<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 701 to 715.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/net-neutrality-and-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/data-guidance-march-3-2014-india-privacy-bill-will-likely-reflect-eu-directive"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/calcutta-hc-strengthens-whistle-blower-protection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-day-we-fight-back-against-mass-surveillance"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/business-bhutan-vol-5-issue-4-lucky-wangmo-pema-seldon-is-bhutan-selling-its-soul-to-google"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-hindu-january-29-2014-chinmayi-arun-making-the-powerful-accountable"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/data-privacy-day-chenna-2014"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/net-neutrality-and-privacy">
    <title>Net Neutrality and Privacy</title>
    <link>https://cis-india.org/internet-governance/blog/net-neutrality-and-privacy</link>
    <description>
        &lt;b&gt;The highly contentious and polarising debate on net-neutrality will have a large impact on shaping the future of the internet and ultimately on the users of the internet. One important issue which needs to be prioritized while debating the necessity or desirability of a legal regime which advocates net-neutrality is its implication on privacy.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The principle behind net-neutrality, simply put, is that the data being transmitted to and from the user should be treated equally, i.e. that data carriage, at the level of ISP’s, should be ‘dumb’. This would mean that internet service providers cannot discriminate between different data based on the content of the data. Without the principle of net-neutrality being followed, ISP’s would become the ‘internet gatekeepers’, choosing what data gets to reach the end-user and how. There are many arguments for favouring or disfavouring net-neutrality, however, advocates of privacy on the internet should be wary of the possible implications of endorsing a non-neutral internet and allowing greater network management by ISP’s. So, how does the net-neutrality debate affect privacy?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It all depends upon what kind of network management ISP’s employ. Deep Packet Inspection (DPI) is a method of data inspection which allows the network manager to scrutinize data at the application level, and in real time. As compared to shallow packet inspection, which identifies based on headers like IP addresses or protocols like TCP and UDP, which are analogous to envelopes on a letter, DPI would be akin to having access to the contents. DPI-based network management can identify the programs, software and applications being used, and what they are being used for in real time. Unlike any ordinary online service provider ISP’s are in the unique position of having comprehensive access to all of their customers’ data. Allowing DPI-based network management for prioritizing certain data or applications, an almost certain outcome if net-neutrality is weakened, would mean that ISP’s would be able to intercept and scrutinize any and all user data, which would reveal substantial information about the user, and would be a serious blow to privacy. While DPI can have several benefits in its application (such as finding and fighting malware or viruses), but where it is used, must be for a targeted and legitimate aim.&lt;i&gt; &lt;/i&gt;Even where DPI is not used, if network discrimination is allowed, based on a user-to-user basis it would require inspecting the IP addresses of the user, which can also be a problematic intrusion of privacy, especially since the ISP also has other data like addresses and names of users which it can use to identify them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Privacy may not necessarily be affected through non-neutral internet systems, but in all probability, with the growth of systems like the DPI and commercial incentives for “gatekeeper ISP’s” who are in a position to profit greatly from an ability to scrutinize and discriminate between data, it is likely that it will. In India, though government ISP’s like MTNL and BSNL deny using DPI,&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;it’s likely that it is still applied by others, and that the government is aware of this (http://www.theinquirer.net/inquirer/news/2161541/indian-isps-block-104-websites). Even as the TRAI advocates and supports net-neutrality, Indian ISP’s seem to be heading the other way.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;Before the trend becomes the norm, it’s high time for a comprehensive discussion about how policies should be framed for keeping the internet a more neutral, and more private, space.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;References&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Apar Gupta, &lt;i&gt;TRAI(ing) to keep it neutral&lt;/i&gt;, &lt;a href="http://www.iltb.net/2010/09/traiing-keep-it-neutral/"&gt;http://www.iltb.net/2010/09/traiing-keep-it-neutral/&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;For a lay discussion on Deep Packet Inspection and net-neutrality, visit &lt;a class="external-link" href="http://arstechnica.com/gadgets/2007/07/deep-packet-inspection-meets-net-neutrality/"&gt;http://arstechnica.com/gadgets/2007/07/deep-packet-inspection-meets-net-neutrality/&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/net-neutrality-and-privacy'&gt;https://cis-india.org/internet-governance/blog/net-neutrality-and-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-20T05:01:58Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring">
    <title>New Standard Operating Procedures for Lawful Interception and Monitoring</title>
    <link>https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring</link>
    <description>
        &lt;b&gt;Government issues new guidelines to TSP’s to assist Lawful Interception and Monitoring.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Even as the Central Government prepares the Central Monitoring System for the unrestricted monitoring of all personal communication, the Department of Telecom has issued new guidelines for Telecom Service Providers to assist in responding to requests for interception and monitoring of communications from security agencies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These guidelines do not appear to be publicly accessible, but according to news items, under the “Standard Operating Procedures for Lawful Interception and Monitoring of Telecom Service Providers”, the TSP’s must now provide for lawful interception and monitoring requests for voice calls, Short message Service (SMS), General Packet Radio Service (GPRS) and Value Added Service (VAS) including Multi Message Service (MMS), data and voice in 3G/4G/Long Term Evolution (LTE) including video call or Voice Over Internet protocol (VoIP). This move comes just days after the Home Ministry suggested that the Department of Telecom either change the rules under their Telecom Policies such as the Unified Access Service Licence (UASL) to include VoIP monitoring, or, drastically, block all VoIP services on the internet, which would include several communication applications including Skype and GTalk. (&lt;a class="external-link" href="http://articles.economictimes.indiatimes.com/2013-12-30/news/45711413_1_interception-solution-voip-indian-telegraph-act"&gt;See the article published by Economic Times&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The guidelines will supposedly also provide for some basic safeguards to ensure that non-authorized interception does not take place, such as ensuring that the interception is only to be provided by the Chief Nodal Officer of a TSP and only upon the issue of an order by the Home Secretary at the Central or State Government. Furthermore, these requests must only be in written, in untampered and sealed envelopes with no overwriting, etc. and bearing the order number issued by the concerned Secretary, with the date of the order. However, in exigent circumstances the order may be provided by email, provided that the physical copy is sent within two days of the order, else the interception order must be terminated. Inquiry processes are detailed under the new SOP’s which can verify whether the request was in original and addressed to the Nodal Officer and from which designated security agency it was issued, and can also verify the issue of an acknowledgment of compliance of the order by the TSP within two days of its receipt. The new guidelines also clarify the issue of interception of roaming subscribers by the State Government where the subscriber is registered. According to the guidelines, an order by the government of the state where such a caller has registered is sufficient and does not need vetting by the Home Secretary at the centre.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Notwithstanding the additional “safeguards” against unlawful or unauthorized interception, the message to take away from these guidelines is the Government’s continued efforts to expand its surveillance regime to comprehensively monitor every action and every communication at its whim. These requests for monitoring, undertaken by “security agencies” which include taxation agencies and the SEBI, are flawed not merely because of the possibility of “unauthorized” interception, rather because the legal basis of the interception is vague, broad and widely susceptible to misuse, as the recent “snoopgate” allegations against the Gujarat government have shown. (&lt;a class="external-link" href="http://www.thehindu.com/news/national/other-states/parties-lock-horns-over-gujarat-wiretap-charges/article5358806.ece?ref=relatedNews"&gt;See the article published by the Hindu&lt;/a&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The current regime, based on a wide interpretation of Section 5(2) of the Indian Telegraph Act and the telecom policies of the Department of Telecom, do not have adequate safeguards for preventing misuse by those in power – such as the requirement of reasonable suspicion or a warrant. Without a sound legal basis for interception, which protects the privacy rights of individuals, any additional safeguards are more or less moot, since the real threat of intrusive surveillance and infringing of basic privacy exists regardless of whether it is done under the seal of the Home Secretary or not.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Resources&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/resources/rule-419-a-indian-telegraph-rules-1951" class="external-link"&gt;http://cis-india.org/internet-governance/resources/rule-419-a-indian-telegraph-rules-1951&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a class="external-link" href="http://www.thehindu.com/news/national/centre-issues-new-guidelines-for-phone-interception/article5559460.ece"&gt;http://www.thehindu.com/news/national/centre-issues-new-guidelines-for-phone-interception/article5559460.ece&lt;/a&gt;&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring'&gt;https://cis-india.org/internet-governance/blog/new-standard-operating-procedures-for-lawful-interception-and-monitoring&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-20T05:13:13Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes">
    <title>How to Engage in Broadband Policy and Regulatory Processes</title>
    <link>https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes</link>
    <description>
        &lt;b&gt;LIRNEasia with the support of the Ford Foundation offered a four-day course in Gurgaon from March 7 to 10, 2014. Sunil Abraham taught on Surveillance and Privacy. &lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/surveillance-and-privacy.pdf" class="internal-link"&gt;Click to see&lt;/a&gt; Sunil Abraham's presentation on Surveillance and Privacy. Also read it on LIRNE asia website &lt;a class="external-link" href="http://broadbandasia.info/wp-content/uploads/2014/03/privacy-lirneasia.pdf"&gt;here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Goal&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To enable members of Indian civil-society groups (including academics and those from the media) to marshal available research and evidence for effective participation in broadband policy and regulatory processes including interactions with media, thereby facilitating and enriching policy discourse on means of increasing broadband access by the poor.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Outcomes&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The objective of the course is to produce discerning and knowledgeable consumers of research who are able to engage in broadband policy and regulatory processes.  The course will benefit those working in government and at operators as well.&lt;/p&gt;
&lt;p&gt;At the end of the course attendees will:&lt;/p&gt;
&lt;p&gt;Be able to find and assess relevant research &amp;amp; evidence&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Be able to summarize the research in a coherent and comprehensive manner&lt;/li&gt;
&lt;li&gt;Have an understanding of broadband policy and regulatory processes in India &lt;/li&gt;
&lt;li&gt;Have the necessary tools to improve their communication skills&lt;/li&gt;
&lt;li&gt;Have some understanding of how media function and how to effectively interact with media&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Participants will be formed into teams on day1. Both group assignments are connected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first assignment requires each group to research on a National Broadband Network (NBN) assigned to them (one of US, Singapore, Hong Kong, Brazil, South Africa, Korea or Colombia) and writing it up based on a template that will be provided. Each team will have to present their findings about the NBN at the end of day 2.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second assignment is to be performed by teams.  It is an oral presentation, accompanied by a policy brief of two pages max. at a mock public hearing at which the Indian Department of Telecommunications (DoT) is seeking input on the question of subsidizing fiber-to-the-home (FTTH) as the second phase of the current INR 20,000 Crore (USD 4 Billion) National Optical Fiber Network initiative.  Each team will be assigned a role and they should present the recommendations from the point of view of the assigned ‘role’.  All presentations must be evidence based.  It is expected that participants will use what they learnt about other NBNs on day 2 to support their argument.  Additional research must be conducted on Days 3 and 4.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;/th&gt;&lt;th&gt;Day1 (March 7)&lt;/th&gt;&lt;th&gt;Day2 (March 8)&lt;/th&gt;&lt;th&gt;Day3 (March 9)&lt;/th&gt;&lt;th&gt;Day4 (March 10)&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;09.00&lt;br /&gt;10.30&lt;/td&gt;
&lt;td&gt;S1  Introduction (Rohan Samarajiva RS)&lt;/td&gt;
&lt;td&gt;S5  Interrogating supply-side indicators (RS &amp;amp; RLG)&lt;/td&gt;
&lt;td&gt;S8 Indian broadband policy &amp;amp; regulatory environment in relation to comparator countries (Satyen Gupta SG)&lt;/td&gt;
&lt;td&gt;S13 Lessons from Mexico (Ernesto Flores EF) &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30&lt;br /&gt;11.00&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.00&lt;br /&gt;12.00&lt;/td&gt;
