<?xml version="1.0" encoding="utf-8" ?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:syn="http://purl.org/rss/1.0/modules/syndication/" xmlns="http://purl.org/rss/1.0/">




    



<channel rdf:about="https://cis-india.org/search_rss">
  <title>Centre for Internet and Society</title>
  <link>https://cis-india.org</link>
  
  <description>
    
            These are the search results for the query, showing results 1 to 15.
        
  </description>
  
  
  
  
  <image rdf:resource="https://cis-india.org/logo.png"/>

  <items>
    <rdf:Seq>
        
            <rdf:li rdf:resource="https://cis-india.org/raw/platforming-precarity-data-narratives-workers"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/legal-advocacy-manual"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/digital-rights-guide-1"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/the-platform-economys-gatekeeping-of-class-and-caste-dominance-in-urban-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/raw/online-gender-based-violence-on-short-form-video-platforms"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/india2019s-parental-control-directive-and-the-need-to-improve-stalkerware-detection"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/indian-express-january-25-2024-how-the-telecom-act-undermines-personal-liberties"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/cis-comments-to-the-telecommunications-bill-2023"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/health-data-management-policies"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/cis-comments-recommendations-to-digital-data-protection-bill"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/telecom/blog/cis-comments-to-draft-indian-telecom-bill-2022"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/demistifying-data-breaches-in-india"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/blog/surveillance-enabling-identity-systems-in-africa-tracing-the-fingerprints-of-aadhaar"/>
        
        
            <rdf:li rdf:resource="https://cis-india.org/internet-governance/surveillance-enabling-identity-systems-in-africa"/>
        
    </rdf:Seq>
  </items>

</channel>


    <item rdf:about="https://cis-india.org/raw/platforming-precarity-data-narratives-workers">
    <title>Platforming precarity: Data narratives of workers sustaining urban platform services</title>
    <link>https://cis-india.org/raw/platforming-precarity-data-narratives-workers</link>
    <description>
        &lt;b&gt;CIS conducted quantitative surveys with over 800 workers employed in the app-based taxi and delivery sectors across 4 cities in India as part of the ‘Labour Futures’ project supported by the Internet Society Foundation. The surveys covered key employment indicators, including earnings and working hours, work-related cost burdens, income and social security, and platform policies and management. Findings from these surveys are presented as data visualisation briefs centring workers’ everyday experiences. These data briefs form a foundational evidence base for policy and action around labour rights, social protection, and urban inclusion in platform work.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;It has  been over a decade since app-based delivery and taxi sectors began  operations in India, and have since expanded to several metropolitan and  smaller cities. These sectors together account for the largest  proportion of the platform workforce in India. Workers’ organising and  collective action have long revealed extractive labour practices in the  platform economy. Their demands call for the recognition of their labour  rights by policymakers and platforms, an end to exploitative working  conditions, and the introduction of effective policy that protects their  rights and wellbeing.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In  2021-22, the labour research vertical at the Centre for Internet and  Society conducted quantitative surveys with over 800 workers in the  app-based taxi services and app-based delivery services sectors.  Spanning four cities (Delhi-NCR, Mumbai, Guwahati, Lucknow), the surveys  gathered comprehensive data on the conditions of work in the platform  economy in these cities, within its two dominant sectors.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  survey covered key labour indicators—(i) the conditions of work for  workers, including recruitment, wages, incentive structures, and  work-related cost burdens (ii) workforce management, including hours  spent working for the platform, surveillance and control measures, and  (iii) workers’ coverage under income security, social security and  social protections, including provident funds, health and accident  insurance, and pensions.&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;&lt;b&gt;&lt;a class="external-link" href="https://cis-india.org/raw/delhi-ncr-platforming-precarity"&gt;Read the Delhi-NCR data brief here&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/raw/mumbai-platforming-precarity"&gt;Read the Mumbai data brief here&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a class="external-link" href="https://cis-india.org/raw/guwahati-platforming-precarity"&gt;Read the Guwahati data brief here&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/raw/lucknow-platforming-precarity"&gt;Read the Lucknow data brief here&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a class="external-link" href="http://cis-india.org/raw/methodology-note-platforming-precarity"&gt;Read the research methodology note here&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;li&gt;&lt;b&gt;&lt;a class="external-link" href="https://cis-india.org/raw/platforming-precarity-press-note"&gt;The press note can be found here&lt;/a&gt;&lt;/b&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2 style="text-align: justify; "&gt;Key Findings&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;The  generation of city-level data aimed to support policymaking and advocacy  towards achieving just outcomes for workers in the rapidly  platformising Indian economy. These survey findings speak to i) top-down  approaches of regulatory, legislative, and judicial action through  evidence-building, and ii) bottom-up approaches of mobilisation and  advocacy campaigns of workers’ collectives.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The  city-wise data briefs highlight region-specific differences and  similarities shaped by histories and newer developments of labour  platforms operating in the urban economy. Across the four survey cities,  the data briefs reveal the ways in which precarity materialised in  platform work. Workers grappled with numerous socioeconomic  vulnerabilities that influenced their entry and continued employment in  platform work. They faced low-wage outcomes, worsened by a reduction in  bonuses, and high operational work-related expenses. Earnings remained  low and uncertain despite workers putting in immensely long hours  working for platforms. Worsening these burdens was widespread income  insecurity that workers faced in both app-based taxi and delivery  sectors.&lt;/p&gt;
&lt;h3 style="text-align: justify; "&gt;Mapping delivery and taxi platform services across cities&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The  taxi services sector in all cities was dominated by two large  platforms—Uber and Ola Cabs. These platforms had established a highly  concentrated labour market for taxi workers. The exception to this was  the taxi platform labour market in Guwahati, where the local platform,  PeIndia, employed 35% of taxi workers in the city. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The  delivery services sector in all cities had a high concentration of  pan-India platforms. Food delivery services were concentrated by Swiggy  and Zomato across cities. E-commerce delivery services had a diversity  of platforms including Amazon, Flipkart, E-kart Logistics, and  Shadowfax, as well as grocery delivery services like Big Basket, Dunzo,  and Jio Mart.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Economic necessity and a lack of alternative employment pushing workers into precarious platform work&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The  pathway to precarious platform work was distress-driven, borne out of  low wages in previous salaried work, or a lack of alternative  employment. A large proportion of workers were previously engaged in  salaried employment, who then shifted to platform work, marking  increased informality and precarity in their employment status. In  Mumbai, over 64% of workers were in salaried employment previously, and  this also the case for over 50% of workers in Guwahati, and over 42% of  workers in Delhi-NCR. In Lucknow and Delhi-NCR, pandemic-driven  unemployment was a key driver for a staggering proportion of workers who  joined platform work as a distress employment source. Over 30% of  workers in Lucknow and Delhi-NCR were previously unemployed.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;These  socioeconomic vulnerabilities influenced workers entry and continued  employment in platform work. Key factors for workers entering were the  lack of alternative employment sources and the hope for better pay and  potential job flexibility. The lack of alternative jobs was a major push  into platform work for workers in Delhi-NCR and Lucknow—over 60% of  workers in Delhi-NCR and over 50% of workers in Lucknow. At least 40% of  workers across cities mentioned the expectation of better pay as a  major reason to start platform work, while potential job flexibility was  also a key reason for workers in Mumbai and Guwahati. However, as the  findings below show, workers’ expectations were unmet. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Externalised joining, statutory, and operational costs&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;High  joining, statutory, and operational costs were offloaded onto workers to  access and continue platform work. This was especially the case for  taxi workers who owned their vehicles, and had to incur vehicle  investment costs and downpayment, as well as statutory costs that  included operating permits, road tax, vehicle insurance, and fitness  fee. Across all cities, average monthly expenses for taxi workers were  above INR 30,000. For delivery workers, average monthly expenses mostly  comprised fuel costs, and were around INR 5,500 in Guwahati and Lucknow,  and around INR 6,700 in Delhi-NCR and Mumbai. These high externalised  costs reveal the economic vulnerabilities inherent within platform work. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Compounding  these costs, platforms in the taxi services sectors also charged  commissions unevenly and in varying fee structures—ranging from 20% to  30% of the fare in Mumbai and Lucknow, and going as high as 35% in  Delhi-NCR and Guwahati. It is important to note that high commissions  persist despite the mandate under the Motor Vehicle Aggregator  Guidelines, 2020 to cap commissions and other platform charges at 20% of  the fare.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Platforms’  offloading of costs to workers have resulted in workers’ having to rely  on informal leasing, debt, and subcontracting arrangements. These  arrangements were seen across all cities, where workers in the city were  either renting the vehicle they were driving, paying a commission to a  vehicle owner, paying off vehicle EMIs on someone else’s behalf, or were  paid a fixed salary by a vehicle owner. Notably, in Lucknow, around 35%  of taxi workers were engaged under these informal arrangements. &lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Insufficient incomes and economic vulnerabilities&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Workers'  experiences, across cities, highlight how a majority contended with  low-wage outcomes. Earnings remained low and uncertain for workers  despite the fact that they were putting in long work hours. Several  factors contributed to this insufficiency and uncertainty in workers’  earnings: stringent platform requirements around high acceptance rates  and ratings, which were important determinants, decreased flexibility,  and high offloaded work-related expenses.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Across  cities, earnings for delivery workers were considerably lower than  those for taxi workers. When earnings were adjusted for standard weekly  work hours (48 hours/week), over 50% of delivery workers in Mumbai,  Guwahati, and Lucknow were earning less than the corresponding  state-wise minimum wages. Further, over 75% of delivery workers in these  cities were earning below estimated state-wise living wages. Platform  work was also insufficient in meeting essential living needs for taxi  workers in Mumbai, Guwahati, and Lucknow. Around 30% of taxi workers  (23% in Guwahati) were earning less than minimum wages, and around 50%  (80% in Mumbai) were earning less than estimated living wages. Earnings  for both delivery and taxi workers in Delhi-NCR were substantially lower  than minimum wage and living wage standards. 69% of workers in the taxi  services sector and 87% of workers in the delivery services sector  earned less than the minimum wage in Delhi. Moreover, 92% of workers in  the taxi sector and 97% of workers in the delivery sector earned lower  than the estimated living wage.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;These  insufficient incomes were particularly damaging to workers’ lives and  livelihoods, considering their high dependence on income from platform  work. An overwhelming proportion of workers (over 94% across all cities)  were engaged in platform work as their main source of income, as  opposed to part-time employment. They also faced significant economic  burdens such as being sole earners in their household, having multiple  financial dependents, having financial commitments to provide  remittances back home, and so on. Worsening these burdens was widespread  income insecurity that workers faced across all cities—for over 43% of  workers (up to 65% in Guwahati), earnings from platform work were  insufficient for covering basic household expenses.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Workplace risks and ineffective redressal mechanisms&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Workers  in both sectors were working immensely long hours in order to try and  make adequate earnings while working for platforms, working several  hours above standard weekly work hours (48 hours/week) typically  prescribed by occupational health standards. Across all cities, delivery  workers spent a median of over 60 weekly hours working for platforms,  and taxi workers spent a median of around 84 weekly hours. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Alongside  the adverse health impacts of long work hours, workers faced grievous  workplace risks, including risks of physical assault, theft, poor road  safety, and harsh weather conditions. Around 75% of delivery and taxi  workers faced these issues in Mumbai and Lucknow. An even greater  proportion of workers were exposed to these risks in Delhi-NCR (84%) and  Guwahati (90%).&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Despite  several workplace risks, platforms remained unaccountable for their  failure to guarantee safe working conditions. Across all cities, less  than 10% of workers found that their platform took steps to improve  working conditions. Workers’ overall experience with platform grievance  redressal mechanisms was mixed. For instance, in Lucknow, only around  25% of workers who raised grievances did not receive a resolution. In  contrast, 50% of taxi workers in Delhi-NCR did not receive a resolution,  as was the case for 76% of taxi workers in Mumbai. Workers have limited  recourse when their grievances go unanswered. Platforms, however, wield  significant control over terms of work, making it difficult for workers  to challenge unfair decisions.&lt;/li&gt;
&lt;/ul&gt;
&lt;h3&gt;Low coverage and accessibility of social protection mechanisms&lt;/h3&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Social  security covered by platforms typically included health insurance and  accident insurance. Workers faced significant gaps in insurance  coverage, and these gaps were particularly glaring in the taxi services  sector. Across cities, health and accident insurance coverage for taxi  workers was below 10% (an exception was 11% of workers covered by  accident insurance in Delhi-NCR). It is important to note that this low  coverage exists despite the Motor Vehicle Aggregator Guidelines, 2020  mandating provision of health insurance and term insurance from  platforms. &lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;Delivery  workers had a relatively higher percentage of insurance coverage from  platforms, although coverage varied across cities. Health insurance  coverage was low for delivery workers in Delhi-NCR (21%) and Guwahati  (14%), but higher for workers in Lucknow (34%) and Mumbai (44%). In the  case of accident insurance, insurance was covered by platforms for over  40% of delivery workers in Delhi-NCR and Lucknow, while a greater  proportion of workers were covered in Mumbai (63%) and Guwahati (72%).  Even though delivery workers were covered by platform-provisioned  insurance, claiming benefits was an unreliable and time-consuming  process. Workers who attempted to access benefits faced several  obstacles, including poor awareness of available schemes, inadequate  coverage, and little to no platform support in navigating complex claims  procedures.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The  inadequacy of platform-provisioned insurance was exacerbated by the  exclusion of workers from government social protection mechanisms. In  Delhi-NCR, Guwahati, and Lucknow, over 35% of workers in both sectors  were left outside of social protection from governments. In Mumbai, over  66% of workers were excluded.&lt;/li&gt;
&lt;/ul&gt;
&lt;hr /&gt;
&lt;h2&gt;Contributors&lt;/h2&gt;
&lt;p&gt;&lt;b&gt;Conceptualisation + planning:&lt;/b&gt; Aayush Rathi, Abhishek Sekharan, Ambika Tandon, Chetna V M, Chiara Furtado, and Nishkala Sekhar&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Writing:&lt;/b&gt; Aayush Rathi, Ambika Tandon, Chetna V M, Chiara Furtado, and Nishkala Sekhar&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Data analysis:&lt;/b&gt; Abhishek Sekharan, Chetna V M, and Nishkala Sekhar&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Data visualisation:&lt;/b&gt; Sriharsha Devulapalli&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Design + design direction:&lt;/b&gt; Annushka Jaliwala and Yatharth&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Review:&lt;/b&gt; Aayush Rathi and Abhineet Nayyar&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Survey design + planning:&lt;/b&gt; Abhishek Sekharan and Ambika Tandon&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Survey implementation:&lt;/b&gt; Abhishek Kumar&lt;/p&gt;
&lt;p&gt;&lt;b&gt;Research advice:&lt;/b&gt; Nora Gobel and Uma Rani Amara&lt;/p&gt;
&lt;p&gt;We are deeply grateful to the workers who participated in the surveys  for generously sharing their time, experiences, and insights with us.&lt;/p&gt;
&lt;p&gt;This work was supported by the Internet Society Foundation, as part of the “&lt;a href="https://cis-india.org/raw/labour-futures-intersectional-responses-to-southern-digital-platform-economies"&gt;Labour Futures&lt;/a&gt;” project at the Centre for Internet and Society.&lt;/p&gt;
&lt;p&gt;This work is shared under the &lt;a href="https://creativecommons.org/licenses/by-sa/4.0/"&gt;Creative Commons Attribution-ShareAlike 4.0 International License (CC BY-SA 4.0)&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;To know more about this work, please write to us at &lt;a href="mailto:chiara@cis-india.org"&gt;chiara@cis-india.org&lt;/a&gt;&lt;/p&gt;
&lt;p&gt;Explore more of CIS’ research on labour and digitalisation at &lt;a href="https://platformwork.in"&gt;platformwork.in&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/platforming-precarity-data-narratives-workers'&gt;https://cis-india.org/raw/platforming-precarity-data-narratives-workers&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Aayush Rathi, Abhishek Sekharan, Ambika Tandon, Chetna V. M., Chiara Furtado, Nishkala Sekhar, and Sriharsha Devulapalli</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Labour Futures</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2024-10-15T02:42:26Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/legal-advocacy-manual">
    <title>Legal Advocacy Manual</title>
    <link>https://cis-india.org/internet-governance/blog/legal-advocacy-manual</link>
    <description>
        &lt;b&gt;The Legal Advocacy Manual summarizes the key legal and constitutional questions and jurisprudence related to laws that affect the right to freedom of expression and privacy online, including internet shutdowns, content takedown, online surveillance and device seizure.&lt;/b&gt;
        
&lt;p&gt;Click to download the &lt;a class="external-link" href="https://cis-india.org/internet-governance/legal-advocacy-manual/at_download/file"&gt;&lt;strong&gt;manual.&lt;br /&gt;&lt;/strong&gt;&lt;/a&gt;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/legal-advocacy-manual'&gt;https://cis-india.org/internet-governance/blog/legal-advocacy-manual&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Radhika, Shruti Trikanad and Torsha Sarkar</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2024-07-01T08:16:07Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/digital-rights-guide-1">
    <title>A Guide to Navigating Your Digital Rights</title>
    <link>https://cis-india.org/internet-governance/blog/digital-rights-guide-1</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
&lt;p&gt;The Digital Rights Guide gives practical guidance on the laws and procedures that affect internet freedoms. It covers the following topics:&lt;/p&gt;
&lt;ul&gt;&lt;li&gt;Internet Shutdowns&lt;/li&gt;&lt;li&gt;Content Takedown&lt;/li&gt;&lt;li&gt;Surveillance&lt;/li&gt;&lt;li&gt;Device Seizure&lt;br /&gt;&lt;br /&gt;&lt;/li&gt;&lt;/ul&gt;
&lt;p&gt;The Digital Rights Guide can be viewed &lt;a class="external-link" href="https://cis-india.org/internet-governance/digital-rights-guide/at_download/file"&gt;here&lt;/a&gt;.&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/digital-rights-guide-1'&gt;https://cis-india.org/internet-governance/blog/digital-rights-guide-1&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Anamika Kundu, Radhika, Shruti Trikanad, Torsha Sarkar</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2024-07-01T08:18:17Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/the-platform-economys-gatekeeping-of-class-and-caste-dominance-in-urban-india">
    <title>The Platform Economy’s Gatekeeping of Class and Caste Dominance in Urban India</title>
    <link>https://cis-india.org/raw/the-platform-economys-gatekeeping-of-class-and-caste-dominance-in-urban-india</link>
    <description>
        &lt;b&gt;Ambika Tandon and Aayush Rathi contributed an essay on how gated society management apps like MyGate and NoBrokerHood feed on caste and income inequalities in new datafied forms. The essay features in The Formalization of Social Precarities, an anthology edited by Murali Shanmugavelan and Aiha Nguyen and published with Data &amp; Society.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;Ashrit is an experienced platform worker. He has been a delivery worker for three years, job-hopping frequently. Ashrit has worked as a package delivery worker for three platforms: two courier services and a hyperlocal grocery delivery company, which promises compressed ten-minute deliveries over short distances. While navigating the city, he often deals with omnipresent surveillance tools deployed in apartment complexes owned by upper-class and dominant-caste homeowners. Ashrit is used to being screened at every apartment complex he enters, including having his picture taken and verifying details such as his name, mobile number, and the platform he is delivering for. The everydayness of constant identity verification means that Ashrit is not bothered much by it — he said he doesn’t mind the process so much as the delay it causes when customers forget to approve his entry.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;MyGate is one such company offering “gated community management,” claiming to service over 25,000 gated societies in India. A competing application, NoBrokerHood, services over 18,000 societies. Apps of this nature have sprung up across urban India in the past five years, offering “society management” services to a niche market of gated societies. Their bouquet of services includes everything from property listings with a commission rate for the platform, security services, accounting services for maintenance and related expenses, and in-app discussion forums for residents. These apps market digital security, which allows residents to regulate entries and exits and make a database of all non-resident visitors in the society. The objective of these apps is to legitimize surveillance as a way of ensuring safety in gated societies. Through a preliminary search online, we found over 20 different companies specializing in digital solutions for gated societies. The industry even had a business exposition in Mumbai on “Housing Society Management,” focused on technology solutions for gated societies.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This study uses the framework of platform urbanism to understand surveillance platforms. Platform urbanism analyzes the growing power of digital platforms in cities. Urban geographers have argued that platforms are a symptom of current models of capitalism, which exploit “idle resources” to produce new forms of urban spaces and value where they might not have existed earlier. Airbnb and Uber are often used as examples of this new form of extraction and value creation from existing assets by monetizing empty rooms and car seats. We argue that platforms offering surveillance services are another instance of this wider landscape of platform urbanism, manufacturing the need for surveillance systems in elite urban enclaves. We use this case study to show that platforms monetize not just idle resources but social inequality and stratification to generate value and capital.&lt;/p&gt;
&lt;hr /&gt;
&lt;p&gt;&lt;br /&gt;Click to download the &lt;a class="external-link" href="http://cis-india.org/raw/platform-economy-gatekeeping-class-caste.pdf/"&gt;full essay&lt;/a&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/the-platform-economys-gatekeeping-of-class-and-caste-dominance-in-urban-india'&gt;https://cis-india.org/raw/the-platform-economys-gatekeeping-of-class-and-caste-dominance-in-urban-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Ambika Tandon and Aayush Rathi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Labour Futures</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    
    
        <dc:subject>Digital Labour</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    

   <dc:date>2024-04-19T03:11:44Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/raw/online-gender-based-violence-on-short-form-video-platforms">
    <title>Online Gender Based Violence on Short Form Video Platforms</title>
    <link>https://cis-india.org/raw/online-gender-based-violence-on-short-form-video-platforms</link>
    <description>
        &lt;b&gt;An inquiry into platform policies and safeguards. This report explores how short-form video platforms in India address online gender based violence (oGBV) by analysing their terms of service, community guidelines (CG), and reporting workflows.&lt;/b&gt;
        
&lt;h2&gt;Executive Summary&lt;/h2&gt;
&lt;p style="text-align: justify;"&gt;Being a woman or from a gender minority online is a harrowing experience. From early instances of sexual harassment in text-based internet communities in the 1990s, to apps such as Bulli Bai, and harassment in the Metaverse more recently, online gender-based violence (oGBV) is a pervasive problem, affecting 23 per cent of women globally. In India, nearly half of the women surveyed reported facing online harassment, leading to reduced online participation. Other consequences of oGBV include mental health issues, withdrawal from online spaces, and, offline violence.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;In 2018, the UN Special Rapporteur on violence against women &amp;amp; girls, and its causes and consequences recognised online violence against women and the need to counter it, defining it as "any act of gender-based violence against women that is committed, assisted or aggravated in part or fully by the use of ICT, such as&amp;nbsp; mobile phones and smartphones, the Internet, social media platforms or email, against a woman because she is a woman, or affects women disproportionately."&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;This report explores how short-form video platforms in India address oGBV by analysing their terms of service, community guidelines (CG), and reporting workflows. Recognising the role of intermediaries is crucial in understanding challenges and developing effective strategies to combat oGBV. We selected three Indian video-sharing platforms based on their download numbers, as well as Instagram reels (given their popularity in India).&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The CG and terms of use of these platforms were measures against a typology of oGBV we put together based on a literature review.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The guidelines of the platforms included in the study demonstrated minimal recognition of the gendered effects of potential behaviours related to oGBV. None of the platforms had a separate policy or section dedicated to oGBV, and the policies were found to be ambiguous at several points, leaving them open to interpretation by moderators. Josh was particularly noted to have extremely poor coverage overall. Certain forms of oGBV, such as harassment, non-consensual information sharing, and extortion, were addressed to a slightly higher degree in the guidelines of Instagram, Moj, and Roposo. Some exemplary aspects are highlighted in our findings section. However, other forms, such as attacks on communication channels, omissions by regulatory actors, surveillance and stalking, and online domestic violence found little to no mention across policies, despite the likelihood of these issues manifesting offline as well. Further, policy provisions failed to address the needs of gender minorities. Reporting mechanisms were found to be lacking or inconsistent, and failed to consider the networked nature of harassment.&lt;/p&gt;
&lt;p style="text-align: justify;"&gt;The harms of gendered violence are well-known and documented. The lack of clarity on implementation and policy is no longer an oversight but an active choice to disregard users.&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Attributions&lt;/h3&gt;
&lt;p&gt;Co-authors: Divyansha Sehgal and Lakshmi T. Nambiar&lt;br /&gt;Conceptualisation: Ambika Tandon, Torsha Sarkar&lt;br /&gt;Review: Amrita Sengupta and Divyank Katira&lt;br /&gt;Research Assistance: Cheshta Arora&lt;br /&gt;Design: Anagha Musalgaonkar&lt;/p&gt;
&lt;div&gt;The report can be downloaded &lt;a href="https://cis-india.org/raw/online-gender-based-violence-pdf-10-april" class="internal-link" title="Online Gender Based Violence pdf (10 April)"&gt;here&lt;/a&gt;.&lt;/div&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/raw/online-gender-based-violence-on-short-form-video-platforms'&gt;https://cis-india.org/raw/online-gender-based-violence-on-short-form-video-platforms&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Divyansha Sehgal and Lakshmi T. Nambiar</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Gender</dc:subject>
    
    
        <dc:subject>Researchers at Work</dc:subject>
    
    
        <dc:subject>Featured</dc:subject>
    
    
        <dc:subject>Gender, Welfare, and Privacy</dc:subject>
    
    
        <dc:subject>Homepage</dc:subject>
    

   <dc:date>2024-04-11T03:24:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/india2019s-parental-control-directive-and-the-need-to-improve-stalkerware-detection">
    <title>India’s parental control directive and the need to improve stalkerware detection</title>
    <link>https://cis-india.org/internet-governance/blog/india2019s-parental-control-directive-and-the-need-to-improve-stalkerware-detection</link>
    <description>
        &lt;b&gt;We analyse a child-monitoring app being developed by the Indian government and question whether it is an effective way to enact parental controls. We highlight how such monitoring apps are often repurposed for digital stalking and play a role in intimate partner violence. 

