<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 611 to 625.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/iocose-talk-at-cis"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/openness/blog-old/privacy-v-transparency"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos">
    <title>The Surveillance Industry in India – An Analysis of Indian Security Expos</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos</link>
    <description>
        &lt;b&gt;The author talks about the surveillance industry in India and analyses Indian security expos.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt;Introduction&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 'Spy Files', a series of documents released by whistleblower website WikiLeaks over the last few years, exposed the tremendous growth of the private 	surveillance industry across the world - a multi-billion dollar industry thriving on increasing governmental and private capabilities for mass surveillance 	of individuals.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; These documents showed how mass surveillance is increasingly made possible through new 	technologies developed by private players, often exploiting the framework of nascent but burgeoning information and communication technologies like the 	internet and communication satellites. Moreover, the unregulated and undiscerning nature of the industry means that it has enabled governments (and also 	private agencies) across the world - from repressive dictatorships to governments in western democracies with a growing track record of privacy and civil 	liberties infringements - to indulge in secretive, undemocratic and often illegal surveillance of their citizens. The Spy Files and related research have 	revealed how the mass surveillance industry utilizes the rhetoric of national security and counter-terrorism to couch technologies of surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;'Security' and the Normalization Of Surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;New technologies undoubtedly create a potential for both malicious as well as beneficial use for society. Surveillance technologies are a prime example, 	having both enabled improvements in law enforcement and security, but at the same time creating unresolved implications for privacy and civil liberties. 	These technologies expose what Lawrence Lessig describes as 'latent ambiguities' in the law - ambiguities that require us to assess the implications and 	effects of new technologies and how to govern them, and most importantly, to choose between conflicting values regarding the use of technologies, for 	example, increased security as against decreased privacy.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, In India, the ambiguity seems to have been resolved squarely in favour of surveillance - under the existing regulatory regime, surveillance 	is either expressly mandated or unregulated, and requires surveillance to be built into the architecture and design of public spaces like internet and 	telephone networks, or even public roads and parks. Most of these regulations or mechanisms are framed without democratic debate, through executive 	mechanisms and private contracts with technology providers, without and public accountability or transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For example, under the telecom licensing regime in India, the ISP and UASL licenses specifically require lawful interception mechanisms through hardware or 	software to be installed by the licensees, for information (Call Data Records, Packet Mirroring, Call Location) to be provided to 'law enforcement 	agencies', as specified by the Government.&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; Section 69 of the Information Technology Act, the main 	legislation governing the Internet in India, read with the rules framed under the Act, makes it incumbent upon 'intermediaries' to provide surveillance 	facilities at the behest of government agencies.&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond this, the State and its agencies Section 69 and 69B of the IT Act empower the government to intercept and monitor any data on the Internet. The 	Telegraph Act also permits wiretapping of telephony.&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt; The proposed Central Monitoring System by the Central 	Government would give state agencies centralized access to all telecommunications in real time, on telephony or on the Internet. Other surveillance schemes include the Keyword Tracking system NETRA, as well as several state government proposed comprehensive CCTV-surveillance schemes for cities.	&lt;a href="#_ftn6" name="_ftnref6"&gt;[6]&lt;/a&gt; Clearly, therefore, there is a massive market for surveillance technologies in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Tracking the Surveillance Market&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Mass surveillance industry by its very nature is closed, secretive and without democratic oversight, Insights into the prevalence, nature and scope of 	the companies that form this industry, or the technologies that are utilized are far and few. No democratic debate about surveillance can take place in 	such a paradigm. In this context, security expos and exhibitions provide critical insight into this industry. Several of the important revelations about 	the industry in the past have been from examinations of large exhibitions in which the various governmental and industry actors participate, and therefore, 	such analysis is critical to the debate surrounding mass surveillance. Such exhibitions are a logical starting point because they are one of the few 	publically accessible showcases of surveillance-ware, and are also a congregation of most major players who are part of this market both as suppliers and 	purchasers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Our research identified at least 13 exhibitions in India that specifically cater to the surveillance industry. A brief outline of each of these exhibitions 	is provided below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Secutech India (Brochures: &lt;/b&gt; 2015 -&lt;a href="http://www.secutechindia.co.in/pdf/secutech%20brochure.pdf"&gt;http://www.secutechindia.co.in/pdf/secutech%20brochure.pdf&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Secutech Expo is an exhibition held in Bombay and Delhi since 2011, to showcase Information Security, Electronic Security and Homeland Security 	technologies. Secutech also organizes the Global Digital Surveillance Forum, a conference amongst the stakeholders of digital surveillance industry in 	India.&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Ivis; Matrix Comsec; Neoteric; Smartlink; Kanoe; Micro Technologies; Aditya Infrotech; CoreTech Solutions; Merit Lilin; Schneider Electric; 	Pash systems; Nettrack Technologies Pvt Ltd.; QNAP; Axxonsoft; Hk Vision (China); Alhua; Axis; Vivotech (Taiwan); Endroid (USA); Vantge (UK); Pelco 	(France); Advik; Hi Focus (UK); ESMS; Keeper (China); Neoteric; Vizor, etc&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: The visitor profile and target audience consists of government and defense agencies, besides private agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: Digital surveillance, biometrics, CCTV and RFID are some categories of the technologies which are showcased here.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;IFSEC India (Brochures: &lt;/b&gt; 2013 -	&lt;a href="http://www.ifsecindia.com/uploads/IFSEC%20INDIA%20brochure%202013.pdf"&gt;http://www.ifsecindia.com/uploads/IFSEC%20INDIA%20brochure%202013.pdf&lt;/a&gt;; 	2014 - http://www.ubmindia.in/ifsec_india/uploads/IFSEC_INDIA_Brochure_CS5_new_low.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IFSEC India, an extension of IFSEC UK, the 'worlds largest security exhibition', proclaims to be South Asia's largest security exhibition with 15,000 	participants in its latest edition, including a special segment on surveillance. It has been held in either Bombay or Delhi since 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Honeywell; Infinova; Radar Vision; QNAP; Ensign; Winposee; Bosch; Comguard; Verint; ACSG; Ensign etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include government agencies such as the Central Industrial Security Force, Border Security Force, Department of Internal Security, 	Railway Protection Force and the Department of Border Management.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: RFID, Video Surveillance, Surveillance Drones, IP Surveillance, Digital Surveillance and Monitoring were some of the categories of 	technologies on display.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;India International Security Expo (Brochures: &lt;/b&gt; 2014 - http://www.indiasecurityexpo.com/images/e_brochure.pdf)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Held in New Delhi since 1996, and organized by the Ministry of Home Affairs, the expo is described as "India's largest show case of goods and services 	related to Homeland Security, Fire Safety, Traffic Management, Industrial Safety and Public Safety, Hospitality and Reality Security." With specific 	reference to the changing 'modus operandi of crime by using technology', the Expo focuses on using surveillance technologies for law enforcement purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Intellivision (USA); Intex (India); ESC Baz (Israel); Sparsh Securitech; Source Security (USA); Intellivision (USA); Interchain Solutions; 	ESSI; Kritikal; Matrix; Pace Solutions etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: According to the show's brochure, visitors include Central &amp;amp; State Police Organisations, Paramilitary Forces, Policy-makers from the 	Government, Industrial Establishments, Security Departments of Educational, Retail, Hospitality, Realty &amp;amp; other sectors, Colonisers, Builders, RWAs, 	System Integrators Large business houses and PSU's.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: Access control systems, surveillance devices, RFID, traffic surveillance and GPS Tracking.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Secure Cities Expo (Brochures: &lt;/b&gt; 2013 - &lt;a href="http://securecitiesindia.com/Secure_Cities_2013_Brochure.pdf"&gt;http://securecitiesindia.com/Secure_Cities_2013_Brochure.pdf&lt;/a&gt;; 2014 - 	http://securecitiesindia.com/images/2014/SC_2014_Brochure.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Secure Cities Expo has been organized since 2008, on the platform of providing homeland security solutions and technologies to government and private 	sector participants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Dell; Palo Alto Networks; Motorola; Konnet; Vian Technologies; Quick Heal; Intergraph, GMR, Tac Technologies, Steria, Teleste, Elcom, Indian 	Eye Security; Mirasys; CBC Group; Verint (USA); IBM (USA); Digitals; EyeWatch; Kanoe; NEC (Japan); ACSG Corporate; ESRI (USA), etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include government and law enforcement agencies including the Ministry of Home Affairs as well as systems integrators and private firms 	including telecom firms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: CCTV, Biometrics, Covert Tracking and Surveillance Software, Communication Interception, Location and Tracking systems, and IT 	Security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Defexpo India (Brochures: No publically available brochures)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By far India's largest security exposition, the Ministry of Defense has organized Defexpo India since 1999, showcasing defense, border, and homeland 	security systems from technology providers internationally.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Aurora Integrated; Airbus Defence (France); Boeing (USA); Hacking Team (Italy); Kommlabs (Germany); Smoothwall; Atlas Electronik; Cyint; 	Audiotel International; Cobham; Tas-Agt; Verint; Elsira (Elbit) (Israel); IdeaForge; Comint; Controp; Northrop Gruman; Raytheon; C-DoT; HGH Infrared 	(Israel); Okham Solutions (France); Septier (Israel); Speech Technology Centre (Russia); Aerovironment (USA); Textron; Sagem (France); Amesys (France); 	Exelis; ITP Novex (Israel), etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: The latest edition of the Expo saw participation from governmental delegations from 58 countries, besides Indian governmental and law enforcement 	authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: The entire spectrum of surveillance and homeland security devices is on display at Defexpo, from Infrared Video to Mass Data 	Interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Convergence India Expo (Brochures: &lt;/b&gt; 2012 - &lt;a href="http://convergenceindia.org/download/CI2012-PSR.pdf"&gt;http://convergenceindia.org/download/CI2012-PSR.pdf&lt;/a&gt;; 2014 -&lt;a href="http://www.convergenceindia.org/pdf/CI-2014-Brochure.pdf"&gt;http://www.convergenceindia.org/pdf/CI-2014-Brochure.pdf&lt;/a&gt;; 2015 -	&lt;a href="http://www.convergenceindia.org/pdf/brochure-2015.pdf"&gt;http://www.convergenceindia.org/pdf/brochure-2015.pdf&lt;/a&gt;.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Convergence India, being held in New Delhi since 1991, is a platform for interaction between Information and Communication Technology providers and 	purchasers in the market. In recent years, the expo has catered to the niche market for IT surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: ELT (UK); Comguard; Fastech; Synway (China); Saltriver; Anritsu (Japan); Cdot; Fastech; Rahul Commerce; Deviser Electronics; RVG Diginet; Blue 	Coat (USA); Cyberoam (USA); ZTE (China); Net Optics (USA); Controp; Comint etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include Paramilitary Forces, Cable Operators, Government Ministries and PSU's and Telecom and Internet Service Providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on Display: Biometrics, Content Filtering, Data Mining, Digital Forensics, IP-Surveillance, Embedded Softwares, Network Surveillance and 	Satellite Monitoring were some of the technologies on display.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;International Police Expo (Brochures: &lt;/b&gt; 2014 - http://www.nexgengroup.in/exhibition/internationalpoliceexpo/download/International_Police_Expo_2014.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The International Police Expo held in New Delhi focuses on providing technologies to police forces across India, with specific focus on IT security and 	communications security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: 3G Wireless Communications Pvt Ltd; Motorola Solutions; Cyint; Matrix Comsec; Cellebrite; Hayagriva; MKU; CP Plus etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include State Police, Procurement Department, CISF, CRPF, RAF, BSF, Customs, GRPF, NDRF, Special Frontier Force, Para Commandos, Special 	Action Group, COBRA and PSU's and educational institutes, stadiums and municipal corporations, among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: Technologies include RFID and surveillance for Internal Security and Policing, CCTV and Monitoring, Vehicle Identification 	Systems, GPS, Surveillance for communications and IT, Biometrics and Network surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. &lt;/b&gt; &lt;b&gt;Electronics For You Expo (EFY Expo) (&lt;/b&gt; 2014 -	&lt;a href="http://2013.efyexpo.com/wp-content/uploads/2014/03/efy_PDFisation.pdf"&gt;http://2013.efyexpo.com/wp-content/uploads/2014/03/efy_PDFisation.pdf&lt;/a&gt;; 	2015 - http://india.efyexpo.com//wp-content/uploads/2014/03/5th%20EFY%20Expo%20India_Brochure.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;EFY Expo is a electronics expo which showcases technologies across the spectrum of electronics industry. It has been held since 2010, in New Delhi, and is 	partnered by the Ministry of Communications and IT and the Ministry of Electronics and IT.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Vantage Security; A2z Securetronix; Avancar Security; Digitals security; Securizen Systems; Vision Security; Mangal Security Systems, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: The visitors include Government Agencies and ministries as well as systems integrators and telecom and IT providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies on display: Identification and Tracking Products and Digital Security Systems are a specific category of the technologies on display.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;9. &lt;/b&gt; &lt;b&gt;Indesec Expo (Brochures: &lt;/b&gt; 2009 - http://www.ontaero.org/Storage/14/897_INDESEC_Oct11-13_2009.pdf. &lt;b&gt;)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An exhibition focused on homeland security, and sponsored by the Ministry of Home Affairs, the expo has been held since 2008 in New Delhi, which includes a 	specific category for cyber security and counter terrorism.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Rohde and Schwarz; Salvation Data; AxxonSoft; KritiKal; Shyam Networks; Teledyne Dalsa; Honeywell; General Dynamics; Northrop Grumman; 	Interchain Solutions, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include officials of the central government, central police and paramilitary forces, Ministry of Defence, central government 	departments, institutes and colleges, state government and police and ports and shipping companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;10. &lt;/b&gt; &lt;b&gt;Next Generation Cyber Threats Expo &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Held since 2012 in New Delhi and Mumbai, the Next Generation Cyber Threats Expo focuses on securing cyber infrastructure and networks in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: Ixia, CheckPoint, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include Strategic Planning Specialists, Policy Makers and Law Enforcement among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;11. &lt;/b&gt; &lt;b&gt;SmartCards/RFID/e-Security/Biometrics expo (Brochures: &lt;/b&gt; 2013 - 	&lt;a href="http://cis-india.org/internet-governance/blog/brochures-from-expos-in-india-2013"&gt; http://cis-india.org/internet-governance/blog/brochures-from-expos-in-india-2013 &lt;/a&gt; ; 2015 -	&lt;a href="http://www.smartcardsexpo.com/pdf/SmartCards_Expo_2015_Brochure_$.pdf"&gt;http://www.smartcardsexpo.com/pdf/SmartCards_Expo_2015_Brochure_$.pdf&lt;/a&gt;)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These expos are organized by Electronics Today in Delhi or Mumbai since 1999 and supported by the Ministries of Commerce, Home Affairs and External 	Affairs. They showcase various identification solutions, attended by hundreds of domestic and international exhibitors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Target audiences include central and local level law enforcement and government organizations, Colleges and Universities, and defense forces.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;12. &lt;/b&gt; &lt;b&gt;Com-IT Expo (Brochure: &lt;/b&gt; 2014 - http://www.comitexpo.in/doc/Brochure.pdf)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This expo has been organized by the Trade Association of Information and Technology in Mumbai since 2008, and focuses on software and hardware Information 	Technology, with specific focus on IT security and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors include Government Agencies, Airport Authorities, Police and Law Enforcement, Urban Planners, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Technologies Displayed: CCTV's, Surveillance Devices and IP Cameras, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;13. &lt;/b&gt; &lt;b&gt;GeoIntelligence India (Brochures: &lt;/b&gt; 2013 - http://www.geointelligenceindia.org/2013/Geointelligence%20India%20Brochure.pdf; 2014 - http://geointworld.net/Documents/GeoInt_Brochure_2014.pdf.)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is an exposition held in New Delhi since 2014, organized by Geospatial Media and Communications Pvt Ltd, and is 'dedicated to showcasing the highest 	levels of information exchange and networking within the Asian defense and security sector.'&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Exhibitors: ESRI (USA); BAE Systems (UK); Leica (Switzerland); Helyx (UK); Digital Globe; Intergraph; Trimble (USA); RSI Softech; Silent Falcon etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Visitors: Visitors included the Director General of Information Systems, CRPF, Manipur, Delhi, Haryana and Nagaland Police, CBI, ITBP, NSDI, SSB, National 	Investigation Agency, Signals Intelligence Directorate among others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Surveillance Wares in India - The Surveillance Exhibits and what they tell us about the Indian Surveillance Industry&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An analysis of the above companies and their wares give us some insight into what is being bought and sold in the surveillance industry, and by whom. 	Broadly, the surveillance technologies can be grouped in the following categories:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Video Surveillance and Analysis&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IP Video Surveillance and CCTV are quickly becoming the norm in public spaces. Emerging video surveillance tools allow for greater networking of cameras, 	greater fields of vision, cheaper access and come with a host of tools such as facial recognition and tracking as well as vehicle tracking. For example, 	IBM has developed an IP Video Analytics system which couples monitoring with facial recognition.&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt; USA's Intellivision also offers analytics systems which enable licence plate tracking, facial recognition and object recognition.&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; HGH Infrared's &lt;i&gt;Spynel &lt;/i&gt;system allows infrared wide-area surveillance,&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; and CBC's GANZ allows long-range, hi-resolution surveillance.	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Video surveillance is gradually infiltrating public spaces in most major cities, with Governments promoting large-scale video surveillance schemes for 	security, with no legal sanctions or safeguards for protecting privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Video Surveillance: 3G Wireless Communications Pvt Ltd, Motorola Solutions (USA), Bosch, CP Plus, Ivis, Aditya Infotech, Micro 	technologies, Core Tech (Denmark), Merit Lilin , Schneider Electric, Shyam Systems, Dalsa, Honeywell, Teleste, Mirasys, CBC Group, Infinova, Radar Vision, 	QNAP, Ensign, Winposee, Bosch, Hik Vision (China), Alhua, Axis Communications, Vivotech (Taiwan), Endroid (USA), Vantge (UK), Pelco (France), Advik, Hi 	Focus (UK), ESMS, Keeper (China), Neoteric, Vizor, Verint (USA), IBM (USA), Digitals Security, Intellivision (USA), Intex, Esc Baz (Israel), Sparsh 	Securitech, A2zsecuretronix, Avancar Security, Securizen Systems, Vision Security, HGH Infrared (Israel).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;RFID/Smart Cards/Biometric Identification&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India has begun the implementation of the Unique Identification Programme for its 1.2 billion strong population, combining a host of identification 	technologies to provide a unique identification number and Aadhar Card - promoted as an all-purpose ID. However, this remains without legislative sanction, 	and continues in the face of severe privacy concerns. Such centralized, accessible databases of ostensibly private information present a grave threat to 	privacy. RFID, Smart Cards and Biometric Identification technologies (like the Aadhar) all make individual monitoring and surveillance significantly easier 	by enabling tracking of individual movements, consumer habits, attendance, etc.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Identification Technologies:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;AxxonSoft, Matrix Comsec, Ensign, Hi focus, Intellivision (USA), Interchain solutions, Inttelix, Kanoe, NEC (Japan), Pace, Realtime, Secugen, Source 	Security (USA), Spectra, Speech technology centre (Russia), BioEnable Technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(For a more detailed list, see the Smart Cards Expo Brochures, linked above)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Mass Data Gathering, Monitoring and Analysis &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The age of Big Data has led to big surveillance. Information and communication technologies now host significant amounts of individual data, and the 	surveillance industry makes all of this data accessible to a surveyor. Government mandated surveillance means any and all forms of communication and data 	monitoring are being implemented in India - there are network taps on telephony and deep packet inspection on internet lines, which makes telephone calls, 	SMS, VoIP, Internet searches and browsing and email all vulnerable to surveillance, constantly monitored through systems like the Central Monitoring 	System. Moreover, centralized information stores enable data mining - extracting and extrapolating data to enable better surveillance, which is what 	India's NATGRID aims to do.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Hacking Team Italy, Blue Coat USA and Amesys France, three of the five companies identified as 'enemies of the internet' for enabling dictatorships to use 	surveillance to quell dissent and violate human rights,&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; have all presented surveillance solutions at 	Defexpo India. Cyberoam USA and ZTE China also market Deep Packet Inspection technology,&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; while ESRI's Big Data suite allows analysis through mass surveillance and analysis of social media and publically available sources.	&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indian companies showcasing mass data monitoring technologies include Cyint, Fastech DPI tools,&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; Kommlabs VerbaProbe packet switching probes,&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; and ACSG's OSINT, which allows Big Data social media 	surveillance and Call Data Record analysis.&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Data Gathering and Monitoring technologies:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Cobham, Comguard, Cyint, ELT (UK), Fastech, Hacking Team (Italy), Smoothwall (USA), Verint Systems (USA), Cyint technologies, Atlas Electronik (Germany), 	Audiotel International (UK), Avancar, Cobham (UK), ELT (UK), Eyewatch, Kommlabs, Mangal Security Systems, Merit Lilin (Taiwan), Ockham Solutions (France), 	Septier (Israel), Synway (China), ACSG Corporate, Amesys (France), Anritsu (Japan), Axis (Sweden), BAE Systems (UK), Blue Coat (USA), C-dot, Comint, 	Cyberoam (USA), Deviser Electronics, Elsira (Elbit) (Israel), Esri (USA), Exelis, General Dynamics (USA), Helyx (UK), ITP Novex (Israel), Leica 	(Switzerland), Net Optics (Ixia) (USA), Northrop Gruman (USA), Rahul Commerce, Rohde And Schwarz (Germany), RVG Diginet, Tas-Agt, Trueposition (USA), Zte 	Technologies (China).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cell-Phone Location Tracking and Vehicle Monitoring&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A number of technologies enable location tracking through vehicle GPS, GLONASS or other location technologies. RFID or optical character recognition 	further enables Automatic Number Plate Recognition, which can be exploited to enable vehicle surveillance to track individual movements. Embedded hardware 	and software on mobile phones also allows constant transmission of location data, which is exploited by surveillance agencies to track individual movements 	and location.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Cell-Phone Location Tracking technologies: Verint, Eyewatch, Septier (Israel), True Position (USA),&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Vehicle Monitoring technologies: Hi-techpoint technologies pvt ltd, Axxonsoft, Essi, Fareye, Intellivision (USA), Interchain 	Solutions, ITP Novex (Israel), Kaneo, Kritikal, NEC (Japan), Saltriver Infosystems, Vision Security Systems.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Air/Ground Drones and Satellite Surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The use of unmanned drones for security purposes is being adopted for law enforcement and surveillance purposes across the world, and India is no 	exception, using UAV's for surveillance in insurgency-hit areas,&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; amongst other uses, while still having 	no regulations for their use.&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; Drones, both aerial and ground level, are capable of large-scale 	territorial surveillance, often equipped with high-technology video surveillance that allows for efficient monitoring at the ground level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Digital Globe offers satellite reconnaissance surveillance coupled with Big Data analysis for predictive monitoring.	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; Controp offers cameras specifically for aerial surveillance, while Sagem's Patroller Drone and Sperwer, and Silent Falcon's Solar Powered surveillance drone are Unmanned Aerial Vehicles (UAV's) for aerial video surveillance. Auruora Integrated,	&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; and IdeaForge are Indian companies which have developed UAV surveillance drones in collaboration with 	Indian agencies.&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Companies showcasing Drone Surveillance: Aurora Integrated, Controp (Israel), Aerovironment (USA), Digital Globe (USA), ESRI (USA), Intergraph (USA), RSI 	Softech, Sagem (France), Silent Falcon (UAS), Textron (USA), Trimble (USA), Northrop Grumman (USA).&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Wikileaks, The Spy Files, &lt;i&gt;available at &lt;/i&gt;https://www.wikileaks.org/the-spyfiles.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; Lawrence Lessig, &lt;i&gt;Code V 2.0.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; For more information on the licensing regime, see&lt;i&gt; 'Data Retention in India', available at &lt;/i&gt; http://cis-india.org/internet-governance/blog/data-retention-in-india.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; Rule 13, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; Section 5, Indian Telegraph Act, 1885.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; &lt;i&gt;See, for example, &lt;/i&gt; the Bangalore Traffic Police CCTV Scheme, 			&lt;a href="http://www.bangaloretrafficpolice.gov.in/index.php?option=com_content&amp;amp;view=article&amp;amp;id=66&amp;amp;btp=66"&gt; http://www.bangaloretrafficpolice.gov.in/index.php?option=com_content&amp;amp;view=article&amp;amp;id=66&amp;amp;btp=66 &lt;/a&gt; ; the surveillance scheme supported by the MPLAD Scheme,			&lt;a href="http://mplads.nic.in/circular08112012.pdf"&gt;http://mplads.nic.in/circular08112012.pdf&lt;/a&gt;; Mumbai's proposed video surveillance scheme, 			http://www.business-standard.com/article/companies/wipro-tata-ibm-reliance-among-31-bids-for-cctv-scheme-in-mumbai-112112600160_1.html.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Information on the Forum is available at http://gdsf-india.com/Global-Digital-Surveillance-Forum1/images/GDSF-Bengaluru-Conference-program.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; http://www-01.ibm.com/support/knowledgecenter/SS88XH_1.6.0/iva/int_i2frs_intro.dita&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; http://www.intelli-vision.com/products/recognition-suite&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; http://www.hgh-infrared.com/Products/Optronics-for-security&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; http://www.ifsecglobal.com/cbc-high-end-surveillance-tech-on-display-at-ifsec-india/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; http://surveillance.rsf.org/en/category/corporate-enemies/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; http://www.cyberoam.com/firewall.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; http://www.esri.com/products/arcgis-capabilities/big-data&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; http://www.fastech-india.com/packetBrokers.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; http://www.kommlabs.com/products-verbaprobe.asp&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; http://www.acsgcorporate.com/osint-software.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; http://timesofindia.indiatimes.com/india/UAV-proves-ineffective-in-anti-Maoist-operations/articleshow/20400544.cms&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; http://dronecenter.bard.edu/drones-in-india/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; https://www.digitalglobe.com/products/analytic-services&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; http://www.aurora-is.com/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; http://www.ideaforge.co.in/home/&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos'&gt;https://cis-india.org/internet-governance/blog/surveillance-industry-in-india-analysis-of-indian-security-expos&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-03-08T12:25:15Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection">
    <title>Winter School on Privacy, Surveillance and Data Protection </title>
    <link>https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection</link>
    <description>
        &lt;b&gt;The   Centre   for   Communication   Governance   (CCG)   in   collaboration   with   the  UNESCO  Chair  on  Freedom  of  Communication  and  Information at  the  University  of  Hamburg  and  the  Hans   Bredow   conducted a week-long winter school on 'Privacy, Surveillance and Data Protection at National Law University, Delhi, from January 19 to 23, 2015.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The winter school focused on the law governing privacy in the EU and in India and covered issues ranging from surveillance to data protection. German and Indian members of faculty used interactive methods of teaching and group activities in each session, to help students from Germany, India and Israel contribute to the classroom and learn from each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav Acharya was a speaker at the event. He spoke on 'privacy theory'. More &lt;a class="external-link" href="http://www.nludelhi.ac.in/wp-content/uploads/CCG-at-NLUD-Call-for-Delhi-Winter-School.pdf"&gt;information here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection'&gt;https://cis-india.org/internet-governance/news/winter-school-on-privacy-surveillance-data-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-02-07T00:37:55Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights">
    <title>Security and Surveillance – Optimizing Security while Safeguarding Human Rights</title>
    <link>https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) on December 19, 2014 held a talk on “Security and Surveillance – Optimizing Security while Safeguarding Human Rights.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The talk focused on a project that is being undertaken by CIS in collaboration with Privacy International, UK. Initiated in 2014, the project seeks to study the regulatory side of surveillance and related technologies in the Indian context. The main objective of the project is to initiate dialogue on surveillance and security in India, government regulation, and the processes that go into the same. The talk saw enthusiastic participation from civil society members, policy advisors on technology, and engineering students.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the event it was highlighted that requirements of judicial authorization, transparency and proportionality are currently lacking in the legal regime for surveillance in India and at the same time India has a strong system of ‘security’ that service providers must adhere to – which works towards enhancing cyber security in the country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Discussions played out with regard to how most of the nine intelligence agencies that are authorized to intercept information in India are outside the ambit of parliamentary oversight, the RTI and the CAG, making them virtually unaccountable to the Indian public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another conversation focused on the sharing of information between various intelligence agencies within the country, and the fact that this area is virtually unregulated. The discussion then steered to cyber-security in general, emerging technologies used by the Government of India for surveillance, cooperative agreements for surveillance technologies that India has with other countries, the export and import of such technologies from India, and most importantly, the role of service providers in the surveillance debate, and the regulations they are subject to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A common theme seemed to be emerging from the discussion was that the agencies responsible for regulating information interception and surveillance in the country are shockingly unaccountable to the Indian public. As an active civil society member noted today - &lt;i&gt;“There is no oversight/monitoring of the agencies themselves, so there’s no way anyone would even know of how many instances of surveillance or unauthorized interception have actually occurred.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The talk successfully concluded with inputs from members of the audience, and a broad consensus on the fact that the Government of India would have to adhere to stronger regulatory standards, harmonized surveillance standards, stronger export and import certification standards, etc., in order to make surveillance in India more transparent and accountable. As was stated at the talk, &lt;i&gt;“We don’t have a problem with the concept of surveillance per se, - it has more to do with its problematic implementation”.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights'&gt;https://cis-india.org/internet-governance/blog/security-and-surveillance-optimizing-security-while-safeguarding-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-02-13T02:41:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india">
    <title>Symposium on Human Rights and the Internet in India</title>
    <link>https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india</link>
    <description>
        &lt;b&gt;On January 17, 2015 the Center for Communication Governance at National Law University, Delhi in collaboration with the UNESCO Chair on Freedom of Communication and Information at the University of Hamburg hosted a pubic symposium on “Human Rights and Internet in India” as a Network of Centers (NoC) regional event. Bhairav Acharya was a panelist.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;See the &lt;a class="external-link" href="http://networkofcenters.net/sites/networkofcenters.net/files/dehli-concept-note.pdf"&gt;concept note here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The event convened a diverse group of collaborators working on issues of Privacy, Surveillance, Data Protection, Freedom of Expression and Intermediary Liability in India, the surrounding region, and internationally.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Agenda | Saturday, January 17 | Public Symposium&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Opening words&lt;br /&gt; &lt;i&gt;Prof. (Dr.) Ranbir Singh, Vice Chancellor, National Law University, Delhi&lt;/i&gt;&lt;br /&gt; &lt;i&gt;Prof. (Dr.) Wolfgang Schulz, Director, Alexander von Humboldt Institute for Internet &amp;amp; Society &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;b&gt;17:45 – 19:00 Panel I: Surveillance &amp;amp; Databases: Experiences &amp;amp; Privacy&lt;/b&gt;&lt;/b&gt;&lt;br /&gt; The panel will explore how surveillance in India might become more  consistent with international human rights standards and Indian  constitutional values. It will also discuss the consequences of  ubiquitous database programs for citizens’ human rights. This will  include comparative perspectives around similar problems and a  discussion of privacy-compatible practices in other countries.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Panelists:&lt;/b&gt;&lt;br /&gt; &lt;i&gt;Dr. Usha Ramanathan, Independent Law Researcher&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. Bhairav Acharya, Lawyer, Supreme Court of India and Adviser Centre for Internet &amp;amp; Society, Bangalore&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. Saikat Datta, Editor (National Security), Hindustan Times&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Professor KS Park, Former Commissioner, Korea Communications Standards Commission and Professor, Korea University Law School&lt;/i&gt;&lt;br /&gt; &lt;b&gt; &lt;/b&gt;&lt;br /&gt; &lt;b&gt;&lt;b&gt;19:00 – 20:15 Panel II: Unpacking the Intermediary Liability Debate in India&lt;/b&gt;&lt;/b&gt;&lt;br /&gt; The panel will focus on the legal framework governing Internet platforms  in India, especially with regard to online content and its implications  for rights of the citizens. It has been argued that the current legal  framework creates incentives for online intermediaries to take down  content even when no substantive notice or legitimate reasons have been  offered. The panel will consider the debate around intermediary  liability in India in light of the ongoing litigation at the Supreme  Court. It will reflect on the international experience with intermediary  liability legislation and discuss how to ensure that laws support an  innovative and competitive environment for intermediaries, while  ensuring that they prioritize the preservation of their users’ human  rights.&lt;br /&gt; &lt;b&gt; &lt;/b&gt;&lt;br /&gt; &lt;b&gt;Panelists:&lt;/b&gt;&lt;br /&gt; &lt;i&gt;Dr. Joris van Hoboken, Fellow, Information Law Institute at NYU School of Law&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Professor (Dr.) Wolfgang Schulz, Director, Alexander von Humboldt Institute for Internet &amp;amp; Society (HIIG)&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Mr. Raman Jit Singh Chima, Lawyer&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Chinmayi Arun and Sarvjeet Singh, Centre for Communication Governance at National Law University, Delhi&lt;/i&gt;&lt;b&gt; &lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india'&gt;https://cis-india.org/internet-governance/news/symposium-on-human-rights-and-internet-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-02-07T00:50:00Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules">
    <title>A Study of the Privacy Policies of Indian Service Providers and the 43A Rules</title>
    <link>https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        &lt;p&gt;Written by Prachi  Arya and Kartik Chawla&lt;br /&gt;Edited by: Vipul Kharbanda, Elonnai Hickok, Anandini Rathore, and Mukta Batra&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/study-of-privacy-policies-indian-service-providers.pdf" class="internal-link"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Contents&lt;br /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957920"&gt;Executive Summary&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957921"&gt;Introduction&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957922"&gt;Objective, Methodology, and Scope of the Study&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957923"&gt;Objective of Research&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957924"&gt;Methodology&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957925"&gt;Scope&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957926"&gt;Criteria for selection of companies being studied&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957927"&gt;Overview of Company Privacy Policy and Survey Results&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957928"&gt;Vodafone&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957929"&gt;Tata Teleservices Limited&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957930"&gt;Airtel&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957931"&gt;Aircel&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957932"&gt;Atria Convergence Technologies&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957933"&gt;Observations&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957934"&gt;International Best Practices&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957935"&gt;Australia&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957936"&gt;European Union&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957937"&gt;Recommendations&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957938"&gt;Annexure 1&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;a href="#_Toc406957939"&gt;Annexure 2&lt;/a&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.gjdgxs"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957920"&gt;Executive Summary&lt;/a&gt; &lt;a name="h.30j0zll"&gt;&lt;/a&gt; &lt;a name="h.1fob9te"&gt;&lt;/a&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;&lt;br /&gt;India has one of the largest telecom subscriber base in the world, currently estimated at 898 Million users.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; With over 164.8 Million people accessing the internet	&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; in the subcontinent as well, technology has concurrently improved to facilitate 	such access on mobile devices. In fact, the high penetration rate of the internet in the market can be largely attributed to mobile phones, via which over 	80% of the Indian population access the medium.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While this is a positive change, concerns now loom over the expansive access that service providers have to the information of their subscribers. For the 	subscriber, a company's commitment to protect user information is most clearly defined via a privacy policy. Data protection in India is broadly governed 	by Rules notified under Section 43A of the Information Technology Act 2000.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Amongst 	other things, the Rules define requirements and safeguards that every Body Corporate is legally required to incorporate into a privacy policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The objective of this research is to understand what standards of protection service providers in India are committing to via organizational privacy 	policies. Furthermore, the research seeks to understand if the standards committed to via organizational privacy policies align with the safeguards 	mandated in the 43A Rules. Towards this, the research reviews the publicly available privacy policies from seven different service providers - Airtel, 	Aircel, Vodafone, MTNL, BSNL, ACT, and Tata Teleservices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The research finds that only Airtel, Vodafone, and Tata Teleservices fully incorporate the safeguards defined in the 43A Rules. Aircel, and ACT incorporate 	a number of such safeguards though not all. On the other hand BSNL minimally incorporates the safeguards, while MTNL does not provide a privacy policy that 	is publicly available.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957921"&gt;&lt;/a&gt; &lt;a name="h.3znysh7"&gt;&lt;/a&gt; Introduction&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The Indian Telecom Services Performance Indicators report by the Telecom Regulatory Authority of India (TRAI)	&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; pegs the total number of internet subscribers in India at 164.81 million and the 	total number of telecom subscribers at 898.02 million, as of March 2013. As mobile phones are adopted more widely, by both rural and urban populations, there is an amalgamation of telecommunications and internet users. Thus, in India, seven out of eight internet users gain access through mobiles phones.	&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though this rapid evolution of technology allows greater ease of access to digital communication, it also has led to an increase in the amount of personal 	information that is shared on the internet. Subsequently, a number of privacy concerns have been raised with respect to how service providers handle and 	protect and customer data as companies rely on this data not only to provide products and services, but also as a profitable commodity in and of itself. 	Individuals are thus forced to confront the possible violation of their personal information, which is collected as a &lt;i&gt;quid pro quo &lt;/i&gt;by service 	providers for access to their services and products. In this context, protection of personal information, or data protection, is a core principle of the 	right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, the right to privacy has been developed in a piecemeal manner through judicial intervention, and is recognized, to a limited extent, as falling under the larger ambit of the fundamental rights enshrined under Part III of the Constitution of India, specifically those under Article 21.	&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In contrast, historically in India there has been limited legislative interest 	expressed by the Government and the citizens towards establishing a statutory and comprehensive privacy regime. Following this trend, the Information 	Technology Act, 2000 (IT Act), as amended in 2008, provided for a limited data protection regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, this changed in 2010 when, concerned about India's robust growth in the fields of IT industry and outsourcing business, an 'adequacy assessment' was commissioned by the European Union (EU), at the behest of India, which found that India did not have adequate personal data protection regime.	&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The main Indian legislation on the personal data security is the Information 	Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 (Rules), enacted under Section 43A of the 	IT Act, which&lt;b&gt; &lt;/b&gt;extends the civil remedy by way of compensation in case wrongful loss or gain under Section 43A to cases where such loss or 	gain results from inadequate security practices and procedures while dealing with sensitive personal data or information. In 2012, the Justice AP Shah 	group of Experts was set up to review and comment on Privacy,&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; for the purpose of 	making recommendations which the government may consider while formulating the proposed framework for the Privacy Act.&lt;a name="h.2et92p0"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957922"&gt;Objective, Methodology, and Scope of the Study&lt;/a&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957923"&gt;&lt;/a&gt; &lt;a name="h.tyjcwt"&gt;&lt;/a&gt; Objective of Research&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;This research aims to analyse the Privacy Policies of the selected Telecommunications (TSP) and Internet Service Providers (ISP) (collectively referred to 	as 'service providers' for the purposes of this research) in the context of the Information Technology (Reasonable Security Practices and Procedures and 	Sensitive Personal Data or Information) Rules ('Rules') in order to gain perspective on the extent to which the privacy policies of different types of 	service providers in India, align with the Rules. Lastly, this research seeks to provide broad recommendations about changes that could be incorporated to 	harmonize the respective policies and to bring them in line with the aforementioned Rules.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957924"&gt;&lt;/a&gt; &lt;a name="h.3dy6vkm"&gt;&lt;/a&gt; Methodology&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policies&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; of seven identified service providers are sought to be 	compared vis-a-vis - the requirements under the Information Technology (Reasonable security practices and procedures and sensitive personal data or 	information) Rules, 2011, (Rules) as notified by way of section 87(2) (ob) read with section 43A of the Information Technology Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Specifically, the Privacy Policies of each of the selected companies are compared against a template that is based on of the essential principles of the 	Rules respectively, and consists of a series of yes or no questions which are answered on the basis of the respective Privacy Policy. These responses are 	meant to fulfil the first aim of this research, i.e., provide a perspective into the extent to which these companies follow the Rules and the Principles, 	and thus the extent to which they respect the privacy of their customers. See Annex 1 for the survey template and the interpretation of the 43A Rules for 	the development of the survey.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957925"&gt;&lt;/a&gt; &lt;a name="h.1t3h5sf"&gt;&lt;/a&gt; Scope&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;a name="_Toc406957926"&gt;Criteria for selection of companies being studied&lt;/a&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;For the purpose of the study the companies selected are limited to service providers - including Telecommunication Service Providers and Internet Service 	Providers. Four broad categories of companies have been selected, namely (i) State Owned Companies, (ii) Multinational Companies, (iii) Joint Venture 	companies where one party is an Indian company and the other party is a foreign based company and (iv) Domestic companies which have a localized user base. 	The companies have been selected on this basis of categorization to better understand if the quality of their respective privacy policies is determined by 	their market reach and user base.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy policies of the following service providers have been analyzed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. State Owned Companies&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;BSNL&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Bharat Sanchar Nigam Limited, better 	known as BSNL, is a state-owned telecommunications company that was incorporated by the Indian government in the year 2000, taking over the functions of 	Central Government departments of Telecommunications Services (DTS) and Telecom Operations (DTO). It provides, &lt;i&gt;inter alia&lt;/i&gt;, landline, mobile, and broadband services, and is India's oldest and largest communication services provider.	&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It had a monopoly in India except for Mumbai and New Delhi till 1992.