<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 841 to 855.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-round-table-mumbai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-round-table-chennai"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system">
    <title>Indian Government Quietly Brings In Its 'Central Monitoring System': Total Surveillance Of All Telecommunications</title>
    <link>https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system</link>
    <description>
        &lt;b&gt;There's a worrying trend around the world for governments to extend online surveillance capabilities to encompass all citizens -- often justified with the usual excuse of combatting terrorism and/or child pornography.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;The blog post was &lt;a class="external-link" href="https://www.techdirt.com/articles/20130508/09302923002/indian-government-quietly-brings-its-central-monitoring-system-total-surveillance-all-communications.shtml"&gt;published in &lt;b&gt;tech dirt&lt;/b&gt;&lt;/a&gt; on June 8, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;The latest to join this unhappy club is India, which has put in place what sounds like &lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Government-can-now-snoop-on-your-SMSs-online-chats/articleshow/19932484.cms"&gt;a massively intrusive system&lt;/a&gt;, as this article from The Times of India makes clear:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;The government last month quietly began rolling out a  project that gives it access to everything that happens over India's  telecommunications network -- online activities, phone calls, text  messages and even social media conversations. Called the Central  Monitoring System, it will be the single window from where government  arms such as the National Investigation Agency or the tax authorities  will be able to monitor every byte of communication.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;This project has been under development for two years, but in almost total secrecy:  &lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;&lt;i&gt;"In the absence of a strong privacy law that promotes  transparency about surveillance and thus allows us to judge the utility  of the surveillance, this kind of development is very worrisome," warned  Pranesh Prakash, director of policy at the Centre for Internet and  Society. "Further, this has been done with neither public nor  parliamentary dialogue, making the government unaccountable to its  citizens."&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt; That combination of total surveillance and zero transparency is a  dangerous one, providing the perfect tool for monitoring and controlling  political and social dissent.  If India wishes to maintain its claim to  be "the world's largest democracy", its government would do well to  introduce some safeguards against abuse of the new system, such as  strong privacy laws, as well as engaging the Indian public in an open  debate about &lt;a href="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system"&gt;what exactly such extraordinary surveillance powers might be used for&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system'&gt;https://cis-india.org/news/tech-dirt-june-8-2013-indian-govt-quietly-brings-central-monitoring-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-02T09:12:49Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-round-table-mumbai">
    <title>Privacy Round Table, Mumbai</title>
    <link>https://cis-india.org/internet-governance/events/privacy-round-table-mumbai</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society cordially invites you to attend the "Privacy Round Table" in Mumbai on Saturday, June 15, 2013, 10.30 a.m. to 4.00 p.m., to discuss the "Report of the Group of Experts on Privacy" by the Justice A.P. Shah Committee, the text of the "Citizen's Privacy (Protection) Bill, 2013, drafted by the Centre for Internet and Society, and "Strengthening Privacy Protection through Co-Regulation" by DSCI.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Note: &lt;i&gt;Billy Hawkes, Irish Data Protection Commissioner will be attending and presenting at the Roundtable&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The discussions and recommendations from the meeting will be published into a compilation, and presented at the Internet Governance meeting planned for October 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013.pdf" class="external-link"&gt;The Privacy Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/strengthening-privacy-protection.pdf" class="internal-link"&gt;Strengthening Privacy Protection through Co-Regulation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-mumbai.pdf" class="internal-link"&gt;Click to see the brochure&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;&lt;/h3&gt;
&lt;h3 style="text-align: justify; "&gt;Draft Agenda for the Round Table Discussion&lt;/h3&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: The Report of the Group of Experts on Privacy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: Strengthening Privacy Protection through Co-regulation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.15 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.30 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: The Citizens Privacy (Protection) Bill, 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.15 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;14.15 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;In depth discussions: The Citizens Privacy (Protection) Bill, 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;16.15 &lt;br /&gt;&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;Please send your email confirmations for attending the Mumbai Privacy  Round Table on Saturday, June 15, 2013, to &lt;a class="mail-link" href="mailto:bernadette@cis-india.org"&gt;Bernadette Langle&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-round-table-mumbai'&gt;https://cis-india.org/internet-governance/events/privacy-round-table-mumbai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-06-11T08:48:46Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security">
    <title>Online privacy should not come at the cost of security: Sunil Abraham</title>
    <link>https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security</link>
    <description>
        &lt;b&gt;Sunil Abraham, Centre for Internet and Society’s executive director, on privacy laws and Internet penetration.&lt;/b&gt;
        &lt;p&gt;Anirban Sen's article was &lt;a class="external-link" href="http://www.livemint.com/Industry/xcmVySyl90ivZknOK9YIBI/Online-privacy-should-not-come-at-the-cost-of-security-Suni.html"&gt;published in LiveMint &lt;/a&gt;on May 19, 2013. Sunil Abraham is quoted.&lt;/p&gt;
&lt;div class="text" id="U191282072761AmC"&gt;
&lt;hr /&gt;
&lt;p class="text" style="text-align: justify; "&gt;The Centre for Internet and Society (CIS), a research thinktank that primarily focuses on issues of Internet governance, is pushing to revise the provisions of the Information Technology (IT) Act and make a stronger case for privacy laws and free speech in India, an issue that has caused widespread concern after the government tried to restrict access to more than a 100 websites last year with little justification.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We want to revise the IT Act...that’s the toughest one and that’s not going to happen very soon because the government is treating it like an ego battle now. They no longer listen to the others,” said &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Sunil Abraham"&gt;Sunil Abraham&lt;/a&gt;&lt;/span&gt;, executive director of CIS.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;The IT Act has been at the centre of debate, with some of its provisions such as Section 66A, which criminalizes “causing annoyance or inconvenience” online or electronically, coming under criticism from rights advocates for being too vague and subject to interpretation.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;CIS, which will complete five years on Monday and is organizing a four-day event focusing on issues such as cyber security, surveillance in India and privacy, said it also was working towards creating a privacy law for India within the next 3-4 years. India, which is estimated to have Internet penetration of just 10%, is the third-largest Internet market in the world.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We’re getting closer and closer to that (privacy law),” said Abraham, adding that privacy should not come at the cost of security.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;Over the past five years, Bangalore-based CIS has also been part of some government committees such as the Justice AP Shah Committee, which focused on privacy laws in India, and is also currently working on the country’s telecom policy. The non-government organization, which receives grants from international bodies such as the Wikimedia Foundation, has also worked on policies for the government of Iraq and is currently also doing policy work for the government of Burma.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“Five years ago we were making noise from outside the room, we were not inside any policy making space. That has also changed. From an organization that was mostly outside the room, we’re increasingly being trusted by our own government,” said Abraham, who was one of the most vocal critics of the government’s unique identification (UID) project when it was first launched. Abraham had raised concerns over its overtly broad scope and issues over privacy in the project.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;For CIS, one of the biggest achievements over the past five years was being part of the policy framework for the government of India’s draft national policy on open standards for e-governance, said Abraham, adding that the organization was working towards increasing Internet penetration in the country, especially in rural areas.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;“We’re hoping that every single mobile phone user in the country will become an Internet user. We’re planning for that future,” he said.&lt;/p&gt;
&lt;p class="text" style="text-align: justify; "&gt;The CIS event starting on Monday will include speakers such as legal researcher and advocate &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Lawrence Liang"&gt;Lawrence Liang&lt;/a&gt;&lt;/span&gt; and &lt;span class="person"&gt;&lt;a href="https://cis-india.org/Search/Link/Keyword/Vibodh Parthasarathi"&gt;Vibodh Parthasarathi&lt;/a&gt;&lt;/span&gt;, an associate professor at the Centre for Culture, Media and Governance at the Jamia Millia Islamia university. Both Liang and Parthasarathi are members of the board at CIS.&lt;/p&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security'&gt;https://cis-india.org/news/livemint-anirban-sen-may-19-2013-online-privacy-should-not-come-at-the-cost-of-security&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-11-02T02:27:12Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world">
    <title>Comparative Analysis of DNA Profiling Legislations from Across the World</title>
    <link>https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world</link>
    <description>
        &lt;b&gt;With the growing importance of forensic data in law enforcement and research, many countries have recognized the need to regulate the collection and use of forensic data and maintain DNA databases. Across the world around 60 countries maintain DNA databases which are generally regulated by specific legislations. Srinivas Atreya provides a broad overview of the important provisions of four different legislations which can be compared and contrasted with the Indian draft bill.

&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Efforts to regulate the collection and use of DNA data were started in India in 2007 by the Centre for DNA Fingerprinting and Diagnostics through their draft DNA Profiling Bill. Although the bill has evolved from its original conception, several concerns with regard to human rights and privacy still remain. The draft bill heavily borrows the different aspects related to collection, profiling and use of forensic data from the legislations of the United States, United Kingdom, Canada and Australia.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/comparative-analysis-dna-profiling-bill.xlsx" class="internal-link"&gt;&lt;b&gt;Click&lt;/b&gt; to find an overview of a comparative analysis of DNA Profiling Legislations&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world'&gt;https://cis-india.org/internet-governance/blog/comparative-analysis-of-dna-profiling-legislations-across-the-world&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>atreya</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:30:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting">
    <title>Report on the 3rd Privacy Round Table meeting</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting</link>
    <description>
        &lt;b&gt;This report entails an overview of the discussions and recommendations of the third Privacy Round Table meeting in Chennai, on 18th May 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In furtherance of Internet Governance multi-stakeholder Initiatives and Dialogue in 2013, the Centre for Internet and Society (CIS) in collaboration with the Federation of Indian Chambers of Commerce and Industry (FICCI), and the Data Security Council of India (DSCI), is holding a series of six multi-stakeholder round table meetings on “privacy” from April 2013 to August 2013. The CIS is undertaking this initiative as part of their work with Privacy International UK on the SAFEGUARD project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the CIS and DSCI were members of the Justice AP Shah Committee which created the “Report of Groups of Experts on Privacy”. The CIS has recently drafted a Privacy (Protection) Bill 2013, with the objective of contributing to privacy legislation in India. The CIS has also volunteered to champion the session/workshops on “privacy” in the meeting on Internet Governance proposed for October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the roundtables the Report of the Group of Experts on Privacy, DSCI´s paper on “Strengthening Privacy Protection through Co-regulation” and the text of the Privacy (Protection) Bill 2013 will be discussed. The discussions and recommendations from the six round table meetings will be presented at the Internet Governance meeting in October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dates of the six Privacy Round Table meetings are enlisted below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;New Delhi Roundtable: 13 April 2013&lt;/li&gt;
&lt;li&gt;Bangalore Roundtable: 20 April 2013&lt;/li&gt;
&lt;li&gt;Chennai Roundtable: 18 May 2013&lt;/li&gt;
&lt;li&gt;Mumbai Roundtable: 15 June 2013&lt;/li&gt;
&lt;li&gt;Kolkata Roundtable: 13 July 2013&lt;/li&gt;
&lt;li&gt;New Delhi Final Roundtable and National Meeting: 17 August 2013&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Following the first two Privacy Round Tables in Delhi and Bangalore, this report entails an overview of the discussions and recommendations of the third Privacy Round Table meeting in Chennai, on 18&lt;/span&gt;&lt;sup&gt;th&lt;/sup&gt;&lt;span&gt; May 2013.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span&gt;&lt;span&gt;&lt;b&gt;Overview of DSCI´s paper on ´Strengthening Privacy Protection through Co-Regulation´&lt;/b&gt;&lt;/span&gt;&lt;/span&gt;&lt;/h2&gt;
&lt;h2 style="text-align: justify; "&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy Round Table meeting began with an overview of the paper on “Strengthening Privacy Protection through Co-Regulation” by the Data Security Council of India (DSCI). In particular, the DSCI pointed out that although the IT (Amendment) Act 2008 lays down the data protection provisions in the country, it has its limitations in terms of applicability, which is why a comprehensive privacy law is required in India. The DSCI provided a brief overview of the Report of the Group of Experts on Privacy (drafted in the Justice AP Shah Committee) and argued that in light of the UID scheme, NATRGID, DNA profiling and the Central Monitoring System (CMS), privacy concerns have arisen and legislation which would provide safeguards in India is necessary. However, the DSCI emphasized that although they support the enactment of privacy legislation which would safeguard Indians from potential abuse, the economic value of data needs to be taken into account and bureaucratic structures which would hinder the work of businesses should be avoided.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DSCI supported the enactment of privacy legislation and highlighted its significance, but also emphasized that such a legal framework should support the economic value of data. The DSCI appeared to favour the enactment of privacy legislation as it would not only oblige the Indian government to protect individuals´ sensitive personal data, but it would also attract more international customers to Indian online companies. That being said, the DSCI argued that it is important to secure a context for privacy based on Indian standards, rather than on global privacy standards, since the applicability of global standards in India has proven to be weak. The privacy bill should cover all dimensions (including, but not limited to, interception and surveillance) and the misuse of data should be legally prevented and prohibited. Yet, strict regulations on the use of data could potentially have a negative effect on companies’ competitive advantage in the market, which is why the DSCI proposed a co-regulatory framework – if not self-regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In particular, the DSCI argued that companies should be obliged to provide security assurances to their customers and that regulation should not restrict the way they handle customers´ data, especially since customers &lt;i&gt;choose &lt;/i&gt;to use a specific service in every case. This argument was countered by a participant who argued that in many cases, customers may not have alternative choices for services and that the issue of “choice” and consent is complicated. Thus it was argued that companies should comply with regulations which restrict the manner with which they handle customers´ data. Another participant argued that a significant amount of data is collected without users´ consent (such as through cookies) and that in most cases, companies are not accountable in regards to how they use the data, who they share it with or how long they retain it. Another participant who also countered the co-regulatory framework suggested by the DSCI argued that regulations are required for smartphones, especially since there is currently very low accountability as to how SMS data is being used or shared. Other participants also argued that, in every case, individual consent should be acquired prior to the collection, processing, retention, and disclosure of data and that that individual should have the right to access his/her data and make possible corrections.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DSCI firmly supported its position on co-regulation by arguing that not only would companies provide security assurances to customers, but that they would also be accountable to the Privacy Commissioner through the provision of a detailed report on how they handle their customers´ data. Furthermore, the DSCI pointed out that in the U.S. and in Europe, companies provide privacy policies and security assurances and that this is considered to be adequate. Given the immense economic value of data in the Digital Age and the severe effects regulation would have on the market, the DSCI argued that co-regulation is the best solution to ensure that both individuals´ right to privacy and the market are protected.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on co-regulation proceeded with a debate on what type of sanctions should be applied to those who do not comply with privacy regulations. However, a participant argued that if a self-regulatory model was enforced and companies did not comply with privacy principles, the question of what would happen to individuals´ data would still remain. It was argued that neither self-regulation nor co-regulation provides any assurances to the individual in regards to how his/her data is protected and that once data is breached, there is very little that can be done to eliminate the damage. In particular, the participant argued that self-regulation and co-regulation provide very few assurances that data will not be illegally disclosed and breached. The DSCI responded to this argument by stating that in the case of a data breach, the both the Privacy Commissioner and the individual in question would have to be informed and that this issue would be further investigated. Other participants agreed that co-regulation should not be an option and argued that the way co-regulation would benefit the public has not been adequately proven.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The DSCI countered the above arguments by stating that the industry is in a better position to understand privacy issues than the government due to the various products that it produces. Industries also have better outreach than the Indian government and could enhance awareness to both other companies and individuals in terms of data protection, which is why the code of practice should be created by the industry and validated by the government. This argument was countered by a participant who stated that if the industry decides to participate in the enforcement process, this would potentially create a situation of conflict of interest and could be challenged by the courts in the future. The participant argued that an industry with a self-regulatory code of practice may be problematic, especially since there would be inadequate checks and balances on how data is being handled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another participant argued that the Indian government does not appear to take responsibility for the right to privacy, as it is not considered to be a fundamental human right; this being said, a co-regulatory framework could be more appropriate, especially since the industry has better insights on how data is being protected on an international level. Thus it was argued that the government could create high level principles and that the industry would comply. However, a participant argued that every company is susceptible to some type of violation and that in such a case, both self-regulation and co-regulation would be highly problematic. It was argued that, as any company could probably violate users´ data in some way down the line either way, self-regulation or co-regulation would probably not be the most beneficial option for the industry. This argument was supplemented by another participant who stated that co-regulation would mandate the industry and the Privacy Commissioner as the ultimate authorities to handle users´ data and that this could potentially lead to major violations, especially due to inadequate accountability towards users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Co-regulation was once again supported by the DSCI through the argument that customers &lt;i&gt;choose &lt;/i&gt;to use specific services and that by doing so, they should comply with the security measures and privacy policies provided. However, a participant asked whether other stakeholders should be involved, as well as what type of &lt;i&gt;incentives&lt;/i&gt; companies have in order to comply with regulations and to protect users´ data. Another participant argued that the very definition of privacy remains vague and that co-regulation should not be an option, since the industry could be violating individuals´ privacy without even realising it. Another issue which was raised is how data would be protected when many companies have servers based in other countries. The DSCI responded by arguing that checks and balances would be in place to deal with all the above concerns, yet a general consensus on co-regulation did not appear to have been reached.&lt;/p&gt;