We also evaluate the protection provided by antivirus tools in detecting such stalkerware apps and describe how we collected technical evidence to help improve the detection of these apps. &lt;/b&gt;
        
&lt;p&gt;&lt;em&gt;This post was reviewed and edited by Amrita Sengupta.&lt;/em&gt;&lt;/p&gt;
&lt;p&gt;&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;Stalkerware is a form of surveillance targeted primarily at partners, employees and children in abusive relationships. These are software tools that enable abusers to spy on a person’s mobile device, allowing them to remotely access all data on the device, including calls, messages, photos, location history, browsing history, app data, and more. Stalkerware apps run hidden in the background without the knowledge or consent of the person being surveilled.[1] Such applications are easily available online and can be installed by anyone with little technical know-how and physical access to the device.&lt;/span&gt;&lt;/p&gt;
&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;/span&gt;&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;p dir="ltr"&gt;News reports indicate that the Ministry of Electronics and Information Technology (MeitY) is supporting the development of an app called “SafeNet”[2] that allows parents to monitor activity and set content filters on children’s devices. Following a directive from the Prime Minister’s office to “incorporate parental controls in data usage” by July 2024, the Internet Service Providers Association of India (ISPAI) has suggested that the app should come preloaded on mobile phones and personal computers sold in the country. The Department of Telecom is also asking schools to raise awareness about such parental control solutions.[3][4]&lt;/p&gt;
&lt;p dir="ltr"&gt;The beta version of the app is available for Android devices on the Google Play Store and advertises a range of functionalities including location access, monitoring website and app usage, call and SMS logs, screen time management and content filtering. The content filtering functionality warrants a separate analysis and this post will only focus on the surveillance capabilities of this app.&lt;/p&gt;
&lt;p dir="ltr"&gt;Applications like Safenet, that do not attempt to hide themselves and claim to operate with the knowledge of the person being surveilled, are sometimes referred to as “watchware”.[5] However, for all practical purposes, these apps are indistinguishable from stalkerware. They possess the same surveillance capabilities and can be deployed in the exact same ways. Such apps sometimes incorporate safeguards to notify users that their device is being monitored. These include persistent notifications on the device’s status bar or a visible app icon on the device’s home screen. However, such safeguards can be circumvented with little effort. The notifications can simply be turned off on some devices and there are third-party Android tools that allow app icons and notifications to be hidden from the device user, allowing watchware to be repurposed as stalkerware and operate secretly on a device. This leaves very little room for distinction between stalkerware and watchware apps.[6] In fact, the developers of stalkerware apps often advertise their tools as watchware, instructing users to only use them for legitimate purposes.&lt;/p&gt;
&lt;p dir="ltr"&gt;Even in cases where stalkerware applications are used in line with their stated purpose of monitoring minors’ internet usage, the effectiveness of a surveillance-centric approach is suspect. Our previous work on children’s privacy has questioned the treatment of all minors under the age of 18 as a homogenous group, arguing for a distinction between the internet usage of a 5-year-old child and a 17-year-old teenager. We argue that educating and empowering children to identify and report online harms is more effective than attempts to surveil them.[7][8] Most smartphones already come with options to enact parental controls on screen time and application usage[9][10], and the need for third-party applications with surveillance capabilities is not justified.&lt;/p&gt;
&lt;p dir="ltr"&gt;Studies and news reports show the increasing role of technology in intimate partner violence (IPV).[11][12] Interviews with IPV survivors and support professionals indicate an interplay of socio-technical factors, showing that abusers leverage the intimate nature of such relationships to gain access to accounts and devices to exert control over the victim. They also indicate the prevalence of “dual-use” apps such as child-monitoring and anti-theft apps that are repurposed by abusers to track victims.[13]&lt;/p&gt;
&lt;p dir="ltr"&gt;There is some data available that indicates the use of stalkerware apps in India. Kaspersky anti-virus’ annual State of Stalkerware reports consistently place India among the top 4 countries with the most number of infections detected by its product, with a few thousand infections reported each year between 2020 and 2023.[14][15][16[17] TechCrunch’s Spyware Lookup Tool, which compiles information from data leaks from more than nine stalkerware apps to notify victims, also identifies India as a hotspot for infections.[18] Avast, another antivirus provider, reported a 20% rise in the use of stalkerware apps during COVID-19 lockdowns.[19] The high rates of incidence of intimate partner violence in India, with the National Family Health Survey reporting that about a third of all married women aged 18–49 years have experienced spousal violence [20], also increases the risk of digitally-mediated abuse.&lt;/p&gt;
&lt;p dir="ltr"&gt;Survivors of digitally-mediated abuse often require specialised support in handling such cases to avoid alerting abusers and potential escalations. As part of our ongoing work on countering digital surveillance, we conducted an analysis of seven stalkerware applications, including two that are based in India, to understand and improve how survivors and support professionals can detect their presence on devices.&lt;/p&gt;
&lt;p dir="ltr"&gt;In some cases, where it is safe to operate the device, antivirus solutions can be of use. Antivirus tools can often identify the presence of stalkerware and watchware on a device, categorising them as a type of malware. We measured how effective various commercial antivirus solutions are at detecting stalkerware applications. Our results, which are detailed in the Appendix, indicate a reasonably good coverage, with six out of the seven apps being flagged as malicious by various antivirus solutions. We found that Safenet, the newest app on the list, was not detected by any antivirus. We also compared the detection results with a similar study conducted in 2019 [21] and found that some newer versions of previously known apps saw lower rates of detection. This indicates that antivirus solutions need to analyse new apps and newer versions of apps more frequently to improve coverage and understand how they are able to evade detection.&lt;/p&gt;
&lt;p dir="ltr"&gt;In cases where the device cannot be operated safely, support workers use specialised forensic tools such as the Mobile Verification Toolkit [22] and Tinycheck [23], which can be used to analyse devices without modifying them. We conducted malware analysis on the stalkerware apps to document the traces they leave on devices and submitted them to an online repository of indicators of compromise (IOCs).[24] These indicators are incorporated in detection tools used by experts to detect stalkerware infections.&lt;/p&gt;
&lt;p dir="ltr"&gt;Despite efforts to support survivors and stop the spread of stalkerware applications, the use of technology in abusive relationships continues to grow.[25] Making a surveillance tool like Safenet available for free, publicising it for widespread use, and potentially preloading it on mobile devices and personal computers sold in the country, is an ill-conceived way to enact parental controls and will lead to an increase in digitally-mediated abuse. The government should immediately take this application out of the public domain and work on developing alternate child protection policies that are not rooted in distrust and surveillance.&lt;/p&gt;
&lt;p dir="ltr"&gt;&lt;em&gt;If you are affected by stalkerware there are some resources available here: &lt;br /&gt;&lt;/em&gt;&lt;a href="https://stopstalkerware.org/information-for-survivors/"&gt;https://stopstalkerware.org/information-for-survivors/&lt;/a&gt; &lt;br /&gt;&lt;a href="https://stopstalkerware.org/resources/"&gt;https://stopstalkerware.org/resources/&lt;/a&gt;&lt;/p&gt;
&lt;/span&gt;&lt;strong id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;br /&gt;
&lt;p dir="ltr"&gt;Appendix&lt;/p&gt;
&lt;/strong&gt;&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;p dir="ltr"&gt;Our analysis covered two apps based in India, SafeNet and OneMonitar, and five other apps, Hoverwatch, TheTruthSpy, Cerberus, mSpy and FlexiSPY. All samples were directly obtained from the developer’s websites. The details of the samples are as follows:&lt;/p&gt;
&lt;/span&gt;&lt;strong id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;br /&gt;
&lt;div align="left" dir="ltr"&gt;
&lt;table class="grid"&gt;&lt;colgroup&gt;&lt;col width="105"&gt;&lt;col width="101"&gt;&lt;col width="69"&gt;&lt;col width="133"&gt;&lt;col width="192"&gt;&lt;/colgroup&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Name&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;File name&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Version&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Date sample was obtained&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;SHA-1 Hash&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;SafeNet&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Safenet_Child.apk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;0.15&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;16th March, 2024&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;d97a19dc2212112353ebd84299d49ccfe8869454&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;OneMonitar&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;ss-kids.apk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;5.1.9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;19th March, 2024&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;519e68ab75cd77ffb95d905c2fe0447af0c05bb2&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Hoverwatch&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;setup-p9a8.apk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;7.4.360&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;5th March, 2024&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;50bae562553d990ce3c364dc1ecf44b44f6af633&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;TheTruthSpy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;TheTruthSpy.apk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;23.24&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;5th March, 2024&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;8867ac8e2bce3223323f38bd889e468be7740eab&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Cerberus&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Cerberus_disguised.apk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;3.7.9&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;4th March, 2024&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;75ff89327503374358f8ea146cfa9054db09b7cb&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;mSpy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;bt.apk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;7.6.0.1&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;21st March, 2024&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;f01f8964242f328e0bb507508015a379dba84c07&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;FlexiSPY&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;5009_5.2.2_1361.apk&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;5.2.2&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;26th March, 2024&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;5092ece94efdc2f76857101fe9f47ac855fb7a34&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/strong&gt;&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;p dir="ltr"&gt;We analysed the network activity of these apps to check what web servers they send their data to. With increasing popularity of Content Delivery Networks (CDNs) and cloud infrastructure, these results may not always give us an accurate idea about where these apps originate, but can sometimes offer useful information:&amp;nbsp;&lt;/p&gt;
&lt;/span&gt;&lt;strong id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;br /&gt;
&lt;div align="left" dir="ltr"&gt;
&lt;table class="plain"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;Name&lt;/td&gt;
&lt;td&gt;Domain&lt;/td&gt;
&lt;td&gt;IP Address[26]&lt;/td&gt;
&lt;td&gt;Country&lt;/td&gt;
&lt;td&gt;ASN Name and Number&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;SafeNet&lt;/td&gt;
&lt;td&gt;safenet.family&lt;/td&gt;
&lt;td&gt;103.10.24.124&lt;/td&gt;
&lt;td&gt;India&lt;/td&gt;
&lt;td&gt;Amrita Vishwa Vidyapeetham, AS58703&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;OneMonitar&lt;/td&gt;
&lt;td&gt;onemonitar.com&lt;/td&gt;
&lt;td&gt;3.15.113.141&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;Amazon.com, Inc., AS16509&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;OneMonitar&lt;/td&gt;
&lt;td&gt;api.cp.onemonitar.com&lt;/td&gt;
&lt;td&gt;3.23.25.254&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;Amazon.com, Inc., AS16509&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hoverwatch&lt;/td&gt;
&lt;td&gt;hoverwatch.com&lt;/td&gt;
&lt;td&gt;104.236.73.120&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;DigitalOcean, LLC, AS14061&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Hoverwatch&lt;/td&gt;
&lt;td&gt;a.syncvch.com&lt;/td&gt;
&lt;td&gt;158.69.24.236&lt;/td&gt;
&lt;td&gt;Canada&lt;/td&gt;
&lt;td&gt;OVH SAS, AS16276&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TheTruthSpy&lt;/td&gt;
&lt;td&gt;thetruthspy.com&lt;/td&gt;
&lt;td&gt;172.67.174.162&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;Cloudflare, Inc., AS13335&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;TheTruthSpy&lt;/td&gt;
&lt;td&gt;protocol-a946.thetruthspy.com&lt;/td&gt;
&lt;td&gt;176.123.5.22&lt;/td&gt;
&lt;td&gt;Moldova&lt;/td&gt;
&lt;td&gt;ALEXHOST SRL, AS200019&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;Cerberus&lt;/td&gt;
&lt;td&gt;cerberusapp.com&lt;/td&gt;
&lt;td&gt;104.26.9.137&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;Cloudflare, Inc., AS13335&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mSpy&lt;/td&gt;
&lt;td&gt;mspy.com&lt;/td&gt;
&lt;td&gt;104.22.76.136&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;Cloudflare, Inc., AS13335&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;mSpy&lt;/td&gt;
&lt;td&gt;mobile-gw.thd.cc&lt;/td&gt;
&lt;td&gt;104.26.4.141&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;Cloudflare, Inc., AS13335&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;FlexiSPY&lt;/td&gt;
&lt;td&gt;flexispy.com&lt;/td&gt;
&lt;td&gt;104.26.9.173&lt;/td&gt;
&lt;td&gt;United States&lt;/td&gt;
&lt;td&gt;Cloudflare, Inc., AS13335&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;FlexiSPY&lt;/td&gt;
&lt;td&gt;djp.bz&lt;/td&gt;
&lt;td&gt;119.8.35.235&lt;/td&gt;
&lt;td&gt;Hong Kong&lt;/td&gt;
&lt;td&gt;HUAWEI CLOUDS, AS136907&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/strong&gt;&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;p dir="ltr"&gt;To understand whether commercial antivirus solutions are able to categorise stalkerware apps as malicious, we used a tool called VirusTotal, which aggregates checks from over 70 antivirus scanners.[27] We uploaded hashes (i.e. unique signatures) of each sample to VirusTotal and recorded the total number of detections by various antivirus solutions. We compared our results to a similar study by Citizen Lab in 2019 [28] that looked at a similar set of apps to identify changes in detection rates over time.&lt;/p&gt;
&lt;/span&gt;&lt;strong id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;br /&gt;
&lt;div align="left" dir="ltr"&gt;
&lt;table class="plain"&gt;&lt;colgroup&gt;&lt;col width="148"&gt;&lt;col width="191"&gt;&lt;col width="261"&gt;&lt;/colgroup&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Product&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;VirusTotal Detections (March 2024)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;VirusTotal Detections (January 2019) (By Citizen Lab)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;SafeNet [29]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;0/67 (0 %)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;OneMonitar [30]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;17/65 (26.1%)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Hoverwatch&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;24/58 (41.4%)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;22/59 (37.3%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;TheTruthSpy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;38/66 (57.6%)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;0&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Cerberus&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;8/62 (12.9%)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;6/63 (9.5%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;mSpy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;8/63 (12.7%)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;20/63 (31.7%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Flexispy [31]&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;18/66 (27.3%)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;34/63 (54.0%)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;/strong&gt;&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;p dir="ltr"&gt;We also checked if Google’s Play Protect service [32], a malware detection tool that is built-in to Android devices using Google’s Play Store. These results were also compared with similar checks performed by Citizen Lab in 2019.&lt;/p&gt;
&lt;/span&gt;&lt;strong id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;br /&gt;
&lt;div align="left" dir="ltr"&gt;
&lt;table class="plain"&gt;&lt;colgroup&gt;&lt;col width="148"&gt;&lt;col width="191"&gt;&lt;col width="261"&gt;&lt;/colgroup&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Product&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Detected by Play Protect (March 2024)&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Detected by Play Protect (January 2019) (By Citizen Lab)&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;SafeNet&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;no&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;OneMonitar&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;N/A&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Hoverwatch&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;TheTruthSpy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Cerberus&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;no&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;mSpy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;Flexispy&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;td&gt;
&lt;p dir="ltr"&gt;yes&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;/div&gt;
&lt;h1 dir="ltr"&gt;Endnotes&lt;/h1&gt;
&lt;/strong&gt;&lt;span id="docs-internal-guid-c4a151a8-7fff-1d6a-d9e3-7643eb3ccd5b"&gt;
&lt;p dir="ltr"&gt;1. &amp;nbsp;Definition adapted from Coalition Against Stalkerware, &lt;a href="https://stopstalkerware.org/"&gt;https://stopstalkerware.org/&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;2. &amp;nbsp;&lt;a href="https://web.archive.org/web/20240316060649/https://safenet.family/"&gt;https://web.archive.org/web/20240316060649/https://safenet.family/&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;3. &amp;nbsp;&lt;a href="https://www.hindustantimes.com/india-news/itministry-tests-parental-control-app-progress-to-be-reviewed-today-101710702452265.html"&gt;https://www.hindustantimes.com/india-news/itministry-tests-parental-control-app-progress-to-be-reviewed-today-101710702452265.html&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;4. &amp;nbsp;&lt;a href="https://www.hindustantimes.com/india-news/schools-must-raise-awareness-about-parental-control-in-internet-usage-says-dot-101710840561172.html"&gt;https://www.hindustantimes.com/india-news/schools-must-raise-awareness-about-parental-control-in-internet-usage-says-dot-101710840561172.html&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;5. &amp;nbsp;&lt;a href="https://github.com/AssoEchap/stalkerware-indicators/blob/master/README.md"&gt;https://github.com/AssoEchap/stalkerware-indicators/blob/master/README.md&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;6. &amp;nbsp;https://cybernews.com/privacy/difference-between-parenting-apps-and-stalkerware/&lt;/p&gt;
&lt;p dir="ltr"&gt;7. &amp;nbsp;&lt;a href="https://timesofindia.indiatimes.com/blogs/voices/shepherding-children-in-the-digital-age/"&gt;https://timesofindia.indiatimes.com/blogs/voices/shepherding-children-in-the-digital-age/&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;8. &amp;nbsp;&lt;a href="https://blog.avast.com/stalkerware-and-children-avast"&gt;https://blog.avast.com/stalkerware-and-children-avast&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;9. &amp;nbsp;&lt;a href="https://safety.google/families/parental-supervision/"&gt;https://safety.google/families/parental-supervision/&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;10. &amp;nbsp;&lt;a href="https://support.apple.com/en-in/105121"&gt;https://support.apple.com/en-in/105121&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;11. &amp;nbsp;R. Chatterjee et al., "The Spyware Used in Intimate Partner Violence," 2018 IEEE Symposium on Security and Privacy (SP), 2018, pp. 441-458.&lt;/p&gt;
&lt;p dir="ltr"&gt;12. &amp;nbsp;&lt;a href="https://www.computerweekly.com/news/252492575/Use-of-abusive-stalkerware-against-women-skyrocketed-in-2020"&gt;https://www.computerweekly.com/news/252492575/Use-of-abusive-stalkerware-against-women-skyrocketed-in-2020&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;13. &amp;nbsp;D. Freed et al., "Digital technologies and intimate partner violence: A qualitative analysis with multiple stakeholders", PACM: Human-Computer Interaction: Computer-Supported Cooperative Work and Social Computing (CSCW), vol. 1, no. 2, 2017.&lt;/p&gt;
&lt;p dir="ltr"&gt;14. &amp;nbsp;&lt;a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/03/07160820/The-State-of-Stalkerware-in-2023.pdf"&gt;https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2024/03/07160820/The-State-of-Stalkerware-in-2023.pdf&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;15. &amp;nbsp;&lt;a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2023/03/07152747/EN_The-State-of-Stalkerware_2022.pdf"&gt;https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2023/03/07152747/EN_The-State-of-Stalkerware_2022.pdf&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;16. &amp;nbsp;&lt;a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/04/12075509/EN_The-State-of-Stalkerware-2021.pdf"&gt;https://media.kasperskycontenthub.com/wp-content/uploads/sites/43/2022/04/12075509/EN_The-State-of-Stalkerware-2021.pdf&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;17. &amp;nbsp;&lt;a href="https://media.kasperskycontenthub.com/wp-content/uploads/sites/100/2020/03/25175212/EN_The-State-of-Stalkerware-2020.pdf"&gt;https://media.kasperskycontenthub.com/wp-content/uploads/sites/100/2020/03/25175212/EN_The-State-of-Stalkerware-2020.pdf&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;18. &amp;nbsp;&lt;a href="https://techcrunch.com/pages/thetruthspy-investigation/"&gt;https://techcrunch.com/pages/thetruthspy-investigation/&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;19. &amp;nbsp;https://www.thenewsminute.com/atom/avast-finds-20-rise-use-spying-and-stalkerware-apps-india-during-lockdown-129155&lt;/p&gt;
&lt;p dir="ltr"&gt;20. &amp;nbsp;https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10071919/&lt;/p&gt;
&lt;p dir="ltr"&gt;21. &amp;nbsp;&lt;a href="https://citizenlab.ca/docs/stalkerware-holistic.pdf"&gt;https://citizenlab.ca/docs/stalkerware-holistic.pdf&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;22. &amp;nbsp;https://docs.mvt.re/en/latest/&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;23. &amp;nbsp;https://tiny-check.com/&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;24. &amp;nbsp;&lt;a href="https://github.com/AssoEchap/stalkerware-indicators/pull/125"&gt;https://github.com/AssoEchap/stalkerware-indicators/pull/125&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;25. &amp;nbsp;https://stopstalkerware.org/2023/05/15/report-shows-stalkerware-is-not-declining/&lt;/p&gt;
&lt;p dir="ltr"&gt;26. &amp;nbsp;IP information provided by https://ipinfo.io/&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;27. &amp;nbsp;&lt;a href="https://docs.virustotal.com/docs/how-it-works"&gt;https://docs.virustotal.com/docs/how-it-works&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;28. &amp;nbsp;&lt;a href="https://citizenlab.ca/docs/stalkerware-holistic.pdf"&gt;https://citizenlab.ca/docs/stalkerware-holistic.pdf&lt;/a&gt;&amp;nbsp;&lt;/p&gt;
&lt;p dir="ltr"&gt;29. &amp;nbsp;Sample was not known to VirusTotal, it was uploaded at the time of analysis&lt;/p&gt;
&lt;p dir="ltr"&gt;30.&amp;nbsp; Sample was not known to VirusTotal, it was uploaded at the time of analysis&lt;/p&gt;
&lt;p dir="ltr"&gt;31. &amp;nbsp;Sample was not known to VirusTotal, it was uploaded at the time of analysis&lt;/p&gt;
&lt;p dir="ltr"&gt;32. &amp;nbsp;&lt;a href="https://developers.google.com/android/play-protect"&gt;https://developers.google.com/android/play-protect&lt;/a&gt;&lt;/p&gt;
&lt;/span&gt;
&lt;p&gt;&amp;nbsp;&lt;/p&gt;

