<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1 to 15.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/events/a-public-discussion-on-criminal-defamation-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/comments-on-motor-vehicle-rules"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/policy-in-india-community-custom-censorship-and-future-of-internet-regulation"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/free-speech-policy-in-india.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality.pdf"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy">
    <title>The Short-lived Adventure of India’s Encryption Policy</title>
    <link>https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy</link>
    <description>
        &lt;b&gt;Written for the Berkeley Information Privacy Law Association (BIPLA). &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;During his recent visit to Silicon Valley, Indian Prime Minister Narendra Modi &lt;a href="http://www.thehindu.com/news/resources/full-text-of-narendra-modis-speech-at-san-jose/article7694680.ece" target="_blank"&gt;said&lt;/a&gt; his government was “giving the highest importance to data privacy and  security, intellectual property rights and cyber security”. But a  proposed &lt;a href="http://www.scribd.com/doc/282239916/DRAFT-NATIONAL-ENCRYPTION-POLICY" target="_blank"&gt;national encryption policy&lt;/a&gt; circulated in September 2015 would have achieved the opposite effect.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy was comically short-lived. After its poorly-drafted provisions invited ridicule, it was swiftly &lt;a href="http://www.cnn.com/2015/09/23/asia/india-withdraws-encryption-policy/" target="_blank"&gt;withdrawn&lt;/a&gt;.  But the government has promised to return with a fresh attempt to  regulate encryption soon. The incident highlights the worrying assault  on &lt;a href="http://www.frontline.in/cover-story/india-privacy-in-peril/article4849211.ece?homepage=true" target="_blank"&gt;communications privacy&lt;/a&gt; and &lt;a href="https://www.washingtonpost.com/world/asia_pacific/indias-modi-wants-to-woo-silicon-valley-but-censorship-and-privacy-fears-grow-at-home/2015/09/23/2ab28f86-6174-11e5-8475-781cc9851652_story.html" target="_blank"&gt;free speech&lt;/a&gt; in India, a concern compounded by the enormous scale of the telecommunications and Internet market.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Even with only around &lt;a href="http://www.livemint.com/Politics/BvW1QKrvU0zKeH23fvKAoK/India-Internet-userbase-crosses-350-million-milestone-in-Jun.html" target="_blank"&gt;26 percent&lt;/a&gt; of its population online, India is already the world’s &lt;a href="https://en.wikipedia.org/wiki/List_of_countries_by_number_of_Internet_users" target="_blank"&gt;second-largest&lt;/a&gt; Internet user, recently overtaking the United States. The number of  Internet users in India is set to grow exponentially, spurred by  ambitious governmental schemes to build a ‘&lt;a href="http://www.digitalindia.gov.in/" target="_blank"&gt;Digital India&lt;/a&gt;’ and a country-wide &lt;a href="http://www.wsj.com/articles/SB10001424052702304870304577490442561089140" target="_blank"&gt;fiber-optic backbone&lt;/a&gt;. There will be a corresponding &lt;a href="http://www.nytimes.com/2015/09/28/technology/india-replaces-china-as-next-big-frontier-for-us-tech-companies.html?_r=0" target="_blank"&gt;increase&lt;/a&gt; in the use of the Internet for communicating and conducting commerce.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Encryption on the Internet&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Encryption protects the security of  Internet users from invasions of privacy, theft of data, and other  attacks. By applying an algorithmic cipher (key), ordinary data  (plaintext) is encoded into an unintelligible form (ciphertext), which  is decrypted using the key. The ciphertext can be intercepted but will  remain unintelligible without the key. The key is secret.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are several methods of encryption. &lt;a href="https://en.wikipedia.org/wiki/Transport_Layer_Security" target="_blank"&gt;SSL/TLS&lt;/a&gt;,  a family of encryption protocols, is commonly used by major websites.  But while some companies encrypt sensitive data, such as passwords and  financial information, during its &lt;a href="https://www.schneier.com/blog/archives/2010/06/data_at_rest_vs.html" target="_blank"&gt;transit&lt;/a&gt; through the Internet, most data at rest on servers is largely &lt;a href="http://www.wired.com/2014/04/https/" target="_blank"&gt;unencrypted&lt;/a&gt;. For instance, &lt;a href="http://www.forbes.com/sites/hollieslade/2014/05/19/the-only-email-system-the-nsa-cant-access/"&gt;email providers&lt;/a&gt; regularly store plaintext messages on their servers. As a result, governments simply demand and receive &lt;a href="https://www.schneier.com/blog/archives/2015/07/the_risks_of_ma.html" target="_blank"&gt;backdoor&lt;/a&gt; access to information directly from the companies that provide these services. However, governments have long insisted on &lt;a href="https://www.eff.org/issues/calea" target="_blank"&gt;blanket backdoor access&lt;/a&gt; to all communications data, both encrypted and unencrypted, and whether at rest or in transit.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, proper &lt;a href="http://www.wired.com/2014/11/hacker-lexicon-end-to-end-encryption/" target="_blank"&gt;end-to-end encryption&lt;/a&gt; – full encryption from the sender to recipient, where the service  provider simply passes on the ciphertext without storing it, and deletes  the &lt;a href="https://www.privacyinternational.org/node/53" target="_blank"&gt;metadata&lt;/a&gt; – will defeat backdoors and protect privacy, but may not be &lt;a href="http://www.thenation.com/article/privacy-and-profit-motive/" target="_blank"&gt;profitable&lt;/a&gt;. End-to-end encryption alarms the &lt;a href="https://www.fbi.gov/news/speeches/going-dark-are-technology-privacy-and-public-safety-on-a-collision-course" target="_blank"&gt;surveillance establishment&lt;/a&gt;, which is why British Prime Minister David Cameron wants to &lt;a href="http://www.theguardian.com/commentisfree/2015/jan/13/cameron-ban-encryption-digital-britain-online-shopping-banking-messaging-terror" target="_blank"&gt;ban&lt;/a&gt; it, and many in the US government want Silicon Valley companies to &lt;a href="http://www.nytimes.com/2015/09/08/us/politics/apple-and-other-tech-companies-tangle-with-us-over-access-to-data.html" target="_blank"&gt;stop using it&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Communications privacy&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead of relying on a company to secure  communications, the surest way to achieve end-to-end encryption is for  the sender to encrypt the message before it leaves her computer. Since  only the sender and intended recipient have the key, even if the data is  intercepted in transit or obtained through a backdoor, only the  ciphertext will be visible.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For almost all of human history,  encryption relied on a single shared key; that is, both the sender and  recipient used a pre-determined key. But, like all secrets, the more who  know it, the less secure the key becomes. From the 1970s onwards,  revolutionary advances in cryptography enabled the generation of a pair  of dissimilar keys, one public and one private, which are uniquely and  mathematically linked. This is asymmetric or &lt;a href="https://en.wikipedia.org/wiki/Public-key_cryptography" target="_blank"&gt;public key cryptography&lt;/a&gt;, where the private key remains an exclusive secret. It offers the strongest &lt;a href="http://www.newyorker.com/tech/elements/hard-to-crack-the-governments-encryption-conundrum" target="_blank"&gt;protection&lt;/a&gt; for communications privacy because it returns &lt;a href="http://www.wired.com/2015/09/apple-fighting-privacy-imessage-still-problems/" target="_blank"&gt;autonomy&lt;/a&gt; to the individual and is immune to backdoors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For those using public key encryption, Edward Snowden’s revelation that the NSA had &lt;a href="http://www.newyorker.com/tech/elements/how-the-n-s-a-cracked-the-web" target="_blank"&gt;cracked&lt;/a&gt; several encryption protocols including SSL/TLS was worrying. &lt;a href="https://www.schneier.com/blog/archives/2013/09/the_nsas_crypto_1.html" target="_blank"&gt;Brute-force decryption&lt;/a&gt; (the use of supercomputers to mathematically attack keys) questions the  integrity of public key encryption. But, since the difficulty of  code-breaking is directly proportional to &lt;a href="https://en.wikipedia.org/wiki/Key_size" target="_blank"&gt;key size&lt;/a&gt;, notionally, generating longer keys will thwart the NSA, for now.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The crypto-wars in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Where does India’s withdrawn encryption  policy lie in this landscape of encryption and surveillance? It is  difficult to say. Because it was so badly drafted, understanding the  policy was a challenge. It could have been a ham-handed response to  commercial end-to-end encryption, which many major providers such as &lt;a href="http://www.washingtonpost.com/business/technology/2014/09/25/68c4e08e-4344-11e4-9a15-137aa0153527_story.html" target="_blank"&gt;Apple&lt;/a&gt; and &lt;a href="http://www.wired.com/2014/11/whatsapp-encrypted-messaging/" target="_blank"&gt;WhatsApp&lt;/a&gt; are adopting following consumer demand. But curiously, this did not  appear to be the case, because the government later exempted &lt;a href="http://indianexpress.com/article/explained/whatsapp-might-be-out-but-the-encryption-policy-is-still-ambiguous/" target="_blank"&gt;WhatsApp&lt;/a&gt; and other “mass use encryption products”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian establishment has a history of battling commercial encryption. From 2008, it fought &lt;a href="https://www.schneier.com/blog/archives/2008/05/blackberry_givi_1.html" target="_blank"&gt;Blackberry&lt;/a&gt; for backdoor access to its encrypted communications, coming close to &lt;a href="http://www.bbc.com/news/technology-10951607" target="_blank"&gt;banning&lt;/a&gt; the service, which &lt;a href="http://www.theregister.co.uk/2012/02/21/rim_india_bbn_server/" target="_blank"&gt;dissipated&lt;/a&gt; only once the company lost its market share. There have been similar  attempts to force Voice over Internet Protocol providers to fall in  line, including &lt;a href="http://timesofindia.indiatimes.com/india/Spooks-want-govt-to-block-Skype/articleshow/5082066.cms" target="_blank"&gt;Skype&lt;/a&gt; and &lt;a href="http://www.bbc.com/news/technology-11137647" target="_blank"&gt;Google&lt;/a&gt;. And there is a new thrust underway to regulate &lt;a href="http://www.trai.gov.in/WriteReaddata/ConsultationPaper/Document/OTT-CP-27032015.pdf" target="_blank"&gt;over-the-top&lt;/a&gt; content providers, including US companies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy could represent a new phase in India’s &lt;a href="http://arstechnica.co.uk/tech-policy/2015/09/india-joins-war-on-crypto-wants-everyone-to-keep-plaintext-copies-of-all-encrypted-data-for-90-days/" target="_blank"&gt;crypto-wars&lt;/a&gt;.  The government, emboldened by the sheer scale of the country’s market,  might press an unyielding demand for communications backdoors. The  policy made no bones of this desire: it sought to bind communications  companies by mandatory contracts, regulate key-size and algorithms,  compel surrender of encryption products including “working copies” of  software (the key generation mechanism), and more.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;The motives of regulation&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy’s deeply intrusive provisions manifest a &lt;a href="http://thewire.in/2015/05/30/mastering-the-art-of-keeping-indians-under-surveillance-2756/" target="_blank"&gt;long-standing effort&lt;/a&gt; of the Indian state to dominate communications technology unimpeded by  privacy concerns. From wiretaps to Internet metadata, intrusive  surveillance is not judicially warranted, does not require the  demonstration of probable cause, suffers no external oversight, and is  secret. These shortcomings are enabling the creation of a sophisticated &lt;a href="http://www.thehoot.org/media-watch/digital-media/turning-india-into-a-surveillance-state-i-7149" target="_blank"&gt;surveillance state&lt;/a&gt; that sits ill with India’s constitutional values.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Those values are being steadily besieged.  India’s Supreme Court is entertaining a surge of clamorous litigation  to check an increasingly intrusive state. Only a few months ago, the  Attorney-General – the government’s foremost lawyer – argued in court  that Indians &lt;a href="http://thewire.in/2015/08/02/the-battle-for-a-right-to-privacy-still-has-a-long-way-to-go-7685/" target="_blank"&gt;did not have&lt;/a&gt; a right to privacy, relying on 1950s case law which permitted invasive  surveillance. Encryption which can inexpensively lock the state out of  private communications alarms the Indian government, which is why it has  skirmished with commercially-available encryption in the past.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;On the other hand, the conflict over encryption is fueled by irregular laws. Telecoms licensing regulations restrict &lt;a href="http://dot.gov.in/sites/default/files/Internet%20Service%20Guideline%2024-08-07.doc" target="_blank"&gt;Internet Service Providers&lt;/a&gt; to 40-bit symmetric keys, a primitively low standard; higher encryption  requires permission and presumably surrender of the shared key to the  government. &lt;a href="http://www.sebi.gov.in/cms/sebi_data/commondocs/anncir2_p.pdf" target="_blank"&gt;Securities trading&lt;/a&gt; on the Internet requires 128-bit SSL/TLS encryption while the country’s &lt;a href="https://www.rbi.org.in/scripts/BS_ViewMasCirculardetails.aspx?id=8992" target="_blank"&gt;central bank&lt;/a&gt; is pushing for end-to-end encryption for mobile banking. Seen in this  light, the policy could simply be an attempt to rationalize an uneven  field.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Encryption and freedom&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps the government was trying to restrict the use of public key encryption and Internet anonymization services, such as &lt;a href="https://www.torproject.org/" target="_blank"&gt;Tor&lt;/a&gt; or &lt;a href="https://geti2p.net/en/" target="_blank"&gt;I2P&lt;/a&gt;, by individuals. India’s telecoms minister &lt;a href="http://indianexpress.com/article/india/india-others/government-withdraws-draft-national-encryption-policy-after-furore/" target="_blank"&gt;stated&lt;/a&gt;:  “The purport of this encryption policy relates only to those who  encrypt.” This was not particularly illuminating. If the government  wants to pre-empt terrorism – a legitimate duty, this approach is flawed  since regardless of the law’s command arguably no terrorist will  disclose her key to the government. Besides, since there are &lt;a href="http://geography.oii.ox.ac.uk/?page=tor" target="_blank"&gt;very few&lt;/a&gt; Internet anonymizers in India who are anyway &lt;a href="https://www.washingtonpost.com/world/national-security/secret-nsa-documents-show-campaign-against-tor-encrypted-network/2013/10/04/610f08b6-2d05-11e3-8ade-a1f23cda135e_story.html" target="_blank"&gt;targeted&lt;/a&gt; for special &lt;a href="http://www.cnet.com/news/nsa-likely-targets-anybody-whos-tor-curious/" target="_blank"&gt;monitoring&lt;/a&gt;, it would be more productive for the surveillance establishment to maintain the status quo.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This leaves harmless encrypters –  businesses, journalists, whistle blowers, and innocent privacy  enthusiasts. For this group, impediments to encryption interferes with  their ability to freely communicate. There is a proportionate link  between encryption and the freedom of speech and expression, a fact  acknowledged by &lt;a href="http://www.ohchr.org/EN/Issues/FreedomOpinion/Pages/OpinionIndex.aspx" target="_blank"&gt;Special Rapporteur&lt;/a&gt; David Kaye of the UN Human Rights Council, where &lt;a href="http://www.ohchr.org/EN/HRBodies/HRC/Pages/MembersByGroup.aspx" target="_blank"&gt;India&lt;/a&gt; is a participating member. Kaye &lt;a href="http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session29/Documents/A.HRC.29.32_AEV.doc" target="_blank"&gt;notes&lt;/a&gt;:  “Encryption and anonymity are especially useful for the development and  sharing of opinions, which often occur through online correspondence  such as e-mail, text messaging, and other online interactions.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is because encryption affords privacy which promotes free speech, a relationship &lt;a href="http://www.ohchr.org/Documents/HRBodies/HRCouncil/RegularSession/Session23/A.HRC.23.40_EN.pdf" target="_blank"&gt;reiterated&lt;/a&gt; by the previous UN Special Rapporteur, Frank La Rue. On the other hand, surveillance has a “&lt;a href="http://scholarship.law.wm.edu/cgi/viewcontent.cgi?article=2010&amp;amp;context=facpubs" target="_blank"&gt;chilling effect&lt;/a&gt;” on speech. In 1962, Justice Subba Rao’s &lt;a href="http://liiofindia.org/in/cases/cen/INSC/1962/377.html" target="_blank"&gt;famous dissent&lt;/a&gt; in the Indian Supreme Court presciently connected privacy and free speech:&lt;/p&gt;
&lt;blockquote style="text-align: justify; "&gt;
&lt;p&gt;The act of surveillance is certainly a  restriction on the [freedom of speech]. It cannot be suggested that the  said freedom…will sustain only the mechanics of speech and expression.  An illustration will make our point clear. A visitor, whether a wife,  son or friend, is allowed to be received by a prisoner in the presence  of a guard. The prisoner can speak with the visitor; but, can it be  suggested that he is fully enjoying the said freedom? It is impossible  for him to express his real and intimate thoughts to the visitor as  fully as he would like. To extend the analogy to the present case is to  treat the man under surveillance as a prisoner within the confines of  our country and the authorities enforcing surveillance as guards. So  understood, it must be held that the petitioner’s freedom under [the  right to free speech under the Indian] Constitution is also infringed.&lt;/p&gt;
&lt;/blockquote&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of Uttar Pradesh&lt;/i&gt; (1964) 1 SCR 332, pr. 30.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Perhaps the policy expressed the  government’s discomfort at individual encrypters escaping surveillance,  like free agents evading the state’s control. How should the law respond  to this problem? Daniel Solove &lt;a href="http://yalepress.yale.edu/book.asp?isbn=9780300172317" target="_blank"&gt;says&lt;/a&gt; the security of the state need not compromise individual privacy. On the other hand, as Ronald Dworkin &lt;a href="http://www.hup.harvard.edu/catalog.php?isbn=9780674867116" target="_blank"&gt;influentially maintained&lt;/a&gt;, the freedoms of the individual precede the interests of the state.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Security and trade interests&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, even when assessed from the  perspective of India’s security imperatives, the policy would have had  harmful consequences. It required users of encryption, including  businesses and consumers, to store plaintext versions of their  communications for ninety days to surrender to the government upon  demand. This outrageously ill-conceived provision would have created  real ‘&lt;a href="https://en.wikipedia.org/wiki/Honeypot_%28computing%29" target="_blank"&gt;honeypots&lt;/a&gt;’ (originally, honeypots are &lt;a href="http://time.com/3094404/defcon-hackers-robocalls-honeypot/" target="_blank"&gt;decoy&lt;/a&gt; servers to lure hackers) of unencrypted data, ripe for theft. Note that India does not have a data breach law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The policy’s demand for encryption  companies to register their products and give working copies of their  software and encryption mechanisms to the Indian government would have  flown in the face of trade secrecy and intellectual property protection.  The policy’s hurried withdrawal was a &lt;a href="http://www.reuters.com/article/2015/09/22/us-india-encryption-law-idUSKCN0RM1CO20150922" target="_blank"&gt;public relations&lt;/a&gt; exercise on the eve of Prime Minister Modi’s visit to Silicon Valley. It was &lt;a href="http://www.zdnet.com/article/indian-pm-modi-visits-us-tech-chiefs-in-wake-of-draconian-encryption-policy-debacle/" target="_blank"&gt;successful&lt;/a&gt;. Modi encountered no &lt;a href="https://www.hrw.org/mk/node/281554" target="_blank"&gt;criticism&lt;/a&gt; of his government’s &lt;a href="http://thewire.in/2015/08/02/the-battle-for-a-right-to-privacy-still-has-a-long-way-to-go-7685/" target="_blank"&gt;visceral opposition&lt;/a&gt; to privacy, even though the policy would have severely disrupted the  business practices of US communications providers operating in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Encryption invites a convergence of state interests between India and US as well: both countries want to &lt;a href="https://www.eff.org/document/crypto-wars-governments-working-undermine-encryption" target="_blank"&gt;control&lt;/a&gt; it. Last month’s &lt;a href="http://www.state.gov/r/pa/prs/ps/2015/09/247192.htm" target="_blank"&gt;joint statement&lt;/a&gt; from the US-India Strategic and Commercial &lt;a href="http://www.state.gov/p/sca/ci/in/strategicdialgue/" target="_blank"&gt;Dialogue&lt;/a&gt; pledges “further cooperation on internet and cyber issues”. This innocuous statement masks a &lt;a href="http://www.state.gov/r/pa/prs/ps/2014/09/232330.htm" target="_blank"&gt;robust&lt;/a&gt; information-gathering and -sharing regime. There is no guarantee  against the sharing of any encryption mechanisms or intercepted  communications by India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The government has promised to return with a &lt;a href="http://indianexpress.com/article/india/india-others/government-withdraws-draft-national-encryption-policy-after-furore/" target="_blank"&gt;reworked&lt;/a&gt; proposal. It would be in India’s interest for this to be preceded by a  broad-based national discussion on encryption and its links to free  speech, privacy, security, and commerce.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;Click to read the post published on &lt;a class="external-link" href="http://notacoda.net/2015/10/10/the-short-lived-adventure-of-indias-encryption-policy/"&gt;Free Speech / Privacy / Technology website&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy'&gt;https://cis-india.org/internet-governance/blog/the-short-lived-adventure-of-india2019s-encryption-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Encryption Policy</dc:subject>
    

   <dc:date>2015-11-29T09:03:42Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings">
    <title>The National Privacy Roundtable Meetings</title>