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;MTNL&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Mahanagar Telephone Nigam Limited is a 	state-owned telecommunications company which provides its services in Mumbai and New-Delhi in India, and Mauritius in Africa. It was set up by the Indian 	Government in the year 1986, and just like BSNL, it had a monopoly in the sector till 1992, when it was opened up to other competitors by the Indian government. It provides, &lt;i&gt;inter alia&lt;/i&gt;, Telephone, Mobile, 3G, and Broadband services.	&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;[15]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Multinational Companies&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Bharti Airtel Ltd:&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[16]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt; Bharti Airtel, more 	commonly referred to as Airtel, is the largest provider of mobile telephony and the second largest provider of fixed telephony in India. Its origins lie in 	the Bharti Group founded by Sunil Bharti Mittal in 1983, and the Bharti Telecom Group which was incorporated in 1986. It is a multinational company, providing services in South Asia, Africa, and the Channel Islands. Among other services, it offers fixed line, cellular, and broadband services.	&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;[17]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The company also owns a submarine cable landing station in Chennai, connecting 	Chennai and Singapore.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Vodafone&lt;/b&gt;&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;[19]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;b&gt;:&lt;/b&gt; Vodafone is a British 	multinational telecom company. Its origins lie in the establishment of Racal Telecom in 1982 which then became Racal Vodafone in 1984, which was a joint venture between Racal, Vodafone and Hambros Technology Trust. Racal Telecom was demerged from Racal Electronics in 1991, and became the Vodafone group.	&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;[20]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Vodafone group started its operations in India with its predecessor Hutchison Telecom, which was a joint venture of Hutchison Whampoa and the Max Group, acquiring the cellular license for Mumbai in 1994&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;[21]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and it bought out Essar's share in the same in the year 2007.&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;[22]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As of today, it has the second largest subscriber base in India. After Airtel,	&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;[23]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Vodafone is the largest provider of telecommunications and mobile internet 	services in India.&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;[24]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Joint Ventures&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Tata Teleservices&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[25]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/b&gt; - Incorporated in 1996, 	Tata Teleservices Limited is an Indian telecommunications and broadband company, the origins of which lie in the Tata Group. A twenty-six percent equity stake was acquired by the Japanese company NTT Docomo in Tata Docomo, a subsidiary of Tata Teleservices, in 2008.	&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;&lt;sup&gt;[26]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Tata Teleservices provides services under three brand names, Tata DoCoMo, Virgin 	Mobile, and T24 Mobile. As a whole, these brands under the head of Tata Teleservices provide cellular and mobile internet services, with the exception of the Tata Sky teleservices brand, which is a joint venture between and Tata Group and Sky.	&lt;sup&gt; &lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;[27]&lt;/sup&gt;&lt;/a&gt;&lt;/sup&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Aircel&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[28]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Aircel is an Indian mobile 	headquarter, which was started in Tamil Nadu in the year 1999, and has now expanded to Tamil Nadu, Assam, North-east India and Chennai. It was acquired by Maxis Communication Berhard in the year 2006, and is currently a joint venture with Sindya Securities &amp;amp; Investments Pvt. Ltd.	&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;[29]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Aircel provides telecommunications and mobile internet services in the 	aforementioned regions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. India based Companies/Domestic Companies -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Atria Convergence Technologies (ACT)&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[30]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;:&lt;/b&gt; Atria 	Convergence Technologies Pvt. Ltd is an Indian cable television and broadband services company. Funded by the India Value Fund Advisor (IVFA), it is 	centered in Bangalore, but also provides services in Karnataka, Andhra Pradesh, and Madhya Pradesh.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957927"&gt;Overview of Company Privacy Policy and Survey Results&lt;/a&gt;&lt;/h2&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This section lays out the ways in which each company's privacy policy aligns with the Rules found under section 43A of the Information Technology Act. The 	section is organized based on company and provides both a table with the survey questions and yes/no/partial ratings and summaries of each policy. The 	rationale and supporting documentation for each determination can be found in Annexure 2.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;VODAFONE&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;b&gt;[31]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Criteria&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes/No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of publicly available documents of the body corporate that 					collect personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Type&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt; Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Grievance Officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Purpose of Collection and usage of information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Disclosure of Information &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Reasonable Security practices and procedures&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="h.4d34og8"&gt;&lt;/a&gt; &lt;br clear="all" /&gt; &lt;a name="_Toc406957928"&gt;&lt;/a&gt; &lt;a name="h.2s8eyo1"&gt;&lt;/a&gt; Vodafone&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Vodafone's privacy policy partially incorporates the safeguards found in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vodafone's privacy policy is accessible online, however, it does not include a copy of its policy with a customer application form. The policy merely lists 	the type of information collected with no categorization as to SPD/I. The information collected includes contact information, location based information, 	browsing activity and persistent cookies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no provision for consent or choice within the policy. Disclosure of personal information to third parties extends to Vodafone's group companies, 	companies that provide services to Vodafone, credit reference agencies and directories.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy mentions an email address for grievance redressal. In addition, the policy does not lay down any mechanism for correcting personal information 	that is held with Vodafone.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Vodafone has a non-exhaustive list of purposes of information usage, though these primarily relate to subscriber services, personnel training, and legal or 	regulatory requirements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With regard to security practices, Vodafone follows the ISO 27001 Certification as per its 2012 Sustainability Report, however this goes unmentioned under 	its privacy policy&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Tata Teleservices Limited&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;b&gt;[32]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Criteria&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Yes/No&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Clear and Accessible statements of its practices and policies&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Collection of personal or sensitive personal data/information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Type&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Option&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Grievance Officer&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Purpose of Collection and usage of information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?					&lt;ins cite="mailto:Vipul" datetime="2014-07-01T14:26"&gt; &lt;/ins&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Disclosure of Information &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Reasonable Security practices and procedures&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957929"&gt;&lt;/a&gt; &lt;a name="h.17dp8vu"&gt;&lt;/a&gt; Tata Teleservices Limited&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Tata Teleservices Limited's Privacy Policy fully incorporates the safeguards found in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Tata Teleservices Limited privacy policy is accessible on their website, though when applying for a subscription, the terms and conditions do not 	include the privacy policy. The privacy policy is easy to understand although there are several elements of the 2011 Rules that are unaddressed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy does not make any distinction regarding sensitive personal data or information. As per the policy, TTL collects contact and billing information, 	information about the equipment the subscriber is using, and information and website usage from its customers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The purposes of information collection are broadly for managing customer services and providing customized advertising. Information is also collected for 	security issues, illegal acts and acts that are violative of TTL's policy. TTL's directory services use a customer's name, address and phone number, 	however a customer may ask for his/her information to not be published on payment of a fee.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per the policy, the disclosure of information to third parties is limited to purposes such as identity verification, bill payments, prevention of 	identity theft and the performance of TTL's services. Third parties are meant to follow the guidelines of TTL's privacy policy in the protection of its 	user information. The consent of subscribers is only required when third parties may use personal information for marketing purposes. Consent is precluded 	under the previous conditions. Disclosure of information to governmental agencies and credit bureaus is for complying with legally authorised requests such 	as subpoenas, court orders and the enforcement of certain rights or claims. The policy provides for a grievance officer and in addition, TTL, has a 	separate Appellate Authority to deal with consumer complaints.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TTL does not follow any particular security standard for the protection of subscriber information, however, it establishes other measures such as limited 	access to employees, and encryption and other security controls. Although TTL Maharashtra follows the ISO 27001 ISMS Certification, TTL does not seem to 	follow a security standard for data protection for other regions of its operations.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Airtel&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;b&gt;[33]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Criteria&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Yes/No&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the name and contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Purpose of Collection and usage of information&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?					&lt;ins cite="mailto:Vipul" datetime="2014-07-01T14:44"&gt; &lt;/ins&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Disclosure of Information &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Reasonable Security practices and procedures&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.3rdcrjn"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957930"&gt;Airtel&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Airtel's Privacy Policy fully incorporates the safeguards found in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Airtel's privacy policy incorporates a number of the requirements stipulated in the Rules. Airtel's privacy policy is easily accessible on its website and 	is clear and easy to understand. The policy defines sensitive personal information, and states that information collected will be used for specified 	regulatory and business purposes, though it adds that it may be used for other purposes as well. The policy does allow for the withdrawal of consent for 	providing information, in which case, certain services may be withheld. In addition, Airtel has provided for a grievance officer and abides by the 	IS/ISO/IEC 27001 security standards. While Airtel allows for the disclosure of information including sensitive personal information to third parties, its 	policy states that such third parties will follow reasonable security practices in this regard. Concerning disclosure to the government, Airtel shares user 	information only when it is legally authorised by a government agency. Airtel's policy also provides for an opt-out provision. Such choice remains after 	subscription of Airtel's services as well. However, withdrawal of consent gives Airtel the right to withdraw its services as well. In terms of disclosure, 	sharing of user information with third parties is regulated by its Airtel's guidelines on the secrecy of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Airtel lists the purposes for information collection, it states that such collection may not be limited to these purposes alone. In addition, the 	policy states that user's personal information will be deleted, although it does not state when this will happen. Thus, the policy could be more 	transparent and specific on matters of regarding the purpose of collection of information as well as deletion of information.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Aircel&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;b&gt;[34]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey &lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Criteria&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes/No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;no&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Purpose of Collection and usage of information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disclosure of Information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Reasonable Security practices and procedures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;ins cite="mailto:Vipul" datetime="2014-07-01T14:58"&gt; &lt;/ins&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.26in1rg"&gt;&lt;/a&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957931"&gt;Aircel&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Aircel's Privacy Policy partially complies with the safeguards in the Rules under 43A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aircel's privacy policy is accessible online through its website, though it is not included under the terms and conditions of its customer application. The 	privacy policy lists the kinds of information that is collected from subscribers, including relevant contact details, call records, browsing history, 	cookies, web beacons, server log files and location details. The policy does not demarcate information into SPD/I or personal information. Aircel provides 	subscribers with the right to withdraw consent from the provision of information before and after subscribing, while reserving the right to withdraw its 	services in this regard. The policy provides the name and contact details of a grievance officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the privacy policy, the stated purposes for use of subscriber information is limited to customer services, credit requirements, market analyses, legal 	and regulatory requirements, and directory services by Aircel or an authorised third party.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the policy, the provision on disclosure to governmental agencies is vague and does not mention the circumstances under which personal information would 	be disclosed to law enforcement. The policy provides for correction of information of a subscriber in case of error and deletion after the purpose of the 	information is served but does not specify when. Although Aircel follows the ISO 27001 standard, it does not mention this under its policy. It does 	however, provide for accountability in cases of breach or privacy.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p align="center"&gt;&lt;b&gt;Atria Convergence Technologies&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;b&gt;[35]&lt;/b&gt;&lt;/a&gt;: 43A Rules Survey&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Criteria&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;&lt;b&gt;Yes/No&lt;/b&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;information not available&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly specifies the type of SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Purpose of Collection and usage of information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disclosure of Information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Reasonable Security practices and procedures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957932"&gt;&lt;/a&gt; &lt;a name="h.lnxbz9"&gt;&lt;/a&gt; Atria Convergence Technologies&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Though Atria Convergence Technologies provides a privacy policy on its website, it does not broadly incorporate the safeguards in the Rules under 43A. 	ACT's privacy policy is easily accessible online and is easy to understand as well. The information collected from subscribers is limited to contact 	details along with information on whether a subscriber has transacted with any of ACT's business partners. Though the privacy policies refers to disclosing 	information for the purpose of assisting with investigating, preventing, or take action on illegal behaviour - there is no specific provision concerning 	disclosure to government and regulatory agencies. The policy does not provide information on any security practices and procedures followed. Provisions for 	withdrawal of consent or correction of personal information are absent from the policy as well.&lt;/p&gt;
&lt;table class="listing" style="text-align: justify; "&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td colspan="2"&gt;
&lt;p&gt;BSNL: 43A Rules Survey&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Criteria&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes/No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Clear and Accessible statements of its practices and policies&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects 					personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Collection of personal or sensitive personal data/information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Type&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy explicitly states that it is collecting SPD/I?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Option&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Grievance Officer&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides the contact information of the grievance officer?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Purpose of Collection and usage of information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Partially&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Disclosure of Information&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether contractual provisions exist in the privacy policy or ToS addressing the disclosure of personal information with third parties&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether personal information is disclosed to government agencies/LEA/IA only when legally mandated?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;Yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Reasonable Security practices and procedures&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to 					secure personal information?&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p&gt;No&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.35nkun2"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;BSNL&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;BSNL's Privacy Policy broadly does not incorporate the safeguards in the Rules under 43A .&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;BSNL's privacy is accessible online, though not on the website, and is easy to understand. The policy does not however, categorize SPD/I but defines 	personal information vaguely as information that helps BSNL identify its customers. As per its policy, subscriber information is used for subscriber 	services such as identification, assistance etc., credit-worthiness and marketing communications. The policy does not contain any provision on consent and 	with respect to marketing communications and a customer implicitly agrees to third party usage of personal information. Third parties under the policy are 	those that provide services on behalf of BSNL, which extend mailing and billing services and market research services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per its policy, BSNL may disclose personal information on the basis of legal requirements to credit organisations, BSNL's consultants, government 	agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With respect to access and correction, BSNL reserves the right to modify its privacy policy without notice to its customers. What is presumably a grievance 	officer email address has been provided for queries and corrections on personal information, however no further contact details are given.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.1ksv4uv"&gt;&lt;/a&gt; &lt;b&gt;MTNL&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;MTNL does not provide a publicly available Privacy Policy. &lt;/b&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957933"&gt;&lt;/a&gt; &lt;a name="h.44sinio"&gt;&lt;/a&gt; Observations&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;This section highlights key trends observed across the privacy policies studied in this research by contrasting the applicable Rule against the applicable 	provision in the policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Access and Location of Privacy Policy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; According to Rule 4 of the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, a Body 	Corporate must provide a privacy policy on their website. Under Rule 5, all bodies corporate have to convey the purpose(s) for which SPD/I are collected 	prior to the collection and they can, under certain circumstances, move forward with the collection regardless of consent. While this does not entirely 	violate the Notice Principle of the National Privacy Principles, it does not meet the rather higher standards of the Principle, which recommends that 	notice must be provided prior to any form of collection of personal information. In addition, the Rules do not contain provisions regulating bodies 	corporate, regarding changes to their privacy policies.&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;[36]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : In the survey, it was found that the location and accessibility of a service provider's privacy policy varied. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a. &lt;/b&gt; &lt;b&gt;Privacy Policy on main website:&lt;/b&gt; Airtel, Aircel, and Vodafone provide a privacy policy that is accessible through the main website of each respective company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b. &lt;/b&gt; &lt;b&gt;Privacy Policy not on website&lt;/b&gt; : MTNL does not provide a Privacy Policy on the main website of each of its respective branches across India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c. &lt;/b&gt; &lt;b&gt;Privacy Policy not accessible through main website&lt;/b&gt; : TTL and BSNL have a Privacy Policy, but it is not accessible through the main website. For example, The Privacy Policy found on TTL's website is only accessible through the "terms and services" link on the homepage. Similarly, the BSNL privacy policy can only be found through its portal website.	&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;[37]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;d. &lt;/b&gt; &lt;b&gt;Privacy Policy not included in Customer Application form&lt;/b&gt; : Almost all of the Service Providers do not include/refer to their Privacy Policy in the Customer Application Form, and some do not display their privacy 	policy or a link to it on its website's homepage. For example, Airtel is the only Service Provider that refers to their privacy policy in the Customer 	Application Form for an Airtel service.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;e. &lt;/b&gt; &lt;b&gt;Collection of personal information before Privacy Policy: &lt;/b&gt; In some cases it appears that service providers collect private information before the privacy policy is made accessible to the user. For example, before 	the homepage of ACT's website is shown, a smaller window appears with a form asking for personal information such as name, mobile and email Id. Although 	the submission of this information is not mandatory, there is no link provided to the privacy policy at this level of collection of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Sharing of information with Government&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; Rule 6, specifically the proviso to Rule 6, and the Disclosure of Information Principle respectively govern the disclosure of information to third parties. 	Yet, while the proviso to Rule 6 directly concerns the power of the government to access information with or without consent for investigative purposes, 	the Disclosure of Information Principle only says that disclosure for law enforcement purposes should be in accordance with the laws currently in force.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : Though all service providers did include statements addressing the potential of sharing information with law enforcement or governmental agencies, how 	this was communicated varied. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a.) &lt;/b&gt; &lt;b&gt;Listing circumstances for disclosure to law enforcement&lt;/b&gt; : The Privacy Policy of ACT states 	&lt;i&gt; "We believe it is necessary to share information in order to investigate, prevent, or take action regarding illegal activities, suspected fraud, situations involving potential threats to the physical safety of any person".		&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[38]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; The Privacy Policy of Airtel on the other hand states 	&lt;i&gt; "Government Agencies: We may also share your personal information with Government agencies or other authorized law enforcement agencies (LEAs) mandated 		under law to obtain such information for the purpose of verification of identity or for prevention, detection, investigation including but not limited to cyber incidents, prosecution, and punishment of offences."		&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[39]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Lastly, TTL states&lt;i&gt; &lt;/i&gt;" 	&lt;i&gt; To investigate, prevent or take action regarding illegal activities, suspected fraud, situations involving potential threats to the physical safety of 		any person" or "To notify or respond to a responsible governmental entity if we reasonably believe that an emergency involving immediate danger of death or serious physical injury to any person requires or justifies disclosure without delay".		&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[40]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b.) &lt;/b&gt; &lt;b&gt;Listing authorities to whom information will be disclosed to&lt;/b&gt; : The privacy policy of&lt;i&gt; &lt;/i&gt;Aircel states 	&lt;i&gt; "There may be times when we need to disclose your personal information to third parties. If we do this, we will only disclose your information to: 		…8. Persons to whom we may be required to pass your information by reason of legal, governmental or regulatory authority including law 		enforcement agencies and emergency services".&lt;a href="#_ftn41" name="_ftnref41"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[41]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Similarly&lt;i&gt;, &lt;/i&gt;Vodafone&lt;i&gt; &lt;/i&gt;states 	&lt;i&gt; "There may be times when we need to disclose your personal information to third parties. If we do this, we will only disclose your information to 		persons to whom we may be required to pass your information by reason of legal, governmental or regulatory authority including law enforcement agencies and emergency services and any person or organisation as authorised by laws and regulations applicable in India."		&lt;a href="#_ftn42" name="_ftnref42"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[42]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; While BSNL states 	&lt;i&gt; "Apart from the above, BSNL may divulge your personal information to: Government bodies, Regulatory Authorities, and other organizations in accordance 		with the law or as authorised by law…".&lt;a href="#_ftn43" name="_ftnref43"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[43]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Readability of Privacy Policies&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle&lt;/b&gt; : In subsection (i) of Rule 4 body corporate must provide a privacy policy that is "&lt;i&gt;clear and accessible&lt;/i&gt;". Similarly, the Notice Principle requires that the data controller give a "	&lt;i&gt;simple-to-understand notice of its information practices to all individuals, in clear and concise language&lt;/i&gt;".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : It was found that, particularly with respect to clauses on the collection and disclosure of information, most Privacy Policies use:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Vague terminology: &lt;/b&gt;For example, in the Privacy Policy of ACT, it states as a purpose of collection &lt;i&gt;"conduct research" &lt;/i&gt;while 	for the collection and disclosure of information it states 	&lt;i&gt; ,"The Company may combine information about you that we have, with information we obtain from business partners or other companies. The Company shall have the right to pass on the same to its business associates, franchisees without referring the same to you."		&lt;a href="#_ftn44" name="_ftnref44"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[44]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Similarly, with regards to the collection of information, Vodafone's Privacy Policy states that it may collect 	&lt;i&gt; "any other information collected in relation to your use of our products and services".		&lt;a href="#_ftn45" name="_ftnref45"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[45]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Undefined terminology:&lt;/b&gt; On disclosure of information TTL's privacy policy states disclosure is 	&lt;i&gt; "Subject to applicable legal restrictions, such as those that exist for Customer Proprietary Network Information (CPNI)"		&lt;a href="#_ftn46" name="_ftnref46"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[46]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/i&gt; Confusingly, although TTL defines CPNI it does not mention what legal restriction it is referring to, and CPNI is in fact an American term and similar 	legal restrictions could not be found in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Information about security practices&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; The parameter for 'reasonable security practices and procedures' has been detailed comprehensively under Rule 8 of the Rules. The same is also covered in 	detail under the Openness Principle read with Security Principle. While the Security Principle recommends that the data controller protect the information 	they collect through reasonable security safeguards, the Openness Principle recommends that information regarding these should be made available to all 	individuals in clear and plain language.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : With the exception of Airtel, no service provider has comprehensively followed the legal requirements for the purpose of their privacy policy. Thus, 	while most service providers do mention security practices, many do not provide specific or comprehensive details about their security practices and 	procedures for data protection, and instead assure users that 'reasonable security' procedures are in place. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Comprehensive information about security practices in privacy policy&lt;/b&gt;: Airtel and Aircel have provided comprehensive information about 	their security practices in the companies Privacy Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Information about security practice, but not in privacy policy&lt;/b&gt;: Vodafone has specified its security standards only in its latest 	'Sustainability Report' available on its website. In the case of TTL, the specific security standard it follows is available only for its Maharashtra 	branch (TTLM) through its annual report.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. &lt;b&gt;Broad reference to security practices&lt;/b&gt;: Many service providers broadly reference security practices, but do not provide specifics. For example, TTL states only &lt;i&gt;"we have implemented appropriate security controls to protect Personal Information when stored or transmitted by TTL&lt;/i&gt;."	&lt;a href="#_ftn47" name="_ftnref47"&gt;&lt;sup&gt;&lt;sup&gt;[47]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. &lt;b&gt;No information about security practices: &lt;/b&gt;Some service providers do not mention any details about their security practices and 	procedures, or whether they even follow any security practices and procedures or not. An example of this would be ACT, which does not mention any security 	practices or procedures in its Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Grievance mechanisms&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; Rule 5 of the Rules mandates that applicable bodies corporate must designate a 'Grievance Officer' for redressing grievances of users regarding processing 	of their personal information, and the same is also recommended by the Ninth Principle, i.e., Accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : It was found that adherence with this requirement varied depending on service provider. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;No Grievance Officer:&lt;/b&gt; ACT and MTNL do not provide details of a grievance officer on their websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Grievance Officer, but no process details&lt;/b&gt;: Airtel, TTL, and Vodafone provide details of the Grievance Officer, but no further 	information about the grievance process is provided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. &lt;b&gt;Grievance Officer and details of process: &lt;/b&gt;Aircel&lt;b&gt; &lt;/b&gt;provides details of the grievance officer and grievance process.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;As a note:&lt;/b&gt; All service providers with the exception of ACT have a general grievance redressal mechanism in place as documented on TRAI's website.	&lt;a href="#_ftn48" name="_ftnref48"&gt;&lt;sup&gt;&lt;sup&gt;[48]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It is unclear whether these mechanisms are functional, and furthermore it is 	also unclear if these mechanisms can be used for complaints under the IT Act or the Rules, or complaints on the basis of the Principles. It should be 	further noted that the multiplicity of grievance redressal officers is a cause for concern, as it may lead to confusion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Consent Mechanism &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle&lt;/b&gt; : Rules 5 and 6 of the Rules&lt;a href="#_ftn49" name="_ftnref49"&gt;&lt;sup&gt;&lt;sup&gt;[49]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; on Collection and Disclosure of information, 	respectively, require applicable bodies corporate to obtain consent/permission before collecting and disclosing personal information. The Choice and Consent Principle of the National Privacy Principles, as enumerated in the A.P. Shah Report, deals exclusively with choice and consent.	&lt;a href="#_ftn50" name="_ftnref50"&gt;&lt;sup&gt;&lt;sup&gt;[50]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Withdrawal of consent is an important facet of the choice and consent principle as evidenced by the Rules&lt;a href="#_ftn51" name="_ftnref51"&gt;&lt;sup&gt;&lt;sup&gt;[51]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and the National Privacy Principles	&lt;a href="#_ftn52" name="_ftnref52"&gt;&lt;sup&gt;&lt;sup&gt;[52]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation:&lt;/b&gt; Methods of obtaining consent and for what consent was obtained for varied across service providers. For example:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;a. &lt;/b&gt; &lt;b&gt;Obtaining consent:&lt;/b&gt; Some service providers give data subjects with the choice of submitting their personal information (with some exceptions such as for legal requirements) 	and obtaining their consent for its collection and processing. For example, the policies of Airtel, Aircel, and TTL are the only ones which provide 	information on the mechanisms used to obtain consent. ACT provides for targeted advertisements based on the personal information of the user. The viewing 	or interaction of the user of such targeted advertisements is however, considered an affirmation to this third party source, that the user is the targeted 	criteria. Thus, there appears to be lack of consent in this regard.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;b. &lt;/b&gt; &lt;b&gt;No Consent or choice offered:&lt;/b&gt; Some service providers do not mention consent. For example, Vodafone, and BSNL do not make any mention of choice or consent in their respective privacy 	policies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;c. &lt;/b&gt; &lt;b&gt;Consent for limited circumstances: &lt;/b&gt; Some service providers only provide consent in limited circumstances. For example, ACT mentions consent only in relation to targeted advertising. However, 	this information is potentially misleading, as discussed earlier in the survey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is also a certain degree of assumption in all the policies regarding consent, as noted in the survey. Thus, if you employ the services of the company 	in question, you are implicitly agreeing to their terms even if you have not actually been notified of them. And the vague terminology used by most of the 	policies leaves quite a lot of wiggle room for the companies in question, allowing them to thereby collect more information than the data subject has been 	notified of without obtaining his or her consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Transparency mechanism&lt;/b&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle:&lt;/b&gt; The Openness Principle specifically recommends transparency in all activities of the data controller.	&lt;a href="#_ftn53" name="_ftnref53"&gt;&lt;sup&gt;&lt;sup&gt;[53]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Rules provide a limited transparency mechanism under Rule 8 which require 	bodies corporate to document their security practices and procedures and Rule 4 which requires them to provide such information via a privacy policy. As a 	note, these fall short of the level of 'transparency' espoused by the Openness Principle of the National Privacy Principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation: &lt;/b&gt; All service providers fail in implementing adequate mechanisms for transparency.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;8. &lt;/b&gt; &lt;b&gt;Scope&lt;/b&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Applicable Rule and Principle&lt;/b&gt; : Though the Openness Principle does not directly speak of the scope of the policies in question, it implies that policies regarding all data collection or 	processing should be made publically available. The same is also necessary under Rule 4, which mandates that any body corporate which " 	&lt;i&gt; collects, receives, possess, stores, deals or handle information of provider of information, shall provide a privacy policy for handling of or dealing 		in personal information including sensitive personal data or information and ensure that the same are available for view by such providers of 		information who has provided such information under lawful contract. &lt;/i&gt; "&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Observation&lt;/b&gt; : Though most of the companies mention the scope of their Privacy Policy and include the information collected through the websites, WAP Services, and use 	of the company's products and services, some companies do not do so. For instance, the scope of the policy is given rather vaguely in the Airtel's Policy, 	and the scope of ACT's policy is restricted to the information collected during the usage of their products and services, and not their website. BSNL's 	privacy policy is worrisome as it seems to restrict its scope to the information collected through the website only, but does not at the same time state 	that it does not apply to other methods of data collection and processing.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957934"&gt;&lt;/a&gt; &lt;a name="h.2jxsxqh"&gt;&lt;/a&gt; International Best Practices&lt;/h1&gt;
&lt;h3&gt;&lt;b&gt;Canada&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The privacy regulation regime in Canada is a mixture of the federal regulations and the provincial regulations. Of the former, the Privacy Act is 	applicable to the public sector, while the Personal Information Protection and Electronic Documents Act ('PIPEDA') applies to the private sector. There are 	also federal level sectoral regulations, of which the Telecommunications Act is relevant here. The PIPEDA covers the activities of all businesses and 	federally regulated industries regarding their collection, use, disclosure, safeguarding and provision of access to their customers' personal information. Further, in 2009, the Canadian Radio-television and Telecommunications Commission ('CRTC'), by virtue of the 'Telecom Regulatory Policy CRTC 2009-657'	&lt;a href="#_ftn54" name="_ftnref54"&gt;&lt;sup&gt;&lt;sup&gt;[54]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; made ISPs subject to privacy standards higher than the standards given under the PIPEDA, while at the same time allowing them to use Internet Traffic Management Practices ('ITMPs').	&lt;a href="#_ftn55" name="_ftnref55"&gt;&lt;sup&gt;&lt;sup&gt;[55]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 2009 policy is progressive as it balances the economic needs of Internet Traffic Management Providers vis-à-vis the privacy concerns of consumers. 	The need to identify ITMP's is integral in the protection of online privacy, as ITMP's most commonly employ methods such as deep packet inspection which 	can be used to burrow into personal information of consumers as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recognising that this may not be the current practice, but a possibility in the future, the policy makes certain guidelines for ITMPs. It permits ITMP's 	that block bad traffic such as spam and malicious software. Nearly all other ITMPs however, require the prior notice of 30 days or more before initialising 	the ITMP.&lt;a href="#_ftn56" name="_ftnref56"&gt;&lt;sup&gt;&lt;sup&gt;[56]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ITMP's are to be used only for the defined need of the ISP and not beyond this, and must not be used for behavioural advertising. Secondary ISPs in their 	contracts with Primary ISPs must agree to the same duties of the latter, that is the personal information entrusted to them is meant for its purpose alone 	and is not to be disclosed further.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957935"&gt;Australia&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The central privacy regulation in Australia is the Privacy Act, 1988. The Act defines two sets of privacy principles, the Information Privacy Principles which apply to the public sector, and the National Privacy Principles which apply to the private sector.&lt;a href="#_ftn57" name="_ftnref57"&gt;&lt;sup&gt;&lt;sup&gt;[57]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; These principles govern the following: collection,&lt;a href="#_ftn58" name="_ftnref58"&gt;&lt;sup&gt;&lt;sup&gt;[58]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; use and disclosure,&lt;a href="#_ftn59" name="_ftnref59"&gt;&lt;sup&gt;&lt;sup&gt;[59]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; data quality,&lt;a href="#_ftn60" name="_ftnref60"&gt;&lt;sup&gt;&lt;sup&gt;[60]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; security,&lt;a href="#_ftn61" name="_ftnref61"&gt;&lt;sup&gt;&lt;sup&gt;[61]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; openness,&lt;a href="#_ftn62" name="_ftnref62"&gt;&lt;sup&gt;&lt;sup&gt;[62]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; access and correction,&lt;a href="#_ftn63" name="_ftnref63"&gt;&lt;sup&gt;&lt;sup&gt;[63]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; identifiers,&lt;a href="#_ftn64" name="_ftnref64"&gt;&lt;sup&gt;&lt;sup&gt;[64]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; anonymity,&lt;a href="#_ftn65" name="_ftnref65"&gt;&lt;sup&gt;&lt;sup&gt;[65]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; trans-border data flows,&lt;a href="#_ftn66" name="_ftnref66"&gt;&lt;sup&gt;&lt;sup&gt;[66]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and sensitive information.	&lt;a href="#_ftn67" name="_ftnref67"&gt;&lt;sup&gt;&lt;sup&gt;[67]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Telecommunications Act, 1997, is also relevant here, as it also governs the use or disclosure of information by telecommunication services providers,	&lt;a href="#_ftn68" name="_ftnref68"&gt;&lt;sup&gt;&lt;sup&gt;[68]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; but such information is only protected by the Telecommunications Act if it comes 	to a person's knowledge or possession in certain circumstances. An example of this is Section 276 of the same, which providers that the information 	protected by that section will be protected only if the person collecting the information is a current or former carrier, carriages service provider or 	telecommunications contractor, in connection with the person's business as such a carrier, provider or contractor; or if the person is an employee of a 	carrier, carriage service provider, telecommunications contractor, because the person is employed by the carrier or provider in connection with its 	business as such a carrier, provider or contractor.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;a name="_Toc406957936"&gt;European Union&lt;/a&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The most important source of law in the European Union ('EU') regarding Data Privacy in general is the Data Protection Directive ('Directive').	&lt;a href="#_ftn69" name="_ftnref69"&gt;&lt;sup&gt;&lt;sup&gt;[69]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive has a broad ambit, covering all forms of personal data collection and processing, and mandating that such collection or processing follow the Data Protection Principles it sets out.&lt;a href="#_ftn70" name="_ftnref70"&gt;&lt;sup&gt;&lt;sup&gt;[70]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive differentiates between Personal Data and Sensitive Personal Data,	&lt;a href="#_ftn71" name="_ftnref71"&gt;&lt;sup&gt;&lt;sup&gt;[71]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; with the collection and processing of the latter being subject to more stringent 	rules. The telecommunications service providers and internet service providers are included in the definition of 'Controller' as set out in the Directive, and are hence subject to the regulations enforced by the member states of the EU under the same.	&lt;a href="#_ftn72" name="_ftnref72"&gt;&lt;sup&gt;&lt;sup&gt;[72]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive will soon be superseded by the General Data Protection directive, which is scheduled to come into force in late 2014, with a two-year transition period after that.	&lt;a href="#_ftn73" name="_ftnref73"&gt;&lt;sup&gt;&lt;sup&gt;[73]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the above, ISPs are also subject to the Directive on Privacy and Electronic Communications&lt;a href="#_ftn74" name="_ftnref74"&gt;&lt;sup&gt;&lt;sup&gt;[74]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and the Data Retention Directive.	&lt;a href="#_ftn75" name="_ftnref75"&gt;&lt;sup&gt;&lt;sup&gt;[75]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Directive on Privacy and Electronic Communications ('E-Privacy Directive') 	sets out rules regarding processing security, confidentiality of communications, data retention, unsolicited communications, cookies, and a system of 	penalties set up by the member states under the title of 'Control'. The E-Privacy Directive supplements the original Data Privacy Directive, and replaces a 	1997 Telecommunications Privacy directive. The Data Retention Directive does not directly concern the collection and processing of data by a service 	provider, but only concerns itself with the retention of collected data. It was an amendment to the E-Privacy Directive, which required the member states 	to store the telecommunications data of their citizens for six to twenty-four months, and give police and security agencies access to details such as IP 	addresses and time of use of e-mails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The established practices considered above have the following principles, relevant to the study at hand, in common:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Notice&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Collection Limitation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Use Limitation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Access and Corrections&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Security&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Data Quality and Accuracy&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Consent&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. Transparency&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;And the following principles are common between two of the three regimes discussed above:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. The PIPEDA and the Privacy Act both mention rules regarding Disclosure of collecting information, but the Data Protection Directive does not directly 	govern disclosure of collected information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. The Principles of Accountability is covered by the Data Protection Directive and the PIPEDA, but is not directly dealt with by the Privacy Act&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. The PIPEDA and the Data Protection Directive directly mention the principle of Enforcement, but it is not directly covered by the Privacy Act.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957937"&gt;&lt;/a&gt; &lt;a name="h.z337ya"&gt;&lt;/a&gt; Recommendations&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;Broadly, service providers across India could take cognizance of the following recommendations to ensure alignment with the Rules found under section 43A 	and to maximize the amount of protection afforded to customer data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. &lt;b&gt;Access and location of privacy policy:&lt;/b&gt; Service providers should ensure that the privacy policy is easily accessible through the main 	page of the company's website. Furthermore, the Privacy Policy should be accessible to users prior to the collection of personal information. All 'User 	Agreement' forms should include a written Privacy Policy or a reference to the Privacy Policy on the service provider's website.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;b&gt;Scope of privacy policy:&lt;/b&gt; The privacy policy should address all practices and services offered by the service provider. If a service 	requires a different or additional privacy policy, a link to the same should be included in the privacy policy on the main website of the service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. &lt;b&gt;Defining consent&lt;/b&gt;: The Privacy Policy should clearly define what constitutes 'consent'. If the form of consent changes for different 	types of service, this should be clearly indicated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. &lt;b&gt;Clear language:&lt;/b&gt; The language in the Privacy Policy should be clear and specific, leaving no doubt or ambiguity with regards to the 	provisions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. &lt;b&gt;Transparent security practices:&lt;/b&gt; The Privacy Policy should include comprehensive information about a company's security practices should 	be included in the Privacy Policy. Information pertaining to audits of these procedures should be made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. &lt;b&gt;Defined and specified third parties:&lt;/b&gt; The Privacy Policy should define 'third party' as it pertains to the company's practices and 	specify which third parties information will be shared with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. &lt;b&gt;Comprehensive grievance mechanism: &lt;/b&gt;The Privacy Policy should include relevant details for users to easily use established grievance 	mechanisms. This includes contact details of the grievance officers, procedure of submitting a grievance, expected response of the grievance officer 	(recognition of the grievance, time period for resolution etc.), and method of appealing decision of the grievance officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;8. &lt;b&gt;Specify laws governing disclosure to governmental agencies and law enforcement:&lt;/b&gt; The Privacy Policy should specify under what laws and 	service providers are required disclose personal information to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;9. &lt;b&gt;Inclusion of data retention practices:&lt;/b&gt; The Privacy Policy should include provisions defining the retention practices of the company.