        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/india2019s-parental-control-directive-and-the-need-to-improve-stalkerware-detection'&gt;https://cis-india.org/internet-governance/blog/india2019s-parental-control-directive-and-the-need-to-improve-stalkerware-detection&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>divyank</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2024-04-04T14:20:41Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/indian-express-january-25-2024-how-the-telecom-act-undermines-personal-liberties">
    <title>How the Telecom Act undermines personal liberties </title>
    <link>https://cis-india.org/telecom/blog/indian-express-january-25-2024-how-the-telecom-act-undermines-personal-liberties</link>
    <description>
        &lt;b&gt;In this article, Prof. Rajat Kathuria and Isha Suri analyse whether the law has enough safeguards and an independent regulatory architecture to protect the rights of citizens. The authors posit that the current version leaves the door open for an overenthusiastic enforcement machinery to suppress fundamental rights without any meaningful checks and balances. &lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The Telecommunications Act cements government’s power to suspend internet services, does not establish independent oversight mechanism for interception, suspension orders. The article originally published in the Indian Express can be &lt;a class="external-link" href="https://indianexpress.com/article/opinion/columns/how-the-telecom-act-undermines-personal-liberties-9126314/"&gt;read here&lt;/a&gt;.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;“Is Big Brother watching you? At the press of a button a civil servant can inspect just about every detail of your life your tax, your medical record and periods of unemployment. That civil servant could be your neighbour. There is mounting concern over this powerful weapon that the computer revolution has put in the government’s hand. But no civil servant will be allowed to examine personal files from another department, without written authority from a Minister. I shall be announcing legislation enabling citizens to take action against any civil servant who gains unauthorised access to his file.” (Yes Minister). The year is 1980, the computer revolution is just about beginning and questions of surveillance have become pertinent; safeguards in the form of separation of powers between the executive and legislative are announced by the Minister for the protection of citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Although theatrical, Yes Minister can yet be invoked to characterise governments in most parliamentary democracies especially India’s.&lt;br /&gt;&lt;br /&gt;More than four decades on, the Indian Parliament witnessed the smooth passage of several pieces of legislation, including the Telecommunications Act (TA) 2023, which justifiably seeks to bury remnants of colonial-era laws. While the modern digital age creates conditions for unprecedented surveillance reflecting the Benthamite tenet of maximum monitoring at minimum cost, the question on everyone’s minds is whether the law has enough safeguards and an independent regulatory architecture to protect the rights of citizens.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Before contemplating this weighty query, let us set the narrative in context with a quick recap of the major markers in digital governance in India that have concluded, at least for the moment, in the passing of TA 2023.&lt;br /&gt;&lt;br /&gt;The institutional regime for telecommunications dates back to the late 1990s and was created more by accident and less by design. The Telecom Regulatory Authority of India (TRAI) became necessary because private sector investment came in when the public sector operator was both player and referee. Massive litigation followed, leading to the setting up of TRAI. Within a few years, the Telecom Dispute Settlement Appellate Tribunal (TDSAT) was carved from TRAI to fast-track excessive litigation. In between, there was the dissolution of the first TRAI, only confirming who the “boss” was.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The desire to serve in regulatory regimes has surely been tainted by the goal of securing sinecures. This is not just an Indian phenomenon. For example, the Biden administrators wish they continue in office for long. It is in the nature of such positions that many of those appointed will never again be in a position of authority. There have been few instances after its dissolution that TRAI has taken on the government. The relationship between the legislature and the executive is complex but suffice it to say that such a separation in telecom is met much more in the breach.&lt;br /&gt;&lt;br /&gt;The regulatory regime for telecom described above notifies subordinate legislation, enforces and adjudicates disputes — it performs the role of the executive and the adjudicator. One key safeguard for the protection of ordinary citizens is, therefore, already undermined. The separation of powers remains on paper and the exercise of authority through delegated rule-making ensures the government can intervene with little resistance.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In this background, TA 2023 poses challenges. Although undoing colonial-era laws is one of the stated goals, the re-purposing of some existing provisions and ambiguous drafting does little justice to that aim. For example, the definition of telecommunication services has been left open to interpretation. Internet-based services like WhatsApp and Gmail are, therefore, likely to fall under the Act’s ambit. Provisions empowering the government to notify standards and conformity measures or ask for alternatives to end-to-end encryption such as client-side scanning could undermine privacy. Further requiring messages to be disclosed in an “intelligible format” is irreconcilable with end-to-end privacy engineering. Tinkering with end-to-end encryption for compliance could create potential points of vulnerability.&lt;br /&gt;&lt;br /&gt;The grounds on which such information may be sought, outlined in Section 20 (2) include sovereignty and integrity of India, security of the state and public order. Prima facie these appear reasonable. However, the current phrasing leaves room for expansive interpretation by overenthusiastic enforcement machinery — it could go beyond the letter of the law to please political masters. Research conducted in 2021 by Vrinda Bhandari and others found that many orders issued under the guise of public order restrictions would not qualify as legal per se. The Act cements the government’s power to suspend internet services (Section 20(2)(b)) and does not include procedural safeguards envisaged in the Supreme Court’s Anuradha Bhasin judgment such as the proportionality test, exploration of suitable alternatives and the adoption of least intrusive measures.&lt;br /&gt;&lt;br /&gt;The Act also does not establish an independent oversight mechanism for interception and suspension orders related to telecommunications. These rules, framed in 1996 in line with the directions of the Supreme Court in PUCL v. Union of India and requiring a committee consisting exclusively of senior government officials, reflect inadequate separation. In the UK the law mandates approval of interception warrants by judicial commissioners. Separation of powers is however not a panacea; it is just a necessary condition for the effective functioning of institutions. We must also observe the counsel of John Stuart Mill for the maintenance of institutional integrity namely, not “to lay [their] liberties at the feet of even a great man, or to trust him with powers which enable him to subvert [their] institutions” — JS Mill, quoted by BR Ambedkar on November 25 1949, requoted by sitting Chief Justice of India on Constitution Day (November 26, 2018).&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;Kathuria is Dean, School of Humanities and Social Sciences and Professor of Economics at the Shiv Nadar Institution of Eminence and Suri is Research Lead, CIS.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/indian-express-january-25-2024-how-the-telecom-act-undermines-personal-liberties'&gt;https://cis-india.org/telecom/blog/indian-express-january-25-2024-how-the-telecom-act-undermines-personal-liberties&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Rajat Kathuria and Isha Suri</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2024-02-20T00:54:29Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/cis-comments-to-the-telecommunications-bill-2023">
    <title>Comments to the Telecommunications Bill, 2023</title>
    <link>https://cis-india.org/telecom/blog/cis-comments-to-the-telecommunications-bill-2023</link>
    <description>
        &lt;b&gt;The Parliament has passed the Telecommunications Bill, 2023 which seeks to replace the Indian Telegraph Act, 1885. The Centre for Internet &amp; Society (CIS) submits its comments to the bill. &lt;/b&gt;
        &lt;p&gt;The comments were reviewed by Tanveer Hasan. &lt;a class="external-link" href="https://cis-india.org/telecom/files/cis-comments-to-telecommunications-bill-2023"&gt;Click to download the PDF&lt;/a&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;h3&gt;Key concerns&lt;/h3&gt;
&lt;ol type="1"&gt;&lt;/ol&gt; &lt;ol&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Definition of Telecommunication Service &lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt; &lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p style="text-align: justify; "&gt;The definition of the terms telecommunication (section 2(p) and telecommunication service (section 2(t)) is extremely broad and would effectively include transmission of any signal by any electromagnetic systems. This wide definition increases the scope of the Bill  to include almost all kinds of means of communication used in modern times including messaging services, email, OTT services, among others. Even if one were to accept the argument that the scope of the Bill has been deliberately kept wide so that the government has the power to regulate all means of telecommunication in order to prevent mischief and illegal activities, the problem arises with the onerous language of section 3(1) which makes it compulsory to obtain an authorisation from the Central Government for any and all telecommunication services, unless specifically exempted under section 3(3).&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;In simpler words the Bill not only seeks to regulate all communication services, but requires government permission to provide such services in the first place. Such an approach has the very likely potential to hamper future telecom innovation especially in light of the fact that the penalty for not obtaining permission is imprisonment upto 3 years as well as fine of upto Rs. 2 crores.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Such a wide definition leads to ambiguity and lack of regulatory certainty to businesses as well as users participating in the ecosystem. This proposal triggers immediate concerns, particularly a confusing definition of telecommunication services which may also incorporate the provision of a broad range of digital and online services. Such a wide definition could lead to confusion and arbitrary implementation on one hand, and if made applicable to the content layer of the internet architecture stifle innovation in the digital ecosystem due to onerous licensing/registration requirements on the other hand. It is also pertinent to note that some of the internet-based services listed in the definition in 2(21) are already regulated under the Information Technology (IT) Act 2000. For example, the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 regulates intermediaries, including the significant social media intermediaries (SSMI) such as Facebook and Twitter. Putting an additional regulatory burden on these service layer companies will hamper innovation and competitiveness of the sector and also amount to regulatory overreach.&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Power of authorisation and assignment&lt;/b&gt;&lt;/p&gt;
&lt;ol&gt;&lt;/ol&gt; &lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Section 3 (7) -&lt;/b&gt; &lt;i&gt;Any authorised entity which provides such telecommunication services as &lt;/i&gt;&lt;i&gt;may be notified by the Central Government, shall identify the person to whom it provides telecommunication services through use of any verifiable biometric based identification as may be prescribed.&lt;/i&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All services do not require a biometric based identification of the person. While  there is a legitimate need to verify a person in the case of financial transactions, however a similar level of scrutiny is not warranted for applications that a person might use once, or applications that do not pose a threat. For example the need to verify a person through Know Your Customer (KYC) or otherwise for an application to order food, or an application which is meant for communication can be excessive regulation. In addition to the enhanced burden of collecting and storing this data that will come on the telecommunication service, there will also be the added requirement to maintain strict data protection and security measures under the Digital Personal Data Protection Act 2023. Furthermore, as has been seen in multiple instances of data breaches and cyber security attacks such as the one at AIIMS&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Justpay&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; demonstrate that both public and private organisations can be affected by cyber attacks. It is therefore  advisable to reduce the number of entities that store and collect sensitive personal data such as biometric information in the interest of privacy as well as national security.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;The Supreme Court while looking at the constitutionality of the Aadhaar Act upheld the need for banking and financial institutions to require an individual’s Aadhaar number stating the legitimate aim of preventing money laundering; however, the Court struck down the provision that required any private entity to collect Aadhaar details. Justice Bhushan held that the collection by private entities violated the right to privacy, by failing the first prong of the test laid down in Puttaswamy judgement, the test of legality.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;More importantly, through the requirement of ‘verifiable biometric based identification’, the Bill is likely to nudge telecom service providers to incorporate Aadhar Based identification, even though the Indian Supreme Court in 2018 held that  the mandatory linking of mobile connections with biometric identification is unlawful.&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;Standards, Public Safety, National Security and Protection of Telecommunication Networks&lt;/h3&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Power to notify standards&lt;/b&gt;&lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Section 19 (f)&lt;/b&gt; The power to notify standards and conformity measures on encryption is a sweeping power that allows the central government to potentially request for backdoors on encryption, or ask for alternatives to end to end encryption such as client side scanning, which have been critiqued&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; as measures that undermine privacy for all users. If the objective is to provide recommendations for certain encryption techniques when dealing with sensitive government data, a more specific compliance certification can be issued to such firms. For example, the United States government mandates certain government agencies to comply with the Federal Information Processing Standards (FIPS)&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; which also apply to non-government firms holding government contracts. Standards like FIPS recommend specific cryptographic modules to ensure secure communication of sensitive data. Such conditions and cases must be explicitly scoped in defining the standard setting powers of government with regard to encryption, in consultation with the industry and civil society organisations.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Provisions for public emergency or public safety&lt;/b&gt;&lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Section 20(2) (a) -&lt;/b&gt; Messaging apps such as WhatsApp and Signal enable end to end encryption, where messages are encrypted on endpoints such as user devices. Service providers and intermediaries cannot decrypt messages. Requiring messages to be amenable to disclosure in an 'intelligible format' is technically impossible within the end to end paradigm of privacy engineering&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. Technical means of disclosing the contents of messages can either reside on a user’s device, in a middle-box that mediates communication, or on servers where some computation can occur. Restructuring end-to-end encrypted communication networks to facilitate these technical means of disclosure would result in the creation of potential points of vulnerability and encryption backdoors. These vulnerabilities can be exploited by malicious actors and backdoors act as ‘intentional vulnerabilities’&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that can be used for excessive surveillance of communication that users believe to be private.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 20 (2) states the grounds for which such information may be sought. These include sovereignty and integrity of India, defence and security of the State, friendly relations with foreign States, and public order. Prima facie, these may appear to be reasonable grounds for facilitating government access, however, the current phrasing is too wide and leaves room for an expansive interpretation. This is particularly true for maintenance of “public order” that is routinely invoked in a variety of situations.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; According to research conducted in 2021 by Vrinda Bhandari and others on the “Use and Misuse of Section 144 found orders issued under the guise of public order restrictions to regulate a variety of activities, many of which would not qualify as illegal activities per se. For instance, orders were issued to prohibit flying of hot air balloons, unmanned aerial vehicles, unmanned aircraft systems, use of “special” or “metallic”  manjhas to fly kites and carrying tiffin boxes inside cinemas.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; And tracing encrypted messages to thwart such perceived public order threats would be excessive and disproportionate. The order to intercept, detain, disclose or suspend a communication made between private individuals, acts as a violation of privacy and provides extensive grounds to surveil people.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;These grounds may be used to intercept or monitor all communication where a particular word or set of words is used. And its implementation would require communication of all users to be monitored effectively leading to a lower degree of privacy for all users&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; - including internet communication based apps due to definitional ambiguity.  The Supreme Court has held that any infringement of the right to privacy should be proportionate to the need for such interference.&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The judgement in the Puttaswamy case provides some guidance to assess the limits and scope of the constitutional right to privacy in the form of the three prong test. The test requires the existence of a law, a legitimate state interest and the restriction (to privacy) should be ‘proportionate'. This provision violates a user’s fundamental right to privacy since it fails to meet the proportionality requirement as laid down by the Supreme Court.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Section 20 (2) (b) provides for suspension of telecommunication service or class of services on similar grounds. The Bill empowers the DoT to suspend telecommunication services and if applicable to internet based communication services such as WhatsApp, Signal, among others without the need for any judicial oversight or procedural safeguards as enunciated by the Supreme Court in Anuradha Bhasin vs Union Of India. The provision must incorporate an independent oversight mechanism for such orders and also incorporate safeguards laid down by the Supreme Court in the Anuradha Bhasin judgement&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; to prevent arbitrary, frequent, and prolonged suspension of telecommunication services in India.&lt;/p&gt;
&lt;h3&gt;Protection of users&lt;/h3&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt; &lt;/b&gt;&lt;/h3&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Measures for protection of users&lt;/b&gt;&lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt; Section 28 - &lt;/b&gt;This section should also provide mechanisms for de-registering from “specific messages” . While this section mentions the need for prior consent of users for receiving the specified messages/ class of specified messages, it should look at the full spectrum of rights the Digital Personal Data Protection Act 2023 provides, which includes the right to withdraw consent. Hence we suggest that Section 28(3) adds that the authorised entity providing telecommunication services shall establish an online mechanism for withdrawal of consent, in addition to grievance redressal.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt;Duty of users &lt;/b&gt;&lt;/p&gt;
&lt;ol type="1"&gt;&lt;/ol&gt;
&lt;p&gt;&lt;b&gt; &lt;/b&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;Section 29 - &lt;/b&gt;While listing out the duties of the users the Act puts the onus on the user to furnish correct information. It fails to take into account instances where the information is fed into the system by third parties, due to issues of access and literacy on the part of the users. While the section heading states “duty of the user” the preceding text “no user shall” has the potential to penalise users for acts carried out without a malicious intent. Additionally,  there is also a need to look at how notices and terms and conditions   of most telecommunication services are primarily in English, making it even more difficult for a large number of Indian users to read and hence understand the requirements. Furthermore,   the associated penalty for failing to comply with these provisions are, i.e. up to INR 25,000 for the first offence and for the second or subsequent offences, up to INR 50,000 for every day till the contravention continues. Considering the low digital literacy rates, the government would be well advised to reconsider imposition of such hefty fines.&lt;/p&gt;
&lt;p&gt; &lt;/p&gt;
&lt;p style="text-align: justify; "&gt;If applicable on internet based services, this will also impact the ability of a user to retain anonymity over the internet. Individuals may choose to remain anonymous online for a number of reasons. It is important to understand that an individual may remain anonymous for a variety of legitimate purposes such as expressing opinions about their employers and whistleblowers, providing anonymous tips to newspapers or law enforcement, expressing political opinions and criticism that may be subject to persecution, or simply someone saying something that they may be embarrassed about. &lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In India, in particular, an individual’s caste can be identified from their name, and they may choose to remain anonymous or adopt a pseudonym to escape centuries of stigma and discrimination that their communities have faced. The broad definition of telecommunication services as elaborated above places restrictions on anonymity online and severely degrades an individual’s ability to exercise their fundamental right to freedom of expression.&lt;/p&gt;
&lt;div&gt;
&lt;hr /&gt;
&lt;br /&gt;
&lt;div id="ftn1"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;[1]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Business Today Desk, “Cyber attack at AIIMS Delhi: Hackers demand Rs 200 cr in crypto, says report” &lt;i&gt;Business Today,&lt;/i&gt; 22 November 2022, https://www.businesstoday.in/latest/in-focus/story/cyber-attack-at-aiims-delhi-hackers-demand-rs-200-cr-in-crypto-says-report-354475-2022-11-28.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;[2]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Ashwin Manikandan, Anandi Chandrashekhar, “Juspay Data Leak fallout: RBI swings into action to curb cyberattacks”, &lt;i&gt;The Economic Times, &lt;/i&gt;6 January  2021, https://economictimes.indiatimes.com/tech/technology/juspay-data-leak-fallout-rbi-swings-into-action-to-curb-cyberattacks/articleshow/80125430.cms&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;[3]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “Judgement in Plain English Constitutionality of Aadhaar Act”, “&lt;i&gt;Supreme Court Observer&lt;/i&gt;, accessed 22 December 2023,https://www.scobserver.in/reports/constitutionality-of-aadhaar-justice-k-s-puttaswamy-union-of-india-judgment-in-plain-english/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;[4]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “Why Adding Client-Side Scanning Breaks End-To-End Encryption”, &lt;i&gt;The Electronic Freedom Foundation&lt;/i&gt;, accessed 22 December 2023, https://www.eff.org/deeplinks/2019/11/why-adding-client-side-scanning-breaks-end-end-encryption.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;[5]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “Compliance FAQs: Federal Information Processing Standards (FIPS)”, NIST, accessed December 22 2023. https://www.nist.gov/standardsgov/compliance-faqs-federal-information-processing-standards-fips&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;[6]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “Personal Data in the Cloud Is Under Siege. End-to-End Encryption Is Our Most Powerful Defense.”, &lt;i&gt;Lawfare,&lt;/i&gt; accessed 22 December 2023, https://www.lawfaremedia.org/article/personal-data-in-the-cloud-is-under-siege.-end-to-end-encryption-is-our-most-powerful-defense&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;[7]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; “Breaking Encryption Myths”, &lt;i&gt;Global Encryption Coalition,&lt;/i&gt; accessed 22 December 2023, https://www.globalencryption.org/2020/11/breaking-encryption-myths/&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;[8]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Smriti Parsheera “Political misinformation is a problem. But asking WhatsApp to risk user privacy is the wrong solution”,&lt;i&gt; The Indian Express,&lt;/i&gt; October 28 202 &lt;a href="https://indianexpress.com/article/opinion/editorials/remedy-worse-than-malaise-9002600/"&gt;https://indianexpress.com/article/opinion/editorials/remedy-worse-than-malaise-9002600/&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;[9]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Vrinda Bhandari, &lt;i&gt;et al, &lt;/i&gt;The Use and Misuse of Section 144 Cr.P.C, https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID4404496_code2801004.pdf?abstractid=4389147&amp;amp;mirid=1&amp;amp;type=2&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;[10]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;CIS’ Comments to the (Draft) Indian Telecommunication Bill 2022 &lt;i&gt;“Centre for Internet and Society, &lt;/i&gt;accessed 22 December 2023 https://cis-india.org/telecom/blog/cis-comments-to-draft-indian-telecom-bill-2022#:~:text=Comment%3A%20The%20draft%20bill%20attempts,power%20over%20the%20local%20government.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;[11]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The Telecommunications Bill, 2023,&lt;i&gt; PRS Legislative Research,&lt;/i&gt; accessed 22 December 2023, https://prsindia.org/billtrack/the-telecommunication-bill-2023&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;[12]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Justice K.S. Puttaswamy (Retd) vs Union of India, W.P.(Civil) No 494 of 2012, Supreme Court of India, September 26, 2018.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;[13]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Writ Petition (Civil) NO. 1031   OF    2019, accessed 22 Decmber 2023, &lt;a href="https://main.sci.gov.in/supremecourt/2019/28817/28817_2019_2_1501_19350_Judgement_10-Jan-2020.pdf"&gt;https://main.sci.gov.in/supremecourt/2019/28817/28817_2019_2_1501_19350_Judgement_10-Jan-2020.pdf&lt;/a&gt;.&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;[14]&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;Palme, Jacob, and Mikael Berglund. &lt;i&gt;"Anonymity on the Internet&lt;/i&gt;." Accessed 22 December  2023: 2009.&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/cis-comments-to-the-telecommunications-bill-2023'&gt;https://cis-india.org/telecom/blog/cis-comments-to-the-telecommunications-bill-2023&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Isha Suri, Nishant Shankar, Shweta Mohandas, and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2024-01-06T01:21:55Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/health-data-management-policies">
    <title>Health Data Management Policies - Differences Between the EU and India </title>
    <link>https://cis-india.org/internet-governance/blog/health-data-management-policies</link>
    <description>
        &lt;b&gt;Through this issue brief we would like to highlight the differences in approaches to health data management taken by the EU and India, and look at possible recommendations for India, in creating a privacy preserving health data management policy. &lt;/b&gt;
        &lt;p&gt;This issue brief was reviewed and edited by Pallavi Bedi&lt;/p&gt;
&lt;hr /&gt;
&lt;h2&gt;Introduction&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;Health data has seen an increased interest the world over, on account of the amount of information and inferences that can be drawn not just about a person but also about the population in general. The Covid 19 pandemic also brought about an increased focus on health data, and brought players that earlier did not collect health data to be required to collect such data, including offices and public spaces. This increased interest has led to further thought on how health data is regulated and a greater understanding of the sensitivity of such data, because of which countries are in varying processes to get health data regulated over and above the existing data protection regulations. The regulations not only look at ensuring the privacy of the individual but also look at ways in which this data can be shared with companies, researchers and public bodies to foster innovation and to monetise this valuable data. However for a number of countries the effort is still on the digitisation of health data. India has been in the process of implementing a nationwide health ID that can be used by a person to get all their medical records in one place. The National Health Authority (NHA) has also since 2017 been publishing policies that look at the framework and ecosystem of health data, as well as the management and sharing of health data. However these policies and a scattered implementation of the health ID are being carried out without a data protection legislation in place. In comparison, Europe, which already has an established health Id system, and a data protection legislation (GDPR) is looking at the next stage of health data management through the EU Health Data Space (EUHDS). Through this issue brief we would like to highlight the differences in approaches to health data management taken by the EU and India, and look at possible recommendations for India, in creating a privacy preserving health data management policy.&lt;/p&gt;
&lt;h2 style="text-align: justify; "&gt;Background&lt;/h2&gt;
&lt;h3&gt;EU Health Data Space&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The EU Health Data Space (&lt;b&gt;EUHDS&lt;/b&gt;) was proposed by the EU Council as a way to create an ecosystem which combines rules, standards, practices and infrastructure, around health data under a common governance framework. The EUHDS is set to rely on two pillars; namelyMyHealth@EU and HealthData@EU, where MyHealth@EU facilitates easy flow of health data between patients and healthcare professionals within member states, the HealthData@EU,faciliates secondary use of data which allows policy makers,researchers access to health data to foster research and innovation.&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The EUHDS aims to provide a trustworthy system to access and process health data and builds up from the General Data Protection Regulation (GDPR), proposed Data Governance Act.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;India’s health data policies: &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The last few years has seen a flurry of health policies and documents being published and the creation of a framework for the evolution of a National Digital Health Ecosystem (NDHE). The components for this ecosystem were the National Digital Health Blueprint published in 2019 (NDHB) and the National Digital Health Mission (NDHM). The BluePrint was created to implement the National Health Stack (published in 2018)  which facilitated the creation of Health IDs.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Whereas the NDHM was drafted to drive the implementation of the Blueprint, and promote and facilitate the evolution of NDHE.&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The National Health Authority (&lt;b&gt;NHA&lt;/b&gt;) established in 2018 has been given the responsibility of implementing the National Digital Health Mission. 2018 also saw the Digital Information Security in Healthcare Act (&lt;b&gt;DISHA&lt;/b&gt;) which was to be a legislation that laid down provisions that regulate the generation, collection, access, storage, transmission and use of Digital Health Data ("DHD") and associated personal data.&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However since its call for public consultation no progress has been made on this front.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;Along with these three strategy documents the NHA has also released policy documents more particularly the Health Data Management Policy (which was revised three times; the latest version released in April 2022), the Health Data Retention Policy (released April 2021), and the Consultation Paper on Unified Health Interface (UHI) (released March 2021). Along with this in 2022 the NHA released the NHA Data Sharing Guidelines for the Pradhan Mantri Jan Aarogya Yojana (PM-JAY) India’s state health insurance policy. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However these draft guidelines repeat the pattern of earlier policies on health data, wherein there is no reference to the policies that predated it; the PM-JAY’s Data Sharing Guidelines published in August 2022 did not even refer to the draft National Digital Health Data Management Policy (published in April 2022). As stated through the examples above these documents do not cross-refer or mention preceding health data documents, creating a lack of clarity of which documents are being used as guidelines by health care providers. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In addition to this the Personal Data Protection Bill has been revised three times since its release in 2018. The latest version was published for public comments on November 18, 2022; the Bill has removed the distinction between sensitive personal data and personal data and clubbed all personal data under one umbrella heading of personal data.  Health and health data definition has also been deleted; creating further uncertainty with respect to health data as the different policies mentioned above rely on the data protection legislation to define health data. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;&lt;span&gt;Comparison of the Health Data Management Approaches &lt;/span&gt;&lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;&lt;span&gt;Interoperability with Data Protection Legislations &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;b&gt;&lt;span&gt;&lt;br /&gt;&lt;/span&gt;&lt;/b&gt;&lt;span&gt;At the outset the key difference between the EU and India’s health data management policies has been the legal backing of GDPR which the EUHDS has. EUHDS has a strong base in terms of rules for privacy and data protection as it follows, draws inference and works in tandem with the General Data Protection Regulation (GDPR). The provisions also build upon legislation such as Medical Devices Regulation and the In Vitro Diagnostics Regulation. With particular respect to GDPR the EUHDS draws from the rights set out for protection of personal data including that of electronic health data.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Indian Health data policies however currently exist in the vacuum created by the multiple versions of the Data Protection Bill that are published and repealed or replaced. The current version called the Digital Personal Data Protection Bill 2022 seems to take a step backward in terms of health data. The current version does away with sensitive personal data (which health data was a part of) and keeps only one category of data - personal data. It can be construed that the Bill currently considers all personal data as needing the same level of protection but it is not so in practice. The Bill does not at the moment mandate more responsibilities on data fiduciaries&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; that deal with health data (something that was present in all the earlier versions of the Bill) and in other data protection legislation across different jurisdictions  and leaves the creation of Significant Data Fiduciaries (who have more responsibilities) to be created by rules, based on the sensitivity of data decided by the government at a later date.&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In addition to this the Bill does not define “health data”, the reason why this is a cause for worry is that the existing health data policies also do not define health data often relying on the definition mentioned in the versions of Data Protection Bill. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Definitions and Scope&lt;/span&gt;&lt;/h3&gt;
&lt;p&gt;&lt;span&gt;The EUHDS defines ‘personal electronic health data’ as data concerning health and genetic data as defined in Regulation (EU) 2016/679&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, as well as data referring to determinants of health, or data processed in relation to the provision of healthcare services, processed in an electronic form. Health data by these parameters would then include not just data about the status of health of a person which includes reports and diagnosis, but also data from medical devices. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In India the Health Data Management Policy 2022, defines “Personal Health Records” (&lt;b&gt;PHR&lt;/b&gt;) as a health record that is initiated and maintained by an individual. The policy also states that  a PHR would be able to reveal a complete and accurate summary of the health and medical history of an individual by gathering data from multiple sources and making this accessible online. However there is no definition of health data which can be used by companies or users to know what comes under health data. The 2018, 2019 and 2021 version of the Data Protection Legislation had definitions of the term health data, however the 2022 version of the Bill does away with the definition.&lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Health data and wearable devices&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;One of the forward looking provisions in the EUHDS is the inclusion of devices that records health data into this legislation. This also includes the requirement of them to be added to registries to provide easy access and scrutiny. The document also requires voluntary labeling of wellness applications and registration of EHR systems and wellness applications. This is not just for the regulation point of view but also in the case of data portability, in order for people to control the data they share. In addition to this in the case where manufacturers of medical devices and high-risk AI systems declare interoperability with the EHR systems, they will need to comply with the essential requirements on interoperability under the EHDS. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In India the health data management policy 2022 while stating the applicable entities and individuals who are part of the ABDM ecosystem&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; mention medical device manufacturers, does not mention device sellers or use terms such as wellness applications or wearable devices. Currently the regulation of medical devices falls under the purview of  the Drugs and Cosmetics Act, 1940 (DCA) read along with the Medical Device Rules, 2017 (MDR). However in 2020 possibly due to the pandemic the Indian Government along with the Drugs Technical Advisory Board (DTAB) issued two notifications the first one expanded the scope of medical devices which earlier was limited to only 37 categories excluding medical apps, and second one notified the Medical Device (Amendment) Rules, 2020. These two changes together brought all medical devices under the DCA as well as expanded the categories of medical devices. However it is still unclear whether fitness tracker apps that come with devices are regulated, as the rules and the DCA still rely on the manufacturer to self-identify as a medical device.&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, this regulatory uncertainty has not brought about any change in how this data is being used and insurance companies at times encourage people to sync their fitness tracker data.&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Multiple use of health data &lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The EUHDS states two types of uses of data: primary and secondary use of data. In the document the EU states that while there are a number of organisations collecting data, this data is not made available for purposes other than for which it was collected. In order to ensure that researchers, innovators and policy makers can use this data. the EU encourages the data holders to contribute to this effort in making different categories of electronic health data they are holding available for secondary use. The data that can be used for secondary use would also include user generated data such as from devices, applications or other wearables and digital health applications.However, the regulation cautions against using this data for measures and making decisions that are detrimental to the individual, in ways such as increasing insurance premiums. The EUHDS also states that as the data is sensitive personal data care should be taken by the data access bodies, to ensure that while data is being shared it is necessary to ensure that the data will be processed in a privacy preserving manner. This could include through pseudonymisation, anonymisation, generalisation, suppression and randomisation of personal data.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;While the document states how important it is to have secondary use of the data for public health, research and innovation it also requires that the data is not provided without adequate checks. The EUHDS requires the organisation seeking access to provide several pieces of information and be evaluated by the data access body. The information should include legitimate interest, the necessity and the process the data will go through. In the case where the organisation is seeking pseudonymised data, there is a need to explain why anonymous data would not be sufficient. In order to ensure a comprehensive approach between health data access bodies, the EUHDS states that the European Commission should support the harmonisation of data application, as well as data request.         &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;In India, while multiple health data documents state the need to share data for public interest, research and innovation, not much thought has been given to ensuring that the data is not misused and that there is harmonisation between bodies that provide the data. Most recently the PMJay documents states that the NHA shall make aggregated and anonymised data available through a public dashboard for the purpose of facilitating health and clinical research, academic research, archiving, statistical analysis, policy formulation, the development and promotion of diagnostic solutions and such other purposes as may be specified by the NHA. Such data can be accessed through a request to the Data Sharing Committee&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; for the sharing of such information through secure modes, including clean rooms and other such secure modes specified by NHA. However the document does not mention what clean rooms are in this context. &lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;The Health Data Management Policy 2022 states that Data fiduciaries (data controllers/ processors according to the data protection legislation) can themselves make anonymised or de-identified data in an aggregated form available based in technical processes and anonymisation protocols which may be specified by the NDHM in consultation with the MeitY. The purposes mentioned in this policy included health and clinical research, academic research, archiving, statistical analysis, policy formulation, the development and promotion of diagnostic solutions and such other purposes as may be specified by the NDHMP. The policy states that in order to access the anonymised or de-identified data the entity requesting the data would have to provide relevant information such as name, purpose of use and nodal person of contact details. While the policy does not go into details about the scrutiny of the organisations seeking this data, it does state that the data will be provided based on the term as may be stipulated. &lt;br /&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;However the issue arises as both the documents published by the NHA do not have a similar process for getting the data, for example the NDHMP requires the data fiduciary to share the data directly, while the PMJay guidelines requires the data to be shared by the Data Sharing Committee, creating duplicate datasets as well as affecting the quality of the data being shared. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;b&gt;&lt;span&gt;Recommendations for India &lt;/span&gt;&lt;/b&gt;&lt;span&gt;&lt;br /&gt; &lt;/span&gt;&lt;span&gt;Need for a data protection legislation:&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;While the EUHDS is still a draft document and the end result could be different based on the consultations and deliberations, the document has a strong base with respect to the privacy and data protection based on the earlier regulations and the GDPR. The definitions of what counts as health data, and the parameters for managing the data creates a more streamlined process for all stakeholders. More importantly the GDPR and other regulations provide a way of recourse for people. In India the health data related  policies and strategy documents have been published and enforced before the data protection legislation is passed. In addition to this India, unlike the EU has just begun looking at a universal health ID and digitisation of the healthcare system, ideally it would be better to take each step at a time, and at first look at the issues that may arise due to the universal health ID. In addition to this, multiple policies, without a strong data protection legislation providing parameters and definitions could mean that the health data management policies only benefit certain people. This also creates uncertainty in terms of where an individual will go in case of harms caused by the processing of their data, and who would be the authority to govern questions around health data. The division of health data management between different documents also creates multiple silos of data management which creates data duplication and issues with data quality. &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;Secondary use of data&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;While both the EUHDS and India's Health Data Management Policy look at the sharing of health data with researchers and private organisations in order to foster innovation, the division of sharing of data based on who uses the data is a good way to ensure that only interested parties have access to the data. With respect to the health data policies in India, a number of policies talk about the sharing of anonymised data with researchers, however the documents being scattered could cause the same data to be shared by multiple health data entities, making it possible to identify people. For example, the health data management policy could share anonymised data of health services used by a person, whereas the PMJAY policy could share data about insurance covers, and the researcher could probably match the data and be closer to identifying people. It has also been  revealed in multiple studies that anonymisation of data is not permanent and that the anonymisation can be broken. This is more concerning since the polices do not put limits or checks on who the researchers are and what is the end goal of the data sought by them, the policies seem to rely on the anonymisation of the data as the only check for privacy. This data could be used to de-anonymise people, could be used by companies working with the researchers to get large amounts of data to train their systems, &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt;train data that could lead to greater surveillance, increase insurance scrutiny etc. The NHA and Indian health policy makers could look at the restrictions and checks that the EUHDS creates for the secondary use of data and create systems of checks and categories of researchers and organisations seeking data to ensure minimal risks to an individual’s data. &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;b&gt;&lt;span&gt;Conclusion&lt;/span&gt;&lt;/b&gt;&lt;/h2&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;While the EU Health data space has been criticised for facilitating vast amounts of data with private companies and the collecting of data by governments, the codification of the legislation does in some way give some way to regulate the flow of health data. While India does not have to emulate the EU and have a similar document, it could look at the best practices and issues that are being highlighted with the EUHDS. Indian lawmakers have looked at the GDPR for guidance for the draft data protection legislation, similarly it could do so with regard to health data and health data management. One possible way to ensure both the free flow of health data and the safeguards of a regulation could be to re-introduce the DISHA Act which much like the EUHDS could act as a legislation which provides an anchor to the multiple health data policies, including standard definition of health data, grievance redressal bodies, and adjudicating authorities and their functions. In addition a legislation dedicated to the health data would also remove the existing burden on the to be formed data protection authority. &lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;div&gt;&lt;br /&gt;
&lt;div id="ftn1"&gt;
&lt;p&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “&lt;/span&gt;&lt;span&gt;European Health Data Space&lt;/span&gt;&lt;span&gt;”, European Commission, 03 May 2022,https://health.ec.europa.eu/ehealth-digital-health-and-care/european-health-data-space_en &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;“&lt;/span&gt;&lt;span&gt;European Health Data Space&lt;/span&gt;&lt;span&gt;”&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “National Digital Health Blueprint”, Ministry of Health and Family Welfare Government of India, https://abdm.gov.in:8081/uploads/ndhb_1_56ec695bc8.pdf&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “National Digital Health Blueprint”&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “Mondaq” “DISHA – India's Probable Response To The Law On Protection Of Digital Health Data” accessed 13 June 2023,https://www.mondaq.com/india/healthcare/1059266/disha-india39s-probable-response-to-the-law-on-protection-of-digital-health-data&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;“The Digital Personal Data Protection Bill 2022”, accessed 13 June 2023 , https://www.meity.gov.in/writereaddata/files/The%20Digital%20Personal%20Data%20Potection%20Bill%2C%202022_0.pdf&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;The Digital Personal Data Protection Bill 2022&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Regulation (EU) 2016/679 defines health data as “Personal data concerning health should include all data pertaining to the health status of a data subject which reveal information relating to the past, current or future physical or mental health status of the data subject. This includes information about the natural person collected in the course of the registration for, or the provision of, health care services as referred to in Directive 2011/24/EU of the European Parliament and of the Council (1) to that natural person; a number, symbol or particular assigned to a natural person to uniquely identify the natural person for health purposes; information derived from the testing or examination of a body part or bodily substance, including from genetic data and biological samples; and any information on, for example, a disease, disability, disease risk, medical history, clinical treatment or the physiological or biomedical state of the data subject independent of its source, for example from a physician or other health professional, a hospital, a medical device or an in vitro diagnostic test. &lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; For creating an integrated, uniform and interoperable ecosystem in a patient or individual centric manner, all the government healthcare facilities and programs, in a gradual/phased manner, should start assigning the same number for providing any benefit to individuals.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; For example a manufacturer of a  fitness tracker which is capable of monitoring heart rate could state that the intended purpose of the device was fitness or wellness as opposed to early detection of heart disease thereby not falling under the purview of the regulation.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;“&lt;/span&gt;&lt;span&gt;Healthcare Executive” “GOQii Launches GOQii Smart Vital 2.0, an ECG-Enabled Smart Watch with Integrated Outcome based Health Insurance &amp;amp; Life Insurance, accessed 13 June 2023&lt;br /&gt; &lt;/span&gt;&lt;a href="https://www.healthcareexecutive.in/blog/ecg-enabled-smart-watch"&gt;&lt;span&gt;https://www.healthcareexecutive.in/blog/ecg-enabled-smart-watch&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p style="text-align: justify; "&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; The guidelines only state that the Committee will be responsible for ensuring the compliance of the guidelines in relation to the personal data under its control. And does not go into details of defining the Committee.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/health-data-management-policies'&gt;https://cis-india.org/internet-governance/blog/health-data-management-policies&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>shweta</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Health Management</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Covid19</dc:subject>
    