&lt;td&gt;S2 Research on significance of broadband/Internet (Payal Malik PM)&lt;/td&gt;
&lt;td&gt;S6 Assessing &amp;amp; summarizing research (RS &amp;amp; NK)&lt;/td&gt;
&lt;td&gt;S9  Research on subsidies in broadband eco system (PM)&lt;/td&gt;
&lt;td&gt;S14 Spectrum policy debates (Martin Cave (MC)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.00&lt;br /&gt;13.00&lt;/td&gt;
&lt;td&gt;S3   Finding research (Nilusha Kapugama NK)&lt;/td&gt;
&lt;td&gt;S7 The art of media interaction (RS)&lt;/td&gt;
&lt;td&gt;S10 Making policy &amp;amp; doing regulation (SG &amp;amp; Rajat Kathuria RK) panel discussion&lt;/td&gt;
&lt;td&gt;S15 Framing issues (RS)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.00&lt;br /&gt;14.00&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.00&lt;br /&gt;15.00&lt;/td&gt;
&lt;td&gt;A1 Group formation; Assignments explained and introduction of Broadband Website (Roshanthi Lucas Gunaratne RLG)&lt;/td&gt;
&lt;td&gt;A2 Rewriting research summaries &amp;amp; preparing presentations&lt;/td&gt;
&lt;td&gt;S11 Surveillance and Privacy (RS &amp;amp; Sunil Abraham SA)&lt;/td&gt;
&lt;td&gt;A5 Mock public hearing (RS &amp;amp; panel)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.00&lt;br /&gt;15.30&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;td&gt;Break&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;15.30&lt;br /&gt;17.00&lt;/td&gt;
&lt;td&gt;S4 Demand-side research (NK) &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;A3 Presentation &amp;amp; critique of research summaries (RS &amp;amp; Panel)&lt;/td&gt;
&lt;td&gt;S12 International policy debates on Internet and broadband (RS)&lt;/td&gt;
&lt;td&gt;A5 Mock public hearing &amp;amp; critique (RS &amp;amp; panel)&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;17.00 onwards&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;Group work&lt;/td&gt;
&lt;td&gt;Certificate dinner&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3 style="text-align: justify; "&gt;Faculty&lt;/h3&gt;
&lt;p&gt;&lt;b&gt;Rohan Samarajiva, PhD&lt;/b&gt;&lt;br /&gt;Rohan Samarajiva, was the founding CEO (2004 - 2012) and Chair (2004 – onwards) of LIRNEasia.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previously he was the Team Leader at the Sri Lanka Ministry for Economic Reform, Science and Technology (2002-04) responsible for infrastructure reforms, including participation in the design of the USD 83 million e Sri Lanka Initiative.  He was Director General of Telecommunications in Sri Lanka (1998-99), a founder director of the ICT Agency of Sri Lanka (2003-05), Honorary Professor at the University of Moratuwa in Sri Lanka (2003-04), Visiting Professor of Economics of Infrastructures at the Delft University of Technology in the Netherlands (2000-03) and Associate Professor of Communication and Public Policy at the Ohio State University in the US (1987-2000).  He was Policy Advisor to the Ministry of Post and Telecom in Bangladesh (2007-09).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He serves as Senior Advisor to Sarvodaya (Sri Lanka’s largest community based organization) on ICT matters. Samarajiva is a Board Member of Communication Policy Research south, an initiative to identify and foster policy intellectuals in emerging Asia. He serves on the editorial boards of seven academic journals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;His full CV can be found at &lt;a href="http://lirneasia.net/wp-content/uploads/2007/12/CVApril1long.pdf"&gt;http://lirneasia.net/wp-content/uploads/2007/12/CVApril1long.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Martin Cave, PhD&lt;/b&gt;&lt;br /&gt;Martin Cave is a regulatory economist specialising in competition law and in the network industries, including  airports, broadcasting, energy, posts, railways, telecommunications and water. He has published extensively in these fields, and has held professorial positions at Warwick Business School, University of Warwick, UK, and the Department of Economics, Brunel University, UK. In 2010/11, Martin held the BP Centennial Chair at the London School of Economics, based in the Department of Law. He is now Visiting Professor at Imperial College Business School.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He is a Deputy Chair of the Competition Commission from January 2012. He has provided expert advice to governments, competition authorities, regulators and firms around the world, focussing particularly upon the communications industries. This work has included reviews of spectrum policies for the Governments of Australia, Canada and the UK; advice on market analysis and access remedies to a large number of regulators in Asia, Australia, Europe and Latin America, including the European Commission. He has provided advice and expert testimony in competition and sector-specific regulatory proceedings to a number of major international firms in Asia, Australasia and Europe. He has also advised UK ministers on matters relating to the water sector, housing, legal services and airports, and advised regulators in the railway and energy sectors. He was a founder member of the Academic Advisory Committee of the Brussels-based think tank, the Centre for Regulation in Europe (&lt;a href="http://www.cerre.eu/" target="_blank"&gt;www.cerre.eu&lt;/a&gt;). In 2009 he was awarded the OBE for public service.&lt;/p&gt;
&lt;p&gt;His full CV&lt;b&gt; &lt;/b&gt;available on &lt;a href="http://www.martincave.org.uk/index.php"&gt;http://www.martincave.org.uk/index.php&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Payal Malik&lt;/b&gt;&lt;br /&gt;Payal Malik is a Senior Research Fellow of LIRNEasia and an Associate Professor of Economics at the Delhi University. She is currently on deputation to the Competition Commission of India. She is also associated with National Council of Applied Economic Research and Indicus Analytics. She received her Master of Philosophy (M.Phil.), and MA in Economics from the Delhi School of Economics and BA in Economics from Lady Shriram College, University of Delhi. She also has a MBA in Finance from the University of Cincinnati.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She has several years of research experience on the issues of competition and regulation in network industries like power, telecommunication and water. In addition, she has done considerable research on the ICT sector. Recently she has been actively engaged in competition policy research. At LIRNEasia, she has led research on measuring India’s telecom sector and regulatory performance, including a study on Universal Service Instruments. She has written both for professional journals as well as for the economic press. Currently she is a regular columnist for the Financial Express, India and a referee for the Information Technologies and International Development journal published by University of Southern California, Annenberg.  &lt;a href="http://lirneasia.net/wp-content/uploads/2011/01/Payal-Malik-Curriculum-Vita%C3%A8-December-2010.pdf"&gt;Click here to download a detailed version of CV&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Satyen Gupta&lt;/b&gt;&lt;br /&gt;Satyen Gupta is the founder and Secretary General, NGN Forum, India. Previously he was the chief of Corporate Affairs, Sterlite Technologies Ltd and headed the Regulatory and Govt. Affairs for BT global Services for SAARC Region and handled Licencing, Regulation, compliance, competition and Industry Advocacy issues. He is also a member, Advisory Board of Creation and Implementation of National Optical Fibre Network for the government of India (2011 onwards). From 2000-2006 he served as the Principle Advisor, Telecom Regulatory Authority of India at the level of additional secretary to the government of India and headed the fixed network division. He is the author of “Everything Over IP-All you want to know about NGN” (2011).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He has conducted and taught many courses on telecommunication technologies, policy and regulation. He is also a Govt. Affairs and Regulatory advocate. He  graduated with Hons, in Engineering in 1979 from NIT, Kurukshetra University, INDIA and went on to complete his post graduate studies in Electronics Design Technology at CEDT, Indian Institute of Science, Bangalore.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Rajat Kathuria, PhD&lt;/b&gt;&lt;br /&gt;Rajat Kathuria is Director and Chief Executive at Indian Council for Research on International Economic Relations (ICRIER), New Delhi. He has over 20 years experience in teaching and 10 years experience in economic policy, besides research interests on a range of issues relating to regulation and competition policy. He worked with Telecom Regulatory Authority of India (TRAI) during its first eight years (1998-2006) and gained hands on experience with telecom regulation in an environment changing rapidly towards competition. The role entailed analysis of economic issues relating to telecom tariff policy, tariff rebalancing, interconnection charges and licensing policy. Market research and questionnaire development and analysis formed an integral part of this exercise. It also involved evaluation of macro level initiatives for transforming the telecom industry. He wrote a number of consultation papers which eventually formed the basis of tariff and interconnection orders applicable to the industry. He has an undergraduate degree in Economics from St. Stephens College, a Masters from Delhi School of Economics and a PhD degree from the University of Maryland, College Park.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Ernesto Flores, PhD&lt;/b&gt;&lt;br /&gt;Ernesto M. Flores-Roux majored in Mathematics from the National University of Mexico (UNAM), obtained partial credits in a Masters in Economics (ITAM), and received his PhD in Statistics from The University of Chicago (1993). From 1993 to 2004, he worked for McKinsey &amp;amp; Co., Inc. (Mexico, Brazil), one of the most prestigious international consulting firms, first as a Consultant, then as Partner, and finally as the Partner in charge of McKinsey's Rio de Janeiro office. He specialized in several aspects of the telecommunications industry, including regulation, planning, strategy, and marketing. He assisted the governments of Mexico and Brazil in their deregulation and privatization processes. In 2004, he joined Telefonica, first as Director of Marketing and Strategy in Mexico and then transferring to Telefónica's operations in Peru, China (Beijing), and Brazil. In 2008 he joined the Ministry of Communications and Transport (SCT) in Mexico as Chief of Staff of the Deputy Minister of Communications. In 2009 he joined CIDE (Centro de Investigación y Docencia Económicas, Mexico City) as an associate professor of CIDE's telecommunications program (Telecom CIDE). He has published several papers in telecommunications policy and has written reports for the IDB, GSMA, UN/CEPAL , Ahciet, CAF, OECD, as well as other publications in industry and academic journals. In 2011 he became a member of the Advisory Council of the Mexican telecommunications regulator (Cofetel – Comisión Federal de Telecomunicaciones).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Sunil Abraham&lt;/b&gt;&lt;br /&gt;Sunil Abraham is the Executive Director of Bangalore based research organization, the Centre for Internet and Society. He founded Mahiti in 1998, a company committed to creating high impact technology and communications solutions. Today, Mahiti employs more than 50 engineers. Sunil continues to serve on the board. Sunil was elected an Ashoka fellow in 1999 to 'explore the democratic potential of the Internet' and was also granted a Sarai FLOSS fellowship in 2003. Between June 2004 and June 2007, Sunil also managed the International Open Source Network, a project of United Nations Development Programme's Asia-Pacific Development Information Programme serving 42 countries in the Asia-Pacific region.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Nilusha Kapugama&lt;/b&gt;&lt;br /&gt;Nilusha Kapugama is a Research Manager at LIRNEasia and manages the electricity component of the 2012-2014 IDRC Project on ‘Achieving e-inclusion by improving government service delivery &amp;amp; exploring the potential of “big data” for answering development questions’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She is also working on a systematic review looking at the economic impacts of mobile phones. Previously she managed the Knowledge Based Economy project at LIRNEasia, which looked at the information and knowledge gaps in agriculture supply chains. She also worked on &lt;a href="http://www.lirneasia.net/projects/current-projects/capacity-and-field-building/"&gt;CPR&lt;/a&gt;&lt;a href="http://www.lirneasia.net/projects/current-projects/capacity-and-field-building/"&gt;south&lt;/a&gt;, LIRNEasia’s capacity-building initiative to develop Asia-Pacific expertise and knowledge networks in ICT policy regulation. She has also done research on broadband quality indicators and national regulatory authority (NRA) website indicators. She has also worked on LIRNEasia’s &lt;a href="http://www.lirneasia.net/projects/current-projects/virtual-organization/"&gt;Virtual Organization Project&lt;/a&gt;.  She has experience organizing international conferences and training courses.&lt;/p&gt;
&lt;p&gt;She holds a master’s degree in development economics and policy from the University of Manchester, UK.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Roshanthi Lucas Gunaratne&lt;/b&gt;&lt;br /&gt;Roshanthi is a Research Manager at LIRNEasia and is currently managing the Ford Foundation Funded project on Giving Broadband Access to the Poor in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She is also contributing to the IDRC Customer Lifecycle Management Practices Project by conducting research on customer lifecycle management practices in telecommunication sector in Bangladesh.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before joining LIRNE&lt;i&gt;asia&lt;/i&gt;, Roshanthi worked at the Global Fund to fight AIDS, Tuberculosis and Malaria, Geneva, Switzerland as a Strategic Information Officer. She contributed to the process of defining the Global Fund Key Performance Indicators, and also worked on improving the performance measurements of their grants. Prior to that, she worked as a telecom project manager at Dialog Telecom, and Suntel Ltd in Sri Lanka. As Suntel she managed the design and implementation of corporate customer projects.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;She holds a MBA from the Judge Business School, University of Cambridge, UK and a BSc. Eng (Hons) specializing in Electronics and Telecommunication from the University of Moratuwa, Sri Lanka.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Resource Materials&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Bauer, Johannes M.; Kim, Junghyun; &amp;amp; Wildman, Steven S. (2005).  An integrated framework for assessing broadband policy options.  MICH. ST. L. REV. 21, pp. 21-50.  &lt;a href="http://www.msulawreview.org/PDFS/2005/1/Bauer-Kim.pdf"&gt;http://www.msulawreview.org/PDFS/2005/1/Bauer-Kim.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Broadband Commission (2012). &lt;i&gt;The state of broadband 2012:  Achieving digital inclusion for all.&lt;/i&gt; &lt;a href="http://www.broadbandcommission.org/Documents/bb-annualreport2012.pdf"&gt;http://www.broadbandcommission.org/Documents/bb-annualreport2012.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government of India, Department of Telecommunications (2012).  &lt;i&gt;National Telecom Policy 2012&lt;/i&gt;.  &lt;a href="http://www.dot.gov.in/ntp/NTP-06.06.2012-final.pdf"&gt;http://www.dot.gov.in/ntp/NTP-06.06.2012-final.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Government of India, Department of Telecommunications (2004).  &lt;i&gt;Broadband policy&lt;/i&gt;.  &lt;a href="http://www.dot.gov.in/ntp/broadbandpolicy2004.htm"&gt;http://www.dot.gov.in/ntp/broadbandpolicy2004.htm&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Junio, Don Rodney (2012). Does a National Broadband Plan Matter? A Comparative Analysis of Broadband Plans in Hong Kong and Singapore &lt;a href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2146566"&gt;http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2146566&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;InfoDev.  &lt;i&gt;Broadband strategies toolkit&lt;/i&gt;.  &lt;a href="http://broadbandtoolkit.org/en/toolkit/contents"&gt;http://broadbandtoolkit.org/en/toolkit/contents&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Samarajiva, Rohan (2010).  Leveraging the budget telecom network business model to bring broadband to the people, &lt;i&gt;Information Technology and International Development&lt;/i&gt;, 6, special edition:  93-97.  &lt;a href="http://itidjournal.org/itid/article/view/630/270"&gt;http://itidjournal.org/itid/article/view/630/270&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes'&gt;https://cis-india.org/news/how-to-engage-in-broadband-policy-and-regulatory-processes&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-04-03T06:07:04Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/data-guidance-march-3-2014-india-privacy-bill-will-likely-reflect-eu-directive">