&lt;h1 style="text-align: justify; "&gt;Discussion on the draft Privacy (Protection) Bill 2013&lt;/h1&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion of definitions: Chapter II&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The sections of the draft Privacy (Protection) Bill 2013 were discussed during the second session of the third Privacy Round Table meeting. In particular, the session started with a discussion on whether the draft Privacy (Protection) Bill 2013 should be split into two separate Bills, where the one would focus on data protection and the other on surveillance and interception. The split of a Bill on data protection to two consecutive Bills was also proposed, where the one would focus on data protection binding the public sector and the other on data protection binding the private sector. As the draft Privacy (Protection) Bill 2013 is in line with global privacy standards, the possibility of splitting the Bill to focus separately on the sections mentioned above was seriously considered.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on the definitions laid out in Chapter 2 of the draft Privacy (Protection) Bill 2013 started with a debate around the definitions of personal data and sensitive personal data and what exactly they should include. It was pointed out that the Data Protection Act of the UK has a much broader definition for the term ´sensitive personal data´ and it was recommended that the Indian draft Privacy (Protection) Bill complies with it. Other participants argued that a controversy lies in India on whether the government would conduct a caste census and if that were to be the case, such data (also including, but not limited to, religion and ethnic origin) should be included in the legal definition for ´sensitive personal data´ to safeguard individuals from potential abuse. Furthermore, the fact that the term ´sensitive personal data´ does not have a harmonious nature in the U.S. and in Europe was raised, especially since that would make it more difficult for India to comply to global privacy standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The broadness of the definition for ´sensitive personal data´ was raised as a potential problematic issue, especially since it may not be realistic to expect companies in the long term to protect everything it may include. The participants debated on whether financial information should be included in the definition of ´sensitive personal data´, but a consensus was not reached. Other participants argued that the terms ´data subject´ and ´data controller´ should be carefully defined, as well as that a generic definition for the term ´genetic data´ should be included in the Bill. Furthermore, it was argued that the word ´monitor´ should be included in the definitions of the Bill and that the universal norms in regards to the definitions should apply to each and every state in India. It was also noted that organizational affiliation, such as a trade union membership, should also be included in the definitions of the Bill, since the lack of legal protection may potentially have social and political implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Discussion of “Protection of Personal Data”: Chapter III &lt;/b&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on the data protection chapter of the draft Privacy (Protection) Bill began with the recommendation that data collected by companies should comply with a confidentiality agreement. Another participant argued that the UK looks at every financial mechanism to trace how information flows and that India should do the same to protect individuals´ personal data. It was also argued that when an individual is constantly under surveillance, that individual´s behaviour is more controlled and that extra accountability should be required for the use of CCTV cameras. In particular, it was argued that when entities outside the jurisdiction gain access to CCTV data, they should be accountable as to how they use it. Furthermore, it was argued that the Bill should provide provisions on how data is used abroad, especially when it is stored in foreign servers. &lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Issue of Consent&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting proceeded with a discussion of Section 6 and it was pointed out that consent needs to be a prerequisite to data collection. Furthermore, conditions laid out in section 3 would have to be met, through which the individual would have to be informed prior to any data collection, processing, disclosure and retention of data. Section 11 of the Bill entails an accuracy provision, through which individuals have the right to access the data withheld about them and make any necessary corrections. A participant argued that the transmission of data should also be included in the Bill and that the transmitter would have to be responsible for the accuracy of the data. Another participant argued that transmitters should be responsible for the integrity of the data, but that individuals should be responsible for its accuracy. However, such arguments were countered by a participant who argued that it is not practically possible to inform individuals every time there is a change in their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Outsourcing of Data&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was further recommended that outsourcing guidelines should be created and implemented, which would specify the agents responsible for outsourcing data. On this note, the fact that a large volume of Indian data is being outsourced to the U.S. under the Patriot Act was discussed. In particular, it was pointed out that most data retention servers are based in the U.S., which makes it difficult for Indians to be able to be informed about which data is being collected, whether it is being processed, shared, disclosed and/or retained. A participant argued that most companies have special provisions which guarantee that data will not cross borders and that it actually depends on the type of ISP handling the data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Another issue which was raised was that, although a consumer may have control over his/her data at the first stage, that individual ultimately loses control over his/her data in the next stages when data is being shared and/or disclosed without his/her knowledge or consent. Not only is this problematic because individuals lose control over their data, but also because the issue of accountability arises, as it is hard to determine who is responsible for the data once it has been shared and disclosed. Some participants suggested that such a problem could possibly be solved if the data subject is informed by the data processor that its data is being outsourced, as well as of the specific parties the data is being outsourced to. Another participant argued that it does not matter who the data is being outsourced to, but the manner of its use is what really matters.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Retention&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Acting on the powers given by POTA, it was argued that 50,000 arrests have been made. Out of these arrests, only seven convictions have been made, yet the data of thousands of individuals can be stored for many years under POTA. Thus, it was pointed out that it is crucial that the individual is informed when his/her data is destroyed and that such data is not retained indefinitely. This was supplemented by a participant who argued that most countries in the West have data retention laws and that India should too. Other participants argued that data retention does not end with data destruction, but with the return of the data to the individual and the assurance that it is not stored elsewhere. However, several participants argued that the return of data is not always possible, especially since parties may lack the infrastructure to take back their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It was pointed out that civil society groups have claimed that collected data should be destroyed within a specific time period, but the debate remains polarized. In particular, some participants argued that data should be retained indefinitely, as the purpose of data collection may change within time and that data may be valuable in dealing with crime and terrorism in the future. This was countered by participants who argued that the indefinite retention of data may potentially lead to human rights violations, especially if the government handling the data is non-democratic. Another participant argued that the fact that data may be collected for purpose A, processed for purpose B and retained or disclosed for purpose C can be very problematic in terms of human rights violations in the future. Furthermore, another participant stated that destruction should mean that data is no longer accessible and that is should not only apply to present data, but also to past data, such as archives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Processing&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The processing of personal data is regulated in section 8 of the draft Privacy (Protection) Bill 2013. A participant argued that the responsibility should lie with the person doing the outsourcing of the data (the data collector). Another participant raised the issue that although banks acquire consent prior to collection and use of data, they subsequently use that data for any form of data processing and disclosure. Credit information requires specific permission and it was argued that the same should apply to other types of personal data. Consent should be acquired for every new purpose other than the original purpose for data collection. It was strongly argued that general consent should not cover every possible disclosure, sharing and processing of data. Another issue which was raised in terms of data processing is that Indian data could be compromised through global cooperation or pre-existing cooperation with third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Data Disclosure&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The disclosure of personal data was highlighted as one of the most important provisions within the draft Privacy (Protection) Bill 2013. In particular, three types of disclosure were pointed out: (1) disclosure with consent, (2) disclosure in outsourcing, (3) disclosure for law enforcement purposes. Within this discussion, principle liability issues were raised, as well as whether the data of a deceased person should be disclosed. Other participants raised the issue of data being disclosed by international third parties, who gain access to it through cooperation with Indian law enforcement agencies and cases of dual criminality in terms of the misuse of data abroad were raised. A participant highlighted three points: (1) the subject who has responsibility for the processing of data, (2) any obligation under law should be made applicable to the party receiving the information, (3) applicable laws for outsourcing Indian data to international third parties. It was emphasized that the failure to address these three points could potentially lead to a conflict of laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;According to a participant, a non-disclosure agreement should be a prerequisite to outsourcing. This was preceded by a discussion on the conditions for data disclosure under the draft Privacy (Protection) Bill 2013 and it was recommended that if data is disclosed without the consent of the individual, the individual should be informed within one year. It was also pointed out that disclosure of data in furtherance of a court order should not be included in the Bill because courts in India tend to be inconsistent. This was followed by a discussion on whether power should be invested in the High Court in terms of data disclosure.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion of “Interception of Communications”: Chapter IV&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy Round Table ended with a brief discussion on the fourth chapter of the draft Privacy (Protection) Bill 2013, which regulates the interception of communications. Following an overview of the sections and their content, a participant argued that interception does not necessarily need to be covered in the draft Privacy (Protection) Bill, as it is already covered in the Telegraph Act. This was countered by participants who argued that the interception of communications can potentially lead to a major violation of the right to privacy and other human rights, which is why it should be included in the draft Privacy (Protection) Bill. Other participants argued that a requirement that intercepted communication remains confidential is necessary, but that there is no need to include privacy officers in this. Some participants proposed that an exception for sting operations should be included in this chapter.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Meeting conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third Privacy Round Table entailed a discussion of the definitions used in the draft Privacy (Protection) Bill 2013, as well as of chapters II, III and IV on the right to privacy, the protection of personal data and the interception of communications. The majority of the participants agreed that India needs a privacy legislation and that individuals´ data should be legally protected. However, participants disagreed in regards to how data would be safeguarded and the extent to which data collection, processing, sharing, disclosure, destruction and retention should be regulated. This was supplemented by the debate on self-regulation and co-regulation; participants disagreed on whether the industry should regulate the use of customers´ data autonomously from government regulation or whether the industry should co-operate with the Privacy Commissioner for the regulation of the use of data. Though a consensus was not reached in regards to co-regulation and self-regulation, the majority of the participants agreed upon the establishment of a privacy legislation which would safeguard individuals´ personal data. The major issue, however, with the creation of a privacy legislation in India would probably be its adequate enforcement.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting'&gt;https://cis-india.org/internet-governance/blog/report-on-the-third-privacy-round-table-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:35:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication">
    <title>India's Rs 400-crore Central Monitoring System to snoop on all communication </title>
    <link>https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication</link>
    <description>
        &lt;b&gt;Latest reports confirm that the government's longstanding aim of initiating the Central Monitoring System in the country is materialising now.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This was &lt;a class="external-link" href="http://tech2.in.com/news/general/indias-rs-400crore-central-monitoring-system-to-snoop-on-all-communication/872510"&gt;published in Tech 2&lt;/a&gt; on May 9, 2013. Pranesh Prakash is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;a href="http://timesofindia.indiatimes.com/tech/tech-news/internet/Government-can-now-snoop-on-your-SMSs-online-chats/articleshow/19932484.cms" rel="nofollow" target="_blank" title="TOI report"&gt;The Times of India&lt;/a&gt;&lt;/b&gt; reports that the government began rolling out the project last month,  and it lets them access all communication in the country – comprising  online activities, phone calls, SMSes, social media conversations and  even the geographical location of individuals. Using the Central  Monitoring System, officials with the National Investigation Agency or  tax officials will have access to "every byte of communication".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Pavan Duggal, an advocate with the Supreme Court, believes that the  new system "is capable of tremendous abuse". He went on to say that the  government hasn't revealed much on what it intends to monitor with this  new system, and under what criteria.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Centre for Development of Telematics has been given the task of  putting this system in place to give government officials this crucial  access to communication in the country. In his statement to the  Parliament in December last year, IT minister Milind Deora had said that  the Central Monitoring System will "lawfully intercept Internet and  telephone services".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This system was initiated in the wake of the horrying bomb blast in  Mumbai in November 2008. Post that incident, the government reportedly  took on the task of making itself technologically adept to "eavesdrop on  digital communications".&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It would be important to quote here that the IT law – enacted in  2000, amended in 2008 and in 2011 – confers upon government officials  the authority to intercept phone calls, SMSes, emails and even monitor  websites. That, however, can only be done for "reasonable security  practices and procedures".&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication'&gt;https://cis-india.org/news/tech-2-may-9-2013-indias-rs-400-crore-central-monitoring-system-to-snoop-on-all-communication&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-06-05T10:39:19Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator">
    <title>Messaging apps find another foe in India’s market regulator</title>
    <link>https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator</link>
    <description>