    <link>https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society ("CIS"), the Federation of Indian Chambers of Commerce and Industry ("FICCI"), the Data Security Council of India ("DSCI") and Privacy International are, in partnership, conducting a series of national privacy roundtable meetings across India from April to October 2013. The roundtable meetings are designed to discuss possible frameworks to privacy in India.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p&gt;&lt;i&gt;This research was undertaken as part of the 'SAFEGUARDS' project that CIS is undertaking with Privacy International and IDRC.&lt;/i&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Background: The Roundtable Meetings and Organisers&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/"&gt;CIS&lt;/a&gt; is a Bangalore-based non-profit think-tank and research organisation with interests in, amongst other fields, the law, policy and practice of free speech and privacy in India. &lt;a href="http://www.ficci.com/"&gt;FICCI&lt;/a&gt; is a non-governmental, non-profit association of approximately 250,000 Indian bodies corporate. It is the oldest and largest organisation of businesses in India and represents a national corporate consensus on policy issues. &lt;a href="http://www.dsci.in/"&gt;DSCI&lt;/a&gt; is an initiative of the National Association of Software and Service Companies, a non-profit trade association of Indian information technology ("IT") and business process outsourcing ("BPO") concerns, which promotes data protection in India. &lt;a href="https://www.privacyinternational.org/"&gt;Privacy International&lt;/a&gt; is a London-based non-profit organisation that defends and promotes the right to privacy across the world.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy in the Common Law and in India&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Because privacy is a multi-faceted concept, it has rarely been singly regulated. A taxonomy of privacy yields many types of individual and social activity to be differently regulated based on the degree of harm that may be caused by intrusions into these activities.&lt;a href="#fn1" name="fr1"&gt;[1] &lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The nature of the activity is significant; activities that are implicated by the state are attended by public law concerns and those conducted by private persons &lt;i&gt;inter se&lt;/i&gt; demand market-based regulation. Hence, because the principles underlying warranted police surveillance differ from those prompting consensual collections of personal data for commercial purposes, legal governance of these different fields must proceed differently. For this and other reasons, the legal conception of privacy — as opposed to its cultural construction – has historically been diverse and disparate.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Traditionally, specific legislations have dealt separately with individual aspects of privacy in tort law, constitutional law, criminal procedure and commercial data protection, amongst other fields. The common law does not admit an enforceable right to privacy.&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; In the absence of a specific tort of privacy, various equitable remedies, administrative laws and lesser torts have been relied upon to protect the privacy of claimants.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question of whether privacy is a constitutional right has been the subject of limited judicial debate in India. The early cases of &lt;i&gt;Kharak Singh&lt;/i&gt; (1964)&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; and &lt;i&gt;Gobind&lt;/i&gt; (1975)&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; considered privacy in terms of physical surveillance by the police in and around the homes of suspects and, in the latter case, the Supreme Court of India found that some of the Fundamental Rights “could be described as contributing to the right to privacy” which was nevertheless subject to a compelling public interest. This inference held the field until 1994 when, in the &lt;i&gt;Rajagopal&lt;/i&gt; case (1994),&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty guaranteed by Article 21 of the Constitution of India. However, &lt;i&gt;Rajagopal&lt;/i&gt; dealt specifically with a book, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case (1996)&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; and, while finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards.&lt;a href="#fn8" name="fr8"&gt;[8] &lt;/a&gt;A more robust statement of the right to privacy was made recently by the Delhi High Court in the &lt;i&gt;Naz &lt;/i&gt;&lt;i&gt;Foundation&lt;/i&gt; case (2011)&lt;a href="#fn9" name="fr9"&gt;[9] &lt;/a&gt;that de-criminalised consensual homosexual acts; however, this judgment is now in appeal.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Attempts to Create a Statutory Regime&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The silence of the common law leaves the field of privacy in India open to occupation by statute. With the recent and rapid growth of the Indian IT and BPO industry, concerns regarding the protection of personal data to secure privacy have arisen. In May 2010, the European Union ("EU") commissioned an assessment of the adequacy of Indian data protection laws to evaluate the continued flow of personal data of European data subjects into India for processing. That assessment made adverse findings on the adequacy and preparedness of Indian data protection laws to safeguard personal data.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Conducted amidst negotiations for a free trade agreement between India and the EU, the failed assessment potentially impeded the growth of India’s outsourcing industry that is heavily reliant on European and North American business.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Consequently, the Department of Electronics and Information Technology of the Ministry of Communications and Information Technology, Government of India, issued subordinate legislation under the rule-making power of the Information Technology Act, 2000 ("IT Act"), to give effect to section 43A of that statute. These rules – the Information Technology (Reasonable Security Practices and Procedures and Sensitive Personal Data or Information) Rules, 2011 ("Personal Data Rules")&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; — were subsequently reviewed by the Committee on Subordinate Legislation of the 15&lt;sup&gt;th&lt;/sup&gt; Lok Sabha.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; The Committee found that the Personal Data Rules contained clauses that were ambiguous, invasive of privacy and potentially illegal.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, a draft privacy legislation called the ‘Right to Privacy Bill, 2011’, which was drafted within the Department of Personnel and Training ("DoPT") of the Ministry of Personnel, Public Grievances and Pensions, Government of India,  was made available on the internet along with several file notings ("First DoPT Bill"). The First DoPT Bill contained provisions for the regulation of personal data, interception of communications, visual surveillance and direct marketing. The First DoPT Bill was referred to a Committee of Secretaries chaired by the Cabinet Secretary which, on 27 May 2011, recommended several changes including re-drafts of the chapters relating to interception of communications and surveillance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Aware of the need for personal data protection laws to enable economic growth, the Planning Commission constituted a Group of Experts under the chairmanship of Justice Ajit P. Shah, a retired Chief Justice of the Delhi High Court who delivered the judgment in the &lt;i&gt;Naz Foundation&lt;/i&gt; case, to study foreign privacy laws, analyse existing Indian legal provisions and make specific proposals for incorporation into future Indian law. The Justice Shah Group of Experts submitted its Report to the Planning Commission on 16 October 2012 wherein it proposed the adoption of nine National Privacy Principles.&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; These are the principles of notice, choice and consent, collection limitation, purpose limitation, disclosure of information, security, openness, and accountability. The Report recommended the application of these principles in laws relating to interception of communications, video and audio recordings, use of personal identifiers, bodily and genetic material, and personal data.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Criminal Procedure and Special Laws Relating to Privacy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;While the &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; cases first brought the questions of permissibility and limits of police surveillance to the Supreme Court, the power to collect information and personal data of a person is firmly embedded in Indian criminal law and procedure. Surveillance is an essential condition of the nation-state; the inherent logic of its foundation requires the nation-state to perpetuate itself by interdicting threats to its peaceful existence. Surveillance is a method by which the nation-state’s agencies interdict those threats. The challenge for democratic countries such as India is to find the optimal balance between police powers of surveillance and the essential freedoms of its citizens, including the right to privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The regime governing the interception of communications is contained in section 5(2) of the Indian Telegraph Act, 1885 ("Telegraph Act") read with rule 419A of the Indian Telegraph Rules, 1951 ("Telegraph Rules"). The Telegraph Rules were amended in 2007&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; to give effect to, amongst other things, the procedural safeguards laid down by the Supreme Court in the &lt;i&gt;PUCL&lt;/i&gt; case. However, India’s federal scheme permits States to also legislate in this regard. Hence, in addition to the general law on interceptions contained in the Telegraph Act and Telegraph Rules, some States have also empowered their police forces with interception functions in certain cases.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; Ironically, even though some of these State laws invoke heightened public order concerns to justify their invasions of privacy, they establish procedural safeguards based on the principle of probable cause that surpasses the Telegraph Rules.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, further subordinate legislation issued to fulfil the provisions of sections 69(2) and 69B(3) of the IT Act permit the interception and monitoring of electronic communications — including emails — to collect traffic data and to intercept, monitor, and decrypt electronic communications.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The proposed Privacy (Protection) Bill, 2013 and Roundtable Meetings&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In this background, the proposed Privacy (Protection) Bill, 2013 seeks to protect privacy by regulating (i) the manner in which personal data is collected, processed, stored, transferred and destroyed — both by private persons for commercial gain and by the state for the purpose of governance; (ii) the conditions upon which, and procedure for, interceptions of communications — both voice and data communications, including both data-in-motion and data-at-rest — may be conducted and the authorities permitted to exercise those powers; and, (iii) the manner in which forms of surveillance not amounting to interceptions of communications — including the collection of intelligence from humans, signals, geospatial sources, measurements and signatures, and financial sources — may be conducted.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Previous roundtable meetings to seek comments and opinion on the proposed Privacy (Protection) Bill, 2013 took place at:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;New Delhi: April 13, 2013 (&lt;a class="external-link" href="http://bit.ly/17REl0W"&gt;http://bit.ly/17REl0W&lt;/a&gt;) with 45 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Bangalore: April 20, 2013 (&lt;a class="external-link" href="http://bit.ly/162t8rU"&gt;http://bit.ly/162t8rU&lt;/a&gt;) with 45 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Chennai: May 18, 2013 (&lt;a class="external-link" href="http://bit.ly/12ICGYD"&gt;http://bit.ly/12ICGYD&lt;/a&gt;) with 25 participants.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Mumbai, June 15, 2013 (&lt;a class="external-link" href="http://bit.ly/12fJSvZ"&gt;http://bit.ly/12fJSvZ&lt;/a&gt;) with 20 participants;&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kolkata: July 13, 2013 (&lt;a class="external-link" href="http://bit.ly/11dgINZ"&gt;http://bit.ly/11dgINZ&lt;/a&gt;) with 25 participants; and&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;New Delhi: August 24, 2013 (&lt;a class="external-link" href="http://bit.ly/195cWIf"&gt;http://bit.ly/195cWIf&lt;/a&gt;) with 40 participants.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;The roundtable meetings were multi-stakeholder events with participation from industry representatives, lawyers, journalists, civil society organizations and Government representatives. On an average, 75 per cent of the participants represented industry concerns, 15 per cent represented civil society and 10 per cent represented regulatory authorities. The model followed at the roundtable meetings allowed for equal participation from all participants.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. See generally, Dan Solove, “A Taxonomy of Privacy” &lt;i&gt;University of Pennsylvania Law Review&lt;/i&gt; (Vol. 154, No. 3, January 2006).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office&lt;/i&gt; [2003] UKHL 53.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See &lt;i&gt;A&lt;/i&gt; v. &lt;i&gt;B plc&lt;/i&gt; [2003] QB 195; &lt;i&gt;Wainwright&lt;/i&gt; v. &lt;i&gt;Home Office &lt;/i&gt;[2001] EWCA Civ 2081; &lt;i&gt;R (Ellis)&lt;/i&gt; v. &lt;i&gt;Chief Constable of Essex Police&lt;/i&gt; [2003] EWHC 1321 (Admin).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. &lt;i&gt;Kharak Singh&lt;/i&gt; v. &lt;i&gt;State of Uttar Pradesh&lt;/i&gt; AIR 1963 SC 1295.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. &lt;i&gt;Gobind&lt;/i&gt; v. &lt;i&gt;State of Madhya Pradesh&lt;/i&gt; AIR 1975 SC 1378.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;R. Rajagopal&lt;/i&gt; v. &lt;i&gt;State of Tamil Nadu&lt;/i&gt; AIR 1995 SC 264.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;i&gt;People’s Union for Civil Liberties&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; (1997) 1 SCC 30.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;]. A Division Bench of the Supreme Court of India comprising Kuldip Singh and Saghir Ahmad, JJ, found that the procedure set out in section 5(2) of the Indian Telegraph Act, 1885 and rule 419 of the Indian Telegraph Rules, 1951 did not meet the “just, fair and reasonable” test laid down in &lt;i&gt;Maneka Gandhi&lt;/i&gt; v. &lt;i&gt;Union of India&lt;/i&gt; AIR 1978 SC 597 requisite for the deprivation of the right to personal liberty, from whence the Division Bench found a right to privacy emanated, guaranteed under Article 21 of the Constitution of India. Therefore, Kuldip Singh, J, imposed nine additional procedural safeguards that are listed in paragraph 35 of the judgment.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. &lt;i&gt;Naz Foundation&lt;/i&gt; v. &lt;i&gt;Government of NCT Delhi&lt;/i&gt; (2009) 160 DLT 277.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. The 2010 data adequacy assessment of Indian data protection laws was conducted by Professor Graham Greenleaf. His account of the process and his summary of Indian law can found at Graham Greenleaf, "Promises and Illusions of Data Protection in Indian Law"&lt;i&gt; International Data Privacy Law&lt;/i&gt; (47-69, Vol. 1, No. 1, March 2011).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. The Rules were brought into effect vide Notification GSR 313(E) on 11 April 2011. CIS submitted comments on the Rules that can be found here – &lt;a href="https://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011"&gt;http://cis-india.org/internet-governance/blog/comments-on-the-it-reasonable-security-practices-and-procedures-and-sensitive-personal-data-or-information-rules-2011&lt;/a&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. The Committee on Subordinate Legislation, a parliamentary ‘watchdog’ committee, is mandated by rules 317-322 of the Rules of Procedure and Conduct of Business in the Lok Sabha (14&lt;sup&gt;th&lt;/sup&gt; edn., New Delhi: Lok Sabha Secretariat, 2010) to examine the validity of subordinate legislation.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr13" name="fn13"&gt;13&lt;/a&gt;]. See the 31&lt;sup&gt;st&lt;/sup&gt; Report of the Committee on Subordinate Legislation that was presented on 21 March 2013.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. See paragraphs 7.14-7.17 on pages 69-72 of the Report of the Group of Experts on Privacy, 16 October 2012, Planning Commission, Government of India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. See, the Indian Telegraph (Amendment) Rules, 2007, which were brought into effect &lt;i&gt;vide&lt;/i&gt; Notification GSR 193(E) of the Department of Telecommunications of the Ministry of Communications and Information Technology, Government of India, dated 1 March 2007.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. See, &lt;i&gt;inter alia&lt;/i&gt;, section 14 of the Maharashtra Control of Organised Crime Act, 1999; section 14 of the Andhra Pradesh Control of Organised Crime Act, 2001; and, section 14 of the Karnataka Control of Organised Crime Act, 2000.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. See, the Information Technology (Procedure and Safeguards for Monitoring and Collecting Traffic Data and Information) Rules, 2009 vide GSR 782 (E) dated 27 October 2009; and, Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 vide GSR 780 (E) dated 27 October 2009.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings'&gt;https://cis-india.org/internet-governance/blog/national-privacy-roundtable-meetings&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>SAFEGUARDS</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-03-21T10:03:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril">
    <title>India:Privacy in Peril</title>
    <link>https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril</link>
    <description>
        &lt;b&gt;The danger of mass surveillance in India is for real. The absence of a regulating law is damning for Indians who want to protect their privacy against the juggernaut of state and private surveillance.&lt;/b&gt;
        &lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;The article was originally &lt;a class="external-link" href="http://www.frontline.in/cover-story/india-privacy-in-peril/article4849211.ece"&gt;published in the Frontline&lt;/a&gt; on July 12, 2013.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;At the concluding scene of his latest movie, Superman disdainfully flings a  surveillance drone down to earth in front of a horrified general. “You  can’t control me,” he tells his military minder. “You can’t find out  where I hang up my cape.” This exchange goes to the crux of  surveillance: control. Surveillance is the means by which nation-states  exercise control over people. If the logical basis of the nation-state  is the establishment and maintenance of homogeneity, it is necessary to  detect and interdict dissent before it threatens the boundedness and  continuity of the national imagination. This imagination often cannot  encompass diversity, so it constructs categories of others that include  dissenters and outsiders. Admittedly, this happens less in India because  the foundation of the Indian nation-state imagined a diverse society  expressing a plurality of ideas in a variety of languages secured by a  syncretic and democratic government that protected individual freedoms.  Unfortunately, this vision is still to be realised, and the foundational  idea of India continues to be challenged by poor governance, poverty,  insurgencies and rebellion. Consequently, surveillance is, for the  modern nation-state, a &lt;i&gt;condicio sine qua non&lt;/i&gt;—an essential element  without which it will eventually cease to exist. The challenge for  democratic nation-states is to find the optimal balance between  surveillance and the duty to protect the freedoms of its citizens.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;History of wiretaps&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some countries, such as the United States, have assembled a vast  apparatus of surveillance to monitor the activities of their citizens  and foreigners. Let us review the recent controversy revealed by the  whistle-blower Edward Snowden. In 1967, the U.S. Supreme Court ruled in &lt;i&gt;Katz vs United States&lt;/i&gt; that wiretaps had to be warranted, judicially sanctioned and supported  by probable cause. This resulted in the passage of the Wiretap Act of  1968 that regulated domestic surveillance. Following revelations that  Washington was engaging in unrestricted foreign surveillance in the  context of the Vietnam war and anti-war protests, the U.S. Congress  enacted the Foreign Intelligence Surveillance Act (FISA) in 1978. FISA  gave the U.S. government the power to conduct, without judicial  sanction, surveillance for foreign intelligence information; and, with  judicial sanction from a secret FISA court, surveillance of anybody if  the ultimate target was a foreign power. Paradoxically, even a U.S.  citizen could be a foreign power in certain circumstances. Domestically,  FISA enabled secret warrants for specific items of information such as  library book borrowers and car rentals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Following the 9/11 World Trade Centre attacks, Congress enacted the Patriot Act of 2001, Section 215 of which dramatically expanded the scope of FISA to allow secret warrants to conduct surveillance in respect of “any tangible thing” that was relevant to a national security investigation. In exercise of this power, a secret FISA court issued secret warrants ordering a number of U.S. companies to share, in real time, voice and data traffic with the National Security Agency (NSA). We may never know the full scope of the NSA’s surveillance, but we know this: (a) Verizon Communications, a telecommunications major, was ordered to provide metadata for all telephone calls within and without the U.S.; (b) the NSA runs a clandestine programme called PRISM that accesses Internet traffic, such as e-mails, web searches, forum comments and blogs, in real time; and (c) the NSA manages a comprehensive data analysis system called Boundless Informant that intercepts and analyses voice and data traffic around the world and subjects them to automated pattern recognition. The documents leaked by Snowden allege that Google, Facebook, Apple, Dropbox, Microsoft and Yahoo! participate in PRISM, but these companies have denied their involvement.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;India fifth-most monitored&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;How does this affect India? The Snowden documents reveal that India is the NSA’s fifth-most monitored country after Iran, Pakistan, Jordan and Egypt. Interestingly, China is monitored less than India. Several billion pieces of data from India, such as e-mails and telephone metadata, were intercepted and monitored by the NSA. For Indians, it is not inconceivable that our e-mails, should they be sent using Gmail, Yahoo! Mail or Hotmail, or our documents, should we be subscribing to Dropbox, or our Facebook posts, are being accessed and read by the NSA. Incredibly, most Indian governmental communication, including that of Ministers and senior civil servants, use private U.S. e-mail services. We no longer enjoy privacy online. The question of suspicious activity, irrespective of the rubric under which suspicion is measured, is moot. Any use of U.S. service providers is potentially compromised since U.S. law permits intrusive dragnet surveillance against foreigners. This clearly reveals a dichotomy in U.S. constitutional law: the Fourth Amendment’s guarantees of privacy, repeatedly upheld by U.S. courts, protect U.S. citizens to a far greater extent than they do foreigners. It is natural for a nation-state to privilege the rights of its citizens over others. As Indians, therefore, we must clearly look out for ourselves.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy and personal liberty&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, India does not have a persuasive jurisprudence of privacy protection. In the Kharak Singh (1964) and Gobind (1975) cases, the Supreme Court of India considered the question of privacy from physical surveillance by the police in and around homes of suspects. In the latter case, the court found that some of the Fundamental Rights “could be described as contributing to the right to privacy”, which was subject to a compelling public interest. This insipid inference held the field until 1994 when, in the Rajagopal (“Auto Shankar”, 1994) case, the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty recognised by Article 21 of the Constitution. However, Rajagopal dealt specifically with the publication of an autobiography, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the People’s Union for Civil Liberties (PUCL) case. While finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards which continue to be routinely ignored. A more robust statement of the right to privacy was made by the Delhi High Court in the Naz Foundation case (2011) that decriminalised consensual homosexual acts; however, there is an appeal against the judgment in the Supreme Court.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Legislative silence&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Judicial vagueness has been compounded by legislative silence. India does not have a law to operationalise a right to privacy. Consequently, a multitude of laws permit daily infractions of privacy. These infractions have survived because they are diverse, dissipated and quite disorganised. However, the technocratic impulse to centralise and consolidate surveillance and data collection has, in recent years, alarmed many citizens. The state hopes to, through enterprises such as the Central Monitoring System (CMS), the Crime and Criminals Tracking Network and System (CCTNS), the National Intelligence Grid (NATGRID), the Telephone Call Interception System (TCIS) and the Unique Identification Number (UID), replicate the U.S. successes in surveillance and monitoring and profiling all its citizens. However, unlike the U.S., India proposes to achieve this without an enabling law. Let us consider the CMS. No documents have been made available that indicate the scope and size of the CMS.