    <title>India: Privacy Bill will likely reflect EU Directive</title>
    <link>https://cis-india.org/news/data-guidance-march-3-2014-india-privacy-bill-will-likely-reflect-eu-directive</link>
    <description>
        &lt;b&gt;The Indian Centre for Internet and Society (CIS) called for comments - on 25 February 2014 - on a draft Privacy Protection Bill ('the Bill'). The draft Bill comes after a series of roundtable discussions in 2013. The last CIS roundtable on the Bill, on 19 October 2013, included Jacob Kohnstamm, Chairman of the EU Article 29 Working Party and the Dutch data protection authority, and Christopher Graham, the UK Information Commissioner. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="http://www.dataguidance.com/dataguidance_privacy_this_week.asp?id=2233"&gt;published in DataGuidance&lt;/a&gt; on March 3, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;"In its eventual form, I expect [the Bill] will be modelled to a great extent on the European Data Protection Directive (95/46/EC)," Rodney Ryder, Partner at Scriboard, told DataGuidance. "The European Directive is an important model as India moves forward." Data protection in India is currently regulated by the Information Technology Act 2011, however, if enacted, the Bill would introduce the country's first comprehensive privacy regime. In 2013, the European Commission assessed India's data protection regime and decided not to award adequacy recognition at that time.&lt;/p&gt;
&lt;blockquote class="quoted" style="text-align: justify; "&gt;"If the Bill is introduced in the Winter Session, […] it is likely to […] come into effect either at the end of the year or early in the next year"&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;The draft Bill regulates collection, storage and processing of personal data, with both monetary and penal penalties yet to be determined for anyone who 'collects, receives, stores, processes or otherwise handles any personal data [except in conformity with the provisions of the Act].' It also establishes an Indian Data Protection Authority (DPA), with the power to investigate data processing and to 'give such directions or pass such orders as are necessary.'&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"[Moving forward,] we expect more clarity on the role and functioning of the DPA," Ryder stated. "In the past, the Government of India has not been clear on the role of the DPA. Will this 'authority' have the independent powers and stature of the European Privacy Commissioners? [Additionally,] the complaint mechanism under the Bill requires greater clarity, precision and structure."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Divya Sharma, Legal Director at Bird and Bird LLP, commented, "Considering that India has parliamentary elections scheduled to take place in April 2014, this bill is unlikely to progress further until a new Government takes office in May 2014. […] Any legislation of this nature is unlikely to progress during this Government's tenure."&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;"If the Bill is introduced in the Winter Session, after due consideration, it is likely to be passed by the end of the Year and come into effect either at the end of the year or early in the next year," said Ryder.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/data-guidance-march-3-2014-india-privacy-bill-will-likely-reflect-eu-directive'&gt;https://cis-india.org/news/data-guidance-march-3-2014-india-privacy-bill-will-likely-reflect-eu-directive&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-05T11:45:37Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions">
    <title>Comparison of Section 35(1) of the Draft Human DNA Profiling Bill and Section 4 of the Identification Act Revised Statute of Canada</title>
    <link>https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions</link>
    <description>
        &lt;b&gt;A comparison of section 35(1) of the Draft Human DNA Profiling Bill, section 4 of the Identification Act, Revised Statute of Canada, and a review of international best practices. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In continuance of research around the &lt;a href="https://cis-india.org/internet-governance/blog/draft-human-dna-profiling-bill-april-2012"&gt;Draft Human DNA Profiling Bill&lt;/a&gt; that has been drafted the Department of Biotechnology, this blog entry reviews best practices for the communication of DNA profiles from the DNA Bank Manager to law enforcement and the police, compares the section 35(1) of the Draft Human DNA Profiling Bill and section 4 of the Identification Act Revised Statute of Canada, and recommends a revision of the present provision in the Draft Human DNA Profiling Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Indian Provision&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;35 (1) “&lt;i&gt;On receipt of a DNA profile for entry in the DNA Data Bank, the DNA Bank Manager shall cause it to be compared with the DNA profiles in the DNA Data Bank in order to determine whether it is already contained in the DNA Data Bank and shall communicate, for the purposes of the investigation or prosecution in a criminal offence, the following information to a court, tribunal, law enforcement agency or DNA laboratory in India which the DNA Data Bank Manager considers is concerned with it, appropriate, namely – &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a) &lt;/i&gt;&lt;i&gt;As to whether the DNA profile received is already contained in the Data Bank; and &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(b) &lt;/i&gt;&lt;i&gt;Any information, other than the DNA profile received, is contained in the Data Bank in relation to the DNA profile received. &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(2) The information as to whether a person’s DNA profile is contained in the offenders’ index may be communicated to an official who is authorized to receive the same as prescribed.”&lt;/i&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Canadian Provision vs. Indian Provision&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;According to the Draft Human DNA Profiling Bill 35(1) was adopted from the DNA Identification Act Revised Statute of Canada section 4. The provision found in the Draft Human DNA Profiling Bill is different in three ways:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The Canadian statute limits the communication of whether a DNA profile is contained in the Data Bank or not to law enforcement agencies or other DNA laboratories, where as the provision in the Draft Human DNA Profiling Bill allows the communication to law enforcement agencies, other DNA data banks, and courts and tribunals. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Canadian statute limits the comparison of any DNA profile to that as entered in the convicted offenders index or the crime scene index with those DNA profiles that are already contained in the databank, where as the Draft Human DNA Profiling Bill allows for any received profile to be compared with the other profiles in the DNA Data Bank. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Canadian statute defines four types of information that may be communicated to law enforcement or another DNA databank including: &lt;/li&gt;
&lt;/ol&gt; &lt;ol&gt;&lt;ol&gt;
&lt;li&gt;(&lt;i&gt;a&lt;/i&gt;) if the DNA profile is not       already contained in the data bank, the fact that it is not;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;(&lt;i&gt;b&lt;/i&gt;) if the DNA profile is already       contained in the data bank, the information contained in the data bank in       relation to that DNA profile;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;(&lt;i&gt;c&lt;/i&gt;) if the DNA profile is, in the       opinion of the Commissioner, similar to one that is already contained in       the data bank, the similar DNA profile; and&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;(&lt;i&gt;d&lt;/i&gt;) if a law enforcement agency       or laboratory advises the Commissioner that their comparison of a DNA       profile communicated under paragraph (&lt;i&gt;c&lt;/i&gt;) with one that is       connected to the commission of a criminal offence has not excluded the       former as a possible match, the information contained in the data bank in       relation to that profile.&lt;/li&gt;
&lt;/ol&gt;&lt;/ol&gt;
&lt;p&gt;While the Draft Human DNA Profiling Bill provides for communication of only (a) and (b) by the DNA Data Bank Manager.&lt;/p&gt;
&lt;h3&gt;Concerns with 35(1) and Best Practices&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society finds 35(1) problematic because a  DNA profile is never a complete match, and is instead a scientific and statistical based probability. There are a number of steps that go into the analysis of a DNA profile. According to the US National Institute of Justice, these include: “&lt;i&gt;1) the isolation of the DNA from an evidence sample containing DNA of unknown origin, and generally at a later time, the isolation of DNA from a sample (e.g., blood) from a known individual; 2) the processing of the DNA so that test results may be obtained; 3) the determination of the DNA test results (or types), from specific regions of the DNA; and 4) the comparison and interpretation of the test results from the unknown and known samples to determine whether the known individual is not the source of the DNA or is included as a possible source of the DNA.&lt;/i&gt;”&lt;a name="fr1"&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Though it is common for DNA Banks to communicate responses such as “match”,  “no match”, or “partial match” or “inclusion”, “exclusion”, or “inconclusive” to inquiries received from law enforcement and other DNA Banks, this is not the case for communications to courts and tribunals. For example in England and Wales guidelines for presenting DNA evidence in court were laid out in the rule Rv. Dohemy and Adams (1997) 1 Cr. App. R. 396. Along with comprehensive guidelines on how experts should conduct themselves in court to prevent bias, the guidelines require the following information to be presented when DNA material is used as evidence in a case:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;“The scientist should adduce the evidence of the DNA comparisons between the crime stain and the defendant’s sample together with the calculations of the Random Match Probability. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Whenever DNA evidence is adduced the Crown should serve on the defence details as to how the calculations have been carried out which are sufficient to enable the defence to scrutinize the basis of the calculations. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The Forensic Science Service should make available to a defence expert, if requested, the databases upon which the calculations have been made. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The expert will, on the basis of empirical statistical data, five the jury the random occurrence rations - the frequency with which the matching DNA characteristics are likely to be found in the population at large. &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Provided that the expert has the necessary data, it may then be appropriate for him to indicate how many people with the matching characteristics are likely to be found in the United Kingdom...”&lt;a name="fr2"&gt;&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Recommendations&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Given the influential weight that DNA evidence can have in a case, it is critical that the evidence is accurately presented to the court and other key stakeholders. The  Centre for Internet and Society recommends that the Bill should distinguish the DNA Bank Manager’s response to law enforcement and other DNA Laboratory’s and the DNA Bank Manger’s response to courts and tribunals as below:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;strong&gt;Response to Law enforcement agency and DNA Laboratory:&lt;/strong&gt; The DNA Bank Manger should respond to a request from law enforcement or a DNA laboratory with either: "match" or "partial match" .&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;strong&gt;Response to Court and tribunal:&lt;/strong&gt; When DNA evidence is used in a court of law, the Bill should provide that the presentation should include:&lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;The random match probability: The probability that the profile is in the sample from the individual tested if the individual tested has been selected at random. &lt;/li&gt;
&lt;li&gt;The frequency with which the matching DNA characteristics are likely to be found in the population at large.&lt;/li&gt;
&lt;li&gt;The probability of contamination. &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The Bill should also provide for the database upon which the calculations were based to be made available when requested.  In addition, the Bill should provide for rules to be made prescribing the procedure for presentation.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a name="fn1"&gt;&lt;/a&gt;]. &lt;a class="external-link" href="http://nij.gov/topics/forensics/evidence/dna/basics/Pages/analyzing.aspx"&gt;http://nij.gov/topics/forensics/evidence/dna/basics/Pages/analyzing.aspx&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;a class="external-link" href="http://nij.gov/topics/forensics/evidence/dna/basics/Pages/analyzing.aspx"&gt;[&lt;span&gt;2&lt;/span&gt;].&lt;/a&gt; &lt;a class="external-link" href="http://www.medicalgenomics.co.uk/pdf/Barrister_vol32-2007.pdf"&gt;http://www.medicalgenomics.co.uk/pdf/Barrister_vol32-2007.pdf&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions'&gt;https://cis-india.org/internet-governance/blog/comparision-of-draft-human-dna-profiling-bill-and-identification-act-revised-statute-of-canada-provisions&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-03T08:20:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3">