        &lt;b&gt;Paranoid governments and mobile operators aren’t the only one that dislike messaging apps. Regulatory bodies aren’t crazy about them either. The Securities and Exchange Board of India (SEBI) is worried that attempts to pass on confidential information or manipulate markets are originating from within services like WhatsApp and Blackberry Messenger.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This &lt;a class="external-link" href="http://qz.com/82488/messaging-apps-find-another-foe-in-indias-market-regulator/"&gt;blog post was published in Quartz&lt;/a&gt; on May 8, 2013. Elonnai Hickok is quoted.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The regulator already analyzes data from trades for irregularities  through its “integrated market surveillance system”. That gives it an  idea of what stocks are being manipulated. Now it wants to expand its  horizons. The &lt;a href="http://www.thehindu.com/business/Industry/sebi-mulls-steps-to-check-manipulation-through-bbm-whatsapp/article4686269.ece"&gt;Press Trust of India&lt;/a&gt; reports that SEBI has looked into tracking Twitter and Facebook and is  grappling with messaging apps—though as yet it has no systems in place  for doing either, according to Elonnai Hickok of the Center for Internet  Studies in Bangalore. A SEBI spokesperson could not be reached for  comment.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even if SEBI did start following you on Twitter, it  cannot snoop on your WhatsApp messages. That sort of power is the  preserve of intelligence and police authorities. And there is good  reason for SEBI’s restricted powers. Keeping the markets clean may be an  honorable pursuit, but the regulator hasn’t always used honorable  means.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s finance minister last year said that SEBI would be allowed to &lt;a href="http://articles.economictimes.indiatimes.com/2012-11-19/news/35203786_1_sebi-data-records-securities-and-exchange-board"&gt;request call records&lt;/a&gt;,  which are the data kept by operators about who called whom, for how  long and from where. Such information can help investigators discover  sources of leaked information. It can also be used to figure out whether  traders are trying to influence other investigators. But a  freedom-of-information request &lt;a href="http://www.cobrapost.com/index.php/news-detail?nid=359&amp;amp;cid=23"&gt;recently revealed&lt;/a&gt; that SEBI had been requesting—and receiving—such data from carriers at  least since 2009, well before it was supposedly allowed to do so.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator'&gt;https://cis-india.org/news/quartz-may-8-2013-leo-mirani-messaging-apps-find-another-foe-in-indias-market-regulator&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-06-05T10:46:32Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-round-table-chennai">
    <title>A Privacy Round Table in Chennai</title>
    <link>https://cis-india.org/internet-governance/events/privacy-round-table-chennai</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Data Security Council of India and the Federation of Indian Chambers of Commerce and Industry cordially invite you to a "Privacy Round Table" at the Residency Towers in Chennai on Saturday, May 18, 2013, 10.30 a.m. to 4.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013.pdf" class="external-link"&gt;The Privacy Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/strengthening-privacy-protection.pdf" class="internal-link"&gt;Strengthening Privacy Protection through Co-Regulation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt;Click for the invite&lt;/a&gt;&lt;/li&gt;
&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt; 
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-round-table-chennai-invite.pdf" class="internal-link"&gt; &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To discuss the "Report of the Group of Experts on Privacy" by the Justice AP Shah Committee, the text of the "Citizens' Privacy (Protection) Bill 2013", drafted by the Centre for Internet and Society, and "Strengthening Privacy Protection through Co-regulation" by DSCI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions and recommendations from the meeting will be published into a compilation, and presented at the Internet Governance meeting planned for October 2013.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Draft Agenda for the Roundtable Discussion&lt;/h3&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;10.30 a.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: The Report of the Group of Experts on Privacy&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;11.30 a.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: Strengthening Privacy Protection through Co-regulation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.15 p.m.&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;12.30 p.m.&lt;/td&gt;
&lt;td&gt;Overview, explanation, and discussion: The Citizens Privacy (Protection) Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;1.15 p.m.&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;2.15 p.m.&lt;/td&gt;
&lt;td&gt;In depth discussions: The Citizens Privacy (Protection) Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;4.15 p.m.&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h3&gt;Confirmations and RSVP&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Please send your email confirmations for attending the Chennai Privacy Roundtable on &lt;b&gt;May 18th, 2013&lt;/b&gt;, to &lt;b&gt;Snehashish Ghosh&lt;/b&gt; at &lt;a class="mail-link" href="mailto:snehashish@cis-india.org"&gt;snehashish@cis-india.org&lt;/a&gt;, mobile no. +91- 9902763325,latest by end-of-business 5:30 p.m. on Monday&lt;b&gt; May 13, 2013&lt;/b&gt;.  As the conference is a roundtable dialogue, we request that attendees  submit a brief introduction about themselves and their interest in the  topic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-round-table-chennai'&gt;https://cis-india.org/internet-governance/events/privacy-round-table-chennai&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-05-06T10:01:45Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore">
    <title>Consilience – 2013</title>
    <link>https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore</link>
    <description>
        &lt;b&gt;The Law and Technology Committee of National Law School of India University, Bangalore is organising ‘Consilience – 2013′, an annual conference on law and technology, to be held on May 25 and 26, 2013. The Centre for Internet and Society is a co-partner for this event.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;Theme: Data Protection and Cyber Security in India. Click to read the &lt;a href="https://cis-india.org/internet-governance/blog/consilience-2013.pdf" class="internal-link"&gt;report here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;b&gt;Topics:&lt;br /&gt;Frameworks for Data Protection in India: The J. A.P. Shah “Report of the Group of Experts on Privacy”&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       What is the scope of the principles/framework?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      What could be the strengths and limitation of their application?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.       How does Report define privacy for India?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d.      Would an alternative framework for privacy in India be better? If so, what would this framework look like?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;India and the EU: The Privacy Debate&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       How does the Indian data protection regime differ from the EU regime?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      Was the EU is justified in not accepting India as a data secure country? Reason for or against.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.      In what way does the Indian regime on data protection not meet the requirements of EU’s data protection directive?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d.      What changes need to be made in the Indian regime to become  EU compliant? Are these changes feasible? Should India make these  changes?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Governmental Schemes, Data Protection, and Security&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a. In India, do private public partnerships between government  and the private sector adequately incorporate data protection standards?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b. What have been concerns related to data protection and  security that have arisen from government schemes? (Please use two  governmental schemes as case studies)&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c. Are these concerns related to the policy associated with the  project – the architecture of the project as well as the implementation?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;d. Should the larger question of data protection for governmental  schemes be incorporated into a privacy legislation? If yes, how so?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Contracts and Data Protection in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.       How are contracts used to ensure data protection in India? What actors use contracts?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.      Are there weaknesses in using contracts to ensure data protection standards?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.       Do contracts address questions brought about from technology like the cloud?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Cyber security in India&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;a.      What are the perceived challenges and threats to cyber security in India?&lt;/p&gt;
&lt;p&gt;b.      Are these currently being addressed through policy/projects? If yes, how so?&lt;/p&gt;
&lt;p&gt;c.      How does India’s cyber security regime compare to other countries?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Surveillance and Cyber Security&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.      Does policy in India enable the Government of India to surveil individuals for reasons related to cyber security?&lt;/p&gt;
&lt;p&gt;b.      If so – through what policy, projects, legislation?&lt;/p&gt;
&lt;p&gt;c.      Do the relevant policies, projects, and legislation impact privacy? How so?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;The Draft National Cyber Security Policy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;a.   What is the scope of the National Cyber Security Policy of  India? Does the draft policy adequately address all of the concerns  within the ambit of cyber security?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;b.   Would the Draft National Cyber Security Policy of India be  effective in meeting the goal of enhancing cyber security levels in  India?&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;c.    How does the Draft National Cyber Security Policy compare to other countries cyber security policies?&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Word Limit&lt;/b&gt;:&lt;/p&gt;
&lt;p&gt;Abstract:              750-800 words&lt;/p&gt;
&lt;p&gt;Paper:                   2,500 words&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Deadlines:&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;Abstract Submission:     April 30, 2013&lt;/p&gt;
&lt;p&gt;Paper Submission:        May 15, 2013&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Contact Details&lt;/b&gt;:&lt;/p&gt;
&lt;p&gt;consilience2013[at]gmail[dot]com&lt;/p&gt;
&lt;p&gt;Mohak Arora:  +91-90359-21926&lt;/p&gt;
&lt;p&gt;Shivam Singla: +91-99167-08701&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Each participant is required to submit an abstract on &lt;b&gt;any one&lt;/b&gt; of the seven topics above and can choose the specific issue within the selected topic to discuss.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For additional details, click&lt;b&gt; &lt;a href="http://consilience.co.in/index.php/component/content/article/20-frontpage/310-call-for-papers"&gt;here&lt;/a&gt;.&lt;/b&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore'&gt;https://cis-india.org/internet-governance/events/consilience-2013-law-technology-committee-nls-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-11-20T06:15:15Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table">
    <title>Report on the 2nd Privacy Round Table meeting</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table</link>
    <description>
        &lt;b&gt;This post entails a report on the second Privacy Round Table meeting which took place on 20th April 2013. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In furtherance of Internet Governance multi-stakeholder Initiatives and Dialogue in 2013, the Centre for Internet and Society (CIS) in collaboration with the Federation of Indian Chambers of Commerce and Industry (FICCI), and the Data Security Council of India (DSCI), is holding a series of six multi-stakeholder round table meetings on “privacy” from April 2013 to August 2013. The CIS is undertaking this initiative as part of their work with Privacy International UK on the SAFEGUARD project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the CIS and DSCI were members of the Justice AP Shah Committee which created the “Report of Groups of Experts on Privacy”. The CIS has recently drafted a Privacy (Protection) Bill 2013, with the objective of contributing to privacy legislation in India. The CIS has also volunteered to champion the session/workshops on “privacy” in the meeting on Internet Governance proposed for October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the roundtables the Report of the Group of Experts on Privacy, DSCI´s paper on “Strengthening Privacy Protection through Co-regulation” and the text of the Privacy (Protection) Bill 2013 will be discussed. The discussions and recommendations from the six round table meetings will be presented at the Internet Governance meeting in October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The dates of the six Privacy Round Table meetings are enlisted below:&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;New Delhi Roundtable: 13 April 2013&lt;/li&gt;
&lt;li&gt;Bangalore Roundtable: 20 April 2013&lt;/li&gt;
&lt;li&gt;Chennai Roundtable: 18 May 2013&lt;/li&gt;
&lt;li&gt;Mumbai Roundtable: 15 June 2013&lt;/li&gt;
&lt;li&gt;Kolkata Roundtable: 13 July 2013&lt;/li&gt;
&lt;li&gt;New Delhi Final Roundtable and National Meeting: 17 August 2013&lt;/li&gt;
&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the first Privacy Round Table in Delhi, this &lt;a href="https://cis-india.org/internet-governance/blog/report-on-bangalore-privacy-meeting" class="internal-link"&gt;report&lt;/a&gt; entails an overview of the discussions and recommendations of the second Privacy Round Table meeting in Bangalore, on 20&lt;sup&gt;th&lt;/sup&gt; April 2013.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Overview of DSCI´s paper on “Strengthening Privacy Protection through Co-regulation”&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting began with a brief summary of the first Privacy Round Table meeting which took place in Delhi on 13&lt;sup&gt;th&lt;/sup&gt; April 2013. Following the summary, the Data Security Council of India (DSCI) presented the paper “Strengthening Privacy Protection through Co-regulation”. In particular, DSCI presented the regulatory framework for data protection under the IT (Amendment) Act 2008, which entails provisions for sensitive personal information, privacy principles and “reasonable security practices”. It was noted that the privacy principles, as set out in the Justice AP Shah Report, refer to: data collection limitation, data quality, purpose specification, use limitation, security safeguards, openness and individual participation. The generic definitions of identified privacy principles refer to: notice, choice and consent, collection limitation, purpose specification, access and correction, disclosure of information, security, openness/transparency and accountability. However, the question which prevailed is what type of regulatory framework should be adopted to incorporate all these privacy principles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;DSCI suggested a co-regulatory framework which would evolve from voluntary self-regulation with legal recognition. The proposed co-regulatory regime could have different types of forms based on the role played by the government and industry in the creation and enforcement of rules. DSCI mentioned that the Justice AP Shah Committee recommends: (1) the establishment of the office of the Privacy Commissioner, both at the central and regional levels, (2) a system of co-regulation, with emphasis on SROs and (3) that SROs would be responsible for appointing an ombudsman to receive and handle complaints.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion points brought forward by DSCI were:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;What role should government and industry respectively play in developing and enforcing a regulatory framework? &lt;/li&gt;
&lt;li&gt;How can the codes of practice developed by industry be enforced in a co-regulatory regime? How will the SRO check the successful implementation of codes of practice? How can the SRO penalize non-compliances?&lt;/li&gt;
&lt;li&gt;How can an organization be incentivized to follow the codes of practice under the SRO?&lt;/li&gt;
&lt;li&gt;What should be the role of SROs in redressal of complaints?&lt;/li&gt;
&lt;li&gt;What should be the business model for SROs?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;DSCI further recommended the establishment of “light weight” regulations based on global privacy principles that value economic beliefs of data flow and usage, while guaranteeing privacy to citizens. DSCI also recommended that bureaucratic structures that could hinder business interests be avoided, as well as that the self-regulatory framework of businesses adapts technological advances to the privacy principles. Furthermore, DSCI recommended that self-regulatory bodies are legally recognised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion on the draft Privacy (Protection) Bill 2013&lt;/h2&gt;
&lt;h3 style="text-align: justify; "&gt;Discussion of definitions and preamble: Chapter I &amp;amp; II&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The second session began with a discussion of definitions used in the Bill. In particular, many participants argued that the term ´personal data´ should be more specific, especially since the vague definition of the term could create a potential for abuse. Other participants asked who the protection of personal data applies to and whether it covers both companies and legal persons. Furthermore, the question of whether the term ´personal data´ entails processed and stored data was raised, as well as whether the same data protection regulations apply to foreign citizens residing in India. A participant argued that the preamble of the Bill should be amended to include the term ´governance´ instead of ´democracy´, as this privacy legislation should be applicable in all cases in India, regardless of the current political regime.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Sensitive Personal Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The meeting proceeded with a discussion of the term ´sensitive personal data´ and many participants argued that the term should be broadened to include more categories, such as religion, ethic group, race, caste, financial information and others. Although the majority of the participants agreed that the term ´sensitive personal data´ should be redefined, they disagreed in regards to what should be included in the term. In particular, the participants were not able to reach a consensus on whether religion, caste and financial information should be included in the definition of the term ´sensitive personal data´. Other participants argued that passwords should be included within the scope of ´sensitive personal data´, as they can be just as crucial as financial information.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Information vs. Data&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;During the discussion, a participant argued that there is a subtle difference between the term ´information´ and ´data´ and that this should be pointed out in the Bill to prevent potential abuse. Another participant argued that ´sensitive personal data´ should be restricted to risk factors, which is why unique identifiers, such as passwords, should be included in the definition of the term. Other participants argued that the context of data defines whether it is ´sensitive´ or not, as it may fall in the category of ´national security´ in one instance, but may not in another. Thus, all types of data should be considered within their context, rather than separately. The fact that privacy protection from several financial services already exists was pointed out and the need to exclude pre-existing protections from the Bill was emphasised. In particular, a participant argued that banks are obliged to protect their customers´ financial information either way, which is why it should not be included in the definition of the term ´sensitive personal data´.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Exemptions&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Several exemptions to the right to privacy were discussed throughout the meeting. A participant asked whether the right to privacy would also apply to deceased persons and to unborn infants.  Another participant asked whether the term ´persons´ would be restricted to natural persons or if it would also apply to artificial persons. The fact that children should also have privacy rights was discussed in the meeting and in particular, participants questioned whether children´s right to privacy should be exempted in cases when they are being surveilled by their own parents.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion of “Protection of Personal Data”: Chapter III&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Following the discussion of definitions used in the Bill, the meeting proceeded with a discussion on the protection of personal data. A participant emphasized that the probability of error in data is real and that this could lead to major human rights violations if not addressed appropriately and in time. The fact that the Bill does not address the element of error within data was pointed out and suggested that it be included in draft Privacy (Protection) Bill. Another participant recommended an amendment to the Bill which would specify the parties, such as the government or companies, which would be eligible to carry out data collection in India. As new services are been included, the end purpose of data collection should be taken into consideration and, in particular, the ´new purposes´ for data collection would have to be specified at every given moment.