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957938"&gt;&lt;/a&gt; &lt;a name="h.3j2qqm3"&gt;&lt;/a&gt; Annexure 1&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.1y810tw"&gt;&lt;/a&gt; Explanation and Interpretation of Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 	2011&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 43A under the Information Technology Act 2000 addresses the protection of sensitive personal data or information and the implementation of an 	information security management system, and the Rules framed under section 43A attempt establish a holistic data security regime for the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following section is a description of the requirements found under section 43A and subsequent Rules with respect to information that must be included 	in the privacy policy of a 'body corporate' and procedures that must be followed by 'body corporate' with respect to the publishing and notice of a privacy 	policy. This section also includes an explanation of how each relevant provision has been interpreted for the purpose of this research.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Relevant provisions that pertain to the privacy policy of body corporate &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 3:&lt;/b&gt; This section defines the term 'Sensitive Personal Data or Information', setting out the six types of information that are considered 'sensitive personal 	data' including:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Password - Defined under the Rules as "a secret word or phrase or code or passphrase or secret key, or encryption or decryption keys that one uses to 	gain admittance or access to information"&lt;a href="#_ftn76" name="_ftnref76"&gt;&lt;sup&gt;&lt;sup&gt;[76]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Financial information - "such as Bank account or credit card or debit card or other payment instrument details"	&lt;a href="#_ftn77" name="_ftnref77"&gt;&lt;sup&gt;&lt;sup&gt;[77]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iii. Physical, physiological and mental health condition&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iv. Sexual orientation&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;v. Medical records and history&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;vi. Biometric information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The two other broad categories of Sensitive Personal Data or Information that are included in the Rule are - any related details provided to the body corporate, and any information received by the body corporate in relation to the categories listed above.	&lt;a href="#_ftn78" name="_ftnref78"&gt;&lt;sup&gt;&lt;sup&gt;[78]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The proviso to this section excludes any information available in the public domain or which may be provided under the Right to Information Act, 2005 from 	the ambit of SPD/I.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under the Rules, Sensitive Personal Data is considered to be a subset of Personal Information - which has been defined by Section 2 (1) (i) as " 	&lt;i&gt; any information that relates to a natural person, which, either directly or indirectly, in combination with other information available or likely to be 		available with a body corporate, is capable of identifying such person &lt;/i&gt; "&lt;a href="#_ftn79" name="_ftnref79"&gt;&lt;sup&gt;&lt;sup&gt;[79]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation:&lt;/b&gt; While the Rules are clearly limited to personal and sensitive personal data or information, the use of these terms throughout the Rules is not consistent. 	For example, some provisions under the Rules ambiguously use the term 'information' in place of the terms 'personal information' and/or 'sensitive personal 	information'.&lt;a href="#_ftn80" name="_ftnref80"&gt;&lt;sup&gt;&lt;sup&gt;[80]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; While 'information' has been defined non-exhaustively as any 'data, 	message, text, images, sound, voice, codes, computer programs, software and databases or micro film or computer generated microfiche' in the Act, this definition appears to be overbroad and cannot be applied in that form for the purpose of provisions on privacy policy.	&lt;a href="#_ftn81" name="_ftnref81"&gt;&lt;sup&gt;&lt;sup&gt;[81]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Hence, 'information', when used in the Rules, is construed to mean 'personal 	information' including 'sensitive personal information' for the purpose of this survey.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As per Rule 3, information in the public domain isn't classified as sensitive personal data. This exception may require a relook considering that 	'providers' of information' may not want their data to be disclosed beyond its initial disclosure, or in certain cases, they may not even know of its 	existence in the public domain. Since the notice of collection, purpose and use of information is limited to SPD alone under Rule 5, information in the 	public domain should be seen together with whether the provider of information has provided the latter directly or to service provider that requires the 	information. If the source is the information provider directly, it need not be classified as SPD.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On a positive note, the addition of the term "in combination with other information available or likely to be available", gives recognition to the 	phenomenon of convergence of data. Parts of information that seem of negligible importance, when combined, provide a fuller personal profile of an 	individual, the recognition of this, in effect, gives a far wider scope to personal information under the Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the specific context of Privacy Policies, the Rules do not stipulate whether the mandated privacy policy has to explicitly mention SPD/I that is 	collected or used.{This is mentioned under Rule 4(ii) and (iii)} Since Rules do require that a privacy policy must be clear, it is construed that the 	privacy policy should explicitly recognize the type of PI and SPD/I being collected by the company.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 4:&lt;/b&gt; This rule mandates that a "&lt;i&gt;body corporate that collects, receives possess, stores, deals or handles information of the provider of information&lt;/i&gt;". 	For the purposes of this research, this entity will be referred to as a 'data controller'. According to Rule 4, every data controller must provide a 	privacy policy on its website for handling of or dealing in personal information including sensitive personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The following details have to be included in the privacy policy -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"(i) Clear and easily accessible statements of its practices and policies;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(ii) Type of personal or sensitive personal data or information collected under rule 3;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iii) Purpose of collection and usage of such information;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) Disclosure of information including sensitive personal data or information as provided in rule 6;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(v) Reasonable security practices and procedures as provided under rule 8."&lt;a href="#_ftn82" name="_ftnref82"&gt;&lt;sup&gt;&lt;sup&gt;[82]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; : The Rules do not provide an adequate understanding of the terms 'clear' and 'accessible', and the terms 'practices' and 'policies' are not defined. For 	the purpose of this research, 'practices' will be construed to mean the privacy policy of the company. It is deemed to be clear and accessible if it is 	available either directly or through a link on the main website of the body corporate. To meet the standards set by this Rule, the policy or policies 	should disclose information about the company's services, products and websites, whenever personal information is collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 5:&lt;/b&gt; This Rule establishes limits for collection of information. It states that prior informed consent has to be obtained by means of letter, fax or email from 	the user regarding the purpose of usage for the sensitive personal information sought to be collected. It limits the purpose for collection of SPD/I to 	collection for a lawful purpose connected with a function or activity of the body corporate or any person on its behalf and only if it is considered necessary for that purpose. Thus, the information collected can only be used for the stated purpose for which it has been collected.	&lt;a href="#_ftn83" name="_ftnref83"&gt;&lt;sup&gt;&lt;sup&gt;[83]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, Rule 5 (3) provides that consent has to be obtained and knowledge provided to a person from whom personal information is being directly collected 	- which for service providers - is understood to be through the customer application form. This rule will be deemed to have been complied with when the 	following information is provided -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. The fact that the information is being collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. The purpose of such collection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Intended recipients of the collected information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. Names and addresses of the agency or agencies collecting and retaining information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moreover, it provides that the user has to be given the option of not providing information prior to its collection. In case the user chooses this option 	or subsequently withdraws consent the body corporate has the option to withhold its services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This section also provides under Section 5 (2) (a) that the type of information that this Rule concerns itself with can only be collected for a lawful 	purpose connected with a function or activity of the body corporate or any person on its behalf and if it is considered necessary for that purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It also requires that a Grievance Officer be instated to redress the grievance "	&lt;i&gt;expeditiously but within one month from the date of receipt of grievance.&lt;/i&gt;" The Grievance Redressal process has been discussed in more detail 	later.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation:&lt;/b&gt; Even though Rule 5 incorporates various major data protection principles and mandates the establishment of a Grievance Redressal Mechanism, neither Rule 5 	nor Rule 4 (3) makes a reference to the other. [Rule 4(3) uses the term "such information", and the fact that it follows Rule 4(2) which clearly refers to 	personal information as well as SPD/I, means that Rule 4(3) also refers to the same]&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prima facie&lt;/i&gt; , the scope of Rule 5 is limited to collection of SPD/I. However, Rule 4 (3) ostensibly covers the broad ambit of 'information' which includes SPD/I. Construing these two provisions together using the 'Harmonious Construction' principle	&lt;a href="#_ftn84" name="_ftnref84"&gt;&lt;sup&gt;&lt;sup&gt;[84]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Rule 5 could be interpreted to cover personal information for privacy policies 	under Rule 4.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, Rule 5(3) doesn't expand on the reasonable steps to be taken for intimating the information provider on the extent of disclosure and purpose 	of collection. This appears as a rather large loophole considering the wide interpretation that can be given to 'reasonable' practices of service 	providers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 6:&lt;/b&gt; This rule lays down the conditions and procedure for disclosure of information.&lt;a href="#_ftn85" name="_ftnref85"&gt;&lt;sup&gt;&lt;sup&gt;[85]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Under it, the following conditions apply before any disclosure of information by the 'body corporate' to any third party -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. The body corporate is required to obtain prior permission from the provider of the information, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Permission to disclose has to be agreed on in the contract between the company and the data subject, or&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Disclosure is necessary for the compliance of a legal obligation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;An exception is made in case the disclosure is made to an authorized and legally mandated Government agency upon request for the purposes of verification 	of identity, for prevention, detection, and investigation of incidents, specifically including cyber incidents, prosecution, and punishment of offences, in 	which case no consent from the data subject will be required. Thus, the company does not need user consent to disclose information to authorized law 	enforcement or intelligence agencies when presented with an authorized request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; :&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The guidelines for disclosure limit themselves to SPD under Rule 6 leaving a vacuum with respect to information that doesn't fall within the definition of 	SPD/I. However, Rule 4 (iv)'s applies to 'information including SPD'. Reading the two together, in accordance with the 'Harmonious Construction' principle, 	the scope of SPD/I in Rule 6 is construed to extend to the same personal information and SPD/I as is covered by Rule 4 (iv), for the limited purpose of the 	privacy policies under Rule 4.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 7&lt;/b&gt; : This Rule requires that when the data controller transfers SPD/I to another body corporate or person, such a third party must adhere to the same 	standards of data protection that the body corporate collecting the information in the first instance follows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; : Although the privacy policy is not required to provide details of the transfer of information, the fourth sub-section of Rule 4, which concerns itself 	with the obligation of the body corporate to provide a policy for privacy including information about the disclosure of information to its consumers, 	incorporates this Rule as it deals with disclosure of information to third parties. Thus, the Policy of the body corporate must include details of the way 	the data is handled or dealt by the third party, which is shared by the body corporate in question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rule 8:&lt;/b&gt; This Rule details the criteria for reasonable security practices and procedures.&lt;a href="#_ftn86" name="_ftnref86"&gt;&lt;sup&gt;&lt;sup&gt;[86]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It provides that not only must the body corporate have implemented standard security practices and procedures, but it should also have documented the 	information security program and policies containing appropriate "&lt;i&gt;managerial, technical, operational and physical security control measures&lt;/i&gt;". The 	Rule specifically uses the example of IS/ISO/IEC 27001 as an international standard that would fulfill the requirements under this provision. The security 	standards or codes of best practices adopted by the company are required to be certified/audited by a Government approved independent auditor annually and 	after modification or alteration of the existing practice and procedure. Sub-section (1) of the Rule also gives the body corporate the option of creating 	its own security procedures and practices for dealing with managerial, technical, operational, and physical security control, and have comprehensive 	documentation of their information security programme and information security policies. These norms should be as strict as the type of information 	collected and processed requires. In the event of a breach, the body corporate can be called to demonstrate that these norms were suitably implemented by 	it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interpretation&lt;/b&gt; : It is unclear whether the empanelled IT security auditing organizations recognized by CERT-In discussed later are qualified for the purpose of this Rule, 	but from publicly available information the Data Security Council of India and CERT-In's empanelled Security Auditors seem to be the agencies given this 	task&lt;a href="#_ftn87" name="_ftnref87"&gt;&lt;sup&gt;&lt;sup&gt;[87]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. With regards to the Privacy Policy or Policies of a company, it is only 	necessary that the company include as many details as possible regarding the steps taken to ensure the security and confidentiality of the collected 	information in the Privacy Policy and Policies, and notify them to the consumer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Other Relevant Policies:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Empanelled Information Technology Security Auditors&lt;/b&gt; - CERT-In has created a panel of 'IT Security Auditors' for auditing networks &amp;amp; applications of various organizations of the Government, critical infrastructure organizations and private organizations including bodies corporate.&lt;a href="#_ftn88" name="_ftnref88"&gt;&lt;sup&gt;&lt;sup&gt;[88]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The empanelled IT security auditing organization is required to,	&lt;i&gt;inter alia&lt;/i&gt;, conduct a " 	&lt;i&gt; Review of Auditee's existing IT Security Policy and controls for their adequacy as per the best practices vis-à-vis the IT Security frameworks 		outlined in standards such as COBIT, COSO, ITIL, BS7799 / ISO17799, ISO27001, ISO15150, etc." &lt;/i&gt; &lt;a href="#_ftn89" name="_ftnref89"&gt;&lt;sup&gt;&lt;sup&gt;[89]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and conduct and document various assessments and tests. Some typical reviews and tests that include privacy reviews are - Information Security Testing, 	Internet Technology Security Testing and Wireless Security Testing.&lt;a href="#_ftn90" name="_ftnref90"&gt;&lt;sup&gt;&lt;sup&gt;[90]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For this 	purpose CERT-In maintains a list of IT Security Auditing Organizations&lt;a href="#_ftn91" name="_ftnref91"&gt;&lt;sup&gt;&lt;sup&gt;[91]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.4i7ojhp"&gt;&lt;/a&gt; &lt;b&gt;Criteria for analysis of company policies based on the 43A Rules &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Clear and Accessible statements of its practices and policies&lt;a href="#_ftn92" name="_ftnref92"&gt;&lt;sup&gt;&lt;sup&gt;[92]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy is accessible through the main website of the body corporate?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the privacy policy is mentioned or included in the terms and conditions of all document of the body corporate that collects personal 	information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iii. Whether the privacy policy can be comprehended by persons without legal knowledge?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Type and acknowledgment of personal or sensitive personal data/information collected	&lt;a href="#_ftn93" name="_ftnref93"&gt;&lt;sup&gt;&lt;sup&gt;[93]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;-&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy explicitly states that personal and sensitive personal information will be collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the privacy policy mentions all categories of personal information including SPD/I being collected?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Option to not provide information and withdrawal of consent&lt;a href="#_ftn94" name="_ftnref94"&gt;&lt;sup&gt;&lt;sup&gt;[94]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the Privacy Policy specifies that the user has the option to not provide information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the Privacy Policy specifies that the user has the option to subsequently withdraw consent?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;4. Existence of Grievance Officer -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy mentions the existence of a grievance officer?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the privacy policy provides details of the grievance redressal mechanism?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;iii. Whether the privacy policy provides the names and contact information of the grievance officer?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;5. Purpose of Collection and usage of information -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy enumerates the purpose(s) for which information is collected exhaustively?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;6. Disclosure of Information -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether personal information is shared with third parties (except authorized government agencies/LEA/IA) only with user consent?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;ii. Whether the policy specifies that personal information is disclosed to Government agencies/LEA/IA only when legally mandated as per the circumstances 	laid out in 43A?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;7. Reasonable Security practices and procedures -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;i. Whether the privacy policy provides adequate details of the reasonable security practices and procedures followed by the body corporate to secure 	information?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;br clear="all" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.2xcytpi"&gt;&lt;/a&gt; &lt;a name="h.3whwml4"&gt;&lt;/a&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;a name="_Toc406957939"&gt;Annexure 2&lt;/a&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="h.2bn6wsx"&gt;&lt;/a&gt; Reasonable Security Practices and Procedures and Sensitive Personal Data or Information Rules) 2011 and Company SURVEY&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. Bharti Airtel Ltd.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel's Privacy Policy&lt;a href="#_ftn95" name="_ftnref95"&gt;&lt;sup&gt;&lt;sup&gt;[95]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; is available through the 	main page of the website and it is mentioned in the Airtel Terms and Conditions and is applicable for Airtel's websites as well as its services and 	products, such as its telecommunications services. It was determined that the policy can be comprehended by individuals without legal knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type and acknowledgement of personal or sensitive personal data/information collected: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. &lt;b&gt;Rationale: &lt;/b&gt;Airtel's Privacy Policy indicates that sensitive personal and personal information will be collected, defines sensitive personal information&lt;a href="#_ftn96" name="_ftnref96"&gt;&lt;sup&gt;&lt;sup&gt;[96]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and specifies specific types of personal&lt;a href="#_ftn97" name="_ftnref97"&gt;&lt;sup&gt;&lt;sup&gt;[97]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and sensitive personal information	&lt;a href="#_ftn98" name="_ftnref98"&gt;&lt;sup&gt;&lt;sup&gt;[98]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that will be collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide data or information and subsequent withdrawal of consent: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. &lt;b&gt;Rationale: &lt;/b&gt;The Airtel Privacy Policy states that individuals have the right to choose not to provide consent or information and have 	the right to withdraw consent. The policy notes that if consent/information is not provided, Airtel reserves the right to not provide or to withdraw the 	services.&lt;a href="#_ftn99" name="_ftnref99"&gt;&lt;sup&gt;&lt;sup&gt;[99]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel provides for the contact details of nodal officers&lt;a href="#_ftn100" name="_ftnref100"&gt;&lt;sup&gt;&lt;sup&gt;[100]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and appellate authorities	&lt;a href="#_ftn101" name="_ftnref101"&gt;&lt;sup&gt;&lt;sup&gt;[101]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; on its website.&lt;b&gt; &lt;/b&gt;Additionally the website provides for the 	'Office of the Ombudsperson'&lt;a href="#_ftn102" name="_ftnref102"&gt;&lt;sup&gt;&lt;sup&gt;[102]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, which is an independent forum for employees and 	external stakeholders&lt;a href="#_ftn103" name="_ftnref103"&gt;&lt;sup&gt;&lt;sup&gt;[103]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; of the company to raise concerns and complaints about 	improper practices which are in breach of the Bharti Code of Conduct. Additionally, details of the Airtel Grievance Redressal Officers can also be found in 	the TRAI website.&lt;a href="#_ftn104" name="_ftnref104"&gt;&lt;sup&gt;&lt;sup&gt;[104]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Comprehensive disclosure of purpose of collection and usage of information: Partial &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Airtel's Privacy Policy indicates eight purposes&lt;a href="#_ftn105" name="_ftnref105"&gt;&lt;sup&gt;&lt;sup&gt;[105]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that information will be 	collected and used for, but notes that the use and collection is not limited to the defined purposes.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information&lt;a href="#_ftn106" name="_ftnref106"&gt;&lt;sup&gt;&lt;b&gt;&lt;sup&gt;[106]&lt;/sup&gt;&lt;/b&gt;&lt;/sup&gt;&lt;/a&gt;: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel has a dedicated section explaining the company's practices around the disclosure and sharing of collected information, including ways in which consent will be collected for the sharing of personal information&lt;a href="#_ftn107" name="_ftnref107"&gt;&lt;sup&gt;&lt;sup&gt;[107]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, how collected personal information may be collected internally	&lt;a href="#_ftn108" name="_ftnref108"&gt;&lt;sup&gt;&lt;sup&gt;[108]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the disclosure of information to third parties and that the third party will 	be held accountable for protecting the information through contract&lt;a href="#_ftn109" name="_ftnref109"&gt;&lt;sup&gt;&lt;sup&gt;[109]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, the 	possible transfer of personal information and its purposes&lt;a href="#_ftn110" name="_ftnref110"&gt;&lt;sup&gt;&lt;sup&gt;[110]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and the circumstances under which information will be disclosed to governmental agencies (which reflect the circumstances defined by the Rules.)	&lt;a href="#_ftn111" name="_ftnref111"&gt;&lt;sup&gt;&lt;sup&gt;[111]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Existence of reasonable security practices and procedures&lt;/b&gt; &lt;a href="#_ftn112" name="_ftnref112"&gt;&lt;sup&gt;&lt;sup&gt;[112]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;b&gt;: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Airtel's privacy policy has a dedicated section that explains the company's security practices and procedures in place. The policy notes that Airtel's practices and procedures are IS/ISO/IEC 27001 compliant	&lt;a href="#_ftn113" name="_ftnref113"&gt;&lt;sup&gt;&lt;sup&gt;[113]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, that access is restricted to a need to know basis and that employees are 	bound by codes of confidentiality&lt;a href="#_ftn114" name="_ftnref114"&gt;&lt;sup&gt;&lt;sup&gt;[114]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and that Airtel works to ensure that third 	parties also have strong security procedures in place.&lt;a href="#_ftn115" name="_ftnref115"&gt;&lt;sup&gt;&lt;sup&gt;[115]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The policy also provides details on the retention&lt;a href="#_ftn116" name="_ftnref116"&gt;&lt;sup&gt;&lt;sup&gt;[116]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and destruction	&lt;a href="#_ftn117" name="_ftnref117"&gt;&lt;sup&gt;&lt;sup&gt;[117]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; procedures for personal information, and notes that reasonable steps are 	taken to protect against hacking and virus attacks.&lt;a href="#_ftn118" name="_ftnref118"&gt;&lt;sup&gt;&lt;sup&gt;[118]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Tata Telecommunication Services (DoCoMo and Virgin Mobile)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies&lt;/b&gt; : Partial&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale&lt;/b&gt;: Though Tata DoCoMo has a comprehensive Data Privacy Policy	&lt;a href="#_ftn119" name="_ftnref119"&gt;&lt;sup&gt;&lt;sup&gt;[119]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that is applicable to Tata Teleservices Limited's ("&lt;b&gt;TTL&lt;/b&gt;") 	products and services and the TTL website, it is not accessible to the user through the main website. In the Frequently Asked Questions Section of TTL, it is clarified under what circumstances information that you provide is not covered by the TTL privacy policy.	&lt;a href="#_ftn120" name="_ftnref120"&gt;&lt;sup&gt;&lt;sup&gt;[120]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type of personal or sensitive personal data/information collected: Partial &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rational: &lt;/b&gt;TTL defines personal information&lt;a href="#_ftn121" name="_ftnref121"&gt;&lt;sup&gt;&lt;sup&gt;[121]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; but only 	provides general examples of types of personal information&lt;a href="#_ftn122" name="_ftnref122"&gt;&lt;sup&gt;&lt;sup&gt;[122]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; (and not sensitive 	personal) collected, rather than a comprehensive list. The definitions and examples of information collected are clarified in the FAQs and the Privacy 	Policy, rather than in the Privacy Policy alone. As a strength, the Privacy Policy clarifies the ways in which TTL will collect information from the user - including the fact that they receive information from third parties like credit agencies.	&lt;a href="#_ftn123" name="_ftnref123"&gt;&lt;sup&gt;&lt;sup&gt;[123]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent: N/A&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;The TTL Privacy Policy does not address the right of the individual to provide consent/information and to withdraw 	information/consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; TTL has various methods to lodge complaints and provides for an appellate authority.	&lt;a href="#_ftn124" name="_ftnref124"&gt;&lt;sup&gt;&lt;sup&gt;[124]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Additionally, details of the Grievance Redressal Officers are provided via 	the TRAI website.&lt;a href="#_ftn125" name="_ftnref125"&gt;&lt;sup&gt;&lt;sup&gt;[125]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; In its' Privacy Policy, TTL describes the way in which collected information is used.	&lt;a href="#_ftn126" name="_ftnref126"&gt;&lt;sup&gt;&lt;sup&gt;[126]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The TTL FAQs further clarify the use of cookies by the company, the use of 	provided information for advertising purposes, &lt;a href="#_ftn127" name="_ftnref127"&gt;&lt;sup&gt;&lt;sup&gt;[127]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and the use of aggregate and 	anonymized data.&lt;a href="#_ftn128" name="_ftnref128"&gt;&lt;sup&gt;&lt;sup&gt;[128]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;In the Privacy Policy and the FAQs page, TTL is transparent about the circumstances on which they will share/disclose 	personal information with third parties&lt;a href="#_ftn129" name="_ftnref129"&gt;&lt;sup&gt;&lt;sup&gt;[129]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, with law enforcement/governmental agencies&lt;a href="#_ftn130" name="_ftnref130"&gt;&lt;sup&gt;&lt;sup&gt;[130]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, and with other TTL companies.	&lt;a href="#_ftn131" name="_ftnref131"&gt;&lt;sup&gt;&lt;sup&gt;[131]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Interestingly, the TTL FAQ's clarify to the customer that their personal information might be processed in different jurisdictions, and thus would be accessible by law enforcement in that jurisdiction.	&lt;a href="#_ftn132" name="_ftnref132"&gt;&lt;sup&gt;&lt;sup&gt;[132]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;TTL's Privacy Policy broadly references that security practices are in place to protect user information, but the policy does not make reference to a specific security standard, or provide detail as to what these practices and procedures are.	&lt;a href="#_ftn133" name="_ftnref133"&gt;&lt;sup&gt;&lt;sup&gt;[133]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Although TTL's Privacy Policy does not make mention of any specific security 	standard, Tata Teleservices (Maharashtra) Limited claims to have been awarded with ISO 27001 ISMS (Information Security Management Systems) Certification 	in May 2011, and completed its first Surveillance Audit in June 2012&lt;a href="#_ftn134" name="_ftnref134"&gt;&lt;sup&gt;&lt;sup&gt;[134]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. 	Information on IT security standards adopted by other circles could not be found on the internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Vodafone &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Vodafone's Privacy Policy&lt;a href="#_ftn135" name="_ftnref135"&gt;&lt;sup&gt;&lt;sup&gt;[135]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; is easily accessible from its website from a link at the bottom, directly from the home page and from all other pages of the website.	&lt;a href="#_ftn136" name="_ftnref136"&gt;&lt;sup&gt;&lt;sup&gt;[136]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Collection of personal or sensitive personal data/information: No &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Type -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Personal Information - The amount of details given by the Privacy Policy with regards to the personal information being collected is insufficient, as it 	does not include a number of relevant facts, and uses is vague language - such as '&lt;i&gt;amongst other things&lt;/i&gt;', implying that information other than 	that which is notified is being collected.&lt;a href="#_ftn137" name="_ftnref137"&gt;&lt;sup&gt;&lt;sup&gt;[137]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. Sensitive Personal Data or Information - The Privacy Policy does not mention the categories or types of SPD/I, as defined under Rule 3, being collected 	by the service provider explicitly, only gives a general overview of the information that is collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt; The privacy policy does not mention the consent of data subject anywhere, nor does it mention his or her right to withdraw 	it at any point of time. It also does not mention whether or not the provision of services by Vodafone is contingent on the provision of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Privacy Policy explicitly mentions and gives the email address of a grievance redressal officer, though further details 	about the other offices are given in a separate section of the website.&lt;a href="#_ftn138" name="_ftnref138"&gt;&lt;sup&gt;&lt;sup&gt;[138]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy gives an exhaustive list of purposes for which the collected information can be used by Vodafone,	&lt;a href="#_ftn139" name="_ftnref139"&gt;&lt;sup&gt;&lt;sup&gt;[139]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; but at the same time the framing of the opening sentence and the usage of the 	term 'may include' could imply that it can be used for other purposes as well.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy mentions that Vodafone might share the collected information with certain third parties and the terms and conditions which would apply 	to such a third party.&lt;a href="#_ftn140" name="_ftnref140"&gt;&lt;sup&gt;&lt;sup&gt;[140]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The phrasing does not imply that there are other 	conditions that have not been mentioned in the policy, under which the information would be shared with a third party. At the same time, the Privacy Policy 	does not explicitly say that the third party will necessarily follow the privacy and data security procedures and rules laid down in the Privacy Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy mentions in reasonably clear detail the security practices and procedures followed by Vodafone, and also mentions the circumstances in which the data subject should take care to protect his or her own information, wherein Vodafone will not be liable.	&lt;a href="#_ftn141" name="_ftnref141"&gt;&lt;sup&gt;&lt;sup&gt;[141]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Although Vodafone India's Privacy Policy does not specify what their IT Security standard is, its 2012/2013 Sustainability Report available through its international website	&lt;a href="#_ftn142" name="_ftnref142"&gt;&lt;sup&gt;&lt;sup&gt;[142]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; states that it follows industry practices in line with the ISO 27001 standard 	and its core data centre in India follows this standard&lt;a href="#_ftn143" name="_ftnref143"&gt;&lt;sup&gt;&lt;sup&gt;[143]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Aircel&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy is accessible from every page of the Aircel website, with a link at the bottom of each page after the specific circle has been chosen. 	It is reasonably free of legalese and is intelligible.&lt;a href="#_ftn144" name="_ftnref144"&gt;&lt;sup&gt;&lt;sup&gt;[144]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type of personal or sensitive personal data/information collected: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale: &lt;/b&gt; Type -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Personal Information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the Privacy Policy, the repeated usage of the term 'may' creates some doubt about the actual extent of the data collected, and leaves the Privacy Policy 	quite unclear in this regard. At the same time, the Privacy Policy does include a fairly comprehensive list of personal information that could be 	collected. &lt;a href="#_ftn145" name="_ftnref145"&gt;&lt;sup&gt;&lt;sup&gt;[145]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The wording in the Privacy Policy thus requires further 	clarification and specification in order to make a determination on whether or not it provides complete details on the personal information that will be 	collected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Sensitive Personal Data or Information&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Privacy Policy does not mention SPDI explicitly, which adds to the lack of concrete details as noted earlier.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent - Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rationale&lt;/b&gt; : The Privacy Policy mentions that users do have the right to refuse to provide or the withdrawal of consent to collect personal information. In such cases, Aircel can respectively refuse or discontinue the provision of its services.	&lt;a href="#_ftn146" name="_ftnref146"&gt;&lt;sup&gt;&lt;sup&gt;[146]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: Yes &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though not directly mentioned in the Privacy Policy, a separate, easily noticeable link at the bottom of each webpage links to the Customer Grievance section. There are different officers in charge of each node, called the Nodal Officers.	&lt;a href="#_ftn147" name="_ftnref147"&gt;&lt;sup&gt;&lt;sup&gt;[147]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Partial &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;The usage of the term 'may' in the section of the Privacy Policy regarding the purpose of collection and usage of 	information again leaves it ambiguous in this regard, implying that it can just as easily be used for purposes that have not been notified to the data 	subject.&lt;a href="#_ftn148" name="_ftnref148"&gt;&lt;sup&gt;&lt;sup&gt;[148]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale: &lt;/b&gt;Though&lt;b&gt; &lt;/b&gt;the Privacy Policy does not specify all the circumstances under which Aircel would share the collected information with a third party, it specifies the terms and conditions that would apply in the cases that it does.	&lt;a href="#_ftn149" name="_ftnref149"&gt;&lt;sup&gt;&lt;sup&gt;[149]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy gives a reasonable amount of detail about the steps taken by Aircel to ensure the security of the information collected by it, but leaves 	certain holes uncovered.&lt;a href="#_ftn150" name="_ftnref150"&gt;&lt;sup&gt;&lt;sup&gt;[150]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Atria Convergence Technologies Private Limited (ACT)&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Clear and Accessible statements of its practices and policies: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Policy is intelligible, and is easily accessible from all the webpages of the company's website from a link at the 	bottom of all pages.&lt;a href="#_ftn151" name="_ftnref151"&gt;&lt;sup&gt;&lt;sup&gt;[151]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;2. &lt;/b&gt; &lt;b&gt;Type of personal or sensitive personal data/information collected: Partial&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Rationale:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Type -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Personal Information - Yes -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Policy mentions the different types of Personal Information which will be collected by ACT if the customer registers with the Company.	&lt;a href="#_ftn152" name="_ftnref152"&gt;&lt;sup&gt;&lt;sup&gt;[152]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. Sensitive Personal Data or Information -&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The categories of SPD/I collected by ACT are not specifically mentioned in the policy, though they are mentioned as part of the general declarations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;3. &lt;/b&gt; &lt;b&gt;Option to not provide information and withdrawal of consent: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale&lt;/b&gt;: The option of the data subject not providing or withdrawing consent has not been mentioned in the Policy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4. &lt;/b&gt; &lt;b&gt;Existence of Grievance Officer: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; No Grievance Officer has been mentioned in the Privacy Policy or on the ACT website, nor has any other grievance redressal 	process been specified.&lt;a href="#_ftn153" name="_ftnref153"&gt;&lt;sup&gt;&lt;sup&gt;[153]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;5. &lt;/b&gt; &lt;b&gt;Purpose of Collection and usage of information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Policy mentions the various ways ACT might use the information it collects, though the use of the term 'general' is a 	cause for concern.&lt;a href="#_ftn154" name="_ftnref154"&gt;&lt;sup&gt;&lt;sup&gt;[154]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The list of purposes for collection given in the Privacy 	Policy is a very general list.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;6. &lt;/b&gt; &lt;b&gt;Disclosure of Information: Yes&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; The Policy mentions the circumstances in which ACT might share the collected information with a third party, and also 	mentions that such parties will either be subject to confidentiality agreements, or that the data subject will be notified before his or her information 	becomes subject to a different privacy policy. It also mentions the exception to above, that being when the information is shared for investigative 	purposes.&lt;a href="#_ftn155" name="_ftnref155"&gt;&lt;sup&gt;&lt;sup&gt;[155]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; At the same time, the intended recipients of the information are not 	mentioned, and the name and address of agency/agencies collecting and retaining information is not mentioned.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;7. &lt;/b&gt; &lt;b&gt;Reasonable Security practices and procedures: No&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. &lt;b&gt;Rationale:&lt;/b&gt; - The security practices and procedures followed by ACT to protect the information of its customers are not mentioned in the Policy, which is a critical weak point, keeping in mind the requirements of the Rules.	&lt;a href="#_ftn156" name="_ftnref156"&gt;&lt;sup&gt;&lt;sup&gt;[156]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; . Telecom Regulatory Authority of India, Press Release 143/2012,(&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/PressRealease/Document/PR-TSD-May12.pdf"&gt; http://www.trai.gov.in/WriteReadData/PressRealease/Document/PR-TSD-May12.pdf &lt;/a&gt; &amp;gt;)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; . The Indian Telecom Service Performance Indicators, January-March 2013, Telecom Regulatory Authority of India,. (&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf"&gt; http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf &lt;/a&gt; &amp;gt;)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; . 'India is now world's third largest Internet user after U.S., China', (The Hindu, 24 August 2013) &amp;lt; 			&lt;a href="http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece"&gt; http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; . In addition, the Unified Access License Framework which allows for a single license for multiple services such as telecom, the internet and 			television, provides certain security guidelines. As per the model UIL Agreements, privacy of communications is to be maintained and network 			security practices and audits are mandated along with penalties for contravention in addition to what is prescribed under the Information 			Technology Act,2000. For internet services, the Agreement stipulates the keeping an Internet Protocol Detail Record (IPDR) and copies of packets from customer premises equipment (CPE). Accessed at &amp;lt;			&lt;a href="http://www.dot.gov.in/sites/default/files/Unified%20Licence.pdf"&gt;http://www.dot.gov.in/sites/default/files/Unified%20Licence.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; . See &amp;gt;&amp;gt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf"&gt; http://www.trai.gov.in/WriteReadData/WhatsNew/Documents/Indicator%20Reports%20-01082013.pdf &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; . 'India is now world's third largest Internet user after U.S., China', (The Hindu, 24 August 2013) &amp;lt; 			&lt;a href="http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece"&gt; http://www.thehindu.com/sci-tech/technology/internet/india-is-now-worlds-third-largest-internet-user-after-us-china/article5053115.ece &lt;/a&gt; &amp;gt; Accessed..&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; . Starting with &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of UP &lt;/i&gt;1963 AIR SC 1295&lt;i&gt;, &lt;/i&gt;the&lt;i&gt; &lt;/i&gt;right to privacy has been further confirmed 			and commented on in other cases, like &lt;i&gt;Govind v.State of M.P&lt;/i&gt; (1975) 2 SCC 148: 1975 SCC (Cri) 468. A full history of the development of the 			Right to Privacy can be found in B.D. Agarwala, &lt;i&gt;Right to Privacy: A Case-By-Case Development&lt;/i&gt;, (1996) 3 SCC (Jour) 9, available at 			http://www.ebc-india.com/lawyer/articles/96v3a2.htm.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; . White Paper on EU Adequacy Assessment of India, 3, ("&lt;i&gt;Based on an overall &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; analysis against the identifiable principles under Article 25, the 2010 Report concludes that India does not at present provide adequate 				protection to personal data in relation to any sector or to the whole of its private sector or to the whole of its public sector. &lt;/i&gt; ") available at &amp;lt; 			&lt;a href="https://www.dsci.in/sites/default/files/WhitePaper%20EU_Adequacy%20Assessment%20of%20India.pdf"&gt; https://www.dsci.in/sites/default/files/WhitePaper%20EU_Adequacy%20Assessment%20of%20India.pdf &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; . Planning Commission&lt;i&gt;, Report of the Group of Experts on Privacy&lt;/i&gt;, 2012, (&amp;lt;			&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf&lt;/a&gt;&amp;gt;)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; . Though a company's Privacy Policy was the main document analysed for this research, when applicable a company's Terms of Service wavas also 			reviewed.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; . BSNL and MTNL are government companies as defined under section 617, Indian Companies Act, 1956, incorporated under the Indian Companies Act, 			1956. Under section 43 A (i) of the Act, a 'body corporate' has been broadly defined as "any company…sole proprietorship or other association 			of individuals engaged in commercial or professional activities". Therefore, for the purpose of this survey, BSNL and MTNL are recognized as bodies 			corporate.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; . Documents Reviewed&lt;i&gt;:&lt;/i&gt; http://portal.bsnl.in/portal/privacypolicy.html&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; . A full list of its services are available here: &amp;lt;			&lt;a href="http://bsnl.co.in/opencms/bsnl/BSNL/services/"&gt;http://bsnl.co.in/opencms/bsnl/BSNL/services/&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; . The MTNL website does not provide access to a privacy policy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; . A full list of its services are available here &amp;lt;&amp;lt;http://mtnldelhi.in&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; . Documents Reviewed: &lt;a href="http://www.airtel.in/forme/privacy-policy"&gt;http://www.airtel.in/forme/privacy-policy&lt;/a&gt; ,			&lt;a href="http://www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp"&gt;http://www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp&lt;/a&gt;, 			&lt;a href="http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp"&gt; http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp &lt;/a&gt; , 			&lt;a href="http://www.airtel.in/about-bharti/about-bharti-airtel/ombuds-office"&gt; http://www.airtel.in/about-bharti/about-bharti-airtel/ombuds-office &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; . A full list of services provided by Bharti Airtel is available here: &amp;lt;&lt;a href="http://www.airtel.in"&gt;www.airtel.in&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; . http://submarinenetworks.com/stations/asia/india/chennai-bharti&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; . Documents Reviewed: 			&lt;a href="http://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement.html"&gt; http://www.vodafone.com/content/sustainabilityreport/2014/index/operating_responsibly/privacy_and_security/law_enforcement.html &lt;/a&gt; &lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker&lt;/a&gt; , 			&lt;a href="http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html"&gt; http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; . See &amp;lt; 			&lt;a href="http://historyofbusiness.blogspot.in/2013/11/history-of-vodafone.html."&gt; http://historyofbusiness.blogspot.in/2013/11/history-of-vodafone.html. &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; . &lt;i&gt;Vodafone International Holdings v Union of India&lt;/i&gt;, WP 1325/2010, Bombay High Court&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; . 'Vodafone to Buy Additional Essar India Stake for $5 Billion',(&lt;i&gt;Bloomberg&lt;/i&gt;, March 31, 2011) &amp;lt; 			&lt;a href="http://www.bloomberg.com/news/2011-03-31/essar-exercises-option-to-sell-5-billion-stake-in-vodafone-essar-venture.html"&gt; http://www.bloomberg.com/news/2011-03-31/essar-exercises-option-to-sell-5-billion-stake-in-vodafone-essar-venture.html &lt;/a&gt; &amp;gt;Accessed 26 May 2014&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; . See &amp;lt;&lt;a href="https://www.vodafone.in/pages/aboutus.aspx?cid=ker."&gt;https://www.vodafone.in/pages/aboutus.aspx?cid=ker.&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; . Vodafone, &lt;i&gt;supra&lt;/i&gt; note 13.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; . Documents Reviewed:&lt;a href="http://www.tatadocomo.com/downloads/data-privacy-policy.pdf"&gt;http://www.tatadocomo.com/downloads/data-privacy-policy.pdf&lt;/a&gt;,			&lt;a href="http://www.tatateleservices.com/t-customercare.aspx"&gt;http://www.tatateleservices.com/t-customercare.aspx&lt;/a&gt;, 			&lt;a href="http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf"&gt; http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; . 'Japan's Docomo acquires 26% stake in Tata Tele'(The Hindu Business Line, November 13 2008) &amp;lt; 			&lt;a href="http://www.thehindubusinessline.in/bline/2008/11/13/stories/2008111352410100.htm"&gt; http://www.thehindubusinessline.in/bline/2008/11/13/stories/2008111352410100.htm &lt;/a&gt; .&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; . Further details are available at: &amp;lt;			&lt;a href="http://www.tatateleservices.com/t-aboutus-ttsl-organization.aspx"&gt;http://www.tatateleservices.com/t-aboutus-ttsl-organization.aspx&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; . Documents Reviewed&lt;/p&gt;