    
        <dc:subject>Digitisation</dc:subject>
    

   <dc:date>2023-07-10T16:36:25Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/cis-comments-recommendations-to-digital-data-protection-bill">
    <title>The Centre for Internet and Society’s comments and recommendations to the: The Digital Data Protection Bill 2022</title>
    <link>https://cis-india.org/internet-governance/blog/cis-comments-recommendations-to-digital-data-protection-bill</link>
    <description>
        &lt;b&gt;The Centre for Internet &amp; Society (CIS) published its comments and recommendations to the Digital Personal Data Protection Bill, 2022, on December 17, 2022.&lt;/b&gt;
        &lt;div class="WordSection1" style="text-align: justify; "&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p align="center" class="MsoNormal" style="text-align:center; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p align="right" class="MsoNormal" style="text-align:right; "&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h1&gt;&lt;span&gt;High Level Comments&lt;/span&gt;&lt;/h1&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;1.&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span&gt;Rationale for removing the distinction between personal data and sensitive personal data is unclear.&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;All the earlier iterations of the Bill as well as the rules made under Section 43A of the Information Technology Act, 2000&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; had classified data into two categories; (i) personal data; and (ii) sensitive personal data. The 2022 version of the Bill has removed this distinction and clubbed all personal data under one umbrella heading of personal data. The rationale for this is unclear, as sensitive personal data means such data which could reveal or be related to eminently private data such as financial data, health data, sexual orientations and biometric data. Considering the sensitive nature of the data, the data classified as sensitive personal data is accorded higher protection and safeguards from processing, therefore by clubbing all data as personal data, the higher protection such as the need for explicit consent to the processing of sensitive personal data, the bar on processing of sensitive personal data for employment purposes has also been removed. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;2.&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/b&gt;&lt;b&gt;&lt;span&gt;No clear roadmap for the implementation of the Bill&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The 2018 Bill had specified a roadmap for the different provisions of the Bill to come into effect from the date of the Act being notified.&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It specifically stated the time period within which the Authority had to be established and the subsequent rules and regulations notified. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The present Bill does not specify any such blueprint; it does not provide any details on either when the Bill will be notified or the time period within which the Board shall be established and specific Rules and regulations notified. Considering that certain provisions have been deferred to Rules that have to be framed by the Central government, the absence and/or delayed notification of such rules and regulations will impact the effective functioning of the Bill. Provisions such as Section 10(1) which deals with verifiable parental consent for data of children,  Section 13 (1) which states the manner in which a Data Principal can initiate a right to correction, the process of selection and functioning of consent manager under &lt;/span&gt;&lt;span&gt;3(7)&lt;/span&gt;&lt;span&gt; are few such examples, that when the Act becomes applicable, the data principal will have to wait for the Rules to Act of these provisions, or to get clarity on entities created by the Act. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The absence of any sunrise or sunset provision may disincentivise political or industrial will to support or enforce the provisions of the Bill. An example of such a lack of political will was the establishment of the Cyber Appellate Tribunal. The tribunal was established in 2006 to redress cyber fraud. However, it was virtually a defunct body from 2011 onwards when the last chairperson retired. It was eventually merged with the Telecom Dispute Settlement and Appellate Tribunal in 2017. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;We recommend that Bill clearly lays out a time period for the implementation of the different provisions of the Bill, especially a time frame for the establishment of the Board. This is important to give full and effective effect to the right of privacy of the individual. It is also important to ensure that individuals have an effective mechanism to enforce the right and seek recourse in case of any breach of obligations by the data fiduciaries. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The Board must ensure that Data Principals and Fiduciaries have sufficient awareness of the provisions of this Bill before bringing the provisions for punishment into force. This will allow the Data Fiduciaries to align their practices with the provisions of this new legislation and the Board will also have time to define and determine certain provisions that the Bill has left the Board to define. Additionally enforcing penalties for offenses initially must be in a staggered process, combined with provisions such as warnings, in order to allow first time and mistaken offenders which now could include data principals as well, from paying a high price. This will relieve the fear of smaller companies and startups and individuals who might fear processing data for the fear of paying penalties for offenses.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;a name="_kn12ecl3pdrp"&gt;&lt;/a&gt;&lt;span&gt;3.&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;span&gt;Independence of  Data Protection Board of India.&lt;/span&gt;&lt;/h3&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The Bill proposes the creation of the Data Protection Board of India (Board) in place of the Data Protection Authority. In comparison with the powers of the Board with the 2018 and 2019 version of Personal Data Protection Bill, we witness an abrogation of powers of the Board  to be created, in this Bill. Under Clause 19(2), the strength and composition of the Board, the process of selection, the terms and conditions of appointment and service, and the removal of its Chairperson and other Members shall be such as may be prescribed by the Union Government at a later stage. Further as per Clause 19(3), the Chief Executive of the Board will be appointed by the Union Government and the terms and conditions of her service will also be determined by the Union Government. The functions of the Board have also not been specified under the Bill, the Central Government may assign the functions to be performed by the Board.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;In order to govern data protection effectively, there is a need for a responsive market regulator with a strong mandate, ability to act swiftly, and resources. The political nature of  personal data also requires that the governance of data, particularly the rule-making and adjudicatory functions performed by the Board are independent of the Executive. &lt;/span&gt;&lt;/p&gt;
&lt;h1&gt;&lt;a name="_n9jzjnvile8f"&gt;&lt;/a&gt;&lt;span&gt;Chapter Wise Comments and Recommendations &lt;/span&gt;&lt;/h1&gt;
&lt;h2&gt;&lt;a name="_chp7y0vgrjqa"&gt;&lt;/a&gt;&lt;span&gt;CHAPTER I- PRELIMINARY&lt;/span&gt;&lt;/h2&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;●&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;Definition:&lt;/span&gt;&lt;/b&gt;&lt;span&gt; While the Bill has added a few new definitions to the Bill including terms such as gains, loss, consent manager etc. there are a few key definitions that have been removed from the earlier versions of the Bill. The removal of certain definitions in the Bill, eg. sensitive personal data, health data, biometric data, transgender status, creating a legal uncertainty about the application of the Bill. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;With respect to the existing definitions as well the definition of the term ‘harm’ has been significantly reduced to remove harms such as surveillance from the ambit of harms. In addition, with respect of the definition of the term of harms also, the 2019 version of the Bill under Clause 2 (20) the definition provides a non exhaustive list of harms, by using the phrase “harms include”, however in the new definition the phrase has been altered to “harm”, in relation to a Data Principal, means”, thereby removing the possibility of more harms that are not apparent currently from being within the purview of the Act. We recommend that the definition of harms be made into a non-exhaustive list.&lt;br /&gt; &lt;br /&gt; &lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;a name="_nhwnuzprx0ir"&gt;&lt;/a&gt;&lt;span&gt;CHAPTER II - OBLIGATIONS OF DATA FIDUCIARY&lt;/span&gt;&lt;/h2&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Notice: &lt;/span&gt;&lt;/b&gt;&lt;span&gt;The revised Clause on notice does away with the comprehensive requirements which were laid out under Clause 7 of the PDP Bill 2019. The current clause does not mention in detail what the notice should contain, while stating that that the notice should be itemised. While it can be reasoned that the Data Fiduciary can find the contents of the notice throughout the bill, such as with the rights of the Data Principal, the removal of a detailed list could create uncertainty for Data Fiduciaries. By leaving the finer details of what a notice should contain, it could cause Data Fiduciaries from missing out key information from the list, which in turn provide incomplete information to the Data Principal. Even in terms of Data Fiduciaries they might not know if they are complying with the provisions of the bill, and could result in them invariably being penalised. In addition to this by requiring less work by the Data Fiduciary and processor, the burden falls on the Data Principal to make sure they know how their data is processed and collected. The purpose of this legislation is to create further rights for individuals and consumers, hence the Bill should strive to put the individual at the forefront.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;In addition to this Clause 6(3) of the Bill states &lt;i&gt;“The Data Fiduciary shall give the Data Principal the option to access the information referred to in sub-sections (1) and (2) in English or any language specified in the Eighth Schedule to the Constitution of India.”&lt;/i&gt; While the inclusion of regional language notices is a welcome step, we suggest that the text be revised as follows &lt;i&gt;“The Data Fiduciary shall give the Data Principal the option to access the information referred to in sub-sections (1) and (2) in English&lt;b&gt; and in&lt;/b&gt; any language specified in the Eighth Schedule to the Constitution of India.” &lt;/i&gt;While the main crux of notice is to let the person know before giving consent, notice in a language that a person cannot read would not lead to meaningful consent.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Consent &lt;br /&gt; &lt;br /&gt; &lt;/span&gt;&lt;/b&gt;&lt;span&gt;Clause 3 of the Bill states &lt;i&gt;“request for consent would have the contact details of a Data Protection Officer, where applicable, or of any other person authorised by the Data Fiduciary to respond to any communication from the Data Principal for the purpose of exercise of her rights under the provisions of this Act.” &lt;/i&gt;Ideally this provision should be a part of the notice and should be mentioned in the above section. This is similar to Clause 7(1)(c) of the draft Personal Data Protetion Bill 2019 which requires the notice to state &lt;i&gt;“the identity and contact details of the data fiduciary and the contact details of the data protection officer, if applicable;”. &lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Deemed Consent&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The Bill  introduces a new type of consent that was absent in the earlier versions of the Bill. We are of the understanding that deemed consent is used to redefine non consensual processing of personal data. The use of the term deemed consent and the provisions under the section while more concise than the earlier versions could create more confusion for Data Principals and Fiduciaries alike. The definition and the examples do not shed light on one of the key issues with voluntary consent - the absence of notice. In addition to this the Bill is also silent on whether deemed consent can be withdrawn or if the data principal has the same rights as those that come from processing of data they have consented to. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Personal Data Protection of Children &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The age to determine whether a person has the ability to legally consent in the online world has been intertwined with the age of consent under the Indian Contract Act; i.e. 18 years. The Bill makes no distinction between a 5 year old and a 17 year old- both are treated in the same manner. It assumes the same level of maturity for all persons under the age of 18. It is pertinent to note that the law in the offline world does recognise that distinction and also acknowledges the changes in the level of maturity. As per Section 82 of the Indian Penal Code read with Section 83, any act by a child under the age of 12 shall not be considered as an offence. While the maturity of those aged between 12–18 years will be decided by court (individuals between the age of 16–18 years can also be tried as adults for heinous crimes). Similarly, child labour laws in the country allow children above the age of 14 years to work in non-hazardous industry&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;There is  a need to evaluate and rethink the idea that children are passive consumers of the internet and hence the consent of the parent is enough. Additionally, the bracketing of all individuals under the age of 18 as children fails to look at how teenages and young people use the internet. This is more important looking at the 2019 data which suggests that two-thirds of India’s internet users are in the 12–29 years age group, with those in the 12–19 age group accounting for about 21.5% of the total internet usage in metro cities. Given that the pandemic has compelled students and schools to adopt and adapt to virtual schools, the reliance on the internet has become ubiquitous with education. Out of an estimated 504 million internet users, nearly one-third are aged under 19. As per the Annual Status on Education Report (ASER) 2020, more than one-third of all schoolchildren are pursuing digital education, either through online classes or recorded videos.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Instead of setting a blanket age for determining valid consent, we could look at alternative means to determine the appropriate age for children at different levels of maturity, similar to what had been developed by the U.K. Information Commissioner’s Office. The Age Appropriate Code prescribes 15 standards that online services need to follow. It broadly applies to online services "provided for remuneration"—including those supported by online advertising—that process the personal data of and are "likely to be accessed" by children under 18 years of age, even if those services are not targeted at children. This includes apps, search engines, social media platforms, online games and marketplaces, news or educational websites, content streaming services, online messaging services. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The reservation to definition of child under the Bill has also been expressed by some members of the JPC through their dissenting opinion. MP Ritesh Pandey stated that keeping in mind the best interest of the child the Bill should consider a child to be a person who is less than 14 years of age. This would ensure that young people could benefit from the advances in technology without parental consent and reduce the social barriers that young women face in accessing the internet. Similarly Manish Tiwari in his dissenting note also observed that the regulation of the processing of data of children should be based on the type of content or data. The JPC Report observed that the Bill does not require the data fiduciary to take fresh consent of the child, once the child has attained the age of majority, and it also does not give the child the option to withdraw their consent upon reaching the majority age. It therefore, made the following recommendations:&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Registration of data fiduciaries, exclusively dealing with children’s data. Application of the Majority Act to a contract with a child. Obligation of Data fiduciary to inform a child to provide their consent, three months before such child attains majority  Continuation of the services until the child opts out or gives a fresh consent, upon achieving majority. However, these recommendations have not been incorporated into the provisions of the Bill. In addition to this the Bill is silent on the status of non consensual processing and deemed consent with respect to the data of children.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;We recommend that fiduciaries who have services targeted at children should be considered as significant Data Fiduciaries. In addition to this the Bill should also state that the guardians could approach the Data Protection Board on behalf of the child. With these obligations in place, the age of mandatory consent could be reduced and the data fiduciary could have an added responsibility of informing the children in the simplest manner how their data will be used. Such an approach places a responsibility on Data Fiduciaires when implementing services that will be used by children and allows the children to be aware of data processing, when they are interacting with technology.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Chapter III-RIGHTS AND DUTIES OF DATA PRINCIPAL&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Rights of Data Principal&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Clause 12(3) of the Bill while providing the Data Principal the right to be informed of the identities of all the Data Fiduciaries with whom the personal data has been shared, also states that the data principal has the right to be informed of the categories of personal data shared. However the current version of the Bill provides only one category of data that is personal data. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Clause 14 of the Bill talks about the Right of Grievance Redressal, and  states that the Data Principal has the right to readily available means of registering a grievance, however the Bill does not provide in the Notice provisions the need to mention details of a grievance officer or a grievance redressal mechanism. It is only  the additional obligations on significant data fiduciary that mentions the need for a Data Protection officer to be the contact for the grievance redressal mechanism under the provisions of this Bill. The Bill could ideally re-use the provisions of the IT Act SPDI Rules 2011 in which Section 5(7) states &lt;i&gt;“Body corporate shall address any discrepancies and grievances of their provider of the information with respect to processing of information in a time bound manner. For this purpose, the body corporate shall designate a Grievance Officer and publish his name and contact details on its website. The Grievance Officer shall redress the grievances or provider of information expeditiously but within one month ' from the date of receipt of grievance.”&lt;br /&gt; &lt;/i&gt;&lt;br /&gt; The above framing would not only bring clarity to the data fiduciaries on what process to follow for a grievance redressal, it also would reduce the significant burden of theBoard. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Duties of Data Principals&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;The Bill while entisting duties of the Data Principal states that the “Data Principal shall not register a false or frivolous grievance or complaint with a Data Fiduciary or the Board”, however it is very difficult for a Data Principal to and even for the Board to determine what constitutes a “frivolous grievance”. In addition to this the absence of a defined notice provision and the inclusion of deemed consent would mean that the Data Fiduciary could have more information about the matter than the Data Principal. This could mean that the fiduciary could prove that a claim was false or frivolous. Clause 21(12) states that “&lt;i&gt;At any stage after receipt of a complaint, if the Board determines that the complaint is devoid of merit, it may issue a warning or impose costs on the complainant.” &lt;/i&gt;In addition to this Clause 25(1) states that “ &lt;i&gt;If the Board determines on conclusion of an inquiry that non- compliance by &lt;b&gt;a person &lt;/b&gt;is significant, it may, after giving the person a reasonable opportunity of being heard, impose such financial penalty as specified in Schedule 1, not exceeding rupees five hundred crore in each instance.” &lt;/i&gt;The use of the term “person” in this case includes data which could mean that they could be penalised under the provisions of the Bill, which could also include not complying with the duties.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;CHAPTER IV- SPECIAL PROVISIONS&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Transfer of Personal Data outside India&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Clause 17 of the Bill has removed the requirement of data localisation which the 2018 and 2019 Bill required. Personal data can be transferred to countries that will be notified by the central government. There is no need for a copy of the data to be stored locally and no prohibition on transferring sensitive personal data and critical data. Though it is a welcome change that personal data can be transferred outside of India, we would highlight the concerns in permitting unrestricted access to and transfer of all types of data. Certain data such as defence and health data do require sectoral regulation and ringfencing of the transfer of data. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt;Exemptions&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Clause 18 of the Bill has widened the scope of government exemptions. Blanket exemption has been given to the State under Clause 18(4) from deleting the personal data even when the purpose for which the data was collected is no longer served or when retention is no longer necessary. The requirement of &lt;i&gt;proportionality, reasonableness and fairness&lt;/i&gt; have been removed for the Central Government to exempt any department or instrumentality from the ambit of the Bill.&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;By doing away with the four pronged test, this provision is not in consonance with test laid down by the Supreme Court and are also incompatible with an effective privacy regulation. There is also no provision for either a prior judicial review  of the order by a district judge as envisaged by the Justice Srikrishna Committee Report or post facto review by an oversight committee of the order as laid down under the Indian Telegraph Rules, 1951&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; and the rules framed under Information Technology Act&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;. The provision states that such processing of personal data shall be subject to the procedure, safeguard and oversight mechanisms that may be prescribed.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div style="text-align: justify; "&gt;&lt;br clear="all" /&gt; 
&lt;hr align="left" size="1" width="100%" /&gt;
&lt;div id="ftn1"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Information Technology (Reasonable security practices and procedures and sensitive personal data or information) Rules, 2011&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Clause 97 of the 2018 Bill states&lt;i&gt;“(1) For the purposes of this Chapter, the term ‘notified date’ refers to the date notified by the Central Government under sub-section (3) of section 1. (2)The notified date shall be any date within twelve months from the date of enactment of this Act. (3)The following provisions shall come into force on the notified date-(a) Chapter X; (b) Section 107; and (c) Section 108. (4)The Central Government shall, no later than three months from the notified date establish the Authority. (5)The Authority shall, no later than twelve months from the notified date notify the grounds of processing of personal data in respect of the activities listed in sub-section (2) of section 17. (6) The Authority shall no, later than twelve months from the date notified date issue codes of practice  on the following matters-(a) notice under section 8; (b) data quality under section 9; (c) storage limitation under section 10; (d) processing of personal data under Chapter III; (e) processing of sensitive personal data under Chapter IV; (f) security safeguards under section 31; (g) research purposes under section 45;(h) exercise of data principal rights under Chapter VI; (i) methods of de-identification and anonymisation; (j) transparency and accountability measures under Chapter VII. (7)Section 40 shall come into force on such date as is notified by the Central Government for the purpose of that section.(8)The remaining provision of the Act shall come into force eighteen months from the notified date.”&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Rule 419A (16): The Central Government or the State Government shall constitute a Review Committee. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Rule 419 A(17): The Review Committee shall meet at least once in two months and record its findings whether the directions issued under sub-rule (1) are in accordance with the provisions of sub-section (2) of Section 5 of the said Act. When the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above it may set aside the directions and orders for destruction of the copies of the intercepted message or class of messages.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;span&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/span&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;span&gt;Rule 22 of Information Technology (Procedure and Safeguards for Interception, Monitoring and Decryption of Information) Rules, 2009: The Review Committee shall meet at least once in two months and record its findings whether the directions issued under rule 3 are in accordance with the provisions of sub-section (2) of section 69 of the Act and where the Review Committee is of the opinion that the directions are not in accordance with the provisions referred to above, it may set aside the directions and issue an order for destruction of the copies, including corresponding electronic record of the intercepted or monitored or decrypted information.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/cis-comments-recommendations-to-digital-data-protection-bill'&gt;https://cis-india.org/internet-governance/blog/cis-comments-recommendations-to-digital-data-protection-bill&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shweta Mohandas and Pallavi Bedi</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2023-01-20T02:35:30Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/telecom/blog/cis-comments-to-draft-indian-telecom-bill-2022">
    <title> CIS’ Comments to the (Draft) Indian Telecommunication Bill 2022</title>
    <link>https://cis-india.org/telecom/blog/cis-comments-to-draft-indian-telecom-bill-2022</link>
    <description>
        &lt;b&gt;The Department of Telecommunications, Government of India invited comments on the Draft Indian Telecommunication Bill, 2022. The Centre for Internet &amp; Society (CIS) submitted its comments. &lt;/b&gt;
        &lt;div&gt;&lt;span&gt;Reviewed by &lt;/span&gt;&lt;b&gt;&lt;span&gt;Pallavi Bedi&lt;/span&gt;&lt;/b&gt; 
&lt;hr /&gt;
&lt;h2&gt;Preliminary&lt;/h2&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;The Centre for Internet and Society (CIS) is a non-profit organization that undertakes interdisciplinary research on the internet and digital technologies from policy and academic perspectives. Through its diverse initiatives, CIS explores, intervenes in, and advances contemporary discourse and practices around the internet, technology, and society in India, and elsewhere. Over the last decade, CIS has worked extensively on policy issues related to telecommunication, internet access, digital inclusion, and so on.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;In the past, CIS has responded to various public consultations pertaining to telecommunication such as the Telecom Regulatory Authority of India (TRAI) consultation on 5G Auctions&lt;a href="#_ftn1" name="_ftnref1"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, TRAI consultation on regulation of over-the-top (OTT) services&lt;a href="#_ftn2" name="_ftnref2"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, to name a few .&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;We appreciate the efforts of the Department of Telecommunications (DoT) for having consultation on the “Draft Indian Telecommunication Bill 2022”. We are grateful for the opportunity to put forth our views and comments to the draft bill.&lt;/p&gt;
&lt;h2&gt;&lt;a name="_b3q6xpjyxit2"&gt;&lt;/a&gt;Summary of Recommendations&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;At the outset, we recommend that in the interest of transparency and accountability, prior to enacting important legislations like the Telecom Bill, the government would be well-advised to conduct an “impact assessment” exercise such as “regulatory impact assessment” and put the report in public as practised in jurisdictions such as the European Union.&lt;a href="#_ftn3" name="_ftnref3"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; We would also recommend the government to disclose responses and submissions that it receives during the process to ensure a transparent and consultative process of policymaking.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;We recommend that the scope of the bill should be reconsidered and internet-based services should be removed from the definition of telecommunication services. From this definition read with other clauses of the bill, it appears that the bill tries to licence (or control !) not just telecommunication but all kinds of communication and internet-based services. Putting onerous regulatory requirements on every bit and byte flowing through the internet is unnecessary and regulatory overreach.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The draft bill’s attempt to provide for a non-discriminatory and an affordable Right-of-way (RoW) regime is appreciable. However, the central government has been given an overriding power over the local government which has constitutional powers with regard to  permissions in their jurisdiction. The bill must clarify the modalities to ensure coordination between centre, state, and local authorities.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;We recommend that clause 46 of the draft bill which significantly dilutes TRAI’s power should be deleted. Moreover, the government must work towards further strengthening TRAI by hiring subject matter experts to ensure that India has a powerful sector regulator which is well prepared to usher in the next wave of innovation.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;We recommend that the Bill be inline with the Puttaswamy Judgement, and that of Anuradha Bhasin vs Union of India. The Bill, while paying close attention to the protection of users and duty of the user, fails to uphold rights of the user such as the right to privacy and the freedom of speech and expression.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;As per clause 29, the objectives for which Telecommunication Development Fund (TDF) can be utilised is broad and therefore the government would be well-advised to specify that TDF can only be utilised to ensure digital access, adoption and usage for digitally marginalised groups. Furthermore, TDF must be ring fenced and not credited to the Consolidated Fund of India to ensure timely implementation which has thus far remained a significant challenge with the universal funds (USOF) regime.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;The bill does not have any provisions upholding the principles of net neutrality. The government must act on TRAI’s recommendations and set up the multistakeholder body to check adherence to net neutrality requirements by incorporating provisions to that effect.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li style="text-align: justify; "&gt;In the interest of transparency and accountability, a clause requiring the government to report (quarterly or annually) vital statistics relating to the functioning and financial aspects of matters contained within the draft legislation. The reporting should also include the number of licences provided, licences revoked, number of blocking and suspension orders passed among others.&lt;/li&gt;
&lt;/ul&gt;
&lt;b&gt;&lt;span&gt; &lt;/span&gt;&lt;/b&gt;
&lt;h2&gt;&lt;a name="_ob9eaos6tpj2"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;h2&gt;&lt;a name="_bi7gk5lchjuq"&gt;&lt;/a&gt;Detailed Response&lt;/h2&gt;
&lt;table class="a"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h3&gt;Preamble&lt;a name="_wftvycmz1mv2"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;No comments&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class="a0"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h3&gt;Chapter 1: Short &lt;a name="_bpiqa0d8cjnm"&gt;&lt;/a&gt;Title, Extent and   Commencement&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;No comments&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class="a1"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h3&gt;Chapter 2: Definitions&lt;a name="_d5nm0amfnq2w"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;2(9)&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: “message” means any sign, signal, writing, image, sound, video, data stream or intelligence or information intended for telecommunication. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: The terms “intelligence” and “data stream” are not clear in the definition and these terms have not been defined elsewhere in the bill. Moreover, the definition of message is broad and may have implications with regard to surveillance and privacy of users, when read with clause 4(8) and clause 24(2)(a).&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Recommendation: &lt;/b&gt;&lt;span&gt;We recommend that the terms “intelligence” and “data stream” are defined under the bill, in order to reduce chances of excessive surveillance and to maintain the informational privacy of the individual. Additionally the definition could have an expansive list of what could constitute a message in order to prevent mission creep&lt;/span&gt;.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;2(18)&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: “telecommunication equipment” means any equipment, appliance, instrument, device, material or apparatus, including customer equipment, that can be or is being used for telecommunication, and includes software integral to such telecommunication equipment;”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment:&lt;/b&gt; The inclusion of customer equipment in the definition of telecommunication equipment has implications. The definition of the “customer equipment”&lt;a href="#_ftn4" name="_ftnref4"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; as provided in clause 2(5) of the Bill is broad enough to include personal devices such as phones, routers, among others. As per clauses 23 to 26 the Central Government has wide ranging powers with respect to telecommunications equipment and telecommunications networks such as issuing various directions for telecommunications networks and even has the power to take over such networks. As the definitions currently stand, these provisions would automatically become applicable to customer equipment as well which may be a violation of the right to privacy of the citizens of the country.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;Moreover, according to 3(2)(c), possession of wireless equipment requires authorization. On reading 3(2)(c) with the definitions of wireless equipment in 2(23) and customer equipment in 2(5), an argument could be framed that the customer equipment could technically also require a licence, and so would the software integral to such equipment. If customer equipment is in fact included in telecom equipment and software integral to it is also included therein, then arguably even Android OS or other OS can be licensable.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Recommendation:&lt;/b&gt; &lt;span&gt;Thus, we suggest that the government should remove customer equipment from the definition of telecommunication equipment.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;2(21)&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: “telecommunication services" means service of any description (including broadcasting services, electronic mail, voice mail, voice, video and data communication services, audiotex services, videotex services, fixed and mobile services, internet and broadband services, satellite based communication services, internet based communication services, in-flight and maritime connectivity services, interpersonal communications services, machine to machine communication services, over-the-top (OTT) communication services) which is made available to users by telecommunication, and includes any other service that the Central Government may notify to be telecommunication services;”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: Clause 2(21) expands the scope of “telecommunication services” significantly. The overly-broad definition of “telecommunication services”, and what constitutes a “message”&lt;a href="#_ftn5" name="_ftnref5"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, brings within its ambit a host of internet services including but not limited to email, instant messaging, social media services, and even payments and e-commerce transactions. Neither the bill, nor the accompanying explanatory note provides a satisfactory rationale for an all-encompassing definition of “telecommunication services”. The explanatory note attached to the bill suggests that legislations in Australia, EU, UK, Singapore, Japan, and USA have been examined while drafting this bill. However, our research&lt;a href="#_ftn6" name="_ftnref6"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; suggests that none of these jurisdictions define “telecommunication services” so expansively and seek to regulate entities offering only internet based services  companies through licensing, in particular. It may also be worthwhile to note that TRAI recommended against such an approach and also clarified that there is no issue of financial arbitrage.&lt;a href="#_ftn7" name="_ftnref7"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However,  the bill attempts to bring OTT communication services within the purview of licensing. From this definition read with other clauses of the bill, it appears that the bill tries to licence (or control !) not just telecommunication but all kinds of communication and internet-based services. Putting onerous regulatory requirements on every bit and byte flowing through the internet is unnecessary and regulatory overreach. There can be major implications of expanding the definition of telecommunication services, some of which are listed below:&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;●&lt;span&gt; &lt;/span&gt;The draft bill has stringent provisions on surveillance and shutdowns [clause 23 to clause 28]. These clauses would be naturally applicable to the expanded bucket of telecommunication services. This has serious implications on user’s right to privacy and freedom of expression online. For example, the bill gives the government the power to surveil citizens over apps such as WhatsApp, Telegram, to name a few, and even email. [some of this will be delved into greater detail in the foregoing sections]&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;●&lt;span&gt; &lt;/span&gt;Some of the internet-based services listed in the definition in 2(21) are already regulated under the Information Technology (IT) Act 2000. For example, the Information Technology (Intermediary Guidelines and Digital Media Ethics Code) Rules, 2021 regulates intermediaries, including the significant social media intermediaries (SSMI) such as Facebook and Twitter. Putting an additional regulatory burden on these service layer companies in the form of licensing,  as envisaged in clause 3 and clause 4 of the bill would hamper the innovation in the sector. Furthermore, it has been observed that the compliance burden of regulations is higher on small businesses in cases where regulations impose identical requirements on entities regardless of the firm size.&lt;a href="#_ftn8" name="_ftnref8"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Therefore, inserting such a requirement would have a detrimental impact on innovation because excessive compliance requirements would act as a significant entry barrier for smaller firms.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;Moreover, there is significant overlap between various services that are mentioned in the definition of telecommunication services which may lead to significant challenges. As these services are not defined elsewhere in the bill, it leaves scope for ambiguity. The bill makes a mention of “over-the-top (OTT) communication services” without defining it. We argue that making a distinction between communication and non-communication OTT services is superficial and does not take into account today’s realities where categorising applications into different categories is extremely difficult. A majority of the OTT applications such as e-commerce, healthcare, food delivery, payments, and so on, provide integrated communication channels. Disaggregation and making an artificial distinction of such apps into communication (with licensing requirements) and non-communication (without licensing requirements) would result in fragmentation of the internet which is definitely not a desirable outcome.&lt;/p&gt;