&lt;br /&gt;&lt;br /&gt;From a variety of police tenders for private equipment, it appears that the Central government hopes to put in place a system that will intercept, in real time, all voice and data traffic originating or terminating in India or being carried by Indian service providers. This data will be subject to pattern recognition and other automated tests to detect emotional markers, such as hate, compassion or intent. The sheer scale of this enterprise is intimidating; all communications in India’s many languages will be subject to interception and testing designed to detect different forms of dissent. This mammoth exercise in monitoring is taking place—it is understood that some components of the CMS are already operational—without statutory sanction. No credible authorities exist to supervise this exercise, no avenues for redress have been identified and no consequences have been laid down for abuse.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Statutory Surveillance&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In a recent interview, Milind Deora, Minister of State for Communications and Information Technology, dismissed public scepticism of the CMS saying that direct state access to private communications was better for privacy since it reduced dependence on the interception abilities of private service providers. This circular argument is both disingenuous and incorrect. No doubt, trusting private persons with the power to intercept and store the private data of citizens is flawed. The leaking of the Niira Radia tapes, which contain the private communications of Niira Radia taped on the orders of the Income Tax Department, testifies to this flaw. However, bypassing private players to enable direct state access to private communications will preclude leaks and, thereby, remove from public knowledge the fact of surveillance. This messy situation may be obviated by a regime of statutory regulation of warranted surveillance by an independent and impartial authority. This system is favoured by liberal democracies around the world but conspicuously resisted by the Indian government.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The question of privacy legislation was recently considered by a committee chaired by Justice Ajit Prakash Shah, a former judge of the Delhi High Court who sat on the Bench that delivered the Naz Foundation judgment. The Shah Committee was constituted by the Planning Commission for a different reason: the need to protect personal data that are outsourced to India for processing. The lack of credible privacy law, it is foreseen, will result in European and other foreign personal data being sent to other attractive processing destinations, such as Vietnam, Israel or the Philippines, resulting in the decline of India’s outsourcing industry. However, the Shah Committee also noted the absence of law sufficient to protect against surveillance abuses. Most importantly, the Shah Committee formulated nine national privacy principles to inform any future privacy legislation (see story on page 26). In 2011, the Department of Personnel and Training (DoPT) of the Ministry of Human Resource Development, the same Ministry entrusted with implementing the Right to Information Act, 2005, leaked a draft privacy Bill, marked ‘Secret’, on the Internet. The DoPT Bill received substantive criticism from the Attorney General and some government Secretaries for the clumsy drafting. A new version of the DoPT Bill is reported to have been drafted and sent to the Ministry of Law for consideration. This revised Bill, which presumably contains chapters to regulate surveillance, including the interception of communications, has not been made public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The need for privacy legislation cannot be overstated. The Snowden affair reveals the extent of possible state surveillance of private communications. For Indians who must now explore ways to protect their privacy against the juggernaut of state and private surveillance, the absence of regulatory law is damning. Permitting, through public inaction, unwarranted and non-targetted dragnet surveillance by the Indian state without reasonable cause would be an act of surrender of far-reaching implications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Information, they say, is power. Allowing governments to exercise this power over us without thought for the rule of law constitutes the ultimate submission possible in a democratic nation-state. And, since superheroes are escapist fantasies, without the prospect of good laws we will all be subordinate to a new national imagination of control and monitoring, surveillance and profiling. If allowed to come to pass, this will be a betrayal of the foundational idea of India as a free and democratic republic tolerant of dissent.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;i&gt;Bhairav Acharya is a constitutional lawyer practising in the Supreme Court of India. He advises the Centre for Internet &amp;amp; Society, Bangalore, on privacy law and other constitutional issues&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril'&gt;https://cis-india.org/internet-governance/blog/frontline-cover-story-july-12-2013-bhairav-acharya-privacy-in-peril&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T09:56:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament">
    <title>The Central Monitoring System: Some Questions to be Raised in Parliament</title>
    <link>https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament</link>
    <description>
        &lt;b&gt;The following are some model questions to be raised in the Parliament regarding the lack of transparency in the central monitoring system.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Preliminary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The Central Monitoring System (CMS) is a Central Government project to intercept communications, both voice and data, that is transmitted via telephones and the internet to, from and within India. Owing to the vast nature of this enterprise, the CMS cannot be succinctly described and the many issues surrounding this project are diverse. This Issue Brief will outline preliminary constitutional, legal and technical concerns that are presented by the CMS.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;At the outset, it must be clearly understood that no public documentation exists to explain the scope, functions and technical architecture of the CMS. This lack of transparency is the single-largest obstacle to understanding the Central Government’s motives in conceptualising and operationalizing the CMS. This lack of public documentation is also the chief reason for the brevity of this Issue Note. Without making public the policy, law and technical abilities of the CMS, there cannot be an informed national debate on the primary concerns posed by the CMS, i.e the extent of envisaged state surveillance upon Indian citizens and the safeguards, if any, to protect the individual right to privacy. &lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Surveillance and Privacy&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Surveillance is necessary to secure political organisation. Modern nation-states, which are theoretically organised on the basis of shared national and societal characteristics, require surveillance to detect threats to these characteristics. In democratic societies, beyond the immediate requirements of national integrity and security, surveillance must be targeted at securing the safety and rights of individual citizens. This Issue Brief does not dispute the fact that democratic countries, such as India, should conduct surveillance to secure legitimate ends. Concerns, however, arise when surveillance is conducted in a manner unrestricted and unregulated by law; these concerns are compounded when a lack of law is accompanied by a lack of transparency.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Technological advancement leads to more intrusive surveillance. The evolution of surveillance in the United States resulted, in 1967, in the first judicial recognition of the right to privacy. In &lt;i&gt;Katz&lt;/i&gt; v. &lt;i&gt;United States&lt;/i&gt; the US Supreme Court ruled that the privacy of communications had to be balanced with the need to conduct surveillance; and, therefore, wiretaps had to be warranted, judicially sanctioned and supported by probable cause. &lt;i&gt;Katz&lt;/i&gt; expanded the scope of the Fourth Amendment of the US Constitution, which protected against unreasonable searches and seizures. Most subsequent US legal developments relating to the privacy of communications from surveillance originate in the &lt;i&gt;Katz&lt;/i&gt; judgement. Other common law countries, such as the United Kingdom and Canada, have experienced similar judicial evolution to recognise that the right to privacy must be balanced with governance.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;&lt;br /&gt;Right to Privacy in India&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Unfortunately, India does not have a persuasive jurisprudence of privacy protection. In the &lt;i&gt;Kharak Singh&lt;/i&gt; (1964) and &lt;i&gt;Gobind&lt;/i&gt; (1975) cases, the Supreme Court of India considered the question of privacy from physical surveillance by the police in and around the homes of suspects. In the latter case, the Supreme Court found that some of the Fundamental Rights “could be described as contributing to the right to privacy” which was nevertheless subject to a compelling public interest. This insipid inference held the field until 1994 when, in the &lt;i&gt;Rajagopal&lt;/i&gt; (“Auto Shankar”, 1994) case, the Supreme Court, for the first time, directly located privacy within the ambit of the right to personal liberty recognised by Article 21 of the Constitution. However, &lt;i&gt;Rajagopal&lt;/i&gt; dealt specifically with the publication of an autobiography, it did not consider the privacy of communications. In 1997, the Supreme Court considered the question of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case. While finding that wiretaps invaded the privacy of communications, it continued to permit them subject to some procedural safeguards which continue to be routinely ignored. A more robust statement of the right to privacy was made recently by the Delhi High Court in the &lt;i&gt;Naz &lt;/i&gt;&lt;i&gt;Foundation&lt;/i&gt; case (2011) that de-criminalised consensual homosexual acts; however, this judgment has been appealed to the Supreme Court.&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;b&gt;&lt;span style="text-decoration: underline;"&gt;Issues Pertaining to the CMS&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;While judicial protection from physical surveillance was cursorily dealt with in the &lt;i&gt;Kharak Singh&lt;/i&gt; and &lt;i&gt;Gobind&lt;/i&gt; cases, the Supreme Court of India directly considered the issue of wiretaps in the &lt;i&gt;PUCL&lt;/i&gt; case. Wiretaps in India primarily occur on the strength of powers granted to certain authorities under section 5(2) of the Indian Telegraph Act, 1885. The Court found that the Telegraph Act, and Rules made thereunder, did not prescribe adequate procedural safeguards to create a “just and fair” mechanism to conduct wiretaps. Therefore, it laid down the following procedure to conduct wiretaps: &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;(a) the order should be issued by the relevant Home Secretary (this power is delegable to a Joint Secretary),&lt;br /&gt; (b) the interception must be carried out exactly in terms of the order and not in excess of it,&lt;br /&gt; (c) a determination of whether the information could be reasonably secured by other means,&lt;br /&gt; (d) the interception shall cease after sixty (60) days.&lt;/p&gt;
&lt;ul&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Therefore, prima facie, any voice interception conducted through the CMS will be in violation of this Supreme Court judgement. The CMS will enforce blanket surveillance upon the entire country without regard for reasonable cause or necessity. This movement away from targeted surveillance to blanket surveillance without cause, conducted without statutory sanction and without transparency, is worrying.&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Accordingly, the following questions may be raised, in Parliament, to learn more about the CMS project: &lt;/li&gt;
&lt;/ul&gt;
&lt;ol&gt;
&lt;li&gt;Which statutes, Government Orders, notifications etc deal with the establishment and maintenance of the CMS?&lt;/li&gt;
&lt;li&gt;Which is the nodal agency in charge of implementing the CMS?&lt;/li&gt;
&lt;li&gt;What are the powers and functions of the nodal agency?&lt;/li&gt;
&lt;li&gt;What guarantees exist to protect ordinary Indian citizens from intrusive surveillance without cause?&lt;/li&gt;
&lt;li&gt;What are the technical parameters of the CMS?&lt;/li&gt;
&lt;li&gt;What are the consequences for misuse or abuse of powers by any person working in the CMS project?&lt;/li&gt;
&lt;li&gt;What recourse is available to Indian citizens against whom there is unnecessary surveillance or against whom there has been a misuse or abuse of power?&lt;/li&gt;
&lt;/ol&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament'&gt;https://cis-india.org/internet-governance/blog/central-monitoring-system-questions-to-be-asked-in-parliament&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Central Monitoring System</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-09-25T10:30:10Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra">
    <title>An Analysis of the Cases Filed under Section 46 of the Information Technology Act, 2000  for Adjudication in the State of Maharashtra</title>
    <link>https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra</link>
    <description>
        &lt;b&gt;This is a brief review of some of the cases related to privacy filed under section 46 of the Information Technology Act, 2000 ("the Act") seeking adjudication for alleged contraventions of the Act in the State of Maharashtra. &lt;/b&gt;
        &lt;h3&gt;Background&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Section 46 of the Act grants the Central Government the power to appoint an adjudicating officer to hold an enquiry to adjudge, upon complaints being filed before that adjudicating officer, contraventions of the Act. The adjudicating officer may be of the Central Government or of the State Government [see section 46(1) of the Act], must have field experience with information technology and law [see section 46(3) of the Act] and exercises jurisdiction over claims for damages up to `5,00,00,000 [see section 46(1A) of the Act]. For the purpose of adjudication, the officer is vested with certain powers of a civil court [see section 46(5) of the Act] and must follow basic principles of natural justice while conducting adjudications [see section 46(2) of the Act]. Hence, the adjudicating officer appointed under section 46 is a quasi-judicial authority.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In addition, the quasi-judicial adjudicating officer may impose penalties, thereby vesting him with some of the powers of a criminal court [see section 46(2) of the Act], and award compensation, the quantum of which is to be determined after taking into account factors including unfair advantage, loss and repeat offences [see section 47 of the Act]. The adjudicating officer may impose penalties for any of the offences described in section 43, section 44 and section 45 of the Act; and, further, may award compensation for losses suffered as a result of contraventions of section 43 and section 43A. The text of these sections is reproduced in the Schedule below. Further law as to the appointment of the adjudicating officer and the procedure attendant on all adjudications was made by Information Technology (Qualification and Experience of Adjudicating Officers and the Manner of Holding Enquiry) Rules, 2003.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is clear that the adjudicating officer is vested with significant judicial powers, including the power to enforce certain criminal penalties, and is an important quasi-judicial authority.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Excursus&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;At the outset, it is important to understand the distinction between compensation and damages. Compensation is a sum of money awarded by a civil court, before or along with the primary decree, to indemnify a person for injury or loss. It is usually awarded to a person who has a suffered a monetary loss as a result of the acts or omissions of another party. Its quantification is usually guided by principles of equity. [See &lt;i&gt;Shantilal Mangaldas&lt;/i&gt; AIR 1969 SC 634 and &lt;i&gt;Ranbir Kumar Arora&lt;/i&gt; AIR 1983 P&amp;amp;H 431]. On the hand, damages are punitive and, in addition to restoring an indemnitee to wholeness, may be imposed to deter an offender, punish exemplary offences, and recover consequential losses, amongst other objectives. Damages that are punitive, while not judicially popular in India, are usually imposed by a criminal court in common law jurisdictions. They are distinct from civil and equitable actions. [See the seminal case of &lt;i&gt;The Owners of the Steamship Mediana&lt;/i&gt; [1900] AC 113 (HL)].&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unfortunately, section 46 of the Act uses the terms “damage”, “injury” and “compensation” interchangeably without regard for the long and rich jurisprudence that finds them to be different concepts.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Cases related to Privacy&lt;/h3&gt;
&lt;p&gt;In the State of Maharashtra, there have been a total of 47 cases filed under section 46 of the Act. Of these, 33 cases have been disposed of by the Adjudicating Officer and 14 are currently pending disposal. &lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; At least three of these cases before the Adjudicating Officer deal with issues related to privacy of communications and personal data. They are:&lt;/p&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;Case Title&lt;/th&gt;&lt;th&gt;Forum&lt;/th&gt;&lt;th&gt;Date&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p&gt;&lt;i&gt;Vinod Kaushik&lt;/i&gt; v. &lt;i&gt;Madhvika Joshi&lt;/i&gt;&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio Secretary&lt;/i&gt;, IT&lt;br /&gt;Government of Maharashtra&lt;/td&gt;
&lt;td&gt;10.10.2011&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Amit D. Patwardhan&lt;/i&gt; v. &lt;i&gt;Rud India Chains&lt;/i&gt;&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio&lt;/i&gt;&lt;br /&gt;Secretary, IT&lt;br /&gt;Government of Maharashtra&lt;/td&gt;
&lt;td&gt;15.04.2013&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;&lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; v. &lt;i&gt;Minal Bagherwal&lt;/i&gt;&lt;/td&gt;
&lt;td&gt;Shri Rajesh Aggarwal&lt;br /&gt;Adjudicating Officer, &lt;i&gt;ex-officio Secretary&lt;/i&gt;, IT&lt;br /&gt;Government of Maharashtra&lt;br /&gt;&lt;/td&gt;
&lt;td&gt;26.08.2013&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p style="text-align: justify; "&gt;In all three cases the Adjudicating Officer was called upon to determine and penalise unauthorised access to personal data of the complainants. In the &lt;i&gt;Vinod Kaushik&lt;/i&gt; case, the complainants’ emails and chat sessions were accessed, copied and made available to the police for legal proceedings without the permission of the complainants. In the &lt;i&gt;Amit Patwardhan&lt;/i&gt; and &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; cases, the complainants’ financial information in the form of bank account statements were obtained from their respective banks without their consent and used against them in legal proceedings.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Vinod Kaushik&lt;/i&gt; complaint was filed in 2010 for privacy violations committed between 2008 and 2009. The complaint was made against the complainant’s daughter-in-law – the respondent, who was estranged from her husband, the complainant’s son. The respondent had, independent of the proceedings before the Adjudicating Officer, instituted criminal proceedings alleging cruelty and dowry-related harassment against her estranged husband and the complainant. To support some of the claims made in the criminal proceedings, the respondent accessed the email accounts of her estranged husband and the complainant and printed copies of certain communications, both emails and chat transcripts. The complaint to the Adjudicating Officer was made in relation to these emails and chat transcripts that were obtained without the consent and knowledge of the complainant and his son. On 09.08.2010, the then Adjudicating Officer dismissed the complaint after finding that, owing to the marriage between the respondent and the complainant’s son, there was a relation of mutual trust between them that resulted in the complainant and his son consensually sharing their email account passwords with the respondent. This ruling was appealed to the Cyber Appellate Tribunal (&lt;b&gt;"CyAT"&lt;/b&gt;) which, in a decision of 29.06.2011, found irregularities in the complainant’s son’s privity to the proceedings and remanded the complaint to the Adjudicating Officer for re-adjudication. The re-adjudication, which was conducted by Shri Rajesh Aggarwal as Adjudicating Officer, resulted in a final order of 10.10.2011 (&lt;b&gt;"the final order"&lt;/b&gt;) that is the subject of this analysis. The final order found that the respondent had violated the privacy of the complainant and his son by her unauthorised access of their email accounts and sharing of their private communications. However, the Adjudicating Officer found that the intent of the unauthorised access – to obtain evidence to support a criminal proceeding – was mitigatory and hence ordered the respondent to pay only a small token amount in compensation, not to the complainants but instead to the State Treasury. The Delhi High Court, which was moved in appeal because the CyAT was non-functional, upheld the final order in its decision of 27.01.2012.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Amit Patwardhan&lt;/i&gt; complaint was filed against the complainant’s ex-employer – the respondent, for illegally obtaining copies of the complainant’s bank account statement. The complainant had left the employ of the respondent to work with a competing business company but not before colluding with the competing business company and diverting the respondent’s customers to them. For redress, the respondent filed suit for a decree of compensation and lead the complainant’s bank statements in evidence to prove unlawful gratification. Since the bank statements were obtained electronically by the respondent without the complainant’s consent, the jurisdiction of the Adjudicating Officer was invoked. In his order of 15.04.2013, Shri Rajesh Aggarwal, the Adjudicating Officer, found that the respondent had, by unlawfully obtaining the complainant’s bank account statements which constitute sensitive personal data, violated the complainant’s privacy. The Adjudicating Officer astutely applied the equitable doctrine of clean hands to deny compensation to the complainant; however, because the complainant’s bank was not a party to the complaint, the Adjudicating Officer was unable to make a ruling on the lack of action by the bank to protect the sensitive personal data of its depositors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; complaint bears a few similarities to the preceding two cases. Like the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter, the issue concerned the manner in which a wife, estranged but still legally married, accessed electronic records of personal data of the complainants; and, like the &lt;i&gt;Amit Patwardhan&lt;/i&gt; matter, the object of the privacy violation was the bank account statements of the complainants that constitute sensitive personal data. The respondent was the estranged wife of one of the complainants who, along with his complainant father, managed the third complainant company. To support her claim for maintenance from the complainant and his family in an independent legal proceeding, the respondent obtained certain bank account statements of the complainants without their consent and, possibly, with the collusion of the respondent bank. After reviewing relevant law from the European Union and the United States, and observant of relevant sectoral regulations applicable in India including the relevant Master Circular of the Reserve Bank of India, and further noting preceding consumer case law on the subject, the Adjudicating Officer issued an order on 26.08.2013. The order found that the complainant’s right to privacy was violated by both the respondents but, while determining the quantum of compensation, distinguished between the respondents in respect of the degree of liability; the respondent wife was ordered to pay a token compensation amount while the respondent bank was ordered to pay higher compensation to each of the three complainants individually.