&lt;p&gt;&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061"&gt; http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061 &lt;/a&gt; , 			&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=customercare_consumergrievance_page"&gt; http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=customercare_consumergrievance_page &lt;/a&gt; , 			&lt;a href="http://www.aircel.com/AircelWar/ShowProperty/UCMRepository/Contribution%20Folders/Global/PDF/Manual_Customer_Grievan.pdf"&gt; http://www.aircel.com/AircelWar/ShowProperty/UCMRepository/Contribution%20Folders/Global/PDF/Manual_Customer_Grievan.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; . See &amp;lt; 			&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/ap?_nfpb=true&amp;amp;_pageLabel=aboutus_book."&gt; http://www.aircel.com/AircelWar/appmanager/aircel/ap?_nfpb=true&amp;amp;_pageLabel=aboutus_book. &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; . Documents Reviewed: &lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; . https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; . &lt;a href="http://www.tatadocomo.com/downloads/data-privacy-policy.pdf"&gt;http://www.tatadocomo.com/downloads/data-privacy-policy.pdf&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; . http://www.airtel.in/forme/privacy-policy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; .http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; . &lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; . In 2012, the Minister of State for Communications &amp;amp; Information Technology informed the Rajya Sabha that "			&lt;i&gt;(a)ny change in the privacy policy is not within the purview of amended Information Technology Act, 2000&lt;/i&gt;",, while discussing changes to 			Google's privacy policy. Even though the Minister noted that the EU has reported its dissatisfaction with the changed policy, finding that the policy "			&lt;i&gt;makes it impossible to understand which purposes, personal data, recipients or access rights are relevant to the use of a specific service&lt;/i&gt; ", he argued that the Act and Rules therein merely stipulate the publication of a privacy policy which provide "			&lt;i&gt;information to the end users as to how their personal information is collected, for which it is collected, processed and secure&lt;/i&gt;". Further, 			when asked how changes to privacy policy affect end users the Minister shifted the responsibility on end users, stating that " 			&lt;i&gt; (t)he end users… need to fully understand the privacy policy of Google, the consequences of sharing their personal information and their 				privacy rights before they start using online services &lt;/i&gt; ".( &amp;lt; 			&lt;a href="http://rsdebate.nic.in/bitstream/123456789/609109/2/PQ_225_30032012_U1929_p129_p130.pdf#search=%22google%22"&gt; http://rsdebate.nic.in/bitstream/123456789/609109/2/PQ_225_30032012_U1929_p129_p130.pdf#search=%22google%22 &lt;/a&gt; &amp;gt;).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;[37]&lt;/a&gt; . Available at &lt;a href="http://portal.bsnl.in/portal/privacypolicy.htm"&gt;http://portal.bsnl.in/portal/privacypolicy.htm&lt;/a&gt;, the privacy policy was 			found through a search engine and not through a link from the website. An RTI request was submitted to BSNL for a copy of its privacy policy as 			applicable to all its products, services and websites. BSNL responded by submitting a copy of this privacy policy even though the text of the 			policy does not clarify the scope.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;[38]&lt;/a&gt; . See, &amp;lt;&lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;[39]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.airtel.in/forme/privacy-policy"&gt;http://www.airtel.in/forme/privacy-policy&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;[40]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.tataindicom.com/Download/data-privacy-policy.pdf"&gt;www.tataindicom.com/Download/data-privacy-policy.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;[41]&lt;/a&gt; . See &amp;lt;&amp;lt;www.aircel.com/AircelWar/appmanager/aircel/delhi?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a href="#_ftnref42" name="_ftn42"&gt;[42]&lt;/a&gt; . See &amp;lt;&lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a href="#_ftnref43" name="_ftn43"&gt;[43]&lt;/a&gt; . See&amp;lt;&amp;lt; http://portal.bsnl.in/portal/privacypolicy.htm&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a href="#_ftnref44" name="_ftn44"&gt;[44]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.acttv.in/index.php/privacy-policy"&gt;http://www.acttv.in/index.php/privacy-policy&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a href="#_ftnref45" name="_ftn45"&gt;[45]&lt;/a&gt; . See &amp;lt;&lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=kar&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a href="#_ftnref46" name="_ftn46"&gt;[46]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.tataindicom.com/Download/data-privacy-policy.pdf"&gt;http://www.tataindicom.com/Download/data-privacy-policy.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a href="#_ftnref47" name="_ftn47"&gt;[47]&lt;/a&gt; . Ibid&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a href="#_ftnref48" name="_ftn48"&gt;[48]&lt;/a&gt; . The complaint center details are available here: &amp;lt;			&lt;a href="http://www.tccms.gov.in/Queries.aspx?cid=1"&gt;http://www.tccms.gov.in/Queries.aspx?cid=1&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a href="#_ftnref49" name="_ftn49"&gt;[49]&lt;/a&gt; . Rules 5 and 6&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a href="#_ftnref50" name="_ftn50"&gt;[50]&lt;/a&gt; . Principle 2, Principle 3, Personal Information Protection and Electronic Documents Act 2000. Available at: &amp;lt;&amp;lt;			&lt;a href="http://laws-lois.justice.gc.ca/eng/acts/P-8.6/index.html"&gt;http://laws-lois.justice.gc.ca/eng/acts/P-8.6/index.html&lt;/a&gt;&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a href="#_ftnref51" name="_ftn51"&gt;[51]&lt;/a&gt; . Rule 5(7),&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a href="#_ftnref52" name="_ftn52"&gt;[52]&lt;/a&gt; . Principle 2&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a href="#_ftnref53" name="_ftn53"&gt;[53]&lt;/a&gt; . P. 21&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a href="#_ftnref54" name="_ftn54"&gt;[54]&lt;/a&gt; . Telecom Regulatory Policy CRTC 2009-657, Review of the Internet traffic management practices of Internet service providers &amp;lt;&amp;lt;			&lt;a href="http://www.crtc.gc.ca/eng/archive/2009/2009-657.htm"&gt;www.crtc.gc.ca/eng/archive/2009/2009-657.htm&lt;/a&gt;&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a href="#_ftnref55" name="_ftn55"&gt;[55]&lt;/a&gt; . Alex Cameron,&lt;i&gt;CRTC Imposes Super-PIPEDA Privacy Protections for Personal Information Collected by ISPs, &lt;/i&gt;Privacy and Information 			Protection Bulletin, Fasken Martineau, &amp;lt;&amp;lt; 			&lt;a href="http://www.fasken.com/files/Publication/4317fd62-0827-4d1d-b836-5b932b3b21db/Presentation/PublicationAttachment/bafbf01e-365c-47f8-86a5-5cf7d7e43787/Bulletin_-_November_2009_-_Cameron.pdf"&gt; http://www.fasken.com/files/Publication/4317fd62-0827-4d1d-b836-5b932b3b21db/Presentation/PublicationAttachment/bafbf01e-365c-47f8-86a5-5cf7d7e43787/Bulletin_-_November_2009_-_Cameron.pdf &lt;/a&gt; . &amp;gt;&amp;gt; Accessed 21 May 2014&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a href="#_ftnref56" name="_ftn56"&gt;[56]&lt;/a&gt; . Bram D. Abramson, Grant Buchanan, Hank Intven, &lt;i&gt;CRTC Shapes Canadian "Net Neutrality" Rules, &lt;/i&gt;McCarthy Tetrault. &amp;lt;			&lt;a href="http://www.mccarthy.ca/article_detail.aspx?id=4720"&gt;http://www.mccarthy.ca/article_detail.aspx?id=4720&lt;/a&gt; &amp;gt; Accessed 21 May 2014&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a href="#_ftnref57" name="_ftn57"&gt;[57]&lt;/a&gt; . The Privacy Act, 1988, Part III, &lt;i&gt;available at &amp;lt;&amp;lt;&lt;/i&gt; http://www.comlaw.gov.au/Series/C2004A03712.&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a href="#_ftnref58" name="_ftn58"&gt;[58]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, note 28, Schedule 3, 1.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a href="#_ftnref59" name="_ftn59"&gt;[59]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 2.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a href="#_ftnref60" name="_ftn60"&gt;[60]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 3.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a href="#_ftnref61" name="_ftn61"&gt;[61]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 4.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a href="#_ftnref62" name="_ftn62"&gt;[62]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 5.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a href="#_ftnref63" name="_ftn63"&gt;[63]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 6.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a href="#_ftnref64" name="_ftn64"&gt;[64]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a href="#_ftnref65" name="_ftn65"&gt;[65]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 8.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a href="#_ftnref66" name="_ftn66"&gt;[66]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 9.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a href="#_ftnref67" name="_ftn67"&gt;[67]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, schedule 3, 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a href="#_ftnref68" name="_ftn68"&gt;[68]&lt;/a&gt; . Telecommunications Act, Part 13 (Information or a document protected under Part 13 could relate to many forms of communications, including fixed 			and mobile telephone services, internet browsing, email and voice over internet telephone services. For telephone-based communications, this would 			include subscriber information, the telephone numbers of the parties involved, the time of the call and its duration. In relation to internet-based 			applications, the information protected under Part 13 would include the Internet Protocol (IP) address used for the session, and the start and 			finish time of each session.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a href="#_ftnref69" name="_ftn69"&gt;[69]&lt;/a&gt; . Directive 95/46/EC of the European Parliament and of the Council of 24 October 1995 on the protection of individuals with regard to the 			processing of personal data and on the free movement of such data, &lt;i&gt;available at&lt;/i&gt; http://eur-lex.europa.eu/LexUriServ/LexUriServ.do?uri=CELEX:31995L0046:en:HTML.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a href="#_ftnref70" name="_ftn70"&gt;[70]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, article 3.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a href="#_ftnref71" name="_ftn71"&gt;[71]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, article 8.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a href="#_ftnref72" name="_ftn72"&gt;[72]&lt;/a&gt; . &lt;i&gt;Id&lt;/i&gt;, article 2, (d). (" 			&lt;i&gt; (d) 'controller' shall mean the natural or legal person, public authority, agency or any other body which alone or jointly with others 				determines the purposes and means of the processing of personal data; where the purposes and means of processing are determined by national or 				Community laws or regulations, the controller or the specific criteria for his nomination may be designated by national or Community law; &lt;/i&gt; ")&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a href="#_ftnref73" name="_ftn73"&gt;[73]&lt;/a&gt; . European Commission-IP-12/46, 25 January 2012, &amp;lt;			&lt;a href="http://europa.eu/rapid/press-release_IP-12-46_en.htm?locale=en."&gt;http://europa.eu/rapid/press-release_IP-12-46_en.htm?locale=en.&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a href="#_ftnref74" name="_ftn74"&gt;[74]&lt;/a&gt; . Directive 2002/58/EC of the European Parliament and of the Council of 12 July 2002 concerning the processing of personal data and the protection 			of privacy in the electronic communications sector.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a href="#_ftnref75" name="_ftn75"&gt;[75]&lt;/a&gt; . Directive 2006/24/EC of the European Parliament and of the Council of 15 March 2006 on the retention of data generated or processed in connection 			with the provision of publicly available electronic communications services or of public communications networks and amending Directive 2002/58/EC.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a href="#_ftnref76" name="_ftn76"&gt;[76]&lt;/a&gt; . Rule 2 (h)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a href="#_ftnref77" name="_ftn77"&gt;[77]&lt;/a&gt; . Rule 3 (ii)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a href="#_ftnref78" name="_ftn78"&gt;[78]&lt;/a&gt; . Rule 3 (vii) and (viii)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a href="#_ftnref79" name="_ftn79"&gt;[79]&lt;/a&gt; . Rule 2 (i)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a href="#_ftnref80" name="_ftn80"&gt;[80]&lt;/a&gt; . Rule 4(iii), (iv)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a href="#_ftnref81" name="_ftn81"&gt;[81]&lt;/a&gt; . Section 2(v) of the Act defines 'information'&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a href="#_ftnref82" name="_ftn82"&gt;[82]&lt;/a&gt; . Rule 4 (1).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p&gt;&lt;a href="#_ftnref83" name="_ftn83"&gt;[83]&lt;/a&gt; . Rule 5 (5)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a href="#_ftnref84" name="_ftn84"&gt;[84]&lt;/a&gt; . Defined by Venkatarama Aiyar, J as: "The rule of construction is well settled that when there are in an enactment two provisions which cannot be reconciled with each other, they should be so interpreted that, if possible, effect could be given to both" in			&lt;i&gt;Venkataramana Devaru v. State of Mysore,&lt;/i&gt; AIR 1958 SC 255, p. 268: G. P. Singh, Principles of Statutory Interpretation, 1th ed. 2010, 			Lexisnexis Butterworths Wadhwa Nagpur. The principle was applied to interpret statutory Rules in A. N. Sehgal v. Raje Ram Sheoram, AIR 1991 SC 			1406.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p&gt;&lt;a href="#_ftnref85" name="_ftn85"&gt;[85]&lt;/a&gt; . Rule 6&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a href="#_ftnref86" name="_ftn86"&gt;[86]&lt;/a&gt; . Rule 8&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a href="#_ftnref87" name="_ftn87"&gt;[87]&lt;/a&gt; . 52&lt;sup&gt;nd&lt;/sup&gt; Report, Standing Committee on Information Technology, 24, available at &amp;lt; 			&lt;a href="http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf.%20"&gt; http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf. &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a href="#_ftnref88" name="_ftn88"&gt;[88]&lt;/a&gt; . Panel Of Information Security Auditing Organisations, CERT-IN &amp;lt;			&lt;a href="http://www.cert-in.org.in/PDF/background.pdf"&gt;http://www.cert-in.org.in/PDF/background.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a href="#_ftnref89" name="_ftn89"&gt;[89]&lt;/a&gt; . Section 1, Guidelines for applying to CERT-In for Empanelment of IT Security Audition Organisation, &amp;lt;			&lt;a href="http://www.cert-in.org.in/PDF/InfoSecAuditorsEmpGuidelines.pdf"&gt;http://www.cert-in.org.in/PDF/InfoSecAuditorsEmpGuidelines.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a href="#_ftnref90" name="_ftn90"&gt;[90]&lt;/a&gt; . Section 2.0, Guidelines for auditee organizations, Version 2.0, IT Security&lt;/p&gt;
&lt;p&gt;Auditing Assignment, http://www.cert-in.org.in/PDF/guideline_auditee.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a href="#_ftnref91" name="_ftn91"&gt;[91]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.cert-in.org.in/PDF/Empanel_org.pdf"&gt;http://www.cert-in.org.in/PDF/Empanel_org.pdf&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a href="#_ftnref92" name="_ftn92"&gt;[92]&lt;/a&gt; . Rule 4&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a href="#_ftnref93" name="_ftn93"&gt;[93]&lt;/a&gt; . Rule 4&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a href="#_ftnref94" name="_ftn94"&gt;[94]&lt;/a&gt; . Rule 5 (7)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn95"&gt;
&lt;p&gt;&lt;a href="#_ftnref95" name="_ftn95"&gt;[95]&lt;/a&gt; . See &amp;lt;&amp;lt; &lt;a href="http://www.airtel.in/forme/privacy-policy"&gt;http://www.airtel.in/forme/privacy-policy&lt;/a&gt;&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn96"&gt;
&lt;p&gt;&lt;a href="#_ftnref96" name="_ftn96"&gt;[96]&lt;/a&gt; &lt;i&gt; . 'Information that can be used by itself to uniquely identify, contact or locate a person, or can be used with information available from 				other sources to uniquely identify an individual. For the purpose of this policy, sensitive personal data or information has been considered as 				a part of personal information.' &lt;/i&gt; Accessed at &amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn97"&gt;
&lt;p&gt;&lt;a href="#_ftnref97" name="_ftn97"&gt;[97]&lt;/a&gt; . Subscriber's name, father's name, mother's name, spouse's name, date of birth, current and previous addresses, telephone number, mobile phone 			number, email address, occupation and information contained in the documents used as proof of identity and proof of address. Information related to 			your utilization of our services which may include your call details, your browsing history on our website, location details and additional 			information provided by you while using our services. We may keep a log of the activities performed by you on our network and websites by using 			various internet techniques such as web cookies, web beacons, server log files, etc.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn98"&gt;
&lt;p&gt;&lt;a href="#_ftnref98" name="_ftn98"&gt;[98]&lt;/a&gt; . Password&lt;b&gt;, &lt;/b&gt;Financial information -details of Bank account, credit card, debit card, or other payment instrument detail			&lt;b&gt;s, &lt;/b&gt;Physical, physiological and mental health condition&lt;b&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn99"&gt;
&lt;p&gt;&lt;a href="#_ftnref99" name="_ftn99"&gt;[99]&lt;/a&gt; . Airtel states that if a customer does not provide information or consent for usage of personal information or subsequently withdraws consent, 			Airtel reserves the right to not provide the services or to withdraw the services for which the said information was sought, Avaliable at: &amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/collection+of+personal+info?contentIDR=53535f55-b787-4cb8-b399-d11d97f80c26&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn100"&gt;
&lt;p&gt;&lt;a href="#_ftnref100" name="_ftn100"&gt;[100]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp"&gt;www.airtel.in/applications/xm/FixedLineNodalOfficer.jsp&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn101"&gt;
&lt;p&gt;&lt;a href="#_ftnref101" name="_ftn101"&gt;[101]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp"&gt; http://www.airtel.in/applications/xm/BroadbandInternet_AppellateAuth.jsp &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn102"&gt;
&lt;p&gt;&lt;a href="#_ftnref102" name="_ftn102"&gt;[102]&lt;/a&gt; . See &amp;lt;&amp;lt; http://www.airtel.in/about-bharti/about-bharti-airtel/ombuds-office&amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn103"&gt;
&lt;p&gt;&lt;a href="#_ftnref103" name="_ftn103"&gt;[103]&lt;/a&gt; . Stakeholders are defined as: employee, associate, strategic partner, vendor&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn104"&gt;
&lt;p&gt;&lt;a href="#_ftnref104" name="_ftn104"&gt;[104]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072331247805566Bharti_Airtel_CC_AA-23072013.pdf"&gt; http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072331247805566Bharti_Airtel_CC_AA-23072013.pdf &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn105"&gt;
&lt;p&gt;&lt;a href="#_ftnref105" name="_ftn105"&gt;[105]&lt;/a&gt; . Verification of customer's identity; Complete transactions effectively and bill for products and service; Respond to customer requests for 			service or assistance; Perform market analysis, market research, business and operational analysis; Provide, maintain and improve Airtel products 			and services; Anticipate and resolve issues and concerns with Airtel products and services; Promote and market Airtel products and services which 			it may consider of interest and benefit to customers; and, Ensure adherence to legal and regulatory requirements for prevention and detection of 			frauds and crimes.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn106"&gt;
&lt;p&gt;&lt;a href="#_ftnref106" name="_ftn106"&gt;[106]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/disclosure+and+transfer?contentIDR=745792ad-d6af-4684-85d4-d85773e77356&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/disclosure+and+transfer?contentIDR=745792ad-d6af-4684-85d4-d85773e77356&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn107"&gt;
&lt;p&gt;&lt;a href="#_ftnref107" name="_ftn107"&gt;[107]&lt;/a&gt; . "Airtel may obtain a customer's consent for sharing personal information in several ways, such as in writing, online, through "click-through" 			agreements; orally, including through interactive voice response; or when a customer's consent is part of the terms and conditions pursuant to 			which Airtel provides a service."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn108"&gt;
&lt;p&gt;&lt;a href="#_ftnref108" name="_ftn108"&gt;[108]&lt;/a&gt; . Airtel and its employees may utilize some or all available personal information for internal assessments, measures, operations and related 			activities…"&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn109"&gt;
&lt;p&gt;&lt;a href="#_ftnref109" name="_ftn109"&gt;[109]&lt;/a&gt; . Airtel may at its discretion employ, contract or include third parties external to itself for strategic, tactical and operational purposes. Such 			agencies though external to Airtel, will always be entities which are covered by contractual agreements. These agreements in turn include Airtel's 			guidelines to the management, treatment and secrecy of personal information&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn110"&gt;
&lt;p&gt;&lt;a href="#_ftnref110" name="_ftn110"&gt;[110]&lt;/a&gt; . Airtel may transfer subscriber's personal information or other information collected, stored, processed by it to any other entity or organization 			located in India or outside India only in case it is necessary for providing services to a subscriber or if the subscriber has consented (at the 			time of collection of information) to the same. This may also include sharing of aggregated information with them in order for them to understand 			Airtel's environment and consequently, provide the subscriber with better services. While sharing personal information with third parties, adequate 			measures shall be taken to ensure that reasonable security practices are followed at the third party."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn111"&gt;
&lt;p&gt;&lt;a href="#_ftnref111" name="_ftn111"&gt;[111]&lt;/a&gt; . Airtel may share subscribers' personal information with Government agencies or other authorized law enforcement agencies (LEAs) mandated under 			law to obtain such information for the purpose of verification of identity or for prevention, detection, investigation including but not limited to 			cyber incidents, prosecution, and punishment of offences.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn112"&gt;
&lt;p&gt;&lt;a href="#_ftnref112" name="_ftn112"&gt;[112]&lt;/a&gt; . See&amp;lt;&amp;lt; 			&lt;a href="http://www.airtel.in/forme/privacy-policy/security+practices+and+procedures?contentIDR=9346516c-c1a1-4bd7-bce0-6945236dceaa&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0"&gt; http://www.airtel.in/forme/privacy-policy/security+practices+and+procedures?contentIDR=9346516c-c1a1-4bd7-bce0-6945236dceaa&amp;amp;useDefaultText=0&amp;amp;useDefaultDesc=0 &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn113"&gt;
&lt;p&gt;&lt;a href="#_ftnref113" name="_ftn113"&gt;[113]&lt;/a&gt; . Airtel adopts reasonable security practices and procedures, in line with international standard IS/ISO/IEC 27001, to include, technical, 			operational, managerial and physical security controls in order to protect a customer's personal information from unauthorized access, or 			disclosure while it is under our control.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn114"&gt;
&lt;p&gt;&lt;a href="#_ftnref114" name="_ftn114"&gt;[114]&lt;/a&gt; . Airtel's security practices and procedures limit access to personal information on need-only basis. Further, its employees are bound by Code of 			Conduct and Confidentiality Policies which obligate them to protect the confidentiality of personal information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn115"&gt;
&lt;p&gt;&lt;a href="#_ftnref115" name="_ftn115"&gt;[115]&lt;/a&gt; . Airtel takes adequate steps to ensure that its third parties adopt reasonable level of security practices and procedures to ensure security of 			personal information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn116"&gt;
&lt;p&gt;&lt;a href="#_ftnref116" name="_ftn116"&gt;[116]&lt;/a&gt; . Airtel may retain a subscriber's personal information for as long as required to provide him/her with services or if otherwise required under any 			law.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn117"&gt;
&lt;p&gt;&lt;a href="#_ftnref117" name="_ftn117"&gt;[117]&lt;/a&gt; . When Airtel disposes of its customers' personal information, it uses reasonable procedures to erase it or render it unreadable (for example, 			shredding documents and wiping electronic media)."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn118"&gt;
&lt;p&gt;&lt;a href="#_ftnref118" name="_ftn118"&gt;[118]&lt;/a&gt; . Airtel maintains the security of its internet connections, however for reasons outside of its control, security risks may still arise. Any 			personal information transmitted to Airtel or from its online products or services will therefore be at a customer's own risk. It observes 			reasonable security measures to protect a customer's personal information against hacking and virus dissemination.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn119"&gt;
&lt;p&gt;&lt;a href="#_ftnref119" name="_ftn119"&gt;[119]&lt;/a&gt; . See &amp;lt;&amp;lt;http://www.tatadocomo.com/downloads/data-privacy-policy.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn120"&gt;
&lt;p&gt;&lt;a href="#_ftnref120" name="_ftn120"&gt;[120]&lt;/a&gt; . Information that customers provide to non-TTL companies is not covered by TTL's Policy. For example: When customers download applications or make 			an online purchase from a non-TTL company while using TTL's Internet or wireless services, the information collected by the non-TTL company is not 			subject to this Policy. When you navigate to a non-TTL company from TTL websites or applications (by clicking on a link or an advertisement, for 			example), information collected by the non-TTL company is governed by its privacy policy and not TTL's Privacy Policy. If one uses public forums - 			such as social networking services, Internet bulletin boards, chat rooms, or blogs on TTL or non-TTL websites, any Personal Information disclosed 			publicly can be read, collected, or used by others. Once one chooses to reveal Personal Information on such a site, the information is publicly 			available, and TTL cannot prevent distribution and use of that information by other parties. Information on a wireless Customer 's location, usage 			and numbers dialed, which is roaming on the network of a non-TTL company will be subject to the privacy policy of the non-TTL company, and not 			TTL's Policy.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn121"&gt;
&lt;p&gt;&lt;a href="#_ftnref121" name="_ftn121"&gt;[121]&lt;/a&gt; . "Personal Information" is any information that relates to a natural person which, either directly or indirectly, in combination with other 			information available or likely to be available with a body corporate, is capable of identifying such person.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn122"&gt;
&lt;p&gt;&lt;a href="#_ftnref122" name="_ftn122"&gt;[122]&lt;/a&gt; . Personal Information - Some general examples -TTL may collect Confidential Data in different forms such as Personal and other Information based 			on a customer's use of its products and services. Some examples include, Contact Information that allows us to communicate with you -- including 			your name, address, telephone number, and e-mail address; Billing information-- including payment data, credit history, credit card number, 			security codes, and service history.Equipment, Performance, TTL Website Usage, Viewing and other Technical Information about use of TTL's network, 			services, products or websites.&lt;/p&gt;
&lt;p&gt;Technical &amp;amp; Usage Information is clarified in the FAQ's as information&lt;b&gt; &lt;/b&gt;related to the services provided, use of TTL's network, 			services, products or websites. Examples of the Technical &amp;amp; Usage Information collected include: &lt;b&gt;Equipment Information &lt;/b&gt;that identifies the equipment used on TTL's network, such as equipment type, IDs, serial numbers, settings, configuration, and software.			&lt;b&gt;Performance Information &lt;/b&gt;about the operation of the equipment, services and applications used on TTL's network, such as IP 			addresses, URLs, data transmission rates and latencies, location information, security characteristics, and information about the amount of bandwidth and other network resources used in connection with uploading, downloading or streaming data to and from the Internet.			&lt;b&gt;TTL Website Usage Information &lt;/b&gt;about the use of TTL websites, including the pages visited, the length of time spent, the links or 			advertisements followed and the search terms entered on TTL sites, and the websites visited immediately before and immediately after visiting one of TTL's sites.TTL also may collect similar information about a customer's use of its applications on wireless devices.			&lt;b&gt;Viewing Information &lt;/b&gt;about the programs watched and recorded and similar choices under Value added TTL services and products.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn123"&gt;
&lt;p&gt;&lt;a href="#_ftnref123" name="_ftn123"&gt;[123]&lt;/a&gt; . Ways in which TTL collects information: On the purchase or interaction about a TTL product or service provided; Automatically collected when one 			visits TTL's websites or use its products and services; Other sources, such as credit agencies.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn124"&gt;
&lt;p&gt;&lt;a href="#_ftnref124" name="_ftn124"&gt;[124]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.tatateleservices.com/t-customercare.aspx"&gt;http://www.tatateleservices.com/t-customercare.aspx&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn125"&gt;
&lt;p&gt;&lt;a href="#_ftnref125" name="_ftn125"&gt;[125]&lt;/a&gt; .See&amp;lt; 			&lt;a href="http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341218463621Tata_CC_AA_1-23072013.pdf"&gt; http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341218463621Tata_CC_AA_1-23072013.pdf &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn126"&gt;
&lt;p&gt;&lt;a href="#_ftnref126" name="_ftn126"&gt;[126]&lt;/a&gt; . To provide the best customer experience possible; Provide the services a customer purchases, respond to customer questions; Communicate with 			customers regarding service updates, offers, and promotions; Deliver customized content and advertising that may be of interest to customers; 			Address network integrity and security issues; Investigate, prevent or take action regarding illegal activities, violations of TTL's Terms of 			Service or Acceptable Use Policies&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn127"&gt;
&lt;p&gt;&lt;a href="#_ftnref127" name="_ftn127"&gt;[127]&lt;/a&gt; . &lt;b&gt;Site functionality &lt;/b&gt;-Cookies and other tracking tools are used to help TTL analyze, manage and improve websites and storing 			customer preferences. &lt;b&gt;Advertising &lt;/b&gt;TTL and its advertising partners, including Yahoo! and other advertising networks, use anonymous 			information gathered through cookies and other similar technologies, as well as other information TTL or its advertising networks may have, to help 			tailor the ads a customer sees on its sites.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn128"&gt;
&lt;p&gt;&lt;a href="#_ftnref128" name="_ftn128"&gt;[128]&lt;/a&gt; . TTL collects some Information on an anonymous basis. TTL also may anonymize the Personal Information it collects about customers. It may obtain 			aggregate data by combining anonymous data that meet certain criteria into groups.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn129"&gt;
&lt;p&gt;&lt;a href="#_ftnref129" name="_ftn129"&gt;[129]&lt;/a&gt; . In Other Circumstances: TTL may provide Personal Information to non-TTL companies or other third parties for purposes such as: To assist with 			identity verification, and to prevent fraud and identity theft; Enforcing its agreements and property rights; Obtaining payment for products and 			services that appear on customers' TTL billing statements, including the transfer or sale of delinquent accounts to third parties for collection; 			and to comply to legal and regulatory requirements. TTL shares customer Personal Information only with non-TTL companies that perform services on 			its behalf, and only as necessary for them to perform those services. TTL requires those non-TTL companies to protect any Personal Information they 			may receive in a manner consistent with this policy. TTL does not provide Personal Information to non-TTL companies for the marketing of their own 			products and services without a customer's consent. TTL may share aggregate or anonymous Information in various formats with trusted non-TTL 			entities, and may work with those entities to do research and provide products and services.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn130"&gt;
&lt;p&gt;&lt;a href="#_ftnref130" name="_ftn130"&gt;[130]&lt;/a&gt; . TTL provides Personal Information to non-TTL companies or other third parties (for example, to government agencies, credit bureaus and collection 			agencies) without consent for certain purposes, such as: To comply with court orders, subpoenas, lawful discovery requests and other legal or 			regulatory requirements, and to enforce our legal rights or defend against legal claims, To obtain payment for products and services that appear on 			customer TTL billing statements, including the transfer or sale of delinquent accounts to third parties for collection; To enforce its agreements, 			and protect our rights or property; To assist with identity verification, and to prevent fraud and identity theft; To prevent unlawful use of TTL's 			services and to assist in repairing network outages; To provide information regarding the caller's location to a public safety entity when a call 			is made to police/investigation agencies, and to notify the public of wide-spread emergencies; To notify or respond to a responsible governmental 			entity if we reasonably believe that an emergency involving immediate danger of death or serious physical injury to any person requires or 			justifies disclosure without delay; To display name and telephone number on a Caller ID device;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn131"&gt;
&lt;p&gt;&lt;a href="#_ftnref131" name="_ftn131"&gt;[131]&lt;/a&gt; . Subject to applicable legal restrictions, such as those that exist for Customer Proprietary Network Information (CPNI), the TTL companies may 			share your Personal Information with each other to make sure your experience is as seamless as possible, and you have the benefit of what TTL has 			to offer.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn132"&gt;
&lt;p&gt;&lt;a href="#_ftnref132" name="_ftn132"&gt;[132]&lt;/a&gt; . Customers and Users should be aware that TTL affiliates and non-TTL companies that perform services on behalf of TTL may be located outside the 			country where customers access TTL's services. As a result, when customer Personal Information is shared with or processed by such entities, it may 			be accessible to government authorities according to the laws of those jurisdictions.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn133"&gt;
&lt;p&gt;&lt;a href="#_ftnref133" name="_ftn133"&gt;[133]&lt;/a&gt; . TTL has implemented appropriate security controls to protect Personal Information when stored or transmitted by TTL. It has established 			electronic and administrative safeguards designed to secure the information it collects, to prevent unauthorized access to or disclosure of that 			information and to ensure it is used appropriately. Some examples of those safeguards include: All TTL employees are subject to the internal Code 			of Business Conduct. The TTL Code requires all employees to follow the laws, rules, regulations, court and/or commission orders that apply to TTL's 			business such as legal requirements and company policies on the privacy of communications and the security and privacy of Customer records. 			Employees who fail to meet the standards embodied in the Code of Business Conduct are subject to disciplinary action, up to and including 			dismissal. TTL has implemented technology and security features and strict policy guidelines to safeguard the privacy of customer Personal 			Information. TTL has implemented encryption or other appropriate security controls to protect Personal Information when stored or transmitted by 			it; TTL limits access to Personal Information to those employees, contractors, and agents who need access to such information to operate, develop, 			or improve its services and products; TTL requires caller/online authentication before providing Account Information so that only the customer or 			someone who knows the customer's account Information will be able to access or change the information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn134"&gt;
&lt;p&gt;&lt;a href="#_ftnref134" name="_ftn134"&gt;[134]&lt;/a&gt; . See &amp;lt;&amp;lt; 			&lt;a href="http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf"&gt; http://www.tatateleservices.com/download/aboutus/ttml/TTML-Annual-Report-2012-13.pdf &lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn135"&gt;
&lt;p&gt;&lt;a href="#_ftnref135" name="_ftn135"&gt;[135]&lt;/a&gt; . See &amp;lt;&amp;lt; &lt;a href="https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker"&gt;https://www.vodafone.in/pages/privacy_policy.aspx?cid=ker&lt;/a&gt; &amp;gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn136"&gt;
&lt;p&gt;&lt;a href="#_ftnref136" name="_ftn136"&gt;[136]&lt;/a&gt; . "We have created this Privacy Policy to help you understand how we collect, use and protect your information when you visit our web and WAP sites 			and use our products and services."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn137"&gt;
&lt;p&gt;&lt;a href="#_ftnref137" name="_ftn137"&gt;[137]&lt;/a&gt; . Vodafone may hold information relating to customers that have been provided (such as on an application or registration form) or that it may has 			obtained from another source (such as its suppliers or from marketing organisations and credit agencies).&lt;/p&gt;
&lt;p&gt;This information may include, amongst other things, a customer's name, address, telephone numbers, information on how a customer uses Vodafone's 			products and services (such as the type, date, time, location and duration of calls or messages, the numbers called and how much a customer spends, 			and information on his/her browsing activity when visiting one of Vodafone's group companies' websites), the location of a customer's mobile phone 			from time to time, lifestyle information and any other information collected in relation to his/her use of Vodafone's products and services 			("information").&lt;/p&gt;
&lt;p&gt;It may use cookies and other interactive techniques such as web beacons to collect non-personal information about how a customer interacts with its 			website, and web-related products and services.&lt;/p&gt;
&lt;p&gt;It may use a persistent cookie to record details such as a unique user identity and general registration details on your PC. Vodafone states that 			most browser technology (such as Internet Explorer, Netscape etc) allows one to choose whether to accept cookies or not - a customer can either 			refuse all cookies or set their browser to alert them each time that a website tries to set a cookie.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn138"&gt;
&lt;p&gt;&lt;a href="#_ftnref138" name="_ftn138"&gt;[138]&lt;/a&gt; . In case of any concerns the privacy officer can be contacted at &lt;a href="mailto:privacyofficer@vodafone.com"&gt;privacyofficer@vodafone.com&lt;/a&gt;. 			Additionally details of the Grievance Redressal Officers is provided via the TRAI website. (TRAI website: 			&lt;a href="http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341567851124Vodafone_CC_AA-23072013.pdf"&gt; http://www.trai.gov.in/WriteReadData/ConsumerGroup/Document/2013072341567851124Vodafone_CC_AA-23072013.pdf &lt;/a&gt; _&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn139"&gt;
&lt;p&gt;&lt;a href="#_ftnref139" name="_ftn139"&gt;[139]&lt;/a&gt; . The information that Vodafone collects from customers is held in accordance with applicable laws and regulations in India. It may be used by us 			for a number of purposes connected with its business operations and functions, which include:&lt;/p&gt;
&lt;p&gt;2.1 Processing customer orders or applications;&lt;/p&gt;
&lt;p&gt;2.2 Carrying out credit checking and scoring (unless Vodafone have agreed otherwise);&lt;/p&gt;
&lt;p&gt;2.3 Providing the customer with products and/or services requested (including the presentation or elimination of calling or connected line 			identification) or administering his/her account;&lt;/p&gt;
&lt;p&gt;2.4 Billing&lt;/p&gt;
&lt;p&gt;2.5 Settling accounts with those who provide related services to Vodafone;&lt;/p&gt;
&lt;p&gt;2.6 Dealing with requests, enquiries or complaints and other customer care related activities; and all other general administrative and business 			purposes;&lt;/p&gt;
&lt;p&gt;2.7 Carrying out market and product analysis and marketing Vodafone and its group companies' products and services generally;&lt;/p&gt;
&lt;p&gt;2.8 Contacting a customer (including by post, email, fax, short text message (SMS), pager or telephone) about Vodafone and its group companies' 			products and services and the products and services of carefully selected third parties which it think may be of interest to customers (unless a 			customer asks us in writing not to). Electronic marketing messages may not include a marketing facility.&lt;/p&gt;
&lt;p&gt;2.9 Registering customer details and allocating or offering rewards, discounts or other benefits and fulfilling any requests that a customer may 			have in respect of our and our group companies' schemes.&lt;/p&gt;
&lt;p&gt;2.10 inclusion in any telephone or similar directory or directory enquiry service provided or operated by us or by a third party (subject to any 			objection or preference a customer may have indicated to us in writing);&lt;/p&gt;
&lt;p&gt;2.11 carrying out any activity in connection with a legal, governmental or regulatory requirement on Vodafone or in connection with legal 			proceedings, crime or fraud prevention, detection or prosecution;&lt;/p&gt;
&lt;p&gt;2.12 carrying out activities connected with the running of Vodafone's business such as personnel training, quality control, network monitoring, 			testing and maintenance of computer and other systems and in connection with the transfer of any part of Vodafone's business with respect to a 			customer or a potential customer.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn140"&gt;
&lt;p&gt;&lt;a href="#_ftnref140" name="_ftn140"&gt;[140]&lt;/a&gt; . In the need for disclosure to third parties, the personal information will only be disclosed to the third parties below:&lt;/p&gt;
&lt;p&gt;3.1 Vodafone's group companies who may in India use and disclose your information for the same purposes as us;&lt;/p&gt;
&lt;p&gt;3.2 those who provide to Vodafone or its group companies products or services that support the services that we provide, such as our dealers and 			suppliers;&lt;/p&gt;
&lt;p&gt;3.3 credit reference agencies (unless Vodafone has agreed otherwise) who may share your information with other organisations and who may keep a 			record of the searches Vodafone makes against a customer's name;&lt;/p&gt;
&lt;p&gt;3.4 if someone else pays a customer's bill, such as a customer's employer, that person;&lt;/p&gt;
&lt;p&gt;3.5 those providing telephone and similar directories or directory enquiry services&lt;/p&gt;
&lt;p&gt;3.6 anyone Vodafone transfers business to in respect of which a person is a customer or a potential customer;&lt;/p&gt;
&lt;p&gt;3.7 anyone who assists Vodafone in protecting the operation of the Vodafone India networks and systems, including the use of monitoring and 			detection in order to identify potential threats, such as hacking and virus dissemination and other security vulnerabilities;&lt;/p&gt;
&lt;p&gt;3.8 persons to whom Vodafone may be required to pass customer information by reason of legal, governmental or regulatory authority including law 			enforcement agencies and emergency services;&lt;/p&gt;
&lt;p&gt;3.9 any person or organisation as authorised by laws and regulations applicable in India.&lt;/p&gt;
&lt;p&gt;If a customer has opted in to receiving marketing material from Vodafone, it may also provide customer's personal information to carefully selected 			third parties who we reasonably believe provide products or services that may be of interest to customers and who have contracted with Vodafone 			India to keep the information confidential, or who are subject to obligations to protect your personal information.&lt;/p&gt;
&lt;p&gt;To opt-out of receiving Vodafone marketing materials,customers can send a 'Do Not Disturb' message to Vodafone. If a customer wishes to use 			Vodafone products or services abroad, his/her information may be transferred outside India to that country. Vodafone's websites and those of its 			group companies may also be based on servers located outside of India.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn141"&gt;
&lt;p&gt;&lt;a href="#_ftnref141" name="_ftn141"&gt;[141]&lt;/a&gt; . Vodafone takes reasonable steps to ensure that the personal information it collects, uses or discloses is accurate, complete, up-to-date and 			stored in a secure environment protected from unauthorized access, modification or disclosure.&lt;/p&gt;
&lt;p&gt;Vodafone makes every effort to maintain the security of our internet connections; however for reasons outside of our control, security risks may 			still arise. Any personal information transmitted to it or from its online products or services will be at a customer's own risk, however, it will 			use its best efforts to ensure that any such information remains secure. Vodafone cannot protect any information that a customer makes available to 			the general public - for example, on message boards or in chat rooms.&lt;/p&gt;
&lt;p&gt;Vodafone may use cookies and other interactive techniques such as web beacons to collect non-personal information about how a customer interacts.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn142"&gt;
&lt;p&gt;&lt;a href="#_ftnref142" name="_ftn142"&gt;[142]&lt;/a&gt; . See &amp;lt;&lt;a href="http://www.vodafone.com"&gt;http://www.vodafone.com&lt;/a&gt;&amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn143"&gt;
&lt;p&gt;&lt;a href="#_ftnref143" name="_ftn143"&gt;[143]&lt;/a&gt; . See &amp;lt; 			&lt;a href="http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html"&gt; http://www.vodafone.com/content/sustainability/operating_responsibly/privacy_and_security.html &lt;/a&gt; &amp;gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn144"&gt;
&lt;p&gt;&lt;a href="#_ftnref144" name="_ftn144"&gt;[144]&lt;/a&gt; . 			&lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061"&gt; http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061 &lt;/a&gt; (Scope - This Privacy Policy has been created to help customer's understand how Aircel collects, uses and protects customer information when one 			visits its web and WAP sites and use its products and services.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn145"&gt;
&lt;p&gt;&lt;a href="#_ftnref145" name="_ftn145"&gt;[145]&lt;/a&gt; . This information may include, amongst other things, customer's name, father's name, mother's name, spouse's name, date of birth, address, 			telephone numbers, mobile phone number, email address, occupation and information contained in the documents used as proof of identity and proof of 			address. Aircel may also hold information related to utilization of its services. This may include customer call records, browsing history while 			surfing Aircel's website, location details and additional information provided by customer while using our services.&lt;/p&gt;
&lt;p&gt;Aircel may keep a log of the activities performed by a customer on its websites by using various internet techniques such as web cookies, web 			beacons, server log files, etc.&lt;/p&gt;
&lt;p&gt;Aircel may use cookies and other interactive techniques such as web beacons to collect non-personal information about how customers interact with 			Aircel's website, and web-related products and services&lt;/p&gt;
&lt;p&gt;Aircel may use a persistent cookie to record details such as a unique user identity and general registration details on customer's Personal 			Computers.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn146"&gt;
&lt;p&gt;&lt;a href="#_ftnref146" name="_ftn146"&gt;[146]&lt;/a&gt; . In case a customer does not provide information or consent for usage of personal information or later on withdraw consent for usage of the 			personal information so collected, Aircel reserves the right to discontinue the services for which the said information was sought.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn147"&gt;
&lt;p&gt;&lt;a href="#_ftnref147" name="_ftn147"&gt;[147]&lt;/a&gt; . In case of any feedback or concern regarding protection of personal information, customers can contact Aircel's &lt;b&gt;Circle Care ID.&lt;/b&gt; Alternatively, one may also direct your privacy-related feedback or concerns to the &lt;b&gt;Circle Nodal Officer.&lt;/b&gt; (e.g. - Delhi Circle 			Nodal details are as mentioned below):&lt;/p&gt;
&lt;p&gt;&lt;b&gt;1. &lt;/b&gt; &lt;b&gt;Name: Moushumi De&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; Contact Number: 9716199209&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; E-mail: &lt;/b&gt; &lt;a href="http://www.aircel.com/AircelWar/appmanager/aircel/karnataka?_nfpb=true&amp;amp;_pageLabel=P26400194591312373872061"&gt; &lt;b&gt;nodalofficer.delhi@aircel.co.in&lt;/b&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Further it provides for a general customer grievance redressal mechanism&lt;/p&gt;
&lt;p&gt;Additionally details of the Grievance Redressal Officers is provided via the TRAI website.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; To resolve all concerns, Aircel has established a 2-tier complaint handling mechanism.&lt;/b&gt; &lt;b&gt;Level I: Our Customer Touch Points&lt;/b&gt; As an Aircel customer you have the convenience to contact at Customer Interface Points via email, post or telephone.			&lt;b&gt;Level II - Appellate Authority&lt;/b&gt;Despite the best efforts put by Aircel's executive, if a customer is still not satisfied with the 			resolution provided then he/she may submit his/her concern to the Appellate Authority of the circle. Comments - However this information 			contradicts the mechanism provided under Aircel's Manual of Practice for handling Consumer Complaints which provides for a 3&lt;b&gt;-&lt;/b&gt;tier 			complaint handling mechanism.&lt;/p&gt;
&lt;p&gt;[According to the DoT - The 			&lt;b&gt; earlier three-tier complaint redressal mechanism - Call center, Nodal Center and Appellate Authority, has been replaced by a two-tier &lt;/b&gt; one by doing away with the level of Nodal Officer. This is because the Complaint Centres are essentially registration and response centres and do 			not deal with the resolution of complaints. They only facilitate registration of consumer complaint and the level at which a problem is resolved 			within a company depends upon the complexity of the issue involved.]&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn148"&gt;
&lt;p&gt;&lt;a href="#_ftnref148" name="_ftn148"&gt;[148]&lt;/a&gt; . It may be used by us for a number of purposes connected with our business operations and functions, which include:&lt;/p&gt;
&lt;p&gt;1. Processing customer orders or applications.&lt;/p&gt;
&lt;p&gt;2. Carrying out credit checking and scoring (unless agreed otherwise).&lt;/p&gt;
&lt;p&gt;3. Providing customers with products and/or services requested (including the presentation or elimination of calling or connected line 			identification) or administering a customer's account.&lt;/p&gt;
&lt;p&gt;4. Billing (unless there exists another agreed method).&lt;/p&gt;
&lt;p&gt;5. Settling accounts with those who provide related services to Aircel.&lt;/p&gt;
&lt;p&gt;6. Dealing with requests, enquiries or complaints and other customer care related activities; and all other general administrative and business 			purposes.&lt;/p&gt;
&lt;p&gt;7. Carrying out market and product analysis and marketing our and our group companies' products and services generally.&lt;/p&gt;
&lt;p&gt;8. Contacting customers (including by post, email, fax, short text message (SMS), pager or telephone) about Aircel and its group companies' 			products and services and the products and services of carefully selected third parties which it think may be of interest to a customer (unless a 			customer says 'no' in writing). Electronic messages need not have an unsubscribe facility.&lt;/p&gt;
&lt;p&gt;9. Registering customer details and allocating or offering rewards, discounts or other benefits and fulfilling any requests that customers may have 			in respect of Aircel and its group companies' loyalty or reward programmes and other similar schemes.&lt;/p&gt;
&lt;p&gt;10. Inclusion in any telephone or similar directory or directory enquiry service provided or operated by Aircel or by a third party (subject to any 			objection or preference a customer may have indicated in writing).&lt;/p&gt;
&lt;p&gt;11. Carrying out any activity in connection with a legal, governmental or regulatory requirement on Aircel or in connection with legal proceedings, 			crime or fraud prevention, detection or prosecution.&lt;/p&gt;
&lt;p&gt;12. Carrying out activities connected with the running of business such as personnel training, quality control, network monitoring, testing and 			maintenance of computer and other systems and in connection with the transfer of any part of Aircel's business with respect to a customer or 			potential customer. Aircel may use cookies and other interactive techniques such as web beacons to collect non-personal information about how 			customers interact with our website, and web-related products and services, to:&lt;/p&gt;
&lt;p&gt;● Understand what a customer likes and uses about Aircel's website.&lt;/p&gt;
&lt;p&gt;● Provide a more enjoyable, customised service and experience&lt;/p&gt;
&lt;p&gt;Aircel may use a persistent cookie to record details such as a unique user identity and general registration details on your Personal Computer.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn149"&gt;
&lt;p&gt;&lt;a href="#_ftnref149" name="_ftn149"&gt;[149]&lt;/a&gt; . Where Aircel needs to disclose your information to third parties, such third parties will be:&lt;/p&gt;