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Collection&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In terms of data collection, a participant emphasized that the objectives and purposes are different from an individual and an industry perspective, which should be explicitly considered through the Bill. Furthermore, the participant argued that the fact that multiple purposes for data collection may arise should be taken into consideration and relevant provisions should be incorporated in the in Bill. Another participant argued that the issue of consent for data collection may be problematic, especially since the purpose of data collection may change in the process and while an individual may have given consent to the initial purpose for data collection, he/she may not have given consent to the purposes which evolved throughout the process. Thus, explicitly defining the instances for data collection may not be feasible.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;On the issue of consent, several participants argued that it would be important to distinguish between ´mandatory´ and ´optional´ information, as, although individuals may be forced by the government to hand over certain cases, in other cases they &lt;i&gt;choose &lt;/i&gt;to disclose their personal data. Thus participants argued that the Bill should provide different types of privacy protections for these two separate cases. Other participants argued that the term ´consent´ varies depending on its context and that this should too be taken into consideration within the draft Privacy (Protection) Bill. It was also argued that a mechanism capable of gaining individual consent prior to data collection should be developed. However, a participant emphasized upon the fact that, in many cases, it is very difficult to gain individual consent for data collection, especially when individuals cannot read or write. Thus the need to include provisions for uneducated or disabled persons within the Bill was highly emphasized.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further questions were raised in regards to the withdrawal of consent. Several participants argued that the draft Privacy (Protection) Bill should explicitly determine that all data is destroyed once an individual has withdrawn consent. Participants also argued that consent should also be a prerequisite to the collection, processing, sharing and retention of secondary users´ data, such as the data of individuals affiliated to the individual in question. A participant argued that there are two problematic areas of consent: (1) financial distribution (such as loans) and (2) every financial institution must store data for a minimum of seven to eight years. Having taken these two areas in consideration, the participant questioned whether it is feasible to acquire consent for such cases, especially since the purpose for data retention may change in the process. Participants also referred to extreme cases through which consent may not be acquired prior to the collection, processing, sharing and retention of data, such as in disastrous situations (e.g. earthquake) or in extreme medical cases (e.g. if a patient is in a coma), and suggested that relevant provisions are included in the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Disclosure&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In terms of data disclosure, several participants argued that the disclosure of data can potentially be a result of blackmail and that the Bill does not provide any provisions for such extreme cases. Furthermore, participants argued that although consent may be taken from an individual for a specific purpose, such data may be used in the process for multiple other purposes by third parties and that it is very hard to prevent this. It was recommended that the Bill should incorporate provisions to prevent the disclosure of data for purposes other than the ones for which consent was given.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant recommended that individuals are informed of the name of the Data Processor prior to the provision of consent for the disclosure of data, which could potentially increase transparency. Many participants raised questions in regards to the protection of data which goes beyond the jurisdiction of a country. It remains unclear how data will be processed, shared, retained when it is not handled within India and several participants argued that this should be encountered within the Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Destruction&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In terms of data destruction, a participant emphasized upon the fact that the draft Privacy (Protection) Bill lacks provisions for the confirmation of the destruction of data. In particular, although the Bill guarantees the destruction of data in certain cases, it does not provide a mechanism through which individuals can be assured that their data has actually been deleted from databases. Another individual argued that since the purposes for data collection may change within the process, it is hard to determine the cases under which data can be destroyed. Since the purposes for data collection and data retention may change in time, the participant argued that it would be futile to set a specific regulatory framework for data destruction. Another participant emphasized upon the value of data and stated that although some data may appear to have no value today, it may in the future, which is why data should not be destroyed.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Data Processing&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In terms of data processing, participants argued that privacy protection complications have arisen in light of the social media. In particular, they argued that social media develop and expand technologically constantly and that it is very difficult to regulate the processing of data that may be conducted by such companies. A participant emphasized the difference between (1) the processing of data when it is being read and (2) the processing of data when it is being analysed. Such a distinction should be considered within the Bill, as well as the use of data which is being processed. Many participants distinguished between the primary and secondary use of data and argued that the secondary use of data should also be included in the privacy statements of companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, participants also pointed out that purposes for the collection of data may overlap and that it may be difficult to distinguish between primary and secondary purposes for data collection. A participant disagreed with this argument and stated that it is possible to distinguish between primary and secondary purposes of data collection, as long as companies are transparent about why they are collecting information and about the purpose of its processing. This argument was seconded by another participant who argued that the specific purposes for the processing of data should be incorporated in the Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In brief, the following questions with regards to chapter III of the bill were raised during the meeting:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Should consent be required prior to the collection of data?&lt;/li&gt;
&lt;li&gt;Should consent be acquired prior and after the disclosure of data? &lt;/li&gt;
&lt;li&gt;Should the purpose of data collection be the same as the purpose for the disclosure of data?&lt;/li&gt;
&lt;li&gt;Should an executive order or a court order be required to disclose data?&lt;/li&gt;
&lt;li&gt;At the background of national security, anyone´s data can be under the ´suspicion list´. How can the disclosure of data be prevented in such circumstances? Non-criminals may have their data in the ´suspicion list´ and under national security, the government can disclose information; how can their information be protected in such cases?&lt;/li&gt;
&lt;li&gt;An individual may not be informed of the collection, analysis, disclosure and retention of his/her data; how can an individual prevent the breach of his/her data?&lt;/li&gt;
&lt;/ul&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;Should companies notify individuals when they share their (individuals´) data with international third parties?&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In brief, the following recommendations with regards to chapter III of the bill were raised during the meeting:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The data subject has to be informed, unless there is a model contract. &lt;/li&gt;
&lt;li&gt;The request for consent should depend on the type of data that is to be disclosed.&lt;/li&gt;
&lt;li&gt;Some exceptions need to be qualified (for example, in instances of medical patients different exceptions may apply).&lt;/li&gt;
&lt;li&gt;The shared data may be considered private data (need of a relevant regulatory framework).&lt;/li&gt;
&lt;li&gt;An international agreement should deal with the sharing of data with international third parties - incorporating such provisions in Indian law would probably be inadequate.&lt;/li&gt;
&lt;li&gt;If any country is not data-secure, there should be an approval mechanism for the transfer of data to such a country. &lt;/li&gt;
&lt;li&gt;India could have an export law which would monitor which data is sensitive and should not be shared with international third parties.&lt;/li&gt;
&lt;li&gt;The problem with disclosure is when there is an exception for certain circumstances &lt;/li&gt;
&lt;li&gt;Records should be kept on individuals who disclose data; there should be a trail of disclosure, so that there can be more transparency and accountability. &lt;/li&gt;
&lt;li&gt;Ownership of data is a controversial issue and so is the disclosure of data; consumers give up the ownership of their data when they share it with third parties and ergo cannot control its disclosure (or non-disclosure).&lt;/li&gt;
&lt;li&gt;´Data ownership´ should be included in the definitions of the Bill. &lt;/li&gt;
&lt;li&gt;What is the ´quality´ of data? The definition for ´quality´ under section 11 of the Bill is not well defined and should be improved.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion of “Interception of Communications”: Chapter IV&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussion on the interception of communications started off with a statement that 70 percent of the citizens in India are enrolled on “voice”, which means that the interception of communications affects a large proportion of the population in the country. A participant asked whether the body corporate in India should be treated as a telecommunications provider and whether it should be responsible for the interception of communications. Another participant argued that the disclosure of information should be closely regulated, even when it is being intercepted for judicial purposes. Many participants agreed that data which is collected and intercepted should not be used for other purposes other than the original purpose, as well as that such information should not be shared with third parties.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Questions were raised in regards to who should authorise the interception of communications and a participant recommended that a judicial warrant should be a prerequisite to the interception of communications in India. Some participants argued that the Bill should clearly specify the instances under which communications can be intercepted, as well as the legitimate purposes for interception. It was also argued that some form of ´check and balance´ should exist for the interception of communications and that the Bill should provide mechanisms to ensure that interception is carried out in a legal way. Several participants recommended that the Privacy Commissioner is mandated to approve the interception of communications, while questions were raised in regards to the sharing of intercepted data.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Discussion on self-regulation and co-regulation&lt;/h2&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The final session of the meeting consisted of a debate on self-regulation and co-regulation. Questions were raised in regards to how self-regulation and co-regulation could be enforced. Some participants recommended the establishment of sector regulations which would mandate the various forms of surveillance, such as a separate regulation for the UID scheme. However, this recommendation was countered by participants who argued that the government would probably not approve every sector regulation and that this would leave large areas of surveillance unregulated.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The participants who supported the self-regulation framework argued that the government should not intervene in the industry and that the industry should determine its own rules in terms of handling its customers´ data. Other participants supported the co-regulatory framework and argued that companies should cooperate with the Privacy Commissioner in terms of handling customers´ data, especially since this would increase transparency on how the industry regulates the use of customers´ data. The supporters of co-regulation supplemented this statement by arguing that the members of the industry should comply with regulations and that if they do not, there should be sanctions. Such arguments were countered by supporters of self-regulation, who stated that the industry should create its own code of conduct and that the government should not regulate its work.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Furthermore, it was argued that although government regulations for the handling of data could make more sense in other countries, in India, the industry became aware of privacy far sooner than what the government did, which is why a self-regulatory regime should be established in terms of handling data. Such arguments were countered by supporters of co-regulation who argued that the industry has vested interest in self-regulation, which should be countered by public policy. This argument was also countered by participants arguing that, given the high levels of corruption in India, the Privacy Commissioner in India may be corrupt and co-regulation may end up being ineffective. Other participants questioned this argument by stating that if India lacks legal control over the use of data by companies, individuals are exposed to potential data breaches. Supporters of co-regulation stated that the Privacy Commissioner should formulate a set of practices and both the industry and the government should comply with them.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Meeting conclusion&lt;/h2&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second Privacy Round Table entailed a discussion of the definitions used in the draft Privacy (Protection) Bill 2013, as well as of chapters II, III and IV on the right to privacy, the protection of personal data and the interception of communications. The majority of the participants agreed that India needs a privacy legislation and that individuals´ data should be legally protected. However, participants disagreed in regards to how data would be safeguarded and the extent to which data collection, processing, sharing, disclosure, destruction and retention should be regulated. This was supplemented by the debate on self-regulation and co-regulation which concluded the meeting; participants disagreed on whether the industry should regulate the use of customers´ data autonomously from government regulation or whether the industry should co-operate with the Privacy Commissioner for the regulation of the use of data. Though a consensus was not reached in regards to co-regulation and self-regulation, the majority of the participants agreed upon the establishment of a privacy legislation which would safeguard individuals´ personal data. The major issue, however, with the creation of a privacy legislation in India would probably be its adequate enforcement.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table'&gt;https://cis-india.org/internet-governance/blog/report-on-the-2nd-privacy-round-table&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T11:54:28Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting">
    <title>Report on the 1st Privacy Round Table meeting</title>
    <link>https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting</link>
    <description>
        &lt;b&gt;This report entails an overview of the discussions and recommendations of the first Privacy Round Table meeting in New Delhi, on 13th April 2013.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In furtherance of Internet Governance multi-stakeholder Initiatives and Dialogue in 2013, the Centre for Internet and Society (CIS) in collaboration with the Federation of Indian Chambers of Commerce and Industry (FICCI), is holding a series of six multi-stakeholder round table meetings on “privacy” from April 2013 to August 2013. DSCI will be joining the CIS as a co-organizer on 20 April 2013. The CIS is undertaking this initiative as part of their work with Privacy International UK on the SAFEGUARD project.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2012, the CIS was a member of the Justice AP Shah Committee which created the “Report of Groups of Experts on Privacy”. The CIS has recently drafted a Privacy (Protection) Bill 2013, with the objective of contributing to privacy legislation in India. The CIS has also volunteered to champion the session/workshops on “privacy” in the final meeting on Internet Governance proposed for October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;At the roundtables the Report of the Group of Experts on Privacy and the text of the Privacy (Protection) Bill 2013 will be discussed. The discussions and recommendations from the six round table meetings will be presented at the Internet Governance meeting in October 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The dates of the six Privacy Round Table meetings are enlisted below:&lt;/span&gt;&lt;/p&gt;
&lt;ol style="text-align: justify; "&gt;
&lt;li&gt;New Delhi Roundtable: 13 April 2013&lt;/li&gt;
&lt;li&gt;Bangalore Roundtable: 20 April 2013&lt;/li&gt;
&lt;li&gt;Chennai Roundtable: 18 May 2013&lt;/li&gt;
&lt;li&gt;Mumbai Roundtable: 15 June 2013&lt;/li&gt;
&lt;li&gt;Kolkata Roundtable: 13 July 2013&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;New Delhi Final Roundtable and National Meeting: 17 August 2013&lt;/li&gt;
&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt;This &lt;a href="https://cis-india.org/internet-governance/blog/report-on-delhi-privacy-round-table.pdf" class="internal-link"&gt;report &lt;/a&gt;entails an overview of the discussions and recommendations of the first Privacy Round Table meeting in New Delhi, on 13th April 2013.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Overview of Justice A P Shah Report: Purpose, Principles and Framework&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The Delhi Privacy Round Table meeting began with an overview of the Report of the Group of Experts on Privacy, by the Justice AP Shah Committee. The report recommends a potential framework for privacy in India, including detailing nine privacy principles and a regulatory framework. India currently lacks a privacy legislation and during the meeting it was pointed out that the protection of personal data in India is a highly significant issue, especially in light of the UID scheme. The Report of the Group of Experts on Privacy has guided the draft of the Privacy (Protection) Bill 2013 by CIS and will potentially guide the creation of privacy legislation by the Government of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the discussion on the report, a participant stated that, although a privacy legislation should be enacted in India to protect individuals´ personal data, commercial interests should not be endangered in the name of privacy. In particular, he called upon the need for the creation of a comprehensive privacy law in India and argued that although privacy should be protected, it should not have a negative impact on cloud computing, social media and on online businesses. Thus, the participant emphasized upon the creation of “light-weight” privacy legislation, which would protect individual´s right to privacy, without infringing upon the interests of the private sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the presentation of the privacy principles of the Justice AP Shah Report, the participants of the meeting made many comments on the feasibility of applying these principles within privacy legislation. In particular, a participant stated that setting a specific data retention framework is a very complicated issue, since the storage of data depends on many factors, some of which are:&lt;/p&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The purpose of the collection of data&lt;/li&gt;
&lt;li&gt;The purpose behind the collection of data may change within the process and may require a longer retention period, depending on the case&lt;/li&gt;
&lt;li&gt;Data is shared with third parties and it is hard to control how long they retain the data for&lt;/li&gt;