    <title>Surveillance and the Indian Constitution - Part 3: The Public/Private Distinction and the Supreme Court’s Wrong Turn</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3</link>
    <description>
        &lt;b&gt;After its decision in Gobind, the Supreme Court's privacy floodgates opened; a series of claims involving private parties came before its docket, and the resulting jurisprudence ended up creating confusion between state-individual surveillance, and individual-individual surveillance.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Gautam Bhatia's blog post was originally &lt;a class="external-link" href="http://indconlawphil.wordpress.com/2013/12/17/privacy-and-surveillance-in-india-iii-the-publicprivate-distinction-and-the-supreme-courts-wrong-turn/"&gt;published on Indian Constitutional Law and Philosophy Blog&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;We have seen that &lt;i&gt;Gobind &lt;/i&gt;essentially crystallized a constitutional right to privacy as an aspect of personal liberty, to be infringed only by a narrowly-tailored law that served a compelling state interest. After the landmark decision in &lt;i&gt;Gobind&lt;/i&gt;, &lt;i&gt;&lt;a href="http://indiankanoon.org/doc/971635/"&gt;Malak Singh v State of P&amp;amp;H&lt;/a&gt; &lt;/i&gt;was the next targeted-surveillance history-sheeter case to come before the Supreme Court. In that case, Rule 23 of the Punjab Police Rules was at issue. Its vires was not disputed, so the question was a direct matter of constitutionality. An order of surveillance was challenged by two individuals, on the ground that there were no reasonable bases for suspecting them of being repeat criminals, and that their inclusion in the surveillance register was politically motivated.  After holding that entry into a surveillance sheet was a purely administrative measure, and thus required no prior hearing (&lt;i&gt;audi alteram partem&lt;/i&gt;), the Court then embarked upon a lengthy disquisition about the scope and limitations of surveillance, which deserves to be reproduced in full:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;But all this does not mean that the police have a licence to enter the names of whoever they like (dislike?) in the surveillance register; nor can the surveillance be such as to squeeze the fundamental freedoms guaranteed to all citizens or to obstruct the free exercise and enjoyment of those freedoms; nor can the surveillance so intrude as to &lt;/i&gt;&lt;i&gt;&lt;span&gt;offend the dignity of the individual&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. Surveillance of persons who do not fall within the categories mentioned in Rule 23.4 or for reasons unconnected with the prevention of crime, or excessive surveillance falling beyond the limits prescribed by the rules, will entitle a citizen to the Court’s protection which the court will not hesitate to give. The very rules which prescribe the conditions for making entries in the surveillance register and the mode of surveillance appear to recognise the caution and care with which the police officers are required to proceed. The note following R. 23.4 is instructive. It enjoins a duty upon the police officer to construe the rule strictly and confine the entries in the surveillance register to the class of persons mentioned in the rule. Similarly R.23.7 demands that there should be no illegal interference in the guise of surveillance. Surveillance, therefore, has to be unobstrusive and within bounds. Ordinarily the names of persons with previous criminal record alone are entered in the surveillance register. &lt;/i&gt;&lt;i&gt;&lt;span&gt;They must be proclaimed offenders, previous convicts, or persons who have already been placed on security for good behaviour. In addition, names of persons who are reasonably believed to be habitual offenders or receivers of stolen property whether they have been convicted or not may be entered&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. It is only in the case of this category of persons that there may be occasion for abuse of the power of the police officer to make entries in the surveillance register. But, here, the entry can only be made by the order of the Superintendent of Police who is prohibited from delegating his authority under Rule 23.5. Further it is necessary that the Superintendent of Police must entertain &lt;/i&gt;&lt;i&gt;&lt;span&gt;a reasonable belief&lt;/span&gt;&lt;/i&gt;&lt;i&gt; that persons whose names are to be entered in Part II are habitual offenders or receivers of stolen property. While it may not be necessary to supply the grounds of belief to the persons whose names are entered in the surveillance register it may become necessary in some cases to satisfy the Court when an entry is challenged &lt;/i&gt;&lt;i&gt;&lt;span&gt;that there are grounds to entertain such reasonable belief&lt;/span&gt;&lt;/i&gt;&lt;i&gt;. In fact in the present case we sent for the relevant records and we have satisfied ourselves that there were sufficient grounds for the Superintendent of Police to entertain a reasonable belief. In the result we reject both the appeals subject to our observations regarding the mode of surveillance. There is no order as to costs.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Three things emerge from this holding: &lt;i&gt;first&lt;/i&gt;, the Court follows &lt;i&gt;Gobind&lt;/i&gt; in locating the right to privacy within the philosophical concept of individual &lt;i&gt;dignity&lt;/i&gt;, found in Article 21’s guarantee of personal liberty. &lt;i&gt;Secondly&lt;/i&gt;, it follows &lt;i&gt;Kharak Singh, Malkani and Gobind&lt;/i&gt; in insisting that the surveillance be targeted, limited to fulfilling the government’s crime-prevention objectives, and be limited – not even to suspected criminals, but – repeat offenders or serious criminals. And &lt;i&gt;thirdly&lt;/i&gt;, it leaves open a role for the Court – that is, &lt;i&gt;judicial review&lt;/i&gt; – in examining the grounds of surveillance, if challenged in a particular case.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After &lt;i&gt;Malak Singh, &lt;/i&gt;there is another period of quiet. &lt;a href="http://www.indiankanoon.org/doc/304068/"&gt;&lt;i&gt;LIC v Manubhai D Shah&lt;/i&gt;&lt;/a&gt;, in 1993, attributed – wrongly – to &lt;i&gt;Indian Express Newspapers &lt;/i&gt;the proposition that Article 19(1)(a)’s free expression right included privacy of communications (&lt;i&gt;Indian Express &lt;/i&gt;itself had cited a  UN Report without incorporating it into its holding).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Soon afterwards, &lt;i&gt;&lt;a href="http://www.indiankanoon.org/doc/501107/"&gt;R. Rajagopal v State of TN&lt;/a&gt; &lt;/i&gt;involved the question of the publication of a convicted criminal’s autobiography by a publishing house; Auto Shankar, the convict in question, had supposedly withdrawn his consent after agreeing to the book’s publication, but the publishing house was determined to go ahead with it. Technically, this wasn’t an Article 21 case: so much is made clear by the very manner in which the Court frames its issues: the question is whether a &lt;i&gt;&lt;span&gt;citizen&lt;/span&gt;&lt;/i&gt; of the country can prevent &lt;i&gt;&lt;span&gt;another person&lt;/span&gt;&lt;/i&gt;&lt;i&gt; &lt;/i&gt;from writing his biography, or life story. (Paragraph 8) The Court itself made things clear when it held that the right of privacy has two aspects: the &lt;i&gt;tortious &lt;/i&gt;aspect, which provides damages for a breach of individual privacy; and the &lt;i&gt;constitutional aspect&lt;/i&gt;, which protects privacy against &lt;span&gt;&lt;b&gt;unlawful governmental intrusion.&lt;/b&gt;&lt;/span&gt; (Paragraph 9) Having made this distinction, the Court went on to cite a number of American cases that were precisely about the right to privacy against governmental intrusion, and therefore – ideally – irrelevant to the present case (Paras 13 – 16); and then, without quite explaining how it was using these cases – or whether they were relevant at all, it switched to examining the law of defamation (Para 17 onwards). It would be safe to conclude, therefore, in light of the clear distinctions that it made, the Court was concerned in &lt;i&gt;R. Rajagopal &lt;/i&gt;about an action between private parties, and therefore, privacy in the context of tort law. It’s confusing observations, however, were to have rather unfortunate effects, as we shall see.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;We now come to a series of curious cases involving privacy and medical law. In &lt;a href="http://indiankanoon.org/doc/382721/"&gt;&lt;i&gt;Mr X v Hospital Z&lt;/i&gt;&lt;/a&gt;, the question arose whether a Hospital that – in the context of a planned marriage – had disclosed the appellant’s HIV+ status, leading to his social ostracism – was in breach of his right to privacy. The Court cited &lt;i&gt;Rajagopal&lt;/i&gt;, but unfortunately failed to understand it, and turned the question into one of the &lt;i&gt;constitutional right to privacy, and not the private right. &lt;/i&gt;Why the Court turned an issue between two private parties – adequately covered by the tort of breach of confidentiality – into an Article 21 issue is anybody’s guess. &lt;i&gt;Surely&lt;/i&gt; Article 21 – the right to life and personal liberty – is not horizontally applicable, because if it was, we might as well scrap the entire Indian Penal Code, which deals with exactly these kinds of issues – individuals violating each others’ rights to life and personal liberty. Nonetheless, the Court cited &lt;i&gt;Kharak Singh, Gobind &lt;/i&gt;&lt;span&gt;&lt;b&gt;and&lt;/b&gt;&lt;/span&gt; Article 8 of the European Convention of Human Rights, further muddying the waters, because Article 8 – in contrast to American law – embodies a &lt;i&gt;proportionality test&lt;/i&gt; for determining whether there has been an impermissible infringement of privacy. The Court then came up with the following observation:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“&lt;i&gt;Where there is a clash of two Fundamental Rights, as in the instant case, namely, the appellant’s right to privacy as part of right to life and Ms. Akali’s right to lead a healthy life which is her Fundamental Right under Article 21, the RIGHT which would advance the public morality or public interest, would alone be enforced through the process of Court, for the reason that moral considerations cannot be kept at bay.”&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;With respect, this is utterly bizarre. If there is a clash of two rights, then that clash must be resolved by referring to the &lt;i&gt;Constitution&lt;/i&gt;, and not to the Court’s opinion of what an amorphous, elastic, malleable, many-sizes-fit “public morality” says. The mischief caused by this decision, however, was replicated in &lt;i&gt;&lt;a href="http://indiankanoon.org/doc/1309207/"&gt;Sharda v Dharmpal&lt;/a&gt;, &lt;/i&gt;decided by the Court in 2003. In that case, the question was whether the Court could require a party who had been accused of unsoundness of mind (as a ground for divorce under the wonderfully progressive Hindu Marriage Act) to undergo a medical examination – and draw an adverse inference if she refused. Again, whether this was a case in which Article 21 ought to be invoked is doubtful; at least, it is arguable, since it was the Court making the order. Predictably, the Court cited from &lt;i&gt;Mr X v Hospital Z &lt;/i&gt;extensively. It cited &lt;i&gt;Gobind&lt;/i&gt; (compelling State interest) &lt;i&gt;and&lt;/i&gt; the ECHR (proportionality). It cited a series of cases involving custody of children, where various Courts had used a “balancing test” to determine whether the best interests of the child overrode the privacy interest exemplified by the client-patient privilege. It applied this balancing test to the case at hand by balancing the “right” of the petitioner to obtain a divorce for the spouse’s unsoundness of mind under the HMA, vis-à-vis the Respondent’s right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In light of the above analysis, it is submitted that although the outcome in &lt;i&gt;Mr X v Hospital Z &lt;/i&gt;and &lt;i&gt;Sharda v Dharmpal &lt;/i&gt;might well be correct, the Supreme Court has misread what &lt;i&gt;R. Rajagopal &lt;/i&gt;actually held, and its reasoning is deeply flawed. Neither of these cases are Article 21 cases: they are private tort cases between private parties, and ought to be analysed under private law, as &lt;i&gt;Rajagopal&lt;/i&gt; itself was careful to point out. In private law, also, the balancing test makes perfect sense: there are a series of interests at stake, as the Court rightly understood, such as certain rights arising out of marriage, all of a private nature. In any event, whatever one might make of these judgments, one thing is clear: they are both logically and legally irrelevant to the &lt;i&gt;Kharak Singh &lt;/i&gt;line of cases that we have been discussing, which are to do with the Article 21 right to privacy &lt;i&gt;against the State&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3'&gt;https://cis-india.org/internet-governance/blog/surveillance-and-the-indian-consitution-part-3&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>pranesh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-06T23:02:45Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules">
    <title>UIDAI Practices and the Information Technology Act, Section 43A and Subsequent Rules</title>
    <link>https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules</link>
    <description>
        &lt;b&gt;UIDAI practices and section 43A of the IT Act are analyzed in this post.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the 52&lt;sup&gt;nd&lt;/sup&gt; Report on Cyber Crime, Cyber Security, and the Right to Privacy – in evidence provided, the Department of Electronics and Information Technology stated &lt;i&gt;“...Section 43A and the rules published under that Section cover the entire privacy in case of digital data. These are being followed by UIDAI also and other organisations...”&lt;/i&gt; (pg.46) &lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This blog post explains the requirements found under Section 43A of the Information Technology Act 2000 and the subsequent Information Technology “ Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules 2011&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; and analyses publicly available documents from the UIDAI website&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; as well as the UIDAI enrolment form&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; to demonstrate the ways in which:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;UIDAI practices &lt;b&gt;are &lt;/b&gt;in line with section 43A and the Rules, &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;UIDAI practices &lt;b&gt;are not&lt;/b&gt; in line with section 43A and the Rules, &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;UIDAI practices &lt;b&gt;are partially&lt;/b&gt; in with section 43A and the Rules &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Where more information&lt;/b&gt; is needed to draw a conclusion. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Applicability and Scope&lt;/h3&gt;