&lt;p&gt;1. Group companies who may use and disclose your information for the same purposes as us.&lt;/p&gt;
&lt;p&gt;2. Those who provide to Aircel or its group companies products or services that support the services that we provide, such as our dealers and 			suppliers.&lt;/p&gt;
&lt;p&gt;3. Credit reference agencies (unless we have agreed otherwise) who may share your information with other organisations and who may keep a record of 			the searches Aircel make against your name.&lt;/p&gt;
&lt;p&gt;4. If someone else pays a customer's bill, such as an employer.&lt;/p&gt;
&lt;p&gt;5. Those providing telephone and similar directories or directory enquiry services.&lt;/p&gt;
&lt;p&gt;6. Anyone Aircel transfers its business to in respect of which you are a customer or a potential customer.&lt;/p&gt;
&lt;p&gt;7. Anyone who assists Aircel in protecting the operation of the Aircel networks and systems, including the use of monitoring and detection in order 			to identify potential threats, such as hacking and virus dissemination and other security vulnerabilities.&lt;/p&gt;
&lt;p&gt;8. Persons to whom Aircel may be required to pass customer information by reason of legal, governmental or regulatory authority including law 			enforcement agencies and emergency services. If a customer has opted in to receiving marketing material from Aircel, it may also provide personal 			information to carefully selected third parties who it reasonably believes to provide products or services that may be of interest to customers and 			who have contracted with Aircel to keep the information confidential, or who are subject to obligations to protect customer personal information.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn150"&gt;
&lt;p&gt;&lt;a href="#_ftnref150" name="_ftn150"&gt;[150]&lt;/a&gt; . We adopt reasonable security practices and procedures to include, technical, operational, managerial and physical security control measures in 			order to protect your personal information from unauthorized access, or disclosure while it is under our control.Our security practices and 			procedures limit access to personal information on need to know basis. Further, our employees, to the extent they may have limited access to your 			personal information on need to know basis, are bound by Code of Conduct and Confidentiality Policies which obligate them to protect the 			confidentiality of personal informationWe take adequate steps to ensure that our third parties adopt reasonable level of security practices and 			procedures to ensure security of personal information&lt;/p&gt;
&lt;p&gt;We may retain your personal information for as long as required to provide you with services or if otherwise required under any law. We, however 			assure you that Aircel does not disclose your personal information to unaffiliated third parties (parties outside Aircel corporate network and its 			Strategic and Business Partners) which could lead to invasion of your privacy&lt;/p&gt;
&lt;p&gt;When we dispose off your personal information, we use reasonable procedures to erase it or render it unreadable (for example, shredding documents 			and wiping electronic media).&lt;/p&gt;
&lt;p&gt;We will take reasonable steps to ensure that the personal information we collect, use or disclose is accurate, complete, up-to-date and stored in a 			secure environment protected from unauthorised access, modification or disclosure. We use a variety of security technologies and procedures to help 			protect your personal information from unauthorized access, use, or disclosure. For example, we store the personal information you provide on 			computer systems with limited access, which are located in controlled facilities. When we transmit highly confidential information (such as a 			credit card number or password) over the Internet, we protect it through the use of encryption, such as the Secure Socket Layer (SSL) protocol. If 			a password is used to help protect your accounts and personal information, it is your responsibility to keep your password confidential. Do not 			share this information with anyone. If you are sharing a computer with anyone you should always log out before leaving a site or service to protect 			access to your information from subsequent users.&lt;/p&gt;
&lt;p&gt;We make every effort to maintain the security of our internet connections; however for reasons outside of our control, security risks may still 			arise. Any personal information transmitted to us or from our online products or services will therefore be your own risk, however we will use our 			best efforts to ensure that any such information remains secure.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn151"&gt;
&lt;p&gt;&lt;a href="#_ftnref151" name="_ftn151"&gt;[151]&lt;/a&gt; . http://www.acttv.in/index.php/privacy-policy&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn152"&gt;
&lt;p&gt;&lt;a href="#_ftnref152" name="_ftn152"&gt;[152]&lt;/a&gt; . "When you register, we ask for information such as your name, email address, birth date, gender, zip code, occupation, industry, and personal 			interests.&lt;/p&gt;
&lt;p&gt;The Company collects information about your transactions with us and with some of our business partners, including information about your use of 			products and services that we offer."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn153"&gt;
&lt;p&gt;&lt;a href="#_ftnref153" name="_ftn153"&gt;[153]&lt;/a&gt; . Not provided for on the TRAI website as ACT is not a telecom.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn154"&gt;
&lt;p&gt;&lt;a href="#_ftnref154" name="_ftn154"&gt;[154]&lt;/a&gt; . The Company can use information for the following general purposes: to customize the advertising and content you see, fulfill your requests for 			products and services, improve our services, contact you, conduct research, and provide anonymous reporting for internal and external clients.&lt;/p&gt;
&lt;p&gt;The Company collects personal information when you register with the Company, when you use the Company products or services, when you visit the 			Company pages or the pages of certain partners of the Company. The Company may combine information about you that we have, with information we 			obtain from business partners or other companies. The Company shall have the right to pass on the same to its business associates, franchisees 			without referring the same to you.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn155"&gt;
&lt;p&gt;&lt;a href="#_ftnref155" name="_ftn155"&gt;[155]&lt;/a&gt; . Aircel provide the information to trusted partners who work on behalf of or with the Company under confidentiality agreements. These companies 			may use customer personal information to help the Company communicate about offers from the Company and marketing partners.&lt;/p&gt;
&lt;p&gt;Aircel believe it is necessary to share information in order to investigate, prevent, or take action regarding illegal activities, suspected fraud, 			situations involving potential threats to the physical safety of any person, violations of the Company's terms of use, or as otherwise required by 			law.&lt;/p&gt;
&lt;p&gt;Aircel transfer information about a customer if the Company is acquired by or merged with another company under a different management. In this 			event, the Company will notify a customer before information about a customer is transferred and becomes subject to a different privacy policy.&lt;/p&gt;
&lt;p&gt;The Company plans to display targeted advertisements based on personal information. Advertisers (including ad serving companies) may assume that 			people who interact with, view, or click on targeted ads meet the targeting criteria - for example, women ages 18-24 from a particular geographic 			area.&lt;/p&gt;
&lt;p&gt;The Company will not provide any personal information to the advertiser when customers interact with or view a targeted ad. However, by interacting 			with or viewing an ad a customer consents to the possibility that the advertiser will make the assumption that he/she meets the targeting criteria 			used to display the ad.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn156"&gt;
&lt;p&gt;&lt;a href="#_ftnref156" name="_ftn156"&gt;[156]&lt;/a&gt; . Rule 8.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules'&gt;https://cis-india.org/internet-governance/blog/a-study-of-the-privacy-policies-of-indian-service-providers-and-the-43a-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-01-13T02:37:31Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality">
    <title>Relationship Between Privacy and Confidentiality</title>
    <link>https://cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality</link>
    <description>
        &lt;b&gt;The laws of breach of confidentiality and breach of privacy at first glance seem very similar to each other. If a doctor releases health information relating to a patient that s/he is treating then such an act would give rise to a claim both under the law of privacy as well as under the law of confidentiality.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Similar is the case with financial information released by a bank, etc. This makes one wonder exactly where and how it is that the law of breach of privacy intersects with that of the law of confidentiality. An enquiry into such a complex question of law requires a deeper appreciation of the relationship between these two different principles of law which require a better understanding of the origins and evolutions of these principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this paper we shall try to explore the origins of both the law of privacy as well as confidentiality as they have evolved in the field of tort law in India. Although our primary focus is Indian law, however in order to understand the evolution of these principles it is necessary to discuss their evolution in three common law jurisdictions, &lt;i&gt;viz. &lt;/i&gt;the United States of America, the United Kingdom and India. The reason for an analysis of these three jurisdictions will become clear as the reader goes further into this paper, however for ease of reference it would be better if the reason is clarified here itself. The concept of a right against breach of confidentiality has existed in English common law for a very long time, however the concept of a claim for breach of privacy originated only in American law, other than some statutory protection granted in the last couple of decades, has still not been granted recognition in English common law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a discussion of the evolution of these principles in both American and English law, we will then discuss these principles as they exist in Indian law. This discussion will (or should) at once become easier to understand and digest because of the deeper understanding of the interplay between these two principles gained from a reading of the first two chapters.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy Torts: American Origins&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Looking at the origins of privacy law it has been argued by many academics that the law of privacy in common law has its origins in an article published by 	Samuel Warren and Louis Brandies in the Harvard Law Review in 1890.&lt;a href="#_ftn1" name="_ftnref1"&gt;[1]&lt;/a&gt; Warren and Brandeis suggested that one 	could generalise certain cases on defamation, breach of copyright in unpublished letters, trade secrets and breach of confidence as all based upon the 	protection of a common value which they called privacy.&lt;a href="#_ftn2" name="_ftnref2"&gt;[2]&lt;/a&gt; The authors relied upon the existing body of cases 	relating to the law of confidentiality and interpreted it in a way so as to create a "right to privacy" which has evolved into a right quite different from 	the common understanding of confidentiality.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although there are certain criticisms of the article by Warren and Brandeis, the background in which the article was written and the lacuna that these two 	scholars were trying to fill in the law of confidentiality as it existed at that time gives some context to the reasons why they felt the need to move away 	from the existing principles and propose a new principle of law. Samuel Warren and Louis Brandies were both worried about the invasion of personal space by the advent of the news and print media which was experiencing a boom during the late 19&lt;sup&gt;th&lt;/sup&gt; century.	&lt;a href="#_ftn3" name="_ftnref3"&gt;[3]&lt;/a&gt; Warren and Brandeis were worried that although the existing body of law on confidentiality would protect 	a person from having their picture put on a postcard by their photographer without their consent,&lt;a href="#_ftn4" name="_ftnref4"&gt;[4]&lt;/a&gt; however if there was no relationship between the two persons there would be no remedy available to the aggrieved party.	&lt;a href="#_ftn5" name="_ftnref5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the criticisms of Warren and Brandeis' article is that to propose the existence of a right to privacy they relied heavily on the English case of	&lt;i&gt;Prince Albert &lt;/i&gt;v. &lt;i&gt;Strange&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;b&gt;[6]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt;. It has been proposed by some academics that this was a case which dealt with confidentiality and literary property which was characterized by Warren and Brandeis as a privacy case.	&lt;a href="#_ftn7" name="_ftnref7"&gt;[7]&lt;/a&gt; In this case Prince Albert sought to restrain publication of otherwise unpublished private etchings and 	lists of works which were made by Queen Victoria. The etchings appeared to have been removed surreptitiously from the private printer to whom these 	etchings were given and came into the possession of one Mr. Strange who wanted to print and sell the etchings. The case specifically rejected the existence 	of a right to privacy in the following words:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The case is not put by the Plaintiff on any principle of trust or contract, but on property; there is nothing to show contract or confidence. It cannot be 	maintained that privacy constitutes property, or that the Court will interfere to protect the owner in the enjoyment of it; Chadler v. Thompson (3 Camp. 	80). In &lt;i&gt;William Aldred's case&lt;/i&gt; (9 Rep. 58 b.), Wray C. J. said, "The law does not give an action for such things of delight"."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Infact the case mentioned the term "privacy" only once, but that statement was made in the context of whether a delay in granting an injunction in such 	cases would defeat the entire purpose of the suit and was not preceeded or followed by any discussion on a distinct right to privacy:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"In the present case, where privacy is the right invaded, postponing the injunction would be equivalent to denying it altogether. The interposition of this 	Court in these cases does not depend upon any legal right, and to be effectual, it must be immediate."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, Warren and Brandeis interpreted this case in a different manner and came to the conclusion that the "principle which protects personal writings 	and all other personal productions, not against theft and physical appropriation, but against publication in any form, is in reality not the principle of 	private property, but that of an inviolate personality".&lt;a href="#_ftn8" name="_ftnref8"&gt;[8]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The article further incorporated the language of Judge Cooley's treatise (&lt;i&gt;Cooley on Torts&lt;/i&gt;)&lt;a href="#_ftn9" name="_ftnref9"&gt;[9]&lt;/a&gt; which 	used the phrase "the right to be let alone". They said that identifying this common element should enable the courts to declare the existence of a general principle which protected a person's appearance, sayings, acts and personal relations from being exposed in public.	&lt;a href="#_ftn10" name="_ftnref10"&gt;[10]&lt;/a&gt; However it has been argued by some scholars that this phrase was not used by Judge Cooley with as much 	import as has been given by Warren and Brandeis in their article. The phrase was used by Judge Cooley in mere passing while discussing why tort law protected against not only batteries but also assaults with no physical contact, and had no connection with privacy rights.	&lt;a href="#_ftn11" name="_ftnref11"&gt;[11]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Warren and Brandeis' article started getting almost immediate attention and some amount of recognition from various quarters,&lt;a href="#_ftn12" name="_ftnref12"&gt;[12]&lt;/a&gt; though it cannot be said that it was universally well received.	&lt;a href="#_ftn13" name="_ftnref13"&gt;[13]&lt;/a&gt; However over time this tort of privacy slowly started getting recognized by various Courts throughout 	the United States and got a huge boost when it was recognized in a brief section in the &lt;i&gt;First Restatement of Torts&lt;/i&gt; published in 1939. The right to 	privacy in American jurisprudence got another boost and became fully entrenched later on specially with the endorsement of Dr. William Prosser who 	discussed privacy in his treatise on the law of torts, the subsequent editions of which had a more and more elaborate discussion of the tort of privacy. 	This development of the law was further enhanced by Dr. Prosser's position as a reporter of the &lt;i&gt;Second Restatement of Torts&lt;/i&gt;, which imported a four 	part taxonomy of the privacy tort which had been suggested by Dr. Prosser in his previous works.&lt;a href="#_ftn14" name="_ftnref14"&gt;[14]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus we see how, beginning with the article by Warren and Brandeis in 1890, the privacy tort in American jurisprudence developed over the years and became 	further entrenched due to the influence of William Prosser and his works on the tort of privacy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy Torts in England: An Elaborate Principle of Confidentiality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The law of confidentiality in English law, as applied in certain specific contexts such as attorney client privileges,	&lt;a href="#_ftn15" name="_ftnref15"&gt;[15]&lt;/a&gt; doctor patient confidentiality,&lt;a href="#_ftn16" name="_ftnref16"&gt;[16]&lt;/a&gt; etc. has been applied since hundreds and even though cases relating to the breach of confidentiality had already existed, however the case of &lt;i&gt;Prince Albert &lt;/i&gt;v.	&lt;i&gt;Strange&lt;/i&gt;,&lt;a href="#_ftn17" name="_ftnref17"&gt;[17]&lt;/a&gt; be it due to the interesting facts or the fame of the parties involved, is still 	considered as the clearest and most well established precedent for the tort of breach of confidence.&lt;a href="#_ftn18" name="_ftnref18"&gt;[18]&lt;/a&gt; Similar cases relying upon this tort kept being decided by the English Courts but the tort of confidentiality was further cemented in English common law by 	the case of &lt;i&gt;Saltman Engineering Co. &lt;/i&gt;v. &lt;i&gt;Campbell Engineering Co.&lt;/i&gt;,&lt;a href="#_ftn19" name="_ftnref19"&gt;[19]&lt;/a&gt; which expanded the 	application of the principle by holding that the obligation to respect confidence is not limited to only instances where parties have a contractual 	relationship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The seminal case on the tort of breach of confidentiality in English law was that of &lt;i&gt;Coco&lt;/i&gt; v. &lt;i&gt;A.N Clark (Engineers) Ltd.&lt;/i&gt;,	&lt;a href="#_ftn20" name="_ftnref20"&gt;[20]&lt;/a&gt; where an inventor enjoined a moped manufacturer from using design ideas communicated by the inventor 	during failed contractual negotiations with the manufacturer.&lt;a href="#_ftn21" name="_ftnref21"&gt;[21]&lt;/a&gt; In this case Megarry J., held that a case 	of breach of confidence normally requires three elements to succeed, apart from contract, (i) the information itself must have the necessary quality of 	confidence about it, (ii) that information must have been imparted in circumstances importing an obligation of confidence, and (iii) there must be an 	unauthorised use of that information to the detriment of the party communicating it.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Relying on the principles enunciated in the above cases and developed by subsequent decisions, English law relating to the tort of breach of 	confidentiality developed into a robust and flexible body of law protecting personal and commercial information from disclosure. Infact by the late 1990s, 	English law was very broad and gradually expanding in its scope of the tort of breach of confidentiality and Courts had stretched the idea of an obligation 	of confidence so as to include cases where there was not even any communication between the parties, such as secret photography and wiretapping. Further 	since third parties had already been reposed with an obligation of confidence when they knowingly received confidential material even if they did not have 	any relationship with the plaintiff, therefore the law of confidence could be extended to parties outside the relationship in which the confidence was initially made. This, although was not as broad and overarching as the American privacy tort, still had the ability to cover a wide range of cases.	&lt;a href="#_ftn22" name="_ftnref22"&gt;[22]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While English Courts on the one hand kept trying to expand the scope of the confidentiality tort, they also categorically rejected the existence of a 	privacy tort on the lines developed under American jurisprudence. The suggestion of the existence of such a privacy tort in English law was most recently 	rejected by the House of Lords in the case of &lt;i&gt;Wainwright &lt;/i&gt;v. &lt;i&gt;Home Office&lt;/i&gt;,&lt;a href="#_ftn23" name="_ftnref23"&gt;[23]&lt;/a&gt; by Lord 	Bingham in the following words:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"What the courts have so far refused to do is to formulate a general principle of "invasion of privacy" (I use the quotation marks to signify doubt about 	what in such a context the expression would mean) from which the conditions of liability in the particular case can be deduced."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this case the plaintiffs made a claim against the prison authorities for strip searching them before they went to meet an inmate and since the incident 	occurred before the coming into force of the Human Rights Act, 1998 of the UK had not yet come into force, so the plaintiffs also argued that there was an 	existing tortuous remedy based on a breach of privacy in common law. While discussing whether English Courts were amenable to or had ever recognized such a common law tort of privacy, the House of Lords cited decisions such as &lt;i&gt;Malone v Metropolitan Police Comr&lt;/i&gt;,	&lt;a href="#_ftn24" name="_ftnref24"&gt;[24]&lt;/a&gt;&lt;i&gt; &lt;/i&gt;and &lt;i&gt;R v Khan (Sultan)&lt;/i&gt;,&lt;a href="#_ftn25" name="_ftnref25"&gt;[25]&lt;/a&gt;&lt;i&gt; &lt;/i&gt; in both of which the courts refused to recognize a general right to privacy in the context of tapping of telephones.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The absence of any general cause of action for invasion of privacy was also acknowledged by the Court of Appeal in the context of a newspaper reporter and photographer invading into a patient's hospital bedroom in an effort to purportedly interview him and taking photographs, in the case of	&lt;i&gt;Kaye v Robertson&lt;/i&gt;.&lt;a href="#_ftn26" name="_ftnref26"&gt;[26]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus relying on the above line of cases the House of Lords concluded that a general right to privacy does not exist in English common law:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"All three judgments are flat against a judicial power to declare the existence of a high-level right to privacy and I do not think that they suggest that 	the courts should do so. The members of the Court of Appeal certainly thought that it would be desirable if there was legislation to confer a right to 	protect the privacy of a person in the position of Mr Kaye against the kind of intrusion which he suffered, but they did not advocate any wider principle."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus it is clear that English Courts have time and again denied the existence of an American style right to privacy as emanating from common law. The 	Courts have instead tried to expand and widen the scope of the tort of confidentiality so as to cover various situations which may arise due to the 	pervasiveness of technology and which the traditional interpretation of the law of confidentiality was not equipped to deal with.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Therefore it is now a little clearer that the reason for the existence of the confusion between the torts of privacy and confidentiality is that the right 	to privacy had its origins in the common law precedents but the right to privacy developed as a distinct and separate right in America, primarily due to 	the influence of Warren and Brandeis's article as well as the works of William Prosser, whereas the Courts in England did not adopt this principle of 	privacy and instead favored a much more elaborate right to confidentiality. In the Indian context, this has led to some amount of confusion because, Indian 	case laws, as will be seen in the following chapter, borrowed heavily from American jurisprudence when discussing the right to privacy and not all cases 	have been able to clearly bring out the difference between the principles of privacy and confidentiality.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Indian Law&lt;/h2&gt;
&lt;h3&gt;Tort of Breach of Privacy&lt;br clear="all" /&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Any analysis of the right to privacy in India, be it in the realm of constitutional law or tort law almost always includes within its ambit a discussion of the two celebrated cases of &lt;i&gt;Kharak Singh &lt;/i&gt;v. &lt;i&gt;Union of India&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;b&gt;[27]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; and	&lt;i&gt;Govind &lt;/i&gt;v. &lt;i&gt;State of M.P.,&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;b&gt;[28]&lt;/b&gt;&lt;/a&gt;&lt;/i&gt; which elevated the right to privacy to the 	pedestal of a fundamental right under Indian law. However, an unintended consequence of this has been that pretty much every commentator on Indian law 	includes a discussion of these two cases when discussing the right to privacy, be it under constitutional law or under tort law. However, there is one 	problem with such an analysis of the right to privacy, &lt;i&gt;viz.&lt;/i&gt; these two cases were dealing with a pure constitutional law question and relied upon 	American case laws to read into Article 21 an inbuilt right to privacy. However from a strictly tort law perspective, these cases are not relevant at all, and the seminal case for the tort of breach of privacy would have to be the Apex Court decision in &lt;i&gt;R. Rajagopal &lt;/i&gt;v. &lt;i&gt;State of Tamil Nadu&lt;/i&gt;,	&lt;a href="#_ftn29" name="_ftnref29"&gt;[29]&lt;/a&gt; which specifically recognized this distinction and stated that the right to privacy has two different 	aspects, (i) the constitutional right to privacy, and (ii) the common law right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The facts of the &lt;i&gt;R. Rajagopal &lt;/i&gt;case revolve around the publishing of the autobiography written by the prisoner Auto Shankar, who had been placed in 	jail for committing multiple murders. The autobiography contained proof of involvement of many IAS, IPS officers in his crimes. Although Shankar had 	initially requested that the magazine print his autobiography, he later requested that his story not be published. The publishers held that it was their 	right to publish the autobiography while the IPS and IAS officers on the other hand claimed that Auto Shankar was trying to defame them and wanted to ban 	its publication. The Supreme Court in this case, implicitly accepts the existence of a right to privacy under Indian tort law when&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"21.The question is how far the principles emerging from the United States and English decisions are relevant under our constitutional system. So far as 	the freedom of press is concerned, it flows from the freedom of speech and expression guaranteed by Article 19(1)(a). But the said right is subject to 	reasonable restrictions placed thereon by an existing law or a law made after the commencement of the Constitution in the interests of or in relation to 	the several matters set out therein. Decency and defamation are two of the grounds mentioned in clause (2). 	&lt;i&gt; Law of torts providing for damages for invasion of the right to privacy and defamation and Sections 499/500 IPC are the existing laws saved under 		clause (2). &lt;/i&gt; "&lt;/p&gt;
&lt;p&gt;Discussing the distinction between the two aspects of the right to privacy, the Court held:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The right to privacy as an independent and distinctive concept originated in the field of Tort law, under which a new cause of action for damages 	resulting from unlawful invasion of privacy was recognized. This right has two aspects which are but two faces of the same coin (1) the general law of 	privacy which affords a tort action for damages resulting from an unlawful invasion of privacy and (2) the constitutional recognition given to the right to 	privacy which protects personal privacy against unlawful governmental invasion. The first aspect of this right must be said to have been violated where, 	for example, a person's name or likeness is used, without his consent, for advertising or non-advertising purposes or for that matter, his life story is 	written whether laudatory or otherwise and published without his consent as explained hereinafter. In recent times, however, this right has acquired a 	constitutional status."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a discussion of the various arguments presented by the parties (a number of which are not relevant for the purposes of this paper), the Supreme Court 	laid down the following principles regarding freedom of the press and the right to privacy:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(1) The right to privacy is implicit in the right to life and liberty guaranteed to the citizens of this country by Article 21. It is a "right to be let 	alone". A citizen has a right to safeguard the privacy of his own, his family, marriage, procreation, motherhood, child-bearing and education among other 	matters. 	&lt;i&gt; None can publish anything concerning the above matters without his consent whether truthful or otherwise and whether laudatory or critical. If he does 		so, he would be violating the right to privacy of the person concerned and would be liable in an action for damages. Position may, however, be 		different, if a person voluntarily thrusts himself into controversy or voluntarily invites or raises a controversy. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(2) The rule aforesaid is subject to the exception, that any publication concerning the aforesaid aspects becomes unobjectionable if such publication is 	based upon public records including court records. This is for the reason that once a matter becomes a matter of public record, the right to privacy no 	longer subsists and it becomes a legitimate subject for comment by press and media among others. We are, however, of the opinion that in the interests of 	decency [Article 19(2)] an exception must be carved out to this rule, viz., a female who is the victim of a sexual assault, kidnap, abduction or a like 	offence should not further be subjected to the indignity of her name and the incident being publicised in press/media.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(3) There is yet another exception to the rule in (1) above - indeed, this is not an exception but an independent rule. In the case of public officials, it 	is obvious, right to privacy, or for that matter, the remedy of action for damages is simply not available with respect to their acts and conduct relevant 	to the discharge of their official duties. This is so even where the publication is based upon facts and statements which are not true, unless the official 	establishes that the publication was made (by the defendant) with reckless disregard for truth. In such a case, it would be enough for the defendant 	(member of the press or media) to prove that he acted after a reasonable verification of the facts; it is not necessary for him to prove that what he has 	written is true. Of course, where the publication is proved to be false and actuated by malice or personal animosity, the defendant would have no defence 	and would be liable for damages. It is equally obvious that in matters not relevant to the discharge of his duties, the public official enjoys the same 	protection as any other citizen, as explained in (1) and (2) above. It needs no reiteration that judiciary, which is protected by the power to punish for 	contempt of court and Parliament and legislatures protected as their privileges are by Articles 105 and 104 respectively of the Constitution of India, 	represent exceptions to this rule."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The above principles have ruled the roost on the issue of privacy and freedom of the press under Indian law, with certain minimal additions. It has been 	held by the Delhi High Court that even though a claim for damages may be made under tort law for breach of privacy, the Court may even grant a pre-publication injunction to prevent a breach of privacy.&lt;a href="#_ftn30" name="_ftnref30"&gt;[30]&lt;/a&gt; The principles laid down in&lt;i&gt;R. Rajagopal&lt;/i&gt; were further clarified in the case of &lt;i&gt;Indu Jain &lt;/i&gt;v. &lt;i&gt;Forbes Incorporated&lt;/i&gt;,	&lt;a href="#_ftn31" name="_ftnref31"&gt;[31]&lt;/a&gt; where a case was filed by Indu Jain in the Delhi High Court to stop Forbes magazine from featuring her 	family in the Forbes List of Indian Billionaires. After a discussion of the various authorities and cases on the issue the Court summarized the principles 	relating to privacy and freedom of the press and applying those principles rejected the claim of the plaintiff. However for the purposes of our discussion 	these principles are extremely useful, and have been listed below:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"(V) Public or general interest in the matter published has to be more than mere idle curiosity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(VI) Public figures like public officials play an influential role in ordering society. They have access to mass media communication both to influence the 	policy and to counter-criticism of their views and activities. The citizen has a legitimate and substantial interest in the conduct of such persons and the 	freedom of press extends to engaging in uninhibited debate about the involvement of public figures in public issues and events. (Ref. (1994) 6 SCC 632 R. 	Rajagopal &amp;amp; Anr. Vs. State of Tamil Nadu &amp;amp; Others Para 18).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(VII) Right to privacy that rests in an individual may be waived by him by express or implied consent or lost by a course of conduct which estops its 	assertions. Such implication may be deduced from the conduct of the parties and the surrounding circumstances.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(VIII) A public person or personage is one who by his standing, accomplishment, fame, mode of life or by adopting a profession or calling which gives the 	public a legitimate interest in his doings, affairs and character has so become a public figure and thereby relinquishes at least a part of his privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(IX) The standard to be adopted for assessing as to whether the published material infracts the right to privacy of any individual is that of an ordinary 	man of common sense and prudence and not an out of ordinary or hyper-sensitive man. (Ref. (2007) 1 SCC 143 &lt;i&gt;Ajay Goswami v. UOI &amp;amp; Ors.&lt;/i&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(X) Even though in this country, the freedom of press does not have presumptive priority as in some other jurisdictions including the United States of 	America, however the importance of a free media of communication to a healthy democracy has to receive sufficient importance and emphasis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(XI) In evaluating a relief to be granted in respect of a complaint against infraction of the right to privacy, the court has to balance the rights of the 	persons complaining of infraction of right to privacy against freedom of press and the right of public to disclosure of newsworthy information. Such 	consideration may entail the interest of the community and the court has to balance the proportionality of interfering with one right against the 	proportionality of impact by infraction of the other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(XII) The publication has to be judged as a whole and news items, advertisements and published matter cannot be read without the accompanying message that 	is purported to be conveyed to public. Pre-publication censorship may not be countenanced in the scheme of the constitutional framework unless it is 	established that the publication has been made with reckless disregard for truth, publication shall not be normally prohibited. (Ref.: (2007) 1 SCC 143 	Ajay Goswami Vs. UOI &amp;amp; Ors.; (1994) 6 SCC 632 R. Rajagopal &amp;amp; Anr. Vs. State of Tamil Nadu &amp;amp; Others and AIR 2002 Delhi 58 Khushwant Singh &amp;amp; 	Anr. Vs. Maneka Gandhi)."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus we see that the right to privacy in Indian law, even in the realm of tort law has had an inextricable connection with constitutional principles and 	constitutional cases have had a very huge impact on the development of this right in India. However a perusal of these cases shows that the right to 	privacy is available only insofar as information which is personal in nature, however in situations where the information is non-personal in nature the 	right to privacy may not be as useful and this is where, as we shall see below, the tort of breach of confidentiality comes in to fill the void.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Tort of Breach of Confidentiality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While there have been a number of landmark cases in India on the issue of breach of confidence in a contractual or a statutory setting, these cases are not 	very relevant for a discussion on the tort of breach of confidentiality. This is not to say that the tort of breach of confidentiality is non-existent in 	Indian law, the Courts here have time and again accepted that there does exist such a tortuous remedy in certain situations. We shall now try to examine 	the contours of this principle of torts by discussing some of the landmark cases on the topic.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the case of &lt;i&gt;Petronet LNG Ltd.&lt;/i&gt; v. &lt;i&gt;Indian Petro Group and Another&lt;/i&gt;,	&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;[32]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; the Delhi High Court considered a claim by a corporation seeking to prevent a 	news and media group from reporting its confidential negotiations and contracts with counterparties. The claim was based upon both the right to privacy as 	well as the right to confidentiality but in this case the court, looking at the fact that the plaintiff was a corporation and also the type of information 	involved denied the claim on the right to privacy. However, it did allow the injunction claimed by the corporation based on the right to confidentiality. 	Summarizing its discussion of the right to confidentiality, the Court stated thus:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"49. It may be seen from the above discussion, that originally, the law recognized relationships- either through status (marriage) or arising from contract 	(such as employment, contract for services etc) as imposing duties of confidentiality. The decision in &lt;i&gt;Coco&lt;/i&gt; (1969) marked a shift, though 	imperceptibly, to a possibly wider area or zone. &lt;i&gt;Douglas&lt;/i&gt; noted the paradigm shift in the perception, with the enactment of the Human Rights Act; 	even before that, in &lt;i&gt;Attorney General (2)&lt;/i&gt; (also called the &lt;i&gt;Spycatcher case&lt;/i&gt;, or the &lt;i&gt;Guardian case&lt;/i&gt;) the Court acknowledged that 	there could be situations -where a third party (likened to a passerby, coming across sensitive information, wafting from the top of a building, below) 	being obliged to maintain confidentiality, having regard to the nature and sensitivity of the information….."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While discussing the factors that the Court would have to consider while deciding a claim based on the breach of confidentiality, the Delhi High Court 	relied upon and quoted from English judgments as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"50. Even while recognizing the wider nature of duty - in the light of the Human Rights Act, 1998, and Articles 8 and 10 of the European Convention, it was 	cautioned that the court, in each case, where breach of confidentiality, is complained, and even found- has to engage in a balancing process; the factors 	to be weighed while doing so, were reflected in &lt;i&gt;A&lt;/i&gt; v. &lt;i&gt;B Plc&lt;/i&gt; [2003] QB 195; the latest judgment in &lt;i&gt;H.R.H. Prince of Wales&lt;/i&gt; indicates that the court would look at the kind of information, the nature of relationship, etc, and also consider proportionality, while weighing whether 	relief could be given:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"The court will need to consider whether, having regard to the nature of the information and all the relevant circumstances, it is legitimate for the owner 	of the information to seek to keep it confidential or whether it is in the public interest that the information should be made public….&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;..In applying the test of proportionality, the nature of the relationship that gives rise to the duty of confidentiality may be important."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Holding that the principles discussed in the English cases given in the context of individual rights of confidentiality would also hold good in the case of 	corporations, the Court held that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"51. Though the reported cases, discussed above, all dealt with individual right, to confidentiality of private information (&lt;i&gt;Duchess of Argyll&lt;/i&gt;;&lt;i&gt;Frazer&lt;/i&gt;; &lt;i&gt;Douglas&lt;/i&gt;; &lt;i&gt;Campbell&lt;/i&gt; and &lt;i&gt;H.R.H. Prince of Wales&lt;/i&gt;) yet, the formulations consciously approved in the	&lt;i&gt;Guardian&lt;/i&gt;, and &lt;i&gt;Campbell&lt;/i&gt;, embrace a wider zone of confidentiality, that can possibly be asserted. For instance, professional records of 	doctors regarding treatment of patients, ailments of individuals, particulars, statements of witnesses deposing in investigations into certain types of 	crimes, particulars of even accused who are facing investigative processes, details victims of heinous assaults and crimes, etc, may, be construed as 	confidential information, which, if revealed, may have untoward consequences, casting a corresponding duty on the person who gets such information - either 	through effort, or unwittingly, not to reveal it. Similarly, in the cases of corporations and businesses, there could be legitimate concerns about its 	internal processes and trade secrets, marketing strategies which are in their nascent stages, pricing policies and so on, which, if prematurely made 	public, could result in irreversible, and unknown commercial consequences. However, what should be the approach of the court when the aggrieved party 	approaches it for relief, would depend on the facts of each case, the nature of the information, the corresponding content of the duty, and the balancing 	exercise to be carried out. It is held, therefore, that even though the plaintiff cannot rely on privacy, its suit is maintainable, as it can assert 	confidentiality in its information."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from privacy, the law of confidentiality has been used in cases where there has been a definite harm to one side but none of the other laws provide for any relief. This was the situation in the case of &lt;i&gt;Zee Telefilms Limited&lt;/i&gt; v. &lt;i&gt;Sundial Communications Pvt Ltd&lt;/i&gt;,	&lt;a href="#_ftn33" name="_ftnref33"&gt;[33]&lt;/a&gt; where a company which developed television and media programming had discussed their concept of a new 	show with a network during negotiations which could not be finalized. The network however subsequently tried to start a new show which was based on the 	same concept and idea as the one presented by the plaintiff company. The plaintiff sued the network, inter alia on a claim for breach of confidential 	information and asked that the network be prevented from airing its show. In this case the plaintiff's claim based on copyright was rejected because 	copyright only subsists on the expression of an idea and not the idea itself, therefore the tort of breach of confidentiality had to be resorted to in 	order to give relief to the plaintiffs. Discussing the difference between confidentiality and copyright, the Division Bench of the Bombay High Court held:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"10. The law of the confidence is different from law of copyright. In paragraph 21.2 (page 721), [of Copinger and Skone-James on Copyright (13th Edn.)] the 	learned author has pointed out that right to restrain publication of work upon the grounds, that to do so would be breach of trust of confidence, is a 	broader right than proprietary right of copyright. There can be no copyright of ideas or information and it is not infringement of copyright to adopt or 	appropriate ideas of another or to publish information received from another, provided there is no substantial copying of the form in which those ideas 	have, or that information has, been previously embodied. But if the ideas or information have been acquired by a person under such circumstances that it 	would be a breach of good faith to publish them and he has no just case or excuses for doing so, the court may grant injunction against him. The 	distinction between the copyright and confidence may be of considerable importance with regard to unpublished manuscripts / works submitted, and not 	accepted, for publication or use. Whereas copyright protects material that has been reduced to permanent form, the general law of confidence may protect 	either written or oral confidential communication. Copyright is good against the world generally while confidence operates against those who receive 	information or ideas in confidence. Copyright has a fixed statutory time limit which does not apply to confidential information, though in practice 	application of confidence usually ceases when the information or ideas becomes public knowledge. Further the obligation of confidence rests not only on the 	original recipient, but also on any person who received the information with knowledge acquired at the time or subsequently that it was originally given in 	confidence."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A similar view, in a similar fact situation Single Judge Bench of the Delhi High Court had also came to a similar conclusion in the case of	&lt;i&gt;Anil Gupta&lt;/i&gt; v. &lt;i&gt;Kunal Das Gupta&lt;/i&gt;.&lt;a href="#_ftn34" name="_ftnref34"&gt;[34]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law of confidentiality has also come to the rescue of employers in attempting to prevent important business and client information from being taken or copied by the employees for their personal gain. In the case of &lt;i&gt;Mr. Diljeet Titus, Advocate&lt;/i&gt; v. &lt;i&gt;Mr. Alfred A. Adebare&lt;/i&gt;,	&lt;a href="#_ftn35" name="_ftnref35"&gt;[35]&lt;/a&gt; the Delhi High Court had to decide a claim based on breach of confidentiality when some ex-employees 	of a law firm tried to take away client lists and drafts of legal agreements and opinions from their earlier employer-law firm. Discussing the importance 	of preventing employees or former employees from away which such actions, the Court held as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"81. I am in full agreement with the views expressed in &lt;i&gt;Margaret,&lt;/i&gt; &lt;i&gt;Duchess of Argyll (Feme Sole)&lt;/i&gt; v. &lt;i&gt;Duke of Argyll and Ors.&lt;/i&gt; (1965) 1 All ER 611, that a Court must step in to restrain a breach of confidence independent of any right under law. Such an obligation need not be 	expressed but be implied and the breach of such confidence is independent of any other right as stated above. The obligation of confidence between an 	advocate and the client can hardly be re-emphasised. Section 16 of the Copyright Act itself emphasizes the aspect of confidentiality &lt;i&gt;de hors&lt;/i&gt; even 	the rights under the Copyright Act. If the defendants are permitted to do what they have done it would shake the very confidence of relationship between 	the advocates and the trust imposed by clients in their advocates. The actions of the defendants cause injury to the plaintiff and as observed by 	Aristotle: 'It makes no difference whether a good man defrauds a bad one, nor whether a man who commits an adultery be a good or a bad man; the law looks 	only to the difference created by the injury."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court allowed the claim of the law firm holding that the relationship between a law firm and its attorneys is of a nature where information passed 	between them would be covered by the law of confidence and would not be allowed to be copied or used by the attorneys for their individual gain.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Recently, in 2009, the principles relating to breach of confidentiality under Indian law were very succinctly summarized by the Bombay High Court in the 	case of &lt;i&gt;Urmi Juvekar Chiang &lt;/i&gt;v. &lt;i&gt;Global Broadcasting News Limited&lt;/i&gt;,&lt;a href="#_ftn36" name="_ftnref36"&gt;[36]&lt;/a&gt; where in a fact 	situation similar to the ones in &lt;i&gt;Zee Telefilms &lt;/i&gt;case and the &lt;i&gt;Anil Gupta&lt;/i&gt; case, the Court discussed a number of previous cases on breach of 	confidentiality and laid down the following principles:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"8. The principles on which the action of breach of confidence can succeed, have been culled out as&lt;/p&gt;
&lt;p&gt;(i) he (Plaintiff) had to identify clearly what was the information he was relying on;&lt;/p&gt;
&lt;p&gt;(ii) he (Plaintiff) had to show that it was handed over in the circumstances of confidence;&lt;/p&gt;
&lt;p&gt;(iii) he (Plaintiff) had to show that it was information of the type which could be treated as&lt;/p&gt;
