tech/internet/how-data-privacy-and-governance-issues-have-battered-facebook-ahead-of-2019-polls/articleshow/67004685.cms"&gt;published in Economic Times&lt;/a&gt; on December 9, 2018. Elonnai Hickok was quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;While he had originally signed up with Facebook a decade ago to reconnect with school classmates, he found himself more and more disconnected from the sprawl the social network had become. “It was a mess of impersonal shares, unverified half-truths and barely any personal updates,” he says, a week after permanently logging out. “I’d rather reconnect the old-fashioned way.”&lt;br /&gt;&lt;br /&gt;This kind of user disenchantment has become increasingly common among Facebook users. Many like Rohit, who signed up with more altruistic aims, find themselves distanced by how the social networking platform has evolved.&lt;br /&gt;&lt;br /&gt;All through 2018, Facebook and its embattled cofounder, Mark Zuckerberg, have found themselves battling one fire after another. Starting with the mess involving Cambridge Analytica and ending with the document dump unearthed by UK’s Parliament this week (that showed the firm as a cut-throat corporation at best), this has been a year to forget. “Unfortunately, Facebook cannot be trusted with the privacy of its users’ data,” says Alessandro Acquisti, professor, Carnegie Mellon University. “Time and again, Facebook has shown a cavalier attitude towards the handling of users’ data as well as towards informing users clearly and without deception about the actual extent of Facebook’s data collection and handling policies.”&lt;br /&gt;&lt;br /&gt;This perception has caused problems with Facebook, both around the world and at home, with privacy advocates pushing for stronger monitoring to counter the seeming free reign enjoyed by the platform.&lt;br /&gt;&lt;br /&gt;Mishi Choudhary, legal director of Software Freedom Law Center in the US and Mishi Choudhary and Associates, a New Delhi-law firm, says the pay-for-data model necessitates a stronger data protection regime that doesn’t leave users at the mercy of self-governing corporate entities.&lt;br /&gt;&lt;br /&gt;“The contrast between Facebook’s public statements and private strategies to monetise user data reveals the truth of surveillance capitalism carried out stealthily and steadily,” she says.&lt;br /&gt;&lt;br /&gt;In an election year in India, this could cause problems for Facebook.&lt;br /&gt;&lt;br /&gt;The company has already tried to clean up its act, implementing more transparent political advertising norms and looking to clean up fake news claims (on itself and WhatsApp, the messaging platform it owns) to try to win back user trust. Facebook has also launched video monetisation capabilities and Lasso, a short video offering similar to Tik Tok, the Chinese startup that has been massively popular here. The company, that has over 250 million users in India, plans to train five million people on digital technologies in three years, to try to increase awareness.&lt;br /&gt;&lt;br /&gt;Facebook didn’t respond to an email seeking more specific comments for this piece.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In a country where privacy legislation is yet in the works, experts are worried about the overt and covert interest in users’ private data. Hundreds of millions of users here, many unwittingly, accepting user terms and giving apps too many permissions could easily give away confidential information, the experts argue. This is especially so in the case of Android users in the country, who access the web on cheap handsets and don’t have a full understanding of what they sign up for. “Very few people know about the origin or provenance of apps that they download or what data they track or phone features that they access,” says Shiv Putcha, founder and principal analyst, Mandala Insights, a telecom consultancy. “These are all potential security breaches of a massive order.”&lt;br /&gt;&lt;br /&gt;Alessandro Acquisti, professor, Carnegie Mellon University. This situation has privacy advocates closely watching Facebook and pushing for more stringent rules to monitor the company. "The criticality of human rights impact assessment for all products and services by companies like Facebook is underscored," says Elonnai Hickok, from the Centre for Internet and Society, a think tank in Bengaluru. "To build user trust, these assessments should be made public."&lt;br /&gt;&lt;br /&gt;As India finalises its privacy legislation, it is important to ensure that such assessments are undertaken according to law, citizens and their rights are upheld and companies are held accountable. "This also demonstrates that India needs a privacy legislation that allows the government to address a situation if data of Indian citizens is impacted."&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook'&gt;https://cis-india.org/internet-governance/news/economic-times-rahul-sachitanand-december-9-2018-how-data-privacy-and-governance-issues-have-battered-facebook&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2018-12-25T01:43:59Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it">
    <title>How Aadhaar compromises privacy? And how to fix it?</title>
    <link>https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it</link>
    <description>
        &lt;b&gt;Aadhaar is mass surveillance technology. Unlike targeted surveillance which is a good thing, and essential for national security and public order – mass surveillance undermines security. And while biometrics is appropriate for targeted surveillance by the state – it is wholly inappropriate for everyday transactions between the state and law abiding citizens. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The op-ed was published in the &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/is-aadhaar-a-breach-of-privacy/article17745615.ece"&gt;Hindu&lt;/a&gt; on March 31, 2017.&lt;/p&gt;
&lt;hr style="text-align: justify; " /&gt;