&lt;p&gt;Section 43A of the Information Technology Act 2008 and subsequent Rules apply only to Body Corporate and to digital information.&lt;/p&gt;
&lt;p&gt;Body Corporate under the Information Technology Act 2008 is defined as:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; “Any company and includes a firm, sole proprietorship or other association of individuals engaged in commercial or professional activities” &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - not in line&lt;/b&gt;: The UIDAI is not a body corporate. The UIDAI is an attached office under the aegis of the Planning Commission that was set up by an executive order.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI collects, processes, stores, and shares both digital and non-digital information. As section 43A and subsequent Rules apply only to digital information, there is not sufficient protection provided over all the information collected, processed, stored, and used by the UIDAI.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy Policy on Website&lt;/h3&gt;
&lt;p&gt;Rule 4 requires body corporate to provide a privacy policy on their website. The privacy policy must include:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Clear and easily accessible statements of its practices and policies&lt;/li&gt;
&lt;li&gt;Type of personal or sensitive personal data or information collected&lt;/li&gt;
&lt;li&gt;Purpose of collection and usage of such information &lt;/li&gt;
&lt;li&gt;Disclosure of information including sensitive personal information &lt;/li&gt;
&lt;li&gt;Reasonable security practices and procedures as provided under rule 8&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Though the UIDAI has placed a privacy policy&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; on their website, the privacy policy only addresses the use of website and does not comprehensively provide clear and accessible statements about all of the UIDAI’s practices and policies.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does not state the specific types of personal or sensitive data that could be collected, but instead states &lt;i&gt;“As a general rule, this website does not collect Personal Information about you when you visit the site. You can generally visit the site without revealing Personal Information, unless you choose to provide such information.”&lt;/i&gt;&lt;br /&gt;&lt;br /&gt;Features on the UIDAI website that require individuals to provide personal information and sensitive personal information include: Booking an appointment, checking aadhaar status, enrolling for e-aadhaar, enrolling for aadhaar, updating aadhaar data. Types of information required for these services include: mobile number, name, address, gender, date of birth, and enrolment ID.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;br /&gt;&lt;br /&gt;The privacy policy goes on to state: &lt;i&gt; “If you are asked for any other Personal Information you will be informed how it will be used if you choose to give it. If at any time you believe the principles referred to in this privacy statement have not been followed, or have any other comments on these principles, please notify the webmaster through the Contact Us page. Note: The use of the term "Personal Information" in this privacy statement refers to any information from which your identity is apparent or can be reasonably ascertained.”&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does explain the purpose for collection of information on the website and the use of collected information.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does not address the possibility of disclosure of information collected by the UIDAI from the use of its website, except in the case of when an individual provides his/her email at which point the privacy policy states&lt;i&gt; “Your e-mail address will not be used for any other purpose, and will not be disclosed without your consent.”&lt;/i&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;The UIDAI privacy policy does not provide information about the security practices adopted by the UIDAI. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Consent&lt;i&gt; &lt;/i&gt;&lt;/h3&gt;
&lt;p&gt;Rule 5 requires that prior to the collection of sensitive personal data, the body corporate must obtain consent, either in writing or through fax regarding the purpose of usage before collection of such information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;/b&gt;&lt;br /&gt;The UIDAI collects written consent from individuals through the enrolment form  for the issuance of an Aadhaar number.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Collection Limitation&lt;/h3&gt;
&lt;p&gt;Rule 5 (2) requires that body corporate only collect sensitive personal data if it is connected to a lawful purpose and if it is considered necessary for that purpose.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;/b&gt;&lt;br /&gt;The Aadhaar enrolment form requires only the necessary sensitive personal data for the issuance of an Aadhaar number. Individuals are given the option to provide banking and financial information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Notice During Direct Collection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(3) requires that while collecting information directly from an individual the body corporate must provide the following information:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The fact that the information is being collected&lt;/li&gt;
&lt;li&gt;The purpose for which the information is being collected&lt;/li&gt;
&lt;li&gt;The intended recipients of the information &lt;/li&gt;
&lt;li&gt;The name and address of the agency that is collecting the information&lt;/li&gt;
&lt;li&gt;The name and address of the agency that will retain the information&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;br /&gt;&lt;/b&gt;The Aadhaar enrolment form does not provide the following information:&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The intended recipients of the information&lt;/li&gt;
&lt;li&gt;The name and address of the agency collecting the information &lt;/li&gt;
&lt;li&gt;The name and address of the agency that will retain the information &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Retention Limitation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(4) requires that body corporate must retain sensitive personal data only for as long as it takes to fulfil the stated purpose or otherwise required under law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;/b&gt;&lt;br /&gt;It is unclear from publicly available information what the UIDAI retention practices are.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Use Limitation&lt;/h3&gt;
&lt;p&gt;Rule 5(5) requires that information must be used for the purpose that it was collected for.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;br /&gt;&lt;/b&gt;It is unclear from publicly available information if the UIDAI is using collected information only for the purpose for which it was collected for. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Right to Access and Correct&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;Rule 5(6) requires body corporate to provide individuals with the ability to review the information they have provided and access and correct  personal or sensitive personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;br /&gt;&lt;/b&gt;Though the UIDAI provides individuals with the ability to access and correct personal information, as stated on the enrolment form, correction is free only if changed within 96 hours of enrolment. Additionally, as stated on the enrolment form, if an individual chooses to allow for the UIDAI to facilitate the opening of a bank account and link present bank accounts to the UID number, this information, after being provided, cannot be corrected. The UIDAI website has a portal for updating information, but only name, address, gender, data of birth, and mobile number can be updated through this method.&lt;b&gt; &lt;/b&gt;&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Right to ‘Opt Out’ and Withdraw Consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(7) requires that body corporate must provide individuals with the option of 'opting out' of providing data or information sought. Individuals also have the right to withdraw consent at any point of time.  Body corporate has the right to withdraw services if consent is withdrawn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;br /&gt;&lt;/b&gt;The UID enrolment form provides individuals with one ‘optional’ field  - the option of having the UIDAI open a bank account and link it to the individuals UID number or having the UIDAI link present bank accounts to individuals UID number. No other option to ‘opt out’ or withdraw consent is present on the enrolment form or the UIDAI privacy policy, terms of use, or website.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Security of Information&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 8 requires that body corporate must secure information in accordance with the ISO  27001 standard. These practices must be audited on an annual basis or when the body corporate undertakes a significant up gradation of its process and computer resource.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;br /&gt;&lt;/b&gt;The security practices adopted by the UIDAI are not mentioned in the website privacy policy, on the website, or on the enrolment form, thus it is unclear from publicly available information if the UID is compliant with ISO 27001 standards. Though the UIDAI has been functioning since 2010, and it is unclear from publicly available information if annual audits of the UIDAI security practices have been undertaken.&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Disclosure with Consent&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 6 requires that body corporate must have consent before disclosing sensitive personal data to any third person or party, except in the case with Government agencies for the purpose of verification of identity, prevention, detection, investigation, including cyber incidents and prosecution and punishment of offenses, on receipt of a written request. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Partially in Line&lt;/b&gt;&lt;br /&gt;In the enrolment form, consent for disclosure is stated as&lt;i&gt; ‘‘I have no objection to the UIDAI sharing information provided by me to the UIDAI with agencies engaged in delivery of welfare services.” &lt;/i&gt;This is a blanket statement and allows for all future possibilities of sharing and disclosure of information provided with any organization that the UIDAI deems as ‘engaged in the delivery of welfare services’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The UIDAI privacy policy only addresses the disclosure of an individual’s email address with consent. Though not directly addressing disclosure, the UIDAI privacy policy also states &lt;i&gt;“&lt;/i&gt;&lt;i&gt; &lt;/i&gt;&lt;i&gt;We will not identify users or their browsing activities, except when a law enforcement agency may exercise a warrant to inspect the service provider's logs.”&lt;/i&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Prohibition on Publishing and Further Disclosure&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 6(3) and 6(4) prohibit the body corporate from publishing sensitive personal  data or information. Similarly, organizations receiving sensitive personal data are not allowed to disclose it further.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;/b&gt;&lt;br /&gt;The UDAI does not publish sensitive personal data. It is unclear what practices and standards registrars and enrolment agencies are functioning under.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Requirements for Transfer of Sensitive Personal Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 7 requires that body corporate may transfer sensitive personal data into another jurisdiction only if the country ensures the same level of protection.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - Unclear&lt;br /&gt;&lt;/b&gt;It is unclear from publicly available information if information collected by the UIDAI is transferred outside of India. &lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Establishment of Grievance Officer&lt;b&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Rule 5(9) requires that body corporate must establish a grievance officer and the details must be posted on the body corporates website and grievances must be addressed within a month of receipt. &lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI Practices - in Line&lt;br /&gt;&lt;/b&gt;The website of the UIDAI provides details of a grievance officer that individuals can contact.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; It is unclear from publicly available information if grievances are addressed within a month.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. &lt;a class="external-link" href="http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf"&gt;http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;a class="external-link" href="http://dispur.nic.in/itact/it-procedures-sensitive-personal-data-rules-2011.pdf"&gt;http://dispur.nic.in/itact/it-procedures-sensitive-personal-data-rules-2011.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/"&gt;http://uidai.gov.in/&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;a class="external-link" href="http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf"&gt;http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/organization-details.html"&gt;http://uidai.gov.in/organization-details.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/privacy-policy.html"&gt;http://uidai.gov.in/privacy-policy.html&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;a class="external-link" href="http://resident.uidai.net.in/home"&gt;http://resident.uidai.net.in/home&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. &lt;a class="external-link" href="http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf"&gt;http://www.jharkhand.gov.in/marpdf/Aadhar-enrolmentform.pdf&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;a class="external-link" href="https://ssup.uidai.gov.in/web/guest/ssup-home"&gt;https://ssup.uidai.gov.in/web/guest/ssup-home&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. &lt;a class="external-link" href="http://uidai.gov.in/contactus.html"&gt;http://uidai.gov.in/contactus.html&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules'&gt;https://cis-india.org/internet-governance/blog/uid-practices-and-it-act-sec-43-a-and-subsequent-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>UID</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-06T07:00:21Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments">