&lt;p&gt;confidential; and&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(iv) he (Plaintiff) had to show that it was used without licence or there was threat to use it…… It is further noted that at interlocutory 	stage, the Plaintiff does not have to prove (iii) and (iv) referred to above, as he will at the trial. But the Plaintiff must address them and show that he 	has atleast seriously arguable case in relation to each of them."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the above discussion on Indian law it is clear that the Courts in India have tried to incorporate the best of both worlds, in the sense that it has 	taken and adopted the principle of a right to privacy, a breach of which would give rise to an action in torts, from American jurisprudence while rejecting 	the stand taken by English Courts in rejecting such a right to privacy. However, Indian Courts have often referred to the decisions given by English Courts 	as well as American Courts in interpreting the principle of the right to confidentiality. Therefore on an overall examination it would appear that insofar 	as the rights to privacy and confidentiality are concerned, Indian jurisprudence has more in common with American law rather than English law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The law of privacy does not seem to have existed as a recognizable principle of law before it was propounded in the article by Warren and Brandeis in the 	Harvard Law Review in 1890. It slowly gained traction in American jurisprudence over the twentieth century but was rejected outright by the Courts in 	England, which preferred to follow the principle of confidentiality rather than privacy and tried to expand that old principle to fit newer and newer 	situations. Since Indian law borrows heavily from English law and to a smaller extent also from American law, the Courts in India have accepted both, the 	principle of a right to privacy as well as a right to confidentiality. This is not to say that the Courts in America do not recognize a right to 	confidentiality and only accept a right to privacy. Infact American Courts, just like their Indian counterparts, recognize both a right to confidentiality 	as well as a right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since Indian courts accept both the concept of breach of privacy as well as breach of confidentiality, one should not try to figure out if a particular 	circumstance is more appropriate for the one over the other, but actually use both principles to supplement one another for achieving the same objective. 	For example in situations where the conditions required for the application of the law of confidentiality do not exist such as disclosure of personal 	information by a person who did not receive it in a confidential capacity, one could apply the principle of privacy to prevent such information being 	disclosed or claim a remedy after disclosure. On the other hand if the information to be disclosed is not of a personal nature then one could try to 	utilize the law of confidentiality to prevent disclosure or claim damages.&lt;/p&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;[1]&lt;/a&gt; Harry Kalven, Jr., &lt;i&gt;Privacy in Tort Law-Were Warren and Brandeis Wrong?&lt;/i&gt;, "31 Law &amp;amp; Contemp. Problems". 326, 327 (1966). Elbridge L. 			Adams, &lt;i&gt;The Right of Privacy, and Its Relation to the Law of Libel&lt;/i&gt;, 39 AM. L. REV. 37 (1905).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;[2]&lt;/a&gt; &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office&lt;/i&gt;, 2003 UKHL 53.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;[3]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, "96 Georgetown Law Journal", 123 at 			128 and 132 (2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;[4]&lt;/a&gt; &lt;i&gt;Pollard &lt;/i&gt; v. &lt;i&gt;Photographic Co.&lt;/i&gt;, (1888) 40 Ch. D. 345.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;[5]&lt;/a&gt; It is also said that this concern arose out of the personal experience of Samuel Warren, whose wedding announcement as well as the report on his 			sister-in-law's death in the newspapers did not go down well with him. 			&lt;a href="http://www.english.illinois.edu/-people-/faculty/debaron/380/380powerpoint/privacy.pdf"&gt; http://www.english.illinois.edu/-people-/faculty/debaron/380/380powerpoint/privacy.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;[6]&lt;/a&gt; (1848) 41 Eng. Rep. 1171 (Ch.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;[7]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, "96 Georgetown Law Journal", 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;[8]&lt;/a&gt; Samuel D. Warren and Louis D. Brandeis, &lt;i&gt;The Right to Privacy&lt;/i&gt;, "4 Harvard Law Review", 193 at 207 (1890).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;[9]&lt;/a&gt; Thomas M. Cooley, &lt;i&gt;The Law Of Torts&lt;/i&gt;, 2&lt;sup&gt;nd&lt;/sup&gt; Ed., 1888, p. 29.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;[10]&lt;/a&gt; &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office&lt;/i&gt;, 2003 UKHL 53.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;[11]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, "96 Georgetown Law Journal", 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;[12]&lt;/a&gt; As early as in 1891, the case of &lt;i&gt;Schuyler&lt;/i&gt; v. &lt;i&gt;Curtis&lt;/i&gt;, 45 NYS 787 (Sup. Ct., 1891) involving the erection of a statue of a dead 			person, recognized the principle proposed in Warren and Brandeis' article.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;[13]&lt;/a&gt; Most famously the case of &lt;i&gt;Robertson &lt;/i&gt;v. &lt;i&gt;Rochester folding Box Co.&lt;/i&gt;, 64 NE 442 (NY 1902) where the New York Court of appeals 			specifically rejected a the existence of a right to privacy as proposed by Warren and Brandeis.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;[14]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, "96 Georgetown Law Journal", 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;[15]&lt;/a&gt; Bredd v. Lovelace, (1577) 21 Eng. Rep. 33 (Ch.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;[16]&lt;/a&gt; For doctor patient confidentiality we need look no further than the Hippocratic Oath itself which states "Whatever, in connection with my 			professional service, or not in connection with it, I see or hear, in the life of men, which ought not to be spoken of abroad, I will not divulge, 			as reckoning that all such should be kept secret".&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;[17]&lt;/a&gt; (1848) 41 Eng. Rep. 1171 (Ch.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;[18]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, 96 GEORGETOWN LAW JOURNAL, 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;[19]&lt;/a&gt; [1948] 65 RPC 203.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;[20]&lt;/a&gt; [1969] RPC 41 (UK).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;[21]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, 96 GEORGETOWN LAW JOURNAL, 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;[22]&lt;/a&gt; Neil M. Richards &amp;amp; Daniel J. Solove, &lt;i&gt;Privacy's Other Path: Recovering the Law of Confidentiality&lt;/i&gt;, 96 GEORGETOWN LAW JOURNAL, 123 			(2007).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;[23]&lt;/a&gt; 2003 UKHL 53.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;[24]&lt;/a&gt; [1979] Ch 344.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;[25]&lt;/a&gt; [1997] AC 558.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;[26]&lt;/a&gt; [1991] FSR 62&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;[27]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=3641&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;[28]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=6014&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;[29]&lt;/a&gt; &lt;a href="http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212"&gt;http://www.judis.nic.in/supremecourt/imgs1.aspx?filename=11212&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;[30]&lt;/a&gt; &lt;i&gt;Phoolan Devi &lt;/i&gt; v. &lt;i&gt;Shekhar Kapoor and others&lt;/i&gt;, &lt;a href="http://indiankanoon.org/doc/793946/"&gt;http://indiankanoon.org/doc/793946/&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;[31]&lt;/a&gt; &lt;a href="http://lobis.nic.in/dhc/GM/judgement/25-01-2010/GM12102007S21722006.pdf"&gt; http://lobis.nic.in/dhc/GM/judgement/25-01-2010/GM12102007S21722006.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;[32]&lt;/a&gt; &lt;a href="http://lobis.nic.in/dhc/SRB/judgement/25-04-2009/SRB13042009S11022006.pdf"&gt; http://lobis.nic.in/dhc/SRB/judgement/25-04-2009/SRB13042009S11022006.pdf &lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;[33]&lt;/a&gt; &lt;a href="http://indiankanoon.org/doc/603848/"&gt;http://indiankanoon.org/doc/603848/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;[34]&lt;/a&gt; &lt;a href="http://indiankanoon.org/doc/1709727/"&gt;http://indiankanoon.org/doc/1709727/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;[35]&lt;/a&gt; &lt;a href="http://delhicourts.nic.in/may06/DILJEET%20TITUS%20VS.%20ALFED%20A.%20ADEBARE.htm"&gt; http://delhicourts.nic.in/may06/DILJEET%20TITUS%20VS.%20ALFED%20A.%20ADEBARE.htm &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;[36]&lt;/a&gt; &lt;a href="http://indiankanoon.org/doc/582634/"&gt;http://indiankanoon.org/doc/582634/&lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality'&gt;https://cis-india.org/internet-governance/blog/relationship-between-privacy-and-confidentiality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>vipul</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-30T14:27:02Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance">
    <title>Targeting surveillance</title>
    <link>https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance</link>
    <description>
        &lt;b&gt;In the fall of 2005, Scotland Yard raided a flat in west London and arrested a suspected al-Qaeda militant known by a teasing Arabic nickname, Irhabi (“Terrorist”) 007.&lt;/b&gt;
        &lt;p class="body" style="text-align: justify; "&gt;The article by Ajai Sreevatsan was &lt;a class="external-link" href="http://www.thehindu.com/sunday-anchor/targeting-surveillance/article6731202.ece"&gt;published in the Hindu&lt;/a&gt; on December 28, 2014. Sunil Abraham gave his inputs.&lt;/p&gt;
&lt;hr /&gt;
&lt;p class="body" style="text-align: justify; "&gt;The similarities between Irhabi 007, later identified as Younis Tsouli, and India’s Mehdi Masoor Biswas are uncanny.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Neither  participated in any terror attack. Their reputation stems from an  alleged involvement as cyber propagandists for proto-terror groups —  Irhabi was distributing manuals and teaching online seminars on behalf  of the emerging al-Qaeda faction in Iraq, while Mehdi is alleged to be  an IS sympathiser. Both in their early 20s with cover identities during  the day, and separated by a decade in technological evolution.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Such  expertise within terror groups is hardly surprising, says Sunil Abraham  of the Centre for Internet and Society. “Any organisation engaged in a  war for hearts and minds and oil fields will exploit contemporary  technology to its fullest potential,” he says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Irhabi  currently serves a 16-year jail term, while Mehdi awaits his trial.  What their cases highlight is that the phenomenon of young, tech-savvy  armchair radicals is nothing new.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Research done at  Israel’s Haifa University, which tracks the proliferation of terrorist  websites, shows that the number of such sites went up from fewer than  100 in the late-1990s to more than 4,800 in just a decade. There is also  credible evidence that an al-Qaeda website posted a sketched-out  proposal for the 2004 Madrid bombings three months before the attack.  Another macabre example is the crowd-sourcing effort launched in 2005 by  the Victorious Army Group to build its website. By the competition’s  rules, the winner would get to fire a rocket at an American base.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;As  Indian agencies gear up to respond to similar online threats in this  part of the world, Mr. Abraham says India should not repeat the mistakes  made by the West over the previous decade. “We should not get caught up  in big data surveillance,” he says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Surveillance is  like salt. It could be counter-productive even if slightly in excess.  Ideally, surveillance must be targeted. Indiscriminate surveillance just  increases the size of the haystack, making it difficult to find the  needles,” Mr. Abraham says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;“Even in the case of  Mehdi, his identity was uncovered not by online spying but by Channel 4  which did some old-fashioned detective work,” he says.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;In  any case, recent events show that the threat of online terror  propaganda might be overblown. Much like online activism, it is subject  to the law of diminishing returns.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;A set of letters sent by newly recruited volunteers of IS was leaked to the French newspaper &lt;i&gt;Le Figaro &lt;/i&gt;earlier  this month and it shows youngsters complaining about being made to do  the dishes or the Iraqi winter. One of them wrote: “I’m fed up to the  back teeth. My iPod no longer works out here. I have got to come home.”  Of the estimated 1,100 young French who are believed to have joined the  IS, more than 100 have already returned.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;The IS may  have Twitter on its side. But the harsh realities of Iraq and the  gruesome ideology behind the slick doctrinal videos are a lot harder to  sell.&lt;/p&gt;
&lt;p class="body" style="text-align: justify; "&gt;Mr. Abraham says there is no such thing as a  Twitter revolution or a social media terror group. “Such statements  underestimate the role of ideology and human beings,” he says.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance'&gt;https://cis-india.org/internet-governance/news/the-hindu-december-28-2014-ajai-sreevatsan-targeting-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-30T14:10:58Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law">
    <title>Locating Constructs of Privacy within Classical Hindu Law</title>
    <link>https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law</link>
    <description>
        &lt;b&gt;This white paper seeks to locate privacy in Classical Hindu Law, and by doing so, displace the notion that privacy is an inherently ‘Western’ concept that is the product of a modernist legal system. &lt;/b&gt;
        &lt;h3 style="text-align: justify; "&gt;Introduction: Conceptions of Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Because of the variance exhibited by the various legal, social, and cultural aspects of privacy, it cannot be easily defined.	&lt;a name="_ftnref1"&gt;&lt;/a&gt; As a legal concept, privacy may form a constitutional claim, a statutory entitlement, a tortious action 	or an equitable remedy. As a constitutional claim, privacy is either an explicitly recognised right&lt;a name="_ftnref2"&gt;&lt;/a&gt; that is capable of independent enforcement,&lt;a name="_ftnref3"&gt;&lt;/a&gt; read into a pre-existing right	&lt;a name="_ftnref4"&gt;&lt;/a&gt;, or located within the penumbra of a larger right.&lt;a name="_ftnref5"&gt;&lt;/a&gt; Statutory recognition of privacy may be afforded by both criminal and civil statutes. The offence of criminal defamation for instance, is perceived as an 	act of violating an individual's privacy by tarnishing his or her reputation.&lt;a name="_ftnref6"&gt;&lt;/a&gt; Similarly the provision of in camera trials for divorce proceedings is an illustration of a civil statute implicitly recognising privacy.	&lt;a name="_ftnref7"&gt;&lt;/a&gt; As a tortious claim the notion of privacy is commonly understood in terms of the right against trespass 	of property. Equity, co-terminus with a statutory mandate or in isolation, may also be a source of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most legal conceptions of privacy in everyday use in India originated from the English common law. Other constitutional and statutory constructions of privacy, even when not found in the common law, arise within a broader modernist system of law and justice that originated in Europe.&lt;a name="_ftnref8"&gt;&lt;/a&gt; During the European colonisation of India, the British (and, in a different manner, the French	&lt;a name="_ftnref9"&gt;&lt;/a&gt;) attempted to recreate the common law in India through the establishment of a new legal and courts 	system, and the wholesale importation of the European idea of law&lt;a name="_ftnref10"&gt;&lt;/a&gt;. The very notion of privacy, as well 	as its legal conception, is a product of this legal modernity.&lt;a name="_ftnref11"&gt;&lt;/a&gt; In post-colonial societies, the argument 	against the right to privacy is usually premised on its perceived alien-ness - as a foreign idea brought by colonisers and imposed on a traditionalist 	society that favoured communitarian living over individual rights - in an effort to discredit it.&lt;a name="_ftnref12"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fallacy of this argument lies in its ignorance of the cultural plurality of privacy.&lt;a name="_ftnref13"&gt;&lt;/a&gt; To begin with, 	the idea that is connoted by the modernist notion of privacy pre-dated the introduction of common law in India. By the time of the Enlightenment, Hindu law 	and Islamic law were established legal systems with rich histories of jurisprudence and diverse schools of law within them, each with their own juristic 	techniques and rules of interpretation.&lt;a name="_ftnref14"&gt;&lt;/a&gt; While neither Hindu law nor Islamic law use a term that readily 	translates to "privacy", thereby precluding a neat transposition of meanings between them, the notion of privacy existed and can be located in both the 	legal traditions. In this paper, the term 'privacy' is used to describe both the modernist notion that arises from the principle of personal autonomy as 	well as the diverse pre-modern concepts in Hindu and Islamic jurisprudence that resemble or relate to this notion. These pre-modern concepts are diverse, 	and do not permit an easy analysis. For instance, the &lt;i&gt;Manusmriti,&lt;/i&gt; which is a source of classical Hindu law, prohibits bathing in tanks that belong 	to other men.&lt;a name="_ftnref15"&gt;&lt;/a&gt; Additionally it prohibits the use of wells, gardens, carriages, beds, seats and houses 	without the owner's permission.&lt;a name="_ftnref16"&gt;&lt;/a&gt; These prohibitions are not driven by the imperatives of privacy alone. 	The rationale is that in using others' belongings one appropriates a portion of their sins.&lt;a name="_ftnref17"&gt;&lt;/a&gt; Hence, these privacy protections are linked to an ideal of purity. Islamic law also restricts the use or misappropriation of another's property.	&lt;a name="_ftnref18"&gt;&lt;/a&gt; However, this prohibition is designed to protect private property; it has no ideological link to 	purity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This paper attempts to locate constructs of privacy in classical Hindu law. The purpose of this exercise is not to privilege one legal system over another. 	Therefore, we do not intend to normatively assess the existing modernist discourse on privacy. We simply seek to establish the existence of alternate 	notions of privacy that pre-date modernity and the common law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The scope of the paper is confined to locating privacy in classical Hindu law. The materials within the realm of classical Hindu law, relevant to this exercise are- the &lt;i&gt;sruti&lt;/i&gt;, &lt;i&gt;smriti&lt;/i&gt;, and &lt;i&gt;acara&lt;/i&gt;. &lt;i&gt;Sruti&lt;/i&gt; comprises of the	&lt;i&gt;Vedas, Brahmanas, Aranyakas and the Upanishads.&lt;/i&gt; It is considered to symbolise the spirit of Hindu law and is not the source of any positivist 	command as such.&lt;a name="_ftnref19"&gt;&lt;/a&gt; &lt;i&gt;Smriti&lt;/i&gt; involves various interpretations of the &lt;i&gt;sruti&lt;/i&gt;, We have 	however restricted ourselves to the &lt;i&gt;Dharmashastras &lt;/i&gt;in this realm. Acara refers to the body of customary practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The review of the material at hand however, is not exhaustive. The reasons for this are twofold- &lt;i&gt;first&lt;/i&gt;, given the vast expanse of Hindu 	jurisprudence, the literature review has been limited; &lt;i&gt;second, &lt;/i&gt;there is a limited availability of reliable English translations of ancient legal 	treatises.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This paper is divided into two parts. The first part of this paper deals with the interface of colonisation with Hindu law and elucidates the nature of Hindu law. With the advent of colonialism, classical Hindu law was gradually substituted by a modernist legal system.	&lt;a name="_ftnref20"&gt;&lt;/a&gt; Exploring the characteristics of modernity, the factors that contributed to the displacement of 	classical Hindu law will be identified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;One of the factors that contributed to the displacement was the uncertainty that characterised classical Hindu law.	&lt;a name="_ftnref21"&gt;&lt;/a&gt; Classical Hindu law was an amalgamation of three sources, as. In an attempt to rule out the 	uncertainty, and the lack of positive command, the modernisation of Hindu law was brought about.&lt;a name="_ftnref22"&gt;&lt;/a&gt; Accordingly this part shall also examine the nature of Hindu law. Furthermore it shall determine whether the application of codified modern Hindu law, is 	informed by the precepts of classical Hindu law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Having explicated the nature of Hindu law, the next part will focus on identifying instances of privacy in classical Hindu law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before ascertaining specific instances, however, this part will lay down a general understanding of privacy as it existed then. It will be demonstrated 	that regardless of the absence of an equivalent term, an expectation of privacy existed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The specific illustrations of privacy will then be mapped out.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the different aspects wherein an expectation of privacy exists, there is also a possibility of competing claims. In the event that such conflicts 	arise, this part will attempt to resolve the same.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Part 1: The Transmogrification of the Nature of Hindu Law&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;The evolution of Hindu jurisprudence can be charted through three phases- classical, colonial, and modern.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the classical phase, it was embodied by the Dharmashastra which elaborated on customary practices, legal procedure, as well as punitive measures. The 	Dharamshastra was accompanied by the Vedas, and acara. Whether this body of jurisprudence could be called 'law' in the strict modernist sense of the term 	is debatable.&lt;a name="_ftnref23"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Modernity has multifarious aspects.&lt;a name="_ftnref24"&gt;&lt;/a&gt; However, we are concerned with modernity in the context of legal 	systems, for the purpose of this paper. The defining attribute of a modernist legal system is the need for positivist precepts that are codified by a legislature.&lt;a name="_ftnref25"&gt;&lt;/a&gt; The underlying rationale for formalised legislation is the need for certainty in law.&lt;a name="_ftnref26"&gt;&lt;/a&gt; Law is to be uniformly applied within the territory.&lt;a name="_ftnref27"&gt;&lt;/a&gt; The formalised legislation is to be enforced by hierarchized courts.&lt;a name="_ftnref28"&gt;&lt;/a&gt; Furthermore this codified law can be modified through provisions for amendment, if need be.	&lt;a name="_ftnref29"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This modernist understanding is what informs the English common law. With the advent of colonialism, common law was imported to India. The modernist legal 	system was confronted by plural indigenous legal systems here that were starkly different in nature.&lt;a name="_ftnref30"&gt;&lt;/a&gt; In 	the given context, the relevant indigenous system is classical Hindu law. The classical precepts were interpreted by the British. These interpretations 	coupled with the sources of Classical Hindu law, constituted colonial Hindu law.&lt;a name="_ftnref31"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is pertinent to note that these interpretations were undertaken through a modernist lens. The implication was the attempted modernisation of a 	traditional legal system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The traditional system of Classical Hindu law did not exhibit any of the introduced features. To begin with not all of classical Hindu law was text based.	&lt;a name="_ftnref32"&gt;&lt;/a&gt; The problem with the textual treatises was threefold. First, they were not codes enacted by a 	legislature, but written by various scholars. Second, they were not phrased as positivist precepts. Third, their multiplicity was accompanied with the lack 	of an established hierarchy between these texts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Additionally classical Hindu law was the embodiment of &lt;i&gt;dharma&lt;/i&gt;, which in itself was an amorphous concept. The constitutive elements of&lt;i&gt;dharma&lt;/i&gt; were law, religious rites, duties and obligations of members of a community, as well as morality.&lt;a name="_ftnref33"&gt;&lt;/a&gt; These elements do not however, exhaustively define &lt;i&gt;dharma&lt;/i&gt;. There exist varying definitions of	&lt;i&gt;dharma&lt;/i&gt;,&lt;a name="_ftnref34"&gt;&lt;/a&gt; and in some cases even ancient texts dealing with &lt;i&gt;dharma&lt;/i&gt; fail to articulate 	its definition.&lt;a name="_ftnref35"&gt;&lt;/a&gt; This is on account of the fact that the meaning of &lt;i&gt;dharma&lt;/i&gt;, varied depending on the in which it is used&lt;a name="_ftnref36"&gt;&lt;/a&gt; Owing to the fact that classical Hindu jurisprudence was informed by	&lt;i&gt;dharma, &lt;/i&gt;the former was an amalgamation of law, religion and morality. Therefore it was categorised as jurisprudence that lacked the secularity 	exhibited by modern positivist law.&lt;a name="_ftnref37"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The co-existence of law and morality in classical Hindu law has led to various debates regarding its nature.	&lt;a name="_ftnref38"&gt;&lt;/a&gt; Before explicating the nature of classical Hindu law, its sources must be elaborated on. As referred 	to, the sources are &lt;i&gt;sruti&lt;/i&gt;, &lt;i&gt;smriti&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;and&lt;i&gt; acara&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sruti is constituted by the &lt;i&gt;Vedas&lt;/i&gt;,&lt;i&gt; Brahmanas&lt;/i&gt;,&lt;i&gt; Aranyakas&lt;/i&gt;,&lt;i&gt; &lt;/i&gt;and&lt;i&gt; Upanishads&lt;/i&gt;. Vedas are divine revelations that contain no positive precept &lt;i&gt;per se&lt;/i&gt;. They are considered as the spirit of law, and believed to be the source of the rules of dharma.&lt;a name="_ftnref39"&gt;&lt;/a&gt; The Vedas are constituted by the Rigveda, Samveda, Yajurveda and Athravaveda.&lt;a name="_ftnref40"&gt;&lt;/a&gt; Based on the Vedic texts, treatises have been written elucidating religious practices.	&lt;a name="_ftnref41"&gt;&lt;/a&gt; These texts are known as the Brahmanas.&lt;a name="_ftnref42"&gt;&lt;/a&gt; The 	Aranyakas and the Upanishads engage in philosophical enquiries of the revelation in the Vedas.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interpretations of the Sruti by various scholars are embodied in the Smriti. The connotations of smriti are twofold.	&lt;a name="_ftnref43"&gt;&lt;/a&gt; First, it implies knowledge transmitted through memory, as opposed to knowledge directly revealed by 	divinity.&lt;a name="_ftnref44"&gt;&lt;/a&gt; Additionally, it is the term used to collectively reference the Dharmasutras and 	Dharmashastra.&lt;a name="_ftnref45"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dharmasutras were essentially interpretations of revelation in only prose form, or a mixture of prose and verse.	&lt;a name="_ftnref46"&gt;&lt;/a&gt; They detailed the duties and rituals to be carried out by a person, through the four stages, of his or 	her life. The duties laid down also varied depending on the caste of a person.&lt;a name="_ftnref47"&gt;&lt;/a&gt; They also laid down 	guidelines for determining punishments.&lt;a name="_ftnref48"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Dharmasastras on the other hand were in the verse form. Though their subject matter coincided with the Dharmasutra in terms of domestic duties and rituals, 	they had a wider ambit. The Dharmasastras also dealt with subjects such as statecraft, legal procedure for adjudicating disputes. In a limited way, they 	marked the diversification from strictly religious precepts, from those that were legal in nature. For instance the Manusmriti was an amalgamation of law 	and ritual. The Yajnawalkya Samhita however, has separate parts that deal with customary practices, legal procedure, and punitive measures. The Narada 	Smriti, in turn deals only with legal procedure and rules of adjudication.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is opined that in due course of time, the Aryan civilisation diversified.&lt;a name="_ftnref49"&gt;&lt;/a&gt; Their life and literature 	were no longer limited to sacrificial practices, but took on a more 'secular' form.&lt;a name="_ftnref50"&gt;&lt;/a&gt; The Arthashastra is 	evidence of such diversification.&lt;a name="_ftnref51"&gt;&lt;/a&gt; Unlike the Dharmashastra, it deals with strategies to be employed in governance, regulations with regard to urban planning, commercialisation of surrogacy, espionage, among other things.	&lt;a name="_ftnref52"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third source of classical Hindu law, acara refers to customary practices and their authoritativeness was determined by the people.&lt;a name="_ftnref53"&gt;&lt;/a&gt; Their prevalence over textual tradition is contentious.	&lt;a name="_ftnref54"&gt;&lt;/a&gt; Some opine that acara prevails over textual traditions. However, the opposing school of thought 	believes that customary practices prevail only if the text is unclear or disputed.&lt;a name="_ftnref55"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Other sources of classical Hindu law include the &lt;i&gt;itihas &lt;/i&gt;(epics such as the Mahabharata and Ramayana), and digests written by scholars.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Given the diversity of sources and its non-conformity to positivism, the nature of classical Hindu law is a heavily contested issue. For instance, with regard to the legal procedure in the Dharmashastra, Maynes opines that these rules qualified as law in the modernist sense.&lt;a name="_ftnref56"&gt;&lt;/a&gt; Ludo Rocher however, opines that textual treatises would not qualify as law.	&lt;a name="_ftnref57"&gt;&lt;/a&gt; Classical Hindu law can admittedly not be identified as strictly legal or strictly moral. However, it 	does in a limited way recognise the distinction between legal procedure and morality.&lt;a name="_ftnref58"&gt;&lt;/a&gt; This is to say, 	it is not merely a source of rituals, but also lays down precepts that are jurisprudentially relevant.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On account of its non-conformity with characteristics of a modernist legal system, classical Hindu law was displaced by its colonial version. The British 	attempted to accomplish this though the process of codification.&lt;a name="_ftnref59"&gt;&lt;/a&gt; The colonial attempts to codify Hindu 	law were carried forward by the Indian government post-independence. The result was the Hindu Code Bill. The context in which this codification took place must be examined in order to better comprehend this transmogrification. Post-independence, the idea of a Uniform Civil Code had been debated.&lt;a name="_ftnref60"&gt;&lt;/a&gt; However it was at odds with the Nehruvian notion of secularity.	&lt;a name="_ftnref61"&gt;&lt;/a&gt; The codification of Hindu personal law was an attempt at modernising it, without infringing on the religious freedom of Hindus.&lt;a name="_ftnref62"&gt;&lt;/a&gt; The idea was to confine the influence of religion to the private sphere.	&lt;a name="_ftnref63"&gt;&lt;/a&gt; What emerged was the Hindu Code Bill, which served as the blueprint for the Hindu Marriage Act, the Hindu Succession Act, the Hindu Minority and Guardianship Act and, the Hindu Adoption and Maintenance Act.	&lt;a name="_ftnref64"&gt;&lt;/a&gt; Colonial Hindu law was thus displaced by modern Hindu law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As Galanter observes however, modernisation through legislations may formalise or even modify classical precepts, but cannot erase them completely.	&lt;a name="_ftnref65"&gt;&lt;/a&gt; For instance, Section 7 of the Hindu Marriage Act, which prescribes the ceremonial requirements for a 	Hindu marriage, replicates those prescribed in Classical Hindu law.&lt;a name="_ftnref66"&gt;&lt;/a&gt; Additionally a plethora of judicial 	decisions have relied on or taken into consideration, precepts of ancient Hindu jurisprudence.&lt;a name="_ftnref67"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is evident thus that ancient precepts still inform modern Hindu law. Given their relevance, it would be erroneous to write off classical Hindu law as 	completely irrelevant in a modernist context.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Part II: Precepts of Privacy in Classical Hindu Law&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;As referred to, we have not come across a terminological equivalent of the term 'privacy' in the course of our research. The linguistic lacuna is 	admittedly a hurdle in articulating the pre-modern understanding of privacy as found in Hindu jurisprudence. It is not however, an argument against the 	very existence of privacy. The lack of pre-modern terminology necessitates the usage of modern terms in classifying the aspects of privacy detailed in 	Hindu jurisprudence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Thus, broadly speaking, the aspects of privacy we have culled out from the material at hand are those of physical space/ property, thought, bodily 	integrity, information, communication, and identity. As will be demonstrated these aspects overlap on occasion and are by no means an exhaustive 	indication. In order to contextualise these aspects within the realm of Hindu jurisprudence, they are detailed below through specific illustrations.&lt;/p&gt;
&lt;p align="left"&gt;&lt;i&gt;A. &lt;/i&gt; &lt;i&gt;Privacy of physical Space/ property&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Akin to the modern legal system that first understood privacy in proprietary terms,&lt;a name="_ftnref68"&gt;&lt;/a&gt; Hindu jurisprudence 	too accorded importance to privacy in terms of physical space. This is further illustrated by the similarity between the common law notion of a man's house being his castle,&lt;a name="_ftnref69"&gt;&lt;/a&gt; and the institutional primacy accorded by the Naradsmriti to the household	&lt;a name="_ftnref70"&gt;&lt;/a&gt;. The common denominator here is the recognition of a claim to privacy against the sovereign. This claim operated against society at large as well. For instance, an individual caught trespassing on someone else's property was liable to be fined.	&lt;a name="_ftnref71"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These religious precepts were supplemented by those reflected in texts such as the Arthashastra. By way of illustration the house building regulations 	prescribed by it are largely informed by the recognition of a need for privacy. To begin with, a person's house should be built at a suitable distance from 	a neighbour's house, to prevent any inconvenience.&lt;a name="_ftnref72"&gt;&lt;/a&gt; In addition the house's doors and windows should 	ideally not face a neighbours doors and windows directly.&lt;a name="_ftnref73"&gt;&lt;/a&gt; The occupants of the house should ensure the 	doors and windows are suitably covered.&lt;a name="_ftnref74"&gt;&lt;/a&gt; Furthermore in the absence of a compelling justification, 	interference in a neighbour's affairs is penalised.&lt;a name="_ftnref75"&gt;&lt;/a&gt;Juxtaposed to religious texts that often perceived 	privacy as a concept driven by the imperative of purity,&lt;a name="_ftnref76"&gt;&lt;/a&gt; the Arthashastra is reflective of a secular 	connotation of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though the household was privileged as the foundational institution in Hindu jurisprudence, claims of privacy extend beyond one's house to other physical 	objects as well, regardless of whether they were extensions of the household or not. For instance, both the Yajnawalkya Samhita and the Manusmriti condemn 	the usage of another person's property without his or her permission.&lt;a name="_ftnref77"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What is noteworthy in the context of personal property is that in an era infamous for the denigration of women, Hindu jurisprudence recognised a woman's 	claim over property. This property, also known as Stridhana, had varied definitions. In the Yajnawalkya Samhita for instance, it is conceptualised as, 	"What has been given to a woman by the father, the mother, the husband or a brother, or received by her at the nuptial fire, or given to her on her 	husband's marriage with another wife, is denominated Stridhana or a woman's property".&lt;a name="_ftnref78"&gt;&lt;/a&gt; In the 	Manusmriti, it is defined as "What was given before the nuptial fire, what was given on the bridal procession, what was given in token of love, and what 	was received from her brother, mother, or father, that is called the sixfold property of a woman".&lt;a name="_ftnref79"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond mere cognizance of proprietary rights however, these precepts were also informed by the notion of exclusivity. Consequently, a woman's husband or 	his family were precluded from using her Stridhana, unless they were in dire straits. Additionally it was a sin for a woman's relatives to use her wealth 	even if the same was done unknowingly.&lt;a name="_ftnref80"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;B. &lt;/i&gt; &lt;i&gt;Privacy of Thought&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition to the aspect of physical space, a claim to privacy vis-a-vis the intangible realm of thought was afforded by Hindu jurisprudence. In the modern context the link between solitude and privacy has been recognised as early as 1850 by Warren and Brandeis.	&lt;a name="_ftnref81"&gt;&lt;/a&gt; The key distinction is that in the modern era this need for solitude was seen as a function of the 	increasing invasion of privacy.&lt;a name="_ftnref82"&gt;&lt;/a&gt; In the pre-modern era however, solitude was considered essential for 	self-actualisation, and not as a response to the increasing invasion of the private realm. Meditation in solitude was perceived as enabling existence in 	the highest state of being.&lt;a name="_ftnref83"&gt;&lt;/a&gt; In fact a life in solitude was identified as a pre-requisite for being 	liberated.&lt;a name="_ftnref84"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though solitude itself is intangible, engaging in meditation would require a tangible solitary space.&lt;a name="_ftnref85"&gt;&lt;/a&gt; This is where the privacy of thought overlapped with the aspect of privacy of space. Accordingly, the Arthashastra prescribed that forest areas be set 	aside for meditation and introspection.&lt;a name="_ftnref86"&gt;&lt;/a&gt; It also recognised the need for ascetics to live within these 	spaces harmoniously, without disturbing each other.&lt;a name="_ftnref87"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is evident, that as far as the aspects of privacy were concerned, there were no watertight compartments.&lt;/p&gt;
&lt;p&gt;&lt;i&gt;C. &lt;/i&gt; &lt;i&gt;Privacy with respect to bodily integrity&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A claim to privacy of thought can only be substantively realised when complemented by the notion of privacy with respect to bodily integrity, as corporeal 	existence serves as a precursor to mental well-being. The inference drawn from the relevant precepts concerning this aspect is that they were largely 	women-centric. Arguably they were governed by a misplaced patriarchal notion that women's modesty needed to be protected. At best they could be considered 	as implicit references to an expectation of privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Manusmriti states, "But she who…goes to public spectacles or assemblies, shall be fined six krishnalas".	&lt;a name="_ftnref88"&gt;&lt;/a&gt; Restrictions operating during a woman's menstruation were twofold. Her family was prohibited from 	seeing her. Additionally cohabitation with such a woman was also forbidden.&lt;a name="_ftnref89"&gt;&lt;/a&gt; It should be pointed out 	that that these constructs had little to do with a woman's expectation of privacy. They were forbidden due to the attached implications of impurity that 	would vest in the defaulter. A woman's autonomy with regard to her body was not regarded as a factor meriting consideration.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, there were constructs, albeit limited, which were more egalitarian in their approach and did recognise her autonomy. They established that women do have an expectation of privacy in terms of bodily integrity. Sexual assault was considered as an offence.	&lt;a name="_ftnref90"&gt;&lt;/a&gt; Evidence of this is found in the Yajnawalkya Samhita which states, "If many persons know a woman 	against her will, each of them should be made to pay a fine of twenty four panas".&lt;a name="_ftnref91"&gt;&lt;/a&gt; In addition, the 	Arthashastra vested in commercial sex workers the right to not be held against their will.&lt;a name="_ftnref92"&gt;&lt;/a&gt; Further it 	expressly states that even a commercial sex worker cannot be forced to engage in sexual intercourse.&lt;a name="_ftnref93"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Women could make a claim to privacy not only against society at large, but also against their husbands. Ironically, while our contemporary legal system (i.e., the Indian legal system) fails to criminalise marital rape, the &lt;i&gt;Manusmriti&lt;/i&gt; considered it an offence.	&lt;a name="_ftnref94"&gt;&lt;/a&gt; Additionally, husbands were also prohibited from looking at their wives when the latter were in a 	state of relaxation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;D. &lt;/i&gt; &lt;i&gt;Privacy of Information and Communication&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the three aspects explicated above were by and large restricted to the individual, the privacy of information and communication has been largely 	confined by Hindu jurisprudence to the realm of the sovereign. Both the Manusmriti and the Arthashastra acknowledge the importance of a secret council that 	aids the king in deliberations.&lt;a name="_ftnref95"&gt;&lt;/a&gt; These deliberations are to be carried on in a solitary place that was well-guarded.&lt;a name="_ftnref96"&gt;&lt;/a&gt; The decisions made in these deliberations are to be revealed on a need to know basis.	&lt;a name="_ftnref97"&gt;&lt;/a&gt; That is to say, only persons concerned with the implementation of these decisions are to be informed. 	The Manusmriti also provides for private deliberation by the king on matters not involving governance. It provides, "At midday or midnight , when his 	mental and bodily fatigues are over, let him deliberate, either with himself alone or with his ministers on virtue, pleasure, and wealth".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Apart from governance, privacy of information also pertained to certain types of documents that were considered private in nature. These are documents that 	involve transactions such as partition, giving of a gift, purchase, pledge and debt. What is interesting about this precept is the resemblance it bears to 	the common law notion of privity. The common characteristic of the documents referred to, is that they concerned transactions undertaken between two or 	more persons. The rights or obligations arising from these transactions were confined to the signatories of these documents. It could be possible that the 	privatisation of these documents was aimed at guarding against disruption of transactions via third party intrusions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The limited reference to private communications is found within the realm of governance, within the context of privacy of information. The only illustration of this that we have come across is the precept in the Arthashastra that requires intelligence to be communicated in code.	&lt;a name="_ftnref98"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt;E. &lt;/i&gt; &lt;i&gt;Privacy of Identity &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The final aspect that warrants detailing is the privacy of identity. The notion of privacy of identity can be understood in two ways. The first deals with 	protection of personal information that could be traced back to someone, thus revealing his or her identity. The second recognises the component of 	reputation. It seeks to prevent the misappropriation or maligning of a person's identity and thus reputation. In ancient Hindu jurisprudence there is 	evidence of recognition of the latter. An illustration of the same is offered by the precept which states "For making known the real defects of a maiden, 	one should pay a fine of a hundred panas".&lt;a name="_ftnref99"&gt;&lt;/a&gt; Another precept prescribes that false accusations against 	anyone in general are punishable by a fine. Additionally, there is also a restriction operating against destroying or robbing a person of his or her 	virtue.&lt;a name="_ftnref100"&gt;&lt;/a&gt; In the modern context, the above would be understood under the rubric of defamation. These 	precepts are indicative of the fact that defamation was recognised as an offence way before the modern legal system afforded cognizance to the same.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The dominant narrative surrounding the privacy debate in India is that of the alien-ness of privacy. This paper has attempted to displace the notion that 	privacy is an inherently 'Western' concept that is the product of a modernist legal system. No doubt the common understanding of the legal conception of 	privacy is informed by modernity. In fact, the research conducted in support of this paper has been synthesised from privacy information through a 	modernist lens. The fact still remains however, that privacy is an amorphous context, and its conceptions vary across cultures.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To better appreciate the relevance of Classical Hindu law in a modernist context, the nature of Hindu law must be examined first. While Hindu jurisprudence 	might not qualify as law in the positivist sense of the term, its precepts continue to inform India's statues and judicial pronouncements.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is subjective and eludes a straitjacketed definition. On occasion this elusiveness is a function of its overlapping and varying aspects. At other 	times it stems from a terminological lacuna that complicates the explication of privacy. These impediments notwithstanding, it is abundantly clear that the 	essence of privacy is reflected in Hindu culture and jurisprudence. This may give pause to thought to those who seek to argue that 'collectivist' cultures 	do not value privacy or exhibit the need for it.&lt;/p&gt;
&lt;div&gt;&lt;/div&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; Daniel J. Solove, &lt;i&gt;A Taxonomy of Privacy&lt;/i&gt;, University of Pennsylvania Law Review, Vol. 154(3), January 2006.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; Upendra Baxi, &lt;i&gt;Who Bothers About the Supreme Court: The Problem of Impact of Judicial Decisions&lt;/i&gt;, available at 			http://clpr.org.in/wp-content/uploads/2013/08/whobothersabouttheSupremeCourt.pdf (Last visited on December 23, 2014) (The enforceability of rights 			often sets their individual enjoyment apart from their jurisprudential value); In India, the reading of privacy into Article 21 has not resulted in 			a mechanism to enforce a standalone right to privacy, See R.H. Clark, Constitutional Sources of the Penumbral Right to Privacy, available at 			http://digitalcommons.law.villanova.edu/cgi/viewcontent.cgi?article=2046&amp;amp;context=vlr (Last visited on December 23, 2014) (In the United States, 			the right to privacy was located in the penumbra of the right to personal autonomy).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; See PUCL v. Union of India, AIR 1997 SC 568.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; See Griswold v. Connecticut, 381 U.S. 479 (1965); Lawrence v. Texas, 539 U.S. 558 (2003).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; See The Indian Penal Code, 1850, Section 499.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; See The Hindu Marriage Act, 1955 Section 22; The Special Marriage Act, 1954, Section 33.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; Bhairav Acharya &amp;amp; Vidushi Marda, &lt;i&gt;Identifying Aspects of Privacy in Islamic Law&lt;/i&gt;, available at 			http://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law (Last visited on December 23, 2014).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; See Robert Lingat, The Classical Law of India (1973).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt; Donald R. Davis, Jr., The Spirit of Hindu Law (2010) (This importation must be viewed against the backdrop of the characteristics of the era of 			Enlightenment wherein primacy was accorded to secular reason and the positivist conception of law. Davis observes "One cannot deny the increasing 			global acceptance of a once parochial notion of law as rules backed by sanctions enforced by the state. This very modern, very European notion of 			law is not natural, not a given; it was produced at a specific moment in history and promulgated systematically and often forcibly through the institutions of what we now call the nation-state, especially those nations that were also colonial powers.)"; But see Alan Gledhill,			&lt;i&gt;The Influence of Common Law and Equity on Hindu Law Since 1800&lt;/i&gt;, available at http://www.jstor.org/stable/755588 (Last visited on December 			23, 2014); Werner Menski, &lt;i&gt;Sanskrit Law: Excavating Vedic Legal Pluralism&lt;/i&gt;, available at 			http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1621384 (Last visited on December 23, 2014) (However, this replacement of traditional legal 			systems did not extend to personal laws. Personal laws in India continue to be community-based, sometimes un-codified, draw from a diverse set of 			simultaneously applicable sources and traditional schools of jurisprudence.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 8, Acharya &amp;amp; Marda.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; Privacy International, &lt;i&gt;A New Dawn: Privacy in Asia&lt;/i&gt;, available at 			https://www.privacyinternational.org/reports/a-new-dawn-privacy-in-asia/background (Last visited on December 28, 2013) ("It is only recently that 			the debate around privacy was stuck in this "collectivist" vs. "individualistic" cultural discourse…we discovered that privacy concerns and 			the need for safeguards were often embedded deeply in a nation, and &lt;i&gt;not just as a response to a modern phenomenon.&lt;/i&gt;").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; Privacy International, &lt;i&gt;A New Dawn: Privacy in Asia&lt;/i&gt;, available at 			https://www.privacyinternational.org/reports/a-new-dawn-privacy-in-asia/background (Last visited on December 28, 2013)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; J. Duncan M. Derrett, &lt;i&gt;The Administration of Hindu Law by the British&lt;/i&gt;, available at http://www.jstor.org/stable/177940 (Last visited on 			December 23, 2014).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Manusmriti, Chapter IV, 201.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt; Manusmriti, Chapter IV, 202.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;&lt;/a&gt; Wael B. Hallaq, An Introduction to Islamic Law 31 (2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;&lt;/a&gt; Donald R. Davis, Jr., The Spirit of Hindu Law (2010).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn20"&gt;&lt;/a&gt; Marc Galanter, &lt;i&gt;The Displacement of Traditional Law in Modern India&lt;/i&gt;, Journal of Social Issues, Vol. XXIV, No. 4, 1968.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 20, Galanter.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 10, Menski.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;&lt;/a&gt; Werner Menski, Hindu Law: Beyond Tradition and Modernity (2003).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;&lt;/a&gt; Ashcroft as cited in Werner Menski, Hindu Law: Beyond Tradition and Modernity (2003).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a name="_ftn27"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 20, Galanter.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a name="_ftn28"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a name="_ftn29"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a name="_ftn30"&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a name="_ftn31"&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a name="_ftn32"&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a name="_ftn33"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 19, Davis.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a name="_ftn34"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a name="_ftn35"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a name="_ftn36"&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a name="_ftn37"&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a name="_ftn38"&gt;&lt;/a&gt; J. Duncan M. Derrett, Introduction to Modern Hindu Law (1963); &lt;i&gt;Supra&lt;/i&gt; note 19, Davis.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a name="_ftn39"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 9, Lingat.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a name="_ftn40"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a name="_ftn41"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a name="_ftn42"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a name="_ftn43"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a name="_ftn44"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a name="_ftn45"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a name="_ftn46"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a name="_ftn47"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a name="_ftn48"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a name="_ftn49"&gt;&lt;/a&gt; John D. Mayne, Hindu Law (1875).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a name="_ftn50"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a name="_ftn51"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 49, Mayne.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a name="_ftn52"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a name="_ftn53"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 19, Davis.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a name="_ftn54"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a name="_ftn55"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a name="_ftn56"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 49, Mayne.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a name="_ftn57"&gt;&lt;/a&gt; Ludo Rocher, Studies in Hindu Law and Dharamasastra (2012).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn58"&gt;&lt;/a&gt; For instance the Yajnawalkya Samhita has clear delineations in its chapters, segregating customary practices, legal procedure and punitive 			measures.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn59"&gt;&lt;/a&gt; Madhu Kishwar, &lt;i&gt;Codified Hindu Law: Myth and Reality&lt;/i&gt;, available at http://www.jstor.org/stable/4401625 (Last visited on December 23, 2014).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a name="_ftn60"&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a name="_ftn61"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 59.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a name="_ftn62"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a name="_ftn63"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a name="_ftn64"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a name="_ftn65"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 20, Galanter.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a name="_ftn66"&gt;&lt;/a&gt; See The Hindu Marriage Act, 1955, Section 7.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn67"&gt;&lt;/a&gt; Saroj Rani v. Sudarshan Kumar Chadda, AIR 1984 SC 1562 (reflected the importance accorded by classical Hindu law to marital stability); M 			Govindaraju v. K Munisami Goundu 1996 SCALE (6) 13(The Supreme Court looked to ancient Shudra custom to adjudicate on a matter of adoption); 			Rajkumar Patni v. Manorama Patni, II (2000) DMC 702 (The Madhya Pradesh High Court, relied on the definition of Stridhan by Manu.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a name="_ftn68"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 8, Acharya &amp;amp; Marda.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a name="_ftn69"&gt;&lt;/a&gt; Semayne v. Gresham, 77 Eng. Rep. 194, 195; 5 Co. Rep. 91, 195 (K.B. 1604).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn70"&gt;&lt;/a&gt; As cited in Julius Jolly, The Minor Law Books 164 (1889), ("A householder's house and field are considered as the two fundamentals of his 			existence. Therefore let not the king upset either of them; for that is the root of the householders").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn71"&gt;&lt;/a&gt; Manmath Nath Dutt, The Dharamshastra - Hindu Religious Codes, Volume 1, 103 (1978) (Yajnawalkya Samhita, Chapter II 235-236: "He…who opens 			the doors of a closed house [without the permission of the master]…should be punished with fifty panas. Such is the law.").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn72"&gt;&lt;/a&gt; L.N. Rangarajan, Kautalya: The Arthashastra 371 (1992) ("O be built at a suitable distance from the neighbours property so as not to cause 			inconvenience to the neighbour").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn73"&gt;&lt;/a&gt; &lt;i&gt;Id&lt;/i&gt; ., ("…doors and windows shall be made so as not to cause annoyance by facing a neighbour's door or window directly").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn74"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 72, Rangarajan, ("when the house is occupied the doors and windows shall be suitably covered").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a name="_ftn75"&gt;&lt;/a&gt; &lt;i&gt; Id.&lt;/i&gt;, 376.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a name="_ftn76"&gt;&lt;/a&gt; See Manusmriti, Chapter IV, 201-202.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn77"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 71, Dutt, 27 (Yajnawalkya Samhita, Chapter I , 160: "One should avoid the bed, seat, garden-house and the conveyance belonging to another 			person.").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a name="_ftn78"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 71, Dutt, 89 (Yajnawalkya Samhita, Chapter II, 146).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a name="_ftn79"&gt;&lt;/a&gt; Manusmriti, Chapter IX, 194.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a name="_ftn80"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 71, Dutt Volume 2, 276 (Angiras Samhita, Chapter I, 71).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a name="_ftn81"&gt;&lt;/a&gt; Samuel D. Warren &amp;amp; Louis D. Brandeis, &lt;i&gt;The Right to Privacy&lt;/i&gt;, Harvard Law Review, Vol. IV, December 15, 1890, No.5.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a name="_ftn82"&gt;&lt;/a&gt; &lt;i&gt;Id.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn83"&gt;&lt;/a&gt; Manusmriti, Chapter IV, 258; &lt;i&gt;Supra &lt;/i&gt;note 71, Dutt, 134 (Yajnawalkya Samhita Chapter III, 111: "Having withdrawn the mind, understanding, 			retentive faculty and the senses from all their objects, the soul, the lord…should be meditated upon.").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a name="_ftn84"&gt;&lt;/a&gt; Manu Chapter VI, 44.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn85"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 71, Dutt, 186 (Harita Chapter VII, 6: "Situated in a solitary place with a concentrated mind, he should, till death mediate on the			&lt;i&gt;atman&lt;/i&gt;, that is situated both in the mind and the external world… ").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a name="_ftn86"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 72, Rangarajan, (Arthashastra, 2.2.2).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a name="_ftn87"&gt;&lt;/a&gt; Supra note72, Rangarajan, (Arthashastra 3.16.33-36).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a name="_ftn88"&gt;&lt;/a&gt; Manusmriti IX, 84&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a name="_ftn89"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 71, Dutt, Volume 2, 350 (Samvarta Samhita,163).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a name="_ftn90"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 71, Dutt, Volume 1, 112 (Yajnawalkya Samhita, Chapter II, 291).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a name="_ftn91"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 71, Dutt, Volume 1, 113 (Yajnawalkya Samhita, Chapter II, 294).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a name="_ftn92"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 72, Ranjarajan (Arthashastra 2.27.14).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a name="_ftn93"&gt;&lt;/a&gt; Supra note 72, Rangarajan (Arthashastra 4.13.38).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a name="_ftn94"&gt;&lt;/a&gt; Manusmriti, X, 62&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn95"&gt;