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The high quality of each of the three orders bears specific mention. Despite the superb quality of the judgments of the Indian higher judiciary in the decades after independence, the overall quality of judgment-writing appears to have declined. &lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; In the last decade, several Indian judges have called for higher standards of judgment writing from their fellow judges. &lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; In this background, it is notable that Shri Rajesh Aggarwal, despite not being a member of the judiciary, has delivered well-reasoned, articulate and clear orders that are cognisant of legal issues and also easily understandable to a non-legal reader.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In each of these cases, the Adjudicating Officer has successfully navigated around the fact that none of the primary parties were interacting and transacting at arm’s length. In the &lt;i&gt;Vinod Kaushik&lt;/i&gt; and &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; matters, the primary parties were estranged but still legally married partners and in the &lt;i&gt;Amit Patwardhan&lt;/i&gt; matter the parties were in an employer-employee relationship. The first Adjudicating Officer in the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter failed, in his order of 09.08.2010, to appreciate that the individual communications of individual persons were privileged by an expectation of privacy, regardless of their relationship. Hence, despite acknowledging that the marital partners in that matter were in conflict with each other, and despite being told by one party that the other party’s access to those private communications was made without consent, the Adjudicating Officer allowed his non-judicial opinion of marriage to influence his order. This mistake was corrected when the matter was remanded for re-adjudication. In the re-adjudication, the new Adjudicating Officer correctly noted that the respondent wife could have chosen to approach the police or a court to follow the proper investigative procedure for accessing emails and other private communications of another person and that her unauthorised use of the complainant’s passwords amounted to a violation of their privacy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Popular conceptions of different types of relationships may affect the (quasi) judicial imagination of privacy. In comparison to the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter, the &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; and &lt;i&gt;Amit Patwardhan&lt;/i&gt; matters both dealt with unauthorised access to bank account statements, by a wife and by an ex-employer respectively. In any event, the same Adjudicating Officer presided over all three matters and correctly found that the facts in all three matters admitted to contraventions of the privacy of the complainants. The conjecture as to whether the first Adjudicating Officer in the &lt;i&gt;Vinod Kaushik&lt;/i&gt; matter would have applied the same standard of family unity to unauthorised access of bank account statements by an estranged wife who was seeking maintenance remains untested. However, the reliance placed on the decision of the Delhi State Consumer Protection Commission in the matter of &lt;i&gt;Rupa Mahajan Pahwa,&lt;/i&gt; &lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; where the Commission found that unauthorised access to a bank pass book by an estranged husband violated the privacy of the wife, would suggest that judges clothe financial information with a standard of privacy higher than that given to emails.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Emails are a form of electronic communication. The &lt;i&gt;PUCL&lt;/i&gt; case (Supreme Court of India, 1996)&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; while it did not explicitly deal with the standard of protection accorded to emails, held that personal communications were protected by an individual right to privacy that emanated from the protection of personal liberty guaranteed under Article 21 of the Constitution of India. Following the &lt;i&gt;Maneka Gandhi&lt;/i&gt; case (Supreme Court of India, 1978)&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;it is settled that persons may be deprived of their personal liberty only by a just, fair and reasonable procedure established by law. As a result, interceptions of private communications that are protected by Article 21 may only be conducted in pursuance of such a procedure. This procedure exists in the form of the Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009 that came into effect on 27 October 2009 (&lt;b&gt;"the Interception Rules"&lt;/b&gt;). The Interception Rules set out a regime for accessing private emails in certain conditions. The powers and procedure of Section 91 of the Code of Criminal Procedure (&lt;b&gt;"CrPC")&lt;/b&gt; may also apply to obtain data at rest, such as emails stored in an inbox or sent-mail folder.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Finally, the orders of the Adjudicating Officer reveal a well-reasoned and progressive understanding of the law and principles relating to the quantification of compensation. By choosing to impose larger amounts of compensation on the bank that violated the privacy of the complainant in the &lt;i&gt;Nirmalkumar Bagherwal&lt;/i&gt; matter, the Adjudicating Officer has indicated that the institutions that hold sensitive personal data, such as financial information, are subject to a higher duty of care in relation of it. But, most importantly, the act of imposing monetary compensation of privacy violations is a step forward because, for the first time in India, it recognises that privacy violations are civil wrongs or injuries that demand compensation.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. These Rules were issued &lt;i&gt;vide&lt;/i&gt; GSR 220(E), dated 17 March 2003 and published in the Gazette of India, Extraordinary, Part II, Section 3(i). These Rules can be accessed here – &lt;a href="http://it.maharashtra.gov.in/PDF/Qual_ExpAdjudicatingOfficer_Manner_of_Holding_Enquiry_Rules.PDF"&gt;http://it.maharashtra.gov.in/PDF/Qual_ExpAdjudicatingOfficer_Manner_of_Holding_Enquiry_Rules.PDF&lt;/a&gt; (visited on 30 September 2013).&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. These cases and statistics may be viewed here – &lt;a href="http://it.maharashtra.gov.in/1089/IT-Act-Judgements"&gt;http://it.maharashtra.gov.in/1089/IT-Act-Judgements&lt;/a&gt; (visited on 30 September 2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. See generally, Upendra Baxi “"The Fair Name of Justice": The Memorable Voyage of Chief Justice Chandrachud” in &lt;i&gt;A Chandrachud Reader&lt;/i&gt; (Justice V. S. Deshpande ed., Delhi: Documentation Centre &lt;i&gt;etc.&lt;/i&gt;, 1985) and, Rajeev Dhavan, "Judging the Judges" in &lt;i&gt;Judges and the Judicial Power: Essays in Honour of Justice V. R. Krishna Iyer&lt;/i&gt; (Rajeev Dhavan and Salman Khurshid eds., London: Sweet &amp;amp; Maxwell, 1985).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. See generally, Justice B.G .Harindranath, &lt;i&gt;Art of Writing Judgments&lt;/i&gt; (Bangalore: Karnataka Judicial Academy, 2004); Justice T .S. Sivagnanam, &lt;i&gt;The Salient Features of the Art of Writing Orders and Judgments&lt;/i&gt; (Chennai: Tamil Nadu State Judicial Academy, 2010); and, Justice Sunil Ambwani, “Writing Judgments: Comparative Models” Presentation at the National Judicial Academy, Bhopal (2006) available here – &lt;a href="http://districtcourtallahabad.up.nic.in/articles/writing%20judgment.pdf"&gt;http://districtcourtallahabad.up.nic.in/articles/writing%20judgment.pdf&lt;/a&gt; (visited on 29 Sep 2013).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. Appeal No. FA-2008/659 of the Delhi State Consumer Protection Commission, decided on 16 October 2008.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. (1997) 1 SCC 301.&lt;/p&gt;
&lt;p&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. (1978) 1 SCC 248.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra'&gt;https://cis-india.org/internet-governance/blog/analysis-of-cases-filed-under-sec-48-it-act-for-adjudication-maharashtra&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2013-10-01T15:29:46Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/events/a-public-discussion-on-criminal-defamation-in-india">
    <title>A Public Discussion on Criminal Defamation in India</title>
    <link>https://cis-india.org/internet-governance/events/a-public-discussion-on-criminal-defamation-in-india</link>
    <description>
        &lt;b&gt;The Centre for Internet and Society (CIS); the Network of Women in Media, India; and Media Watch, Bengaluru, are hosting a public discussion on criminal defamation in India. The discussion will start at 5.30 pm on Wednesday, 29 July 2015, at the CIS office in Domlur, Bengaluru. &lt;/b&gt;
        &lt;table class="grid listing"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;th&gt;&lt;img src="https://cis-india.org/home-images/Flyer.png" alt="Flyer of the event" class="image-inline" title="Flyer of the event" /&gt;&lt;/th&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Pictured above: A poster of the event.&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;h2&gt;Decriminalising Defamation in India: A Brief Statement of Issues&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Subramanian Swamy’s petition to decriminalise defamation has been joined in the Supreme Court by concurring petitions from Rahul Gandhi and Arvind Kejriwal. Defamation is criminalised by sections 499 and 500 of the Indian Penal Code, 1860 (IPC). Swamy and his unlikely cohorts want the Supreme Court to declare that these criminal defamation provisions interfere with the right to free speech and strike them down.&lt;/p&gt;
&lt;div class="kssattr-macro-text-field-view kssattr-templateId-blogentry_view.pt kssattr-atfieldname-text plain" id="parent-fieldname-text"&gt;
&lt;p style="text-align: justify; "&gt;Although news coverage of  the case has focused on the motivations and arguments of the three  politicians, defamation should not be the sole province of celebrities  and the powerful. Unfortunately, criminal defamation has emerged as a  new system of censorship to silence journalists, writers, and activists.  SLAPP suits (Strategic Lawsuits against Public Participation) are being  increasingly used by large corporations to frighten and overwhelm  critics and opponents. SLAPP suits are not designed to succeed –  although they often do, they are intended to intimidate, harass, and  outspend journalists and activists into submission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The law of defamation rests on  uncertain foundations. In medieval Europe defamation was dually  prosecuted by the Church as a sin equal to sexual immorality, and by  secular courts for the threat of violence that accompanied defamatory  speech. These distinct concerns yielded a peculiar defence which fused  two elements: truth, which shielded the speaker from the sin of lying;  and, the public good, which protected the speaker from the charge of  disrupting the public peace. This dual formulation – truth and the  public good – remains the primary defence to defamation today.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India does not have a strong ‘fair  comment’ defence to protect speech that is neither true nor  intrinsically socially useful. This bolsters the law’s reflexive  censorship of speech that falls outside the bounds of social utility and  morality such as parody, caricature, outrageous opinion,  sensationalism, and rumour. This failure affects cartoonists and tabloid  sensationalism alike.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Defamation law is also open to  procedural misuse to maximise its harrassive effect. Since speech that  is published on the Internet or mass-printed and distributed can be read  almost anywhere, the venue of criminal defamation proceedings can be  chosen to inconvenience and exhaust a speaker into surrender. This  motivation explains the peculiarly remote location of several defamation  proceedings in India against journalists and magazine editors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The offence of defamation commoditises  reputation. While defamation remains a crime, the state must prosecute  it as it does other crimes such as murder and rape. This merits the  question: should the state expend public resources to defend the  individual reputations of its citizens? Such a system notionally  guarantees parity because if the state were to retreat from this role  leaving private persons to fight for their own reputations, the market  would favour the reputations of the rich and powerful at the expense of  others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These and other issues demand an  informed and rigorous public discussion about the continued  criminalisation of defamation in India.&lt;/p&gt;
&lt;/div&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/events/decriminalising-defamation-in-india.pdf" class="external-link"&gt;&lt;b&gt;Download the concept note prepared by Bhairav Acharya&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/events/a-public-discussion-on-criminal-defamation-in-india'&gt;https://cis-india.org/internet-governance/events/a-public-discussion-on-criminal-defamation-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Defamation</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-07-27T14:44:15Z</dc:date>
   <dc:type>Event</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy">
    <title>Roundtable on Indian Privacy Law and Policy</title>
    <link>https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy</link>
    <description>
        &lt;b&gt;This event was hosted by the Centre for Law and Development of the National University of Advanced Legal Studies (NUALS) in Kochi. It was attended by members of the faculty of NUALS, some students from the 2nd year, 3rd year, 4th year, and 5th year.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The meeting began with a talk by Bhairav Acharya on the origin of privacy law, its jurisprudential evolution, and the current context in which privacy is being debated in India and around the world.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav began by talking about the nature of privacy law around the world. Privacy has, until recently, never been a right in English common law. Indeed, the tort of invasion of privacy is also relatively incomplete. Privacy is protected through other torts, including the torts of nuisance, trespass, and others. European treaty requirements have foisted a right to privacy upon the British legal system; the contours of this right remain unclear.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;American courts, on the other hand, have been more receptive to claims of the right to privacy. There is much in the American political and legal tradition that has contributed to the easy acceptability of privacy claims. Not least among these are the strong emphasis on the individual as the fundamental unit of governance and sovereignty, and the American libertarian tradition of autonomy.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav then spoke of the right to privacy in India. Early cases in the Supreme Court of India see privacy as a negotiation between the liberties of citizens and the power of the state. In a legal tradition deeply influenced by colonialism, Indian courts readily accepted claims against physical police surveillance and other related rights in the criminal justice process – public rights against the state that were once denied to Indian subjects of colonial rule, but held short of viewing privacy as a necessary individual protection against society. This has resulted in dichotomous privacy jurisprudence.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav then talked about the contexts in which privacy claims arise in India today. Specifically, he spoke about increasingly sophisticated surveillance techniques and large-scale personal data collection and processing. There are many complexities in both these fields and a lot of time and questions were spent going over them. Surveillance is older than the nation-state; privacy law does not seek the end of surveillance, but only its optimal use. There are many kinds of surveillance, the contemporary debate deals solely with wiretapping and electronic surveillance. Privacy law cannot be blind to the many other kinds of surveillance, including old-fashioned physical surveillance on the road.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Data collection, too, cannot be ended, nor should it for it forms the basis of modern commerce and is tied to India’s economic growth. There were questions and discussion on ‘big data’, data mining, analytics, business models, and other related areas. In India, however, in the absence of an innovative IT industry, the dominant business model is of receiving foreign personal data, usually of Europeans and Americans, to provide cheap processing services. This model depends entirely on comparatively lower Indian wages. Hence, it is not surprising that the first personal data protection rules issued by the Indian government in 2011 applied solely to foreign data that was outsourced to India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav then introduced the 2011 draft Right to Privacy Bill that was proposed by the Department of Personnel and Training of the Indian government, as well as the Personal Data Protection Rules issued under the Information Technology Act, 2000. These measures were studied clause-by-clause.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Similarly, Indian law in respect of communications surveillance was analysed in detail. The Indian Telegraph Act 1885, the Indian Telegraph Rules 1951 (including the amendments of 1961, 1999, 2007, and 2014) were looked at in detail. These laws were compared to the Indian Post Office Act 1898 and the Information Technology Act 2000. The 1968 report of the Law Commission of India that examined the wiretapping power and suggested possible overreach was also examined.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Bhairav reviewed Indian law in respect of wiretapping. All Supreme Court case law, especially the cases of &lt;i&gt;Hukum Chand&lt;/i&gt; and &lt;i&gt;Peoples Union for Civil Liberties&lt;/i&gt;, were analysed. Finally, the group looked at how the legal principles applicable to wiretapping have been extended to electronic and Internet surveillance. Over here, the group studied the two sets of 2011 Rules under the IT Act that enable Internet and email surveillance of both content and metadata.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a lunch break, the group spoke about possible models for privacy regulation and protection in India. In respect of surveillance, a lot of time was spent discussing the merits and demerits of judicial warranting of surveillance, as opposed to executive authorisations. The consensus of the group, with a few exceptions, was that judicial warranting would not be a suitable model for Indian surveillance, due to several systemic weaknesses. The group also rejected several of the principles proposed by Justice A. P. Shah in the 2012 Report that was commissioned by the Planning Commission.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After a discussion on legislative models, the group discussed, clause-by-clause, the CIS proposal on privacy that was read through by Bhairav. This discussion lasted several hours, and covered many areas.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy'&gt;https://cis-india.org/internet-governance/blog/roundtable-on-indian-privacy-law-and-policy&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2014-12-27T14:18:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/comments-on-motor-vehicle-rules">
    <title>Comments on the Proposed Rule 138A of the Central Motor Vehicle Rules, 1989 Concerning Radio Frequency Identification Tags</title>
    <link>https://cis-india.org/internet-governance/blog/comments-on-motor-vehicle-rules</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society gave its comments on the proposed Rule 138A of the Central Motor Vehicle Rules, 1989. The comments were made in response to Notification GSR 738(E) published in the Gazette of India on October 3, 2012.&lt;/b&gt;
        &lt;p&gt;&lt;b&gt;I &lt;span&gt;Preliminary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.1 These initial comments are made with regard to Notification GSR 738(E), published in the Gazette of India, Extraordinary, Part II, Section 3, Sub-section (i), on 3 October 2012 &lt;br /&gt;(&lt;b&gt;“Impugned Notification”&lt;/b&gt;).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;1.2 The Impugned Notification proposes to insert a new rule 138A in the Central Motor Vehicle Rules, 1989 (&lt;b&gt;“CMV Rules”&lt;/b&gt;) to make mandatory the installation of radio frequency identification (&lt;b&gt;“RFID”&lt;/b&gt;) tags on all light and heavy motor vehicles to enable their instant identification and monitoring by electronic toll collection booths, the police and any other authority or person that is able to query and read RFID tags.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;II  &lt;span&gt;Validity of the Impugned Notification&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; (a) &lt;span&gt;The Scope and Limits of the Executive Power of the Union&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.1 The competence of the Central Government to govern by executive action (such as the Impugned Notification) is restricted to the extent of the executive power of the Union.&lt;a href="#fn1" name="fr1"&gt;[1]&lt;/a&gt; Following the &lt;i&gt;Ram Jawaya Kapur&lt;/i&gt; case,&lt;a href="#fn2" name="fr2"&gt;[2]&lt;/a&gt; it is settled that the extent of the Union’s executive power is coterminous with the legislative power of Parliament even in the absence of controlling legislation in that field.&lt;a href="#fn3" name="fr3"&gt;[3]&lt;/a&gt; This is in addition to the Union’s subordinate executive power to give effect to legislation through statutory delegation&lt;a href="#fn4" name="fr4"&gt;[4]&lt;/a&gt; and its directory executive power to give directions to the States.&lt;a href="#fn5" name="fr5"&gt;[5]&lt;/a&gt; Thus, there are three kinds of executive power exercisable by the Union:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a) the &lt;span&gt;regular power&lt;/span&gt;, exercisable in the absence of controlling legislation, if the subject of  executive action is a matter upon which Parliament is competent to legislate;&lt;br /&gt;(b) the &lt;span&gt;subordinate power&lt;/span&gt;, exercisable under the terms of a controlling statute, if that statute specifically delegates such a power to the Union; and&lt;br /&gt;(c) the &lt;span&gt;directory power&lt;/span&gt;, exercisable within judicial limits, to secure the compliance of the States with the laws of the Union.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.2 The regular executive power of the Union cannot be exercised over a matter that is controlled by parliamentary legislation.&lt;a href="#fn6" name="fr6"&gt;[6]&lt;/a&gt; This principle is akin to, but does not correspond exactly with, the doctrine of occupied field which is primarily concerned with the legislative entries contained in Schedule VII of the Constitution of India. Nevertheless, it is settled that since the power of the executive to act is subject to the control of the legislature, a statutory regime, where it exists, cannot be circumvented by the free exercise of executive power.&lt;a href="#fn7" name="fr7"&gt;[7]&lt;/a&gt; In the case of the Impugned Notification, the Motor Vehicles Act, 1988 constitutes a statutory regime that occupies the field to preclude regular executive action by the Central Government with regard to RFID tags in motor vehicles. The Impugned Notification should next be examined only in light of the scope and limits of the Union’s subordinate executive power since, as the Impugned Notification is not a direction to the States, the Union’s directory executive power is not in issue.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;(b) &lt;span&gt;Extent of the Central Government’s Rule-Making Power&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.3  The subordinate executive power of the Union emanates from section 110 of the Motor Vehicles Act, 1988 (&lt;b&gt;“MV Act”&lt;/b&gt;) that confers the Central Government with the power to make rules to implement the statute. At this point it is important to note that the legislative competence of the MV Act is traceable to Entry 35 of List III, Schedule VII of the Constitution of India. Entry 35 concerns:&lt;/p&gt;