    <title>Open Call for Comments: The Privacy Protection Bill 2013 drafted by the Centre for Internet and Society</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society is announcing an Open Call for Comments to the CIS Privacy Protection Bill 2013.  &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In early 2013 the Centre for Internet and Society drafted the Privacy (Protection) Bill 2013 as a citizen’s version of privacy legislation for India. The Privacy (Protection) Bill, 2013 seeks to protect privacy by regulating (i) the manner in which personal data is collected, processed, stored, transferred and destroyed — both by private persons for commercial gain and by the state for the purpose of governance; (ii) the conditions upon which, and procedure for, interceptions of communications — both voice and data communications, including both data-in-motion and data-at-rest — may be conducted and the authorities permitted to exercise those powers; and, (iii) the manner in which forms of surveillance not amounting to interceptions of communications — including the collection of intelligence from humans, signals, geospatial sources, measurements and signatures, and financial sources — may be conducted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society has been collecting comments to the Privacy Protection Bill since April 2013 with the intention of submitting the Bill to the Department of Personnel and Training as a citizen’s version of a privacy legislation for India.  If you would like to submit comments on the Privacy Protection Bill to be included as part of the Centre for Internet and Society’s submission to the Department of Personnel and Training, please email comments to &lt;a href="mailto:bhairav@cis-india.org"&gt;bhairav@cis-india.org&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-february-2014.pdf" class="internal-link"&gt;Download the latest version of the Privacy Protection Bill&lt;/a&gt;&lt;/b&gt; (February 2014)&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments'&gt;https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-open-call-for-comments&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-25T05:38:27Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy">
    <title>CIS Welcomes 52nd Report on Cyber Crime, Cyber Security, and Right to Privacy </title>
    <link>https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy</link>
    <description>
        &lt;b&gt;The “Fifty Second Report on Cyber Crime, Cyber Security, and Right to Privacy” issued by the 2013 -2014 Standing Committee on Information Technology on February 12th 2014, highlights the urgent need for reform in India’s cyber security framework and the need for the much awaited privacy legislation to be finalized and made into a law. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;a class="external-link" href="http://164.100.47.134/lsscommittee/Information%20Technology/15_Information_Technology_52.pdf"&gt;&lt;b&gt;Read the Fifty-Second Report on Cyber Crime, Cyber Security and Right to Privacy released by the Department of Electronics and Information Technology&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The Report consists of questions on the state of cyber security, cyber crime, and privacy posed by the Standing Committee and briefings and evidence provided by the Department of Electronics and Information Technology (DEITY ) in reply. The Report concludes with recommendations from the Standing Committee on the way forward. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report represents an important step forward in the realm of privacy and cyber security in India as the evidence provided by DEITY  clarifies a number of aspects of India’s present and upcoming cyber security policies and practices. Furthermore, the recommendations by the Standing Committee highlight present gaps and inadequacies in India’s policies and practices and needed steps forward– particularly the need for a privacy legislation in India in the context of cyber security, increased transactions of sensitive data, and governmental projects like the Unique Identification Project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Broadly, the Standing Committee sought input from DEITY  on eight different aspects of cyber crime, cyber security, and privacy in India - namely:  the growing incidents of cyber crime and resulting financial loss, the challenges and constraints of cyber crime,  the role of relevant governmental organizations in India with respect to cyber security, preparedness and policy initiatives, cyber security and the right to privacy, monitoring and grievance redressal mechanism, and education and awareness initiatives. The evidence provided by DEITY  sheds light on the present mindset of the Government at this time, upcoming policies, and capacity and infrastructure gaps in India’s cyber security framework.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society appreciates the Report and we would like to highlight and emphasize the following aspects:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Need for a privacy legislation and inadequacy of privacy provisions in Information Technology Act&lt;/b&gt;: When asked by the Standing Committee about the right to privacy and cyber security, DEITY  highlighted the fact that the Information Technology Act contains sufficient safeguards for privacy, and added that the Department of Personnel and Training (DoPT) is in the process of developing a privacy legislation that will address the general concerns of privacy in the country, and thus the two together will be sufficient. DEITY  also noted that no study on the extent of privacy breach due to cyber crime in India has been conducted. In their recommendations, the Standing Committee noted that it was unhappy that the Government has yet to institute a legal framework on privacy, as the increased transfer of sensitive data and projects like the UID leave citizens vulnerable to privacy violations . Significantly, the Standing Committee recommended that though the DoPT is currently responsible for drafting the Privacy Bill, DEITY  should coordinate with the DoPT and become involved in the process. &lt;br /&gt;&lt;br /&gt;As recognized by the Standing Committee, the Centre for Internet and Society would like to  further emphasize the inadequacy of the provisions relating to privacy in the Information Technology Act, and the need for a privacy legislation in India.  Inadequate aspects of the provisions have been pointed out by a number of sources. For example:&lt;/p&gt;
&lt;ol&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;The Report of the Group of Experts on Privacy&lt;/a&gt;: Prepared by the committee chaired by Justice AP Shah &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://ec.europa.eu/justice/policies/privacy/docs/studies/final_report_india_en.pdf"&gt;First Analysis of the Personal Data Protection Law in India&lt;/a&gt;: Prepared by the University of Namur for the Commission of the European Communities Directorate General for Justice, Freedom, and Security&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011" class="external-link"&gt;Comments on the Information Technology&lt;/a&gt; (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011: Prepared by the Centre for Internet and Society and submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;a class="external-link" href="http://papers.ssrn.com/sol3/papers.cfm?abstract_id=1964013"&gt;India’s U-Turns on Data Privacy&lt;/a&gt;: Prepared by Graham Greenleaf for the Privacy Laws &amp;amp; Business International Report, Issues 110 -114, 2011 &lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Unclear Enforcement of 43A and associated rules&lt;/b&gt;: In evidence provided, DEITY, while discussing section 43A and the associated Rules, noted that the Data Security Council of India and empanelled security auditors through CERT-in are responsible for the ‘auditing of best practice’s (pg 24).  The Standing Committee did not directly respond to this comment.&lt;br /&gt;&lt;br /&gt;The Centre for Internet and Society would like to point out that DEITY did not clearly state that DSCI and the auditors through CERT-in were responsible for auditing organizational security practices for compliance with 43A. Furthermore, there is no publicly available information regarding audits ensuring compliance with 43A or information about the number of companies  that have been found to be compliant.  The Centre for Internet and Society would like to encourage that this information be made public, and compliance with 43A be enforced at the organizational level.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;UIDAI not in compliance with 43A and associated Rules&lt;/b&gt;:  In evidence provided, DEITY  noted that &lt;i&gt;“..Section 43A and the rules published under that Section cover the entire privacy in case of digital data. These are being followed by UIDAI also and other organisations...”&lt;/i&gt; (pg.46) In their recommendations the Standing Committee did not directly address this comment, but did emphasize the need for a privacy legislation in light of the UID scheme.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society appreciates that the Standing Committee raised concern about the privacy implications of the UID project. We would like to highlight that the UIDAI is not a Body Corporate, and is not in compliance with 43A or the subsequent Rules in the Information Technology Act. Furthermore, the UID project involves the handling and processing of data in analogue and digital formats, and thus the privacy protections found under 43A are not sufficient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The potential harms of metadata&lt;/b&gt;: In evidence provided, the Department noted  &lt;i&gt;“...we have been assured that whatever data has been gathered by them for surveillance relates only to the metadata..but we expressed that any incursion into the content will not be tolerated and is not tolerable from the Indian stand and point of view.”&lt;/i&gt; (pg.47) The Standing Committee did not respond directly to this comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society would like to thank the Standing Committee for noting that the Government should have taken prior steps to preventing such an interception from taking place and for recommending the Department to take develop a policy to prevent future instances of interception from taking place. The Centre for Internet and Society would like to emphasize the importance and potential sensitive nature of metadata. Metadata can, and often does, disclose more about an individual or an activity than the actual content. For example, metadata can reveal identity, behaviour patterns, associations, and can enable the mapping of location and individual movement. As such, the Centre for Internet and Society would recommend that the Government of India treat access to all information generated by individual and governmental communications as sensitive and confidential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Inadequacy of the Information Technology Act&lt;/b&gt;: When asked by the Standing Committee if the Information Technology Act provided sufficient legal safeguards for cyber security and cyber crime, DEITY  highlighted the fact that the Information Technology Act 2000 addresses all aspects of cyber crime in a comprehensive manner.  DEITY  also pointed out that the National Cyber Security Policy 2013 has provisions to enable the development of a legal framework, and the Department of Personnel and Training  is in the process of drafting a privacy legislation for India that will fill any gaps that exist. In their recommendations, the Standing Committee recognized that the Information Technology Act does contain provisions that address cyber security and cyber crime, but, especially in the recent controversy over section 66A of the Act, Standing Committee emphasized the need for periodical reviews of the IT Act.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society appreciates the fact that the Committee recognized the need for periodical review of the Information Technology Act, particularly in light of the controversy over 66 A. The Centre for Internet and Society would like to underscore the problems associated with 66A and would like to highlight that with regards to privacy and cyber security, the IT Act is not adequate and falls short in a number of areas. Research that the Centre for Internet and Society has conducted explaining these weaknesses can be found through the below links:&lt;/p&gt;
&lt;ol&gt;
&lt;li&gt;Breaking Down Section 66A of the IT Act&lt;/li&gt;
&lt;li&gt;Short note on IT Amendment Act, 2008&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Implications of domestic servers&lt;/b&gt;:  In response to questions posed by the Standing Committee about security risks associated with the importation of electronics and IT products, as well as the hosting of servers outside the country, DEITY  noted the security risk of using foreign infrastructure and pointed to the hosting of servers in India as a solution to protecting the security and privacy of Indian data. The Standing Committee supported this initiative, and encouraged DEITY  to take further steps towards securing and protecting the privacy of Indian data through the hosting of servers for critical sectors within India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society appreciates the fact that the Standing Committee carefully limited the recommendation of locating servers in India to those in critical sectors, but would caution the Government of potential implications on users ability to freely access content and services, and highlight the fact that localization of servers is not a security solution in itself as a comprehensive solution and hardening of critical assets against cyber attacks is essential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Incorporation of safeguards into MOU’s for international cooperation&lt;/b&gt;: When asked about MOU’s for international cooperation that DEITY  has engaged in with other countries, DEITY  reported that currently CERT-in is entering into a number of MOU’s with other countries to facilitate cooperation for cyber security purposes. Presently there are MOUs with the US, Japan, South Korea, Mauritius, Kasakhstan, Finland, and the Canada Electronics and ICT sector. DEITY  is also seeking MOUs with Malaysia, Israel, Egypt, Canada, and Brazil. The Standing Committee supported  India entering into MOU’s for purposes of international cooperation, and encouraged DEITY  to continue entering into MOU’s to mitigate jurisdictional complications when seeking to address issues related to cyber security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society recognizes the importance of international cooperation when handling issues related to cyber security and cyber crime. To ensure that this process is in line with human rights, the Centre for Internet and Society would encourage DEITY  to ensure that all MOU’s and/or  Mutual Legal Assistance Agreements:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;Uphold the principle of dual criminality &lt;/li&gt;
&lt;li&gt;Apply the highest level of protection for individuals in the case where the laws of more than one state could apply to communications surveillance &lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Are not used by any party involved to circumvent domestic legal restrictions on communications surveillance.&lt;/li&gt;