&lt;p&gt;&lt;a name="_ftn95"&gt;&lt;/a&gt; Manusmriti Part VII, &lt;i&gt;Supra &lt;/i&gt;note 101, Rangarajan (Arthashastra 1.15.2-5, 1.15.13-17).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn96"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn96"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 72, Rangarajan (Arthashastra 1.15.2-5 : The scrutiny of governance related affairs was take place in a secluded and well-guarded spot, where 			it could not be overheard. No unauthorised person was allowed to approach these meetings.).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn97"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_ftn97"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 72, Rangarajan (Arthashastra 1.15.13-17: "…Only those who have to implement it should know when the work is begun or when it has been 			completed.").&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn98"&gt;
&lt;p&gt;&lt;a name="_ftn98"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 72, Rangarajan.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn99"&gt;
&lt;p&gt;&lt;a name="_ftn99"&gt;&lt;/a&gt; &lt;i&gt;Supra&lt;/i&gt; note 71, Dutt, Volume 1, 112 (Yajnawalkya Samhita, Chapter II, 292).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn100"&gt;
&lt;p&gt;&lt;a name="_ftn100"&gt;&lt;/a&gt; &lt;i&gt;Supra &lt;/i&gt; note 71, Dutt, Volume 4, 919 (Vishnu Samhita, Chapter LII, 16).&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law'&gt;https://cis-india.org/internet-governance/blog/loading-constructs-of-privacy-within-classical-hindu-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Ashna Ashesh and Bhairav Acharya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-01-01T13:56:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights">
    <title>Security and Surveillance: A public discussion on Optimizing Security while Safeguarding Human Rights</title>
    <link>https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS) invites you to a public discussion on optimizing security and safeguarding human rights at its Bangalore office on Friday, December 19th, 2014, 16:00 to 18:00.&lt;/b&gt;
        &lt;p&gt; &lt;/p&gt;
&lt;p&gt;The Centre for Internet and Society, in collaboration with Privacy International UK, has undertaken exploratory research into surveillance, security, and the security market in India.&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Through this research, we hope to understand and document policy and law associated with security, surveillance, and the security market in India and learn about the regulation of security and related technologies such as encryption, filtering, monitoring software, and interception equipment. We also hope to understand the import and export policy regime for dual use technologies.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;Such findings will be critical in creating evidence based research to inform security policy and regulation in India and work towards enabling regulatory frameworks that optimize the nation’s security while protecting the rights of citizens.&lt;/span&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights'&gt;https://cis-india.org/internet-governance/events/security-and-surveillance-optimizing-security-human-rights&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-19T08:46:34Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law">
    <title>Identifying Aspects of Privacy in Islamic Law</title>
    <link>https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law</link>
    <description>
        &lt;b&gt;This white paper seeks to identify aspects of privacy in Islamic Law and demonstrate that the notion of privacy was recognized and protected in traditional Islamic law.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I. Introduction&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nuances of privacy have been deliberated by numerous scholars till date, without arriving at a definite answer.	&lt;a name="_ftnref1"&gt;&lt;/a&gt; It has been perceived as a right to be left alone,&lt;a name="_ftnref2"&gt;&lt;/a&gt; as mere secrecy,&lt;a name="_ftnref3"&gt;&lt;/a&gt; as the right to a legitimate area of seclusion and solitude.&lt;a name="_ftnref4"&gt;&lt;/a&gt; Privacy is a particularly nebulous concept, with a tendency of resting on intuitionist arguments.	&lt;a name="_ftnref5"&gt;&lt;/a&gt; However, finding refuge in intuitionist arguments has not lent to a clear understanding of the term itself. This presents a peculiar predicament; while privacy is demanded, nobody seems to have a clear understanding of what it truly means.	&lt;a name="_ftnref6"&gt;&lt;/a&gt; Daniel Solove opines that privacy is a concept in disarray, it is about everything and hence it seems to 	be about nothing.&lt;a name="_ftnref7"&gt;&lt;/a&gt; Solove finds agreement in a variety of literature, where privacy has been described as a "chameleon-like word",&lt;a name="_ftnref8"&gt;&lt;/a&gt; a term suffering from an "embarrassment of meanings",	&lt;a name="_ftnref9"&gt;&lt;/a&gt; a "powerful rhetorical battle cry".&lt;a name="_ftnref10"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditional notions such as bodily privacy, privacy within one's home, or privacy resulting out of private property are received with far less scepticism 	than more recent aspects of privacy. With the burgeoning increase in information exchange, the ambit of privacy concerns is widened but not always 	understood. While earlier notions of privacy confined themselves to physical intrusions, it is now possible to invade a person's privacy without physically 	intruding on their space. &lt;a name="_ftnref11"&gt;&lt;/a&gt; As capabilities to intrude on privacy increase, the demand for respecting 	privacy grows stronger. In their historic article, Warren and Brandeis referred to privacy as an incorporeal notion, referring to cases of defamation, proprietary harms, contractual harms, breach of confidence to conclude that all such cases belonged to an umbrella principle of the right to privacy.	&lt;a name="_ftnref12"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.II Aspects of Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;William Prosser, a torts scholar, in 1860 attempted to classify privacy comprehensively. He contemplated four kinds of activities as impinging on a 	person's privacy. They were 	&lt;br /&gt; 1. Intrusion upon the plaintiff's seclusion or solitude, or into his private affairs. 	&lt;br /&gt; 2. Public disclosure of embarrassing private facts about the plaintiff. 	&lt;br /&gt; 3. Publicity which places the plaintiff in a false light in the public eye. 	&lt;br /&gt; 4. Appropriation, for the defendant's advantage, of the plaintiff's name or likeness.&lt;a name="_ftnref13"&gt;&lt;/a&gt; &lt;br /&gt; While this classification lent some structure to the understanding of privacy, it restricted itself to only tort law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A wider taxonomy was offered by Daniel Solove, imbibing concerns of digital privacy and information technology. Focussing on activities that invade 	privacy, Solove argued that information collection, aggregation of information, dissemination of such aggregated information and invasion into people's 	private affairs are the aspects integral to understanding the privacy concerns of a data subject.&lt;a name="_ftnref14"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its policy paper on privacy in India, the Data Security Council of India (DSCI) recognised privacy issues in the context of e-commerce, transactional 	privacy, cyber crime, national security, and cross border data flows.&lt;a name="_ftnref15"&gt;&lt;/a&gt; Similarly the Department of Personnel and Training (DoPT) in 2011 focussed on understanding privacy in the context of data protection and surveillance.	&lt;a name="_ftnref16"&gt;&lt;/a&gt; Subsequently, in 2012, the Planning Commission of India set up the A.P. Shah Committee to look into 	issues of data protection. This Committee classified the dimensions of privacy into four main categories; interception and access, audio and video 	recording, access and use of personal identifiers, and bodily and genetic material.&lt;a name="_ftnref17"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The classification of privacy for the purpose of this paper is under the heads of bodily privacy, informational and communications privacy, and territorial 	and locational privacy.&lt;a name="_ftnref18"&gt;&lt;/a&gt; Bodily privacy stems from the notion of personal autonomy and inviolate 	personality. Battery, rape, voyeurism are all examples of the recognition of the need to protect the privacy of one's body. Communications and 	informational privacy refers to the protection of sensitive personal information, specific communications and private conversations. Interception of messages, spying, hacking or tapping phone lines are all activities that impinge on privacy under this head. India's ambitious biometric project,	&lt;i&gt;Aadhar, &lt;/i&gt;has brought to the fore concerns surrounding personal information. Territorial privacy is developed from the notion of private property, 	the tort of trespass being ample recognition of the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.III Is India a Private Nation?&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In October, 2010, the government published an approach paper for legislation on privacy. In explaining the need for privacy legislation in India, the paper 	states, 	&lt;br /&gt; &lt;br /&gt; &lt;i&gt; "India is not a particularly private nation. Personal information is often shared freely and without thinking twice. Public life is organized without 		much thought to safeguarding personal data. In fact, the public dissemination of personal information has over time, become a way of demonstrating the 		transparent functioning of the government."&lt;a name="_ftnref19"&gt;&lt;/a&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The notion of privacy being a foreign construct carves the argument that legislation on privacy would mean subjecting India to an alien cultural value. 	However, this ignores the possibility of privacy being culturally subjective.&lt;a name="_ftnref20"&gt;&lt;/a&gt; Cultures have exhibited 	different measurements by which they measure public and private realms.&lt;a name="_ftnref21"&gt;&lt;/a&gt; This paper aims to demonstrate 	that while the word "privacy" does not find explicit reference in traditional Indian law, the essence of privacy as we understand it today has existed in 	traditional Indian culture, specifically Indian Islamic culture, pre-dating colonialism in India and modernity in India's legal system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.IV Displacement of traditional Indian Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Contemporary Indian law functions within a rubric that was constructed after the "expropriation" of traditional law.	&lt;a name="_ftnref22"&gt;&lt;/a&gt; India's colonial legacy rendered the displacement of traditional Indian law with a unified modern legal system abounding in European ideas of modernity and legal systems, leaving it is a state of "fractured modernity".	&lt;a name="_ftnref23"&gt;&lt;/a&gt; Before the British rule, Indians were governed by their personal laws and these laws did not aim to 	unify the nation in ways that Western legal systems did.&lt;a name="_ftnref24"&gt;&lt;/a&gt;. The decision to establish a modern legal 	system stemmed from the desire to administer the law as a function of the state, which would have been impractical at best in the absence of a unified 	legal system.&lt;a name="_ftnref25"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Edward Said eloquently states that the colonial experience does not end when the last European flag comes down or when the last white policeman leaves.	&lt;a name="_ftnref26"&gt;&lt;/a&gt; One cannot help but agree with Said, as the understanding of law in contemporary India is constructed 	on the principles of the English common law and on ideas of a modern legal system. While the word "privacy" does not arise in traditional law, this paper 	argues that the notions of privacy as we perceive it today did exist hitherto the modernization of India's legal system.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I.V Structure of the paper&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While Part I has laid down the foundation of this paper and the arguments it endeavours to make, Part II explains the sources of Islamic law and attempts 	at locating privacy in them. It also explains certain pervasive concepts that will enhance an understanding of privacy in Islamic law. This paper restricts itself to &lt;i&gt;Sunni &lt;/i&gt;Islamic law. Part III gives an indication of privacy rights in India's neighbouring Islamic countries (both predominantly	&lt;i&gt;Sunni),&lt;/i&gt; Pakistan and Bangladesh; and highlights the legal framework for privacy in these countries.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II. Privacy in Islamic Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.I Sources of Islamic Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before locating aspects of privacy in Islamic Law, an understanding of its structure and sources will be helpful. Islamic Law is composed of	&lt;i&gt;Shariah, &lt;/i&gt;and &lt;i&gt;fiqh. Shariah&lt;/i&gt; indicates the path a faithful Muslim must undertake to attain guidance in the present world and deliverance to 	the next&lt;i&gt;.&lt;/i&gt; &lt;i&gt;Fiqh, &lt;/i&gt;the jurisprudence of Islam, refers to the rational understanding of &lt;i&gt;Shariah&lt;/i&gt; and human reasoning to appreciate 	the practical implications of Islam. While &lt;i&gt;Shariah&lt;/i&gt; is divine revelation, &lt;i&gt;fiqh&lt;/i&gt; is the human inference of &lt;i&gt;Shariah&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The principle tenet of Islam is unwavering obedience to the teachings of God. According to Muslim belief, the &lt;i&gt;Quran&lt;/i&gt; is the divine communication 	from Allah to the Prophet of Islam. It is the foremost record of the word of God, and for this reason is considered the apex source of Islamic law. It is 	in the &lt;i&gt;Quran&lt;/i&gt; that basic norms of &lt;i&gt;Shariah&lt;/i&gt; are found, and it embodies the exact words of God as was revealed to the Prophet over a period of 23 years. &lt;i&gt;Fiqh&lt;/i&gt;, or the understanding of &lt;i&gt;Shariah&lt;/i&gt;, also finds its origins in the holy &lt;i&gt;Quran&lt;/i&gt;.	&lt;a name="_ftnref27"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Sunnah&lt;/i&gt; or Prophetic traditions are the ingredients for the model behaviour of a Muslim as demonstrated by the Prophet. It is a "way, course, 	rule, mode, or manner, of acting or conduct of life."&lt;a name="_ftnref28"&gt;&lt;/a&gt; The &lt;i&gt;Sunnah&lt;/i&gt; were compiled through the 	communications of Prophet Muhammad in the form of &lt;i&gt;Hadiths&lt;/i&gt; which are communications, stories or conversations; and may be religious or secular; 	historical or recent.&lt;a name="_ftnref29"&gt;&lt;/a&gt; The narrators of the &lt;i&gt;Hadith&lt;/i&gt; are known as "&lt;i&gt;isnad&lt;/i&gt;" who convey the 	"&lt;i&gt;matn&lt;/i&gt;" or the substance of the Prophet's actions or words as narrated through oral communications through the years. Due to its very nature, the accuracy of the &lt;i&gt;Sunnah&lt;/i&gt; came under considerable scrutiny, with concerns as to its possible fabrication and dilution.	&lt;a name="_ftnref30"&gt;&lt;/a&gt; However, with a well devised system of recording and verifying sources, the &lt;i&gt;Sunnah &lt;/i&gt; accompanies the imperative source of Islamic law, the &lt;i&gt;Quran.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The other sources of Islam are found in human reasoning, or &lt;i&gt;ijtihad&lt;/i&gt;. &lt;i&gt;Ijtihad &lt;/i&gt;assumes a variety of secondary sources such as analogical reasoning &lt;i&gt;(Qiyas),&lt;/i&gt; unanimous consensus &lt;i&gt;(Ijma),&lt;/i&gt; decisions in favour of public interest (&lt;i&gt;isthihsan), &lt;/i&gt;and presumption of continuity	&lt;i&gt; (istishab)&lt;/i&gt;.&lt;a name="_ftnref31"&gt;&lt;/a&gt; &lt;br /&gt; &lt;i&gt;Ijtihad&lt;/i&gt; entails a resilient effort; an exertion in interpreting the primary sources in order to understand &lt;i&gt;Shariah, &lt;/i&gt;to infer the law which is not explicit 	or evident. The legitimacy of &lt;i&gt;Ijma&lt;/i&gt; is found in the Prophetic tradition, which states that the followers of Islam would never agree on an error, 	and will never unite on misguidance.&lt;a name="_ftnref32"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Quran and Sunnah &lt;/i&gt;lie at the pinnacle of Islamic jurisprudence and their authoritativeness lends a ready inference of legal principles derived from them. In exploring the concept of Privacy in Islamic Law, this paper will focus mainly on the material available in the &lt;i&gt;Quran &lt;/i&gt;and	&lt;i&gt;Sunnah.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.II The Public and Private in Islam&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to the doctrine of &lt;i&gt;Shariah&lt;/i&gt;, every aspect of life is deemed to be private unless shown otherwise.	&lt;a name="_ftnref33"&gt;&lt;/a&gt; The public sphere is that in which governmental authority operates, making it both transparent and 	open to scrutiny and observation. Since its inception, Islam has considered the idea of governance with reasonable scepticism, ascribing to the view that 	there is no concept of a human ruler beyond reproach.&lt;a name="_ftnref34"&gt;&lt;/a&gt; This perhaps gave impetus to the idea of a 	private sphere as one that is inhabited exclusively by an individual and the divine, excluding any interference of the State; except with permission from 	religious law. In Islamic belief, a pious individual had submitted himself to God, and not the worldly State. Hence, all aspects of his life will align 	with the tenets of Islamic law and in pursuance with the will of God.&lt;a name="_ftnref35"&gt;&lt;/a&gt; Any failure to perform religious duties on the part of a Muslim is beyond the scope of another; it is only a consideration between him and the divine.	&lt;a name="_ftnref36"&gt;&lt;/a&gt; It is believed that the Prophet said, 	&lt;i&gt; "Those, who acknowledge God in words, and not at heart, do not find fault with their fellow Muslims. The wrongdoing of those who do so become the 		subject of God's scrutiny, and when God looks into someone's wrongdoing then all shall be truly exposed" &lt;/i&gt; &lt;a name="_ftnref37"&gt;&lt;/a&gt; The individual is bestowed with complete freedom of action in the private sphere, subject only to the will of the divine. To govern another is wholly 	beyond the capacity of any individual, and this forms a pervasive theme in Islamic jurisprudence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic Law recognizes that it is inevitable for every society to impose certain requirements on individuals both by the law and by societal norms. In 	respect of a public domain, Islam prescribes an amalgam of requirements of a Muslim community and the teachings of Islam. While committing sins in private is beyond the scope of public or governmental scrutiny, committing a sin in public amounts to a crime, meriting worldly punishment.	&lt;a name="_ftnref38"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic law provides for an individual's obligations to the divine at all times, and to the state in matters within the public domain.	&lt;a name="_ftnref39"&gt;&lt;/a&gt; This is the most striking difference between Islamic law and modern law, as the function of enforcement of the law and punishment are forfeited to the state in a modern legal system, by virtue of the social contract.	&lt;a name="_ftnref40"&gt;&lt;/a&gt; However, in Islamic societies, the concept of social contract does not exist. Instead, an individual's 	obligations lie to the state only if acts meriting worldly punishment occur in the public sphere.&lt;a name="_ftnref41"&gt;&lt;/a&gt; It is 	this distinction in the obligations of individuals that leads to conflicts between the application of Islamic law and modern law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Quran&lt;/i&gt; is replete with rules for all believers to ordain good and forbid evil (al-amrbi al-Ma'rufwa al-nahy 'an al-munkar').	&lt;a name="_ftnref42"&gt;&lt;/a&gt; This divine injunction is a restriction of freedom in the private sphere. The notion of privacy in the 	public sphere was tested through the office of the &lt;i&gt;muhtasib,&lt;/i&gt; or compliance officer. These officers were appointed to ensure that the quality of life is preserved in Islamic societies. Personal or private matters which were visible in the public realm were liable to scrutiny from the	&lt;i&gt;muhtasib&lt;/i&gt; as well. However, this does not extend to matters such as surveillance and spying even on the authority of the state. The Prophet, 	according to the &lt;i&gt;hadith &lt;/i&gt;of Amir Mu'awiyah remarked, &lt;b&gt;&lt;i&gt;"&lt;/i&gt;&lt;/b&gt; &lt;i&gt; If&lt;b&gt; &lt;/b&gt;you try to find out the secrets of the people, then you will definitely spoil them or at least you will bring them to the verge of 		ruin." &lt;/i&gt; &lt;a name="_ftnref43"&gt;&lt;/a&gt; In fact, modern jurists admonish the idea of surveillance as &lt;i&gt;"exactly what Islam has called as the root cause of mischief in politics.&lt;/i&gt;"	&lt;a name="_ftnref44"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II.III. Privacy in Islamic Law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bodily Privacy &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The sanctity of one's bodily privacy is well recognised in Islamic Law. The &lt;i&gt;Quran&lt;/i&gt; (24:58)&lt;a name="_ftnref45"&gt;&lt;/a&gt; demarcates certain periods in a day which are times of privacy for an individual, and indicates the need for prior permission before one may enter the 	private sphere of another. These periods are before the prayer at dawn, during the afternoon where one rests, and after the night prayer. This verse also calls upon children who have not yet reached the age of puberty to get accustomed to asking for permission before entering rooms apart from their own.	&lt;a name="_ftnref46"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As far as bodily seizure of individuals accused of crimes goes, the Traditions indicate a general disinclination towards pre-adjudication restraint of individuals. The very occurrence of it appears to be a cause of discomfort as recorded in the Traditions.	&lt;a name="_ftnref47"&gt;&lt;/a&gt; One of the Prophet's closest companions, Umar, is believed to have encourages officials to speed up adjudication processes so that the accused could not be deprived of the comfort of their homes and families.	&lt;a name="_ftnref48"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;bodily privacy and modesty&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the Quran stipulates gender equality, the norms of bodily privacy and modesty applicable to men are far less rigorous than the rules of modesty 	that apply to women.&lt;a name="_ftnref49"&gt;&lt;/a&gt; While staring is not contemplated as a crime in modern jurisdictions, the Quran 	directs "believing men to lower their gaze and be modest." &lt;a name="_ftnref50"&gt;&lt;/a&gt; At the same time, it directs women to adhere to strict rules of clothing and conduct, with directions on how to conduct oneself both in private as well as public.	&lt;a name="_ftnref51"&gt;&lt;/a&gt; Interestingly, with the use of full-body scanners at airports around the world, the bodily privacy of Muslims came to the forefront with several Muslim scholars opining that such use of scanners was in direct violation of the tenets of Islam.&lt;a name="_ftnref52"&gt;&lt;/a&gt; According to the Quran, the modesty of a Muslim woman is an indication of her faith.	&lt;a name="_ftnref53"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communication and Informational Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is, in many ways, inextricably linked to the notions of personal autonomy, and inviolate personality. Privacy in matters apart from those concerned with proprietary interests was only developed as a legal idea around the ninth century, although the &lt;i&gt;Quran &lt;/i&gt;made ample references to it.	&lt;a name="_ftnref54"&gt;&lt;/a&gt; Whilst the term "privacy" is not directly alluded to in the &lt;i&gt;Quran&lt;/i&gt;, it contains verses 	emphasizing the importance of respecting personal autonomy. The &lt;i&gt;Quran&lt;/i&gt; (49:12) rebukes those who wish to pry into matters which do not concern them, or harbour suspicions in respect of others, conceding that some suspicions can even be considered crimes.	&lt;a name="_ftnref55"&gt;&lt;/a&gt; This implies an injunction against investigation; which complements the prohibition of circulation of 	information pertaining to an individual's private sphere (24:19).&lt;a name="_ftnref56"&gt;&lt;/a&gt; According to this verse, publication 	of immorality is desirous of punishment. A reasonable conclusion from the reading of these verses is that the &lt;i&gt;Quran&lt;/i&gt; mandates respect for the 	private sphere, guaranteeing that a faithful believer will not violate it.&lt;a name="_ftnref57"&gt;&lt;/a&gt; The Prophet is reported to have said that non interference of individuals in matters that do not concern them is a sign of their good faith.	&lt;a name="_ftnref58"&gt;&lt;/a&gt; Interestingly, the injunction against unwarranted search is for all members of a Muslim community, not 	just followers of Islam. An extension of the concept of informational privacy is the privacy of one's opinion, which is believed to be beyond reproach regardless of its contents. Deeds in the public sphere can be subject to worldly punishment, but thoughts and opinions everywhere, are not subject to it.	&lt;a name="_ftnref59"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Sunnah&lt;/i&gt; have also emphasized on privacy in communications. The Prophet once said,	&lt;i&gt;"He, who looks into a letter belonging to his brother, looks into the Hellfire&lt;/i&gt;"&lt;a name="_ftnref60"&gt;&lt;/a&gt; , indicating that private communications shall enjoy their privacy even in the public domain. This is evident from another saying of the Prophet,&lt;i&gt;"Private encounters result in entrustment&lt;/i&gt;", which entails a restriction on communications arising out of private meetings.	&lt;a name="_ftnref61"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Territorial Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Domestic privacy is considered an important facet of Islamic life and this idea pervades different aspects of &lt;i&gt;Shariah&lt;/i&gt;. Privacy in regard to 	proprietary interests was in fact the first legal conception of privacy recognised by Muslim jurists. &lt;a name="_ftnref62"&gt;&lt;/a&gt; The &lt;i&gt;Quran&lt;/i&gt; (24:27-8) forbids entering another's house in lieu of permission to do the same. &lt;a name="_ftnref63"&gt;&lt;/a&gt; It seeks to ensure that a person visiting another's house is welcome in that house; reminding individuals of their rights during such visits. Further, the	&lt;i&gt;Quran&lt;/i&gt; (2:189) envisions visits made to other's houses only through the front door, indicating respect and transparency in visiting another's 	dwelling place.&lt;a name="_ftnref64"&gt;&lt;/a&gt; Muslim scholars are of the opinion that such rules were laid down in order to safeguard one's private sphere; to allow people to modify their behaviour to accommodate a visitor in a private domain.	&lt;a name="_ftnref65"&gt;&lt;/a&gt; Clarifying the reasons for such rules, a jurist offered the following explanation, 	&lt;i&gt; "The first greeting is for the residents to hear the visitor, the second is for the residents to be cautious( fa-ya khudhu hidhrahum),and the third is 		for them to either welcome the visitor or send him away."&lt;/i&gt;&lt;a name="_ftnref66"&gt;&lt;/a&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy in the domestic sphere extends to both physical privacy as well as intangible privacy. The Prophet opined that if one's gaze has entered into a 	private home before his body does, permission to enter the home would be redundant. This follows from the idea that if a person curiously peeps into 	another's home, it is equivalent to him entering it himself. The right to privacy is extended to absolve the home owner of any guilt in the event of attack 	on the intruder. &lt;a name="_ftnref67"&gt;&lt;/a&gt; Curiously, the right to privacy within one's home is extended to privacy in respect 	of sinful behaviour within his private sphere; the accountability of a Muslim to his fellow humans is only to be discerned in respect of his public 	actions.&lt;a name="_ftnref68"&gt;&lt;/a&gt; This is illustrated by an interesting story in the &lt;i&gt;Hadith &lt;/i&gt;of Umar ibn al-Khattab. 	Khattab climbed the wall of a house on the suspicion of wine being consumed within the premises. On his suspicion being confirmed, he chided them for their 	conduct. They then reminded him that while he pointed out their sins, he himself was guilty of three sins; spying on them, failing to greet them and also 	not approaching their house through the front door. He agreed with them and walked away. &lt;a name="_ftnref69"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rationale behind recognising privacy in the domestic sphere is not just illegal intrusion into one's physical space; it is also intrusion into matters 	of sensitivity which widens the scope for privacy in Islamic Law.&lt;a name="_ftnref70"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III Privacy in Shariah Based States&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Locating aspects of privacy is Shariah-based states is particularly challenging due to the duality of obligations that exists in their legal framework. 	While Islamic law focuses on obligations of individuals to the divine in all affairs and the state only in public matters, legal obligations in modern 	states are understood vis-à-vis the state only.&lt;a name="_ftnref71"&gt;&lt;/a&gt; The incorporation of Islam into these modern legal 	systems represents the attempt at reconciling two distinct sources of law. This Part will consider the legal frameworks for privacy in Pakistan and 	Bangladesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III.I Pakistan&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Islamic law has had a profound impact on the legal system of Pakistan.&lt;a name="_ftnref72"&gt;&lt;/a&gt; This Islamic Republic integrates	&lt;i&gt;Shariah&lt;/i&gt; law into its common law system, as is evident from Article 227(1) of the 1973 Constitution of Pakistan ("the 1973 Constitution"). It 	reads, " 	&lt;i&gt; All existing laws shall be brought in conformity with the Injunctions of Islam as laid down in the Holy Quran and Sunnah, in this Part referred to as 		the Injunctions of Islam, and no law shall be enacted which is repugnant to such injunction". &lt;/i&gt; &lt;a name="_ftnref73"&gt;&lt;/a&gt; In addition to the Constitutional safeguards, General Zia-ul-Haq, between 1977 and 1988 provided great impetus to Pakistan's process of incorporating Islam 	into its common law system through the establishment of appellate religious courts and also enactment of the &lt;i&gt;Hudood&lt;/i&gt; criminal law, which was 	consequently criticized for being discriminatory and arbitrary.&lt;a name="_ftnref74"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Constitutional Provisions&lt;/b&gt; &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Enshrined in the 1973 Constitution is the fundamental right of persons not to be subject to any action detrimental to the life, liberty, body, reputation 	or property. While referring to the rights of individuals, Article 4(1) lays down, 	&lt;i&gt; "To enjoy the protection of law and to be treated in accordance with law in the inalienable right of every citizen. Wherever he may be, and of every 		other person for the time being within Pakistan." &lt;/i&gt; &lt;a name="_ftnref75"&gt;&lt;/a&gt; While aspects of privacy can be read into this Article quite emphatically, the 1973 Constitution explicitly recognises the right to privacy, dignity and the inviolability of persons in Article 14(1),&lt;i&gt;"The dignity of man, subject to law, the privacy of home, shall be inviolable".&lt;/i&gt; &lt;a name="_ftnref76"&gt;&lt;/a&gt; The sanctity of these rights is vigorously upheld as laws inconsistent with fundamental rights are 	declared to be void to the extent of their inconsistency.&lt;a name="_ftnref77"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bodily Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 1973 Constitution recognises the fundamental right of persons not to be subject to any action detrimental to the life, liberty, body, reputation or 	property.&lt;a name="_ftnref78"&gt;&lt;/a&gt; The Pakistan Penal Code (Act XLV of 1860) refers to the protection of privacy of women in 	Section 509, upholding the modesty of women.&lt;a name="_ftnref79"&gt;&lt;/a&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communications and Informational Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Pakistan Telecommunication (Re-organisation) Act 1996 enables investigating authorities under the Act to take cognizance of illegalities in 	communications.&lt;a name="_ftnref80"&gt;&lt;/a&gt; These authorities submit their reports to the courts, ensuring the accountability of 	such events, as well as legitimising search and seizure in pursuance of intercepted communications. The Act also makes arrangements for authorised interception of communications in cases of national security, although the wide and sweeping powers bestowed under this Section are a cause for concern.	&lt;a name="_ftnref81"&gt;&lt;/a&gt; Moreover, any person causing annoyance to another through a telephone is liable to criminal punishment 	under the Telegraph Act, 1885.&lt;a name="_ftnref82"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Medical&lt;a name="_ftnref83"&gt;&lt;/a&gt;and Financial&lt;a name="_ftnref84"&gt;&lt;/a&gt; information is recognised as a 	unit of privacy in the legal system of Pakistan. The delicate balance between transparency of government action and extent of privacy of information is 	struck in the Freedom of Information Ordinance, which exempts divulging information regarding personal privacy of individuals, private documents and 	financial privacy.&lt;a name="_ftnref85"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As far as digital privacy is concerned, the law in Pakistan is still at a nascent stage. In 2000, Pakistan implemented the National Information Technology 	Policy and Action Plan, which provided for confidentiality of transactional information.&lt;a name="_ftnref86"&gt;&lt;/a&gt; In 2002, an 	Electronic Transactions Ordinance was passed with a view to recognise and protect electronic transactions, setting up a framework within which privacy of 	information can be guaranteed and authenticity can be verified.&lt;a name="_ftnref87"&gt;&lt;/a&gt; There is no devoted law on data protection yet, although a Draft Electronic Data Protection Bill was published by the Ministry of Information in 2005.	&lt;a name="_ftnref88"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Territorial and Locational Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Akin to notions of privacy of the home in Islamic law, criminal trespass is a punishable offence under the Pakistan Penal Code.	&lt;a name="_ftnref89"&gt;&lt;/a&gt; Pakistan has an unfortunately intimate relationship with terrorism. The Anti Terrorism Act of 1997 	incorporates some provisions which raise concerns as to the sanctity of individual privacy. The Act allows an officer of police, armed forces or civil armed forces to enter and search any premise, &lt;a name="_ftnref90"&gt;&lt;/a&gt; and to seize any property	&lt;a name="_ftnref91"&gt;&lt;/a&gt; they suspect to be connected to a terrorist act, without a warrant. Perhaps what is more worrying is that the entry of an officer is not subject to review, unlike in other Islamic countries like the United Arab Emirates.	&lt;a name="_ftnref92"&gt;&lt;/a&gt; The trade off between personal liberties and national security is acutely felt in Pakistan, with 	intelligence agencies carrying on mass surveillance, without any legal framework providing for the same.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III.II Privacy in Bangladesh&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bangladesh identifies itself as a secular nation, although Islam is the state religion. &lt;a name="_ftnref93"&gt;&lt;/a&gt; The Constitution of Bangladesh uses the word privacy in the context of both territorial and communications privacy.	&lt;a name="_ftnref94"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Bodily Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Bangladesh Penal Code, similar to Pakistan's, contains a section guaranteeing the bodily privacy of a woman and prohibiting any form of outraging her 	modesty.&lt;a name="_ftnref95"&gt;&lt;/a&gt; It criminalises assault,&lt;a name="_ftnref96"&gt;&lt;/a&gt; and also provides 	for private defence in case of assault.&lt;a name="_ftnref97"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communications Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The privacy of communications is subject to interception for the purpose of public safety, as envisaged in the Telegraph Act, 1885.&lt;a name="_ftnref98"&gt;&lt;/a&gt; It also contains provisions regarding unlawful interception of messages,&lt;a name="_ftnref99"&gt;&lt;/a&gt; as well as tampering or damaging communications.	&lt;a name="_ftnref100"&gt;&lt;/a&gt;The Telecommunications (Amendment) Act 2006 gives the police sweeping powers to intercept mobile 	communications as well. However, a notice was issued to the government after this amendment to demonstrate its legality. Bangladesh also has the Right to 	Information Act, 2009 to promote transparency in governance, although it has a considerable number of agencies exempt from the Act as well. Provisions for 	cyber crime are enshrined in the Information and Communication Technology Act, 2006.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Territorial Privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the context of territorial privacy, the Bangladesh Penal Code recognises criminal trespass,&lt;a name="_ftnref101"&gt;&lt;/a&gt; house 	trespass,&lt;a name="_ftnref102"&gt;&lt;/a&gt; lurking house trespass&lt;a name="_ftnref103"&gt;&lt;/a&gt; and house 	breaking&lt;a name="_ftnref104"&gt;&lt;/a&gt; as offences under Bangladeshi law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IV. Conclusion&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy is a comprehensive term that entails a plethora of claims, making an exact definition of the term difficult to come by. In the absence of an 	explicit reference to privacy in the Indian Constitution, the Supreme Court has brought the right to privacy within the penumbra of Article 21 through 	various case laws.&lt;a name="_ftnref105"&gt;&lt;/a&gt; In 2010, the Government in its approach paper on privacy claimed that India is 	not a particularly private nation.&lt;a name="_ftnref106"&gt;&lt;/a&gt; In order to comprehensively understand India's modern legal 	framework, it is imperative to analyze the concepts of traditional law as they existed hitherto the colonial era. Although the term "privacy" is a modern 	construct, this paper has sought to demonstrate that the notion of privacy was well recognized and protected in traditional Islamic law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;From the discussion above, it is evident that the concept of privacy in &lt;i&gt;Shariah&lt;/i&gt; law rests convincingly within the taxonomy adopted in this paper. 	The &lt;i&gt;Quran&lt;/i&gt; and &lt;i&gt;Hadith&lt;/i&gt; accommodate concerns surrounding private property, personal autonomy, protection of private communications, domestic 	life, modesty and the modern idea of surveillance. In addition to this, Islamic jurisprudence ascribes to the idea of a public and private sphere. The 	public sphere is occupied by society and governmental action, being liable to scrutiny and observation. On the other hand, the private sphere is occupied 	by the individual and the divine alone, free from any interference except in accordance with &lt;i&gt;Shariah&lt;/i&gt; law. Inspite of the term "privacy" not 	finding explicit mention in the &lt;i&gt;Quran&lt;/i&gt; or &lt;i&gt;Hadith&lt;/i&gt;, a closer analysis of &lt;i&gt;Shariah&lt;/i&gt; reveals privacy as a pervasive theme in Islamic 	jurisprudence.&lt;/p&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a name="_ftn1"&gt;&lt;/a&gt; Daniel Solove, &lt;i&gt;A Taxonomy of Privacy, &lt;/i&gt;Vol. 154, No.3&lt;i&gt; &lt;/i&gt;University of Pennsylvania Law Journal, 477 (2006).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a name="_ftn2"&gt;&lt;/a&gt; Samuel D. Warren &amp;amp; Louis D. Brandeis, &lt;i&gt;The Right to Privacy&lt;/i&gt;, 4 Harvard Law Review 193, 193 (1890).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a name="_ftn3"&gt;&lt;/a&gt; Richard A. Posner, &lt;i&gt;Privacy, Surveillance and the Law, Vol. 75 No. 1&lt;/i&gt;&lt;i&gt; &lt;/i&gt;The University of Chicago Law Review&lt;i&gt; &lt;/i&gt;245, 245			&lt;i&gt; &lt;/i&gt;(2008).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a name="_ftn4"&gt;&lt;/a&gt; Blanca Rodríguez Ruiz, Privacy in Telecommunications: A European and an American Approach 39 (1st ed. 1997).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a name="_ftn5"&gt;&lt;/a&gt; James Q. Whitman, &lt;i&gt;The Two Western Cultures of Privacy : Dignity versus Liberty, &lt;/i&gt;113 Yale Law Journal 1152, 1153 (2004).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a name="_ftn6"&gt;&lt;/a&gt; Whitman, &lt;i&gt;supra &lt;/i&gt;note 5, at 1153.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a name="_ftn7"&gt;&lt;/a&gt; Solove, &lt;i&gt;supra &lt;/i&gt;note 1, at 479.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p&gt;&lt;a name="_ftn8"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Referencing Lillian r. BeVier,			&lt;i&gt;Information About Individuals in the Hands of Government: Some Reflections on Mechanisms for Privacy Protection&lt;/i&gt;, 4 WM. &amp;amp; MARY BILL 			RTS. J. 455, 458 (1995) .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p&gt;&lt;a name="_ftn9"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Referencing KIM LANE SCHEPPELE, LEGAL SECRETS 184-85 (1988).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p&gt;&lt;a name="_ftn10"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Referencing 1 J. THOMAS MCCARTHY, THE RIGHTS OF PUBLICITY AND PRIVACY § 5.59 (2d ed. 2005).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a name="_ftn11"&gt;&lt;/a&gt; Solove, &lt;i&gt;supra &lt;/i&gt;note 1, at 560.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a name="_ftn12"&gt;&lt;/a&gt; Samuel D. Warren &amp;amp; Louis D. Brandeis, &lt;i&gt;supra &lt;/i&gt;note 2, at 193.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a name="_ftn13"&gt;&lt;/a&gt; William L Prosser, &lt;i&gt;Privacy, &lt;/i&gt;48 California Law Review 383,389 (1960).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a name="_ftn14"&gt;&lt;/a&gt; Solove, &lt;i&gt;supra &lt;/i&gt;note 1, at 488.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p&gt;&lt;a name="_ftn15"&gt;&lt;/a&gt; Data Security Council of India, Policy Paper: Privacy in India. Available at 			https://www.dsci.in/sites/default/files/Policy%20Paper%20-%20Privacy%20in%20India.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p&gt;&lt;a name="_ftn16"&gt;&lt;/a&gt; Department of Personnel and Training, (DoPT) Approach Paper for a Legislation on Privacy. Report available at 			http://ccis.nic.in/WriteReadData/CircularPortal/D2/D02rti/aproach_paper.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p&gt;&lt;a name="_ftn17"&gt;&lt;/a&gt; Justice Ajit.P.Shah Committee, Report of the Group of Experts on Privacy, 60. Available at - 			http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p&gt;&lt;a name="_ftn18"&gt;&lt;/a&gt; Bhairav Acharya, at http://freespeechhub.thehoot.org/freetracker/storynew.php?storyid=565&amp;amp;sectionId=10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p&gt;&lt;a name="_ftn19"&gt;&lt;/a&gt; DoPT, Approach Paper. &lt;i&gt;supra&lt;/i&gt; note 16.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p&gt;&lt;a name="_ftn20"&gt;&lt;/a&gt; Whitman, &lt;i&gt;supra&lt;/i&gt; note 5, at 1154.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p&gt;&lt;a name="_ftn21"&gt;&lt;/a&gt; Chandran Kukathas, &lt;i&gt;Cultural Privacy&lt;/i&gt;, Vol. 91, No. 1 The Monist 68, 69 (2008).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p&gt;&lt;a name="_ftn22"&gt;&lt;/a&gt; Marc Galanter, &lt;i&gt;Displacement of Traditional Law in Modern India, &lt;/i&gt;Vol XXIV, No. 4 Journal of Social Issues 65, 67 (1968).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p&gt;&lt;a name="_ftn23"&gt;&lt;/a&gt; Stuart Corbridge &amp;amp; John Harriss, Reinventing India: Liberalization, Hindu Nationalism and Popular Democracy 238 (Reprint, 2006).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p&gt;&lt;a name="_ftn24"&gt;&lt;/a&gt; Galanter, &lt;i&gt;supra&lt;/i&gt; note 22, at 66.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p&gt;&lt;a name="_ftn25"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 67.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p&gt;&lt;a name="_ftn26"&gt;&lt;/a&gt; Edward Said, &lt;i&gt;Representing the Colonized: Anthropology's Interlocutors&lt;/i&gt;, Vol. 15 No.2 Critical Inquiry 205, 207 (1989).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p&gt;&lt;a name="_ftn27"&gt;&lt;/a&gt; Mohammad Hashim Kamali, Shari'ah Law, An Introduction 19 (2009)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p&gt;&lt;a name="_ftn28"&gt;&lt;/a&gt; M Mustafa Al Azami, Studies in Hadith Methodology and Literature 7 (2002).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p&gt;&lt;a name="_ftn29"&gt;&lt;/a&gt; &lt;i&gt;Id. &lt;/i&gt; at 3.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p&gt;&lt;a name="_ftn30"&gt;&lt;/a&gt; NJ Coulson, A History of Islamic Law 22 (1964)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p&gt;&lt;a name="_ftn31"&gt;&lt;/a&gt; Kamali, &lt;i&gt;s&lt;/i&gt;&lt;i&gt;upra &lt;/i&gt;note 27, at 19.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p&gt;&lt;a name="_ftn32"&gt;&lt;/a&gt; &lt;i&gt;Sunan Ibn Majah&lt;/i&gt; , Book of Tribulations (Kitab al-Fitan) , #3950, available at http://sunnah.com/ibnmajah/36.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p&gt;&lt;a name="_ftn33"&gt;&lt;/a&gt; Mohsen Kadivar, &lt;i&gt;An Introduction to the Private and Public Debate in Islam, &lt;/i&gt;Vol.70 , No. 3 Social Research 659, 663 (2003).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p&gt;&lt;a name="_ftn34"&gt;&lt;/a&gt; Lara Aryani, &lt;i&gt;Privacy Rights in Shariah and Shariah-based States, &lt;/i&gt;Vol. 3, Iss.2, Journal of Islamic State Practices in International Law, 3 			(2007)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p&gt;&lt;a name="_ftn35"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p&gt;&lt;a name="_ftn36"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 665.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p&gt;&lt;a name="_ftn37"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; at 667. Referencing Koleini, Mohammad. Al-Kaafi. Qom, Vol. 2: 353 1388.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p&gt;&lt;a name="_ftn38"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 671.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p&gt;&lt;a name="_ftn39"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p&gt;&lt;a name="_ftn40"&gt;&lt;/a&gt; &lt;i&gt;Social Contract Theory of John Locke(1932-1704) in the Contemporary World&lt;/i&gt; , SelectedWorks of Daudi Mwita, Nyamaka (2011) Available at http://works.bepress.com/cgi/viewcontent.cgi?article=1009&amp;amp;context=dmnyamaka.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p&gt;&lt;a name="_ftn41"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn42"&gt;
&lt;p&gt;&lt;a name="_ftn42"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 673.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn43"&gt;
&lt;p&gt;&lt;a name="_ftn43"&gt;&lt;/a&gt; Abul a'la Mawdudi, Human Rights in Islam 24 (1995). Also available online, at 			http://books.google.co.in/books?id=RUJWdCOmmxoC&amp;amp;printsec=frontcover#v=onepage&amp;amp;q&amp;amp;f=false.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn44"&gt;
&lt;p&gt;&lt;a name="_ftn44"&gt;&lt;/a&gt; Aryani, &lt;i&gt;supra &lt;/i&gt;note 34, at 13.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn45"&gt;
&lt;p&gt;&lt;a name="_ftn45"&gt;&lt;/a&gt; This indicates Sura 24 : verse 58.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn46"&gt;
&lt;p&gt;&lt;a name="_ftn46"&gt;&lt;/a&gt; Holy Quran, 24:58 - O you who have believed, let those whom your right hands possess and those who have not [yet] reached puberty among you ask 			permission of you [before entering] at three times: before the dawn prayer and when you put aside your clothing [for rest] at noon and after the 			night prayer. [These are] three times of privacy for you. There is no blame upon you nor upon them beyond these [periods], for they continually 			circulate among you - some of you, among others. Thus does Allah make clear to you the verses; and Allah is Knowing and Wise. (Translation from 			Sahih International available at http://quran.com/24/58)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn47"&gt;
&lt;p&gt;&lt;a name="_ftn47"&gt;&lt;/a&gt; Reza Sadiq, &lt;i&gt;Islam's Fourth Amendment : Search and Seizure in Islamic Doctrine and Muslim Practice, &lt;/i&gt;Vol. 40 Georgetown Journal of 			International Law 703, 730 (2008 - 2009).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn48"&gt;
&lt;p&gt;&lt;a name="_ftn48"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 733. Referencing IBRAHIM ABDULLA&lt;b&gt; &lt;/b&gt;AL-MARZOUQI, Human Rights in Islamic Law 392 (2000).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn49"&gt;
&lt;p&gt;&lt;a name="_ftn49"&gt;&lt;/a&gt; Rohen Peterson, &lt;i&gt;The Emperor's New Scanner :Muslim Women at the Intersection of the First Amendment and Full Body Scanners, &lt;/i&gt;22 Hastings 			Women's Law Journal 339, 343 (2011).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn50"&gt;
&lt;p&gt;&lt;a name="_ftn50"&gt;&lt;/a&gt; Holy Quran, 24:30 - Tell the believing men to reduce [some] of their vision and guard their private parts. That is purer for them. Indeed, Allah is 			Acquainted with what they do. (Translation from Sahih International available at http://quran.com/24/30-31).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn51"&gt;