&lt;table class="a2"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;The “same-service same-rules” argument put forth by   Telecommunication Service Providers (TSPs/ telcos) for the regulation of OTT   apps which provide communication services [generally referred to as OTT   communication services] at par with them is flawed for the reasons elaborated   herein below:&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;●&lt;span&gt; &lt;/span&gt;It is well recognized that there are significant differences at the   technical and architectural level between TSPs and OTT apps which provide   communication services . Regulating OTT apps which provide communication   services at par with TSPs just on the basis of functionality without   considering the inherent technical and architectural differences between them   is a definite recipe for failure.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;●&lt;span&gt; &lt;/span&gt;Moreover, even at the functional level, OTT communication apps offer   several additional features which are not available in the traditional TSP   services.&lt;a href="#_ftn9" name="_ftnref9"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Due to this, establishing functional equivalence between TSP’s services and   OTT communication services is not only technically unfeasible but also   unnecessary since those apps are better regulated by  MEITY.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;●&lt;span&gt; &lt;/span&gt;Furthermore, TSPs enjoy privileges which OTTs don't. For example, TSPs   have exclusive rights to spectrum, right of Way (RoW), numbering resources,   to name a few. TSPs have control over underlying broadband infrastructure   which OTTs and other internet-based service companies do not have.&lt;/p&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;As opposed  to what has been suggested in the bill i.e, licence all telecommunication services [clause 3(2)(a)] including the internet-based services, it may be prudent to explore alternative approaches to regulate this space. For instance, a “two-layered framework”&lt;a href="#_ftn10" name="_ftnref10"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; for regulatory intervention can be considered. In this two-layered framework, the first layer would be the network layer consisting of the network and infrastructure; and the second layer would be the service layer consisting of applications and services. The services in the second layer can be further refined into the following three categories: (i) services provided over a non-Internet Protocol (IP) based architecture e.g Public Switched Telephone Network (PSTN) voice calls provided over a circuit switched network; (ii) specialised services that are provided over an IP based architecture in a closed network including facility-based services e.g., facilities-based VoLTE calls to PSTN and IPTV; (iii) IP-based/ Internet-based services such as OTTs. The gist&lt;a href="#_ftn11" name="_ftnref11"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; of the framework is:&lt;/p&gt;
&lt;ul&gt;
&lt;li&gt;The network layer &lt;i&gt;may&lt;/i&gt; be regulated by way of licensing.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Non-IP Services and Specialised services &lt;i&gt;may&lt;/i&gt; be regulated by way of licensing.&lt;/li&gt;
&lt;/ul&gt;
&lt;ul&gt;
&lt;li&gt;Internet-based services should be regulated by instruments other than licensing. Such instruments should preferably be in the form of legislations like the IT Act and its rules thereunder.&lt;/li&gt;
&lt;/ul&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;While there can be approaches apart from the one described above to regulate internet-based services such as the OTT and those approaches can be discussed and debated, putting licensing requirements for every internet-based service is not the way forward.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Recommendation&lt;/b&gt;: &lt;span&gt;We recommend that the scope of the bill should be reconsidered and internet-based services should be removed from the definition of telecommunication services. In the interest of transparency and accountability, prior to enacting  such a legislation the government would be well-advised to conduct a “regulatory impact assessment” exercise and put the report in public, as done in jurisdictions such as the European Union. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;table class="a3"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h3&gt;Chapter 3: Licensi&lt;a name="_ffu23qf3tbmq"&gt;&lt;/a&gt;ng, Registration,   Authorization and Assignment&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p&gt;&lt;a name="_9xd53hebzg69"&gt;&lt;/a&gt;&lt;b&gt;&lt;span&gt;Clause 4. Licensing, Registration Authorization and Assignment&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;4(6): &lt;/span&gt;&lt;/b&gt;&lt;span&gt; “The possession and use of any equipment that blocks telecommunication is prohibited, unless authorised by the Central Government for specific purposes.”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: While assuming jurisdiction over equipment capable of blocking telecommunication via this clause is a welcome step, it is not clear why equipment capable of intercepting telecommunications has been kept out of the scope of this clause. Since unlawful and unauthorised interception of telecommunications is a violation of the fundamental right to privacy of an individual,&lt;a href="#_ftn12" name="_ftnref12"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; it is imperative that the scope of this clause be increased to include interception equipment as well. Furthermore, the latter part of the provision mentions “specific purposes” without adequate checks and balances in place. As such, the specific purposes must be defined exhaustively to ensure that this power is not misused.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;4(7):&lt;/span&gt;&lt;/b&gt;&lt;span&gt; "Any entity which is granted a licence under sub-clause (2) of clause 3, shall unequivocally identify the person to whom it provides services, through a verifiable mode of identification as may be prescribed."&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;:  All services do not require a verification of the identity of a person. There is a legitimate need to verify a person in the case of financial transactions, however a similar level of scrutiny is not warranted for applications that a person might use once, or applications that do not pose a threat to anyone. For example the need to verify a person through Know Your Customer (KYC) or otherwise for an application to order food, or an application which is meant for communication can be excessive regulation. Furthermore, number based internet communication apps such as Whatsapp require users to sign in through a mobile number, which have already gone through a KYC process. Therefore, dual KYC would be redundant and serve no purpose.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;The Supreme Court while looking at the constitutionality of the Aadhaar Act upheld the need for banking and financial institutions to require an individual’s Aadhaar number stating the legitimate aim of preventing money laundering; however, the Court struck down the provision that required any private entity to collect Aadhaar details.&lt;a href="#_ftn13" name="_ftnref13"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[13]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Justice Bhushan held that the collection by private entities violated the right to privacy, by failing the first prong of the test laid down in Puttaswamy, the test of legality.&lt;a href="#_ftn14" name="_ftnref14"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[14]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;Recommendation&lt;i&gt; &lt;/i&gt;:&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;span&gt;Clause 4(7) should be deleted.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;4(8)&lt;/span&gt;&lt;/b&gt;&lt;span&gt; “The identity of a person sending a message using telecommunication services shall be available to the user receiving such message, in such form as may be prescribed, unless specified otherwise by the Central Government.”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: Although the intent behind this provision may have been to curb the menace of anonymous harassment of users, a blanket requirement to reveal the identity of the sender of a message in every instance may be considered a violation of the right to privacy of the sender. . There are clearly a number of competing rights involved here and the issue needs to be addressed in a more nuanced manner. Additionally there are a number of services such as chat applications providing support for mental health, that allow users to be anonymous in order to remove the concern and stigma around seeking help. A requirement that the user's name be revealed in these applications could hinder the functioning of these services as well as prevent more people from seeking help.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;Anonymity was also explained in the Puttaswamy Judgment where it was stated that - “Privacy involves hiding information whereas anonymity involves hiding what makes it personal. An unauthorised parting of the medical records of an individual which have been furnished to a hospital will amount to an invasion of privacy.” In his judgement, Justice F. Nariman talks about different aspects of the right to privacy in the Indian context and observes “Informational privacy which does not deal with a person’s body but deals with a person’s mind, and therefore recognises that an individual may have control over the dissemination of material that is personal to him. Unauthorised use of such information may, therefore lead to infringement of this right”.&lt;a href="#_ftn15" name="_ftnref15"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[15]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;In this backdrop it is perhaps preferable that the issue be addressed through separate guidelines rather than through a blanket direction in the Statute. Recently the Department of Telecom sent a reference to the TRAI for framing a mechanism for using KYC based identification.&lt;a href="#_ftn16" name="_ftnref16"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[16]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; It would be advisable if the TRAI in its response also takes into account the competing rights involved in this issue of caller identification and suggests a framework that addresses these concerns as well.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;Retaining anonymity on the internet&lt;/span&gt;: Individuals may choose to remain anonymous online for a number of reasons. This includes employees expressing opinions about their employers and whistleblowers, people providing anonymous tips to newspapers or law enforcement, people expressing political opinions and criticism that may be subject to persecution, or simply someone saying something that they may be embarrassed about.&lt;a href="#_ftn17" name="_ftnref17"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[17]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In India, in particular, an individual’s caste can be derived from their name, and they may choose to remain anonymous or adopt a pseudonym to escape centuries of stigma and discrimination that their communities have faced. Religious, gender and sexual minorities may also make this choice for similar reasons. The broad definition of telecommunication services in the bill places restrictions on anonymity online and severely degrades an individual’s ability to exercise their fundamental right to freedom of expression.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;Right to privacy&lt;/span&gt;: The overly broad definition of “telecommunication services” and what constitutes a “message” also brings a number of digital services under the ambit of this bill. This can include email, instant messaging, social media services, and even payments and e-commerce transactions. Mandating identification of individuals as they navigate these services, which they require to go about their daily lives, creates an unprecedented potential for surveillance and abuse of personal information. To evaluate the legal validity of this infringement on privacy, we can utilise the necessity and proportionality tests put forth by the Puttaswamy Judgment. The explanatory note accompanying the bill states that the purpose of this provision is to “prevent cyber frauds”, establishing a legitimate aim for mandating identification. However, it fails to justify whether this is the least intrusive means necessary to achieve the stated aim. Law enforcement agencies have access to a wide variety of metadata, such as IP addresses, already collected by digital services today, which can be used to identify individuals committing cyber crimes. Furthermore, as the internet is a global network, bad actors can evade identification by routing their internet traffic through another country by using services such as Virtual Private Network (VPNs), proxies and onion routing. Well resourced actors can simply hire someone in another country to communicate on their behalf. The infringement upon the right to privacy by this provision is also disproportionate to the objective sought. By mandating storage of personally identifiable information that is not required for the operation of the wide range of services that fall under the ambit of this bill, it allows not only for state surveillance, but also creates the possibility of misuse by criminal actors and hostile states who may gain unlawful access to this information through data breaches. Overall, this provision can easily be circumvented by the bad actors it intends to catch, leaving us with a surveillance mechanism that is ripe for misuse against ordinary, law-abiding citizens.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;Misunderstanding how the internet works&lt;/span&gt;: This draft bill assumes and propagates a centralised view of the internet. Unlike traditional telecommunication services, which require access to a finite spectrum or other physical infrastructure, the internet allows any individual or organisation to self-host their own communication service. Several organisations and technologically savvy individuals host their own email services, instant messaging services, blogs and social media networks. It is unclear how the licensing provisions in this bill apply to people developing and hosting their own communication equipment.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;Recommendation&lt;i&gt; &lt;/i&gt;:&lt;i&gt; &lt;/i&gt;&lt;/b&gt;&lt;span&gt;Clause 4(8) should be deleted.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;a name="_h6yjqqt5bgdv"&gt;&lt;/a&gt;&lt;span&gt;Clause 5. Spectrum Management&lt;/span&gt;&lt;/h3&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;5(2)(b)&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: “administrative process for governmental functions or purposes in view of public interest or necessity as provided in Schedule 1; or”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment: &lt;/b&gt;Even though the draft bill seeks to provide an explicit statutory framework and predictability for spectrum management policy in India, it appears that for the large part it would be relying on spectrum auctions for assignment of spectrum. While the bill provides for administrative allocation of spectrum for governmental functions or purposes in view of public interest or necessity as provided in Schedule 1, the explanatory note provided for the draft bill indicates auction to be the predominant method for spectrum assignment. Even though the explanatory memorandum cannot be used for legal interpretation, it can be used to indicate that for the foreseeable future the government intends to allocate spectrum predominantly through auctions. While it can be argued that an auction based regime ensures transparency, it also creates significant barriers to entry for smaller operators. It is also pertinent to mention that in the seven auctions held since 2010, the government has successfully sold 100 percent of the auction only once. Relying solely on auctions since 2010 has led to unsold spectrum, lost revenue, and deferring of the rural digital ecosystem.&lt;a href="#_ftn18" name="_ftnref18"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[18]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Therefore, auctions should be supplemented with “administrative allocation” and other innovative approaches to ensure that affordable broadband connectivity does not remain within the remit of a few. For instance, Canada has initiated a consultation on a non-competitive local licensing framework in the 3900-3980 MHz Band and Portions of the 26, 28 and 38 GHz Bands, and one of its objectives is to facilitate broadband connectivity in rural areas.&lt;a href="#_ftn19" name="_ftnref19"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[19]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; &lt;span&gt;Therefore, we would like to recommend the DoT to explore other forms of spectrum assignment and not rely solely on auctions to ensure efficient utilisation of available spectrum and to also ensure affordable access to hitherto underserved regions. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;Moreover, the bill does not provide clarity with regard to unlicensed spectrum for public Wi-Fi, and assignment of shared spectrum for satcom services.&lt;a href="#_ftn20" name="_ftnref20"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[20]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Spectrum allocation for satcom becomes all the more important as the draft bill seems to give a preference to auction for spectrum assignment, while the global practice on spectrum assignment for satcom has been administrative allocation.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;Furthermore, clause 5(2)(b) read with Schedule 1 suggests that BSNL and MTNL can acquire spectrum through an administrative process in view of public interest  or necessity. However, we would like to submit that spectrum assignment to BSNL and MTNL may no longer serve the public interest and it only protects a very small interest group. For context, BSNL and MTNL have a combined market share of only 9.83%, as per TRAI subscription data of Aug 31, 2022.&lt;a href="#_ftn21" name="_ftnref21"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[21]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; For such a small subscriber share, it cannot be argued that these PSUs serve a public interest. The government can easily migrate these subscribers to the other three telcos. Moreover, this also provides the PSUs with an unfair advantage over its competitors and distorts the level playing field, thereby creating competition concerns in the market.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;5(8)&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: “The Central Government may, to promote optimal use of the available spectrum assign a particular part of a spectrum that has already been assigned to an entity (“primary assignee”), to one or more additional entity/ entities (“secondary assignees”), where such secondary assignment does not cause harmful interference in the use of the relevant part of the spectrum by the primary assignee, subject to the terms and conditions as may be prescribed.” &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment: “&lt;/b&gt;Secondary assignment” of spectrum and the shift from “right to exclusive use” to “right to protection from interference”, as envisaged in 5(8) is a progressive move towards efficient utilisation of spectrum.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;CIS, in its past submission&lt;a href="#_ftn22" name="_ftnref22"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[22]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; to the TRAI had highlighted the merits of a “use-or-share” approach in spectrum. The chasm that exists between expensive exclusive spectrum licensing and the licence-exempt ecosystem can be bridged by enshrining “use-it-or-share-it” provisions in spectrum licences. As such, ‘use-it-or-share-it’ rules enable the regulator to grant secondary access to licensed or governmental spectrum that is unused or underutilised.&lt;a href="#_ftn23" name="_ftnref23"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[23]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; ‘Use-it-or-share-it’ rules expand the productive use of spectrum without risking harmful interference or undermining the deployment plans of primary licensees. Clauses such as 5(8) enable “use-or-share” provisions are a step in the right direction.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;5(9)&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: “The Central Government, after providing a reasonable opportunity of being heard to the assignee concerned, if it determines that spectrum that has been assigned, has remained unutilized for insufficient reasons for a prescribed period, may terminate such assignment, or a part of such assignment, or prescribe further terms and conditions relating to spectrum utilization.”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;Comment&lt;/b&gt;: There is lack of coherence between 5(8) and 5(9) when read together. 5(8) and 5(9) should be put as sub-clauses under a parent clause to ensure clarity.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;We believe that the provision must be articulated clearly to state that licensees would first be given an opportunity to share spectrum and in cases where the entity fails to do so within a reasonable amount of  time, the spectrum licence would be cancelled to prevent wilful spectrum hoarding. The Independent Communications Authority of South Africa (ICASA) in the &lt;i&gt;2nd Information Memorandum &lt;/i&gt;has expressed similar provisions with clarity. While, we feel five years may be an unnecessarily long timeframe for the government to enact spectrum sharing provisions, the language put forth by ICASA captures the essence of our argument:&lt;/p&gt;
&lt;p class="MsoNormal"&gt;“11.6.2 In cases where the spectrum is not fully utilised by the licensee within 5 years of issuance of the Radio Frequency Spectrum Licences, the Authority will initiate the process for the Licensee:&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;11.6.2.1 to share unused spectrum in all areas to ECNS licensees who may, inter alia, combine licensed spectrum in any innovative combinations in order to address local and rural connectivity in some municipalities including by entrepreneurial SMMEs;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;11.6.2.2 to surrender the radio frequency spectrum licence or portion of the unused assigned spectrum in accordance with Radio Frequency Spectrum Regulations, 2015”&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Recommendation&lt;/b&gt;:&lt;span&gt; Clause 5(8) and 5(9) must be brought under one clause and it must be clarified that licence holders would lose their licence in case they fail to successfully incorporate spectrum sharing.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;a name="_rnugk2cdpjik"&gt;&lt;/a&gt;&lt;span&gt;Clause 7. Breach of Terms and Conditions&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;a name="_brr2sld72hgs"&gt;&lt;/a&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;7(1)&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: “In case of breach of any of the terms and conditions of licence, registration, authorization or assignment granted under this Act, the Central Government may, after providing an opportunity of being heard to the party concerned, do any one or more of the following: ……”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: Usually the consequences of breach are specifically illustrated in the licence. Listing the consequences of breach in the statute itself may lead to lack of clarity unless the terms of licence are also referenced. It could also be argued by a defaulting licensee that the powers listed in clause 7(1) are exhaustive and the Central Government cannot add any other conditions for breach of the conditions of the licence as in the licence agreement and any such conditions not specified in clause 7(1) are void and ultra vires the Statute.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;Recommendation&lt;/b&gt;: &lt;span&gt;In order to avoid such a situation, the clause should clearly state whether the powers listed in clause 7(1) are in addition to the terms and conditions that may be specified in the licence. &lt;/span&gt;&lt;/p&gt;
&lt;table class="a4"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h2&gt;Chapter 4: Right of Way for Telecommunication Infrastructure&lt;a name="_1770c14pfm88"&gt;&lt;/a&gt;&lt;/h2&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: The draft bill attempts to provide for a non-discriminatory and an affordable Right-of-way regime, which is appreciable. However, the provision suggests that the central government has an overriding power over the local government. Provided that the Constitution of India defines certain powers which reside with the local authority in terms of providing permissions in the local areas, it is unclear from the bill on how the coordination between various authorities will take place. &lt;span&gt;We recommend that there needs to be a mechanism that ensures coordination between centre, state, and local authorities.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;❖&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;14(3)&lt;/span&gt;&lt;/b&gt;&lt;span&gt; : “In the event the person under sub-clause (1) does not provide the right of way requested, and the Central Government determines that it is necessary to do so in the public interest, it may, either by itself or through any other authority designated by the Central Government for this purpose, proceed to acquire the right of way for enabling the facility provider to establish, operate, maintain such telecommunication infrastructure, in the manner as may be prescribed.”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: The right of the Central Government to acquire the right of way should be in lieu of adequate and appropriate compensation to be paid to the property owner. This requirement should be clearly mentioned in sub-clause (3). The clause as it currently stands only mentions the Central Government’s right to acquire but contains no mention of said acquisition being in lieu of adequate and proportionate compensation.&lt;/p&gt;
&lt;table class="a5"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h2&gt;Chapter 5. Rest&lt;a name="_x52xctf02mif"&gt;&lt;/a&gt;ructuring, Defaults in Payment   and Insolvency&lt;/h2&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;19(1)&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: “Any licensee or registered entity may undertake any merger, demerger or acquisition, or other forms of restructuring, subject to provisions of applicable law, after providing notice to the Central Government of the same.”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: Sub-clause (1) only requires that the Central Government be given a notice in case of merger, demerger, acquisition or restructuring of the licensee. Although sub-clause (2) requires that the successor entity shall comply with all the terms and conditions of the licence, considering the strategic nature of the telecommunications sector&lt;a href="#_ftn24" name="_ftnref24"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[24]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; it would be advisable to change the requirement of notice to a requirement of permission from the Central Government for restructuring the business rather than a mere notice requirement. In order for this requirement to not be a hindrance to the growth of the industry there could be a provision for deemed approval if the approval is not granted within a particular period of time.&lt;a href="#_ftn25" name="_ftnref25"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[25]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;Recommendation: &lt;/b&gt;&lt;span&gt;Any merger in the sector must be approved by the DoT. In order to ensure that this does not lead to unnecessary delays, a deemed approval route may be considered.&lt;/span&gt;&lt;/p&gt;
&lt;table class="a6"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h3&gt;Chapter 6: Standards, Public Safety and National Security&lt;a name="_dzmhkxq4hr9n"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;❖&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;24(2)&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: “On the occurrence of any public emergency or in the interest of the public safety, the Central Government or a State Government or any officer specially authorised in this behalf by the Central or a State Government, may, if satisfied that it is necessary or expedient to do so, in the interest of the sovereignty, integrity or security of India, friendly relations with foreign states, public order, or preventing incitement to an offence, for reasons to be recorded in writing, by order:&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;(a) direct that any message or class of messages, to or from any person or class of persons, or relating to any particular subject, brought for transmission by, or transmitted or received by any telecommunication services or telecommunication network, shall not be transmitted, or shall be intercepted or detained or disclosed to the officer mentioned in such order; or &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;(b) direct that communications or class of communications to or from any person or class of persons, or relating to any particular subject, transmitted or received by any telecommunication network shall be suspended”.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: The pre-conditions for interception contained in the Bill are similar to those contained in the Telegraph Act, 1885, i.e. “occurrence of any public emergency or in the interest of the public safety, the Central Government or a State Government or any officer specially authorised in this behalf by the Central or a State Government, may, if satisfied that it is necessary or expedient to do so, in the interest of the sovereignty, integrity or security of India, friendly relations with foreign states, public order, or preventing incitement to an offence”. Although more stringent, these conditions are different from those contained in the Information Technology Act, 2000 which does not contain the added safeguard of there being a “public emergency or in the interest of public safety”.&lt;a href="#_ftn26" name="_ftnref26"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[26]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; With consumers spending more and more time on the internet and using internet based technologies and applications for communications, there is significant regulatory overlap between the Telecommunications Bill and the Information Technology Act, 2000. It is therefore advisable that the interception and blocking provisions under both the legislations should be aligned and standardised.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;The judgement in the Puttaswamy case provides some guidance to assess the limits and scope of the constitutional right to privacy in the form of the three prong test. The test requires the existence of a law, a legitimate state interest and the restriction (to privacy) should be ‘proportionate'. The order to intercept, detain, disclose or suspend a communication made between private individuals, acts as a violation of privacy and to ensure that this does not provide extensive grounds to surveil people, the three prong test especially the grounds of proportionality combined with the necessity provision are essential to ensure that this provision is not used disproportionately.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;More recently in &lt;i&gt;Anuradha Bhasin vs Union Of India&lt;/i&gt; the Supreme Court stated “A public emergency usually would involve different stages and the authorities are required to have regards to the stage, before the power can be utilised under the aforesaid rules. The appropriate balancing of the factors differs, when considering the stages of emergency and accordingly, the authorities are required to triangulate the necessity of imposition of such restriction after satisfying the proportionality requirement.” The court while passing the judgement also stated “The concept of proportionality requires a restriction to be tailored in accordance with the territorial extent of the restriction, the stage of emergency, nature of urgency, duration of such restrictive measure and nature of such restriction. The triangulation of a restriction requires the consideration of appropriateness, necessity and the least restrictive measure before being imposed.”&lt;a href="#_ftn27" name="_ftnref27"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[27]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; The judgement while examining the duration of the suspension mentioned that any order which suspends the internet must adhere to the principle of proportionality and must not extend beyond necessary duration.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Recommendation&lt;/b&gt;: &lt;span&gt;There is a need to look at the implications of such an order enabling blocking or suspension of services post the Puttaswamy judgement where informational privacy, and dignity were considered as some of the aspects of privacy.  While this clause uses the test of necessity and expediency, we suggest that along with these two the clause also introduce the three prong test laid out in Puttaswamy I. In addition to this since this legislation has been drafted subsequent to the Anuradha Bhasin judgement the provisions of the legislation must be in conformity with the same in order to avoid confusion and reduce litigation. &lt;/span&gt;&lt;/p&gt;
&lt;table class="a7"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h3&gt;Chapter 7: Telecommunication Development Fund&lt;a name="_3naj84qcw1se"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;Clause 29:&lt;/span&gt;&lt;/b&gt;&lt;span&gt; “The sums of money received towards the Telecommunication Development Fund under clause 27, shall first be credited to the Consolidated Fund of India, which shall be appropriated by the Central Government, in accordance with law made by the Parliament, to the Telecommunication Development Fund from time to time for being utilised to meet any or all of the following objectives:&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;(a) support universal service through promoting access to and delivery of telecommunication services in underserved rural, remote and urban areas;&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;(b) research and development of new telecommunication services, technologies, and products;&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;(c) support skill development and training in telecommunication;&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;(d) support pilot projects, consultancy assistance and advisory support towards provision of universal service under sub-clause (a) of this clause; and&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;(e) support introduction of new telecommunication services, technologies, and products.”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: Clause 27 of the draft bill proposes to rename the Universal Service Obligation Fund (USOF) to Telecommunication Development Fund (TDF) and expand its scope to include underserved urban areas in addition to rural and remote areas. This has been done, ostensibly to expand the scope of current USOF to include within its ambit underserved urban areas, research and development, and skill development, among others.&lt;a href="#_ftn28" name="_ftnref28"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[28]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; While there is a need to spend the vast amount of unspent balance within the USOF, and spending it on skill development, investments in innovative low cost-technology that enables affordable broadband connectivity for all is important, the manner in which the TDF is currently defined is loose and vague. In order to ensure that the fund is spent to include digitally marginalised groups only, the purpose for which the TDF can be used needs to have an “exact” and “specific definition”. The purpose should be narrowly defined to include only those activities that have the potential to mitigate and bridge the many digital divides that exist  in our country because in its absence TDF may be misused to subsidise urban middle class users as opposed to originally intended beneficiaries - the hitherto marginalised sections of the society.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;Furthermore, the Bill suggests that the money received towards the TDF shall first be credited to the  Consolidated Fund of India, which shall be appropriated by the Central Government, in accordance with law made by the Parliament. This is a relic of the erstwhile USOF policy funds, and allocations are made on a demand and review basis. One of the reasons that India has an unspent balance of nearly INR 50,000 crore in USOF is owing to a delay in its implementation due to bureaucratic delays since all credits to this fund require parliamentary approvals.&lt;a href="#_ftn29" name="_ftnref29"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[29]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In order to ensure that funds received through USOF/TDF are utilised efficiently, the government must ring fence these funds and ensure that they are only spent on the objectives envisaged under the TDF. Furthermore, funds collected for this purpose must not be credited to the Consolidated Fund of India since requiring additional approvals delays implementation of the fund. For instance, the rural road fund is ring fenced which has ensured smoother flow of funds.&lt;a href="#_ftn30" name="_ftnref30"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[30]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Moreover, auction proceeds, and other levies on the sector such as service tax and GST are already credited to the Consolidated Fund of India, therefore the government can afford to ring fence funds collected for universal service as opposed to crediting them to the Consolidated Fund of India.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Recommendation:&lt;/b&gt; &lt;span&gt;The objectives for which the TDF can be utilised is vague and too broad and therefore the government would be well-advised to specify that TDF can only be utilised to ensure digital access, adoption and usage for digitally marginalised groups. This would go a long way in ensuring that the funds are not misspent on providing subsidies to users that may not be in need for such a subsidy. Furthermore, TDF must be ring fenced and not credited to the Consolidated Fund of India to ensure timely implementation.&lt;/span&gt;&lt;/p&gt;