&lt;p&gt;&lt;i&gt; Mechanically propelled vehicles including the principles on which taxes on such vehicles are to be levied.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;Entry 35 being a concurrent subject, it is open to both the Union and the States to act to regulate motor vehicles.&lt;a href="#fn8" name="fr8"&gt;[8]&lt;/a&gt; Accordingly, the MV Act also vests the States with subordinate executive power through sections 28, 38, 65, 95, 96, 107, 111, 138 and 176 which confer State Governments with the power to make rules to implement the statute in, and amend its application to, their particular states. As for the Union, so for the States is the regular executive power precluded by the existence of a statutory regime.&lt;a href="#fn9" name="fr9"&gt;[9]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;2.4       Section 110 of the MV Act states:&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;i&gt;110. Power of the Central Government to make rules. – &lt;/i&gt;&lt;/b&gt;&lt;i&gt;(1) The Central Government may make rules regulating the construction, equipment and maintenance of motor vehicles and trailers with respect to all or any of the following matters, namely:-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a)  the width, height, length and overhand of vehicles and of the loads carried;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(b) the size, nature, maximum retail price and condition of tyres, including embossing thereon of date and year of manufacture, and the maximum load carrying capacity;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(c) brakes and steering gear;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(d) the use of safety glasses including prohibition of the use of tinted safety glasses;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(e) signalling appliances, lamps and reflectors;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(f) speed governors;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(g) the emission of smoke, visible vapour, sparks, ashes, grit or oil;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(h) the reduction of noise emitted by or caused by vehicles;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(i) the embossment of chassis number and engine number and the date of manufacture;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(j) safety belts, handle bars of motor cycles, auto-dippers and other equipments essential for safety of drivers, passengers and other road-user;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(k) standards of the components used in the vehicle as inbuilt safety devices;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(l) provision for transportation of goods of dangerous or hazardous nature to human life;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(m) standards for emission of air pollutants;&lt;/i&gt;&lt;i&gt;&lt;br /&gt;(n) installation of catalytic convertors in the class of vehicles to be prescribed;&lt;br /&gt;&lt;/i&gt;&lt;i&gt;(o) the placement of audio-visual or radio or tape recorder type of devices in public vehicles;&lt;br /&gt;(p) warranty after sale of vehicle and norms therefor:&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;Provided that any rules relating to the matters dealing with the protection of environment, so far as may be, shall be made after consultation with the Ministry of the Government of India dealing with environment.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(2) Rules may be made under sub-section (1) governing the matters mentioned therein, including the manner of ensuring the compliance with such matters and the maintenance of motor vehicles in respect of such matters, either generally in respect of motor vehicles or trailers or in respect of motor vehicles or trailers of a particular class or in particular circumstances.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; (3) Notwithstanding anything contained in this section,-&lt;/i&gt;&lt;/p&gt;
&lt;p&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt;(a) the Central Government may exempt any class of motor vehicles from the provisions of this Chapter;&lt;br /&gt;(b) a State Government may exempt any motor vehicle or any class or description of motor vehicles from the rules made under sub-section (1) subject to such conditions as may be prescribed by the Central Government.&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.5 The subordinate executive power of the Union, &lt;i&gt;i.e.&lt;/i&gt; the rule-making power, is restricted to the exact extent of the delegation.&lt;a href="#fn10" name="fr10"&gt;[10]&lt;/a&gt; This is a well settled and undisputed principle of administrative law. Therefore, the Central Government cannot, in exercise of the rule-making power granted under section 110 of the MV Act, frame rules for matters for which it has not been specifically empowered under that section. Section 110 of the MV Act does not grant the Central Government the power to make rules for mandating RFID tags on vehicles. Clauses (a) to (p) of section 110(1) descriptively list the matters relating to the construction, equipment and maintenance of motor vehicles that the Central Government is competent to regulate by exercising its executive power. This list is exactingly drafted; the absence of general words or a miscellaneous empowerment obviates the need for examining any particular word or words in clauses (a) to (p) in light of the principle of &lt;i&gt;ejusdem generis&lt;/i&gt;.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.6 In the absence of a specific empowerment, or even a general empowerment that may be positively construed &lt;i&gt;ejusdem generis&lt;/i&gt;, only two clauses of section 110(1) require further examination. These are:&lt;/p&gt;
&lt;p&gt;&lt;i&gt;(e) signalling appliances, lamps and reflectors;&lt;/i&gt; and,&lt;br /&gt;&lt;i&gt;(o) the placement of audio-visual or radio or tape recorder type of devices in public vehicles;&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Clause (e), which deals with signalling appliances, cannot be read to include RFID tags since, in accordance with the principle of &lt;i&gt;noscitur a sociis&lt;/i&gt;, the meaning of the words “signalling appliances” is derived from its association with the words “lamps and reflectors.”&lt;a href="#fn11" name="fr11"&gt;[11]&lt;/a&gt; Therefore, RFID tags, which are totally unrelated to lamps, reflectors and related signalling appliances, are not the subject of clause (e). On the other hand, while clause (o) contains an executive empowerment in respect of radio devices, the empowerment only concerns “public vehicles”; and, hence, the installation of RFID tags in non-public vehicles including light vehicles, such as cars, and heavy vehicles, such trucks and lorries, cannot be carried out under this clause. In any event, the word “radio” must be interpreted &lt;i&gt;noscitur a sociis&lt;/i&gt; in light of its association with the words “audio-visual” and “tape recorder” to yield an executive empowerment in respect of in-vehicle entertainment devices only.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;2.7  &lt;b&gt;Therefore, in the absence of an empowerment under section 110 of the MV Act in respect of RFID tags, the Impugned Notification of the Central Government is &lt;i&gt;ultra vires&lt;/i&gt; the MV Act. Rules that are &lt;i&gt;ultra vires&lt;/i&gt; the parent statute for exceeding the limits of subordinate executive power are void.&lt;a href="#fn12" name="fr12"&gt;[12]&lt;/a&gt; The Impugned Notification is both &lt;i&gt;ultra vires&lt;/i&gt; its parent statute and void. In this regard, it is instructive to note that it is settled that void rules neither acquire validity by a subsequent conferment of statutory power nor by their publication in the Official Gazette.&lt;a href="#fn13" name="fr13"&gt;[13]&lt;/a&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;&lt;b&gt;III  &lt;span&gt;Constitutional Implications regarding Privacy&lt;/span&gt;&lt;/b&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.1 Across the world, RFID technology has been challenged on the basis of its intrusion into personal privacy. RFID tags operate on a pre-determined radio frequency; and, unless the tags are programmed to rapidly, constantly and randomly switch frequencies or are able to jam unauthorised queries – an extremely expensive proposition, RFID signals can be easily intercepted. The interception a vehicle’s RFID signals, whether by public authorities or by private persons, can yield detailed locational information of the driver of the vehicle. This is an unwarranted intrusion into the locational privacy of individuals.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.2 Locational privacy is an intrinsic part of the right to privacy. An intrusion into this right, such as in the form of mandatory RFID tags on vehicles, will reveal information as to &lt;i&gt;inter alia&lt;/i&gt; a person’s whereabouts and daily routine as well as addresses of friends’ houses, visits to the hospital, visits to a place of worship, restaurant preferences, addresses of children’s schools and so on. This will affect ordinary citizens, politicians and civil servants equally. All this information will be at the hands of the police. To place the power of tracking and monitoring ordinary individuals with the police, when such technology is not even available with intelligence agencies, would be an act of recklessness. This is compounded by the total lack of safeguards accompanying the attempted imposition of RFID technology.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;3.3   Following the &lt;i&gt;Kharak Singh&lt;/i&gt;&lt;a href="#fn14" name="fr14"&gt;[14]&lt;/a&gt; and &lt;i&gt;Gobind&lt;/i&gt;&lt;a href="#fn15" name="fr15"&gt;[15]&lt;/a&gt; cases, the locational privacy of individuals, specifically in relation to their privacy from the police, is constitutionally protected.&lt;a href="#fn16" name="fr16"&gt;[16]&lt;/a&gt; It is now accepted that privacy is an essential ingredient of personal liberty forming a part of the right recognised under Article 21 of the Constitution. It is further settled that the personal liberty of an individual cannot be taken away except by a law that establishes a procedure that is fair, just and reasonable that withstands the tests of Article 14 and Article 19 of the Constitution.&lt;a href="#fn17" name="fr17"&gt;[17]&lt;/a&gt;The Impugned Notification, while constituting a “law” under Article 13 of the Constitution, does not create a fair, just and reasonable procedure to deprive individuals of their personal liberty and therefore fails the tests imposed by &lt;i&gt;Maneka Gandhi&lt;/i&gt;. Therefore, the Impugned Notification, even if it were not void for want of competence, would be &lt;i&gt;ultra vires&lt;/i&gt; the Constitution for violating Article 21.&lt;a href="#fn18" name="fr18"&gt;[18]&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;IV  &lt;span&gt;Summary&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p&gt;4.1  In sum:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;(a)  Section 110 of the MV Act does not bestow on the Central Government a specific empowerment to make rules in respect of RFID tags;&lt;br /&gt;(b)  The Impugned Notification exceeds the delegated limits of the Central Government’s subordinate executive power;&lt;br /&gt;(c)  &lt;b&gt;The Impugned Notification is &lt;i&gt;ultra vires&lt;/i&gt; the MV Act, its parent statute;&lt;/b&gt;&lt;br /&gt;(d)  Rules that are &lt;i&gt;ultra vires&lt;/i&gt; the parent statute for exceeding the limits of subordinate executive power are void;&lt;br /&gt;(e)  &lt;b&gt;The Impugned Notification is void;&lt;/b&gt;&lt;br /&gt;(f)   The imposition of mandatory RFID tags on vehicles will yield locational information to seriously invade the right to  privacy;&lt;br /&gt;(g)  The right to privacy is an essential ingredient of personal liberty and is constitutionally protected;&lt;br /&gt;(h)  The Impugned Notification violates the right to privacy without creating a fair, just and reasonable procedure to deprive persons of their personal liberty;&lt;br /&gt;(i)   The Impugned Notification is &lt;i&gt;ultra vires&lt;/i&gt; the Constitution for violating Article 21;&lt;br /&gt;(j)   &lt;b&gt;Any rule that mandates RFID tags on vehicles to violate the right to privacy is void &lt;i&gt;ab initio&lt;/i&gt;.&lt;/b&gt;&lt;/p&gt;
&lt;hr align="left" size="1" width="33%" /&gt;
&lt;p style="text-align: justify; "&gt;[&lt;a href="#fr1" name="fn1"&gt;1&lt;/a&gt;]. Article 73 of the Constitution of India.&lt;br /&gt;[&lt;a href="#fr2" name="fn2"&gt;2&lt;/a&gt;]. &lt;i&gt;Ram Jawaya Kapur&lt;/i&gt; AIR 1955 SC 549.&lt;br /&gt;[&lt;a href="#fr3" name="fn3"&gt;3&lt;/a&gt;]. &lt;i&gt;Ibid&lt;/i&gt; at prs. 12-14.&lt;br /&gt;[&lt;a href="#fr4" name="fn4"&gt;4&lt;/a&gt;]. See generally, &lt;i&gt;In re Delhi Laws Act&lt;/i&gt; AIR 1951 SC 332, &lt;i&gt;Harishankar Bagla&lt;/i&gt; AIR 1954 SC 465, &lt;i&gt;Rajnarain Singh &lt;/i&gt; AIR 1954 SC 569 and &lt;i&gt;Edward Mills&lt;/i&gt; AIR 1955 SC 25.&lt;br /&gt;[&lt;a href="#fr5" name="fn5"&gt;5&lt;/a&gt;]. See Articles 256 and 257 of the Constitution and &lt;i&gt;State of Rajasthan&lt;/i&gt; (1977) 3 SCC 592.&lt;br /&gt;[&lt;a href="#fr6" name="fn6"&gt;6&lt;/a&gt;]. &lt;i&gt;Bishamber Dayal&lt;/i&gt; (1982) 1 SCC 39 at pr. 20.&lt;br /&gt;[&lt;a href="#fr7" name="fn7"&gt;7&lt;/a&gt;]. &lt;i&gt;Bharat Coking Coal&lt;/i&gt; (1990) 4 SCC 557 at prs. 15-17.&lt;br /&gt;[&lt;a href="#fr8" name="fn8"&gt;8&lt;/a&gt;].Article 253 of the Constitution.&lt;br /&gt;[&lt;a href="#fr9" name="fn9"&gt;9&lt;/a&gt;]. Article 162 of the Constitution.&lt;br /&gt;[&lt;a href="#fr10" name="fn10"&gt;10&lt;/a&gt;]. See &lt;i&gt;In re Delhi Laws Act&lt;/i&gt; AIR 1951 SC 332, &lt;i&gt;State of Bihar&lt;/i&gt; (2000) 4 SCC 640, &lt;i&gt;Shri Sitaram Sugar&lt;/i&gt; (1990) 3 SCC 223 [all Constitution Benches], &lt;i&gt;Ramakrishnan Kulwant Rai&lt;/i&gt; 1989 Supp (1) SCC 541, &lt;i&gt;K. M. Charia Abdullah&lt;/i&gt; (1965) 1 SCR 601, &lt;i&gt;Charanjit Gill&lt;/i&gt; (2000) 5 SCC 742, &lt;i&gt;ADM (Rev.) Delhi Administration&lt;/i&gt; (2000) 5 SCC 451 and &lt;i&gt;State of Karnataka&lt;/i&gt; (1983) 2 SCC 402.&lt;br /&gt;[&lt;a href="#fr11" name="fn11"&gt;11&lt;/a&gt;]. For foundational Indian case law on the principle of &lt;i&gt;noscitur a sociis&lt;/i&gt;, see generally, &lt;i&gt;M. K. Ranganathan&lt;/i&gt; AIR 1955 SC 604, &lt;i&gt;Hospital Mazdoor Sabha&lt;/i&gt; AIR 1960 SC 110 and &lt;i&gt;Corporation of the City of Nagpur&lt;/i&gt; AIR 1960 SC 675.&lt;br /&gt;[&lt;a href="#fr12" name="fn12"&gt;12&lt;/a&gt;]. See &lt;i&gt;Supreme Court Welfare Association&lt;/i&gt; (1989) 4 SCC 187 and &lt;i&gt;State of Karnataka&lt;/i&gt; (1983) 2 SCC 402.&lt;br /&gt;[&lt;a href="#fr35" name="fn35"&gt;35&lt;/a&gt;]. &lt;i&gt;General Officer Commanding-in-Chief&lt;/i&gt; (1988) 2 SCC 351 at prs. 12-14.&lt;br /&gt;[&lt;a href="#fr14" name="fn14"&gt;14&lt;/a&gt;]. &lt;i&gt;Kharak Singh&lt;/i&gt; AIR 1963 SC 1295. The majority, speaking through Ayyangar, J., found that ‘domiciliary visits’ conducted by the police in exercise of powers granted under police regulations violated Article 21 of the Constitution; and, the minority speaking through Subba Rao, J., found that both secret police picketing (as to the location of individuals) and domiciliary visits violated both Article 21 and Article 19(1)(d) of the Constitution.&lt;br /&gt;[&lt;a href="#fr15" name="fn15"&gt;15&lt;/a&gt;]. &lt;i&gt;Gobind&lt;/i&gt; (1975) 2 SCC 148.&lt;br /&gt;[&lt;a href="#fr16" name="fn16"&gt;16&lt;/a&gt;]. For a jurisprudential development of the right to privacy in India, see generally &lt;i&gt;Kharak Singh&lt;/i&gt; AIR 1963 SC 1295, &lt;i&gt;R. M. Malkani&lt;/i&gt; (1973) 1 SCC 471, &lt;i&gt;Gobind&lt;/i&gt; (1975) 2 SCC 148, &lt;i&gt;R. Rajagopal&lt;/i&gt; (1994) 6 SCC 632, &lt;i&gt;People’s Union for Civil Liberties&lt;/i&gt; (1997) 1 SCC 301, &lt;i&gt;Mr ‘X’&lt;/i&gt; (1998) 8 SCC 296, &lt;i&gt;Canara Bank&lt;/i&gt; (2005) 1 SCC 496, &lt;i&gt;Bharat Shah&lt;/i&gt; (2008) 13 SCC 5, &lt;i&gt;Naz Foundation&lt;/i&gt; (2009) 160 DLT 277, &lt;i&gt;Selvi&lt;/i&gt; (2010) 7 SCC 263 and &lt;i&gt;Ram Jethmalani&lt;/i&gt; (2011) 8 SCC 1.&lt;br /&gt;[&lt;a href="#fr17" name="fn17"&gt;17&lt;/a&gt;]. &lt;i&gt;Maneka Gandhi&lt;/i&gt; (1978) 1 SCC 248 at prs. 4-14 (per Bhagwati, Untwalia and Fazal Ali, JJ.), 48-49 (per Chandrachud, J.), 62-78 and 79-91 (per Krishna Iyer, J.) and 192-199, 201, 203 and 211-215 (per Beg, CJI.)&lt;br /&gt;[&lt;a href="#fr18" name="fn18"&gt;18&lt;/a&gt;]. In this regard, see also &lt;i&gt;Supreme Court Welfare Association&lt;/i&gt; (1989) 4 SCC 187 and &lt;i&gt;N. Bakshi&lt;/i&gt; 1962 Supp (1) SCR 505 for the proposition that rules violating the Constitution are void &lt;i&gt;ab initio&lt;/i&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/comments-on-motor-vehicle-rules'&gt;https://cis-india.org/internet-governance/blog/comments-on-motor-vehicle-rules&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    

   <dc:date>2012-12-04T15:32:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india">
    <title>The Humpty-Dumpty Censorship of Television in India</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india</link>
    <description>
        &lt;b&gt;The Modi government’s attack on Sathiyam TV is another manifestation of the Indian state’s paranoia of the medium of film and television, and consequently, the irrational controlling impulse of the law.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article originally published in the Wire on September 8, 2015 was also mirrored on the website &lt;a class="external-link" href="http://notacoda.net/2015/09/09/the-humpty-dumpty-censorship-of-television-in-india/"&gt;Free Speech/Privacy/Technology&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It is tempting to think of the Ministry of Information and Broadcasting’s (MIB) &lt;a href="http://www.livelaw.in/i-b-ministrys-warning-to-channel-for-comments-on-pm-modi-delhi-hc-seeks-reply/" target="_blank"&gt;attack on Sathiyam TV&lt;/a&gt; solely as another authoritarian exhibition of Prime Minister Narendra  Modi’s government’s intolerance of criticism and dissent. It certainly  is. But it is also another manifestation of the Indian state’s paranoia  of the medium of film and television, and consequently, the irrational  controlling impulse of the law.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Sathiyam TV’s transgressions&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sathiyam’s transgressions began more than a year ago, on May 9, 2014,  when it broadcast a preacher saying of an unnamed person: “Oh Lord!  Remove this satanic person from the world!” The preacher also allegedly  claimed this “dreadful person” was threatening Christianity. This, the  MIB reticently claims, “appeared to be targeting a political leader”,  referring presumably to Prime Minister Modi, to “potentially give rise  to a communally sensitive situation and incite the public to violent  tendencies.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The MIB was also offended by a “senior journalist” who, on the same  day, participated in a non-religious news discussion to allegedly claim  Modi “engineered crowds at his rallies” and used “his oratorical skills  to make people believe his false statements”. According to the MIB, this  was defamatory and “appeared to malign and slander the Prime Minister  which was repugnant to (his) esteemed office”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;For these two incidents, Sathiyam was served a show-cause notice on  16 December 2014 which it responded to the next day, denying the MIB’s  claims. Sathiyam was heard in-person by a committee of bureaucrats on 6  February 2015. On 12 May 2015, the MIB handed Sathiyam an official &lt;a href="http://www.scribd.com/doc/277493911/Warning-Sathiyam-TV-Channel-12th-May-2015" target="_blank"&gt;an official “Warning”&lt;/a&gt; which appears to be unsupported by law. Sathiyam moved the Delhi High Court to challenge this.&lt;/p&gt;
&lt;p&gt;As Sathiyam sought judicial protection, the MIB issued the channel a &lt;a href="http://www.catchnews.com/india-news/now-airing-the-hounding-of-a-tv-channel-for-showing-modi-in-bad-light-1441303238.html" target="_blank"&gt;second warning&lt;/a&gt; August  26, 2016 citing three more objectionable news broadcasts of: a child  being subjected to cruelty by a traditional healer in &lt;a href="http://www.ndtv.com/india-news/newborn-forced-to-walk-by-witch-doctor-in-assam-village-as-fever-cure-764554" target="_blank"&gt;Assam&lt;/a&gt;; a gun murder inside a government hospital in &lt;a href="https://www.youtube.com/watch?v=m2V4B2elMjo" target="_blank"&gt;Madhya Pradesh&lt;/a&gt;; and, a self-immolating man rushing the dais at a BJP rally in &lt;a href="https://www.youtube.com/watch?v=ECDV5AieD4g" target="_blank"&gt;Telangana&lt;/a&gt;. All three news items were carried by other news channels and websites.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Governing communications&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Most news providers use multiple media to transmit their content  and suffer from complex and confusing regulation. Cable television is  one such medium, so is the Internet; both media swiftly evolve to follow  technological change. As the law struggles to keep up, governmental  anxiety at the inability to perfectly control this vast field of speech  and expression frequently expresses itself through acts of overreach and  censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the newly-liberalised media landscape of the early 1990s, cable  television sprang up in a legal vacuum. Doordarshan, the sole  broadcaster, flourished in the Centre’s constitutionally-sanctioned  monopoly of broadcasting which was only broken by the Supreme Court in  1995. The same year, Parliament enacted the Cable Television Networks  (Regulation) Act, 1995 (“Cable TV Act”) to create a licence regime to  control cable television channels. The Cable TV Act is supplemented by  the Cable Television Network Rules, 1994 (“Cable Rules”).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The state’s disquiet with communications technology is a recurring  motif in modern Indian history. When the first telegraph line was laid  in India, the colonial state was quick to recognize its potential for  transmitting subversive speech and responded with strict controls. The  fourth iteration of the telegraph law represents the colonial  government’s perfection of the architecture of control. This law is the  Indian Telegraph Act, 1885, which continues to dominate communications  governance in India today including, following a directive in 2004,  broadcasting.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Vague and arbitrary law&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Cable TV Act requires cable news channels such as Sathiyam to  obey a list of restrictions on content that is contained in the Cable  Rules (“&lt;a href="http://mib.nic.in/WriteReadData/documents/pc1.pdf" target="_blank"&gt;Programme Code&lt;/a&gt;“).  Failure to conform to the Programme Code can result in seizure of  equipment and imprisonment; but, more importantly, creates the momentum  necessary to invoke the broad powers of censorship to ban a programme,  channel, or even the cable operator. But the Programme Code is littered  with vague phrases and undefined terms that can mean anything the  government wants them to mean.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;By its first warning of May 12, 2015, the MIB claimed Sathiyam  violated four rules in the Programme Code. These include rule 6(1)(c)  which bans visuals or words “which promote communal attitudes”; rule  6(1)(d) which bans “deliberate, false and suggestive innuendos and  half-truths”; rule 6(1)(e) which bans anything “which promotes  anti-national attitudes”; and, rule 6(1)(i) which bans anything that  “criticises, maligns or slanders any…person or…groups, segments of  social, public and moral life of the country” &lt;i&gt;(sic).&lt;/i&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The rest of the Programme Code is no less imprecise. It proscribes  content that “offends against good taste” and “reflects a slandering,  ironical and snobbish attitude” against communities. On the face of it,  several provisions of the Programme Code travel beyond the permissible  restrictions on free speech listed in Article 19(2) of the Constitution  to question their validity. The fiasco of implementing the vague  provisions of the erstwhile section 66A of the Information Technology  Act, 2000 is a recent reminder of the dangers presented by  poorly-drafted censorship law – which is why it was struck down by the  Supreme Court for infringing the right to free speech. The Programme  Code is an older creation, it has simply evaded scrutiny for two  decades.