&lt;li&gt;Every type of data serves a different purpose and it is hard to set a universal data retention regulatory framework for all different types of data&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;Some participants argued that the nature of technological evolution should be considered within the privacy principles framework, in the sense that privacy is a fundamental human right to the extent that it does not disrupt other human rights and interests, such as those of companies. Many questions were raised in regards to data collection, one of them being: When data is collected for two different purposes, should an individual be eligible to single access of both types of data? Many other questions were raised in regards to co-regulation and self-regulation. In particular, a participant argued that, based on international experience, India will not be able to enforce self-regulation. On self-regulation in the United States, a participant stated that there are fifty laws which deal with certain aspects of privacy. The participant suggested that India follows the U.S. model, since self-regulation is more effective when the industry is involved, rather than when the government just imposes laws in a top-down manner. The United States enables the involvement of the industry in self-regulation and a participant recommended the same for India, as well as that the standards for co-regulation and self-regulation are approved by the Privacy Commissioner.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;While identifying the clash between the right to privacy and the right to information, participants argued that safeguards are essential in a co-regulation framework, to ensure transparency. It was emphasized that India has a history of corruption and abuse of government power, which increases the probability of self-regulation in the country not being successful. India is currently facing serious problems of accountability and lack of transparency, and participants argued that a solid legal privacy framework would have to be reached, which would not require a legal amendment every other month. Participants pointed out that, within the privacy context, it is highly significant to identify where incentives lie and to regulate the Privacy Commissioner. Currently, if an officer denies access to information, it could take at least a year and a half before being authorised access to information. Participants argued that IT companies and law enforcement agencies should be enabled to access information and that the denial of access to information by the Privacy Commissioner should be regulated. In particular, participants referred to examples from the UK and questioned whether Privacy Commissioners should be considered public authorities.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need to find a mechanism which would inform individuals of how their data is used was discussed during the meeting. A debate revolved around the question of whether the Indian government should inform an individual, once that individual´s personal information has been collected, used, processed and retained. Many participants argued that since customers decide to use their products, they should comply with the companies´ method of handling data and they should trust that the company will not misuse that data. This argument was countered by other participants, who argued that companies should be accountable as to how they handle customers´ data and that the sharing of customer data without the individual´s prior knowledge or consent could lead to data breaches and human rights violation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first hour of the meeting concluded that self-regulation should be considered in regards to IT companies dealing with customers´ data, but a consensus on whether companies should inform individuals of how their data is being used was not reached. Nonetheless, everyone in the meeting agreed upon the need to introduce privacy legislation in India, especially since phone tapping and the interception of communications is a widespread phenomenon in the country. India currently lacks rules for CDRs and the introduction of procedures and laws which would regulate the interception of communications in India was generally agreed upon throughout the first session of the meeting, even though the technical details of how data would be used by the private sector remained controversial.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Discussion Highlights:&lt;/h3&gt;
&lt;ul style="text-align: justify; "&gt;
&lt;li&gt;The pros and cons of self-regulation and co-regulation&lt;/li&gt;
&lt;li&gt;The national privacy principles – and how to build in insurance for technology&lt;/li&gt;
&lt;li&gt;The role of the Privacy Commissioner&lt;/li&gt;
&lt;li&gt;The definition of terms used in the draft Privacy (Protection) Bill 2013 &lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt; &lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Overview, explanation and discussion on the Privacy (Protection) Bill 2013&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The second session of the meeting began with an overview of the Privacy (Protection) Bill 2013, which was drafted by the Centre for Internet and Society (CIS) and represents a citizen´s version of a privacy legislation for India. The Bill entails chapters on the definition of privacy, personal data, interception, surveillance and the Privacy Commissioner. The surveillance chapter was not thoroughly discussed during the meeting, as it is primarily handled from a criminal law perspective and the majority of the participants were from the IT sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the meeting, the possibility of splitting the Bill was discussed. In particular, if separated, one Bill would focus on personal data and interception, while the second would focus on the criminal justice system. This would broadly be along the lines of the Canadian regime, which has two separate legislations to deal with privacy in the private and public sector.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Participants discussed the possibility of narrowing down the scope of the exceptions to the right to privacy, and made the critique that the Bill does not include any provisions for co-regulation and self-regulation. Many participants insisted that self-regulation should be included in the Bill, while other participants pointed out that the Bill does not provide protection for very several types of data, such as sexual orientation, caste and religion, which may be problematic in the future.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As the draft Privacy (Protection) Bill 2013 may possibly clash with pre-existing laws, such as the IT Act, participants recommended that new definitions be created, to ensure that the proposed privacy legislation coincides with other contradicting legislation. Many questions were raised in regards to how personal data in the public sector would be distinguished by personal data in the private sector. Other questions were raised on the harmonization of the Privacy Bill with the Right to Information Act, as well as on the redefinition of surveillance and interception, their changing nature and the difficulties of regulating them.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many participants agreed that India´s proposed Privacy Law should meet &lt;i&gt;global standards &lt;/i&gt;in order to attract more customers to Indian IT companies. However, a participant disagreed with this notion and argued that privacy principles generally differ depending on the social, economic, political and cultural status of a country and that the same universal privacy principles should not be imposed upon all countries. The participant argued that India should not copy global standards, but should instead create parallel legislation which would be interoperable with global standards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The issue of to whom privacy laws would apply to was thoroughly discussed during the meeting. In particular, questions were raised in regards to whether privacy legislation would only apply to Indian individuals, or if it would also apply to international individuals using services and/or products by Indian IT companies. The data protection of customers beyond India remains vague and this was thoroughly discussed, while participants disagreed upon this issue. According to the draft Privacy (Protection) Bill 2013, consent needs to be taken from the individual, but it remains unclear whether that would be applicable to international customers. Questions were raised on how Indian IT companies would gain consent on the use of data by customers of foreign countries, especially since different laws apply to each country.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second session of the meeting also entailed a debate on the disclosure of data to intelligence agencies by IT companies. Public authorities often request data from IT companies, on the grounds of national security and the prevention of crime and terrorism. However, questions were raised on whether companies should inform the individual prior to disclosing data to public authorities, as well as on whether certain terms, such as ´data´, should be reconceptualised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The term ´sensitive personal data´ was analysed in the meeting and it was argued that it entails data such as sexual orientation, religion, caste and health records among others. The participants emphasized the significance of the Bill explicitly including the protection of all sensitive personal data, as well as the need to provide requirements for using personal data in both the private and public sphere. Some participants suggested that the Privacy Commissioner in India be empowered with the authority to define the term ´sensitive personal data´ and that he/she not only ensures that all such data is legally protected, but also that health data is included within the definition of the term. A participant backed up the need to closely define the term ´sensitive personal data´, by arguing that a loose definition of the term, which would not include ethnic origin, could lead to social violence and tension and thus the necessity to strictly define the term is highly essential.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Throughout the meeting it was pointed out that the Bill only deals with three aspects of privacy: personal data, surveillance and interception of communications. According to the draft Privacy (Protection) Bill 2013, an individual has the right to install surveillance technology in his/her private property, as long as that technology does not monitor other individuals in private areas. A participant asked about the balance between internet freedom and privacy, whether that should be included in the Bill and whether exemptions to privacy should be included within those lines. Other participants asked whether CDR records should be placed under privacy exemptions and whether the public disclosure of surveillance should be prohibited by the Bill. The need to redefine ´public figures´ was also emphasized in the meeting, as the threshold for public disclosure of data remains unclear. Some participants argued that the public disclosure of data should be prohibited, as this may potentially have severe effects on vulnerable groups of people, such as victims of violence. However, several participants disagreed by arguing that disclosure of data in the name of public interest should be enabled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;During the meeting several participants argued that the fact that many social networking sites and other online social media enable individuals to publicize their personal data makes it even harder to protect their online privacy. A participant emphasized the need to take freedom of expression into consideration, as it significantly enables individuals to disclose their personal data and increases the probability of online data breaches. Thus, it was argued that the draft Bill should distinguish between private data and private data being made publicly available. However, a participant argued that publicly available data depends on &lt;i&gt;where &lt;/i&gt;it is being broadcasted. To support this argument, an example was brought forward of an individual uploading a video on YouTube and that same video being broadcasted on national television. Thus the context in which data is made publicly available is highly significant and should be outlined within the draft Privacy Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting proceeded to a discussion on the interception of communications and a participant claimed that a major privacy abuse is to intercept communications without a warrant or a legal order, and to request for authorisation once the interception has already being conducted. It was argued that, in any case, legal authorisation prior to any interception should be a prerequisite and should be highlighted in the draft Privacy Bill. However, another participant argued that currently, the interception of communications needs to be legally authorised within seven days and that prior authorisation should not be a prerequisite. This argument was supported by the statement that in extreme cases, the conditions may not enable prior authorisation. Many participants then questioned this practice by asking what happens in cases when authorisation is not granted within seven days after an interception and whether the agencies conducting the interception would be accountable. An assertive answer was not given, but the majority of the participants appeared to agree upon the need for legal authorisation prior to any interception.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second session of the meeting concluded to the significance of the principles of notice and consent, which should apply in every case, prior to every interception of communications and in regards to the handling of all individuals´ personal data.&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Discussion Highlights:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;If the draft Privacy (Protection) Bill 2013 should be split to two separate Bills&lt;/li&gt;
&lt;li&gt;&lt;span&gt;Definition for the term ´sensitive personal data´ (to include broader categories, such as health data)&lt;/span&gt;&lt;/li&gt;
&lt;li&gt;If personal data should be distinguished in the private and public sector&lt;/li&gt;
&lt;li&gt;If the draft Privacy (Protection) Bill 2013 should comply with global privacy standards&lt;/li&gt;
&lt;li&gt;The nuances of consumer consent&lt;/li&gt;
&lt;li&gt;Various ways to define ´public figures´&lt;/li&gt;
&lt;li&gt;Freedom of expression in the context of the draft Privacy (Protection) Bill 2013 &lt;/li&gt;
&lt;li&gt;The distinction between exemptions and exceptions&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt; &lt;/p&gt;
&lt;h2&gt;&lt;b&gt;In depth explanation and discussions regarding the Privacy (Protection)&lt;/b&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;b&gt; Bill 2013&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The third and final session of the Privacy Round Table began with a discussion on data collection. In particular, a participant stated that data collection should not be defined for a specific purpose, as the purposes for data collection constantly change. This argument was supported by the statement that privacy provisions can negatively affect a company and reduce its earnings, since restricting the instances for data collection ultimately restricts the services a company can provide (such as advertising). Thus it was strongly argued that data collection should not be restricted to ´specific purposes´, because such purposes can constantly change and all such restrictions can have a negative impact on both the industry and on intelligence agencies carrying out crime investigations. Other participants countered this argument by stating that the term ´necessary information´ is too broad and vague and could create a potential for abuse, which is why data collection should be restricted to specific instances which are legally justified.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The idea that Internet users should be given the right or the option not to be tracked was emphasized during the meeting. It was suggested that the draft Privacy Bill entails provisions which would oblige IT companies and intelligence agencies to inform an individual prior to the tracking of data and to request consent. This argument was supported by the statement that IT companies should protect the interest of the people, especially in terms of data mining and analytics. All such arguments were countered by a participant who stated that the collateral damage surrounding privacy needs to be acknowledged. This statement was supported by the argument that, although it is important to safeguard individuals´ right to privacy, regulations should not infringe upon the rights and interests of companies. In particular, it was argued that a deterrent law should not be created and that it should be acknowledged that individuals &lt;i&gt;choose&lt;/i&gt; to disclose a large amount of information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting proceeded to the discussion of the disclosure of data to third parties, and many participants argued that they should not be obliged to disclose the names of the parties they are sharing data with. It was argued that businesses prefer not to reveal the names of the third parties to which they are disclosing data to, as this would affect their competitive advantage in the market. This argument was supplemented by the statement that it would not be feasible to inform individuals every time their data is being shared and that not only would this affect a company´s competitive advantage in the market, but it would also be costly and time consuming. Instead of informing individuals every time their data is being shared, it was argued that companies are responsible for protecting their customers´ data and that those customers should trust companies with their data. A participant strongly argued that while companies are obliged to protect their customers´ data, they are not obliged to reveal the parties with whom they are sharing information with, as this would be highly inconvenient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Many participants strongly reacted to these statements by arguing that customers should have the right to be informed of how their data is being used and with which parties it is being shared. A participant argued that a customer may not trust the parties that the company chooses to trust and thus every customer should be informed of the sharing of their data. The customer should be respected and should be informed about the sharing of his/her personal data with third parties, because when data is being outsourced, the customer can only hope that the third parties handling his/her data will not misuse it. Thus, customers ultimately lose control over their data and over their personal lives. In order to avoid potential privacy breaches and to empower individuals with control over their personal data and their lives, it was argued that companies should be obliged to inform individuals of the sharing of their data and that this provision should be included in the draft Privacy Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A participant countered this argument by stating that when data is being automated, it is hard to identify the source of the data and that by providing transparency on which parties share customer data, companies would be put out of business. A  participant responded to this argument by stating that companies only protect users´ data when they have an incentive to do so, which is why a liability element should be added to the Bill. Other participants supported the argument of not informing customers of the handling of their data by stating that even some of the biggest IT companies, such as Gmail, share customers data with third parties without informing individuals or gaining prior consent. Such arguments were supported by other participants who emphasized upon the futility of informing customers of the handling of their data, especially since the average customer would not understand the security setting of a server. Since the majority of online users lack the technological expertise to understand the security settings, all companies should do is provide a security assurance to their customers in regards to how their data is being used.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In terms of data retention, a participant repeated the argument that a specific regulatory framework for data retention should not be established, especially since the purpose of data collection may change within time. Thus it was emphasized that no data retention period should be included within the draft Privacy Bill.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In terms of transparency, some participants argued that IT companies should submit detailed reports on how they are using customers’ data to the Privacy Commissioner, but not to the public. In particular, many participants emphasized that a co-regulation framework should be implemented for the use of data, through which IT companies would regulate the use of data in co-operation with the Privacy Commissioner. Under a co-regulation framework, the public would be excluded from the right to receive detailed reports on how data is being used. Yet, participants emphasized that companies would be in compliance with regulations on data protection and security, which would ensure that customers´ data is not breached.