&lt;table class="a8"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h3&gt;Chapter 9: Protection of users&lt;a name="_z0cogooipp2d"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;Clause 34&lt;/span&gt;&lt;/b&gt;&lt;span&gt; : “In the interest of the sovereignty, integrity or security of India, friendly relations with foreign states, public order, or preventing incitement to an offence, no user shall furnish any false particulars, suppress any material information or impersonate another person while establishing identity for availing telecommunication services.”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: The intent behind this provision appears to be to prevent misrepresentation or identity and the giving of false information for availing telecom services. Whilst it is understandable that there may be privacy issues involved in the matter of revealing one’s identity for availing telecommunications services, the requirement to provide correct identity documents is a well established and accepted norm in the industry today which is manifest in the KYC requirements that have to be fulfilled by every customer. Therefore there is no need to qualify the obligation to provide true and accurate documents with the phrase “in the interest of the sovereignty, integrity or security of India, friendly relations with foreign states, public order, or preventing incitement to an offence”.&lt;/p&gt;
&lt;table class="a9"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h3&gt;Chapter 10: Miscellaneous&lt;a name="_bthxwgtsxcmv"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;Clause 46: Amendment to Act 24 of 1997&lt;/span&gt;&lt;/b&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: Clause 46 of the Bill significantly dilutes the power of TRAI and effectively renders the Regulator to the role of the government’s rubber stamp through proposed amendments to clause 11&lt;a href="#_ftn31" name="_ftnref31"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[31]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; of the TRAI Act. Section 11 of the TRAI Act as it currently stands requires DoT to solicit recommendations from TRAI on issues pertaining to licensing, new services, and spectrum management, where the powers vest with the government. However, if the Bill becomes a law, this would not be mandatory on the government’s part. It may or may not seek the Regulator’s recommendations, thus eroding the transparency which was built in the process of policymaking. Consequently, as per the current Bill, the government will effectively be the licensor, operator, and the Regulator. Since the government owns BSNL/MTNL (a telecom operator) the role of an independent regulator assumes even more significance. Even without the proposed amendments, the Indian regulator has been largely ineffective since it lacks significant functional autonomy including negligible penalisation powers, limited role in its hiring decisions, and lack of financial autonomy since it needs DoT’s approvals for its budget.&lt;a href="#_ftn32" name="_ftnref32"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[32]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Even in its present form, TRAI has lesser power as compared to many regulators across the globe. For instance Federal Communications Commission (FCC) of the USA, Ofcom of the UK, and regulators in Pakistan, Bangladesh, and Sri Lanka have powers over spectrum and licensing, while TRAI has only recommendatory powers.&lt;a href="#_ftn33" name="_ftnref33"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[33]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; With the advent of 5G, the lines between telecom and digital services are likely to blur even more and in order to ensure that we are able to exploit the vast potential this new wave of innovations could unleash, it is important to have skilled policymakers well-versed with technology at the helm of affairs. Amidst this backdrop, it is important to invest in enhancing TRAI’s competence by hiring subject matter experts, and ensuring that TRAI functions as an independent and transparent regulator.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;Furthermore, the bill empowers the government to set up an alternate dispute resolution mechanism effectively making the role of Telecom Disputes Settlement and Appellate Tribunal (TDSAT) redundant. Currently, TDSAT is the first body which looks into any dispute between two (i) telecom operators, (ii) telecom operators and the government, and (iii) between operators, the government and as well as the regulator. Only once the TDSAT has passed orders on such disputes can they be appealed in the Supreme Court. Therefore, clauses diluting the power of TRAI must be deleted. The government must also clarify what it means by an alternate dispute resolution mechanism, and the role it envisages for TDSAT.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;Lastly, TRAI process is consultative by design providing various stakeholders with an opportunity to participate in the policymaking process. However, the proposed bill does not have any provisions mandating the DoT to hold transparent stakeholder consultations.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Recommendation&lt;/b&gt;: &lt;span&gt;Clause 46 of the proposed bill should be deleted. Furthermore, the government must work towards further strengthening TRAI by hiring subject matter experts and further empowering TRAI by giving it penalising powers. Also, TRAI must be responsible for conducting spectrum audits and ensuring that licensees are adhering to licensing conditions. &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;46(k)&lt;/span&gt;&lt;/b&gt;&lt;span&gt;: “Provided further that the Authority may direct a licensee or class of licensees to abstain from predatory pricing that is harmful to the overall health of the telecommunication sector, competition, long term development and fair market mechanism” shall be inserted.”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: The Bill through clause 46 (k) empowers the TRAI to decide on ‘predatory pricing’, which falls within the remit of the Competition Commission of India (CCI) which could potentially create jurisdictional overlaps between the two regulators.  Even in the past, there has been friction between the two regulators on whether TRAI has jurisdiction to decide on matters relating to competition and predatory pricing in telecom tariffs.&lt;a href="#_ftn34" name="_ftnref34"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[34]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; In &lt;i&gt;Competition Commission of India v. Bharti Airtel Limited &amp;amp; Ors&lt;/i&gt;&lt;a href="#_ftn35" name="_ftnref35"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[35]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;, Supreme Court of India rejected the contention by the incumbent dominant operators (IDOs) that TRAI, as the sectoral regulator, had exclusive jurisdiction to rule on competition-related aspects in the industry. It ruled that if TRAI had determined that the IDOs had formed a cartel or colluded to block Jio’s entry, the CCI then would have jurisdiction to decide whether the IDOs’ actions had an appreciable adverse effect on competition. While TRAI’s powers of sanction were limited by the TRAI Act, the CCI had the power to prescribe and enforce structural remedies to promote genuine competition in the telecom sector. The court prescribed comity between TRAI and the CCI in the discharge of their roles.&lt;a href="#_ftn36" name="_ftnref36"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[36]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; Over time, the telecom sector has evolved from being a rudimentary voice service to being a complex data-centric converged service, and even though overlapping jurisdictions cannot be completely wished away,&lt;a href="#_ftn37" name="_ftnref37"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[37]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; there is a need for clearly defined roles for various ministries and regulators. And there will also be a need to adopt a consultative approach towards policymaking through inter-departmental consultations, an area that India has thus far been lacking in. As evidenced by the International Telecommunication Union’s (ITU) Global ICT Regulatory Outlook 2020, which ranks India at 94 (out of a total of 193) countries in terms of the maturity and collaborative approach shown by telecom regulatory bodies, lower than countries such as Japan, Singapore, Korea, Pakistan, Kenya, and Nigeria.&lt;a href="#_ftn38" name="_ftnref38"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[38]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;Therefore, inserting such a provision may create more chaos and regulatory uncertainty. &lt;span&gt;It is advisable that the government ensures there are no jurisdictional issues between the two  regulators by clearly defining the role of TRAI and inserting provisions to facilitate inter regulatory consultation mechanism.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;span&gt;➔&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;b&gt;&lt;span&gt;Clause 48&lt;/span&gt;&lt;/b&gt;&lt;span&gt;:  “If the person committing an offence under this Act is a company, the employee(s) who at the time the offence was committed, was responsible to the company for the conduct of the business relating to the offence, shall be liable to be proceeded against and punished accordingly.&lt;/span&gt;&lt;span&gt;”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: While there is a need to ensure that offenders and violators of provisions under this Act are provided with penalties, there is a need to look at ways to ensure that the fear of penalties does not stifle innovation. This legislation intends to bring into its ambit a number of new stakeholders who might not be able to comply with all the requirements due to the inexperience, which could lead to inadvertent offences and violations. The current wording of clause 48, does not make any distinction between offences that were done with prior knowledge and malafide intentions and those done without knowledge of its commission.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Recommendation&lt;/b&gt;: &lt;span&gt;We suggest that the Act keeps the wordings in line with similar legislations such as the draft Personal Data Protection Bill 2019. The revised text could have a proviso that reads as “Nothing contained in sub-clause (1) shall render any such person liable to any punishment provided in this Act, if he proves that the offence was committed without his knowledge or that he had exercised all due diligence to prevent the commission of such offence.”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;Keeping in mind the existing burden of work both on the executive and the judiciary, and the time sensitive nature of the provisions of the Bill there is a need to look at different, swift, and inexpensive strategies. One possible way could be through Informal Guidances, similar to Security and Exchange Board of India (SEBI)’s Informal Guidance Scheme, which enables regulated entities to approach the Authority for non-binding advice on the position of law.&lt;a href="#_ftn39" name="_ftnref39"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[39]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; As there will be a number of new players that will be under the Bill, it would be useful for entities to get guidance. Another possible step could be to use Undertakings, where the regulator enforces the errant party to seek contractual undertakings to take certain remedial steps.&lt;a href="#_ftn40" name="_ftnref40"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[40]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;➔&lt;span&gt; &lt;/span&gt;&lt;b&gt;&lt;span&gt;Clause 51&lt;/span&gt;&lt;/b&gt;&lt;span&gt;:  “Notwithstanding anything contained in any law for the time being in force, where the Central Government, a State Government or a Government of a Union Territory is satisfied that any information, document or record in possession or control of any licensee, registered entity or assignee relating to any telecommunication services, telecommunication network, telecommunication infrastructure or use of spectrum, availed of by any entity or consumer or subscriber is necessary to be furnished in relation to any pending or apprehended civil or criminal proceedings, an officer, specially authorised in writing by such Government in this behalf, shall direct such licensee, registered entity or assignee to furnish such information, document or record to him and the licensee, registered entity or assignee shall comply with the direction of such officer.”&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Comment&lt;/b&gt;: The requirement to provide information or document even for “pending or apprehended civil or criminal proceedings” is too wide and could be misutilised, specially given the fact that there is no judicial authority making the determination that the information or document is required for such proceedings. Even in clause 91 of the Cr.P.C. , the requirement to provide documents or information is only for existing investigations, inquiries, trials or proceedings. &lt;span&gt;Therefore the requirement to provide information, document or record for apprehended civil proceedings should be deleted.&lt;/span&gt;&lt;/p&gt;
&lt;table class="aa"&gt;
&lt;tbody&gt;
&lt;tr&gt;
&lt;td&gt;
&lt;h3&gt;Additional Comments&lt;a name="_drm48hrug1gb"&gt;&lt;/a&gt;&lt;/h3&gt;
&lt;/td&gt;
&lt;/tr&gt;
&lt;/tbody&gt;
&lt;/table&gt;
&lt;p class="MsoNormal" style="text-align:justify; "&gt;➔&lt;span&gt; &lt;/span&gt;&lt;b&gt;Comment: &lt;/b&gt;The bill fails to incorporate net neutrality requirements&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align:justify; "&gt;Technological convergence and vertical integration within the sector make adherence to net neutrality critical to keep discrimination and anti-competitive conduct in check. While extant TRAI regulations, forbid TSPs from discriminating on the basis of content, sender or receiver, protocols or user equipment based on prior arrangements, by slowing down one application or providing fast lanes to another. However, there is lack of clarity on how adherence to net-neutrality principles is currently being monitored. In 2020, TRAI had recommended setting up a Multistakeholder body for monitoring adherence to net neutrality by licensees.&lt;a href="#_ftn41" name="_ftnref41"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[41]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt; However, the draft bill fails to codify net neutrality requirements and as such non-discriminatory treatment of traffic does not find a mention in the bill or the explanatory note accompanying it.&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;b&gt;Recommendation&lt;/b&gt;:&lt;span&gt; The government must act on TRAI’s recommendations and set up the multistakeholder body to check adherence to net neutrality requirements by incorporating provisions to that effect.&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;➔&lt;span&gt; &lt;/span&gt;&lt;b&gt;Comment: &lt;/b&gt;There is no provision in the bill that requires the government to report vital statistics and other information relating to the sector. We understand that both TRAI and DoT have taken efforts in publishing those statistics through DoT dashboard and reports such as the annual report, performance indicator reports, and subscriber reports. But, putting reporting requirements in the statute would be better.&lt;/p&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;b&gt;Recommendation: &lt;/b&gt;&lt;span&gt;In the interest of transparency and accountability, a clause requiring the government to report (quarterly or annually) vital statistics relating to the functioning and financial aspects of matters contained within the draft legislation. The reporting should also include the number of licences provided, licences revoked, number of blocking and suspension orders passed among others.&lt;br /&gt; &lt;/span&gt;&lt;/p&gt;
&lt;hr /&gt;
&lt;div id="ftn1"&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;a href="#_ftnref1" name="_ftn1"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[1]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “Response to TRAI consultation on Auction of Spectrum in frequency bands identified for IMT/5G”, Centre for Internet and Society, accessed 10 November 2022,&lt;/span&gt;&lt;a href="https://cis-india.org/telecom/blog/response-to-trai-consultation-auction-of-spectrum-in-frequency-bands-identified-for-imt-5g"&gt;&lt;span&gt;https://cis-india.org/telecom/blog/response-to-trai-consultation-auction-of-spectrum-in-frequency-bands-identified-for-imt-5g&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn2"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref2" name="_ftn2"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[2]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “Response to TRAI Consultation Paper on Regulatory Framework for Over-The-Top (OTT) Communication Services”,Centre for Internet and Society, accessed 10 November 2022, &lt;/span&gt;&lt;a href="https://cis-india.org/internet-governance/blog/response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-ott-communication-services"&gt;&lt;span&gt;https://cis-india.org/internet-governance/blog/response-to-trai-consultation-paper-on-regulatory-framework-for-over-the-top-ott-communication-services&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn3"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref3" name="_ftn3"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[3]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “Impact Assessments”, &lt;i&gt;European Commission,&lt;/i&gt; accessed 10 November 2022,&amp;lt;&lt;/span&gt;&lt;a href="https://ec.europa.eu/info/law/law-making-process/planning-and-proposing-law/impact-assessments_en#:~:text=Impact%20assessments%20examine%20whether%20there,support%20the%20decision%2Dmaking%20process"&gt;&lt;span&gt;https://ec.europa.eu/info/law/law-making-process/planning-and-proposing-law/impact-assessments_en#:~:text=Impact%20assessments%20examine%20whether%20there,support%20the%20decision%2Dmaking%20process&lt;/span&gt;&lt;/a&gt;&lt;span&gt;.&amp;gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn4"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref4" name="_ftn4"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[4]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Clause 2(5) defines customer equipment as follows: “ “customer equipment” means equipment deployed on the premises of a person, other than the equipment of the licensee or registered entity, to originate, route or terminate telecommunication, or equipment used by such person for accessing telecommunication services;”&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn5"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref5" name="_ftn5"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[5]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; As defined in clause 2(9) of the draft bill.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn6"&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;a href="#_ftnref6" name="_ftn6"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[6]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Japan: "Telecommunications service" means intermediating communications of others through the use of telecommunications facilities, or any other acts of providing telecommunications facilities for the use of communications by others; Singapore: “telecommunication service” means any service for telecommunications but excludes any broadcasting service; UK: “electronic communications service” means a service of any of the types specified in subsection (2A) provided by means of an electronic communications network, except so far as it is a content service. Those types of service are— (a)an internet access service; (b)a number-based interpersonal communications service; and (c)any other service consisting in, or having as its principal feature, the conveyance of signals, such as a transmission service used for machine-to-machine services or for broadcasting.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn7"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref7" name="_ftn7"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[7]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Muntazir Abbas, “Regulating OTT players complicated: Trai”, &lt;i&gt;The Economic Times, &lt;/i&gt;30 January 2020,&amp;lt;&lt;/span&gt;&lt;a href="https://economictimes.indiatimes.com/industry/telecom/telecom-policy/regulating-ott-players-complicated-trai/articleshow/73759307.cms?from=mdr"&gt;&lt;span&gt;https://economictimes.indiatimes.com/industry/telecom/telecom-policy/regulating-ott-players-complicated-trai/articleshow/73759307.cms?from=mdr&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &amp;gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn8"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref8" name="_ftn8"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[8]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Justin Douglas and Amy Land Pejoska, Regulation and Small Business, &amp;lt;&lt;/span&gt;&lt;a href="https://treasury.gov.au/sites/default/files/2019-03/p2017-t213722-Roundup_Sml_bus_regulation-final.pdf"&gt;&lt;span&gt;https://treasury.gov.au/sites/default/files/2019-03/p2017-t213722-Roundup_Sml_bus_regulation-final.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&amp;gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn9"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref9" name="_ftn9"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[9]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; ​See​, for instance, “Features, &lt;i&gt;Whatsapp &lt;/i&gt;(2020), &amp;lt;​https://​www​.whatsapp.com/features&amp;gt;;  “Signal&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt;Messenger Features”,&lt;i&gt; Signal&lt;/i&gt; (2020)&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn10"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref10" name="_ftn10"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[10]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; CIS has recommended this “two layered framework” in its previous submissions to TRAI.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn11"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref11" name="_ftn11"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[11]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “Response to TRAI Consultation Paper on Regulatory Framework for Over-The-Top (OTT) Communication Services”,&lt;i&gt;Centre for Internet and Society.&lt;/i&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn12"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref12" name="_ftn12"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[12]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “Internet Privacy in India”,Centre for Internet and Society, accessed 10 November 2022,https://cis-india.org/telecom/knowledge-repository-on-internet-access/internet-privacy-in-india&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn13"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref13" name="_ftn13"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[13]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;Justice K. Puttaswamy and Others v. Union of India and Others 1 SCC 1 (2019)&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn14"&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;a href="#_ftnref14" name="_ftn14"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[14]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;“Judgement in Plain English Constitutionality of Aadhaar Act”, “Supreme Court Observer, accessed 10 November 20222,https://www.scobserver.in/reports/constitutionality-of-aadhaar-justice-k-s-puttaswamy-union-of-india-judgment-in-plain-english/&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn15"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref15" name="_ftn15"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[15]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “Right to Encrypt : Subset of Right to Privacy?”, SFLC, accessed  10 November 20222,&lt;/span&gt;&lt;a href="https://sflc.in/right-encrypt-subset-right-privacy"&gt;&lt;span&gt;https://sflc.in/right-encrypt-subset-right-privacy&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn16"&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;a href="#_ftnref16" name="_ftn16"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[16]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; PTI, “Trai to moot mechanism for KYC-based caller name display”,The Economic Times, 20 May 2022,&lt;/span&gt;&lt;a href="https://economictimes.indiatimes.com/industry/telecom/telecom-news/trai-to-moot-mechanism-for-kyc-based-caller-name-display/articleshow/91695117.cms?from=mdr"&gt;&lt;span&gt;https://economictimes.indiatimes.com/industry/telecom/telecom-news/trai-to-moot-mechanism-for-kyc-based-caller-name-display/articleshow/91695117.cms?from=mdr&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn17"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref17" name="_ftn17"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[17]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Palme, Jacob, and Mikael Berglund. "Anonymity on the Internet.” &amp;lt;&lt;/span&gt;&lt;a href="https://people.dsv.su.se/~jpalme/society/anonymity.pdf"&gt;&lt;span&gt;https://people.dsv.su.se/~jpalme/society/anonymity.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &amp;gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn18"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref18" name="_ftn18"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[18]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Rajat Kathuria, Isha Suri “Why spectrum needs a change in approach”, &lt;i&gt;Indian Express&lt;/i&gt;, 20 October 2022, &lt;/span&gt;&lt;a href="https://indianexpress.com/article/opinion/columns/why-spectrum-needs-a-change-in-approach-8235997/"&gt;&lt;span&gt;https://indianexpress.com/article/opinion/columns/why-spectrum-needs-a-change-in-approach-8235997/&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn19"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref19" name="_ftn19"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[19]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;a href="https://www.ic.gc.ca/eic/site/smt-gst.nsf/eng/sf11793.html"&gt;&lt;span&gt;Consultation on a Non-Competitive Local Licensing Framework, Including Spectrum in the 3900-3980 MHz Band and Portions of the 26, 28 and 38 GHz Bands - Spectrum management and telecommunications&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn20"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref20" name="_ftn20"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[20]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Aneesh Phadnis“Extant rules choke growth, telecom bill needs review: Broadband India Forum”, &lt;i&gt;Business Standard&lt;/i&gt;, 23 September2022&amp;lt;&lt;/span&gt;&lt;a href="https://www.business-standard.com/article/companies/extant-rules-choke-growth-telecom-bill-needs-review-broadband-india-forum-122092301265_1.html"&gt;&lt;span&gt;https://www.business-standard.com/article/companies/extant-rules-choke-growth-telecom-bill-needs-review-broadband-india-forum-122092301265_1.html&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &amp;gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn21"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref21" name="_ftn21"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[21]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Highlights of Telecom Subscription Data as on 31st August, 2022, &lt;i&gt;TRAI, &lt;/i&gt;accessed 10 November 2022, &lt;/span&gt;&lt;a href="https://www.trai.gov.in/sites/default/files/PR_No.67of2022.pdf"&gt;&lt;span&gt;https://www.trai.gov.in/sites/default/files/PR_No.67of2022.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn22"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref22" name="_ftn22"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[22]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “Response to TRAI consultation on Auction of Spectrum in frequency bands identified for IMT/5G”, Centre for Internet and Society.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn23"&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;a href="#_ftnref23" name="_ftn23"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[23]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Calabrese, M. (2021). Use it or Share It: A New Default Policy for Spectrum Management. &lt;i&gt;Available at SSRN 3762098. &lt;/i&gt;&amp;lt;&lt;/span&gt;&lt;a href="https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3762098_code2826029.pdf?abstractid=3762098&amp;amp;mirid=1"&gt;&lt;span&gt;https://papers.ssrn.com/sol3/Delivery.cfm/SSRN_ID3762098_code2826029.pdf?abstractid=3762098&amp;amp;mirid=1&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &amp;gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn24"&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;a href="#_ftnref24" name="_ftn24"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[24]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “Guidelines for Implementation of New Public Sector Enterprises (PSEI Policy for CPSEs in Non-Strategic Sector' regarding”, “Government of India Ministry of Finance Department of Public EnterPrises, 10 November 2022, &lt;/span&gt;&lt;a href="https://dpe.gov.in/sites/default/files/DPE_OM_DTD_13.12.21_Guidelines_on_New_PSE_Policy_0.pdf"&gt;&lt;span&gt;https://dpe.gov.in/sites/default/files/DPE_OM_DTD_13.12.21_Guidelines_on_New_PSE_Policy_0.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt;, Economic Survey 2021-2022, &lt;i&gt;India Budget, &lt;/i&gt;accessed 10 November 2022, &amp;lt;&lt;/span&gt;&lt;a href="https://www.indiabudget.gov.in/economicsurvey/ebook_es2022/index.html#p=86"&gt;&lt;span&gt;https://www.indiabudget.gov.in/economicsurvey/ebook_es2022/index.html#p=86&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &amp;gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn25"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref25" name="_ftn25"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[25]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; A similar approach has been taken in the new Occupational Safety, Health and Working Conditions Code, 2020 for registration of establishments under clause 3(3) of the Code.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn26"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref26" name="_ftn26"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[26]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Sections 69 and 69A of the Information Technology Act, 2000.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn27"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref27" name="_ftn27"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[27]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Anuradha Bhasin vs Union Of India,  3 SCC 637 (2020)&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn28"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref28" name="_ftn28"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[28]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Explanatory Note to the draft Indian Telecommunication Bill, 2022, Pg. 14.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn29"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref29" name="_ftn29"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[29]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;“USOF Scheme for Aspirational Districts in 5 states”, “Drishti IAS”, accessed 10 November 2022, https://www.drishtiias.com/daily-updates/daily-news-analysis/usof-scheme-for-aspirational-districts-in-5-states &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn30"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref30" name="_ftn30"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[30]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;“What BharatNet can learn from the rural-roads scheme: involve states, local bodies, private sector” “ Centre for Internet and Society, accessed 10 November 2022, https://cis-india.org/telecom/blog/what-bharatnet-can-learn-from-the-rural-roads-scheme-involve-states-local-bodies-private-sector&lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;p class="MsoNormal"&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn31"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref31" name="_ftn31"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[31]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Functions of Authority, clause 11, TRAI Act, 1997.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn32"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref32" name="_ftn32"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[32]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Pratap Vikram Singh, “Trai, try again: India’s toothless telecom regulator fights for more powers”, Aug 31, 2021, &lt;i&gt;The Ken&lt;/i&gt;, &amp;lt;&lt;/span&gt;&lt;a href="https://the-ken.com/story/trai-try-again-indias-toothless-telecom-regulator-fights-for-more-powers/"&gt;&lt;span&gt;https://the-ken.com/story/trai-try-again-indias-toothless-telecom-regulator-fights-for-more-powers/&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&amp;gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn33"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref33" name="_ftn33"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[33]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; &lt;i&gt;Ibid&lt;/i&gt;.&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn34"&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;a href="#_ftnref34" name="_ftn34"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[34]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “PTI” “Have power to settle competitive tariff issues: TRAI to CCI”, Aug 7, 2017, &lt;i&gt;The Economic Times&lt;/i&gt;, &lt;/span&gt;&lt;a href="https://economictimes.indiatimes.com/news/economy/policy/have-power-to-settle-competitive-tariff-issues-trai-to-cci/articleshow/59959144.cms?from=mdr"&gt;&lt;span&gt;https://economictimes.indiatimes.com/news/economy/policy/have-power-to-settle-competitive-tariff-issues-trai-to-cci/articleshow/59959144.cms?from=mdr&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt; &lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn35"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref35" name="_ftn35"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[35]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; CIVIL APPEAL NO(S). 11843 OF 2018&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn36"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref36" name="_ftn36"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[36]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Ibid at Para 90&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn37"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref37" name="_ftn37"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[37]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; “Market Study on the Telecom Sector”, Jan 22, 2021, Competition Commission of India&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn38"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref38" name="_ftn38"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[38]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; Global ICT Regulatory Outlook 2020 - Pointing the way forward to collaborative regulation (2020), &lt;i&gt;ITU, &lt;/i&gt;https://www.itu.int/dms_pub/itu-d/opb/pref/D-PREF-BB.REG_OUT01-2020-PDF-E.pdf&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn39"&gt;
&lt;p class="MsoNormal"&gt;&lt;a href="#_ftnref39" name="_ftn39"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[39]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;Informal Guidance Scheme of SEBI: Understanding the Concept and Analyzing the Guidance Provided by SEBI, Vijay Kumar Singh&lt;/span&gt; &lt;a href="https://www.researchgate.net/publication/228226352_Informal_Guidance_Scheme_of_SEBI_Understanding_the_Concept_and_Analyzing_the_Guidance_Provided_by_SEBI"&gt;&lt;span&gt;https://www.researchgate.net/publication/228226352_Informal_Guidance_Scheme_of_SEBI_Understanding_the_Concept_and_Analyzing_the_Guidance_Provided_by_SEBI&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&amp;gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn40"&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;a href="#_ftnref40" name="_ftn40"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[40]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt; We have made similar recommendations to the Personal Data Protection Bill 2019, on the offences and penalties under the Bill. The comments can be viewed here: &amp;lt;&lt;/span&gt;&lt;a href="https://cis-india.org/accessibility/blog/cis-general-comments-to-the-pdp-bill-2019"&gt;&lt;span&gt;https://cis-india.org/accessibility/blog/cis-general-comments-to-the-pdp-bill-2019&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&amp;gt;&lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;div id="ftn41"&gt;
&lt;p class="MsoNormal" style="text-align: justify; "&gt;&lt;a href="#_ftnref41" name="_ftn41"&gt;&lt;sup&gt;&lt;sup&gt;&lt;span&gt;[41]&lt;/span&gt;&lt;/sup&gt;&lt;/sup&gt;&lt;/a&gt;&lt;span&gt;Recommendations On Traffic Management Practices (TMPs) and MultiStakeholder Body for Net Neutrality,&lt;i&gt; TRAI,&lt;/i&gt; accessed 10 November 2022, &lt;/span&gt;&lt;a href="https://www.trai.gov.in/sites/default/files/Recommendations_22092020_0.pdf"&gt;&lt;span&gt;https://www.trai.gov.in/sites/default/files/Recommendations_22092020_0.pdf&lt;/span&gt;&lt;/a&gt;&lt;span&gt; &lt;/span&gt;&lt;/p&gt;
&lt;/div&gt;
&lt;hr /&gt;
The comments were drafted by Abhishek Raj, Divyank Katira, Isha Suri,  Shweta Mohandas and Vipul Kharbanda, and reviewed by Pallavi Bedi. Click  to download the &lt;a href="https://cis-india.org/telecom/comments-to-the-draft-indian-telecommunication-bill" class="internal-link"&gt;submission here&lt;/a&gt;&lt;/div&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/telecom/blog/cis-comments-to-draft-indian-telecom-bill-2022'&gt;https://cis-india.org/telecom/blog/cis-comments-to-draft-indian-telecom-bill-2022&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Abhishek Raj, Divyank Katira, Isha Suri, Shweta Mohandas, and Vipul Kharbanda</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Telecom</dc:subject>
    