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The arbitrariness of the Programme Code is amplified manifold by the  authorities responsible for interpreting and implementing it. An  Inter-Ministerial Committee (IMC) of bureaucrats, supposedly a  recommendatory body, interprets the Programme Code before the MIB takes  action against channels. This is an executive power of censorship that  must survive legal and constitutional scrutiny, but has never been  subjected to it. Curiously, the courts have shied away from a proper  analysis of the Programme Code and the IMC.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Judicial challenges&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 2011, a single judge of the Delhi High Court in the &lt;a href="http://indiankanoon.org/doc/132453/" target="_blank"&gt;&lt;i&gt;Star India&lt;/i&gt;&lt;/a&gt; case (2011) was asked to examine the legitimacy of the IMC as well as  four separate clauses of the Programme Code including rule 6(1)(i),  which has been invoked against Sathiyam. But the judge neatly  sidestepped the issues. This feat of judicial adroitness was made  possible by the crass indecency of the content in question, which could  be reasonably restricted. Since the show clearly attracted at least one  ground of legitimate censorship, the judge saw no cause to examine the  other provisions of the Programme Code or even the composition of the  IMC.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This judicial restraint has proved detrimental. In May 2013, another  single judge of the Delhi High Court, who was asked by Comedy Central to  adjudge the validity of the IMC’s decision-making process, relied on &lt;i&gt;Star India&lt;/i&gt; (2011) to uphold the MIB’s action against the channel. The channel’s  appeal to the Supreme Court is currently pending. If the Supreme Court  decides to examine the validity of the IMC, the Delhi High Court may put  aside Sathiyam’s petition to wait for legal clarity.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;As it happens, in the &lt;a href="http://indiankanoon.org/doc/110813550/"&gt;&lt;i&gt;Shreya Singhal&lt;/i&gt;&lt;/a&gt; case (2015) that struck down section 66A of the IT Act, the Supreme  Court has an excellent precedent to follow to demand clarity and  precision from the Programme Code, perhaps even strike it down, as well  as due process from the MIB. On the accusation of defaming the Prime  Minister, probably the only clearly stated objection by the MIB, the  Supreme Court’s past law is clear: public servants cannot, for  non-personal acts, claim defamation.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Censorship by blunt force&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Beyond the IMC’s advisories and warnings, the Cable TV Act contains  two broad powers of censorship. The first empowerment in section 19  enables a government official to ban any programme or channel if it  fails to comply with the Programme Code or, “if it is likely to promote,  on grounds of religion, race, language, caste or community or any other  ground whatsoever, disharmony or feelings of enmity, hatred or ill-will  between different religious, racial, linguistic or regional groups or  castes or communities or which is likely to disturb the public  tranquility.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The second empowerment is much wider. Section 20 of the Cable TV Act  permits the Central Government to ban an entire cable television  operator, as opposed to a single channel or programmes within channels,  if it “thinks it necessary or expedient so to do in public interest”. No  reasons need be given and no grounds need be considered. Such a blunt  use of force creates an overwhelming power of censorship. It is not a  coincidence that section 20 resembles some provisions of  nineteenth-century telegraph laws, which were designed to enable the  colonial state to control the flow of information to its native  subjects.&lt;/p&gt;
&lt;p&gt;&lt;b&gt;A manual for television bans&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="http://www.frontline.in/arts-and-culture/cinema/cut-and-thrust/article5185915.ece" target="_blank"&gt;Film&lt;/a&gt; and television have &lt;a href="http://thebigindianpicture.com/2013/03/the-heart-of-censorship/" target="_blank"&gt;always&lt;/a&gt; attracted political attention and state censorship. In 1970, &lt;a href="http://indiankanoon.org/doc/1719619/" target="_blank"&gt;Justice Hidayatullah&lt;/a&gt; of the Supreme Court explained why: “It has been almost universally  recognised that the treatment of motion pictures must be different from  that of other forms of art and expression. This arises from the instant  appeal of the motion picture… The motion picture is able to stir up  emotions more deeply than any other product of art.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Within this historical narrative of censorship, television regulation is relatively new. &lt;a href="http://www.indiantelevision.com/television/programming/tv-channels/regulations/ib-ministry-dictates-channels-to-follow-the-programme" target="_blank"&gt;Past governments&lt;/a&gt; have also been quick to threaten censorship for attacking an incumbent  Prime Minister. There seems to be a pan-governmental consensus that  senior political leaders ought to be beyond reproach, irrespective of  their words and deeds.&lt;/p&gt;
&lt;p&gt;But on what grounds could the state justify these bans? Lord Atkins’ celebrated war-time dissent in &lt;a href="https://en.wikipedia.org/wiki/Liversidge_v_Anderson" target="_blank"&gt;&lt;i&gt;Liversidge&lt;/i&gt;&lt;/a&gt; (1941) offers an unlikely answer:&lt;/p&gt;
&lt;p&gt;“When I use a word,’ Humpty Dumpty said in rather a scornful tone,  ‘it means just what I choose it to mean – neither more nor less.’”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india'&gt;https://cis-india.org/internet-governance/blog/the-wire-bhairav-acharya-humpty-dumpty-censorship-of-tv-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    

   <dc:date>2015-11-29T08:37:53Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/policy-in-india-community-custom-censorship-and-future-of-internet-regulation">
    <title>Free Speech Policy in India: Community, Custom, Censorship, and the Future of Internet Regulation</title>
    <link>https://cis-india.org/internet-governance/blog/policy-in-india-community-custom-censorship-and-future-of-internet-regulation</link>
    <description>
        &lt;b&gt;This note summarises my panel contribution to the conference on Freedom of Expression in a Digital Age at New Delhi on 21 April 2015, which was organised by the Observer Research Foundation (ORF) and the Centre for Internet and Society (CIS) in collaboration with the Internet Policy Observatory of the Center for Global Communication Studies (CGCS) at the Annenberg School for Communication, University of Pennsylvania&lt;/b&gt;
        &lt;p&gt;&lt;a href="https://cis-india.org/internet-governance/blog/free-speech-policy-in-india.pdf" class="internal-link"&gt;&lt;b&gt;Download the Note here&lt;/b&gt;&lt;/a&gt; (PDF, 103 Kb)&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Preliminary&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;There has been legitimate happiness among many in India at the Supreme Court’s recent decision in the Shreya Singhal case to strike down section 66A of the Information Technology Act, 2000 ("IT Act") for unconstitutionally fettering the right to free speech on the Internet. The judgment is indeed welcome, and reaffirms the Supreme Court’s proud record of defending the freedom of speech, although it declined to interfere with the government’s stringent powers of website blocking. As the dust settles there are reports the government is re-grouping to introduce fresh law, allegedly stronger to secure easier convictions, to compensate the government’s defeat.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Case Law and Government Policy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;India’s constitutional courts have a varied history of negotiating the freedom of speech that justifiably demands study. But, in my opinion, inadequate attention is directed to the government’s history of free speech policy. It is possible to discern from the government’s actions over the last two centuries a relatively consistent narrative of governance that seeks to bend the individual’s right to speech to its will. The defining characteristics of this narrative – the government’s free speech policy – emerge from a study of executive and legislative decisions chiefly in relation to the press, that continue to shape policy regarding the freedom of expression on the Internet.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;India’s corpus of free speech case law is not uniform nor can it be since, for instance, the foundational issues that attend hate speech are quite different from those that inform contempt of court. So too, Indian free speech policy has been varied, captive to political compulsions and disparate views regarding the interests of the community, governance and nation-building. There has been consistent tension between the individual and the community, as well as the role of the government in enforcing the expectations of the community when thwarted by law.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Dichotomy between Modern and Native Law&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;To understand free speech policy, it is useful to go back to the early colonial period in India, when Governor-General Warren Hastings established a system of courts in Bengal’s hinterland to begin the long process of displacing traditional law to create a modern legal system. By most accounts, pre-modern Indian law was not prescriptive, Austinian, and uniform. Instead, there were several legal systems and a variety of competing and complementary legal sources that supported different interpretations of law within most legal systems. J. Duncan M. Derrett notes that the colonial expropriation of Indian law was marked by a significant tension caused by the repeatedly-stated objective of preserving some fields of native law to create a dichotomous legal structure. These efforts were assisted by orientalist jurists such as Henry Thomas Colebrook whose interpretation of the dharmasastras heralded a new stage in the evolution of Hindu law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this background, it is not surprising that Elijah Impey, a close associate of Hastings, simultaneously served as the first Chief Justice of the Supreme Court at Fort William while overseeing the Sadr Diwani Adalat, a civil court applying Anglo-Hindu law for Hindus, and the Sadr Faujdari Adalat, a criminal court applying Anglo-Islamic law to all natives. By the mid-nineteenth century, this dual system came under strain in the face of increasing colonial pressure to rationalise the legal system to ensure more effective governance, and native protest at the perceived insensitivity of the colonial government to local customs.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Criminal Law and Free Speech in the Colony&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In 1837, Thomas Macaulay wrote the first draft of a new comprehensive criminal law to replace indigenous law and custom with statutory modern law. When it was enacted as the Indian Penal Code in 1860 ("IPC"), it represented the apogee of the new colonial effort to recreate the common law in India. The IPC’s enactment coincided with the growth and spread of both the press and popular protest in India. The statute contained the entire gamut of public-order and community-interest crimes to punish unlawful assembly, rioting, affray, wanton provocation, public nuisance, obscenity, defiling a place of worship, disturbing a religious assembly, wounding religious feelings, and so on. It also criminalised private offences such as causing insult, annoyance, and intimidation. These crimes continue to be invoked in India today to silence individual opinion and free speech, including on the Internet. Section 66A of the IT Act utilised a very similar vocabulary of censorship.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, Macaulay’s IPC did not feature the common law offences of sedition and blasphemy or the peculiar Indian crime of promoting inter-community enmity; these were added later. Sedition was criminalised by section 124A at the insistence of Barnes Peacock and applied successfully against Indian nationalist leaders including Bal Gangadhar Tilak in 1897 and 1909, and Mohandas Gandhi in 1922. In 1898, the IPC was amended again to incorporate section 153A to criminalise the promotion of enmity between different communities by words or deeds. And, in 1927, a more controversial amendment inserted section 295A into the IPC to criminalise blasphemy. All three offences have been recently used in India against writers, bloggers, professors, and ordinary citizens.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Loss of the Right to Offend&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The two amendments of 1898 and 1927, which together proscribed the promotion of inter-community enmity and blasphemy, represent the dismantling of the right to offend in India. But, oddly, they were defended by the colonial government in the interests of native sensibilities. The proceedings of the Imperial Legislative Council reveal several members, including Indians, were enthusiastic about the amendments. For some, the amendments were a necessary corrective action to protect community honour from subversive speech. The 1920s were a period of foment in India as the freedom movement intensified and communal tension mounted. In this environment, it was easy to fuse the colonial interest in strong administration with a nationalist narrative that demanded the retrieval of Indian custom to protect native sensibilities from being offended by individual free speech, a right derived from modern European law. No authoritative jurist could be summoned to prove or refute the claim that native custom privileged community honour.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Sadly the specific incident which galvanised the amendment of 1927, which established the crime of blasphemy in India, would not appear unfamiliar to a contemporary observer. Mahashay Rajpal, an Arya Samaj activist, published an offensive pamphlet of the Prophet Muhammad titled Rangeela Rasool, for which he was arrested and tried but acquitted in the absence of specific blasphemy provisions. With his speech being found legal, Rajpal was released and given police protection but Ilam Din, a Muslim youth, stabbed him to death. Instead of supporting its criminal law and strengthening its police forces to implement the decisions of its courts, the colonial administration surrendered to the threat of public disorder and enacted section 295A of the IPC.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Protest and Community Honour&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The amendment of 1927 marks an important point of rupture in the history of Indian free speech. It demonstrated the government’s policy intention of overturning the courts to restrict the individual’s right to speech when faced with public protest. In this way, the combination of public disorder and the newly-created crimes of promoting inter-community enmity and blasphemy opened the way for the criminal justice system to be used as a tool by natives to settle their socio-cultural disputes. Both these crimes address group offence; they do not redress individual grievances. In so far as they are designed to endorse group honour, these crimes signify the community’s attempt to suborn modern law and individual rights.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Almost a century later, the Rangeela Rasool affair has become the depressing template for illegal censorship in India: fringe groups take offence at permissible speech, crowds are marshalled to articulate an imagined grievance, and the government capitulates to the threat of violence. This formula has become so entrenched that governance has grown reflexively suppressive, quick to silence speech even before the perpetrators of lumpen violence can receive affront. This is especially true of online speech, where censorship is driven by the additional anxiety brought by the difficulty of Internet regulation. In this race to be offended the government plays the parochial referee, acting to protect indigenous sensibilities from subversive but legal speech.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Censorious Post-colony&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Independence marked an opportunity to remake Indian governance in a freer image. The Constituent Assembly had resolved not to curb the freedom of speech in Article 19(1)(a) of the Constitution on account of public order. In two cases from opposite ends of the country where right-wing and left-wing speech were punished by local governments on public order grounds, the Supreme Court acted on the Constituent Assembly’s vision and struck down the laws in question. Free speech, it appeared, would survive administrative concerns, thanks to the guarantee of a new constitution and an independent judiciary. Instead Prime Minister Jawaharlal Nehru and his cabinet responded with the First Amendment in 1951, merely a year after the Constitution was enacted, to create three new grounds of censorship, including public order. In 1963, a year before he demitted office, the Sixteenth Amendment added an additional restriction.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Nehru did not stop at amending the Constitution, he followed shortly after with a concerted attempt to stage-manage the press by de-legitimising certain kinds of permissible speech.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Under Justice G. S. Rajadhyaksha, the government constituted the First Press Commission which attacked yellow journalism, seemingly a sincere concern, but included permissible albeit condemnable speech that was directed at communities, indecent or vulgar, and biased. Significantly, the Commission expected the press to only publish speech that conformed to the developmental and social objectives of the government. In other words, Nehru wanted the press to support his vision of India and used the imperative of nation-building to achieve this goal. So, the individual right to offend communities was taken away by law and policy, and speech that dissented from the government’s socio-economic and political agenda was discouraged by policy. Coupled with the new constitutional ground of censorship on account of public order, the career of free speech in independent India began uncertainly.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;How to regulate permissible speech?&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Despite the many restrictions imposed by law on free speech, Indian free speech policy has long been engaged with the question of how to regulate the permissible speech that survives constitutional scrutiny. This was significantly easier in colonial India. In 1799, Governor-General Richard Wellesley, the brother of the famous Duke of Wellington who defeated Napoleon at Waterloo, instituted a pre-censorship system to create what Rajeev Dhavan calls a “press by permission” marked by licensed publications, prior restraint, subsequent censorship, and harsh penalties. A new colonial regime for strict control over the publication of free speech was enacted in the form of the Press and Registration of Books Act, 1867, the preamble of which recognises that “the literature of a country is…an index of…the condition of [its] people”. The 1867 Act was diluted after independence but still remains alive in the form of the Registrar of Newspapers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;After surviving Indira Gandhi’s demand for a committed press and the depredations of her regime during the Emergency, India’s press underwent the examination of the Second Press Commission. This was appointed in 1978 under the chairmanship of Justice P. K. Goswami, a year after the Janata government released the famous White Paper on Misuse of Mass Media. When Gandhi returned to power, Justice Goswami resigned and the Commission was reconstituted under Justice K. K. Mathew. In 1982, the Commission’s report endorsed the earlier First Press Commission’s call for conformist speech, but went further by proposing the appointment of a press regulator invested with inspection powers; criminalising attacks on the government; re-interpreting defamation law to encompass democratic criticism of public servants; retaining stringent official secrecy law; and more. It was quickly acted upon by Rajiv Gandhi through his infamous Defamation Bill.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The contours of future Internet regulation&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The juggernaut of Indian free speech policy has received temporary setbacks, mostly inflicted by the Supreme Court. Past experience shows us that governments with strong majorities – whether Jawaharlal Nehru’s following independence or Indira Gandhi’s in the 1970s – act on their administrative impulses to impede free speech by government policy. The Internet is a recent and uncontrollable medium of speech that attracts disproportionately heavy regulatory attention. Section 66A of the IT Act may be dead but several other provisions remain to harass and punish online free speech. Far from relaxing its grip on divergent opinions, the government appears poised for more incisive invasions of personal freedoms.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;I do not believe the contours of future speech regulation on the Internet need to be guessed at, they can be derived from the last two centuries of India’s free speech policy. When section 66A is replaced – and it will be, whether overtly by fresh statutory provisions or stealthily by policy and non-justiciable committees and commissions – it will be through a regime that obeys the mandate of the First Press Commission to discourage dissenting and divergent speech while adopting the regulatory structures of the Second Press Commission to permit a limited inspector raj and forbid attacks on personalities. The interests of the community, howsoever improperly articulated, will seek precedence over individual freedoms and the accompanying threat of violence will give new meaning to Bhimrao Ambedkar’s warning of the “grammar of anarchy”.&lt;br /&gt;&lt;br /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/policy-in-india-community-custom-censorship-and-future-of-internet-regulation'&gt;https://cis-india.org/internet-governance/blog/policy-in-india-community-custom-censorship-and-future-of-internet-regulation&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>IT Act</dc:subject>
    
    
        <dc:subject>Censorship</dc:subject>
    
    
        <dc:subject>Freedom of Speech and Expression</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Chilling Effect</dc:subject>
    

   <dc:date>2015-08-23T10:12:16Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/free-speech-policy-in-india.pdf">
    <title>Free Speech Policy in India: Community, Custom, Censorship, and the Future of Internet Regulation</title>
    <link>https://cis-india.org/internet-governance/blog/free-speech-policy-in-india.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/free-speech-policy-in-india.pdf'&gt;https://cis-india.org/internet-governance/blog/free-speech-policy-in-india.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-23T10:09:06Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage">
    <title>Net Neutrality and the Law of Common Carriage</title>
    <link>https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage</link>
    <description>