&lt;p style="text-align: justify; "&gt;When assessing a technology, don't ask - “what use is it being put to today?”. Instead, ask “what use can it be put to tomorrow and by whom?”. The original noble intentions of the Aadhaar project will not constrain those in the future that want to take full advantage of its technological possibilities.  However, rather than frame the surveillance potential of Aadhaar in a negative tone as three problem statements - I will propose three modifications to the project that will reduce but not eliminate its surveillance potential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Shift from biometrics to smart cards:&lt;/b&gt;&lt;span&gt; In January 2011, the Centre for Internet and Society had written to the parliamentary finance committee that was reviewing what was then called the “National Identification Authority of India Bill 2010”. We provided nine reasons for the government to stop using biometrics and instead use an open smart card standard. Biometrics allows for identification of citizens even when they don't want to be identified. Even unconscious and dead citizens can be identified using biometrics. Smart cards, on the other hand, require pins and thus citizens' conscious cooperation during the identification process. Once you flush your smart cards down the toilet nobody can use them to identify you. Consent is baked into the design of the technology. If the UIDAI adopts smart cards, we can destroy the centralized database of biometrics just like the UK government did in 2010 under Theresa May's tenure as Home Secretary. This would completely eliminate the risk of foreign governments, criminals and terrorists using the biometric database to remotely, covertly and non-consensually identify Indians.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Destroy the authentication transaction database:&lt;/b&gt;&lt;span&gt; The Aadhaar Authentication Regulations 2016 specifies that transaction data will be archived for five years after the date of the transaction. Even though the UIDAI claims that this is a zero knowledge database from the perspective of “reasons for authentication”, any big data expert will tell you that it is trivial to guess what is going on using the unique identifiers for the registered devices and time stamps that are used for authentication.  That is how they put Rajat Gupta and Raj Rajratnam in prison. There was nothing in the payload ie. voice recordings of the tapped telephone conversations – the conviction was based on meta-data. Smart cards based on open standards allow for decentralized authentication by multiple entities and therefore eliminate the need for a centralized transaction database.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Prohibit the use of Aadhaar number in other databases:&lt;/b&gt;&lt;span&gt; We must, as a nation, get over our obsession with Know Your Customer [KYC] requirements. For example, for SIM cards there is no KYC requirement is most developed countries. Our insistence on KYC has only resulted in retardation of Internet adoption, a black market for ID documents and unnecessary wastage of resources by telecom companies. It has not prevented criminals and terrorists from using phones. Where we must absolutely have KYC for the purposes of security, elimination of ghosts and regulatory compliance – we must use a token issued by UIDAI instead of the Aadhaar number itself. This would make it harder for unauthorized parties to combine databases while at the same time, enabling law enforcement agencies to combine databases using the appropriate authorizations and infrastructure like NATGRID. The NATGRID, unlike Aadhaar, is not a centralized database. It is a standard and platform for the express assembly of sub-sets of up to 20 databases which is then accessed by up to 12 law enforcement and intelligence agencies.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;To conclude, even as a surveillance project – Aadhaar is very poorly designed. The technology needs fixing today, the law can wait for tomorrow.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it'&gt;https://cis-india.org/internet-governance/blog/hindu-op-ed-sunil-abraham-march-31-2017-how-aadhaar-compromises-privacy-and-how-to-fix-it&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2017-04-01T07:00:06Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/holding-id-issuers-accountable-what-works">
    <title>Holding ID Issuers Accountable, What Works?</title>
    <link>https://cis-india.org/internet-governance/blog/holding-id-issuers-accountable-what-works</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;Together with the &lt;a class="external-link" href="https://itsrio.org/pt/home/"&gt;Institute of Technology &amp;amp; Society&lt;/a&gt; (ITS), Brazil, and the &lt;a class="external-link" href="https://www.cipit.org/"&gt;Centre for Intellectual Property and Information Technology Law&lt;/a&gt; (CIPIT), Kenya, CIS participated at a side event in &lt;a class="external-link" href="https://www.rightscon.org/"&gt;RightsCon 2019&lt;/a&gt; held in Tunisia, titled Holding ID Issuers Accountable, What Works?, organised by the &lt;a class="external-link" href="https://www.omidyar.com/"&gt;Omidyar Network&lt;/a&gt;. The event was attended by researchers and advocates from nearly 20 countries. Read the event report &lt;a class="external-link" href="https://digitalid.design/rightscon-2019-report.html"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/holding-id-issuers-accountable-what-works'&gt;https://cis-india.org/internet-governance/blog/holding-id-issuers-accountable-what-works&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Trikanad and Amber Sinha</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Digital ID</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Appropriate Use of Digital ID</dc:subject>
    
    
        <dc:subject>Digital Identity</dc:subject>
    

   <dc:date>2019-08-08T10:23:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/hillhacks-2019">
    <title>HillHacks 2019</title>
    <link>https://cis-india.org/internet-governance/news/hillhacks-2019</link>
    <description>
        &lt;b&gt;Karan Saini was a speaker at HillHacks 2019 organized by HillHacks in Bir, Himachal Pradesh from May 24 to May 26, 2019.&lt;/b&gt;
        &lt;p&gt;Karan's talk was on using web applications for intelligence gathering purposes. For more info on the event, &lt;a class="external-link" href="https://hillhacks.in/"&gt;click here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/hillhacks-2019'&gt;https://cis-india.org/internet-governance/news/hillhacks-2019&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Admin</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2019-06-05T14:41:44Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