&lt;li&gt;Are clearly documented and publicly available&lt;/li&gt;
&lt;li&gt;Contain provisions guaranteeing  procedural fairness.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt; &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Hactivism as a benefit to society&lt;/b&gt;: In evidence provided on page 14, DEITY, among other elements, referred to Hactivism as a societal challenge to securing cyber security and tackling cyber crime. The Standing Committee did not directly address this comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Internet and Society would like to point out that hacktivism is a complex topic and consists of methods. Though some methods used by hacktivists are illegal, and some use hacktivism for censorship purposes and to target certain groups, other forms of hacktivism  can benefit society and strengthen cyber security by  finding and revealing vulnerabilities in a system, and bringing attention to illegal or violative practices.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This works towards ensuring that a system is adequately secure. Because of the dynamic nature of hacktivism, the Centre for Internet and Society believes that hacktivism needs to be evaluated on a case by case basis and the Government should not broadly label hacktivism as a challenge to cyber security and cyber crime.&lt;a href="#fn2" name="fr2"&gt;[2] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Importance of the anonymous speech: In evidence provided, DEITY noted the threat to cyber security that the anonymous nature of the internet posed. This was reiterated by the Standing Committee in their recommendations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While recognizing the potential threat to cyber security that the anonymous nature of the internet can pose, the Centre for Internet and Society would like to highlight the importance of anonymous speech online to an individual’s right to free expression.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Conclusion&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Recognizing the direct connection between a strong privacy framework and a strong cyber security framework, as security cannot be achieved without privacy, and recognizing the need for a privacy legislation in light of governmental projects like the UID,  the Centre for Internet and Society welcomes &lt;i&gt;the Fifty Second Report on Cyber Crime, Cyber Security, and the Right to Privacy&lt;/i&gt; and echoes the Standing Committees recommendation and emphasis on the need for a comprehensive privacy legislation to be passed in India.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. These safeguards are reflected in the principle of “safeguards for International Cooperation” found in the International Principles on the Application of Human Rights to Communications Surveillance”  &lt;a class="external-link" href="https://en.necessaryandproportionate.org/text"&gt;https://en.necessaryandproportionate.org/text&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. For more information about hacktivism see: Activism, Hacktivism, and Cyberterrorism. The Internet as a Tool for Influencing Foreign Policy. By Dorothy E. Denning. Georgetown University. Available at: &lt;a class="external-link" href="http://www.iwar.org.uk/cyberterror/resources/denning.htm"&gt;http://www.iwar.org.uk/cyberterror/resources/denning.htm&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy'&gt;https://cis-india.org/internet-governance/blog/cis-welcomes-fifty-second-report-on-cyber-crime-cyber-security-right-to-privacy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>elonnai</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-24T10:49:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/calcutta-hc-strengthens-whistle-blower-protection">
    <title>Calcutta High Court Strengthens Whistle Blower Protection</title>
    <link>https://cis-india.org/internet-governance/blog/calcutta-hc-strengthens-whistle-blower-protection</link>
    <description>
        &lt;b&gt;Calcutta High Court has ordered for protection of whistle blower's privacy in its November 20, 2013 order. The court has directed the government to accept RTI applications without the applicant's personal details.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In the absence of any law for the protection of whistle-blowers in the country, exposing the rampant corruption in our public institutions has become a hazardous occupation, with reports of threat and intimidation and even incidents of murder of whistle-blowers commonplace.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; With the Whistle blower’s Protection Bill in abeyance and without any strict laws protecting the identities of the whistle-blowers who challenge such a corrupt system, even the mechanisms like the Right to Information Act which are meant to safeguard against systemic abuse and ensure transparency are being severely undermined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For this reason, the Calcutta High Court’s affirmation of whistle-blowers’ privacy and identity protection is an important development. Through its order on the 20th of November, 2013, the Calcutta High Court held that for the purposes of section 6(2), which requires an application to the Public Information Officer to provide contact details of the applicant, it is sufficient in such application to disclose only the post-box number of the applicant. The court directed the Government to accept RTI applications without personal details or detailed whereabouts, when a post-box number or sufficient detail has been provided to establish contact between the whistle-blower and the authority. However if a public authority has any difficulty contacting the applicant through the Post Box No. the applicant may be asked to provide other contact details. The court further directed that personal details of applicants are not to be posted on the authorities’ websites.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The order, which was notified by the Government last week, ensures to some extent the protection of a whistle-blowers identity, and reduces the chances of the RTI being undermined by threats or acts of violence by those who are a part of the corrupt system, against persons exercising their right to information. However, its implementation is liable to be contingent on the authorities’ interpretation of when it would be “difficult” to establish contact between the authority and the applicant. Certain practical difficulties could also undermine the actual impact of the order, such as the fact that many applications are sent through registered or speed post, which cannot be mailed to a post-box number, especially since ordinary post cannot be tracked online like speed or registered post.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Developing a system in which ordinary citizens do not have to fear retaliation for exposing corruption requires a comprehensive legislation protecting whistle-blowers identities and ensuring data security. However, the important message this judgement sends out is that the judiciary is still committed to protecting whistle-blowers, in lieu of the government’s actions. This is a particularly important stance taken by the Court, considering the Supreme Court in the past has refused to frame guidelines for whistle-blower protection, citing the imperative in enacting a whistle-blower legislation to be the Parliament’s.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A full text of the judgement is &lt;a class="external-link" href="http://sartian.org/media/k2/attachments/DOPT_CIR_8_JAN.pdf"&gt;available here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;].Whistleblower shot dead in Bihar, THE HINDU, available at http://www.thehindu.com/news/national/whistleblower-shot-dead-in-bihar/article4542293.ece; Tamil Nadu Whistleblower alleges death threats; Silence from Government, NDTV, available at http://www.ndtv.com/article/india/tamil-nadu-whistleblower-alleges-death-threats-silence-from-govt-410450.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Indian Postal Tracking Portal, &lt;a class="external-link" href="http://www.indiapost.gov.in/tracking.aspx"&gt;http://www.indiapost.gov.in/tracking.aspx&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Supreme Court refuses to frame guidelines for protection of whistleblowers, Daily News and Analysis, &lt;i&gt;available at &lt;/i&gt;http://www.dnaindia.com/india/report-supreme-court-refuses-to-frame-guideline-for-protection-of-whistleblowers-1525622.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/calcutta-hc-strengthens-whistle-blower-protection'&gt;https://cis-india.org/internet-governance/blog/calcutta-hc-strengthens-whistle-blower-protection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-24T06:38:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon">
    <title>Counter Surveillance Panel: DiscoTech &amp; Hackathon</title>
    <link>https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon</link>
    <description>
        &lt;b&gt;We invite you to a Counter Surveillance DiscoTech and Hackathon at the Centre for Internet and Society in Bangalore on Saturday, March 1, 2014 (9.00 a.m. to 5.00 p.m.). The event is being co-organized by the Centre for Internet and Society in tandem with the MIT Centre for Civic Media Co-Design Lab, with support from members of Tactical Technology Collective, Hackteria.org and Srishti School of Art Design and Technology. Registrations begin at 9.00 a.m. The event shall close with a featured talk by renown information activist and maker lab innovator Smari McCarthy, titled "Privacy for Humanity" at 5.00 p.m.&lt;/b&gt;
        &lt;h2&gt;Overview&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Mirroring the call by MIT Civic Media Lab &lt;a href="http://codesign.mit.edu/discotechs/"&gt;Co-Design Studio&lt;/a&gt;, this event brings together  students, technologists, designers and citizens to explore counter-surveillance strategies. The event will be held simultaneously across various locations including Boston, Palestine, Lisbon and Buenos Aires. Click here for the definition of &lt;a href="http://codesign.mit.edu/discotechs/"&gt;DiscoTech&lt;/a&gt;.(Discovering Technology)&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Agenda&lt;/h2&gt;
&lt;p class="Default" style="text-align: justify; "&gt;We shall begin with brief contextualized introductions catalyzed by researchers in the field of privacy &amp;amp; surveillance, followed by workshops and hackathons led by expert practitioners. Participants are welcome from diverse backgrounds looking to be involved in designing engaging and creative ways to counter surveillance. The event shall close with a featured talk by renown information activist and maker lab innovator &lt;a href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy"&gt;&lt;b&gt;Smari McCarthy&lt;/b&gt;&lt;/a&gt; , titled "&lt;b&gt;Privacy for Humanity&lt;/b&gt;" at 5.00 p.m.&lt;/p&gt;
&lt;h3 class="Default" style="text-align: justify; "&gt;Introductory Catalyst Sessions&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Malavika Jayaram&lt;/b&gt;: Fellow at &lt;a class="external-link" href="http://cyber.law.harvard.edu/people/mjayaram"&gt;Berkman Center for Internet and Society at Harvard University&lt;/a&gt; and the &lt;a class="external-link" href="http://www.cis-india.org/"&gt;Centre for Internet and Society, Bangalore&lt;/a&gt;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Laird Brown&lt;/b&gt;: DesiSec Project at the &lt;a href="https://cis-india.org/" class="external-link"&gt;Centre for Internet and Society, Bangalore&lt;/a&gt; and University of Toronto&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Kaustubh Srikant&lt;/b&gt;: Head of Technology, &lt;a class="external-link" href="https://tacticaltech.org/kaustubh-srikanth-head-technology"&gt;Tactical Technology Collective&lt;/a&gt; and &lt;b&gt;Maya Indira Ganesh&lt;/b&gt; (Program Director)&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Abhay Raj Naik&lt;/b&gt;: Assistant Professor,&lt;a class="external-link" href="http://www.azimpremjiuniversity.edu.in/abhayraj-naik"&gt; Azim Premji University&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Design and Hackathon Lead Catalysts&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;a href="http://hackteria.org/?p=278"&gt;&lt;b&gt;Yashas&lt;/b&gt;&lt;/a&gt;&lt;a href="http://hackteria.org/?p=278"&gt;&lt;b&gt; &lt;/b&gt;&lt;/a&gt;&lt;a href="http://hackteria.org/?p=278"&gt;&lt;b&gt;Shetty&lt;/b&gt;&lt;/a&gt;:Faculty@ &lt;a href="http://www.srishti.ac.in/"&gt;www.srishti.ac.in&lt;/a&gt; and Co-Founder &lt;a href="http://www.hackteria.org/"&gt;Hackteria.org&lt;/a&gt; (DNA Spoofing, Surveillance Camera:  Avoidance, Microscopic Re-Appropriation &amp;amp; Bacterial Discotheque)&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Hari Dilip Kumar&lt;/b&gt;: Co, Founder, &lt;a class="external-link" href="http://www.fluxgentech.com/people"&gt;FluxGen&lt;/a&gt;: (Introducing data transmission protocols, Software Defined Radio (SDR) design and surveillance detection )&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;&lt;b&gt;Sharath Chandra Ram&lt;/b&gt;: Researcher @ CIS &lt;a class="external-link" href="http://dorkbot.org/dorkbotbangalore/"&gt;Open Lab&lt;/a&gt; and Faculty@&lt;a class="external-link" href="http://www.srishti.ac.in/"&gt;Srishti&lt;/a&gt; (Civic Media solutions using open citizen networks and the web, spectrum scanning, visual communication design strategies, finger print mash-up publishing) &lt;/li&gt;
&lt;/ul&gt;
&lt;h3 style="text-align: justify; "&gt;Featured Talk and Interactive Closing Session by &lt;a class="external-link" href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy"&gt;Smari McCarthy&lt;/a&gt;&lt;b&gt;&lt;a class="external-link" href="http://en.wikipedia.org/wiki/Sm%C3%A1ri_McCarthy"&gt; &lt;/a&gt;&lt;/b&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;(Executive Director, International Modern Media Institute and Founder, Icelandic Pirate Party &amp;amp; Icelandic Digital Freedom Society)&lt;/b&gt;&lt;b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;&lt;b&gt;Title of Talk: PRIVACY for HUMANITY - 5.00 p.m.&lt;br /&gt;&lt;/b&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/counter-surveillance.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;b&gt;&lt;a href="https://cis-india.org/internet-governance/blog/counter-surveillance.pdf" class="internal-link"&gt;Click to download the flyer invite&lt;/a&gt;&lt;/b&gt;&lt;br /&gt;Date: Saturday, March 1, 2014&lt;br /&gt;Time: 9.00 a.m. to 5.00 p.m. (Registration 9.00 a.m. sharp)&lt;br /&gt;Venue: Centre for Internet and Society, Bangalore&lt;br /&gt;Map : &lt;a href="http://bit.ly/1fcDDLG"&gt;http://&lt;/a&gt;&lt;a href="http://bit.ly/1fcDDLG"&gt;bit.ly&lt;/a&gt;&lt;a href="http://bit.ly/1fcDDLG"&gt;/1fcDDLG&lt;/a&gt;&lt;b&gt;&lt;br /&gt;&lt;/b&gt;&lt;a href="mailto:sharath@cis-india.org"&gt;&lt;br /&gt;&lt;/a&gt;&lt;i&gt;Please RSVP due to limited space and logistics for lunch and refreshments&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon'&gt;https://cis-india.org/events/counter-surveillance-panel-disco-tech-hackathon&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-28T05:36:15Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-day-we-fight-back-against-mass-surveillance">