        &lt;b&gt;Net neutrality makes strange bedfellows. It links the truck operators that dominate India’s highways, such as those that carry vegetables from rural markets to cities, and Internet service providers which perform a more technologically advanced task.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/net-neutrality-law-of-common-carriage.pdf" class="internal-link"&gt;&lt;b&gt;Download PDF&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Over the last decade, the truckers have opposed the government’s attempts to impose the obligations of common carriage on them, this has resulted in strikes and temporary price rises; and, in the years ahead, there is likely to be a similar – yet, technologically very different – debate as net neutrality advocates call for an adapted version of common carriage to bind Internet services.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Net neutrality demands a rigorous examination that is not attempted by this short note which, constrained by space, will only briefly trace the law and policy of net neutrality in the US and attempt a brief comparison with the principles of common carriage in India. Net neutrality defies definition. Very simply, the principle demands that Internet users have equal access to all content and applications on the Internet. This can only be achieved if Internet service providers: (i) do not block lawful content; (ii) do not throttle – deliberately slow down or speed up access to selected content; (iii) do not prioritise certain content over others for monetary gain; and, (iv) are transparent in their management of the networks by which data flows.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Almost exactly a year ago, the District of Columbia Circuit Court of Appeals – a senior court below the US Supreme Court – struck down portions of the ‘Open Internet Order’ that was issued by the Federal Communications Commission (FCC) in 2010. Although sound in law, the Court’s verdict impeded net neutrality to raise crucial questions regarding common carriage, free speech, competition, and others. More recently, Airtel’s announcement of its decision to charge certain end-users for VoIP services – subsequently suspended pending a policy decision from the Telecom Regulatory Authority of India (TRAI) – has fuelled the net neutrality debate in India.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Because of its innovative technological history in relation to the Internet, the US has pioneered many legal attempts to regulate the Internet in respect of net neutrality. In 1980, when Internet data flowed through telephone lines, the FCC issued the ‘Computer II’ regime which distinguished basic services from enhanced services. The difference between the two turned on the nature of the transmission. Regular telephone calls involved a pure transmission of data and were hence classified as basic services. On the other hand, access to the Internet required the processing of user data through computers; these were classified as enhanced services. Importantly, because of their essential nature, the Computer II rules bound basic services providers to the obligations of common carriage whereas enhanced services providers were not.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;What is common carriage? Common law countries share a unique heritage in respect of their law governing the transport of goods and people. Those that perform such transport are called carriers. The law makes a distinction between common carriers and other carriers. A carrier becomes a common carrier when it “holds itself out” to the public as willing to transport people or goods for compensation. The act of holding out is simply a public communication of an offer to transport, it may be fulfilled even by an advertisement. The four defining elements of a common carrier are (i) a holding out of a willingness (a public undertaking) (ii) to transport persons or property (iii) from place to place (iv) for compensation.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Common carriers discharge a public trust. By virtue of their unique position and essential function, they are required to serve their customers equally and without discrimination. The law of carriage of goods and people places four broad duties upon common carriers. Firstly, common carriers are bound to carry everyone’s goods or all people and cannot refuse such carriage unless certain strict conditions are met. Secondly, common carriers must perform their carriage safely without deviating from accepted routes unless in exceptional circumstances. Thirdly, common carriers must obey the timeliness of their schedules, they must be on time. And, lastly, common carriers must assume liabilities for the loss or damages of goods, or death or injuries to people, during carriage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Computer II regime was issued under a telecommunications law of 1934 which retained the classical markers and duties of common carriers. The law extended the principles of common carriage to telephone services providers. In 1980, when the regime was introduced, the FCC did not invest Internet services with the same degree of essence and public trust; hence, enhanced services escaped strict regulation. However, the FCC did require that basic services and enhanced services be offered through separate entities, and that basic services providers that operated the ‘last-mile’ wired transmission infrastructure to users offer these facilities to enhanced services providers on a common carrier basis.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1996, the new Telecommunications Act revisited US law after more than sixty years. The new dispensation maintained the broad structure of the Computer II regime: it recognised telecommunications carriers in place of basic services providers, and information-services providers in place of enhanced services. Carriers in the industry had already converged telephone and Internet communications as a single service. Hence, when a user engaged a carrier that provided telephone and broadband Internet services, the classification of the carrier would depend on the service being accessed. When a carrier provided broadband Internet access, it was an information-services provider (not a telecommunications carrier) and vice versa. Again, telecommunications carriers were subjected to stricter regulations and liability resembling common carriage.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1998, the provision of broadband Internet over wired telephone lines through DSL technologies was determined to be a pure transmission and hence a telecommunications service warranting common carriage regulation. However, in 2002, the FCC issued the ‘Cable Broadband Order’ that treated the provision of cable broadband through last-mile wired telephone transmission networks as a single and integrated information service. This exempted most cable broadband from the duties of common carriage. This policy was challenged in the US Supreme Court in 2005 in the Brand X case and upheld.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Significantly, the decision in the Brand X case was not made on technological merits. The case arose when a small ISP that had hitherto used regular telephone lines to transmit data wanted equal access to the coaxial cables of the broadcasting majors on the basis of common carriage. Instead of making a finding on the status of cable broadband providers based on the four elements of common carriage, the Court employed an administrative law principle of deferring to the decisions of an expert technical regulator – known as the Chevron deference principle – to rule against the small ISP. Thereafter wireless and mobile broadband were also declared to be information services and saved from the application of common carriage law.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Taking advantage of this exemption from common carriage which released broadband providers from the duty of equal access and anti-discrimination, Comcast began from 2007 to degrade P2P data flows to its users. This throttling was reported to the FCC which responded with the 2008 ‘Comcast Order’ to demand equal and transparent transmission from Comcast. Instead, Comcast took the FCC to court. In 2010, the Comcast Order was struck down by the DC Circuit Court of Appeals. And, again, the decision in the Comcast case was made on an administrative law principle, not on technological merits.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In the Comcast case, the Court said that as long as the FCC treated broadband Internet access as an information service it could not enforce an anti-discrimination order against Comcast. This is because the duty of anti-discrimination attached only to common carriers which the FCC applied to telecommunications carriers. Following the Comcast case, the FCC began to consider reclassifying broadband Internet providers as telecommunications carriers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;However, in the 2010 ‘Open Internet Order’, the FCC attempted a different regulatory approach. Instead of a classification based on common carriage, the new rules recognised two types of Internet service providers: (i) fixed providers, which transmitted to homes, and, (ii) mobile providers, which were accessed by smartphones. The rules required both types of providers to ensure transparency in network management, disallowed blocking of lawful content, and re-imposed the anti-discrimination requirement to forbid prioritised access or throttling of certain content.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before they were even brought into effect, Verizon challenged the Open Internet Order in the same court that delivered the Comcast judgement. The decision of the Court is pending. Meanwhile, in India, Airtel’s rollback of its announcement to charge its pre-paid mobile phone users more for VoIP services raises very similar questions. Like the common law world, India already extends the principles of common carriage to telecommunications. Indian jurisprudence also sustains the distinction between common carriage and private carriage, and applies an anti-discrimination requirement to telecommunications providers through a licensing regime.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;TRAI must decide if it wants to continue this distinction. No doubt, the provision of communications services through telephone and the Internet serves an eminent public good. It was on this basis that President Obama called on the FCC to reclassify broadband Internet providers as common carriers. Telecommunications carriers, such as Airtel, might argue that they have expended large sums of money on network infrastructure that is undermined by the use of high-bandwidth free VoIP applications, and that the law of common carriage must recognise this fact. And still others call for a new approach to net neutrality outside the dichotomy of common and private carriage. Whatever the solution, it must be reached by widespread engagement and participation, for Internet access – as the government’s Digital India project is aware – serves public interest.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage'&gt;https://cis-india.org/internet-governance/blog/net-neutrality-and-law-of-common-carriage&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-23T11:09:04Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality">
    <title>Privacy, Autonomy, and Sexual Choice: The Common Law Recognition of Homosexuality</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality</link>
    <description>
        &lt;b&gt;In the last few decades, all major common law jurisdictions have decriminalised non-procreative sex – oral and anal sex (sodomy) – to allow private, consensual, and non-commercial homosexual intercourse.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;&lt;a href="https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality.pdf" class="internal-link"&gt;&lt;b&gt;Download PDF&lt;/b&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Anti-sodomy statutes across the world, often drafted in the same anachronistic vein as section 377 of the Indian Penal Code, 1860 (“IPC”), have either been repealed or struck down on the grounds that they invade individual privacy and are detrimentally discriminative against homosexual people.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not an examination of India’s laws against homosexuality, it does not review the Supreme Court of India’s judgment in Suresh Koushal v. Naz Foundation (2014) 1 SCC 1 nor the Delhi High Court’s judgment in Naz Foundation v. Government of NCT Delhi 2009 (160) DLT 277, which the former overturned – in my view, wrongly. This note simply provides a legal history of the decriminalisation of non-procreative sexual activity in the United Kingdom and the United States. Same-sex marriage is also not examined.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;In the United Kingdom&lt;/h2&gt;
&lt;h3&gt;The Wolfenden Report&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;In England, following a campaign of arrests of non-heterosexual persons and subsequent protests in the 1950s, the government responded to public dissatisfaction by appointing the Departmental Committee on Homosexual Offences and Prostitution chaired by John Frederick Wolfenden. The report of this committee (“Wolfenden Report”) was published in 1957 and recommended that:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“…homosexual behaviour between consenting adults in private should no longer be a criminal offence.”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Report further observed that it was not the function of a State to punitively scrutinise the private lives of its citizens:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“(T)he law’s function is to preserve public order and decency, to protect the citizen from what is offensive or injurious, and to provide sufficient safeguards against exploitation and corruption of others… It is not, in our view, the function of the law to intervene in the private life of citizens, or to seek to enforce any particular pattern of behaviour.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The Sexual Offences Act, 1967&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Wolfenden Report was accepted and, in its pursuance, the Sexual Offences Act, 1967 was enacted to, for the first time in common law jurisdictions, partially decriminalise homosexual activity – described in English law as ‘buggery’ or anal sex between males.&lt;br /&gt;Section 1(1) of the original Sexual Offences Act, as notified on 27 July 1967 stated –&lt;br /&gt;&lt;b&gt;"&lt;/b&gt;Notwithstanding any statutory or common law provision, but subject to the provisions of the next following section, a homosexual act in private shall not be an offence provided that the parties consent thereto and have attained the age of twenty one years."&lt;br /&gt;A ‘homosexual act’ was defined in section 1(7) as –&lt;br /&gt;“For the purposes of this section a man shall be treated as doing a homosexual act if, and only if, he commits buggery with another man or commits an act of gross indecency with another man or is a party to the commission by a man of such an act.”&lt;br /&gt;The meaning of ‘private’ was also set forth rather strictly in section 1(2) –&lt;br /&gt;“An act which would otherwise be treated for the purposes of this Act as being done in private shall not be so treated if done –&lt;br /&gt;(a) when more than two persons take part or are present; or&lt;br /&gt;(b) in a lavatory to which the public have or are permitted to have access, whether on&lt;br /&gt;payment or otherwise.”&lt;br /&gt;Hence, by 1967, English law permitted:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;as between two men,&lt;/li&gt;
&lt;li&gt;both twenty-one years or older,&lt;/li&gt;
&lt;li&gt;anal sex (buggery),&lt;/li&gt;
&lt;li&gt;and other sexual activity (“gross indecency”)&lt;/li&gt;
&lt;li&gt;if, and only if, a strict prescription of privacy was maintained,&lt;/li&gt;
&lt;li&gt;that excluded even a non-participating third party from being present,&lt;/li&gt;
&lt;li&gt;and restricted the traditional conception of public space to exclude even lavatories.&lt;/li&gt;
&lt;/ul&gt;
&lt;p style="text-align: justify; "&gt;However, the benefit of Section 1 of the Sexual Offences Act, 1967 did not extend beyond England and Wales; to mentally unsound persons; members of the armed forces; merchant ships; and, members of merchant ships whether on land or otherwise.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Developments in Scotland and Northern Ireland&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Over the years, the restrictions in the original Sexual Offences Act, 1967 were lifted. In 1980, the Criminal Justice (Scotland) Act, 1980 partially decriminalised homosexual activity in Scotland on the same lines that the Act of 1967 did for England and Wales. One year later, in 1981, an Irishman Jeffrey Dudgeon successfully challenged the continued criminalisation of homosexuality in Northern Ireland before the European Court of Human Rights (“ECHR”) in the case of Dudgeon v. United Kingdom (1981) 4 EHRR 149. Interestingly, Dudgeon was not decided on the basis of detrimental discrimination or inequality, but on the ground that the continued illegality of homosexuality violated the petitioner’s right to privacy guaranteed by Article 8 of the 1950 European Convention on Human Rights (“European Convention”). In a 15-4 majority judgement, the ECHR found that “…moral attitudes towards male homosexuality…cannot…warrant interfering with the applicant’s private life…” Following Dudgeon, the Homosexual Offences (Northern Ireland) Order, 1982 came into effect; and with it, brought some semblance of uniformity in the sodomy laws of the United Kingdom.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Equalising the age of consent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;However, protests continued against the unequal age of consent required for consensual homosexual sex (21 years) as opposed to that for heterosexual sex (16 years). In 1979, a government policy advisory recommended that the age of consent for homosexual sex be reduced to 18 years – two years older than that for heterosexual sex, but was never acted upon. In 1994, an attempt to statutorily equalise the age of consent at 16 years was defeated in the largely conservative House of Commons although a separate legislative proposal to reduce it to 18 years was carried and enacted under the Criminal Justice and Public Order Act, 1994. Following this, the unequal ages of consent forced a challenge against UK law in the ECHR in 1994; four years later, in Sutherland v. United Kingdom [1998] EHRLR 117, the ECHR found that the unequal age of consent violated Articles 8 and 14 of the European Convention – relating to privacy and discrimination. Sutherland was significant in two ways – it forced the British government to once again introduce legislation to equalise the ages of consent; and, significantly, it affirmed a homosexual human right on the ground of anti-discrimination (as opposed to privacy).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;To meet its European Convention commitments, the House of Commons passed, in June 1998, a bill for an equal age of sexual consent but it was rejected by the more conservative House of Lords. In December 1998, the government reintroduced the equal age of consent legislation which again passed the House of Commons and was defeated in the House of Lords. Finally, in 1999, the government invoked the statutory superiority of the House of Commons, reintroduced for the third time the legislation, passed it unilaterally to result in the enactment of the Sexual Offences (Amendment) Act, 2000 that equalised the age of sexual consent for both heterosexuals and homosexuals at 16 years of age.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Uniformity of equality&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;However, by this time, different UK jurisdictions observed separate legislations regarding homosexual activity. The privacy conditions stipulated in the original Sexual Offences Act, 1967 remained, although they had been subject to varied interpretation by English courts. To resolve this, the UK Parliament enacted the Sexual Offences Act, 2003 which repealed all earlier conflicting legislation, removed the strict privacy conditions attached to homosexual activity and re-drafted sexual offences in a gender neutral manner. A year later, the Civil Partnership Act, 2004 gave same-sex couples the same rights and responsibilities as a civil marriage. And, in 2007, the Equality Act (Sexual Orientation) Regulations came into force to prohibit general discrimination against homosexual persons in the same manner as such prohibition exists in respect of grounds of race, religion, disability, sex and so on.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;In the United States&lt;/h2&gt;
&lt;h3&gt;Diversity of state laws&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Sodomy laws in the United States of America have followed a different trajectory. A different political and legal system leaves individual US States with wide powers to draft and follow their own constitutions and laws. Accordingly, by 1961 all US States had their own individual anti-sodomy laws, with different definitions of sodomy and homosexuality. In 1962, Illinois became the first US State to repeal its anti-sodomy law. Many States followed suit over the next decades including Connecticut (1971); Colorado and Oregon (1972); Delaware, Hawaii and North Dakota (1973); Ohio (1974); New Hampshire and New Mexico (1975); California, Maine, Washington and West Virginia (1976); Indiana, South Dakota, Wyoming and Vermont (1977); Iowa and Nebraska (1978); New Jersey (1979); Alaska (1980); and, Wisconsin (1983).&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Bowers v. Hardwick&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;However, not all States repealed their anti-sodomy laws. Georgia was one such State that retained a statutory bar to any oral or anal sex between any persons of any sex contained in Georgia Code Annotated §16-6-2 (1984) (“Georgia statute”) which provided, in pertinent part, as follows:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“(a) A person commits the offense of sodomy when he performs or submits to any sexual act involving the sex organs of one person and the mouth or anus of another… (b) A person convicted of the offense of sodomy shall be punished by imprisonment for not less than one nor more than 20 years”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In 1982, a police officer arrested Michael Hardwick in his bedroom for sodomy, an offence which carried a prison sentence of up to twenty years. His case went all the way up to the US Supreme Court which, in 1986, pronounced its judgement in Bowers v. Hardwick 478 US 186 (1986). Although the Georgia statute was framed broadly to include even heterosexual sodomy (anal or oral sex between a man and a woman or two women) within its ambit of prohibited activity, the Court chose to frame the issue at hand rather narrowly. Justice Byron White, speaking for the majority, observed at the outset –&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“This case does not require a judgment on whether laws against sodomy between consenting adults in general, or between homosexuals in particular, are wise or&lt;br /&gt;desirable. It raises no question about the right or propriety of state legislative decisions to repeal their laws that criminalize homosexual sodomy, or of state-court decisions invalidating those laws on state constitutional grounds. The issue presented is whether the Federal Constitution confers a fundamental right upon homosexuals to engage in sodomy…”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy and autonomy&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Interestingly, Hardwick’s case against the Georgia statute was not grounded on an equality-discrimination argument (since the Georgia statute prohibited even heterosexual sodomy but was only enforced against homosexuals) but on a privacy argument that sought to privilege and immunise private consensual non-commercial sexual conduct from intrusive State intervention. To support this privacy claim, a long line of cases was relied upon that restricted the State’s ability to intervene in, and so upheld the sanctity of, the home, marriage, procreation, contraception, child rearing and so on [See, Carey v. Population Services 431 US 678 (1977), Pierce v. Society of Sisters 268 US 510 (1925) and Meyer v. Nebraska 262 US 390 (1923) on child rearing and education; Prince v. Massachusetts 321 US 158 (1944) on family relationships; Skinner v. Oklahoma ex rel. Williamson 316 US 535 (1942) on procreation; Loving v. Virginia 388 US 1 (1967) on marriage; Griswold v. Connecticut 381 US 479 (1965) and Eisenstadt v. Baird 405 US 438 (1972) on contraception; and Roe v. Wade 410 US 113 (1973) on abortion]. Further, the Court was pressed to declare a fundamental right to consensual homosexual sodomy by reading it into the Due Process clause of the Fourteenth Amendment to the US Constitution.