   <dc:date>2022-11-22T13:22:24Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/demistifying-data-breaches-in-india">
    <title>Demystifying Data Breaches in India</title>
    <link>https://cis-india.org/internet-governance/blog/demistifying-data-breaches-in-india</link>
    <description>
        &lt;b&gt;Despite the rate at which data breaches occur and are reported in the media, there seems to be little information about how and when they are resolved. This post examines the discourse on data breaches in India with respect to their  historical forms, with a focus on how the specific terminology to describe data security incidents has evolved in mainstream news media reportage.

&lt;/b&gt;
        &lt;p&gt;Edited by Arindrajit Basu and Saumyaa Naidu&lt;/p&gt;
&lt;hr /&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;India saw a &lt;a href="https://theprint.in/india/despite-62-drop-in-data-breaches-india-among-top-5-nations-targeted-by-hackers-study-finds/917197/"&gt;62% drop in data breaches in the first quarter of 2022&lt;/a&gt;. Yet, it ranked fifth on the list of countries most hit by cyberattacks according to a 2022 &lt;a href="https://surfshark.com/blog/data-breach-statistics-by-country"&gt;report by Surfshark&lt;/a&gt;, a Netherlands-based VPN company. Another report &lt;a href="https://analyticsindiamag.com/the-ridiculous-17-5-cr-for-a-data-breach/"&gt;on the cost of data breaches researched by the Ponemon Institute and published by IBM&lt;/a&gt; reveals that the breach of about 29500 records between March 2021 and March 2022 resulted in a 25% increase in the average cost from INR 165 million in 2021 to INR 176 million in 2022.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;These statistics are certainly a cause for concern, especially in the context of India’s rapidly burgeoning digital economy shaped by the pervasive platformization of private and public services such as welfare, banking, finance, health, and shopping among others. Despite the rate at which data breaches occur and are reported in the media, there seems to be little information about how and when they are resolved. This post examines the discourse on data breaches in India with respect to their historical forms, with a focus on how the specific terminology to describe data security incidents has evolved in mainstream news media reportage.&lt;/span&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;While expert articulations of cybersecurity in general and data breaches in particular tend to predominate the public discourse on data privacy, this post aims to situate broader understandings of data breaches within the historical context of India’s IT revolution and delve into specific concepts and terminology that have shaped the broader discourse on data protection. The late 1990s and early 2000s offer a useful point of entry into the genesis of the data security landscape in India.&lt;/span&gt;&lt;/p&gt;
&lt;h3&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;Data Breaches and their Predecessor Forms&lt;/span&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;&lt;span&gt;&lt;/span&gt;&lt;span&gt;The articulation of data security concerns around the late 1990s and early 2000s isn’t always consistent in deploying the phrase, ‘data breach’ to signal cybersecurity concerns in India. The terms such as ‘data/ identity theft’ and ‘data leak’ figure prominently in the public articulation of concerns with the handling of personal information by IT systems, particularly in the context of business process outsourcing (BPO) and e-commerce activities. Other pertinent terms such as “security breach”, “data security”, and ‘“cyberfraud” also capture the specificity of growing concerns around outsourced data to India. At the time, i.e. around mid-2000s regulatory frameworks were still evolving to accommodate and address the complexities arising from a dynamic reconfiguration of the telecommunications and IT landscape in India.&lt;/span&gt;&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Some of the formative cases that instantiate the usage of the aforementioned terms are instructive to understand shifts in the reporting of such incidents over time. The earliest case during that period concerns&lt;a href="https://www.stop-source-code-theft.com/source-code-theft-cases-in-india/"&gt; a 2002 case concerning the theft and sale of source code&lt;/a&gt; by an IIT Kharagpur student who intended to sell the code to two undercover FBI agents who worked with the CBI to catch the thief. A straightforward case of data theft was framed by media stories around the time as a &lt;a href="https://timesofindia.indiatimes.com/iitian-held-for-stealing-software-source-code/articleshow/20389713.cms"&gt;cybercrime involving the illegal sale&lt;/a&gt; of the source code of a software package, as &lt;a href="https://economictimes.indiatimes.com/ip-laws-lax-but-us-firm-bets-on-india/articleshow/696197.cms?from=mdr"&gt;software theft of intellectual property in the context of outsourcing&lt;/a&gt; and as an instance of &lt;a href="https://www.computerworld.com/article/2573515/at-risk-offshore.html"&gt;industrial espionage in poor nations without laws protecting foreign companies&lt;/a&gt;. This case became the basis of the earliest calls for the protection of data privacy and security in the context of the Indian BPO sector. The Indian IT Act, 2000 at the time only covered &lt;a href="http://pavanduggal.com/wp-content/uploads/2016/01/India-Responds-to-Growing-Concerns-Over-Data-Security.pdf"&gt;unauthorized access and data theft from computers and networks without any provisions for data protection, interception or computer forgery&lt;/a&gt;. The BPO boom in India brought with it &lt;a href="https://blj.ucdavis.edu/archives/vol-6-no-2/offshore-outsourcing-to-india.html"&gt;employment opportunities for India’s English-speaking, educated youth but in the absence of concrete data privacy legislation&lt;/a&gt;, the country was regarded as an unsafe destination for outsourcing aside from the political ramifications concerning the loss of American jobs.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In a major 2005 incident, employees of the Mphasis BFL call centre in Pune extracted sensitive bank account information of Citibank’s American customers to divert INR 1.90 crore into new accounts set up in India. The media coverage of this incident calls it &lt;a href="https://www.indiatoday.in/magazine/economy/story/20050502-pune-call-centre-fraud-rattles-india-booming-bpo-sector-787790-2005-05-01"&gt;India’s first outsourcing cyberfraud and a well planned scam&lt;/a&gt;, a &lt;a href="https://economictimes.indiatimes.com/mphasis-call-centre-fraud-net-widens/articleshow/1077097.cms"&gt;cybercrime in a globalized world&lt;/a&gt;, and a case of &lt;a href="https://timesofindia.indiatimes.com/home/sunday-times/deep-focus/indias-first-bpo-scam-unraveled/articleshow/1086438.cms"&gt;financial fraud and a scam&lt;/a&gt; that required no hacking skills, and a &lt;a href="https://www.infoworld.com/article/2668975/indian-call-center-workers-charged-with-citibank-fraud.html"&gt;case of data theft and misuse&lt;/a&gt;. Within the ambit of cybercrime, media reports of these incidents refer to them as cases of “fraud”, “scam” and “theft''.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Two other incidents in 2005 set the trend for a critical spotlight on data security practices in India. In a &lt;a href="http://news.bbc.co.uk/2/hi/south_asia/4619859.stm"&gt;June 2005 incident, an employee of a Delhi-based BPO firm, Infinity e-systems, sold the account numbers and passwords of 1000 bank customers &lt;/a&gt;to the British Tabloid, The Sun. The Indian newspaper, Telegraph India, carried an online story headlined, “&lt;a href="https://www.telegraphindia.com/india/bpo-blot-in-british-backlash-indian-sells-secret-data/cid/873737"&gt;BPO Blot in British Backlash: Indian Sells Secret Data&lt;/a&gt;,” which reported that the employee, Kkaran Bahree, 24, was set up by a British journalist, Oliver Harvey. Harvey filmed Bahree accepting wads of cash for the stolen data. Bahree’s theft of sensitive information is described both as a data fraud and a leak in the above 2005 BBC story by Soutik Biswar. Another story on the incident calls it a “&lt;a href="https://www.rediff.com/money/2005/jun/24bpo3.htm"&gt;scam” involving the leakage of credit card information&lt;/a&gt;. The use of the term ‘leak’ appears consistently across other media accounts such as a &lt;a href="https://timesofindia.indiatimes.com/city/delhi/esearch-bpo-employee-sacked-still-missing/articleshow/1153017.cms"&gt;2005 story on Karan Bahree in the Times of India&lt;/a&gt; and another story in the Economic Times about the Australian Broadcasting Corporation’s (ABC) sting operation similar to the one in Delhi, describing the scam by the &lt;a href="https://economictimes.indiatimes.com/hot-links/bpo/karan-bahree-part-ii-shot-in-australia/articleshow/1201347.cms?from=mdr"&gt;fraudsters as a leak&lt;/a&gt; of the online information of Australians. Another media account of the coverage describes the incident in more generic terms such as an “&lt;a href="https://www.tribuneindia.com/2005/20050625/edit.htm"&gt;outsourcing crime&lt;/a&gt;”.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The other case concerned &lt;a href="https://www.taylorfrancis.com/chapters/mono/10.4324/9781315610689-16/political-economy-data-security-bpo-industry-india-alan-chong-faizal-bin-yahya"&gt;four former employees of Parsec technologies who stole classified information and diverted calls from potential customers&lt;/a&gt;, causing a sudden drop in the productivity of call centres managed by the company in November 2005. Another call centre &lt;a href="http://news.bbc.co.uk/1/hi/uk/7953401.stm"&gt;fraud came to light in 2009 through a BBC sting operation in which British reporters went to Delhi &lt;/a&gt;and secretly filmed a deal with a man selling credit card and debit card details obtained from Symantec call centres, which sold software made by Norton. This BBC story uses the term “breach” to refer to the incident.&lt;/p&gt;
&lt;p dir="ltr"&gt;In the broader framing of these cases generally understood as cybercrime, which received transnational media coverage, the terms “fraud”, “leak”, “scam”, and “theft” appear interchangeably. The term “data breach” does not seem to be a popular or common usage in these media accounts of the BPO-related incidents. A broader sense of breach (of confidentiality, privacy) figures in the media reportage in &lt;a href="https://economictimes.indiatimes.com/hot-links/bpo/cyber-crimes-can-the-west-trust-indian-bpos/articleshow/1157115.cms?from=mdr"&gt;implicitly racial terms of cultural trust&lt;/a&gt;, as a matter of &lt;a href="https://www.news18.com/news/business/bpo-staff-need-ethical-training-poll-248442.html"&gt;ethics and professionalism&lt;/a&gt; and in the &lt;a href="https://www.news18.com/news/business/sting-op-may-spell-doom-for-bpos-248260.html"&gt;language of scandal &lt;/a&gt;in some cases.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;These early cases typify a specific kind of cybercrime concerning the theft or misappropriation of outsourced personal data belonging to British or American residents. What’s remarkable about these cases is the utmost sensitivity of the stolen personal information including financial details, bank account and credit/debit card numbers, passwords, and in one case, source code. While these cases rang the alarm bells on the Indian BPO sector’s data security protocols, they also directed attention to concerns around &lt;a href="https://economictimes.indiatimes.com/hot-links/bpo/cyber-crimes-can-the-west-trust-indian-bpos/articleshow/1157115.cms?from=mdr"&gt;the training of Indian employees on the ethics of data confidentiality and vetting through psychometric tests&lt;/a&gt; for character assessment. In the wake of these incidents, the National Association of Software and Service Companies (NASSCOM), an Indian non-governmental trade and advocacy group,&lt;a href="https://www.computerworld.com/article/2547959/outsourcing-to-india--dealing-with-data-theft-and-misuse.html"&gt; launched a National Skills Registry for IT professionals to enable employers to conduct background checks&lt;/a&gt; in 2006.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;These data theft incidents earned India a global reputation of an unsafe destination for business process outsourcing, seen to be lacking both, a culture of maintaining data confidentiality and concrete legislation for data protection at the time. Importantly, the incidents of data theft or misappropriation were also traceable back to a known source, a BPO employee or a group of malefactors, who often sold sensitive data belonging to foreign nationals to others in India.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The phrase “data leak” also caught on in another register in the context of the widespread use of camera-equipped mobile phones in India. The 2004 Delhi MMS case offers an instance of a date leak, recapitulating the language of scandal in moralistic terms.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;The Delhi MMS Case&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The infamous 2004 incident involved two underage Delhi Public School (DPS) students who recorded themselves in a sexually explicit act on a cellular phone. After a fall out, the male student passed the low-resolution clip on to his friend in which his female friend’s face is seen. The clip, distributed far and wide in India, ended up on the famous e-shopping and auction website, bazee.com leading to &lt;a href="https://indiancaselaw.in/avnish-bajaj-vs-state-dps-mms-scandal-case/"&gt;the arrest of the website’s CEO Avinash Bajaj for hosting the listing for sale&lt;/a&gt;. Another similar case in 2004 mimicked the mechanics of visual capture through hand-held MMS-enabled mobile phones. A two-minute MMS of a top South-Indian actress &lt;a href="https://timesofindia.indiatimes.com/india/web-of-sleaze-now-nude-video-of-top-actress/articleshow/966048.cms"&gt;taking a shower went viral on the Internet in 2004, the year when another MMS of two prominent Bollywood actors kissing&lt;/a&gt; had already done the rounds. The &lt;a href="https://www.journals.upd.edu.ph/index.php/plaridel/article/view/2392"&gt;MMS case also marked the onset of a national moral panic around the amateur uses of mobile phone technologies&lt;/a&gt;, capable of corrupting young Indian minds under a sneaky regime of new media modernity. The MMS case, not strictly the classic case of a data breach - non-visual information generally stored in databases - became an iconic case of a data leak framed in the media as &lt;a href="https://www.telegraphindia.com/india/scandal-in-school-shakes-up-delhi/cid/1667531"&gt;a scandal that shocked the country&lt;/a&gt;, with calls for the regulation of mobile phone use in schools. The case continued its scandalous afterlife in a &lt;a href="https://www.heraldgoa.in/Edit/dev-ds-leni-has-a-dps-mms-scandal-connection-/21344"&gt;2009 Bollywood film, Dev D&lt;/a&gt; and another &lt;a href="https://indianexpress.com/article/entertainment/entertainment-others/delhi-mms-scandal-inspires-dibakars-love-sex-aur-dhoka/"&gt;2010 film, Love, Sex and Dhokha&lt;/a&gt;,&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Taken together, the BPO data thefts and frauds and the data leak scandals prefigure the contemporary discourse on data breaches in the second decade of the 21st century, or what may also be called the Decade of Datafication. The launch of the Indian biometric identity project, Aadhaar, in 2009, which linked access to public services and welfare delivery with biometric identification, resulted in large-scale data collection of the scheme’s subscribers. Such linking raised the spectre of state surveillance as alleged by the critics of Aadhaar, marking a watershed moment in the discourse on data privacy and protection.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;Aadhaar Data Security and Other Data Breaches&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Aadhaar was challenged in the Indian Supreme Court in 2012 when &lt;a href="https://www.outlookindia.com/website/story/worries-about-the-aadhaar-monster/296790"&gt;it was made mandatory for welfare and other services such as banking, taxation and mobile telephony&lt;/a&gt;. The national debate on the status of privacy as a cultural practice in Indian society and a fundamental right in the Indian Constitution led to two landmark judgments - the &lt;a href="https://main.sci.gov.in/supremecourt/2012/35071/35071_2012_Judgement_24-Aug-2017.pdf"&gt;2017 Puttaswamy ruling&lt;/a&gt; holding privacy to be a constitutional right subject to limitations and &lt;a href="https://indiankanoon.org/doc/127517806/"&gt;the 2018 Supreme Court judgment holding mandatory Aadhaar to be constitutional only for welfare and taxation but no other service&lt;/a&gt;.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;While these judgments sought to rein in Aadhaar’s proliferating mandatory uses, biometric verification remained the most common mode of identity authentication with &lt;a href="https://www.businesstoday.in/latest/trends/story/aadhaar-not-mandatory-yet-organisations-pose-it-as-a-mandatory-document-335550-2022-05-29"&gt;most organizations claiming it to be mandatory for various purposes&lt;/a&gt;. During the same period from 2010 onwards, a range of data security events concerning Aadhaar came to light. These included &lt;a href="https://www.firstpost.com/tech/news-analysis/aadhaar-security-breaches-here-are-the-major-untoward-incidents-that-have-happened-with-aadhaar-and-what-was-actually-affected-4300349.html"&gt;app-based flaws, government websites publishing Aadhaar details of subscribers, third party leaks of demographic data, duplicate and forged Aadhaar cards and other misuses&lt;/a&gt;.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In 2015, the Indian government launched its ambitious &lt;a href="https://indiancc.mygov.in/wp-content/uploads/2021/08/mygov-10000000001596725005.pdf"&gt;Digital India Campaign to provide government services to Indian citizens&lt;/a&gt; through online platforms. Yet, data security breach incidents continued to increase, particularly the trade in the sale and purchase of sensitive financial information related to bank accounts and credit card numbers. The online availability of &lt;a href="https://www.livemint.com/Industry/l5WlBjdIDXWehaoKiuAP9J/India-unprepared-to-tackle-online-data-security-report.html"&gt;a rich trove of data, accessible via a simple Google search without the use of any extractive software or hacking skills &lt;/a&gt;within a thriving shadow economy of data buyers and sellers makes India a particularly vulnerable digital economy, especially in the absence of robust legislation. The lack of awareness around digital crimes and low digital literacy further exacerbates the situation given that datafication via government portals, e-commerce, and online apps has outpaced the enforcement of legislative frameworks for data protection and cybersecurity.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In the context of Aadhaar data security issues, the term “data leak” seems to have more traction in media stories followed by the term “security breach”. Given the complexity of the myriad ways in which Aadhaar data has been breached, terms such as &lt;a href="https://techcrunch.com/2022/06/13/aadhaar-leak-pm-kisan/?guccounter=1&amp;amp;guce_referrer=aHR0cHM6Ly93d3cuZ29vZ2xlLmNvbS8&amp;amp;guce_referrer_sig=AQAAADvQXtC19Gj80LSKVc5jLwnRsREalvM2f6dV3N9KmCs8be6_1Zbvu3J6abPmBxhLlUooLiOjg4JktYDDCXr0OYYvOZ5XFlXa6DfCJk97TvMXM-cs3uJbCJBA-ePqvAC5K4qGZSyDB4OykMEOIKXJpB0CTOourPRc5dBxFFq5JXlB"&gt;data leak and exposure&lt;/a&gt; (of &lt;a href="https://zeenews.india.com/personal-finance/aadhaar-data-breach-over-110-crore-indian-farmers-aadhaar-card-data-compromised-2473666.html"&gt;11 crore Indian farmers’ sensitive information&lt;/a&gt;) add to the specificity of the data security compromise. The term “fraud” also makes a comeback in the context of &lt;a href="https://www.business-standard.com/article/economy-policy/india-s-aadhaar-id-system-delivers-benefits-but-at-risk-of-widespread-fraud-122062400124_1.html"&gt;Aadhaar-related data security incidents&lt;/a&gt;. These cases represent a mix of data frauds involving&lt;a href="https://economictimes.indiatimes.com/news/india/alarm-over-fake-id-printing-websites-using-customer-data-for-cyber-fraud/articleshow/94742646.cms"&gt; fake identities&lt;/a&gt;, &lt;a href="https://indianexpress.com/article/cities/delhi/in-new-age-data-theft-fraudsters-steal-thumb-prints-from-land-registries-7914530/"&gt;theft of thumb prints &lt;/a&gt;for instance from land registries and inadvertent data leaks in numerous incidents involving &lt;a href="https://techcrunch.com/2019/01/31/aadhaar-data-leak/"&gt;government employees in Jharkhand&lt;/a&gt;, v&lt;a href="https://www.firstpost.com/india/aadhaar-data-leak-details-of-7-82-cr-indians-from-ap-and-telangana-found-on-it-grids-database-6448961.html"&gt;oter ID information of Indian citizens in Andhra Pradesh and Telangana&lt;/a&gt; and &lt;a href="https://www.thehindu.com/sci-tech/technology/major-aadhaar-data-leak-plugged-french-security-researcher/article26584981.ece"&gt;activist reports of Indian government websites leaking Aadhaar data&lt;/a&gt;.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Aadhaar-related data security events parallel the increase in corporate data breaches during the decade of datafication. The term “data leak” again alternates with the term “data breach” in most media accounts while other terms such as “theft” and “scam” all but disappear in the media coverage of corporate data breaches.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;From 2016 onwards, incidents of corporate data breaches in India continued to rise. A massive &lt;a href="https://thewire.in/banking/debit-card-breach-india-banking"&gt;debit card data breach involving the YES Bank ATMs and point-of-sale (PoS) machines &lt;/a&gt;compromised through malware between May and July of 2016 resulted in the exposure of ATM PINs and non-personal identifiable information of customers. It went &lt;a href="https://www.livemint.com/Industry/Ope7B0jpjoLkemwz6QXirN/SBI-Yes-Bank-MasterCard-deny-data-breach-of-own-systems.html"&gt;undetected for nearly three&lt;/a&gt; months. Another data leak in 2018 concerned a &lt;a href="https://www.zdnet.com/article/another-data-leak-hits-india-aadhaar-biometric-database/"&gt;system run by Indane, a state-owned utility company, which allowed anyone to download private information on all Aadhaar holders &lt;/a&gt;including their names, services they were connected to and the unique 12-digit Aadhaar number. Data breaches continued to be reported in India concurrent with the incidents of data mismanagement related to Aadhaar. Some &lt;a href="https://www.csoonline.com/article/3541148/the-biggest-data-breaches-in-india.html"&gt;prominent data breaches included &lt;/a&gt;a cyberattack on the systems of airline data service provider SITA resulting in the leak of Air India passenger data, leakage of the personal details of the Common Admission Test (CAT) applicants, details of credit card and order preferences of Domino’s pizza customers on the dark web, leakage of COVID-19 patients’ test results leaked by government websites, user data of Justpay and Big Basket for sale on the dark web and an SBI data breach among others between 2019 and 2021.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The media reportage of these data breaches use the term “cyberattack” to describe the activities of hackers and cybercriminals operating within a&lt;a href="https://www.thehindu.com/sci-tech/technology/internet/most-damaging-cybercrime-services-are-cheap-on-the-dark-web/article37004587.ece"&gt; shadow economy or the dark web&lt;/a&gt;. Recent examples of cyberattacks by hackers who leak user data for sale on the dark web include &lt;a href="https://indianexpress.com/article/technology/tech-news-technology/mobikwik-database-leaked-on-dark-web-company-denies-any-data-breach-7251448/"&gt;8.2 terabytes of 110 million sensitive financial data (KYC details, Aadhaar, credit/debit cards and phone numbers) of the payments app MobiKwik users&lt;/a&gt;, &lt;a href="https://www.firstpost.com/tech/news-analysis/dominos-india-data-breach-name-location-mobile-number-email-of-18-crore-orders-up-for-sale-on-dark-web-9650591.html"&gt;180 million Domino’s pizza orders (name, location, emails, mobile numbers),&lt;/a&gt; and &lt;a href="https://techcrunch.com/2022/07/18/cleartrip-data-breach-dark-web/"&gt;Flipkart’s Cleartrip users’ data&lt;/a&gt;. In these incidents again, three terms appear prominently in the media reportage - cyberattack, data breach, and leak. The term “data breach” remains the most frequently used epithet in the media coverage of the lapses of data security. While it alternates with the term “leak” in the stories, the term “data breach” appears consistently across most headlines in the news stories.&lt;/p&gt;
&lt;p dir="ltr"&gt;The exposure of sensitive, personal, and non-personal data by public and private entities in India is certainly a cause for concern, given the ongoing data protection legislative vacuum.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The media coverage of data breaches tends to emphasize the quantum of compromised user data aside from the types of data exposed. The media framing of these breaches in &lt;a href="https://www.livemint.com/technology/tech-news/indian-firms-lost-176-million-to-data-breaches-last-fiscal-11658914231530.html"&gt;quantitative terms of financial loss&lt;/a&gt; as well as the &lt;a href="https://www.indiatoday.in/technology/news/story/personal-data-of-3-4-million-paytm-mall-users-reportedly-exposed-in-2020-data-breach-1980690-2022-07-27"&gt;magnitude&lt;/a&gt; and the &lt;a href="https://www.moneycontrol.com/news/business/banks/indian-banks-reported-248-data-breaches-in-last-four-years-says-government-8940891.html"&gt;number of breaches&lt;/a&gt; certainly highlights the gravity of these incidents but harm to individual users is often not addressed.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;Evolving Terminology and the Source of Data Harms&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The main difference in the media reportage of the BPO cybersecurity incidents during the early aughts and the contemporary context of datafication is the usage of the term, “data breach”, which figures prominently in contemporary reportage of data security incidents but not so much in the BPO-related cybercrimes.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;THe BPO incidents of data theft and the attendant fraud must be understood in the context of the anxieties brought on by a globalizing world of Internet-enabled systems and transnational communications. In most of these incidents regarded as cybercrimes, the language of fraud and scam ventures further to attribute such illegal actions of the identifiable malefactors to cultural factors such as lack of ethics and professionalism.The usage of the term “data leak” in these media reports functions more specifically to underscore a broader lapse in data security as well as a lack of robust cybersecurity laws. The broader term, “breach”, is occasionally used to refer to these incidents but the term, “data breach” doesn’t appear as such.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The term “data breach” gains more prominence in media accounts from 2009 onwards in the context of Aadhaar and the online delivery of goods and services by public and private players. The term “data breach” is often used interchangeably with the term “leak” within the broader ambit of cyberattacks in the corporate sector. The media reportage frames Aadhaar-related security lapses as instances of security/data breaches, data leaks, fraud, and occasionally scam.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;In contrast to the handful of data security cases in the BPO sector, data breaches have abounded in the second decade of the twenty-first century. What further differentiates the BPO-related incidents to the contemporary data breaches is the source of the data security lapse. Most corporate data breaches remain attributable to the actions of hackers and cybercriminals while the BPO security lapses were traceable back to ex-employees or insiders with access to sensitive data. We also see in the coverage of the BPO-related incidents, the attribution of such data security lapses to cultural factors including a lack of ethics and professionalism often in racial overtones. The media reportage of the BBC and ABC sting operations suggests that the India BPOs lack of preparedness to handle and maintain personal data confidentiality of foreigners point to the absence of a privacy culture in India. Interestingly, this transnational attribution recurs in a different form in the national debate on &lt;a href="https://huffpost.netblogpro.com/archive/in/entry/indians-don-t-care-about-privacy-but-thankfully-the-law-will-teach-them-what-it-means_a_23179031"&gt;Aadhaar and how Indians don’t care about their privacy&lt;/a&gt;.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The question of the harms of data breaches to individuals is also an important one. In the discourse on contemporary data breaches, the actual material harm to an individual user is rarely ever established in the media reportage and generally framed as potential harm that could be devastating given the sensitivity of the compromised data. The harm is reported to be predominantly a function of organizational cybersecurity weakness or attributed to hackers and cybercriminals.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;The reporting of harm in collective terms of the number of accounts breached, financial costs of a data breach, the sheer number of breaches and the global rankings of countries with the highest reported cases certainly suggests a problem with cybersecurity and the lack of organizational preparedness. However, this collective framing of a data breach’s impact usually elides an individual user’s experience of harm. Even in the case of Aadhaar-related breaches - a mix of leaking data on government websites and other online portals and breaches - the notion of harm owing to exposed data isn’t clearly established. This is, however, different from the &lt;a href="https://scroll.in/article/1013700/six-types-of-problems-aadhaar-is-causing-and-safeguards-needed-immediately"&gt;extensively documented cases of Aadhaar-related issues&lt;/a&gt; in which welfare benefits have been denied, identities stolen and legitimate beneficiaries erased from the system due to technological errors.&lt;/p&gt;
&lt;h3 dir="ltr"&gt;Future Directions of Research&lt;/h3&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;This brief, qualitative foray into the media coverage of data breaches over two decades has aimed to trace the usage of various terms in two different contexts - the Indian BPO-related incidents and the contemporary context of datafication. It would be worth exploring at length, the relationship between frequent reports of data breaches, and the language used to convey harm in the contemporary context of a concrete data protection legislation vacuum. It would be instructive to examine the specific uses of the terms such as “fraud”, “leak”, “scam”, “theft” and “breach” in media reporting of such data security incidents more exhaustively. Such analysis would elucidate how media reportage shapes public perception towards the safety of user data and an anticipation of attendant harm as data protection legislation continues to evolve.&lt;/p&gt;
&lt;p dir="ltr" style="text-align: justify; "&gt;Especially with Aadhaar, which represents a paradigm shift in identity verification through digital means, it would be useful to conduct a sentiment analysis of how biometric identity related frauds, scams, and leaks are reported by the mainstream news media. A study of user attitudes and behaviours in response to the specific terminology of data security lapses such as the terms “breach”, “leak”, “fraud”, “scam”, “cybercrime”, and “cyberattack” would further contribute to how lay users understand the gravity of a data security lapse. Such research would go beyond expert understandings of data security incidents that tend to dominate media reportage to elucidate the concerns of lay users and further clarify the cultural meanings of data privacy.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/demistifying-data-breaches-in-india'&gt;https://cis-india.org/internet-governance/blog/demistifying-data-breaches-in-india&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Pawan Singh</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Data Governance</dc:subject>
    