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such arguments were countered by other participants, who argued that a tremendous amount of significance lies in informing online users of what type of data is being collected, whether it is being analysed and processed, why it is being collected and with which parties it is being shared with. Such questions are considered to be crucial elements of privacy, especially since privacy means that individuals are able to share some data with some individuals, and choose not to share the same or other data with other individuals. The practices of non-disclosure supported by some participants appear to be infringing upon the core of privacy. The participants emphasized that privacy cannot be protected if companies are not accountable in regards to how they handle data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The fact that companies can use meta-data for research purposes was mentioned in the meeting, which called upon the need to redefine the term ´data´. Questions were raised in regards to how data can be deleted once used within analytics. Some participants referred to the ´Right to be Forgotten´ debate and stated that the deletion of data, in many cases, is not feasible.  A participant stated that some data is very sensitive and that companies should be responsible for deciding on how such data should be handled. Data should not be disclosed for the sake of being disclosed, but companies should decide upon the disclosure, retention and destruction of data based on how sensitive its content is. The participant emphasized that customers directly or indirectly give their consent to their data being handled by companies when they use their products and if they do not agree with the security assurances provided by the companies, then they should use a different product or service. However, this argument was countered by several participants who argued that online consumers do not always have an alternative choice and that there is a difference between the bargaining powers of consumers around the world. Some consumers may be socially pressured into using a specific product or service, or may not have an alternative option and the example of Facebook was brought up. Participants argued that given that consumers do not always have a choice to use or not use a specific online service, their data should be protected regardless of consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The debate on the destruction of data continued with participants arguing that companies should not have to destroy all personal data and that such restrictions should only apply to ´sensitive personal data´. The need for the redefinition of the term ´sensitive personal data´ in the draft Privacy Bill was emphasized again, as well as participants´ concern that the purpose behind the collection of data may change within the process and that the regulations which apply in such cases remain vague. In response to issues revolving around the collection of data, a participant recommended the regulation of instances under which data should &lt;i&gt;not &lt;/i&gt;be used. In terms of consent, several participants argued that it is not rational to expect consumers to give consent for the future (indefinite) use of their data, as this may expose them to future threats which they may have not considered when granting initial consent.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The meeting proceeded to discuss the processing of data and several participants emphasized upon the need to gain consent, whilst others disagreed for the reasons mentioned above. On the disclosure of data, a participant stated that companies can be approached by law enforcement agencies for multiple purposes and that it is usually hard for companies to define the cases under which information is disclosed. Other participants disagreed with the disclosure of data when it is being collected and analysed for investigatory purposes and argued that regulations on the disclosure of data should not be applicable to intelligence agencies. &lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;Discussion Highlights:&lt;/h3&gt;
&lt;ul&gt;
&lt;li&gt;The different instances of data collection and consumer consent&lt;/li&gt;
&lt;li&gt;The nuances of data sharing &lt;/li&gt;
&lt;li&gt;The issue of consumer consent and security assurances offered by companies&lt;/li&gt;
&lt;li&gt;The pros and cons of having a data retention regulatory framework&lt;/li&gt;
&lt;li&gt;How transparency is incorporated into the draft Privacy Protection Bill 2013 &lt;/li&gt;
&lt;li&gt;What is needed in provisions that speak to data destruction&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;Meeting conclusion&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The general conclusion of the meeting was that self-regulation should be encouraged, as IT companies should provide security assurances to their consumers and regulate the collection, use, analysis, sharing and retention of their data. There was some discussion on the possibility of introducing co-regulation between IT companies and the Privacy Commissioner, but most participants appeared to prefer self-regulation. All participants in the meeting agreed upon the necessity to introduce a Privacy Bill in India which would safeguard individuals´ right to privacy and other human rights. However, the debate revolved around the definition of terms used in the Bill, whether consent should be a prerequisite to the collection, use, analysis, processing and retention of data, as well as whether companies should be obliged to inform consumers of the sharing, disclosure and destruction of their data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the first Privacy Round Table meeting on the Privacy (Protection) Bill 2013, the discussion between various stakeholders will continue in the next national round table meetings throughout the year 2013. Following the Delhi Privacy Round Table, corrections have been incorporated into the &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-with-amendments-based-on-public-feedback" class="internal-link"&gt;Privacy Protection Bill, 2013&lt;/a&gt; based on participants´ feedback, concerns, comments and ideas.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting'&gt;https://cis-india.org/internet-governance/blog/report-on-the-first-privacy-round-table-meeting&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-30T11:11:11Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation">
    <title>India takes its first serious step toward privacy regulation – but it may be misguided </title>
    <link>https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation</link>
    <description>
        &lt;b&gt;The world’s second-most populous nation may be on the cusp of embracing privacy legislation. After several false starts the Indian government appears ready to accept the need for some form of regulation.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;This blog post by Simon Davies was &lt;a class="external-link" href="http://www.privacysurgeon.org/blog/incision/india-takes-its-first-serious-step-toward-privacy-regulation-but-it-may-be-misguided/"&gt;published in the Privacy Surgeon&lt;/a&gt; on April 9, 2013. The Centre for Internet and Society recently published a draft Citizens privacy bill which is mentioned in this post.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Well, maybe this is a slightly optimistic view. A more accurate  portrayal might be “the Indian government appears ready to accept the &lt;i&gt;principle&lt;/i&gt; of some form of regulation”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is actually no agreed policy position across government on the  question of privacy and data protection, but the Planning Commission  last year established an Expert Group under the chairmanship of the  former Chief Justice of the Delhi High Court, A.P.Shah. Justice Shah’s  subsequent &lt;a href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf" target="_blank" title="justice shah report"&gt;report&lt;/a&gt; is being considered and a draft Bill has been created.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Shah’s report provided a convincing body of evidence – both at the  domestic and the international level – for the creation of national  regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It called for the formation of a regulatory framework and set out nine  principles that could form a foundation for the next stage. These  principles – reflecting the basis of law in other countries – have been  generally accepted by Indian stakeholders as a sound frame of reference  for progress.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However although the nine principles are supported, the precise nature of any possible regulation is still very much in flux.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;There’s a long way to go before consensus is established on a overall  type of regulatory framework. Having said that, India is closer than  ever to seeing real legislation – and the international community needs  to put its weight behind the activity.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Debate over the merits of data protection and privacy law stretch back  beyond a decade but reform was constantly hampered by perceptions that  regulation would stifle economic growth.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Some industry lobbies have been as keen as government to ensure that privacy proposals are stillborn.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even with the nine principles as a bedrock the path to privacy law must overcome two extremely difficult hurdles.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The first of these is that a substantial number of Indian opinion  leaders continue to express an instinctive view that there is no  cultural history for respect of privacy in India. That is, people don’t  want or expect privacy protection and Western notions of privacy are  alien to Indian society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In support of this assertion these critics often cite an analogy about  conversation on Indian trains. It is well known that many Indians will  disclose their life story to strangers on the Indian rail network,  discussing their personal affairs with people they have never before  met. This trait is construed as evidence that Indians do not value their  privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I spoke last week at an important &lt;a href="https://cis-india.org/news/future-of-privacy-in-india-on-april-5-2013-at-oberoi-hotel-new-delhi" target="_blank" title="India privacy meeting 2013"&gt;meeting&lt;/a&gt; in New Delhi where this exact point was repeatedly made. The meeting, organised by the Data Security &lt;a href="http://www.dsci.in/" target="_blank" title="dsci"&gt;Council&lt;/a&gt; of India and &lt;a href="http://www.i-comp.org/" target="_blank" title="icomp"&gt;ICOMP&lt;/a&gt; India was well attended by industry, government, academics and NGOs.  Speakers made constant reference to the matter of public disclosure of  personal information.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In response, noted commentator Vickram Crishna expressed the view that  the train anecdote had no relevance and was a convenient ruse for people  who for their own self interest opposed privacy regulation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“In reality this circumstance is like Vegas”, he said. “What happens on  Indian trains, stays on Indian trains. People will talk about their  lives because they will never see these passengers again and there is no  record of the disclosures.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“What we are dealing with in the online world is a completely different  matter. There is no correlation between the two environments”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A substantial opinion poll &lt;a href="http://www.privacysurgeon.org/blog/incision/indias-first-major-privacy-survey-reveals-deep-concerns-over-intrusion/" target="_blank" title="India’s first major privacy survey reveals deep concern over intrusion"&gt;published&lt;/a&gt; earlier this year also debunked the myth that Indians don’t care about  privacy. Levels of concern expressed by respondents was roughly the same  as the level of concern identified in other parts of the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;A second hurdle facing privacy legislation is the perception -   particularly prevalent in the United States – that legislation will be a  burden on industry and people do not want yet another cumbersome and  costly government structure.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are perhaps some grounds for considering this perspective, given the vast scale and complexity of India’s economy.&lt;/p&gt;
&lt;p class="callout" style="text-align: justify; "&gt;Government intervention does not enjoy a history of consistent success  in the marketplace, though in many instances intervention has been the  only means to bring industry into compliance with basic safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I made the point at the meeting that support for a purist model of  industry self regulation was simplistic and misguided. Most systems of a  similar nature fail unless someone is mandated to ensure compliance,  transparency, enforceability and consistency. It’s a question of finding  a way to embed accountability in industry self regulation – and this is  where legislation and government could help.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Justice Shah’s report reflected this widespread concern by recommending a  co-regulatory framework in which a privacy commissioner would oversee  industry self regulation. However – as last week’s meeting exemplified –  even this compromise solution is not acceptable to many industry  players. They oppose the idea of an appointed commissioner and believe  that industry self regulation alone will be sufficient.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an influential view that cannot be brushed aside. However in a &lt;a href="http://www.youtube.com/watch?v=W0G1jWFp0fs" target="_blank" title="RSTV davies interview youtube"&gt;special programme&lt;/a&gt; aired on19th April on India’s main parliamentary television network – &lt;a href="http://rstv.nic.in/rstv/index.asp" target="_blank" title="rstv india"&gt;RSTV&lt;/a&gt; – I repeatedly make the point that such a view, if successful, would  put Indian industry in danger of winning the battle but losing the war.  Europe is unlikely to accept a model of sole industry regulation, and  the crucial flow of data between the two regions could be imperiled.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Conscious of all these challenges the influential &lt;a href="https://cis-india.org/" target="_blank" title="cis india"&gt;NGO&lt;/a&gt; Centre for Internet and Society has published a draft Citizens privacy &lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013-citizens-draft" target="_blank" title="cis citizens privacy bill"&gt;bill&lt;/a&gt; and has commenced a series of consultation meetings across the country.  These initiatives will provide important input for the emerging  legislation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is an important moment for privacy in India, and one that will  require careful thought and sensitive implementation. However no-one in  India should be in any doubt that the current unregulated situation is  unsustainable in a global environment where nations are expected to  protect both their citizens and the safety of data on their systems.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation'&gt;https://cis-india.org/news/privacy-surgeon-simon-davies-april-9-2013-india-takes-its-first-serious-step-toward-privacy-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-04-15T06:39:05Z</dc:date>
   <dc:type>News Item</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system">
    <title>India's 'Big Brother': The Central Monitoring System (CMS)</title>
    <link>https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system</link>
    <description>
        &lt;b&gt;In this post, Maria Xynou looks at India´s Central Monitoring System (CMS) project and examines whether it can target individuals´ communications data, regardless of whether they are involved in illegal activity.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Starting from &lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt;this month&lt;/a&gt;, all telecommunications and Internet communications in India will be analysed by the government and its agencies. What does that mean? It means that everything we say or text over the phone, write, post or browse over the Internet will be centrally monitored by Indian authorities. This totalitarian type of surveillance will be incorporated in none other than the Central Monitoring System (CMS).&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;The Central Monitoring System (CMS)&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Central Monitoring System (CMS) may just be another step in the wrong direction, especially since India currently lacks privacy laws which can protect citizens from potential abuse. Yet, all telecommunications and Internet communications are to be monitored by Indian authorities through the CMS, despite the fact that it remains &lt;/span&gt;&lt;a href="http://www.lossofprivacy.com/index.php/2009/11/india-to-set-up-a-central-monitoring-system/"&gt;unclear how our data will be used&lt;/a&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The CMS was prepared by the Telecom Enforcement, Resource and Monitoring (TREM) and by the Centre for Development of Telematics (C-DoT) and is being manned by the Intelligence Bureau. The CMS project is likely to start operating this month and the &lt;/span&gt;&lt;a href="http://newindianexpress.com/nation/article1300012.ece"&gt;government plans&lt;/a&gt;&lt;span&gt; on creating a platform that will include all the service providers in Delhi, Haryana and Karnataka. The &lt;/span&gt;&lt;a href="http://cactusblog.files.wordpress.com/2010/01/it_act_2008.pdf"&gt;Information Technology Amendment Act 2008&lt;/a&gt;&lt;span&gt; enables e-surveillance and central and regional databases will be created to help central and state level law enforcement agencies in interception and monitoring. Without any manual intervention from telecom service providers, the CMS will equip government agencies with Direct Electronic Provisioning, filters and alerts on the target numbers. The CMS will also enable &lt;/span&gt;&lt;a href="http://www.nextbigwhat.com/indian-government-to-setup-centralized-communication-monitor-system-297/"&gt;Call Data Records (CDR) analysis and data mining&lt;/a&gt;&lt;span&gt; to identify the personal information of the target numbers.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The estimated set up cost of the CMS is&lt;/span&gt;&lt;a href="http://www.ciol.com/ciol/news/184770/governments-central-monitoring-system-operational-soon"&gt; Rs. 4 billion&lt;/a&gt;&lt;span&gt; and it will be connected with the Telephone Call Interception System (TCIS) which will help monitor voice calls, SMS and MMS, fax communications on landlines, CDMA, video calls, GSM and 3G networks. Agencies which will have access to the CMS include the Research and Analysis Wing (R&amp;amp;AW), the Central Bureau of Investigation (CBI), the National Investigation Agency (NIA), the Central Board of Direct Taxes (CBDT), the Narcotics Control Bureau, and the Enforcement Directorate (ED). In particular, last October, &lt;/span&gt;&lt;a href="http://www.zdnet.com/in/india-agency-petitions-for-monitoring-system-7000005762/"&gt;the NIA approached the Department of Telecom&lt;/a&gt;&lt;span&gt; requesting its connection with the CMS, which would help it intercept phone calls and monitor social networking sites &lt;/span&gt;&lt;a href="http://articles.timesofindia.indiatimes.com/2012-10-15/internet/34471762_1_loknath-behera-nia-dot"&gt;without the cooperation of telcos.&lt;/a&gt;&lt;span&gt; However, the NIA is&lt;/span&gt;&lt;a href="http://newindianexpress.com/nation/article1300012.ece"&gt; currently monitoring eight out of 10,000 telephone lines &lt;/a&gt;&lt;span&gt;and if it is connected with the CMS, the NIA will also get access to e-mails and other social media platforms. Essentially, the CMS will be converging all the interception lines at one location and Indian law enforcement agencies will have access to them. The CMS will also be capable of &lt;/span&gt;&lt;a href="http://www.zdnet.com/in/india-agency-petitions-for-monitoring-system-7000005762/"&gt;intercepting our calls and analyzing our data on social networking sites&lt;/a&gt;&lt;span&gt;. Thus, even our attempts to protect our data from ubiquitous surveillance would be futile.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In light of the CMS being installed soon, the Mumbai police took the initiative of setting up a &lt;/span&gt;&lt;a href="http://www.google.com/hostednews/afp/article/ALeqM5iVMgMkOgpXOTaon2VoLdvu2x5oyg?docId=CNG.6d8f555d3498b94bac2fb1046fc7d3a6.4a1%20,%20http://m.timesofindia.com/articleshow/19040572.cms"&gt;´social media lab´&lt;/a&gt;&lt;span&gt; last month, which aims to monitor Facebook, Twitter and other social networking sites. This lab would be staffed by 20 police officers who would keep an eye on issues being publicly discussed and track matters relating to public security. According to &lt;/span&gt;&lt;a href="http://www.google.com/hostednews/afp/article/ALeqM5iVMgMkOgpXOTaon2VoLdvu2x5oyg?docId=CNG.6d8f555d3498b94bac2fb1046fc7d3a6.4a1%20,%20http://m.timesofindia.com/articleshow/19040572.cms"&gt;police spokesman Satyanarayan Choudhary&lt;/a&gt;&lt;span&gt;, the lab will be used to identify trends among the youth and to plan law and order accordingly. However, fears have arisen that the lab may be used to stifle political debate and freedom of expression. The &lt;/span&gt;&lt;a href="http://www.bbc.co.uk/news/world-asia-india-20405457"&gt;arrest of two Indian women last November over a Facebook post&lt;/a&gt;&lt;span&gt; which criticized the shutdown of Mumbai after the death of politician Bal Thackeray was proof that the monitoring of our communications can potentially oppress our freedom and human rights. And now that all our online activity will be under the microscope...will the CMS security trade-off be worth it?