&lt;p&gt;&lt;a name="_ftn51"&gt;&lt;/a&gt; Holy Quran, 24:31- And tell the believing women to reduce [some] of their vision and guard their private parts and not expose their adornment 			except that which [necessarily] appears thereof and to wrap [a portion of] their headcovers over their chests and not expose their adornment except 			to their husbands, their fathers, their husbands' fathers, their sons, their husbands' sons, their brothers, their brothers' sons, their sisters' 			sons, their women, that which their right hands possess, or those male attendants having no physical desire, or children who are not yet aware of 			the private aspects of women. And let them not stamp their feet to make known what they conceal of their adornment. And turn to Allah in 			repentance, all of you, O believers, that you might succeed. (Translation from Sahih Internation, available at http://quran.com/24/30-31).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn52"&gt;
&lt;p&gt;&lt;a name="_ftn52"&gt;&lt;/a&gt; David Garner&lt;i&gt;, &lt;/i&gt;&lt;i&gt;Muslims warned not to go through airport body scanners because they violate Islamic rules on nudity&lt;/i&gt;, The daily 			mail, (Feb 12, 2010). 			&lt;a href="http://www.dailymail.co.uk/news/article-1250616/Muslims-warned-airport-body-scanners-violate-Islamic-rules-nudity.html#ixzz3KF8hS6q3"&gt; http://www.dailymail.co.uk/news/article-1250616/Muslims-warned-airport-body-scanners-violate-Islamic-rules-nudity.html#ixzz3KF8hS6q3 &lt;/a&gt; .&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn53"&gt;
&lt;p&gt;&lt;a name="_ftn53"&gt;&lt;/a&gt; Holy Quran, 33:59 - O Prophet, tell your wives and your daughters and the women of the believers to bring down over themselves [part] of their 			outer garments. That is more suitable that they will be known and not be abused. And ever is Allah Forgiving and Merciful. (Translation from Sahih 			International, available at http://quran.com/33/59.)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn54"&gt;
&lt;p&gt;&lt;a name="_ftn54"&gt;&lt;/a&gt; Eli Alshech,			&lt;i&gt;"Do Not Enter Houses Other than Your Own": The Evolution of the Notion of a Private Domestic Sphere in Early Sunnī Islamic Thought&lt;/i&gt; Vol. 11, No. 3, Islamic Law and Society 291, 304 (2004).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn55"&gt;
&lt;p&gt;&lt;a name="_ftn55"&gt;&lt;/a&gt; Holy Quran, 49:12 - O you who have believed, avoid much [negative] assumption. Indeed, some assumption is sin. And do not spy or backbite each 			other. Would one of you like to eat the flesh of his brother when dead? You would detest it. And fear Allah ; indeed, Allah is Accepting of 			repentance and Merciful. ( Translation from Sahih International, available at http://quran.com/49/12)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn56"&gt;
&lt;p&gt;&lt;a name="_ftn56"&gt;&lt;/a&gt; Holy Quran, 24:19 - Indeed, those who like that immorality should be spread [or publicized] among those who have believed will have a painful 			punishment in this world and the Hereafter. And Allah knows and you do not know. ( Translation from Sahih International, available at 			http://quran.com/24/19)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn57"&gt;
&lt;p&gt;&lt;a name="_ftn57"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 666.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn58"&gt;
&lt;p&gt;&lt;a name="_ftn58"&gt;&lt;/a&gt; Ahmad Atif Ahmad, Islam Modernity violence and everyday life 176 (1&lt;sup&gt;st&lt;/sup&gt; ed. 2009)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn59"&gt;
&lt;p&gt;&lt;a name="_ftn59"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra &lt;/i&gt;note 33, at 667.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn60"&gt;
&lt;p&gt;&lt;a name="_ftn60"&gt;&lt;/a&gt; &lt;i&gt; &lt;/i&gt; &lt;i&gt;Ibid&lt;/i&gt; , at 178.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn61"&gt;
&lt;p&gt;&lt;a name="_ftn61"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn62"&gt;
&lt;p&gt;&lt;a name="_ftn62"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra &lt;/i&gt;note 54, at 291.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn63"&gt;
&lt;p&gt;&lt;a name="_ftn63"&gt;&lt;/a&gt; Holy Quran, 24:27-8 - O you who have believed, do not enter houses other than your own houses until you ascertain welcome and greet their 			inhabitants. That is best for you; perhaps you will be reminded. And if you do not find anyone therein, do not enter them until permission has been 			given you. And if it is said to you, "Go back," then go back; it is purer for you. And Allah is Knowing of what you do. ( Translation from Sahih 			International, available at http://quran.com/24)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn64"&gt;
&lt;p&gt;&lt;a name="_ftn64"&gt;&lt;/a&gt; Holy Quran, 2:189 - They ask you, [O Muhammad], about the new moons. Say, "They are measurements of time for the people and for Hajj." And it is 			not righteousness to enter houses from the back, but righteousness is [in] one who fears Allah. And enter houses from their doors. And fear Allah 			that you may succeed. (Translation from Sahih International, available at http://quran.com/2)&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn65"&gt;
&lt;p&gt;&lt;a name="_ftn65"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra &lt;/i&gt;note 54, at 308.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn66"&gt;
&lt;p&gt;&lt;a name="_ftn66"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; at 306. Referencing Ibn Abi Hatim, 8&lt;b&gt; &lt;/b&gt;TAF5IRAL-QUR'ANAL-'ADHIM &lt;i&gt;2566 &lt;/i&gt;(Makiabat Nlilr Mustaffi 1999).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn67"&gt;
&lt;p&gt;&lt;a name="_ftn67"&gt;&lt;/a&gt; Ahmad, &lt;i&gt;supra &lt;/i&gt;note 58, at 177.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn68"&gt;
&lt;p&gt;&lt;a name="_ftn68"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra note &lt;/i&gt;54&lt;i&gt;, at 324.&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn69"&gt;
&lt;p&gt;&lt;a name="_ftn69"&gt;&lt;/a&gt; Aryani, supra note 34, at 4. Also see Ahmad, &lt;i&gt;supra &lt;/i&gt;note 24, at 178.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn70"&gt;
&lt;p&gt;&lt;a name="_ftn70"&gt;&lt;/a&gt; Alshech, &lt;i&gt;supra note &lt;/i&gt;54&lt;i&gt;, &lt;/i&gt;at 310.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn71"&gt;
&lt;p&gt;&lt;a name="_ftn71"&gt;&lt;/a&gt; Kadivar, &lt;i&gt;supra&lt;/i&gt; note 33, at 664.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn72"&gt;
&lt;p&gt;&lt;a name="_ftn72"&gt;&lt;/a&gt; Moeen Cheema, &lt;i&gt;Beyond Beliefs: Deconstructing the Dominant Narratives of the Islamization of Pakistan's Law, &lt;/i&gt;60 American Journal of 			Comparative Law 875 (2012).&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn73"&gt;
&lt;p&gt;&lt;a name="_ftn73"&gt;&lt;/a&gt; The Constitution of the Islamic Republic of Pakistan, 1973. Available at http://www.na.gov.pk/publications/constitution.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn74"&gt;
&lt;p&gt;&lt;a name="_ftn74"&gt;&lt;/a&gt; Cheema, &lt;i&gt;supra &lt;/i&gt;note 72, at 879.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn75"&gt;
&lt;p&gt;&lt;a name="_ftn75"&gt;&lt;/a&gt; The Constitution of the Islamic Republic of Pakistan, 1973, &lt;i&gt;supra &lt;/i&gt;note 73&lt;i&gt;.&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn76"&gt;
&lt;p&gt;&lt;a name="_ftn76"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn77"&gt;
&lt;p&gt;&lt;a name="_ftn77"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Article 8 - "(1) Any law, or any custom or usage having the force of law, in so far as it is inconsistent with the rights conferred by this 			Chapter, shall, to the extent of such inconsistency, be void. (2) The State shall not make any law which takes away or abridges the right so 			conferred and any law made in contravention of this clause shall, to the extent of such contravention, be void&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn78"&gt;
&lt;p&gt;&lt;a name="_ftn78"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Article 4(2)(a) - "no action detrimental to the life, liberty, body, reputation or property of any person shall be taken except in accordance with 			law."&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn79"&gt;
&lt;p&gt;&lt;a name="_ftn79"&gt;&lt;/a&gt; Section 509, Pakistan Penal Code (Act XLV of 1860), Available at http://www.oecd.org/site/adboecdanti-corruptioninitiative/46816797.pdf.&lt;i&gt;&lt;/i&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn80"&gt;
&lt;p&gt;&lt;a name="_ftn80"&gt;&lt;/a&gt; Section 32, Pakistan Telecommunication (Re-Organisation) Act, 1996. Available at http://www.pta.gov.pk/media/pta_act_140508.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn81"&gt;
&lt;p&gt;&lt;a name="_ftn81"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Section 54.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn82"&gt;
&lt;p&gt;&lt;a name="_ftn82"&gt;&lt;/a&gt; Section 25-D, Pakistan Telegraph Act, 1885. Available at http://www.fia.gov.pk/law/Offences/26.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn83"&gt;
&lt;p&gt;&lt;a name="_ftn83"&gt;&lt;/a&gt; Section 12, Pakistan Medical and Dental Council Code of Ethics. Available at 			http://www.pmdc.org.pk/LinkClick.aspx?fileticket=v5WmQYMvhz4%3D&amp;amp;tabid=292&amp;amp;mid=845.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn84"&gt;
&lt;p&gt;&lt;a name="_ftn84"&gt;&lt;/a&gt; http://www.sbp.org.pk/publications/prudential/ordinance_62.pdf&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn85"&gt;
&lt;p&gt;&lt;a name="_ftn85"&gt;&lt;/a&gt; Section 8, Freedom of Information Ordinance, 2002. Available at 			http://infopak.gov.pk/Downloads/Ordenances/Freedom_of_%20Information_Ordinance2002.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn86"&gt;
&lt;p&gt;&lt;a name="_ftn86"&gt;&lt;/a&gt; Pakistan IT Policy and Action Plan, available at http://www.unapcict.org/ecohub/resources/pakistan-information-technology-policy.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn87"&gt;
&lt;p&gt;&lt;a name="_ftn87"&gt;&lt;/a&gt; Electronic Transactions Ordinance, available at http://www.pakistanlaw.com/eto.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn88"&gt;
&lt;p&gt;&lt;a name="_ftn88"&gt;&lt;/a&gt; For a more detailed account, see			&lt;a href="http://www.supremecourt.gov.pk/ijc/articles/10/1.pdf"&gt;http://www.supremecourt.gov.pk/ijc/articles/10/1.pdf&lt;/a&gt;. Second draft available at 			http://media.mofo.com/docs/mofoprivacy/PAKISTAN%20Draft%20Law%202nd%20Revision%20.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn89"&gt;
&lt;p&gt;&lt;a name="_ftn89"&gt;&lt;/a&gt; Sections 441 - 462, Pakistan Penal Code (XLV of 1860) Chapter XVII, "Offences against Property".&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn90"&gt;
&lt;p&gt;&lt;a name="_ftn90"&gt;&lt;/a&gt; Section 5, Anti Terrorism Act, 1997. Available at http://www.fia.gov.pk/law/ata1997.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn91"&gt;
&lt;p&gt;&lt;a name="_ftn91"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Section 10.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn92"&gt;
&lt;p&gt;&lt;a name="_ftn92"&gt;&lt;/a&gt; Lara Aryani, &lt;i&gt;supra&lt;/i&gt; note 34, at 21.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn93"&gt;
&lt;p&gt;&lt;a name="_ftn93"&gt;&lt;/a&gt; Julhas Alam, &lt;i&gt;Bangladesh moves to retain Islam as state religion, &lt;/i&gt;Cns News, 			http://cnsnews.com/news/article/bangladesh-moves-retain-islam-state-religion.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn94"&gt;
&lt;p&gt;&lt;a name="_ftn94"&gt;&lt;/a&gt; Article 43, Constitution of Bangladesh. Available at http://www1.umn.edu/humanrts/research/bangladesh-constitution.pdf.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn95"&gt;
&lt;p&gt;&lt;a name="_ftn95"&gt;&lt;/a&gt; Section 509, Bangladesh Penal Code,1860. Available at http://bdlaws.minlaw.gov.bd/print_sections_all.php?id=11.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn96"&gt;
&lt;p&gt;&lt;a name="_ftn96"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Sections 351- 358.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn97"&gt;
&lt;p&gt;&lt;a name="_ftn97"&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; . Section 100.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn98"&gt;
&lt;p&gt;&lt;a name="_ftn98"&gt;&lt;/a&gt; Section 5, Bangladesh Telegraph Act, 1885. Available at http://bdlaws.minlaw.gov.bd/print_sections_all.php?id=55.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn99"&gt;
&lt;p&gt;&lt;a name="_ftn99"&gt;&lt;/a&gt; &lt;i&gt;Ibid&lt;/i&gt; . Section 24.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn100"&gt;
&lt;p&gt;&lt;a name="_ftn100"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Section 25.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn101"&gt;
&lt;p&gt;&lt;a name="_ftn101"&gt;&lt;/a&gt; &lt;i&gt; &lt;/i&gt; Bangladesh Penal Code, 1860. &lt;i&gt;supra &lt;/i&gt;note 95&lt;i&gt;. &lt;/i&gt;Section 441.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn102"&gt;
&lt;p&gt;&lt;a name="_ftn102"&gt;&lt;/a&gt; &lt;i&gt;Ibid. &lt;/i&gt; Section 442.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn103"&gt;
&lt;p&gt;&lt;a name="_ftn103"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Section 443.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn104"&gt;
&lt;p&gt;&lt;a name="_ftn104"&gt;&lt;/a&gt; &lt;i&gt;Ibid.&lt;/i&gt; Section 445.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn105"&gt;
&lt;p&gt;&lt;a name="_ftn105"&gt;&lt;/a&gt; See, Kharak Singh v. State of Uttar Pradesh, AIR 1963 SC 1295 : (1964) 1 SCR 332; Govind v. State of Madhya Pradesh, AIR 1975 SC 1378; Rajagopal v. 			State of Tamil Nadu, AIR 1995 SC 264; People's Union for Civil Liberties (PUCL) v. Union of India, AIR 1997 SC 568; X v. Hospital Z, AIR 1999 SC 			495.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn106"&gt;
&lt;p&gt;&lt;a name="_ftn106"&gt;&lt;/a&gt; DoPT, Approach Paper. &lt;i&gt;supra&lt;/i&gt; note 16.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law'&gt;https://cis-india.org/internet-governance/blog/identifying-aspects-of-privacy-in-islamic-law&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Vidushi Marda and Bhairav Acharya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-01-01T14:04:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables">
    <title>Introduction: About the Privacy and Surveillance Roundtables </title>
    <link>https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables</link>
    <description>
        &lt;b&gt;The Privacy and Surveillance Roundtables is a Centre for Internet and Society (CIS) initiative, in partnership with the Cellular Operators Association of India (COAI), as well as local partners. The Roundtable will be closed-door deliberation involving multiple stakeholders. Through the course of these discussions we aim to deliberate upon the current legal framework for surveillance in India, and discuss possible frameworks for surveillance in India.&lt;/b&gt;
        &lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The provisions of the draft CIS 	Privacy Bill 2013, the International Principles on the Application of Human Rights to Communication Surveillance, and the Report of the Group of Experts on 	Privacy will be used as background material and entry points into the discussion. The recommendations and dialogue from each roundtable will be compiled 	and submitted to the Department of Personnel and training.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy and Surveillance Roundtable was held in New Delhi at the India International Centre by the Centre for Internet and Society in 	collaboration with the Cellular Operators Association of India and Vahura, legal Partner on the 1&lt;sup&gt;st&lt;/sup&gt; of September, 2014.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The aim of the discussion was to gain inputs on what would constitute an ideal surveillance regime in India working with the&lt;a href="http://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf"&gt;CIS Draft Privacy Protection Bill&lt;/a&gt;, the	&lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt; prepared by the Justice Shah committee, and the	&lt;a href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt;.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Background and Context: Privacy and Surveillance in India&lt;/h3&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;p style="text-align: justify; "&gt;The discussion began with the chair giving an overview of the legal framework that governs communications interception under Indian Law in the interest of 	the participants since many were there for the first time.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The legal system to govern the manner in which communications are intercepted in India are defined under three main acts&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Interception of Telephonic Calls : The Telegraph Act 1885&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. Interception of Posts : The Indian Post Office Act,1898&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. Interception of Electronic communication like e-mails etc :The IT Act, 2000&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While the interception of postal mail is governed by Section 26 of the Post Office Act, 1898, the interception of modern forms of communication that use 	electronic information and traffic data are governed under Sections 69 and 69B of the Information Technology Act, 2000, while interception of telephonic 	conversations are governed by section 5(2) of the Indian Telegraph Act 1885 and subsequent rules under section 419A.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The main discussion of the meeting revolved around the Telegraph Act since it is the main Act which covers the interception of telecommunications. In 1968 	the 30th Law Commission Report studying Section 5(2) of this Act came to the conclusion that the standards in the Act may be unconstitutional given factors 	such as 'public emergency' &amp;amp; 'public safety' were too wide in nature and called for a relook at the provision.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Objective of Round Table Meetings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The objective of the round table meetings is to, be prepared with the proposals on the Privacy Bill which the new government intends to split into separate 	Bill for Surveillance and Data privacy. Thus these submissions once out in the public domain would further deliberate more discussion and shape the course 	of the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Discussion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Authorisation &lt;/b&gt;&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;&lt;/h1&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The chair initiated the&lt;b&gt; &lt;/b&gt;discussion continuing from the last meeting about the two models of authorisation for Interception 1. The 	Judiciary &amp;amp; 2. The Executive&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The chair explained why the earlier proposed Judiciary based model, based on the efficient experience of separation of power, would not fit into the Indian 	context. The main reason for this being that the lower judiciary in India is not competent enough to take decisions of this nature. Providing examples, the 	chair explained how in many cases the lower Judiciary overlooks essential human rights in their decisions, and such rights are only addressed when the case 	is appealed in Higher courts. While participants felt that High Court judges would be favourable, it was expressed that the immense backlog at the High 	Court level and the lack of judges is a challenge and risks being inefficient. Thus an additional responsibility for the High Court would not be a feasible 	model. Furthermore, adopting a judicial based model would mean that the existing model of executive would need to be entirely replaced. Owing to these 	practical implementation issues consensus was built over adoption of the existing executive model, but with more safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Safeguards proposed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. &lt;i&gt;A redressal tribunal:&lt;/i&gt; Establishing a tribunal for the redressal of interception complaints. The tribunal could be a non-active body. Such a 	model would be different from other models adopted around the world - for example e in UK a designated tribunal suo-motu reviews cases on a regular basis. 	The tribunal could also have judicial review authority, to which one of the participants raised an issue that the tribunals usually will not have the power 	of Judicial review, however the chair assured him that the delegation of Judicial review to a tribunal does exist in Indian law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. &lt;i&gt;A review commission:&lt;/i&gt; Establishing a commission to review the interceptions carried out on the orders of home secretary. For such an overseeing 	body, the commissioner should be appointed independently. The commissioner must be a Judge or a senior Lawyer and should report to the Parliament.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Content data and Metadata&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In the next session the chair explained the difference between content data and metadata while initiating discussion on provisions addressing them in the 	proposed Bill. Content data, also called as payload data, is the actual content of the communication which takes place between X and Y.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Example 1:&lt;/i&gt; In the VOIP call the voice is packetized and sent in different packets to the destination, the content of that packet is the content data whereas the 	information of this content i.e the header, footer and checksum of the packet is the metadata.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Example 2:&lt;/i&gt; In the serial communication of the normal phone call the content data will be what the communication happened between two or more people over the call and 	the metadata will be who were involved in the call, on what date and time the call was made from which place, and under which tower.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was noted that generally it is easier to intercept metadata than content data. In the proposed bill, section 2 (C) refers to the definition of content 	data and section 2(E) to metadata.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participants also pointed out that often it is with metadata that concerned governmental authorities are able to carry out tracking. Thus, when determining 	procedural safeguards for surveillance - and specifically for interception - the question of whether or not content data and meta data should be treated 	the same under law must be addressed. Participants suggested looking into German laws, which have procedure to deal with this question. Despite differences 	over the exact level of protection meta data should legally be afforded, participants agreed that a higher authority should be responsible for the 	interception, collection, and access to metadata and content data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In India, because the existing legal framework in India has different standards for different modes of communication, it is proposed that a uniform legal 	framework be created by harmonizing the three Acts through amendments or overriding existing legislation regulating surveillance in India, and establishing 	a new framework under a Privacy legislation.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Big Data, Cloud &amp;amp; OTT&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In this session a participant raised the issue of Big data and Cloud services, and asked whether the CIS Privacy Protection Bill or the draft Privacy Bill 	from the government addresses this issue. This question was of particular relevance because a number of the cloud data centres are located in locations 	outside India. Thus a question of jurisdiction arises. The participant opined that in the coming years and with the new government's vision to have space 	for every citizen in cloud and data localisation being priority, he stressed that the Bill should clearly address issues related to the cloud, big data, 	outsourcing, and questions of jurisdiction. Responding to this the chair was of the view that the crimes committed outside the territory of India come 	under Extra-territorial law, section 4 of IPC and Section 188 Cr. P.C. But it was noted that due to the fact that the crime is committed outside the 	territory of India, despite the provision, it is practically not implementable unless there is a contract between countries or a treaty signed. The 	solution could be data localisation, hosting the cloud servers in India, but that again has its own pros &amp;amp; cons. In response participants indicated 	that if a choice had to be made about data localization - the best option would be one that would be economical for Indian business and the government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;OTT (Over the Top) Services &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another participant brought to the notice of the meeting that most of the networks of service provider's are adopting IP (Internet Protocol). In the 	context of surveillance, this means that for an interception to take place, Deep Packet Inspection (DPI) must be adopted by service providers. This is 	currently placing a burden on service providers, as it is costly and the connection time of the calls for the number under surveillance increases - though 	not enough to be noticed by customers.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Telephone Tapping Process&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;In India the process of intercepting telephones can be broken down into the following three steps:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Authorization&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. The Home Secretary issues an authorization for an interception request.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. The Authorization is handed over to Police Officer in charge of the investigation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. The Police Officer serves the order to the nodal officer in the relevant service provider.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. The service provider conducts the interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. The intercepted data is handed over to the Police officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Rule 419A, a committee to review the authorization exists, comprising of officials such as the Cabinet Secretary, Secretary of the Department of 	Telecommunications, Secretary of the Department of Law and Justice and the Secretary of Information Technology and Communication ministry at the Centre and 	the Chief Secretary, the Law Secretary and an officer not below the rank of a Principal secretary at the State level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the current infrastructure of telecom and broadband is with private service providers, the government is dependent on service providers to carry out 	surveillance. As national security is a concern of the government and because in the past intercepted material has been leaked by various sources, the 	government has proposed to replace the existing system. In this regard the government has proposed to set up a Central Monitoring System (CMS) for the 	interception of voice and data communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is proposed that the CMS infrastructure will be positioned at the service provider's facilities, and will allow governmental agencies to directly 	intercept traffic on the network of service providers - thus there would no longer be a need for the government to reply on service providers to carry out 	interception requests. During the meeting it was discussed how this system has pros &amp;amp; cons&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Pros&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. For private companies it eliminates an entire level of compliance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. It will reduce the possibility of unlawful, extra legal, &amp;amp; fraudulent authorizations of interception requests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3. The interception carried out would be maintained in a log, which would clearly recorded, making the interception process becomes accountable.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Cons&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1. Even though the existing system gives room for leaks, ironically it is the only way through which a person who is tapped will come to know, hence 	accounting for some transparency eg: &lt;i&gt;Nira Radia&lt;/i&gt; &amp;amp; &lt;i&gt;Amar Singh&lt;/i&gt; phone Tap case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2. CMS will be built upon an existing interception framework, which is not procedurally fair - because of issues such as Internal Authorization, Adhoc 	procedure, that it is not under the ambit of RTI etc. This will result in a system with no transparency and accountability.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To this last point the Chair noted that in 2011 there were 7.5 Lakh phone taps by a single agency which was reportedly illegal. In an attempt to minimize 	such brazen violations a Privacy Bill is mooted and the round table conference is a step towards making it possible.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Immunity to TSP's &amp;amp; ISP's&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Participants also raised the issue of difficulties that TSPs face while engaged in the process of interception, as they are caught between the customers 	and government authorities and subjected to harassment sometimes. This places service providers in a position where they must often make a number of 	compromises as they are expected to store traffic data for a specified period of time, but sometimes a judge might ask for access to data that is dated 	past the specific retention period. In such a scenario, service providers must provide it by accessing backup data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question of who should be the custodian of intercepted data was raised by participants as well as who should be held accountable if intercepted data is 	leaked into the public domain. The chair responded that the officers investigating the case should be held accountable for the intercepted data. This would 	be analogous to the system under the Right to Information Act whereby the Information officer is named and held accountable for the data or information he 	provides. Similarly, for the case of intercepted material, an officer should be named and held accountable for the data and ensuring that it reaches those 	that it is legally intended to.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was also expressed that a market regulator, responsible for the safeguarding the interest of communication service providers, could be appointed for 	handling the personal data. Such a role could be merged with the traditional role of a Data Protection Authority and could be the first step towards an 	information security and assurance regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Legal immunity given to service providers was also discussed, as there was a general concern about the position service providers find themselves in - 	being held legally liable for not complying with orders from the government and being taken to court by citizens.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Format of Interception Orders and Interception as a service&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;A question was also posed to participants about what information ideally - apart from the intended duration of the order - should be incorporated into 	interception orders. Participants suggested that the order should be as specific and precise as possible, which the existing format to a large extent 	confirms. On the topic, a participant noted that in some cases, despite DoPT guidelines, interception orders are issued in regional languages. This can 	pose as a problem as the nodal officer might not know the language, thus leading to possible ambiguity &amp;amp; misinterpretation of the order. Participants 	suggested that orders should be in English.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participants also pointed out that in most European countries - like France and Italy - a fee for the compliance cost arising out of implementing an 	interception order is paid to service providers by the government. In India, huge costs are involved in carrying out interceptions which service providers 	presently have to bare. As law enforcement and security agencies ask for more and more accuracy in surveillance, the charges of carrying out surveillance. 	To address this, participants suggested that interception as a service should be accommodated in the proposed Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The discussions in the Surveillance and Privacy Roundtable in New Delhi mainly revolved around the authorization model and the process of interception. 	Overall, participants agreed on an organised executive model with an established accountability and review system. Also discussed was how to ensure that 	service providers are legally protected from disproportionate and unwarranted penalties. Towards this, the interception process should be viewed as a 	service rather than an obligation.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables'&gt;https://cis-india.org/internet-governance/blog/introduction-about-the-privacy-and-surveillance-roundtables&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>manoj</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-27T13:34:56Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/iocose-talk-at-cis">
    <title>IOCOSE's talk at CIS</title>
    <link>https://cis-india.org/internet-governance/events/iocose-talk-at-cis</link>
    <description>
        &lt;b&gt;Please join us at the Centre for Internet and Society in Bangalore on Thursday, November 27, 2014 at 7 p.m. for a presentation of the work of the artists group IOCOSE, current artists in residence at T.A.J./SKE Residency. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;What is the life of a drone 'in times of peace'? What are the creative potential of a drone? Drones do not have such a thing as a ‘life’. But what if?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The title of our project, 'In Times of Peace' refers to Paul Virilio's theory of logistics (Pure War, 1983).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Quoting an article published by the Pentagon in late '40s, the theorist highlighted the fact that the text presented logistics as the procedure for which the potential of a nation lies in its armed forces, 'in times of peace' as in times of war.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But what does it mean to live 'in times of peace'? And what does this mean for a drone?”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The talk will open with the announcement of the winner of the NoTube Contest 2014 which will be held at the Sree Venkateshwara Cyber Cafe in Bangalore on the very same day.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;IOCOSE&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;IOCOSE is a collective of four artists who has been working in Italy and Europe since 2006. It organises actions in order to subvert ideologies, practices and processes of identification and production of meanings. It uses pranks and hoaxes as tactical means, as joyful and sound tools. IOCOSE thinks about the streets, internet and word of mouth as a battlefield. Tactics such as mimesis and trickery are used to lead and delude the audience into a semantic pitfall. IOCOSE’s work has been shown internationally, such as at Jeu de Paume (Paris, France; 2011); Tate Modern (London, UK; 2011), Festival Nrmal, (Monterrey, Mexico; 2011); Furtherfield Gallery (London, UK; 2012); Venice Biennal (Italy; 2011), Macro (Rome, Italy; 2012); CLICK Festival (Helsingor, Denmark; 2013); Science gallery (Dublin, Ireland, 2012), &lt;a class="external-link" href="http://www.iocose.org"&gt;http://www.iocose.org &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;T.A.J. RESIDENCY &amp;amp; SKE PROJECTS&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;T.A.J. RESIDENCY &amp;amp; SKE PROJECTS is a residency program established in 2013 as a collaborative project between a visual artist and a gallerist. Intended as an interdisciplinary residency, it has already hosted visual artists, curators, academics, scientists, fiction writers and journalists. There is always one visual artist in residence. The residency program is also open to applicants from the fields of architecture, design, music, film, performing arts and education, &lt;a class="external-link" href="http://t-a-j.in"&gt;http://t-a-j.in &lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Marialaura Ghidini&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Marialaura is a curator, researcher and writer. She is the founder director of &lt;a href="http://www.or-bits.com" target="_blank"&gt; &lt;span style="text-decoration: underline;"&gt;or-bits.com&lt;/span&gt;&lt;/a&gt; since 2009. Currently she is AHRC-doctoral researcher with &lt;a href="http://www.crumbweb.org" target="_blank"&gt;&lt;span style="text-decoration: underline;"&gt;CRUMB (Curatorial Upstart Media Bliss)&lt;/span&gt;&lt;/a&gt; at the University of Sunderland.  Based in London, UK, from Brescia, Italy. She can be contacted at &lt;a class="mail-link" href="mailto:mlghidini@gmail.com"&gt;mlghidini@gmail.com&lt;/a&gt;&lt;/p&gt;
&lt;div class="locked object resizable text" id="index.head.134052969195" style="text-align: center; "&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/iocose-talk-at-cis'&gt;https://cis-india.org/internet-governance/events/iocose-talk-at-cis&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-25T01:02:24Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance">
    <title>Privacy, security and surveillance: tackling international dilemmas and dangers in the digital realm</title>
    <link>https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance</link>
    <description>
        &lt;b&gt;Pranesh Prakash was a panelist in the session "Beyond the familiar: how do other countries deal with security and surveillance oversight?" The event was organized by Wilton Park between November 17 and 19, 2014.&lt;/b&gt;
        &lt;p&gt;Complete details of the programme can be &lt;a class="external-link" href="https://www.wiltonpark.org.uk/wp-content/uploads/WP1361-programme.pdf"&gt;accessed here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance'&gt;https://cis-india.org/internet-governance/news/wilton-park-november-17-19-privacy-security-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-15T12:56:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/openness/blog-old/privacy-v-transparency">
    <title>Privacy vs. Transparency: An Attempt at Resolving the Dichotomy</title>
    <link>https://cis-india.org/openness/blog-old/privacy-v-transparency</link>
    <description>
        &lt;b&gt;The right to privacy has been articulated in international law and in some national laws. In a few countries where the constitution does not explicitly guarantee such a right, courts have read the right to privacy into other rights (e.g., the right to life, the right to equal treatment under law and also the right to freedom of speech and expression).&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;With feedback and inputs from Sumandro Chattapadhyay, Elonnai Hickok, Bhairav Acharya and Geetha Hariharan&lt;/i&gt;. I would like to apologize for not providing proper citation to Julian Assange when the first version of this blog entry was published. I would also like to thank Micah Sifry for drawing this failure to his attention. The blog post originally published by Omidyar Network &lt;a class="external-link" href="http://www.openup2014.org/privacy-vs-transparency-attempt-resolving-dichotomy/"&gt;can be read here&lt;/a&gt;. Also see &lt;a class="external-link" href="http://newint.org/features/2015/01/01/privacy-transparency/"&gt;http://newint.org/features/2015/01/01/privacy-transparency/&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In other countries where privacy is not yet an explicit or implicit  right, harm to the individual is mitigated using older confidentiality  or secrecy law. After the Snowden affair, the rise of social media and  the sharing economy, some corporations and governments would like us to  believe that “privacy is dead”. Privacy should not and cannot be dead,  because that would mean that security is also dead. This is indeed the  most dangerous consequence of total surveillance as it is technically  impossible to architect a secure information system without privacy as a  precondition. And conversely, it is impossible to guarantee privacy  without security as a precondition.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The right to transparency [also known as the right to information or  access to information] – while unavailable in international law – is  increasingly available in national law. Over the last twenty years this  right has become encoded in national laws – and across the world it is  being used to hold government accountable and to balance the power  asymmetry between states and citizens. Independent and autonomous  offices of transparency regulators have been established. Apart from  increasing government transparency, corporations are also increasingly  required to be transparent as part of generic or industry specific  regulation in the public interest. For instance, India’s Companies Act,  2013, requires greater transparency from the private sector. Other areas  of human endeavor such as science and development are also becoming  increasingly transparent though here it is still left up to  self-regulation and there isn’t as much established law. Within science  and research more generally, the rise of open data accompanied the  growth of the Open Access and citizen science movement.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;So the question before us is: Are these two rights – the right to  transparency and the right to privacy – compatible? Is it a zero-sum  game? Do we have to sacrifice one right to enforce the other?  Unfortunately, many privacy and transparency activists think this is the  case and this has resulted in some conflict. I suggest that these  rights are completely compatible when it comes to addressing the  question of power. These rights do not have to be balanced against one  another. There is no need to settle for a sub-optimal solution. &lt;b&gt;Rather this is an optimization problem and the solution is as follows: privacy protections must be inversely proportionate to power and as Julian Assange says transparency requirements should be directly proportionate to power.&lt;/b&gt;&lt;a href="#fn*" name="fr*"&gt;[*] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In most privacy laws, the public interest is an exception to privacy. If  public interest is being undermined, then an individual privacy can be  infringed upon by the state, by researchers, by the media, etc. And in  transparency law, privacy is the exception. If the privacy of an  individual can be infringed, transparency is not required unless it is  in the public interest. In other words, the “public interest” test  allows us to use privacy law and transparency law to address power  asymmetries rather than exacerbate them. What constitutes “public  interest” is of course left to courts, privacy regulators, and  transparency regulators to decide. Like privacy, there are many other  exceptions in any given transparency regime including confidentiality  and secrecy. Given uneven quality of case law there will be a temptation  by the corrupt to conflate exceptions. Here the old common-law  principle of “there is no confidence as to the disclosure of iniquity” –  which prevents confidentiality law from being used to cover malfeasance  or illegality – can be adopted in appropriate jurisdictions.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Around 10 years ago, the transparency movement gave birth to yet another  movement – the open government data movement. The tension between  privacy and transparency is most clearly seen in the open government  data movement. The open government data movement in some parts of the  world is dominated by ahistorical and apolitical technologists, and some  of them seem intent on reinventing the wheel. In India, ever since the  enactment of the Right to Information Act, 2003, 30 transparency  activists are either killed, beaten or criminally intimidated every  year. This is the statistic from media coverage alone. Many more  silently suffer. RTI or transparency is without a doubt one of the most  dangerous sectors within civil society that you could choose to work in.  In contrast, not a single open data activist has ever been killed,  beaten or criminally intimidated. I suspect this is because open data  activists do not sufficiently challenge power hierarchies. Let us look a  little bit closely at their work cycle. When a traditional transparency  activist asks a question, that is usually enough to get them into  trouble. When an open data activist publishes an answer [a dataset  nicely scrubbed and machine readable, or a visualization, or a tool]  they are often frustrated because nobody seems interested in using it.  Often even the activist is unclear what the question is. This is because  open data activist works where data is available. Open data activists  are obsessed with big datasets, which are easier to find at the bottom  of the pyramid. They contribute to growing surveillance practices [the  nexus between Internet giants, states, and the security establishment]  rather that focusing on sousveillance [citizen surveillance of the  state, also referred to as citizen undersight or inverse surveillance].  They seem to be obsessed only with tools and technologies, rather than  power asymmetries and injustices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, a case study to make my argument easier to understand – Aadhaar  or UID, India’s ambitious centralized biometric identity and  authentication management system. There are many serious issues with its  centralized topology, proprietary technology, and dependence on  biometrics as authentication factors – all of which I have written about  in the past. In this article, I will explain how my optimization  solution can be applied to the project to make it more effective in  addressing its primary problem statement that corruption is a necessary  outcome of power asymmetries in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its current avatar – the Aadhaar project hopes to assign  biometric-based identities to all citizens. The hope is that, by doing  authentication in the last mile, corruption within India’s massive  subsidy programmes will be reduced. This, in my view, might marginally  reduce retail corruption at the bottom of the pyramid. It will do  nothing to address wholesale corruption that occurs as subsidies travel  from the top to the bottom of the pyramid. I have advocated over the  last two years that we should abandon trying to issue biometric  identities to all citizens, thereby making them more transparent to the  state. Let us instead issue Aadhaar numbers to all politicians and  bureaucrats and instead make the state more transparent to citizens.  There is no public interest in reducing privacy for ordinary citizens –  the powerless – but there are definitely huge public interest benefits  to be secured by increasing transparency of politicians and bureaucrats,  who are the powerful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian government has recently introduced a biometric-based  attendance system for all bureaucrats and has created a portal that  allows Indian citizens to track if their bureaucrats are arriving late  or leaving early. This unfortunately is just bean counting [for being  corrupt and being punctual are not mutually exclusive] and public access  to the national portal was turned off because of legitimate protests  from some of the bureaucrats. What bureaucrats do in office, who they  meet, and which documents they process is more important than when they  arrive at or depart from work. The increased transparency or reduced  privacy was not contributing to the public interest.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead of first going after small-ticket corruption at the bottom of  the pyramid, maximization of public interest requires us to focus on the  top, for there is much greater ROI for the anti-corruption rupee. For  example: constructing a digital signature based on audit trails that  track all funds and subsidies as they move up and down the pyramid.  These audit trails must be made public so that ordinary villagers can be  supported by open data activists, journalists, social entrepreneurs,  and traditional civil society in verification and course correction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I hope open data activists, data scientists, and big data experts will  draw inspiration from the giants of the transparency movement in India. I  hope they will turn their attention to power, examine power asymmetries  and then ask how the Aadhaar project can be leveraged to make India  more rather than less equal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Videos&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;
&lt;p style="text-align: justify; "&gt;Open Up? 2014: Risky Business: Transparency, Technology, Security, and Human Rights&lt;/p&gt;
&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/tDf8TFjxqiQ" width="560"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;b&gt;Open Up? 2014: Data Collection and Sharing: Transparency and the Private Sector&lt;/b&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;iframe frameborder="0" height="315" src="http://www.youtube.com/embed/lPHWkYZjqzo" width="560"&gt;&lt;/iframe&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;The videos can also be watched on Vimeo:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a class="external-link" href="http://vimeo.com/111729069"&gt;Open Up? 2014: Risky Business: Transparency, Technology, Security, and Human Rights &lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://vimeo.com/111748146"&gt;Open Up? 2014: Data Collection and Sharing: Transparency and the Private Sector &lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt; 
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr*" name="fn*"&gt;*&lt;/a&gt;].&lt;a class="external-link" href="http://prospect.org/article/real-significance-wikileaks"&gt;http://prospect.org/article/real-significance-wikileaks&lt;/a&gt; “Transparency should be proportional to the power that one has.”&lt;/p&gt;
&lt;p&gt;Read the presentation on Risky Business: Transparency, Technology, Security and Privacy made at the Pecha Kucha session &lt;a href="https://cis-india.org/openness/blog-old/risky-business.odp" class="internal-link"&gt;here&lt;/a&gt;. (ODP File, 35 kb)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Disclaimer: The views, opinions, and positions expressed by             the author(s) of this blog are theirs alone, and do not             necessarily reflect the views, opinions, or positions of             Omidyar Network. We make no representations as to accuracy,             completeness, timeliness, suitability or validity of any             information presented by individual authors of the blogs and             will not be liable for any errors, omissions, or delays in             this information or any losses, injuries or damages arising             from its display or use.&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/openness/blog-old/privacy-v-transparency'&gt;https://cis-india.org/openness/blog-old/privacy-v-transparency&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>sunil</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Video</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    
    
        <dc:subject>Open Access</dc:subject>
    

   <dc:date>2015-03-08T06:26:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill">
    <title>Fourth Discussion Meeting of the Expert Committee to Discuss the Draft Human DNA Profiling Bill</title>
    <link>https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill</link>
    <description>
        &lt;b&gt;The fourth expert committee meeting was held on November 10, 2014 at the Department of Biotechnology to discuss the potential privacy concerns of the draft Human DNA Profiling Bill. Sunil Abraham however was unable to participate because of technical problems.&lt;/b&gt;
        &lt;h2&gt;Agenda&lt;/h2&gt;
&lt;ol&gt;
&lt;li&gt;Welcome and opening remarks by the Secretary, DBT &lt;/li&gt;
&lt;li&gt;Remarks by the Chairman - Dr. T.S. Rao, Senior Adviser, DBT &lt;/li&gt;
&lt;li&gt;A brief overview on deliberations and decisions of Hon’ble Supreme Court - Dr. Alka Sharma, Director, DBT &lt;/li&gt;
&lt;li&gt;Discussion and finalization of the Bill by the members&lt;/li&gt;
&lt;li&gt;Recommendations  of the Expert Committee&lt;/li&gt;
&lt;li&gt;Any other item with the permission of the Chairman.&lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt; &lt;/ol&gt; 
&lt;hr /&gt;
&lt;h3&gt;Resources&lt;/h3&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/dna-profiling-bill-meeting-documents.zip/view" class="external-link"&gt;Click here&lt;/a&gt; (Zip file, 2698 Kb) to download the following resources from earlier meetings:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Record note of discussions of the Expert Committee Meeting held on January 31, 2013 at DBT, New Delhi, to discuss the potential privacy concerns on draft Human DNA Profiling Bill.&lt;/li&gt;
&lt;li&gt;Annexure 1 to Record note: Draft Human DNA Profiling Bill 2012: The Privacy Issues and Concerns&lt;/li&gt;
&lt;li&gt;Annexure 2 to Record note: Short background note on the draft Human DNA Profiling Bill&lt;/li&gt;
&lt;li&gt;Record note of the 2nd discussion meeting of the Expert Committee held on May 13, 2013 in DBT to discuss the draft Human DNA Profiling Bill&lt;/li&gt;
&lt;li&gt;Minutes of the 3rd meeting of the Expert Committee held on November 25, 2013 in DBT to discuss the draft Human DNA Profiling Bill&lt;/li&gt;
&lt;li&gt;Record note of the discussions of the Experts Sub-committee Meeting on Human DNA Profiling Bill held on September 3, 2013 at CPFD, Hyderabad&lt;/li&gt;
&lt;li&gt;Affidavit on behalf of DBT&lt;/li&gt;
&lt;li&gt;Human Draft DNA Profiling Bill 2012 (Working Draft Version, April 29, 2012)&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill'&gt;https://cis-india.org/internet-governance/news/fourth-discussion-meeting-of-expert-committee-to-discuss-draft-human-dna-profiling-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-08T16:07:24Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