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The 9-judges Court split 5-4 down the middle to rule against all of Hardwick’s propositions and uphold the constitutionality of the Georgia statute. The Court’s majority agreed that cases cited by Hardwick had indeed evolved a right to privacy, but disagreed that this privacy extended to homosexual persons since “(n)o connection between family, marriage, or procreation on the one hand and homosexual activity on the other has been demonstrated…”. In essence, the Court’s majority held that homosexuality was distinct from procreative human sexual behaviour; that homosexual sex could, by virtue of this distinction, be separately categorised and discriminated against; and, hence, homosexual sex did not qualify for the benefit of intimate privacy protection that was available to heterosexuals. What reason did the Court give to support this discrimination? Justice White speaking for the majority gives us a clue: “Proscriptions against that (homosexual) conduct have ancient roots.” Justice White was joined in his majority judgement by Chief Justice Burger, Justice Powell, Justice Rehnquist and Justice O’Connor. His rationale was underscored by Chief Justice Burger who also wrote a short concurring opinion wherein he claimed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Decisions of individuals relating to homosexual conduct have been subject to state intervention throughout the history of Western civilization. Condemnation of those practices is firmly rooted in Judeo-Christian moral and ethical standards. Blackstone described “the infamous crime against nature” as an offense of “deeper malignity” than rape, a heinous act “the very mention of which is a disgrace to human nature,” and “a crime not fit to be named.” … To hold that the act of homosexual sodomy is somehow protected as a fundamental right would be to cast aside millennia of moral teaching.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The majority’s “wilful blindness”: Blackmun’s dissent&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;The Court’s dissenting opinion was delivered by Justice Blackmun, in which Justice Brennan, Justice Marshall and Justice Stevens joined. At the outset, the Justice Blackmun disagreed with the issue that was framed by the majority led by Justice White: “This case is (not) about “a fundamental right to engage in homosexual sodomy,” as the Court purports to declare…” and further pointed out that the Georgia statute proscribed not just homosexual sodomy, but oral or anal sex committed by any two persons: “…the Court’s almost obsessive focus on homosexual activity is particularly hard to justify in light of the broad language Georgia has used.”. When considering the issue of privacy for intimate sexual conduct, Justice Blackmun criticised the findings of the majority: “Only the most wilful blindness could obscure the fact that sexual intimacy is a sensitive, key relationship of human existence, central to family life, community welfare, and the development of human personality…” And when dealing with the ‘historical morality’ argument that was advanced by Chief Justice Burger, the minority observed:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The assertion that “traditional Judeo-Christian values proscribe” the conduct involved cannot provide an adequate justification for (§)16-6-2 (of the Georgia Statute). That certain, but by no means all, religious groups condemn the behavior at issue gives the State no license to impose their judgments on the entire citizenry. The legitimacy of secular legislation depends instead on whether the State can advance some justification for its law beyond its conformity to religious doctrine.”&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;The states respond, privacy is upheld&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Bowers was argued and decided over five years in the 1980s. At the time, the USA was witnessing a neo-conservative wave in its society and government, which was headed by a republican conservative. The HIV/AIDS issue had achieved neither the domestic nor international proportions it now occupies and the linkages between HIV/AIDS, homosexuality and the right to health were still unclear. In the years after Bowers, several more US States repealed their sodomy laws.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In some US States, sodomy laws that were not legislatively repealed were judicially struck down. In 1998, the Georgia State Supreme Court, in Powell v. State of Georgia S98A0755, 270 Ga. 327, 510 S.E. 2d 18 (1998), heard a challenge to the same sodomy provision of the Georgia statute that was upheld in by the US Supreme Court in Bowers. In a complete departure from the US Supreme Court’s findings, the Georgia Supreme Court first considered whether the Georgia statute violated individual privacy: “It is clear from the right of privacy appellate jurisprudence…that the “right to be let alone” guaranteed by the Georgia Constitution is far more extensive that the right of privacy protected by the U.S. Constitution…”&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Having established that an individual right to privacy existed to protect private consensual sodomy, the Georgia Court then considered whether there was a ‘legitimate State interest’ that justified the State’s restriction of this right. The justifications that were offered by the State included the possibility of child sexual abuse, prostitution and moral degradation of society. The Court found that there already were a number of legal provisions to deter and punish rape, child abuse, trafficking, prostitution and public indecency. Hence: “In light of the existence of these statutes, the sodomy statute’s raison d’ etre can only be to regulate the private sexual conduct of consenting adults, something which Georgians’ right of privacy puts beyond the bounds of government regulation.” By a 2-1 decision, Chief Justice Benham leading the majority, the Georgia Supreme Court struck down the Georgia statute for arbitrarily violating the privacy of individuals. Interestingly, the subjects of the dispute were not homosexual, but two heterosexual adults – a man and a woman. Similar cases where a US State’s sodomy laws were judicially struck down include:&lt;/p&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Campbell v. Sundquist 926 S.W.2d 250 (1996) – [Tennessee – by the Tennessee Court of Appeals on privacy violation; appeal to the State Supreme Court expressly denied].&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Commonwealth v. Bonadio 415 A.2d 47 (1980) – [Pennsylvania – by the Pennsylvania Supreme Court on both equality and privacy violations];&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Doe v. Ventura MC 01-489, 2001 WL 543734 (2001) – [Minnesota – by the Hennepin County District Judge on privacy violation; no appellate challenge];&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Gryczan v. Montana 942 P.2d 112 (1997) – [Montana – by the Montana Supreme Court on privacy violation];&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Jegley v. Picado 80 S.W.3d 332 (2001) – [Arkansas – by the Arkansas Supreme Court, on privacy violation];&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Kentucky v. Wasson 842 S.W.2d 487 (1992) [Kentucky – by the Kentucky Supreme Court on both equality and privacy violations];&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Massachusetts v. Balthazar 366 Mass. 298, 318 NE2d 478 (1974) and GLAD v. Attorney General 436 Mass. 132, 763 NE2d 38 (2002) – [Massachusetts – by the Superior Judicial Court on privacy violation];&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;People v. Onofre 51 NY 2d 476 (1980) [New York – by the New York Court of Appeals on privacy violation]; and,&lt;/li&gt;
&lt;li style="text-align: justify; "&gt;Williams v. Glendenning No. 98036031/CL-1059 (1999) – [Maryland – by the Baltimore City Circuit Court on both privacy and equality violations; no appellate challenge].&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Lawrence v. Texas&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;These developments made for an uneven field in the matter of legality of homosexual sex with the sodomy laws of most States being repealed by their State legislatures or subject to State judicial invalidation, while the sodomy laws of the remaining States were retained under the shade of constitutional protection afforded by Bowers. Texas was one such State which maintained an anti-sodomy law contained in Texas Penal Code Annotated § 21.06(a) (2003) (“Texas statute”) which criminalised sexual intercourse between two people of the same sex. In 1998, the Texas statute was invoked to arrest two men engaged in private, consensual, non-commercial sodomy. They subsequently challenged the constitutionality of the Texas statute, their case reaching the US Supreme Court. In 2003, the US Supreme Court, in Lawrence v. Texas 539 US 558 (2003) pronounced on the validity of the Texas statute. Interestingly, while the issue under consideration was identical to that decided in Bowers, the Court this time around was presented with detailed arguments on the equality-discrimination aspect of same-sex sodomy laws – which the Bowers Court majority did not consider. The Court split 6-3; the majority struck down the Texas statute. Justice Kennedy, speaking for himself and 4 other judges of the majority, found instant fault with the Bowers Court for framing the issue in question before it as simply whether homosexuals had a fundamental right to engage in sodomy.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Privacy, intimacy, home&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;This mistake, Justice Kennedy claimed, “…discloses the Court’s own failure… To say that the issue in Bowers was simply the right to engage in certain sexual conduct demeans…the individual…just as it would demean a married couple were it to be said marriage is simply about the right to have sexual intercourse. Their penalties and purposes (of the laws involved)…have more far-reaching consequences, touching upon the most private human conduct, sexual behavior, and in the most private of places, the home.” Justice Kennedy, joined by Justice Stevens, Justice Souter, Justice Ginsburg and Justice Breyer, found that the Texas statute violated the right to privacy granted by the Due Process clause of the US Constitution:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“The petitioners are entitled to respect for their private lives. The State cannot demean their existence or control their destiny by making their private sexual conduct a crime. “It is a promise of the Constitution that there is a realm of personal liberty which the government may not enter.”” [The quote is c.f. Planned Parenthood of Southeastern Pa. v. Casey 505 US 833 (1992)]&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Imposed morality is defeated&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;With the privacy argument established as controlling, Justice Kennedy went to some length to refute the ‘historical morality’ argument that was put forward in Bowers by then Chief Justice Burger: “At the outset it should be noted that there is no longstanding history in this country of laws directed at homosexual conduct as a distinct matter… The sweeping references by Chief Justice Burger to the history of Western civilization and to Judeo-Christian moral and ethical standards did not take account of other authorities pointing in an opposite direction.” To illustrate these other authorities, Justice Kennedy references the ECHR’s decision in Dudgeon supra which was reached five years before Bowers: “Authoritative in all countries that are members of the Council of Europe (21 nations then, 45 nations now), the decision (Dudgeon) is at odds with the premise in Bowers that the claim put forward was insubstantial in our Western civilization.”.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Court then affirmed that morality could not be a compelling ground to infringe upon a fundamental right: “Our obligation is to define the liberty of all, not to mandate our own moral code”. The lone remaining judge of the majority, Justice O’Connor, based her decision not on the right to privacy but on equality-discrimination considerations. Interestingly, Justice O’Connor sat on the Bowers Court and ruled with the majority in that case. Basing her decision on equal protection grounds allowed her to concur with the majority in Lawrence but not overturn her earlier position in Bowers which had rejected a right to privacy claim. It also enabled her to strike down the Texas statute while not conceding homosexuality as a constitutionally guaranteed private liberty. There were three dissenters: The chief dissent was delivered by Justice Scalia, in which he was joined by Chief Justice Rehnquist and Justice Thomas. Bowers was not merely distinguished by the majority, it was overruled:&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;“Bowers was not correct when it was decided, and it is not correct today. It ought not to remain binding precedent. Bowers v. Hardwick should be and now is overruled.”&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality'&gt;https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-23T12:20:52Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality.pdf">
    <title>Privacy, Autonomy, and Sexual Choice: The Common Law Recognition of Homosexuality</title>
    <link>https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality.pdf</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality.pdf'&gt;https://cis-india.org/internet-governance/blog/privacy-autonomy-sexual-choice-common-law-recognition-of-homosexuality.pdf&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2015-08-23T11:56:53Z</dc:date>
   <dc:type>File</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance">
    <title>Mastering the Art of Keeping Indians Under Surveillance</title>
    <link>https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance</link>
    <description>
        &lt;b&gt;In its first year in office, the National Democratic Alliance government has been notably silent on the large-scale surveillance projects it has inherited. This ended last week amidst reports the government is hastening to complete the Central Monitoring System (CMS) within the year.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was published in &lt;a class="external-link" href="http://thewire.in/2015/05/30/mastering-the-art-of-keeping-indians-under-surveillance-2756/"&gt;the Wire&lt;/a&gt; on May 30, 2015.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;In a statement to the Rajya Sabha in 2009, Gurudas Kamat, the  erstwhile United Progressive Alliance’s junior communications minister,  said the CMS was a project to enable direct state access to all  communications on mobile phones, landlines, and the Internet in India.  He meant the government was building ‘backdoors’, or capitalising on  existing ones, to enable state authorities to intercept any  communication at will, besides collecting large amounts of metadata,  without having to rely on private communications carriers.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is not new. Legally sanctioned backdoors have existed in Europe  and the USA since the early 1990s to enable direct state interception of  private communications. But the laws of those countries also subject  state surveillance to a strong regime of state accountability,  individual freedoms, and privacy. This regime may not be completely  robust, as Edward Snowden’s revelations have shown, but at least it  exists on paper. The CMS is not illegal by itself, but it is coloured by  the compromised foundation of Indian surveillance law upon which it is  built.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Surveillance and social control&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS is a technological project. But technology does not exist in  isolation; it is contextualised by law, society, politics, and history.  Surveillance and the CMS must be seen in the same contexts.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The great sociologist Max Weber claimed the modern state could not  exist without monopolising violence. It seems clear the state also  entertains the equal desire to monopolise communications technologies.  The state has historically shaped the way in which information is  transmitted, received, and intercepted. From the telegraph and radio to  telephones and the Internet, the state has constantly endeavoured to  control communications technologies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Law is the vehicle of this control. When the first telegraph line was  laid down in India, its implications for social control were instantly  realised; so the law swiftly responded by creating a state monopoly over  the telegraph. The telegraph played a significant role in thwarting the  Revolt of 1857, even as Indians attempted to destroy the line; so the  state consolidated its control over the technology to obviate future  contests.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This controlling impulse was exercised over radio and telephones,  which are also government monopolies, and is expressed through the  state’s surveillance prerogative. On the other hand, because of its open  and decentralised architecture, the Internet presents the single  greatest threat to the state’s communications monopoly and dilutes its  ability to control society.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Interception in India&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The power to intercept communications arises with the regulation of  telegraphy. The first two laws governing telegraphs, in 1854 and 1860,  granted the government powers to take possession of telegraphs “on the  occurrence of any public emergency”. In 1876, the third telegraph law  expanded this threshold to include “the interest of public safety”.  These are vague phrases and their interpretation was deliberately left  to the government’s discretion.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This unclear formulation was replicated in the Indian Telegraph Act  of 1885, the fourth law on the subject, which is currently in force  today. The 1885 law included a specific power to wiretap. Incredibly,  this colonial surveillance provision survived untouched for 87 years  even as countries across the world balanced their surveillance powers  with democratic safeguards.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Indian Constitution requires all deprivations of free speech to  conform to any of nine grounds listed in Article 19(2). Public  emergencies and public safety are not listed. So Indira Gandhi amended  the wiretapping provision in 1972 to insert five grounds copied from  Article 19(2). However, the original unclear language on public  emergencies and public safety remained.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indira Gandhi’s amendment was ironic because one year earlier she had  overseen the enactment of the Defence and Internal Security of India  Act, 1971 (DISA), which gave the government fresh powers to wiretap.  These powers were not subject to even the minimal protections of the  Telegraph Act. When the Emergency was imposed in 1975, Gandhi’s  government bypassed her earlier amendment and, through the DISA Rules,  instituted the most intensive period of surveillance in Indian history.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although DISA was repealed, the tradition of having parallel  surveillance powers for fictitious emergencies continues to flourish.  Wiretapping powers are also found in the Maharashtra Control of  Organised Crime Act, 1999 which has been copied by Karnataka, Andhra  Pradesh, Arunachal Pradesh, and Gujarat.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Procedural weaknesses&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Meanwhile, the Telegraph Act with its 1972 amendment continued to  weather criticism through the 1980s. The wiretapping power was largely  exercised free of procedural safeguards such as the requirements to  exhaust other less intrusive means of investigation, minimise  information collection, limit the sharing of information, ensure  accountability, and others.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This changed in 1996 when the Supreme Court, on a challenge brought  by PUCL, ordered the government to create a minimally fair procedure.  The government fell in line in 1999, and a new rule, 419A, was put into  the Indian Telegraph Rules, 1951.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Unlike the United States, where a wiretap can only be ordered by a  judge when she decides the state has legally made its case for the  requested interception, an Indian wiretap is sanctioned by a bureaucrat  or police officer. Unlike the United Kingdom, which also grants  wiretapping powers to bureaucrats but subjects them to two additional  safeguards including an independent auditor and a judicial tribunal, an  Indian wiretap is only reviewed by a committee of the original  bureaucrat’s colleagues. Unlike most of the world which restricts this  power to grave crime or serious security needs, an Indian wiretap can  even be obtained by the income tax department.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Rule 419A certainly creates procedure, but it lacks crucial  safeguards that impugn its credibility. Worse, the contours of rule 419A  were copied in 2009 to create flawed procedures to intercept the  content of Internet communications and collect metadata. Unlike rule  419A, these new rules issued under sections 69(2) and 69B(3) of the  Information Technology Act 2000 have not been constitutionally  scrutinised.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Three steps to tap&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Despite its monopoly, the state does not own the infrastructure of  telephones. It is dependent on telecommunications carriers to physically  perform the wiretap. Indian wiretaps take place in three steps: a  bureaucrat authorises the wiretap; a law enforcement officer serves the  authorisation on a carrier; and, the carrier performs the tap and  returns the information to the law enforcement officer.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are many moving parts in this process, and so there are leaks.  Some leaks are cynically motivated such as Amar Singh’s lewd  conversations in 2011. But others serve a public purpose: Niira Radia’s  conversations were allegedly leaked by a whistleblower to reveal serious  governmental culpability. Ironically, leaks have created accountability  where the law has failed.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS will prevent leaks by installing servers on the transmission  infrastructure of carriers to divert communications to regional  monitoring centres. Regional centres, in turn, will relay communications  to a centralised monitoring centre where they will be analysed, mined,  and stored. Carriers will no longer perform wiretaps; and, since this  obviates their costs of compliance, they are willing participants.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its annual report of 2012, the Centre for the Development of  Telematics (C-DOT), a state-owned R&amp;amp;D centre tasked with designing  and creating the CMS, claimed the system would intercept 3G video, ILD,  SMS, and ISDN PRI communications made through landlines or mobile phones  – both GSM and CDMA.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;There are unclear reports of an expansion to intercept Internet data,  such as emails and browsing details, as well as instant messaging  services; but these remain unconfirmed. There is also a potential  overlap with another secretive Internet surveillance programme being  developed by the Defence R&amp;amp;D Organisation called NETRA, no details  of which are public.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Culmination of surveillance&lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In its present state, Indian surveillance law is unable to bear the  weight of the CMS project, and must be vastly strengthened to protect  privacy and accountability before the state is given direct access to  communications.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;But there is a larger way to understand the CMS in the context of  Indian surveillance. Christopher Bayly, the noted colonial historian,  writes that when the British set about establishing a surveillance  apparatus in colonised India, they came up against an established system  of indigenous intelligence gathering. Colonial rule was at its most  vulnerable at this point of intersection between foreign surveillance  and indigenous knowledge, and the meeting of the two was riven by  suspicion. So the colonial state simply co-opted the interface by  creating institutions to acquire local knowledge.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The CMS is also an attempt to co-opt the interface between government  and the purveyors of communications; because if the state cannot  control communications, it cannot control society. Seen in this light,  the CMS represents the natural culmination of the progression of Indian  surveillance. No challenge against it that does not question the  construction of the modern Indian state will be successful.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;i&gt; &lt;/i&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance'&gt;https://cis-india.org/internet-governance/blog/the-wire-may-30-2015-bhairav-acharya-mastering-the-art-of-keeping-indians-under-surveillance&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>bhairav</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2015-08-23T12:26:48Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>




</rdf:RDF>