&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;Surveillance in the name of Security&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In a digitised world,&lt;/span&gt;&lt;a href="http://www.businessrevieweurope.eu/technology/software/addressing-the-cyber-security-threat"&gt; threats to security have been digitised&lt;/a&gt;&lt;span&gt;. Terrorism is considered to be a &lt;/span&gt;&lt;a href="http://www.rorg.no/Artikler/869.html"&gt;product of globalisation&lt;/a&gt;&lt;span&gt; and as such, the Internet appears to be a tool used by terrorists. Hence governments all around the world are convinced that &lt;/span&gt;&lt;a href="http://www.slate.com/blogs/future_tense/2012/12/13/national_counterterrorism_center_s_massive_new_surveillance_program_uncovered.html"&gt;surveillance is probably one of the most effective methods in detecting and prosecuting terrorists&lt;/a&gt;&lt;span&gt;, as all movement, action, interests, ideas and everything else that could define an individual are closely being monitored under the ´surveillance umbrella´ True; if everything about our existence is being closely monitored and analysed, it seems likely that we will instantly be detected and prosecuted if engaged in illegal activity. But is that the case with big data? According to &lt;/span&gt;&lt;a href="http://www.schneier.com/blog/archives/2006/03/data_mining_for.html"&gt;security expert Bruce Schneier&lt;/a&gt;&lt;span&gt;, searching for a terrorist through data mining is like looking for a needle in a haystack. Generally, the bigger the amount of data, &lt;/span&gt;&lt;a href="http://www.statsoft.com/textbook/data-mining-techniques/"&gt;the bigger the probability of an error in matching profiles&lt;/a&gt;&lt;span&gt;. Hence, when our data is being analysed through data mining of big data, the probability of us being charged for a crime we did not commit is real. Nonetheless, the CMS is going to start operating soon in an attempt to enable law enforcement agencies to tackle crime and terrorism.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;A few days ago, I had a very interesting chat with an employee at &lt;/span&gt;&lt;a href="http://www.sas.com/offices/asiapacific/india/company/index_india.html"&gt;SAS Institute (India) Pvt. Ltd.&lt;/a&gt;&lt;span&gt; in Bangalore, which is a wholly owned subsidiary of&lt;/span&gt;&lt;a href="http://www.sas.com/company/about/index.html"&gt; SAS Institute Inc&lt;/a&gt;&lt;span&gt;. SAS is a company which produces &lt;/span&gt;&lt;a href="http://www.sas.com/company/about/index.html"&gt;software solutions and services&lt;/a&gt;&lt;span&gt; to combat fraud in financial services, identify cross-sell opportunities in retail, and all the business issues it addresses are based on three capabilities: information management, analytics and business intelligence. Interestingly enough, SAS also produces&lt;/span&gt;&lt;a href="http://www.sas.com/solutions/fraud/social-network/#section=1"&gt; social network analysis&lt;/a&gt;&lt;span&gt; which ´helps institutions detect and prevent fraud by going beyond individual and account views to analyze all related activities and relationships at a network dimension´. In other words, social network analysis by SAS would mean that, through Facebook, for example, all of an individual's´ interests, activities, habits, relationships and everything else that could be, directly or indirectly, linked to an individual would be mapped out in relation to other individuals. If, for example, several individuals appear to have mutual interests and activities, there is a high probability that an individual will be associated with the same type of organization as the other individuals, which could potentially be a terrorist organization. Thus, an essential benefit of the social network analysis solution is that it &lt;/span&gt;&lt;a href="http://www.sas.com/solutions/fraud/social-network/#section=3"&gt;uncovers previously unknown network connections and relationships&lt;/a&gt;&lt;span&gt;, which significantly enables more efficient investigations.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;According to the SAS employee I spoke to, the company provides social network analysis to Indian law enforcement agencies and aims at supporting the CMS project in an attempt to tackle crime and terrorism. Furthermore, the SAS employee argued that their social network analysis solution only analyzes open source data which is either way in the public online domain, hence respecting individuals´ online privacy. In support of the Mumbai ´social media lab´, &lt;/span&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;cyber security expert, Vijay Mukhi&lt;/a&gt;&lt;span&gt;, argued:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;´There may be around 60 lakh twitter users in the city and millions of other social media network users. The police will require a budget of around Rs 500 crore and huge resources such as complex software, unique bandwidth and manpower to keep a track of all of them. To an extent, the police can monitor select people who have criminal backgrounds or links with anti-social or anti-national elements...[...]...Even the apprehension that police is reading your tweet is wrong. The volume of networking on social media sites is beyond anybody's capacity. Deleting any user's message is humanly impossible. It is even difficult to find the origin of messages and shares. However, during the recent Delhi gangrape incident such monitoring of data in public domain helped the police gauge the mood of the people.´&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;Another cyber security expert&lt;/a&gt;&lt;span&gt; argued that the idea that the privacy of our messages and online activity would be intercepted is a misconception. The expert stated that:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="italized"&gt;&lt;i&gt;´The police are actually looking out for open source intelligence for which information in public domain on these sites is enough. Through the lab, police can access what is in the open source and not the message you are sending to your friend.´&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;Cyber security experts&lt;/a&gt;&lt;span&gt; also argued that the purpose of the creation of the Mumbai social media lab and the CMS in general is to ensure that Indian law enforcement agencies are better informed about current public opinion and trends among the youth, which would enable them to take better decisions on a policy level. It was also argued that, apparently, there is no harm in the creation of such monitoring centres, especially since other countries, such as the U.S., are conducting the same type of surveillance, while have enacted stringent privacy regulations. In other words, the monitoring of our communications appears to be justified, as long as it is in the name of security.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;CMS targeting individuals: myth or reality?&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The CMS is not a big deal, because it will not target us individually...or at least that is what &lt;/span&gt;&lt;a href="http://m.timesofindia.com/city/mumbai/Social-media-lab-cant-keep-a-tab-on-all-social-media-users-Experts/articleshow/19027308.cms"&gt;cyber security experts&lt;/a&gt;&lt;span&gt; in India appear to be claiming. But is that really the case? Lets look at the following hypothesis:&lt;/span&gt;&lt;/p&gt;
&lt;blockquote class="quoted"&gt;&lt;i&gt;The CMS can surveille and target individuals, if Indian law enforcement agencies have access to individuals content and non-content data and are simultaneously equipped with the necessary technology to analyse their data.&lt;/i&gt;&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The two independent variables of the hypothesis are: (1) Indian law enforcement agencies have access to individuals´ content and non-content data, (2) Indian law enforcement agencies are equipped with the necessary technology to analyse individuals´ content and non-content data. The dependent variable of the hypothesis is that the CMS can surveille and target individuals, which can only be proven once the two independent variables have been confirmed. Now lets look at the facts.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://bigbrotherinc.org/v1/India/"&gt;surveillance industry in India&lt;/a&gt;&lt;span&gt; is a vivid reality. &lt;/span&gt;&lt;a href="http://www.clear-trail.com/"&gt;ClearTrail&lt;/a&gt;&lt;span&gt; is an Indian surveillance technology company which provides communication monitoring solutions to law enforcement agencies around the world and which is a regular sponsor of ISS world surveillance trade shows. In fact, ClearTrail &lt;/span&gt;&lt;a href="http://www.issworldtraining.com/iss_mea/sponsors2.html"&gt;sponsored the ISS world surveillance trade show in Dubai &lt;/a&gt;&lt;span&gt;last month - another opportunity to sell its surveillance technologies to law enforcement agencies around the world. ClearTrail´s &lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/111_CLEARTRAIL.pdf"&gt;solutions&lt;/a&gt;&lt;span&gt; include, but are not limited to, mass monitoring of IP and voice networks, targeted IP monitoring, tactical Wi-Fi monitoring and off-the-air interception. Indian law enforcement agencies are equipped with such technologies and solutions and thus have the technical capability of targeting us individually and of monitoring our ´private´ online activity.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.shoghicom.com/"&gt;Shoghi Communications Ltd.&lt;/a&gt;&lt;span&gt; is just another example of an Indian surveillance technology company. WikiLeaks has published a&lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/160_SHOGI-2006-semiactive_gsm_monitoring.pdf"&gt; brochure&lt;/a&gt;&lt;span&gt; with one of Shoghi´s solutions: the Semi Active GSM Monitoring System. This system can be used to intercept communications from any GSM service providers in the world and has a 100% target call monitor rate. The fact that the system is equipped with IMSI analysis software enables it to extract the suspect´s actual mobile number from the network without any help from the service provider. Indian law enforcement agencies are probably being equipped with such systems by Shoghi Communications, which would enable the CMS to monitor telecommunications more effectively.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;As previously mentioned, SAS provides Indian law enforcement agencies &lt;/span&gt;&lt;a href="http://www.sas.com/solutions/fraud/social-network/"&gt;social network analysis solutions&lt;/a&gt;&lt;span&gt;. In general, many companies, Indian and international, produce &lt;/span&gt;&lt;a href="http://wikileaks.org/the-spyfiles.html"&gt;surveillance products and solutions&lt;/a&gt;&lt;span&gt; which they supply to law enforcement agencies around the world. However, if such technology is used solely to analyse open source data, how do law enforcement agencies expect to detect criminals and terrorists? The probability of an individual involved in illegal activity to disclose secrets and plans in the public online sphere is most likely significantly low. So given that law enforcement agencies are equipped with the technology to analyse our data, how do they get access to our content data in order to detect criminals? In other words, how do they access our ´private´ online communications to define whether we are a terrorist or not?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Some of the biggest online companies in the world, such as Google and Microsoft, &lt;/span&gt;&lt;a href="http://www.nytimes.com/2013/03/22/technology/microsoft-releases-report-on-law-enforcement-requests.html?_r=0"&gt;disclose our content data to law enforcement agencies&lt;/a&gt;&lt;span&gt; around the world. Sure, a lawful order is a prerequisite for the disclosure of our data...but in the end of the day, law enforcement agencies &lt;/span&gt;&lt;i&gt;can &lt;/i&gt;&lt;span&gt;and &lt;/span&gt;&lt;i&gt;do &lt;/i&gt;&lt;span&gt;have access to our content data, such as our personal emails sent to friends, our browsing habits, the photos we sent online and every other content created or communicated via the Internet. &lt;/span&gt;&lt;a href="http://www.engadget.com/tag/transparencyreport/"&gt;Law enforcement requests reports &lt;/a&gt;&lt;span&gt;published by companies, such as Google and &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/microsoft-releases-first-report-on-data-requests-by-law-enforcement-agencies"&gt;Microsoft&lt;/a&gt;&lt;span&gt;, confirm the fact that law enforcement agencies have access to both our&lt;/span&gt;&lt;a href="http://blogs.technet.com/b/microsoft_on_the_issues/archive/2013/03/21/microsoft-releases-2012-law-enforcement-requests-report.aspx"&gt; content and non-content data&lt;/a&gt;&lt;span&gt;, much of which was disclosed to Indian law enforcement agencies. Thus, having access to our ´private´ online data, all Indian law enforcement agencies need is the technology to analyse our data and match patterns. The various surveillance technology companies operating in India, such as &lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/111_CLEARTRAIL.pdf"&gt;ClearTrail&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="http://wikileaks.org/spyfiles/files/0/160_SHOGI-2006-semiactive_gsm_monitoring.pdf"&gt;Shoghi Communications&lt;/a&gt;&lt;span&gt;, ensure that Indian law enforcement agencies are equipped with the necessary technology to meet these ends.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The hypothesis that the CMS can surveille and target us individually can be confirmed, since Indian law enforcement agencies have access to our content and non-content data, while simultaneously being equipped with the necessary technology to analyse our data. Thus, the arguments brought forth by cyber security experts in India appear to be weak in terms of validity and reliability and the CMS appears to be a new type of ´Big Brother´ upon us. But what does this mean in terms of our privacy and human rights?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The &lt;/span&gt;&lt;a href="http://perry4law.org/cecsrdi/?topic=central-monitoring-system-cms-for-telephone-tapping-in-india-2"&gt;telephone tapping laws in India are weak&lt;/a&gt;&lt;span&gt; and violate constitutional protections. The Information Technology Amendment Act 2008 has enabled e-surveillance to reach its zenith, but yet &lt;/span&gt;&lt;a href="http://perry4law.org/cecsrdi/?topic=central-monitoring-system-cms-for-telephone-tapping-in-india-2"&gt;surveillance projects, such as the CMS, lack adequate legal backing&lt;/a&gt;&lt;span&gt;. No privacy legislation currently exists in India which can protect us from potential abuse. The confirmed CMS hypothesis indicates that all individuals can potentially be targeted and monitored, regardless of whether they have been involved in illegal activity. Yet, India currently &lt;/span&gt;&lt;a href="http://perry4law.org/blog/?cat=9"&gt;lacks privacy laws&lt;/a&gt;&lt;span&gt; which can protect individuals from the infringement of their privacy and other human rights. The following questions in regards to the CMS remain vague: Who can authorise the interception of telecommunications and Internet communications? Who can authorise access to intercepted data? Who can have access to data? Can data monitored by the CMS be shared between third parties and if so, under what conditions? Is data monitored by the CMS retained and if so, for how long and under what conditions? Do individuals have the right to be informed about their communications being monitored and about data retained about them?&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Immense vagueness revolves around the CMS, yet the project is due to start operating this month. In order to ensure that our right to privacy and other human rights are not breached, &lt;/span&gt;&lt;a href="http://perry4law.org/cecsrdi/?topic=central-monitoring-system-cms-for-telephone-tapping-in-india-2"&gt;parliamentary oversight of intelligence agencies in India&lt;/a&gt;&lt;span&gt; is a minimal prerequisite. E-surveillance regulations should be enacted, which would cover both policy and legal issues pertaining to the CMS project and which would ensure that human rights are not infringed. The overall function of the CMS project and its use of data collected should be thoroughly examined on a legal and policy level prior to its operation, as its current vagueness and excessive control over communications can create a potential for unprecedented abuse.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;The necessity and utility of the CMS remain unclear and thus it has not been adequately proven yet that the security trade-off is worth it. One thing, though, is clear: we are giving up a lot of our data....we are giving up the control of our lives...with the hope that crime and terrorism will be reduced. Does this make sense?&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;a class="external-link" href="http://www.medianama.com/2013/04/223-indian-government-plans-digital-central-monitoring-system-cis-india/"&gt;This was cross-posted in Medianama&lt;/a&gt;&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system'&gt;https://cis-india.org/internet-governance/blog/indias-big-brother-the-central-monitoring-system&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>maria</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-12-06T09:39:20Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore">
    <title>A Privacy Round Table in Bangalore</title>
    <link>https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society, Data Security Council of India  and the Federation of Indian Chambers of Commerce and Industry cordially invite you to a "Privacy Round Table" at Jayamahal Palace in Jayamahal Road, Bangalore on Saturday, April 20, 2013, 10.30 a.m. to 4.00 p.m.&lt;/b&gt;
        &lt;hr /&gt;
&lt;ul&gt;
&lt;li&gt;&lt;a class="external-link" href="http://planningcommission.nic.in/reports/genrep/rep_privacy.pdf"&gt;Report of the Group of Experts on Privacy&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-protection-bill-2013.pdf" class="external-link"&gt;The Privacy Protection Bill, 2013&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/strengthening-privacy-protection.pdf" class="internal-link"&gt;Strengthening Privacy Protection through Co-Regulation&lt;/a&gt;&lt;/li&gt;
&lt;li&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-roundtable-bangalore" class="internal-link"&gt;Invitation for the Privacy Roundtable&lt;/a&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;To discuss, in furtherance of Internet Governance Initiatives and Dialogue in 2013, the "Report of the Group of Experts on Privacy" by the Justice AP Shah Committee, the text of the Citizens' Privacy (Protection) Bill 2013, drafted by the Centre for Internet and Society, and the paper "Strengthening Privacy Protection through Co-Regulation" by DSCI.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The discussions and recommendations from the meeting will be published  into a compilation, and presented at the Internet Governance meeting  planned for October 2013.&lt;/p&gt;
&lt;table class="listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Time&lt;/th&gt;&lt;th&gt;Detail&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;10.30 &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview, explanation, and discussion: The Report of the Group of Experts on Privacy&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;11.30  &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview, explanation, and discussion: Strengthening Privacy Protection through Co-regulation&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;12.15&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Tea&lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;
&lt;p&gt;12.30&lt;/p&gt;
&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;Overview, explanation, and discussion: The Citizens (Protection) Bill 2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;13.15&lt;/td&gt;
&lt;td&gt;Lunch&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td style="text-align: justify; "&gt;14.15  &lt;br /&gt;&lt;/td&gt;
&lt;td style="text-align: justify; "&gt;In depth discussions: The Citizens’ Privacy (Protection) Bill 2013 &lt;br /&gt;&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;16.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Tea&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Confirmations and RSVP&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Please send your email confirmations for attending the Bangalore Privacy Roundtable on &lt;b&gt;April 20, 2013&lt;/b&gt;, to &lt;b&gt;Snehashish Ghosh&lt;/b&gt; at &lt;a class="mail-link" href="mailto:snehashish@cis-india.org"&gt;snehashish@cis-india.org&lt;/a&gt;, mobile no. +91- 9902763325,latest by end-of-business 5:30 p.m. on Monday &lt;b&gt;April 15, 2013&lt;/b&gt;. As the conference is a roundtable dialogue, we request that attendees  submit a brief introduction about themselves and their interest in the  topic.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore'&gt;https://cis-india.org/internet-governance/events/privacy-round-table-in-bangalore&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>praskrishna</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Event</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-04-17T06:55:52Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011">