    
        <dc:subject>Data Protection</dc:subject>
    
    
        <dc:subject>Data Management</dc:subject>
    

   <dc:date>2022-10-17T16:14:03Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right">
    <title>Getting the (Digital) Indo-Pacific Economic Framework Right</title>
    <link>https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right</link>
    <description>
        &lt;b&gt;On the eve of the Tokyo Quad Summit in May 2022, President Biden unveiled the Indo-Pacific Economic Framework (IPEF), visualising cooperation across the Indo-Pacific based on four pillars: trade; supply chains; clean energy, decarbonisation and infrastructure; and tax and anti-corruption. Galvanised by the US, the other 13 founding members of the IPEF are Australia, Brunei Darussalam, India, Indonesia, Japan, Republic of Korea, Malaysia, New Zealand, Philippines, Singapore, Thailand and Vietnam. The first official in-person Ministerial meeting was held in Los Angeles on 9 September 2022.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;The article was &lt;a class="external-link" href="https://directionsblog.eu/getting-the-digital-indo-pacific-economic-framework-right/"&gt;originally published in Directions&lt;/a&gt; on 16 September 2022.&lt;/p&gt;
&lt;hr /&gt;
&lt;p style="text-align: justify; "&gt;It is still early days. Given the broad and noncommittal scope of the &lt;a href="http://indiamediamonitor.in/ViewImg.aspx?rfW3mQFhdxZsqXnJzK5Xi5+XYlnW6zXnPDF3Ad56Y/KdgI1zvICzrodtLI85MPKdVO1fIh79GUlPfyXY2/bE2g==" rel="noreferrer noopener" target="_blank"&gt;economic arrangement&lt;/a&gt;, it is unlikely that the IPEF will lead to a trade deal among members in the short run. Instead, experts believe that this new arrangement is designed to serve as a ‘&lt;a href="https://indianexpress.com/article/opinion/columns/building-on-common-ground-7963518/" rel="noreferrer noopener" target="_blank"&gt;framework or starting point&lt;/a&gt;’ for members to cooperate on geo-economic issues relevant to the Indo-Pacific, buoyed in no small part by the United States’ desire to make up lost ground and counter Chinese economic influence in the region.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;United States Trade Representative (USTR) Katherine Tai has underscored the relevance of the Indo-Pacific digital economy to the US agenda with the IPEF. She has emphasized the &lt;a href="https://www.whitehouse.gov/briefing-room/press-briefings/2022/05/23/on-the-record-press-call-on-the-launch-of-the-indo-pacific-economic-framework/" rel="noreferrer noopener" target="_blank"&gt;importance of&lt;/a&gt; collaboratively addressing key connectivity and technology challenges, including standards on cross-border data flows, data localisation and online privacy, as well as the discriminatory and unethical use of artificial intelligence. This is an ambitious agenda given the divergence among members in terms of technological advancement, domestic policy preferences and international negotiating stances at digital trade forums. There is a significant risk that imposing external standards or values on this evolving and politically-contested digital economy landscape will not work, and may even undermine the core potential of the IPEF in the Indo-Pacific. This post evaluates the domestic policy preferences and strategic interests of the Framework’s member states, and how the IPEF can navigate key points of divergence in order to achieve meaningful outcomes.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;State of domestic digital policy among IPEF members&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Data localisation is a core point of divergence in global digital policymaking. It continues to dominate discourse and trigger dissent at all &lt;a href="https://www.ikigailaw.com/the-data-localization-debate-in-international-trade-law/#acceptLicense" rel="noreferrer noopener" target="_blank"&gt;international trade forums&lt;/a&gt;, including the World Trade Organization. IPEF members have a range of domestic mandates restricting cross-border flows, which vary in scope, format and rigidity (see table below)&lt;strong&gt;. &lt;/strong&gt;Most countries only have a conditional data localisation requirement, meaning data can only be transferred to countries where it is accorded an equivalent level of protection – unless the individual whose data is being transferred consents to said transfer. &lt;a href="https://www.lexology.com/library/detail.aspx?g=ee977f2e-ecfb-45cf-9f63-186a78a49512#:~:text=Australia%20has%20no%20broad%20data,transferred%20or%20processed%20outside%20Australia." rel="noreferrer noopener" target="_blank"&gt;Australia &lt;/a&gt;and the &lt;a href="https://www.acq.osd.mil/dpap/pdi/docs/FAQs_Network_Penetration_Reporting_and_Contracting_for_Cloud_Services_(01-27-2017).pdf" rel="noreferrer noopener" target="_blank"&gt;United States&lt;/a&gt; have sectoral localisation requirements for health and defence data respectively. India presently has multiple sectoral data localisation requirements. In particular, a 2018 Reserve Bank of India (RBI) &lt;a href="https://www.rbi.org.in/Scripts/NotificationUser.aspx?Id=11244&amp;amp;Mode=0" rel="noreferrer noopener" target="_blank"&gt;directive&lt;/a&gt; imposed strict local storage requirements along with a 24-hour window for foreign processing of payments data generated in India. The RBI imposed a &lt;a href="https://theprint.in/economy/what-is-data-localisation-why-mastercard-amex-diners-club-cant-add-more-customers-in-india/703790/" rel="noreferrer noopener" target="_blank"&gt;moratorium&lt;/a&gt; on the issuance of new cards by several US-based card companies until compliance issues with the data localisation directive were resolved. Furthermore, several iterations of India’s recently &lt;a href="https://www.thehindu.com/sci-tech/technology/internet/explained-why-has-the-government-withdrawn-the-personal-data-protection-bill-2019/article65736155.ece" rel="noreferrer noopener" target="_blank"&gt;withdrawn &lt;/a&gt;Personal Data Protection Bill contained localisation requirements for some categories of personal data.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Indonesia and Vietnam have &lt;a href="https://thediplomat.com/2020/01/the-retreat-of-the-data-localization-brigade-india-indonesia-and-vietnam/" rel="noreferrer noopener" target="_blank"&gt;diluted&lt;/a&gt; the scopes of their data localisation mandates to apply, respectively, only to companies providing public services and to companies not complying with other local laws. These dilutions may have occurred in response to concerted pushback from foreign technology companies operating in these countries. In addition to sectoral restrictions on the transfer of geospatial data, South Korea&lt;a href="https://carnegieendowment.org/2021/08/17/korean-approach-to-data-localization-pub-85165" rel="noreferrer noopener" target="_blank"&gt; retains &lt;/a&gt;several procedural checks on cross-border flows, including formalities regarding providing notice to individual users.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Moving onto another issue flagged by USTR Tai, while all IPEF members recognise the right to information privacy at an overarching or constitutional level, the legal and policy contours of data protection are at different stages of evolution in different countries. &lt;a href="https://www.dlapiperdataprotection.com/index.html?t=law&amp;amp;c=JP#:~:text=Personal%20Information%20Protection%20Commission,-Kasumigaseki%20Common%20Gate&amp;amp;text=Japan%20does%20not%20have%20a%20central%20registration%20system.&amp;amp;text=There%20is%20no%20specific%20legal,(eg%20Chief%20Privacy%20Officer)." rel="noreferrer noopener" target="_blank"&gt;Japan&lt;/a&gt;, &lt;a href="https://www.dlapiperdataprotection.com/index.html?t=law&amp;amp;c=KR" rel="noreferrer noopener" target="_blank"&gt;South Korea&lt;/a&gt;, &lt;a href="https://www.pdp.gov.my/jpdpv2/assets/2020/01/Introduction-to-Personal-Data-Protection-in-Malaysia.pdf" rel="noreferrer noopener" target="_blank"&gt;Malaysia&lt;/a&gt;, &lt;a href="https://www.linklaters.com/en/insights/data-protected/data-protected---new-zealand#:~:text=There%20is%20no%20data%20portability%20right%20in%20New%20Zealand.&amp;amp;text=While%20there%20is%20no%20%22right,a%20correction%20to%20that%20information." rel="noreferrer noopener" target="_blank"&gt;New Zealand,&lt;/a&gt; &lt;a href="https://www.privacy.gov.ph/data-privacy-act/#:~:text=%E2%80%93%20(a)%20The%20personal%20information,against%20any%20other%20unlawful%20processing." rel="noreferrer noopener" target="_blank"&gt;Philippines&lt;/a&gt;, &lt;a href="https://www.pdpc.gov.sg/Overview-of-PDPA/The-Legislation/Personal-Data-Protection-Act#:~:text=What%20is%20the%20PDPA%3F,Banking%20Act%20and%20Insurance%20Act." rel="noreferrer noopener" target="_blank"&gt;Singapore&lt;/a&gt; and &lt;a href="https://www.trade.gov/market-intelligence/thailand-personal-data-protection-act#:~:text=The%20legislation%20mandates%20that%20data,1%20million%20in%20criminal%20fines." rel="noreferrer noopener" target="_blank"&gt;Thailand &lt;/a&gt;have data protection frameworks in place. Data protection frameworks in India and Brunei are under consultation. Notably, the US does not have a comprehensive federal framework on data privacy, although there are patchworks of data privacy regulations at both the federal and state levels.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Regulation and strategic thinking on artificial intelligence (AI) are also at varying levels of development among IPEF members. India has produced a slew of policy papers on Responsible Artificial Intelligence. The most recent &lt;a href="https://www.niti.gov.in/sites/default/files/2021-08/Part2-Responsible-AI-12082021.pdf" rel="noreferrer noopener" target="_blank"&gt;policy paper&lt;/a&gt; published by NITI AAYOG (the Indian government’s think tank) refers to constitutional values and endorses a risk-based approach to AI regulation, much like that adopted by the EU. The US National Security Commission on Artificial Intelligence (NSCAI), chaired by Google CEO Eric Schmidt, expressed concerns about the US ceding AI leadership ground to China. The NSCAI’s final &lt;a href="https://www.nscai.gov/" rel="noreferrer noopener" target="_blank"&gt;report &lt;/a&gt;emphasised the need for US leadership of a ‘coalition of democracies’ as an alternative to China’s autocratic and control-oriented model. Singapore has also made key strides on trusted AI, launching &lt;a href="https://www.pdpc.gov.sg/news-and-events/announcements/2022/05/launch-of-ai-verify---an-ai-governance-testing-framework-and-toolkit" rel="noreferrer noopener" target="_blank"&gt;A.I. verify&lt;/a&gt; – the world’s first AI Governance Testing Framework for companies that wish to demonstrate their use of responsible AI through a minimum verifiable product.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;IPEF and pipe dreams of digital trade&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Some members of the IPEF are signatories to other regional trade agreements. With the exception of Fiji, India and the US, all the IPEF countries are members of the Regional Comprehensive Economic Partnership &lt;a href="https://www.dfat.gov.au/trade/agreements/in-force/rcep#:~:text=RCEP%20entered%20into%20force%20on,Australia%20as%20an%20original%20party." rel="noreferrer noopener" target="_blank"&gt;(RCEP)&lt;/a&gt;, which also includes China. Five IPEF member countries are also members of the &lt;a href="https://www.dfat.gov.au/trade/agreements/in-force/cptpp/comprehensive-and-progressive-agreement-for-trans-pacific-partnership" rel="noreferrer noopener" target="_blank"&gt;Comprehensive and Progressive Trans-Pacific Partnership (CPTPP)&lt;/a&gt; that President Trump backed out of in 2017. Several IPEF members also have bilateral or trilateral trading agreements among themselves, an example being the &lt;a href="https://www.mfat.govt.nz/en/trade/free-trade-agreements/free-trade-agreements-in-force/digital-economy-partnership-agreement-depa/" rel="noreferrer noopener" target="_blank"&gt;Digital Economic Partnership Agreement (DEPA)&lt;/a&gt; between Singapore, New Zealand and Chile.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;&lt;img src="https://cis-india.org/home-images/Pie.png" alt="Pie" class="image-inline" title="Pie" /&gt;&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;All these ‘mega-regional’ trading agreements contain provisions on data flows, including prohibitions on domestic legal provisions that mandate local computing facilities or restrict cross-border data transfers. Notably, these agreements also incorporate &lt;a href="https://publications.clpr.org.in/the-philosophy-and-law-of-information-regulation-in-india/chapter/indias-engagement-with-global-trade-regimes-on-cross-border-data-flows/" rel="noreferrer noopener" target="_blank"&gt;exceptions&lt;/a&gt; to these rules. The CPTPP includes within its ambit an exception on the grounds of ‘legitimate public policy objectives’ of the member, while the RCEP incorporates an additional exception for ‘essential security interests’.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;IPEF members are also spearheading &lt;a href="https://www.hinrichfoundation.com/research/article/wto/can-the-wto-build-consensus-on-digital-trade/" rel="noreferrer noopener" target="_blank"&gt;multilateral efforts &lt;/a&gt;related to the digital economy: Australia, Japan and Singapore are working as convenors of the plurilateral Joint Statement Initiative (JSI) at the World Trade Organization (WTO), which counts 86 WTO members as parties. India (along with South Africa) vehemently &lt;a href="https://docs.wto.org/dol2fe/Pages/SS/directdoc.aspx?filename=q:/WT/GC/W819.pdf&amp;amp;Open=True" rel="noreferrer noopener" target="_blank"&gt;opposes&lt;/a&gt; this plurilateral push on the grounds that the WTO is a multilateral forum functioning on consensus and a plurilateral trade agreement should not be negotiated within the aegis of the WTO. They fear, rightly, that such gambits close out the domestic policy space, especially for evolving digital economy regimes where keen debate and contestation exist among domestic stakeholders. While wary of the implications of the JSI, other IPEF members, such as Indonesia, have cautiously joined the initiative to ensure that they have a voice at the table.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;It is unlikely that the IPEF will lead to a digital trade arrangement in the short run. Policymaking on issues as complex as the digital economy that must respond to specific social, economic and (geo)political realities cannot be steamrolled through external trade agreements. For instance, after the Los Angeles Ministerial India &lt;a href="https://www.business-standard.com/article/economy-policy/india-opts-out-of-joining-ipef-trade-pillar-to-wait-for-final-contours-122091000344_1.html" rel="noreferrer noopener" target="_blank"&gt;opted out&lt;/a&gt; of the IPEF trade pillar citing both India’s evolving domestic legislative framework on data and privacy as well as a broader lack of consensus among IPEF members on several issues, including digital trade. Commerce Minister Piyush Goyal explained that India would wait for the “&lt;a href="https://pib.gov.in/PressReleasePage.aspx?PRID=1858243" rel="noreferrer noopener" target="_blank"&gt;final contours&lt;/a&gt;” of the digital trade track to emerge before making any commitments.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Besides, brokering a trade agreement through the IPEF runs a risk of redundancy. Already, there exists a ‘&lt;a href="https://www.rieti.go.jp/en/columns/a01_0193.html" rel="noreferrer noopener" target="_blank"&gt;spaghetti bowl’&lt;/a&gt; of regional trading agreements that IPEF members can choose from, in addition to forming bilateral trade ties with each other.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;This is why Washington has been clear about calling the IPEF an ‘&lt;a href="https://theprint.in/diplomacy/india-set-to-join-us-led-indo-pacific-economic-arrangement-next-week-with-aim-to-counter-china/963795/" rel="noreferrer noopener" target="_blank"&gt;economic arrangement&lt;/a&gt;’ and not a trade agreement. Membership does not imply any legal obligations. Rather than duplicating ongoing efforts or setting unrealistic targets, the IPEF is an opportunity for all players to shape conversations, share best practices and reach compromises, which could feed back into ongoing efforts to negotiate trade deals. For example, several members of RCEP have domestic data localisation mandates that do not violate trade deals because the agreement carves out exceptions that legitimise domestic policy decisions. Exchanges on how these exceptions work in future trade agreements could be a part of the IPEF arrangement and nudge states towards framing digital trade negotiations through other channels, including at the WTO. Furthermore, states like Singapore that have launched AI self-governance mechanisms could share best practices on how these mechanisms were developed as well as evaluations of how they have helped policy goals be met. And these exchanges shouldn’t be limited to existing IPEF members. If the forum works well, countries that share strategic interests in the region with IPEF members, including, most notably, the European Union, may also want to get involved and further develop partnerships in the region.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Countering China&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;Talking shop on digital trade should certainly not be the only objective of the IPEF. The US has made it clear that they want the message emanating from the IPEF ‘&lt;a href="https://www.business-standard.com/article/international/biden-to-visit-japan-for-quad-summit-to-have-bilateral-meetings-with-modi-122051900128_1.html" rel="noreferrer noopener" target="_blank"&gt;to be heard in Beijing&lt;/a&gt;’. Indeed, the IPEF offers an opportunity for the reassertion of US economic interests in a region where President Trump’s withdrawal from the CPTPP has left a vacuum for China to fill. Accordingly, it is no surprise that the IPEF has representation from several regions of the Indo-Pacific: South Asia, Southeast Asia and the Pacific.&lt;/p&gt;
&lt;p&gt;This should be an urgent policy priority for all IPEF members. Since its initial announcement in 2015, the &lt;a href="https://www.cfr.org/china-digital-silk-road/" rel="noreferrer noopener" target="_blank"&gt;Digital Silk Road (DSR)&lt;/a&gt;, the digital arm of China’s Belt and Road Initiative, has spearheaded &lt;a href="https://www.iiss.org/blogs/research-paper/2021/02/china-digital-silk-road-implications-for-defence-industry" rel="noreferrer noopener" target="_blank"&gt;massive investments&lt;/a&gt; by the Chinese private sector (allegedly under close control of the Chinese state) in e-commerce, fintech, smart cities, data centres, fibre optic cables and telecom networks. This expansion has also happened in the Indo-Pacific, unhampered by China’s aggressive geopolitical posturing in the region through maritime land grabs in the South China Sea. With the exception of &lt;a href="https://www.scmp.com/news/asia/southeast-asia/article/3024479/vietnam-shuns-huawei-it-seeks-build-aseans-first-5g" rel="noreferrer noopener" target="_blank"&gt;Vietnam&lt;/a&gt;, which remains wary of China’s economic expansionism, countries in Southeast Asia welcome Chinese investments, extolling their developmental benefits. Several IPEF members – &lt;a href="https://www.iseas.edu.sg/wp-content/uploads/2022/05/ISEAS_Perspective_2022_57.pdf" rel="noreferrer noopener" target="_blank"&gt;including&lt;/a&gt; Indonesia, Malaysia and Singapore – have associations with Chinese private sector companies, predominantly Huawei and ZTE. A &lt;a href="https://carnegieendowment.org/2022/07/11/localization-and-china-s-tech-success-in-indonesia-pub-87477" rel="noreferrer noopener" target="_blank"&gt;study&lt;/a&gt; evaluating Indonesia’s response to such investments indicates that while they are aware of the risks posed by Chinese infrastructure, their calculus remains unaltered: development and capacity building remain their primary focuses. Furthermore, on the specific question of surveillance, given evidence of other countries such as the US and Australia also using digital infrastructure for surveillance, the threat from China is not perceived as a unique risk.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Setting expectations and approaches&lt;/strong&gt;&lt;/h3&gt;
&lt;p style="text-align: justify; "&gt;Still, the risks of excessive dependence on one country for the development of digital infrastructure are well known. While the IPEF cannot realistically expect to displace the DSR, it can be utilised to provide countries with alternatives. This can only be done by issuing carrots rather than sticks. A US narrative extolling ‘digital democracy’ is unlikely to gain traction in a region characterised by a diversity of political systems that is focused on economic and development needs. At the same time, an excessive focus on thorny domestic policy issues – such as data localisation and the pipe dream of yet another mega-regional trade deal – could risk derailing the geo-economic benefits of the IPEF.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Instead, the IPEF must focus on capacity building, training and private sector investment in infrastructure across the Indo-Pacific. The US must position itself as a geopolitically reliable ally, interested in the overall stability of the digital Indo-Pacific, beyond its own economic or policy preferences. This applies equally to other external actors, like the EU, who may be interested in engaging with or shaping the digital economic landscape in the Indo-Pacific.&lt;/p&gt;
&lt;p style="text-align: justify; "&gt;Countering Chinese economic influence and complementing security agendas set through other fora – such as the Quadrilateral Security Dialogue – should be the primary objective of the IPEF. It is crucial that unrealistic ambitions seeking convergence on values or domestic policy do not undermine strategic interests and dilute the immense potential of the IPEF in catalysing a more competitive and secure digital Indo-Pacific.&lt;/p&gt;
&lt;h3&gt;&lt;strong&gt;Table: Domestic policy positions on data localisation and data protection&lt;/strong&gt;&lt;/h3&gt;
&lt;p&gt;&lt;img src="https://cis-india.org/home-images/Table.png/@@images/8e9a5192-5f6c-4666-8d78-e0863111534a.png" alt="Table" class="image-inline" title="Table" /&gt;&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right'&gt;https://cis-india.org/internet-governance/blog/directions-cyber-digital-europe-arindrajit-basu-september-16-2022-getting-the-digital-indo-pacific-economic-framework-right&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>arindrajit</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Privacy</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Digital Governance</dc:subject>
    
    
        <dc:subject>Digital Economy</dc:subject>
    

   <dc:date>2022-10-03T14:56:22Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/blog/surveillance-enabling-identity-systems-in-africa-tracing-the-fingerprints-of-aadhaar">
    <title>Surveillance Enabling Identity Systems in Africa: Tracing the Fingerprints of Aadhaar</title>
    <link>https://cis-india.org/internet-governance/blog/surveillance-enabling-identity-systems-in-africa-tracing-the-fingerprints-of-aadhaar</link>
    <description>
        &lt;b&gt;Biometric identity systems are being introduced around the world with a focus on promoting human development and social and economic inclusion, rather than previous goals of security. As a result, these systems being encouraged in developing countries, particularly in Africa and Asia, sometimes with disastrous consequences.&lt;/b&gt;
        &lt;p style="text-align: justify; "&gt;In this report, we       identify the different external actors that influencing this       “developmental” agenda. These range from philanthropic       organisations, private companies, and technology vendors, to state       and international institutions. Most notable among these is the       World Bank, whose influence we investigated in the form of case       studies of Nigeria and Kenya. We also explored the role played by       the “success” of the Aadhaar programme in India on these new ID       systems. A key characteristic of the growing “digital identity for       development” trend is the consolidation of different databases       that record beneficiary data for government programmes into one       unified platform, accessed by a unique biometric ID. This “Aadhaar       model” has emerged as a default model to be adopted in developing       countries, with little concern for the risks it introduces. Read       and download the full report &lt;a href="https://cis-india.org/internet-governance/surveillance-enabling-identity-systems-in-africa" class="internal-link"&gt;here&lt;/a&gt;.&lt;/p&gt;
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/blog/surveillance-enabling-identity-systems-in-africa-tracing-the-fingerprints-of-aadhaar'&gt;https://cis-india.org/internet-governance/blog/surveillance-enabling-identity-systems-in-africa-tracing-the-fingerprints-of-aadhaar&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Trikanad and Vrinda Bhandari</dc:creator>
    <dc:rights></dc:rights>

    
        <dc:subject>Surveillance</dc:subject>
    
    
        <dc:subject>Aadhaar</dc:subject>
    
    
        <dc:subject>Internet Governance</dc:subject>
    
    
        <dc:subject>Privacy</dc:subject>
    

   <dc:date>2022-08-09T08:17:32Z</dc:date>
   <dc:type>Blog Entry</dc:type>
   </item>


    <item rdf:about="https://cis-india.org/internet-governance/surveillance-enabling-identity-systems-in-africa">
    <title>Surveillance Enabling Identity Systems in Africa</title>
    <link>https://cis-india.org/internet-governance/surveillance-enabling-identity-systems-in-africa</link>
    <description>
        &lt;b&gt;&lt;/b&gt;
        
        &lt;p&gt;
        For more details visit &lt;a href='https://cis-india.org/internet-governance/surveillance-enabling-identity-systems-in-africa'&gt;https://cis-india.org/internet-governance/surveillance-enabling-identity-systems-in-africa&lt;/a&gt;
        &lt;/p&gt;
    </description>
    <dc:publisher>No publisher</dc:publisher>
    <dc:creator>Shruti Trikanad and Vrinda Bhandari</dc:creator>
    <dc:rights></dc:rights>


   <dc:date>2022-08-09T08:13:34Z</dc:date>
   <dc:type>File</dc:type>
   </item>




</rdf:RDF>