    <title>February 11: The Day We Fight Back Against Mass Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/the-day-we-fight-back-against-mass-surveillance</link>
    <description>
        &lt;b&gt;The expansive surveillance being perpetuated by governments and corporations is the single biggest threat to individual liberties in the digital age.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The expanding scope and extent of massive data collection and surveillance undertaken by bodies like the USA’s National Security Agency compromises our privacy and stifles our freedom of speech and expression in its most vital public spheres, affecting the civil liberties of citizens of countries all across the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The previous year has been a watershed year for reclaiming the internet as a free and open space, primarily through the exposure of the unwarranted systems of surveillance that threaten it, by whistle-blowers like Edward Snowden and WikiLeaks. Despite all these efforts, they have only managed a dent in the surveillance regimes, which continue unbridled, with the protection of the state and the surveillance industry. The future of a free internet depends upon the systematic challenge of these programs by the millions of internet users they affect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;February 11, 2014&lt;/b&gt; is the day we fight back against mass surveillance. Organized by the Electronic Frontier Foundation, and supported by thousand of organizations like Mozilla and the Centre for Internet and Society, on this day of action, citizens around the world will demand an end to these programs that threaten the freedom of the internet. You can support this cause by signing and supporting the 13 Principles (&lt;a class="external-link" href="https://en.necessaryandproportionate.org/text"&gt;International Principles on the Application of Human Rights to Communications Surveillance&lt;/a&gt;), and contacting your local media, petitioning your local legislators and telling your friends and colleagues about the topic. Publicizing the movement and creating a buzz around it will help spread the message to many others across the internet. Do anything that will make the fight more visible and viable, such as organizing or attending public lectures, or creating tools or memes or art to spread information. For more ways in which you can contribute, and more information on the event, visit the &lt;a class="external-link" href="https://thedaywefightback.org/"&gt;website&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The users of the internet deserve a free and open internet and deserve and end to mass surveillance. If we can make enough noise, make enough of an impact, we can greatly bolster the movement for reclaiming the internet.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-day-we-fight-back-against-mass-surveillance'&gt;https://cis-india.org/internet-governance/blog/the-day-we-fight-back-against-mass-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divij</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-14T06:00:05Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/business-bhutan-vol-5-issue-4-lucky-wangmo-pema-seldon-is-bhutan-selling-its-soul-to-google">
    <title>Is Bhutan selling its soul to Google?</title>
    <link>https://cis-india.org/news/business-bhutan-vol-5-issue-4-lucky-wangmo-pema-seldon-is-bhutan-selling-its-soul-to-google</link>
    <description>
        &lt;b&gt;Migrating Bhutan government’s communications to Google servers, allowing the United States access to confidential data, raises questions&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;"Bhutan’s adoption of Google Apps is a disastrous decision, and I wouldn’t advocate for it even if it were free," Pranesh Prakash, Policy Director of the Bangalore-based Centre for Internet and Society said.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;He added that the project would end up tying Bhutan to a single vendor, Google, since there is no easy way to migrate from Google Apps to another system. "That means that even if in the future some other system is found to be far better than Google, the migration costs would deter the adoption of that system," said Pranesh Prakash, who is also a fellow with the Information Society Project, Yale Law School.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article by Lucky Wangmo from Thimphu and Pema Seldon form Bangalore was published in Business Bhutan on January 25, 2014. Download Volume 5, Issue 4, NU 15 &lt;a href="https://cis-india.org/internet-governance/blog/bhutan-google.pdf" class="internal-link"&gt;published by Business Bhutan here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/business-bhutan-vol-5-issue-4-lucky-wangmo-pema-seldon-is-bhutan-selling-its-soul-to-google'&gt;https://cis-india.org/news/business-bhutan-vol-5-issue-4-lucky-wangmo-pema-seldon-is-bhutan-selling-its-soul-to-google&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-01-30T12:27:33Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-hindu-january-29-2014-chinmayi-arun-making-the-powerful-accountable">
    <title>Making the Powerful Accountable</title>
    <link>https://cis-india.org/internet-governance/blog/the-hindu-january-29-2014-chinmayi-arun-making-the-powerful-accountable</link>
    <description>
        &lt;b&gt;If powerful figures are not subjected to transparent court proceedings, the opacity in the face of a critical issue is likely to undermine public faith in the judiciary.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Chinmayi Arun's Op-ed was &lt;a class="external-link" href="http://www.thehindu.com/opinion/op-ed/making-the-powerful-accountable/article5627494.ece"&gt;published in the Hindu&lt;/a&gt; on January 29, 2014.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It is odd indeed that the Delhi High Court seems to believe that sensational media coverage can sway the Supreme Court into prejudice against one of its own retired judges. Justice Manmohan Singh of the Delhi High Court has said in &lt;i&gt;Swatanter Kumar v. Indian Express and others&lt;/i&gt; that the pervasive sensational media coverage of the sexual harassment allegations against the retired Supreme Court judge 'may also result in creating an atmosphere in the form of public opinion wherein a person may not be able to put forward his defence properly and his likelihood of getting fair trial would be seriously impaired.'  This Delhi High court judgment has drawn upon the controversial 2011 Supreme Court judgment in &lt;i&gt;Sahara India Real Estate Corp. Ltd v. SEBI&lt;/i&gt; (referred to as the Gag Order case here) to prohibit the media from publishing headlines connecting retired Justice Swatanter Kumar with the intern's allegations, and from publishing his photograph in connection with the allegations.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although the Gag Order judgment was criticised at the time that it was delivered &lt;i&gt;Swatanter Kumar v. Indian Express&lt;/i&gt; illustrates its detractors' argument more vividly that anyone could have imagined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sukumar Muralidharan wrote of Gag Order case that the postponement (of media coverage) order remedy that it created, could become an "instrument in the hands of wealthy and influential litigants, to subvert the course of open justice".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Here we find that although a former Supreme Court judge is pitted against a very young former intern within a system over which he once presided, Justice Manmohan Singh seems to think that it is the judge who is danger of being victimised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Swatanter Kumar judgment was enabled by both the Gag Order case as well as the 1966 Supreme Court judgment in &lt;i&gt;Naresh Sridhar Mirajkar v. State of Maharashtra&lt;/i&gt;, which in combination created a process for veiling court proceedings. Naresh Mirajkar stated that courts' inherent powers extend to barring media reports and comments on ongoing trials in the interests of justice, and that such powers do not violate the right to freedom of speech; and the Gag Order case created an instrument - the 'postponement order' - for litigants, such that they can have media reports of a pending case restricted. The manner in which this is used in the Swatanter Kumar judgment raises very worrying questions about how the judiciary views the boundaries of the right to freedom of expression, particularly in the context of reporting court proceedings.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Broad power to restrict reporting&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Gag Order case was problematic: it used arguments for legitimate restraints on media reporting in exceptional circumstances, to permit restrictions on media reporting of court proceedings under circumstances 'where there is a real and substantial risk of prejudice to fairness of the trial or to proper administration of justice'.  The Supreme Court refused to narrow this or clarify what publications would fall within this category. It merely stated that this would depend on the content and context of the offending publication, and that no 'straightjacket formula' could be created to enumerate these categories. This leaves higher judiciary with a broad discretionary power to decide what amounts to&lt;br /&gt;legitimate restraints on media reporting, using an ambiguous standard. Exercise of this power to veil proceedings involving powerful public figures whose actions have public implications, imperils openness and transparency when they are most critical.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Court proceedings are usually open to the public. This openness serves as a check on the judiciary, and ensures public faith in the judiciary. In countries as large as ours, media coverage of important cases ensures actual openness of court proceedings - we are able to follow the arguments made by petitioners who ask that homosexuality be decriminalised, the trial of suspected terrorists and alleged murderers, and the manner in which our legal system handles sexual harassment complaints filed by young women.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;When court proceedings are closed to the public (known as 'in-camera' trials) or when media dissemination of information about them is restricted, the openness and transparency of court proceedings is compromised. Such compromise of transparency does take place in many countries, to protect the rights of the parties involved, or prevent miscarriage of justice. For example, child-participants are protected by holding trials in-camera; names of parties to court proceedings are withheld to protect their privacy sometimes; and in countries where juries determine guilt, news coverage that may prejudice the jury is also restricted.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The damage done&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Although the Supreme Court stated in principle that the openness of court proceedings should only be restricted where strictly necessary, this appears to lend itself to very varied interpretation. For example, it is very difficult for some of us to understand why it was strictly necessary to restrict media coverage of sexual harassment proceedings in the Swatanter Kumar case. J. Manmohan Singh on the other hand seems to believe that the adverse public opinion will affect the retired judge's chance of getting a fair trial. His judgment also seems to indicate his concern that the sensational headlines will impact the public confidence in the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Delhi High Court's apprehension about the effects of the newspaper coverage on the reputation of the judge did not need to translate into a prior restraint on media coverage. They may better have been addressed later, by evaluating a defamation claim pertaining to published material. The larger concerns about the reputation of the judiciary are better addressed by openness: if powerful public figures, especially those with as much influence as a former Supreme Court judge are not subjected to transparent court proceedings, the opacity in the face of such a critical issue is likely to undermine public faith in the judiciary as an institution.Such opacity undermines the purpose of open courts. It is much worse for the reputation of the judiciary than publicised complaints about individual judges.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the Delhi High Court ruling, there has been little media coverage of the sexual harassment case. Suppression of media coverage leaves the young woman comparatively isolated. Wide coverage of the harassment complaint involving Justice Ganguly, helped the intern in that case find support. The circulation of information enabled other former interns as well as a larger network of lawyers and activists, reach out to her. This is apart from the general pressure to be fair that arises when a case is being followed closely by the public. Media coverage is often critical to whether someone relatively powerless is able to assert her rights against a very powerful person. This is why media freedom is sacred to democracies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If the Supreme Court was confident that the high courts in India would use their broad discretionary power under the Gag Order case sparingly and only in the interests of justice, the Swatanter Kumar case should offer it grounds to reconsider.  Openness and freedom of expression are not meant to be diluted to protect the powerful - they exist precisely to ensure that even the powerful are held accountable by state systems that they might otherwise be able to sway.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(Chinmayi Arun is research director, Centre for Communication  Governance, National Law University, Delhi, and fellow, Centre for  Internet and Society, Bangalore.)&lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-hindu-january-29-2014-chinmayi-arun-making-the-powerful-accountable'&gt;https://cis-india.org/internet-governance/blog/the-hindu-january-29-2014-chinmayi-arun-making-the-powerful-accountable&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>chinmayi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Transparency and Accountability</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Openness</dc:subject>
    

   <dc:date>2014-01-30T06:43:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/data-privacy-day-chenna-2014">
    <title>TACTIS Symposium 2014</title>
    <link>https://cis-india.org/news/data-privacy-day-chenna-2014</link>
    <description>
        &lt;b&gt;Tata Consultancy organized the TACTIS Symposium at TCS Siruseri, Chennai on January 28 and 29, 2014. Sunil Abraham participated in the event and gave the key note address.&lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/data-privacy-day-chennai.pdf" class="internal-link"&gt;Click to download the event brochure here&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/data-privacy-day-chenna-2014'&gt;https://cis-india.org/news/data-privacy-day-chenna-2014&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-02-04T07:32:01Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>




</rdf:RDF>