    <title>Comments on the Information Technology (Electronic Service Delivery) Rules, 2011</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011</link>
    <description>
        &lt;b&gt;Bhairav Acharya on behalf of the Centre for Internet and Society prepared the following comments on the Information Technology (Electronic Services Delivery) Rules, 2011. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha. These were submitted to the Committee on Subordinate Legislation of the 15th Lok Sabha. &lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC&lt;/i&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;I &lt;span&gt;&lt;span&gt;Preliminary&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.1  This submission presents comments from the Centre for Internet and Society (&lt;b&gt;“CIS”&lt;/b&gt;) on the Information Technology (Electronic Service Delivery) Rules, 2011 that were notified by the Central Government in the Gazette of India vide Notification GSR 316(E) on 11 April 2011 (&lt;b&gt;“ESD Rules”&lt;/b&gt; or &lt;b&gt;“Rules”&lt;/b&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.2  The ESD Rules were notified only eight months before the Electronic Delivery of Services Bill, 2011 was tabled in the Lok Sabha on 27 December 2011 (Bill 137 of 2011) (&lt;b&gt;“EDS Bill” &lt;/b&gt;or&lt;b&gt; “Bill”&lt;/b&gt;). Both the ESD Rules and the EDS Bill are concerned with enabling computer-based electronic delivery of government services to Indian citizens (&lt;b&gt;“electronic service delivery”&lt;/b&gt;). Both the Rules and the Bill originate from the same government department: the Department of Electronics and Information Technology of the Ministry of Communications and Information Technology. Since the EDS Bill seeks to enact a comprehensive legislative framework for mandating and enforcing electronic service delivery, the purpose of the ESD Rules are called into question.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;II &lt;span&gt;&lt;span&gt;Basic Issues Regarding Electronic Service Delivery&lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.1  CIS believes that there are significant conceptual issues regarding electronic service delivery that demand attention. The Department-related Parliamentary Standing Committee on Information Technology of the Fifteenth Lok Sabha (&lt;b&gt;“Standing Committee”&lt;/b&gt;) raised a few concerns when it submitted its 37th Report on the EDS Bill on 29 August 2012. There is a clear need for a national debate on the manner of effecting exclusive electronic service delivery to the exclusion of manual service delivery. Some of these issues are briefly summarised as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) Mandatory exclusive electronic service delivery pre-supposes the ability of all Indian citizens to easily access such mechanisms. While there are no authoritative national statistics on familiarity with computer-related technologies, it is apparent that a large majority of Indians, most of whom are likely to be already marginalised and vulnerable, are totally unfamiliar with such technologies to endanger their ability to receive basic government services;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(b)  Consequent upon mandatory exclusive electronic service delivery for basic government services, a large group of ‘middlemen’ will arise to facilitate access for that majority of Indians who cannot otherwise access these services. This group will control the interface between citizens and their government. As a result, citizens’ access to governance will deteriorate. This problem may be mitigated to a certain extent by creating a new class of public servants to solely facilitate access to electronic service delivery mechanisms;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(c) The issue of governmental incapacity at the citizen-government interface might be addressed by contracting private service providers to operate mandatory exclusive electronic service delivery mechanisms. However, it is difficult to see how commercialising access to essential government services serves the public interest, especially when public funds will be expended to meet the costs of private service providers. Permitting private service providers to charge a fee from the general public to allow access to essential government services is also ill advised;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(d)  All electronic service delivery, whether mandatory to the exclusion of other service delivery mechanisms or offered simultaneously with manual service delivery, must be accompanied by strong data protection measures to ensure the sanctity of sensitive personal information shared online with the state. At present, there are no specific laws that bind the state, or its agents, to the stringent requirements of privacy necessary to protect personal liberties. In the same vein, strong data security measures are necessary to prevent sensitive personal information from being compromised or lost;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(e) All electronic service delivery, whether mandatory to the exclusion of other service delivery mechanisms or offered simultaneously with manual service delivery, must ensure ease and equality of accessibility. For this reason, electronic service delivery mechanisms should conform to the National Policy on Open Standards, 2010 (or the proposed National Electronic Access Policy which is currently awaiting adoption), the Interoperability Framework for E-Governance in India and the Website Guidelines of the National Informatics Centre;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(f) Electronic service delivery requires infrastructure which India does not currently have but can develop. Only 1.44 per cent of India’s population has access to a broadband internet connection&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; and current daily energy demand far exceeds supply. On the other hand, the number of broadband subscribers is increasing,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; the annual installed capacity for electricity generation is growing&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; and the literacy rate is increasing.&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.2  The ESD Rules do not address any of the issues raised in the preceding paragraph. As a result, they cannot be seen to represent the result of a national consensus on the crucial question of mandating exclusive electronic service delivery and the means of enforcing such a scheme. Further, very few of the provisions of the Rules are binding; instead, the Rules appear to be drafted to serve as a minimal model for electronic service delivery. &lt;b&gt;In this background, CIS believes that the Rules should be treated as an incomplete arrangement that prescribe the minimal standards necessary to bind private service providers before comprehensive and statutory electronic service delivery legislation is enacted, perhaps in the form of the EDS Bill or otherwise. &lt;/b&gt;Therefore, without prejudice to the issues raised in the preceding paragraph, CIS offers the following comments on the provisions of the Rules while reserving the opportunity to make substantive submissions on electronic service delivery in general to an appropriate forum at a later date.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;III &lt;span&gt;Improper Exercise of Subordinate Legislative Power&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.1  Rule 317 of the Rules of Procedure and Conduct of Business in the Lok Sabha (Fourteenth Edition, July 2010) (&lt;b&gt;“Rules of Procedure”&lt;/b&gt;), which empowers the Committee on Subordinate Legislation to scrutinise exercises of statutory delegation of legislative powers for impropriety, states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;There shall be a Committee on Subordinate Legislation to scrutinize and report to the House whether the powers to make regulations, rules, subrules, bye-laws etc., conferred by the Constitution or delegated by Parliament are being properly exercised within such delegation.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Further, the Committee on Subordinate Legislation is specifically empowered by rule 320(vii) of the Rules of Procedure to examine any provision of the ESD Rules to consider “&lt;i&gt;whether it appears to make some unusual or unexpected use of the powers conferred by the Constitution or the Act pursuant to which it is made.&lt;/i&gt;”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2 Accordingly, the attention of the Committee on Subordinate Legislation is called to an improper exercise of delegated power under rule 3(1) of the ESD Rules, which states:&lt;/p&gt;
&lt;p style="padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may on its own or through an agency authorised by it, deliver public services through electronically- enabled kiosks or any other electronic service delivery mechanism.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;This sub-rule (1) empowers both the Central Government and State Governments to provide electronic service delivery on their own.&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.3 The ESD Rules are made in exercise of delegated powers conferred under section 87(2)(ca) read with section 6-A(2) of the Information Technology Act, 2000 (&lt;b&gt;“IT Act”&lt;/b&gt;). Section 87(2)(ca) of the IT Act empowers the Central Government to make rules to provide for:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;the manner in which the authorised service provider may collect, retain and appropriate service charges under sub-section (2) of section 6-A.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Section 6-A(2) of the IT Act states:&lt;/p&gt;
&lt;p style="padding-left: 30px; text-align: justify; "&gt;&lt;i&gt;The appropriate Government may also authorise any service provider authorised under sub-section (1) to collect, retain and appropriate such service charges, as may be prescribed by the appropriate Government for the purpose of providing such services, from the person availing such service.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Prima facie&lt;/i&gt;, the delegated powers under section 87(2)(ca) read with section 6-A(2) of the IT Act, in exercise of which the ESD Rules are made, only permit delegated legislation to regulate private service providers, &lt;span&gt;they do not permit the executive to exercise these powers to empower itself to conduct electronic service delivery on its own&lt;/span&gt;.&lt;b&gt; Therefore, to the extent that the ESD Rules authorise the Central Government and State Governments to provide electronic service delivery on their own, such authorisation constitutes an improper exercise of delegated power and is &lt;i&gt;ultra vires&lt;/i&gt; the IT Act.&lt;/b&gt; This may be resolved by deriving the delegated legislative competence of the ESD Rules from section 87(1) of the IT Act, instead of section 87(2)(ca) read with section 6-A(2).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;IV &lt;span&gt;Clause-by-Clause Comments&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Rule 2 - Definitions&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;4.1.1     Rule 2(c) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;"authorised agent" means an agent of the appropriate Government or service provider and includes an operator of an electronically enabled kiosk who is permitted under these rules to deliver public services to the users with the help of a computer resource or any communication device, by following the procedure specified in the rules&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In accordance with the argument regarding improper exercise of delegated power contained in paragraphs 3.1 – 3.3 of this submission, the appropriate Government cannot undertake electronic service delivery under these Rules. Consequently, the appropriate Government cannot appoint an agent to provide electronic service delivery on behalf, and under the control, of the appropriate Government since, as the principal, the appropriate Government would be responsible for the acts of its agents. Instead, private service providers may provide electronic service delivery as contractees of the appropriate Government who might enter into such contracts as a sovereign contractor. Therefore, only a private service provider may appoint an authorised agent under these Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.1.2 Therefore, it is proposed that rule 2(c) is amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;““authorised agent” means an agent of a service provider, and includes an operator of an electronically enabled kiosk, who is permitted under these rules to deliver public services with the help of a computer resource or any communication device, by following the procedure specified in these rules”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 3 - &lt;span&gt;System of Electronic Service Delivery&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;4.2.1    Rule 3(3) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may determine the manner of encrypting sensitive electronic records requiring confidentiality, white they are electronically signed.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This sub-rule is supposed to prescribe stringent standards to maintain the security, confidentiality and privacy of all personal information used during electronic service delivery transactions. In the absence of transactional security, electronic service delivery will invite fraud, theft and other misuse to impugn its viability as a means of delivering public services. However, the use of the term “&lt;i&gt;may&lt;/i&gt;” leaves the prescription of security standards up to the discretion of the appropriate Government. Further, the language of the sub-rule is unclear and imprecise.&lt;/p&gt;
&lt;p&gt;4.2.2    &lt;b&gt;Therefore, it is proposed that rule 3(3) is amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“The appropriate Government shall, prior to any electronic service delivery, determine the manner of encrypting electronic records and shall prescribe standards for maintaining the safety, security, confidentiality and privacy of all information collected or used in the course of electronic service delivery.”&lt;/p&gt;
&lt;p&gt;4.3.1    Rule 3(5) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may allow receipt of payments made by adopting the Electronic Service Delivery System to be a deemed receipt of payment effected in compliance with the financial code and treasury code of such Government.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Firstly&lt;/span&gt;, if these Rules enable payments to be made electronically, they must also validate the receipt of these payments. Inviting citizens to make electronic payments for government services without recognising the receipt of those payments is farcical to attract abusive and corrupt practices. Therefore, it is imperative that these Rules compulsorily recognise receipt of payments, either by deeming their receipt to be valid receipts under existing law or by specially recognising their receipt by other means including the law of evidence. Either way, electronic receipts of electronic payments must be accorded the validity in law that manual/paper receipts have; and, copies of such electronic receipts must be capable of being adduced in evidence. &lt;span&gt;Secondly&lt;/span&gt;, the use of the phrase “&lt;i&gt;financial code and treasury code&lt;/i&gt;” is avoidable since these terms are undefined.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.3.2 Therefore, it is proposed that rule 3(5) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“Any receipt of payment made by electronic service delivery shall be deemed to be a valid receipt of such payment under applicable law and shall be capable of being adduced as evidence of such payment.”&lt;/p&gt;
&lt;p&gt;4.4.1    Rule 3(6) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may authorise service providers or their authorised agents to collect, retain and appropriate such service charges as may be specified by the appropriate Government for the purpose of providing such services from the person availing such services: &lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;Provided that the apportioned service charges shall be clearly indicated on the receipt to be given to the person availing the services.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This sub-rule is an almost verbatim reproduction of the provisions of section 6-A(2) of the IT Act which reads as follows:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may also authorise any service provider authorised under sub-section (1) to collect, retain and appropriate such service charges, as may be prescribed by the appropriate Government for the purpose of providing such services, from the person availing such service.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Since the IT Act specifically delegates to the appropriate Governments the power to authorise service providers to levy charges, rule 3(6) of the ESD Rules that merely copies the provisions of the parent statute is meaningless. The purpose of delegated legislation is to give effect to the provisions of a statute by specifying the manner in which statutory provisions shall be implemented. Copying and pasting statutory provisions is a absurd misuse of delegated legislative powers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.4.2 Therefore, it is proposed that sub-rule (6) is deleted and the remaining sub-rules of rule 3 are renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4.5.1 Rule 3(7) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government shall by notification specify the scale of service charges which may be charged and collected by the service providers and their authorised agents for various kinds of services.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;This is an almost verbatim reproduction of the provisions of section 6-A(4) of the IT Act which reads as follows:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government shall, by notification in the Official Gazette, specify the scale of service charges which may be charged and collected by the service providers under this section.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As noted in paragraph 4.3.1 of this submission, the purpose of delegated legislation is not to copy the provisions of the parent statute, but to amplify the scope of the delegated power and the manner of effecting its implementation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;4.5.2  Therefore, it is proposed that sub-rule (7) is deleted and the remaining sub-rules of rule 3 are renumbered.&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4.6.1 Rule 3(8) of the ESD Rules states:&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;&lt;i&gt;The appropriate Government may also determine the norms on service levels to be complied with by the Service Provider and the authorised agents.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There is no quarrel with the power of the government to determine norms for, or directly prescribe, service levels to regulate service providers. However, without a scheme of statutory or sub-statutory penalties for contravention of the prescribed service levels, a sub-delegated service level cannot enforce any penalties. Simply put, &lt;span&gt;the state cannot enforce penalties unless authorised by law&lt;/span&gt;. Unfortunately, rule 3(8) contains no such authorisation. Service levels for service providers without a regime of penalties for non-compliance is meaningless, especially since service providers will be engaged in providing access to essential government services.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;4.6.2  Therefore, it is proposed that rule 3(8) be amended to read as follows:&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; padding-left: 30px; "&gt;“The appropriate Government shall prescribe service levels to be complied with by all service providers and their authorised agents which shall include penalties for failure to comply with such service levels.”&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Thirty-Seventh Report of the Standing Committee on Information Technology (2011-12) on the Electronic Delivery of Services Bill, 2011 (New Delhi: Lok Sabha Secretariat, 29 August 2012) at pp. 13, 17 and 34. See also, &lt;i&gt;Telecom Sector in India: A Decadal Profile&lt;/i&gt; (New Delhi: Telecom Regulatory Authority of India, 8 June 2012).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. Annual Report (2011-12) of the Department of Telecommunications, Ministry of Communications and Information Technology, Government of India (New Delhi: Department of Telecommunications, 2012) at pp. 5 and 1-3.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. Report of the Working Group on Power of the Twelfth Plan (New Delhi: Planning Commission, Government of India, January 2012).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. Provisional Report of the Census of India 2011 (New Delhi: Registrar General and Census Commissioner, 2011) from p. 124.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011'&gt;https://cis-india.org/internet-governance/blog/comments-on-it-electronic-service-delivery-rules-2011&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-07-12T12:12:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
